Phillip Rogaway
Phillip Rogaway
Verified email at cs.ucdavis.edu - Homepage
TitleCited byYear
Random oracles are practical: A paradigm for designing efficient protocols
M Bellare, P Rogaway
Proceedings of the 1st ACM conference on Computer and communications …, 1993
50791993
Entity authentication and key distribution
M Bellare, P Rogaway
Annual international cryptology conference, 232-249, 1993
19231993
Authenticated key exchange secure against dictionary attacks
M Bellare, D Pointcheval, P Rogaway
International conference on the theory and applications of cryptographic …, 2000
15632000
Optimal asymmetric encryption
M Bellare, P Rogaway
Workshop on the Theory and Application of of Cryptographic Techniques, 92-111, 1994
15431994
Relations among notions of security for public-key encryption schemes
M Bellare, A Desai, D Pointcheval, P Rogaway
Annual International Cryptology Conference, 26-45, 1998
13151998
A concrete security treatment of symmetric encryption
M Bellare, A Desai, E Jokipii, P Rogaway
Proceedings 38th Annual Symposium on Foundations of Computer Science, 394-403, 1997
11891997
The exact security of digital signatures-How to sign with RSA and Rabin
M Bellare, P Rogaway
International Conference on the Theory and Applications of Cryptographic …, 1996
11541996
OCB: A block-cipher mode of operation for efficient authenticated encryption
P Rogaway, M Bellare, J Black
ACM Transactions on Information and System Security (TISSEC) 6 (3), 365-403, 2003
8082003
Provably secure session key distribution: the three party case
M Bellare, P Rogaway
STOC 95, 57-66, 1995
7701995
The security of triple encryption and a framework for code-based game-playing proofs
M Bellare, P Rogaway
Annual International Conference on the Theory and Applications of …, 2006
6232006
The round complexity of secure protocols
D Beaver, S Micali, P Rogaway
STOC 90, 503-513, 1990
6101990
Cryptographic hash-function basics: Definitions, implications, and separations for preimage resistance, second-preimage resistance, and collision resistance
P Rogaway, T Shrimpton
International workshop on fast software encryption, 371-388, 2004
6032004
The security of the cipher block chaining message authentication code
M Bellare, J Kilian, P Rogaway
Journal of Computer and System Sciences 61 (3), 362-399, 2000
5632000
UMAC: Fast and secure message authentication
J Black, S Halevi, H Krawczyk, T Krovetz, P Rogaway
Annual International Cryptology Conference, 216-233, 1999
5441999
The security of cipher block chaining
M Bellare, J Kilian, P Rogaway
Annual International Cryptology Conference, 341-358, 1994
5051994
Reconciling two views of cryptography (the computational soundness of formal encryption)
M Abadi, P Rogaway
Journal of cryptology 15 (2), 103-127, 2002
4762002
Secure computation
S Micali, P Rogaway
Annual International Cryptology Conference, 392-404, 1991
4731991
The oracle Diffie-Hellman assumptions and an analysis of DHIES
M Abdalla, M Bellare, P Rogaway
Cryptographers’ Track at the RSA Conference, 143-158, 2001
4222001
Black-box analysis of the block-cipher-based hash-function constructions from PGV
J Black, P Rogaway, T Shrimpton
Annual International Cryptology Conference, 320-335, 2002
4192002
Efficient instantiations of tweakable blockciphers and refinements to modes OCB and PMAC
P Rogaway
International Conference on the Theory and Application of Cryptology and …, 2004
4072004
The system can't perform the operation now. Try again later.
Articles 1–20