On the security of multiple encryption

RC Merkle, ME Hellman?- Communications of the ACM, 1981 - dl.acm.org
… A second method of multiple encryption has been shown to be less secure than it first … they
do in the 56-bit DES and that multiple encryption with any cryptographic system is liable to be …

Chosen-ciphertext security of multiple encryption

Y Dodis, J Katz?- Theory of Cryptography Conference, 2005 - Springer
… We show two constructions of CCAsecure multiple encryption schemes which are generic
(ie, they may be constructed based on any CCA-secure standard encryption scheme) and are …

[HTML][HTML] On Multiple Encryption for Public-Key Cryptography

T Soroceanu, N Buchmann, M Margraf?- Cryptography, 2023 - mdpi.com
… of plain public-key multiple encryption and its development over … of the most relevant multiple
encryption schemes in detail, … for selecting multiple encryption schemes based on common …

[PDF][PDF] Role of multiple encryption in secure electronic transaction

H Gupta, VK Sharma?- International Journal of Network Security &?…, 2011 - researchgate.net
… The multiple encryption technique provides sufficient security for electronic transactions
over wireless network. In this research paper, the needs of multiple encryption technique in …

Secure data aggregation with multiple encryption

M ?nen, R Molva?- European Conference on Wireless Sensor Networks, 2007 - Springer
… aggregate values whereas the multiple encryption scheme assures that aggregate values
… The joint use of the homomorphism and multiple encryption assures that a secret channel is …

Discrete fractional wavelet transform and its application to multiple encryption

G Bhatnagar, QMJ Wu, B Raman?- Information Sciences, 2013 - Elsevier
Multiple encryption scheme In this sub-section, some of the motivating factors in the design of
our approach to multiple encryption … The block diagram of the proposed multiple encryption

The security of multiple encryption in the ideal cipher model

Y Dai, J Lee, B Mennink, J Steinberger?- Annual Cryptology Conference, 2014 - Springer
Multiple encryption—the practice of composing a blockcipher several times with itself
under … of rounds and show that the security of l-round multiple encryption is precisely exp(κ+min{κ(l …

On the security of multiple encryption or CCA-security+ CCA-security= CCA-security?

R Zhang, G Hanaoka, J Shikata, H Imai?- International Workshop on Public?…, 2004 - Springer
… In this paper, we investigate the security notion of multiple encryption against partial … We
study the relations among different security definitions for multiple encryption. We believe a …

Multiphase and multiple encryption

H Kaur, HPS Gill, D Sarmah?- 2018 IEEE Punecon, 2018 - ieeexplore.ieee.org
… Encryption of the plain text is a continuous cycle of multiple encryption ie … confidentiality of
the data is still maintained by multiple encryption. This algorithm can find further applications in …

A secure middlebox framework for enabling visibility over multiple encryption protocols

J Han, S Kim, D Cho, B Choi, J Ha…?- IEEE/ACM Transactions?…, 2020 - ieeexplore.ieee.org
… Our evaluation shows EVE supports diverse use cases with multiple encryption protocols in
… EVE programming abstraction allows us to support multiple encryption protocols including …