Cascade Encryption Revisited
From MaRDI portal
Publication:3650683
DOI10.1007/978-3-642-10366-7_3zbMath1267.94059OpenAlexW1601873227WikidataQ56475246 ScholiaQ56475246MaRDI QIDQ3650683
Publication date: 15 December 2009
Published in: Advances in Cryptology – ASIACRYPT 2009 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-10366-7_3
Related Items (4)
Provable time-memory trade-offs: symmetric cryptography against memory-bounded adversaries ⋮ The Iterated Random Permutation Problem with Applications to Cascade Encryption ⋮ The Multi-user Security of Double Encryption ⋮ Key-Alternating Ciphers and Key-Length Extension: Exact Bounds and Multi-user Security
This page was built for publication: Cascade Encryption Revisited