The following pages link to Cascade Encryption Revisited (Q3650683):
Displaying 4 items.
- Provable time-memory trade-offs: symmetric cryptography against memory-bounded adversaries (Q1629393) (← links)
- Key-Alternating Ciphers and Key-Length Extension: Exact Bounds and Multi-user Security (Q2835581) (← links)
- The Iterated Random Permutation Problem with Applications to Cascade Encryption (Q3457118) (← links)
- The Multi-user Security of Double Encryption (Q5738981) (← links)