dblp.uni-trier.dewww.uni-trier.de

Phillip Rogaway

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2008
59EEPhillip Rogaway, John P. Steinberger: Constructing Cryptographic Hash Functions from Fixed-Key Blockciphers. CRYPTO 2008: 433-450
58EEPhillip Rogaway, John P. Steinberger: Security/Efficiency Tradeoffs for Permutation-Based Hashing. EUROCRYPT 2008: 220-236
2007
57EEPhillip Rogaway, Mihir Bellare: Robust computational secret sharing and a unified account of classical secret-sharing goals. ACM Conference on Computer and Communications Security 2007: 172-184
56EEThomas Ristenpart, Phillip Rogaway: How to Enrich the Message Space of a Cipher. FSE 2007: 101-118
55EEMartín Abadi, Phillip Rogaway: Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption). J. Cryptology 20(3): 395 (2007)
2006
54EEPhillip Rogaway, Thomas Shrimpton: A Provable-Security Treatment of the Key-Wrap Problem. EUROCRYPT 2006: 373-390
53EEMihir Bellare, Phillip Rogaway: The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs. EUROCRYPT 2006: 409-426
52EEPhillip Rogaway: Formalizing Human Ignorance. VIETCRYPT 2006: 211-228
51EETed Krovetz, Phillip Rogaway: Variationally universal hashing. Inf. Process. Lett. 100(1): 36-39 (2006)
2005
50EEMihir Bellare, Krzysztof Pietrzak, Phillip Rogaway: Improved Security Analyses for CBC MACs. CRYPTO 2005: 527-545
49EEJohn Black, Phillip Rogaway: CBC MACs for Arbitrary-Length Messages: The Three-Key Constructions. J. Cryptology 18(2): 111-131 (2005)
2004
48EEPhillip Rogaway: Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC. ASIACRYPT 2004: 16-31
47EEPhillip Rogaway: On the Role Definitions in and Beyond Cryptography. ASIAN 2004: 13-32
46EEShai Halevi, Phillip Rogaway: A Parallelizable Enciphering Mode. CT-RSA 2004: 292-304
45EEPhillip Rogaway: Nonce-Based Symmetric Encryption. FSE 2004: 348-359
44EEPhillip Rogaway, Thomas Shrimpton: Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision Resistance. FSE 2004: 371-388
43EEMihir Bellare, Phillip Rogaway, David Wagner: The EAX Mode of Operation. FSE 2004: 389-407
2003
42EEShai Halevi, Phillip Rogaway: A Tweakable Enciphering Mode. CRYPTO 2003: 482-499
41EEPhillip Rogaway, Mihir Bellare, John Black: OCB: A block-cipher mode of operation for efficient authenticated encryption. ACM Trans. Inf. Syst. Secur. 6(3): 365-403 (2003)
2002
40EEPhillip Rogaway: Authenticated-encryption with associated-data. ACM Conference on Computer and Communications Security 2002: 98-107
39EEJohn Black, Phillip Rogaway, Thomas Shrimpton: Black-Box Analysis of the Block-Cipher-Based Hash-Function Constructions from PGV. CRYPTO 2002: 320-335
38EEJohn Black, Phillip Rogaway: Ciphers with Arbitrary Finite Domains. CT-RSA 2002: 114-130
37EEJohn Black, Phillip Rogaway: A Block-Cipher Mode of Operation for Parallelizable Message Authentication. EUROCRYPT 2002: 384-397
36EEJohn Black, Phillip Rogaway, Thomas Shrimpton: Encryption-Scheme Security in the Presence of Key-Dependent Messages. Selected Areas in Cryptography 2002: 62-75
35EEMartín Abadi, Phillip Rogaway: Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption). J. Cryptology 15(2): 103-127 (2002)
2001
34EEPhillip Rogaway, Mihir Bellare, John Black, Ted Krovetz: OCB: a block-cipher mode of operation for efficient authenticated encryption. ACM Conference on Computer and Communications Security 2001: 196-205
33EEMichel Abdalla, Mihir Bellare, Phillip Rogaway: The Oracle Diffie-Hellman Assumptions and an Analysis of DHIES. CT-RSA 2001: 143-158
32EEJoe Kilian, Phillip Rogaway: How to Protect DES Against Exhaustive Key Search (an Analysis of DESX). J. Cryptology 14(1): 17-35 (2001)
2000
31EEMihir Bellare, Phillip Rogaway: Encode-Then-Encipher Encryption: How to Exploit Nonces or Redundancy in Plaintexts for Efficient Cryptography. ASIACRYPT 2000: 317-330
30EEJohn Black, Phillip Rogaway: CBC MACs for Arbitrary-Length Messages: The Three-Key Constructions. CRYPTO 2000: 197-215
29EEMihir Bellare, David Pointcheval, Phillip Rogaway: Authenticated Key Exchange Secure against Dictionary Attacks. EUROCRYPT 2000: 139-155
28EETed Krovetz, Phillip Rogaway: Fast Universal Hashing with Small Keys and No Preprocessing: The PolyR Construction. ICISC 2000: 73-89
27EEMartín Abadi, Phillip Rogaway: Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption). IFIP TCS 2000: 3-22
26 Mihir Bellare, Joe Kilian, Phillip Rogaway: The Security of the Cipher Block Chaining Message Authentication Code. J. Comput. Syst. Sci. 61(3): 362-399 (2000)
1999
25EEJohn Black, Shai Halevi, Hugo Krawczyk, Ted Krovetz, Phillip Rogaway: UMAC: Fast and Secure Message Authentication. CRYPTO 1999: 216-233
24EEMihir Bellare, Phillip Rogaway: On the Construction of Variable-Input-Length Ciphers. FSE 1999: 231-244
23EEPhillip Rogaway: Bucket Hashing and Its Application to Fast Message Authentication. J. Cryptology 12(2): 91-115 (1999)
1998
22EEMihir Bellare, Anand Desai, David Pointcheval, Phillip Rogaway: Relations Among Notions of Security for Public-Key Encryption Schemes. CRYPTO 1998: 26-45
21EEMihir Bellare, Ted Krovetz, Phillip Rogaway: Luby-Rackoff Backwards: Increasing Security by Making Block Ciphers Non-invertible. EUROCRYPT 1998: 266-280
20EEPhillip Rogaway, Don Coppersmith: A Software-Optimized Encryption Algorithm. J. Cryptology 11(4): 273-287 (1998)
1997
19EEMihir Bellare, Phillip Rogaway: Collision-Resistant Hashing: Towards Making UOWHFs Practical. CRYPTO 1997: 470-484
18EEMihir Bellare, Anand Desai, E. Jokipii, Phillip Rogaway: A Concrete Security Treatment of Symmetric Encryption. FOCS 1997: 394-403
17 Mihir Bellare, Phillip Rogaway: Minimizing the use of random oracles in authenticated encryption schemes. ICICS 1997: 1-16
16 Donald Beaver, Joan Feigenbaum, Joe Kilian, Phillip Rogaway: Locally Random Reductions: Improvements and Applications. J. Cryptology 10(1): 17-36 (1997)
1996
15EEJoe Kilian, Phillip Rogaway: How to Protect DES Against Exhaustive Key Search. CRYPTO 1996: 252-267
14EEMihir Bellare, Phillip Rogaway: The Exact Security of Digital Signatures - HOw to Sign with RSA and Rabin. EUROCRYPT 1996: 399-416
1995
13EEMihir Bellare, Roch Guérin, Phillip Rogaway: XOR MACs: New Methods for Message Authentication Using Finite Pseudorandom Functions. CRYPTO 1995: 15-28
12EEPhillip Rogaway: Bucket Hashing and its Application to Fast Message Authentication. CRYPTO 1995: 29-42
11EEMihir Bellare, Phillip Rogaway: Provably secure session key distribution: the three party case. STOC 1995: 57-66
10 Mihir Bellare, Phillip Rogaway: The complexity of approximating a nonlinear program. Math. Program. 69: 429-441 (1995)
1994
9EEMihir Bellare, Joe Kilian, Phillip Rogaway: The Security of Cipher Block Chaining. CRYPTO 1994: 341-358
8EEMihir Bellare, Phillip Rogaway: Optimal Asymmetric Encryption. EUROCRYPT 1994: 92-111
1993
7EEMihir Bellare, Phillip Rogaway: Random Oracles are Practical: A Paradigm for Designing Efficient Protocols. ACM Conference on Computer and Communications Security 1993: 62-73
6EEMihir Bellare, Phillip Rogaway: Entity Authentication and Key Distribution. CRYPTO 1993: 232-249
5 Phillip Rogaway, Don Coppersmith: A Software-Optimised Encryption Algorithm. FSE 1993: 56-63
1991
4EESilvio Micali, Phillip Rogaway: Secure Computation (Abstract). CRYPTO 1991: 392-404
1990
3EEDonald Beaver, Joan Feigenbaum, Joe Kilian, Phillip Rogaway: Security with Low Communication Overhead. CRYPTO 1990: 62-76
2 Donald Beaver, Silvio Micali, Phillip Rogaway: The Round Complexity of Secure Protocols (Extended Abstract) STOC 1990: 503-513
1988
1EEMichael Ben-Or, Oded Goldreich, Shafi Goldwasser, Johan Håstad, Joe Kilian, Silvio Micali, Phillip Rogaway: Everything Provable is Provable in Zero-Knowledge. CRYPTO 1988: 37-56

Coauthor Index

1Martín Abadi [27] [35] [55]
2Michel Abdalla [33]
3Donald Beaver [2] [3] [16]
4Mihir Bellare [6] [7] [8] [9] [10] [11] [13] [14] [17] [18] [19] [21] [22] [24] [26] [29] [31] [33] [34] [41] [43] [50] [53] [57]
5Michael Ben-Or [1]
6John Black [25] [30] [34] [36] [37] [38] [39] [41] [49]
7Don Coppersmith [5] [20]
8Anand Desai [18] [22]
9Joan Feigenbaum [3] [16]
10Oded Goldreich [1]
11Shafi Goldwasser [1]
12Roch Guérin [13]
13Shai Halevi [25] [42] [46]
14Johan Håstad [1]
15E. Jokipii [18]
16Joe Kilian [1] [3] [9] [15] [16] [26] [32]
17Hugo Krawczyk [25]
18Ted Krovetz [21] [25] [28] [34] [51]
19Silvio Micali [1] [2] [4]
20Krzysztof Pietrzak [50]
21David Pointcheval [22] [29]
22Thomas Ristenpart [56]
23Thomas Shrimpton [36] [39] [44] [54]
24John P. Steinberger [58] [59]
25David Wagner [43]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)