Phillip Rogaway

From MaRDI portal
Person:814841

Available identifiers

zbMath Open rogaway.phillipWikidataQ7185796 ScholiaQ7185796MaRDI QIDQ814841

List of research outcomes

PublicationDate of PublicationType
The design and evolution of OCB2021-09-10Paper
An obsession with definitions2020-03-02Paper
Simplifying game-based definitions -- indistinguishability up to correctness and its application to stateful AE2018-09-26Paper
Deterministic encryption with the Thorp shuffle2018-05-28Paper
Big-Key Symmetric Encryption: Resisting Key Exfiltration2016-11-30Paper
Augmented Secure Channels and the Goal of the TLS 1.3 Record Layer2016-01-27Paper
Robust Authenticated Encryption and the Limits of Symmetric Cryptography2016-01-12Paper
Online Authenticated-Encryption and its Nonce-Reuse Misuse-Resistance2015-12-10Paper
How to Protect DES Against Exhaustive Key Search2015-11-11Paper
Robust Authenticated-Encryption AEZ and the Problem That It Solves2015-09-30Paper
Formalizing Human Ignorance2014-08-21Paper
The Exact Security of Digital Signatures-How to Sign with RSA and Rabin2014-08-20Paper
Security of Symmetric Encryption against Mass Surveillance2014-08-07Paper
Reconsidering Generic Composition2014-05-27Paper
Sometimes-Recurse Shuffle2014-05-27Paper
Adaptively Secure Garbling with Applications to One-Time Programs and Secure Outsourcing2013-03-19Paper
The Security of Ciphertext Stealing2013-01-08Paper
An Enciphering Scheme Based on a Card Shuffle2012-09-25Paper
The Software Performance of Authenticated-Encryption Modes2011-07-07Paper
Online Ciphers from Tweakable Blockciphers2011-02-11Paper
An analysis of the blockcipher-based hash functions from PGV2010-11-12Paper
On Generalized Feistel Networks2010-08-24Paper
Variationally universal hashing2010-01-29Paper
Format-Preserving Encryption2009-12-09Paper
How to Encipher Messages on a Small Domain2009-10-20Paper
Topics in Cryptology – CT-RSA 20042009-05-07Paper
Constructing Cryptographic Hash Functions from Fixed-Key Blockciphers2009-02-10Paper
How to Enrich the Message Space of a Cipher2008-09-16Paper
Security/Efficiency Tradeoffs for Permutation-Based Hashing2008-04-15Paper
Improved Security Analyses for CBC MACs2008-03-17Paper
Advances in Cryptology - CRYPTO 20032007-11-28Paper
A Provable-Security Treatment of the Key-Wrap Problem2007-09-24Paper
The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs2007-09-24Paper
https://portal.mardi4nfdi.de/entity/Q33749052006-03-01Paper
CBC MACs for arbitrary-length messages: The three-key constructions2006-02-08Paper
Fast Software Encryption2005-12-27Paper
Fast Software Encryption2005-12-27Paper
Fast Software Encryption2005-12-27Paper
Advances in Computer Science - ASIAN 2004. Higher-Level Decision Making2005-08-17Paper
Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC2005-08-12Paper
https://portal.mardi4nfdi.de/entity/Q47372582004-08-11Paper
https://portal.mardi4nfdi.de/entity/Q44720692004-08-03Paper
https://portal.mardi4nfdi.de/entity/Q44138542003-07-21Paper
https://portal.mardi4nfdi.de/entity/Q44091272003-06-30Paper
https://portal.mardi4nfdi.de/entity/Q45364072002-11-25Paper
https://portal.mardi4nfdi.de/entity/Q42496432002-10-08Paper
https://portal.mardi4nfdi.de/entity/Q45368022002-10-07Paper
https://portal.mardi4nfdi.de/entity/Q27244342002-09-01Paper
Reconciling two views of cryptography (The computational soundness of formal encryption)2002-06-27Paper
https://portal.mardi4nfdi.de/entity/Q27630252002-01-14Paper
https://portal.mardi4nfdi.de/entity/Q27439642001-09-18Paper
The security of the cipher block chaining message authentication code2001-04-17Paper
https://portal.mardi4nfdi.de/entity/Q27074282001-04-03Paper
How to protect DES against exhaustive key search (an analysis of DESX).2001-01-01Paper
A software-optimized encryption algorithm2000-08-30Paper
https://portal.mardi4nfdi.de/entity/Q49418572000-07-26Paper
Bucket hashing and its application to fast message authentication2000-06-06Paper
https://portal.mardi4nfdi.de/entity/Q49418152000-03-19Paper
https://portal.mardi4nfdi.de/entity/Q49407082000-03-01Paper
https://portal.mardi4nfdi.de/entity/Q42340511999-07-22Paper
https://portal.mardi4nfdi.de/entity/Q42493181999-06-17Paper
A software-optimized encryption algorithm1999-05-05Paper
https://portal.mardi4nfdi.de/entity/Q43736071998-06-07Paper
https://portal.mardi4nfdi.de/entity/Q43645711998-03-10Paper
https://portal.mardi4nfdi.de/entity/Q43657321998-02-19Paper
https://portal.mardi4nfdi.de/entity/Q43434181997-11-23Paper
https://portal.mardi4nfdi.de/entity/Q43417511997-09-24Paper
https://portal.mardi4nfdi.de/entity/Q43434191997-07-06Paper
Locally random reductions: Improvements and applications1997-05-28Paper
The complexity of approximating a nonlinear program1996-02-12Paper
https://portal.mardi4nfdi.de/entity/Q42795641994-03-07Paper
https://portal.mardi4nfdi.de/entity/Q57503981990-01-01Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Phillip Rogaway