Security amplification by composition: The case of doubly-iterated, ideal ciphers
1998 ◽
pp. 390-407
◽
Keyword(s):
Keyword(s):