Phillip Rogaway

Affiliations: 
University of California, Davis, Davis, CA 
Area:
Mathematics
Google:
"Phillip Rogaway"

Parents

Sign in to add mentor
Silvio Micali grad student 1991 MIT

Children

Sign in to add trainee
John R. Black grad student 2000 UC Davis
Theodore D. Krovetz grad student 2000 UC Davis (MathTree)
Thomas E. Shrimpton grad student 2004 UC Davis (MathTree)
Till Stegers grad student 2010 UC Davis (MathTree)
Viet T. Hoang grad student 2013 UC Davis (MathTree)
BETA: Related publications

Publications

You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect.

Morris B, Rogaway P, Stegers T. (2018) Deterministic Encryption with the Thorp Shuffle Journal of Cryptology. 31: 521-536
Black J, Rogaway P, Shrimpton T, et al. (2010) An Analysis of the Blockcipher-Based Hash Functions from PGV Journal of Cryptology. 23: 519-545
Abadi M, Rogaway P. (2007) Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption) Journal of Cryptology. 20: 395-395
Black J, Rogaway P. (2005) CBC MACs for Arbitrary-Length Messages: The Three-Key Constructions Journal of Cryptology. 18: 111-131
Rogaway P, Bellare M, Black J. (2003) OCB: A block-cipher mode of operation for efficient authenticated encryption Acm Transactions On Information and System Security. 6: 365-403
Kilian J, Rogaway P. (2001) How to Protect DES Against Exhaustive Key Search (an Analysis of DESX) Journal of Cryptology. 14: 17-35
Bellare M, Kilian J, Rogaway P. (2000) The Security of the Cipher Block Chaining Message Authentication Code Journal of Computer and System Sciences. 61: 362-399
Rogaway P. (1999) Bucket Hashing and Its Application to Fast Message Authentication Journal of Cryptology. 12: 91-115
Rogaway P, Coppersmith D. (1998) A Software-Optimized Encryption Algorithm Journal of Cryptology. 11: 273-287
Beaver D, Feigenbaum J, Kilian J, et al. (1997) Locally random reductions: Improvements and applications Journal of Cryptology. 10: 17-36
See more...