Phillip Rogaway

From MaRDI portal


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
The design and evolution of OCB
Journal of Cryptology
2021-09-10Paper
An obsession with definitions
 
2020-03-02Paper
Simplifying game-based definitions -- indistinguishability up to correctness and its application to stateful AE
 
2018-09-26Paper
Deterministic encryption with the Thorp shuffle
Journal of Cryptology
2018-05-28Paper
Big-key symmetric encryption: resisting key exfiltration
Advances in Cryptology – CRYPTO 2016
2016-11-30Paper
Augmented secure channels and the goal of the TLS 1.3 record layer
Provable Security
2016-01-27Paper
Robust authenticated encryption and the limits of symmetric cryptography
Cryptography and Coding
2016-01-12Paper
Online Authenticated-Encryption and its Nonce-Reuse Misuse-Resistance
Lecture Notes in Computer Science
2015-12-10Paper
How to Protect DES Against Exhaustive Key Search
Advances in Cryptology — CRYPTO ’96
2015-11-11Paper
Robust authenticated-encryption AEZ and the problem that it solves
Advances in Cryptology -- EUROCRYPT 2015
2015-09-30Paper
Formalizing human ignorance
Progress in Cryptology - VIETCRYPT 2006
2014-08-21Paper
The exact security of digital signatures -- how to sign with RSA and Rabin
Advances in Cryptology — EUROCRYPT ’96
2014-08-20Paper
Security of symmetric encryption against mass surveillance
Advances in Cryptology – CRYPTO 2014
2014-08-07Paper
Reconsidering generic composition
Advances in Cryptology – EUROCRYPT 2014
2014-05-27Paper
Sometimes-recurse shuffle. Almost-random permutations in logarithmic expected time
Advances in Cryptology – EUROCRYPT 2014
2014-05-27Paper
Adaptively Secure Garbling with Applications to One-Time Programs and Secure Outsourcing
Advances in Cryptology – ASIACRYPT 2012
2013-03-19Paper
The Security of Ciphertext Stealing
Fast Software Encryption
2013-01-08Paper
An enciphering scheme based on a card shuffle
Lecture Notes in Computer Science
2012-09-25Paper
The software performance of authenticated-encryption modes
Fast Software Encryption
2011-07-07Paper
Online ciphers from tweakable blockciphers
Topics in Cryptology – CT-RSA 2011
2011-02-11Paper
An analysis of the blockcipher-based hash functions from PGV
Journal of Cryptology
2010-11-12Paper
On generalized Feistel networks
Advances in Cryptology – CRYPTO 2010
2010-08-24Paper
Variationally universal hashing
Information Processing Letters
2010-01-29Paper
Format-preserving encryption
Selected Areas in Cryptography
2009-12-09Paper
How to Encipher Messages on a Small Domain
Advances in Cryptology - CRYPTO 2009
2009-10-20Paper
Topics in Cryptology – CT-RSA 2004
Lecture Notes in Computer Science
2009-05-07Paper
Constructing Cryptographic Hash Functions from Fixed-Key Blockciphers
Lecture Notes in Computer Science
2009-02-10Paper
How to Enrich the Message Space of a Cipher
Fast Software Encryption
2008-09-16Paper
Security/Efficiency Tradeoffs for Permutation-Based Hashing
Advances in Cryptology – EUROCRYPT 2008
2008-04-15Paper
Improved Security Analyses for CBC MACs
Advances in Cryptology – CRYPTO 2005
2008-03-17Paper
Advances in Cryptology - CRYPTO 2003
Lecture Notes in Computer Science
2007-11-28Paper
The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs
Advances in Cryptology - EUROCRYPT 2006
2007-09-24Paper
A Provable-Security Treatment of the Key-Wrap Problem
Advances in Cryptology - EUROCRYPT 2006
2007-09-24Paper
Authenticated key exchange secure against dictionary attacks
 
2006-03-01Paper
CBC MACs for arbitrary-length messages: The three-key constructions
Journal of Cryptology
2006-02-08Paper
Fast Software Encryption
Lecture Notes in Computer Science
2005-12-27Paper
Fast Software Encryption
Lecture Notes in Computer Science
2005-12-27Paper
Fast Software Encryption
Lecture Notes in Computer Science
2005-12-27Paper
Advances in Computer Science - ASIAN 2004. Higher-Level Decision Making
Lecture Notes in Computer Science
2005-08-17Paper
Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC
 
2005-08-12Paper
scientific article; zbMATH DE number 2086719 (Why is no real title available?)
 
2004-08-11Paper
scientific article; zbMATH DE number 2079924 (Why is no real title available?)
 
2004-08-03Paper
scientific article; zbMATH DE number 1951605 (Why is no real title available?)
 
2003-07-21Paper
scientific article; zbMATH DE number 1942429 (Why is no real title available?)
 
2003-06-30Paper
scientific article; zbMATH DE number 1759457 (Why is no real title available?)
 
2002-11-25Paper
scientific article; zbMATH DE number 1303128 (Why is no real title available?)
 
2002-10-08Paper
scientific article; zbMATH DE number 1759779 (Why is no real title available?)
 
2002-10-07Paper
scientific article; zbMATH DE number 1617924 (Why is no real title available?)
 
2002-09-01Paper
Reconciling two views of cryptography (The computational soundness of formal encryption)
Journal of Cryptology
2002-06-27Paper
scientific article; zbMATH DE number 1689861 (Why is no real title available?)
 
2002-01-14Paper
The complexity of approximating a nonlinear program
 
2001-09-18Paper
The security of the cipher block chaining message authentication code
Journal of Computer and System Sciences
2001-04-17Paper
scientific article; zbMATH DE number 1583788 (Why is no real title available?)
 
2001-04-03Paper
How to protect DES against exhaustive key search (an analysis of DESX).
Journal of Cryptology
2001-01-01Paper
A software-optimized encryption algorithm
Fast Software Encryption
2000-08-30Paper
scientific article; zbMATH DE number 1418297 (Why is no real title available?)
 
2000-07-26Paper
Bucket hashing and its application to fast message authentication
Journal of Cryptology
2000-06-06Paper
scientific article; zbMATH DE number 1418256 (Why is no real title available?)
 
2000-03-19Paper
scientific article; zbMATH DE number 1406792 (Why is no real title available?)
 
2000-03-01Paper
scientific article; zbMATH DE number 1263181 (Why is no real title available?)
 
1999-07-22Paper
scientific article; zbMATH DE number 1302836 (Why is no real title available?)
 
1999-06-17Paper
A software-optimized encryption algorithm
Journal of Cryptology
1999-05-05Paper
scientific article; zbMATH DE number 1107669 (Why is no real title available?)
 
1998-06-07Paper
scientific article; zbMATH DE number 1088254 (Why is no real title available?)
 
1998-03-10Paper
scientific article; zbMATH DE number 1088907 (Why is no real title available?)
 
1998-02-19Paper
scientific article; zbMATH DE number 1030978 (Why is no real title available?)
 
1997-11-23Paper
scientific article; zbMATH DE number 1024060 (Why is no real title available?)
 
1997-09-24Paper
scientific article; zbMATH DE number 1030979 (Why is no real title available?)
 
1997-07-06Paper
Locally random reductions: Improvements and applications
Journal of Cryptology
1997-05-28Paper
The complexity of approximating a nonlinear program
Mathematical Programming. Series A. Series B
1996-02-12Paper
scientific article; zbMATH DE number 503242 (Why is no real title available?)
 
1994-03-07Paper
scientific article; zbMATH DE number 4185024 (Why is no real title available?)
 
1990-01-01Paper


Research outcomes over time


This page was built for person: Phillip Rogaway