Phillip Rogaway

From MaRDI portal
Person:814841

Available identifiers

zbMath Open rogaway.phillipDBLPr/PhillipRogawayWikidataQ7185796 ScholiaQ7185796MaRDI QIDQ814841

List of research outcomes





PublicationDate of PublicationType
The design and evolution of OCB2021-09-10Paper
An obsession with definitions2020-03-02Paper
Simplifying game-based definitions -- indistinguishability up to correctness and its application to stateful AE2018-09-26Paper
Deterministic encryption with the Thorp shuffle2018-05-28Paper
Big-Key Symmetric Encryption: Resisting Key Exfiltration2016-11-30Paper
Augmented Secure Channels and the Goal of the TLS 1.3 Record Layer2016-01-27Paper
Robust Authenticated Encryption and the Limits of Symmetric Cryptography2016-01-12Paper
Online Authenticated-Encryption and its Nonce-Reuse Misuse-Resistance2015-12-10Paper
How to Protect DES Against Exhaustive Key Search2015-11-11Paper
Robust Authenticated-Encryption AEZ and the Problem That It Solves2015-09-30Paper
Formalizing Human Ignorance2014-08-21Paper
The Exact Security of Digital Signatures-How to Sign with RSA and Rabin2014-08-20Paper
Security of Symmetric Encryption against Mass Surveillance2014-08-07Paper
Reconsidering Generic Composition2014-05-27Paper
Sometimes-Recurse Shuffle2014-05-27Paper
Adaptively Secure Garbling with Applications to One-Time Programs and Secure Outsourcing2013-03-19Paper
The Security of Ciphertext Stealing2013-01-08Paper
An Enciphering Scheme Based on a Card Shuffle2012-09-25Paper
The software performance of authenticated-encryption modes2011-07-07Paper
Online ciphers from tweakable blockciphers2011-02-11Paper
An analysis of the blockcipher-based hash functions from PGV2010-11-12Paper
On generalized Feistel networks2010-08-24Paper
Variationally universal hashing2010-01-29Paper
Format-preserving encryption2009-12-09Paper
How to Encipher Messages on a Small Domain2009-10-20Paper
Topics in Cryptology – CT-RSA 20042009-05-07Paper
Constructing Cryptographic Hash Functions from Fixed-Key Blockciphers2009-02-10Paper
How to Enrich the Message Space of a Cipher2008-09-16Paper
Security/Efficiency Tradeoffs for Permutation-Based Hashing2008-04-15Paper
Improved Security Analyses for CBC MACs2008-03-17Paper
Advances in Cryptology - CRYPTO 20032007-11-28Paper
The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs2007-09-24Paper
A Provable-Security Treatment of the Key-Wrap Problem2007-09-24Paper
Authenticated key exchange secure against dictionary attacks2006-03-01Paper
CBC MACs for arbitrary-length messages: The three-key constructions2006-02-08Paper
Fast Software Encryption2005-12-27Paper
Fast Software Encryption2005-12-27Paper
Fast Software Encryption2005-12-27Paper
Advances in Computer Science - ASIAN 2004. Higher-Level Decision Making2005-08-17Paper
Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC2005-08-12Paper
https://portal.mardi4nfdi.de/entity/Q47372582004-08-11Paper
https://portal.mardi4nfdi.de/entity/Q44720692004-08-03Paper
https://portal.mardi4nfdi.de/entity/Q44138542003-07-21Paper
https://portal.mardi4nfdi.de/entity/Q44091272003-06-30Paper
https://portal.mardi4nfdi.de/entity/Q45364072002-11-25Paper
https://portal.mardi4nfdi.de/entity/Q42496432002-10-08Paper
https://portal.mardi4nfdi.de/entity/Q45368022002-10-07Paper
https://portal.mardi4nfdi.de/entity/Q27244342002-09-01Paper
Reconciling two views of cryptography (The computational soundness of formal encryption)2002-06-27Paper
https://portal.mardi4nfdi.de/entity/Q27630252002-01-14Paper
The complexity of approximating a nonlinear program2001-09-18Paper
The security of the cipher block chaining message authentication code2001-04-17Paper
https://portal.mardi4nfdi.de/entity/Q27074282001-04-03Paper
How to protect DES against exhaustive key search (an analysis of DESX).2001-01-01Paper
A software-optimized encryption algorithm2000-08-30Paper
https://portal.mardi4nfdi.de/entity/Q49418572000-07-26Paper
Bucket hashing and its application to fast message authentication2000-06-06Paper
https://portal.mardi4nfdi.de/entity/Q49418152000-03-19Paper
https://portal.mardi4nfdi.de/entity/Q49407082000-03-01Paper
https://portal.mardi4nfdi.de/entity/Q42340511999-07-22Paper
https://portal.mardi4nfdi.de/entity/Q42493181999-06-17Paper
A software-optimized encryption algorithm1999-05-05Paper
https://portal.mardi4nfdi.de/entity/Q43736071998-06-07Paper
https://portal.mardi4nfdi.de/entity/Q43645711998-03-10Paper
https://portal.mardi4nfdi.de/entity/Q43657321998-02-19Paper
https://portal.mardi4nfdi.de/entity/Q43434181997-11-23Paper
https://portal.mardi4nfdi.de/entity/Q43417511997-09-24Paper
https://portal.mardi4nfdi.de/entity/Q43434191997-07-06Paper
Locally random reductions: Improvements and applications1997-05-28Paper
The complexity of approximating a nonlinear program1996-02-12Paper
https://portal.mardi4nfdi.de/entity/Q42795641994-03-07Paper
https://portal.mardi4nfdi.de/entity/Q57503981990-01-01Paper

Research outcomes over time

This page was built for person: Phillip Rogaway