The following pages link to Phillip Rogaway (Q814841):
Displaying 50 items.
- (Q166361) (redirect page) (← links)
- An analysis of the blockcipher-based hash functions from PGV (Q604636) (← links)
- Locally random reductions: Improvements and applications (Q676825) (← links)
- CBC MACs for arbitrary-length messages: The three-key constructions (Q814842) (← links)
- Variationally universal hashing (Q845822) (← links)
- A software-optimized encryption algorithm (Q1281787) (← links)
- Bucket hashing and its application to fast message authentication (Q1291805) (← links)
- Reconciling two views of cryptography (The computational soundness of formal encryption) (Q1601823) (← links)
- Deterministic encryption with the Thorp shuffle (Q1753170) (← links)
- Simplifying game-based definitions -- indistinguishability up to correctness and its application to stateful AE (Q1784080) (← links)
- The complexity of approximating a nonlinear program (Q1906280) (← links)
- The design and evolution of OCB (Q1983331) (← links)
- An obsession with definitions (Q2303092) (← links)
- (Q2707428) (← links)
- (Q2724434) (← links)
- (Q2743964) (← links)
- (Q2763025) (← links)
- Big-Key Symmetric Encryption: Resisting Key Exfiltration (Q2835594) (← links)
- Security of Symmetric Encryption against Mass Surveillance (Q2874493) (← links)
- The Exact Security of Digital Signatures-How to Sign with RSA and Rabin (Q2876918) (← links)
- Formalizing Human Ignorance (Q2876977) (← links)
- An Enciphering Scheme Based on a Card Shuffle (Q2914246) (← links)
- Robust Authenticated-Encryption AEZ and the Problem That It Solves (Q2948322) (← links)
- The Software Performance of Authenticated-Encryption Modes (Q3013091) (← links)
- Online Ciphers from Tweakable Blockciphers (Q3073710) (← links)
- How to Encipher Messages on a Small Domain (Q3183570) (← links)
- (Q3374905) (← links)
- How to Protect DES Against Exhaustive Key Search (Q3452356) (← links)
- Online Authenticated-Encryption and its Nonce-Reuse Misuse-Resistance (Q3457125) (← links)
- Robust Authenticated Encryption and the Limits of Symmetric Cryptography (Q3460101) (← links)
- Augmented Secure Channels and the Goal of the TLS 1.3 Record Layer (Q3467157) (← links)
- How to Enrich the Message Space of a Cipher (Q3524884) (← links)
- On Generalized Feistel Networks (Q3582780) (← links)
- A Provable-Security Treatment of the Key-Wrap Problem (Q3593107) (← links)
- The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs (Q3593109) (← links)
- Constructing Cryptographic Hash Functions from Fixed-Key Blockciphers (Q3600233) (← links)
- Format-Preserving Encryption (Q3651265) (← links)
- (Q4234051) (← links)
- (Q4249318) (← links)
- (Q4249643) (← links)
- (Q4279564) (← links)
- (Q4341751) (← links)
- (Q4343418) (← links)
- (Q4343419) (← links)
- (Q4364571) (← links)
- (Q4365732) (← links)
- (Q4373607) (← links)
- (Q4409127) (← links)
- (Q4413854) (← links)
- (Q4472069) (← links)