Phillip Rogaway
Affiliations: | University of California, Davis, Davis, CA |
Area:
MathematicsGoogle:
"Phillip Rogaway"Children
Sign in to add traineeJohn R. Black | grad student | 2000 | UC Davis |
Theodore D. Krovetz | grad student | 2000 | UC Davis (MathTree) |
Thomas E. Shrimpton | grad student | 2004 | UC Davis (MathTree) |
Till Stegers | grad student | 2010 | UC Davis (MathTree) |
Viet T. Hoang | grad student | 2013 | UC Davis (MathTree) |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Morris B, Rogaway P, Stegers T. (2018) Deterministic Encryption with the Thorp Shuffle Journal of Cryptology. 31: 521-536 |
Black J, Rogaway P, Shrimpton T, et al. (2010) An Analysis of the Blockcipher-Based Hash Functions from PGV Journal of Cryptology. 23: 519-545 |
Abadi M, Rogaway P. (2007) Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption) Journal of Cryptology. 20: 395-395 |
Black J, Rogaway P. (2005) CBC MACs for Arbitrary-Length Messages: The Three-Key Constructions Journal of Cryptology. 18: 111-131 |
Rogaway P, Bellare M, Black J. (2003) OCB: A block-cipher mode of operation for efficient authenticated encryption Acm Transactions On Information and System Security. 6: 365-403 |
Kilian J, Rogaway P. (2001) How to Protect DES Against Exhaustive Key Search (an Analysis of DESX) Journal of Cryptology. 14: 17-35 |
Bellare M, Kilian J, Rogaway P. (2000) The Security of the Cipher Block Chaining Message Authentication Code Journal of Computer and System Sciences. 61: 362-399 |
Rogaway P. (1999) Bucket Hashing and Its Application to Fast Message Authentication Journal of Cryptology. 12: 91-115 |
Rogaway P, Coppersmith D. (1998) A Software-Optimized Encryption Algorithm Journal of Cryptology. 11: 273-287 |
Beaver D, Feigenbaum J, Kilian J, et al. (1997) Locally random reductions: Improvements and applications Journal of Cryptology. 10: 17-36 |