Share on Facebook Tweet on Twitter Share on LinkedIn Share by email
> Publications > Security amplification by composition: The case of doubly-iterated ideal ciphers