Cryptology ePrint Archive: Report 2004/331
Available versions in chronological order
20041130:235636 (posted 30-Nov-2004 23:56:36 UTC)
The Game-Playing Technique
Mihir Bellare and Phillip Rogaway
20041202:061259 (posted 02-Dec-2004 06:12:59 UTC)
The Game-Playing Technique
Mihir Bellare and Phillip Rogaway
20041202:192730 (posted 02-Dec-2004 19:27:30 UTC)
The Game-Playing Technique
Mihir Bellare and Phillip Rogaway
20041202:193102 (posted 02-Dec-2004 19:31:02 UTC)
The Game-Playing Technique
Mihir Bellare and Phillip Rogaway
20041208:202524 (posted 08-Dec-2004 20:25:24 UTC)
The Game-Playing Technique
Mihir Bellare and Phillip Rogaway
20041208:202651 (posted 08-Dec-2004 20:26:51 UTC)
The Game-Playing Technique
Mihir Bellare and Phillip Rogaway
20041211:051331 (posted 11-Dec-2004 05:13:31 UTC)
The Game-Playing Technique
Mihir Bellare and Phillip Rogaway
20041211:052135 (posted 11-Dec-2004 05:21:35 UTC)
The Game-Playing Technique
Mihir Bellare and Phillip Rogaway
20041219:042049 (posted 19-Dec-2004 04:20:49 UTC)
The Game-Playing Technique
Mihir Bellare and Phillip Rogaway
20041219:042446 (posted 19-Dec-2004 04:24:46 UTC)
The Game-Playing Technique
Mihir Bellare and Phillip Rogaway
20050712:213950 (posted 12-Jul-2005 21:39:50 UTC)
The Game-Playing Technique
Mihir Bellare and Phillip Rogaway
20050712:214115 (posted 12-Jul-2005 21:41:15 UTC)
The Game-Playing Technique
Mihir Bellare and Phillip Rogaway
20051204:224105 (posted 04-Dec-2005 22:41:05 UTC)
The Game-Playing Technique and its Application to Triple Encryption
Mihir Bellare and Phillip Rogaway
20051214:213506 (posted 14-Dec-2005 21:35:06 UTC)
The Game-Playing Technique and its Application to Triple Encryption
Mihir Bellare and Phillip Rogaway
20060311:033833 (posted 11-Mar-2006 03:38:33 UTC)
Code-Based Game-Playing Proofs and the Security of Triple Encryption
Mihir Bellare and Phillip Rogaway
20061216:091117 (posted 16-Dec-2006 09:11:17 UTC)
Code-Based Game-Playing Proofs and the Security of Triple Encryption
Mihir Bellare and Phillip Rogaway
20081129:034148 (posted 29-Nov-2008 03:41:48 UTC)
Code-Based Game-Playing Proofs and the Security of Triple Encryption
Mihir Bellare and Phillip Rogaway
[
Cryptology ePrint archive
]