Phillip Rogaway - Publications

Affiliations: 
University of California, Davis, Davis, CA 
Area:
Mathematics

11 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2018 Morris B, Rogaway P, Stegers T. Deterministic Encryption with the Thorp Shuffle Journal of Cryptology. 31: 521-536. DOI: 10.1007/S00145-017-9262-Z  0.395
2010 Black J, Rogaway P, Shrimpton T, Stam M. An Analysis of the Blockcipher-Based Hash Functions from PGV Journal of Cryptology. 23: 519-545. DOI: 10.1007/S00145-010-9071-0  0.528
2007 Abadi M, Rogaway P. Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption) Journal of Cryptology. 20: 395-395. DOI: 10.1007/S00145-007-0203-0  0.316
2005 Black J, Rogaway P. CBC MACs for Arbitrary-Length Messages: The Three-Key Constructions Journal of Cryptology. 18: 111-131. DOI: 10.1007/S00145-004-0016-3  0.641
2003 Rogaway P, Bellare M, Black J. OCB: A block-cipher mode of operation for efficient authenticated encryption Acm Transactions On Information and System Security. 6: 365-403. DOI: 10.1145/937527.937529  0.669
2001 Kilian J, Rogaway P. How to Protect DES Against Exhaustive Key Search (an Analysis of DESX) Journal of Cryptology. 14: 17-35. DOI: 10.1007/S001450010015  0.362
2000 Bellare M, Kilian J, Rogaway P. The Security of the Cipher Block Chaining Message Authentication Code Journal of Computer and System Sciences. 61: 362-399. DOI: 10.1006/Jcss.1999.1694  0.661
1999 Rogaway P. Bucket Hashing and Its Application to Fast Message Authentication Journal of Cryptology. 12: 91-115. DOI: 10.1007/Pl00003822  0.381
1998 Rogaway P, Coppersmith D. A Software-Optimized Encryption Algorithm Journal of Cryptology. 11: 273-287. DOI: 10.1007/S001459900048  0.311
1997 Beaver D, Feigenbaum J, Kilian J, Rogaway P. Locally random reductions: Improvements and applications Journal of Cryptology. 10: 17-36. DOI: 10.1007/S001459900017  0.382
1995 Bellare M, Rogaway P. The complexity of approximating a nonlinear program Mathematical Programming. 69: 429-441. DOI: 10.1007/Bf01585569  0.611
Show low-probability matches.