1. W. Aiello, M. Bellare, G. Di Crescenzo and R. Venkatesan, “Security Amplification by Composition: The case of Doubly-Iterated, Ideal Ciphers,” Full version of this paper, available via http://www-cse.ucscl.edu/users/mihir.
2. M. Bellare, J. Kilian and P. Rogaway, “The security of cipher block chaining”, Advances in Cryptology — Crypto 94 Proceedings, Lecture Notes in Computer Science Vol. 839, Y. Desmedt ed., Springer-Verlag, 1994.
3. E. Biham and A. Shamir, “Differential cryptanalysis of DES-like cryptosystems,” J. of Cryptology, Vol. 4, No. 1, pp. 3–72, 1991.
4. E. Biham and A. Shamir, “Differential cryptanalysis of the Full 16-round DES,” Advances in Cryptology — Crypto 92 Proceedings, Lecture Notes in Computer Science Vol. 740, E. Brickell ed., Springer-Verlag, 1992.
5. W. Diffie and M. Hellman, “Exhaustive cryptanalysis of the NBS data encryption standard,” Computer, Vol. 10, No. 6, pp. 74–84, June 1977.