Cryptographers' World
 

Phillip Rogaway


Author's Web Page Link

45 papers in database with 8236 citations StarStarStarStarStar

H-number: 34

Journal Papers

[Sort papers chronologically] [Sort papers by citations count]

 
1. John Black,  Phillip Rogaway,  CBC MACs for Arbitrary-Length Messages: The Three-Key Constructions, Journal of Cryptology, Volume 18(2), pp. 111 - 131, Springer, 2005.

[Cited 81 times Red Star]

2. Martín Abadi,  Phillip Rogaway,  Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption), Journal of Cryptology, Volume 15(2), pp. 103 - 127, Springer, 2002.

[Cited 389 times Red StarRed StarRed Star]

3. Joe Kilian,  Phillip Rogaway,  How to Protect DES Against Exhaustive Key Search (an Analysis of DESX), Journal of Cryptology, Volume 14(1), pp. 17 - 35, Springer, 2001.

[Cited 14 times ]

4. Mihir Bellare,  Joe Kilian,  Phillip Rogaway,  Security of the Cipher Block Chaining Message Authentication Code , Journal of Computer and System Sciences, Volume 61(3), pp. 362 - 399, Elsevier, 2000.

[Cited 453 times Red StarRed StarRed Star]

5. Phillip Rogaway,  Bucket Hashing and Its Application to Fast Message Authentication, Journal of Cryptology, Volume 12(2), pp. 91 - 115, Springer, 1999.

[Cited 85 times Red Star]

6. Phillip Rogaway,  Don Coppersmith,  A Software-Optimized Encryption Algorithm, Journal of Cryptology, Volume 11(4), pp. 273 - 287, Springer, 1998.

[Cited 151 times Red StarRed Star]

7. Donald Beaver,  Joan Feigenbaum,  Joe Kilian,  Phillip Rogaway,  Locally Random Reductions: Improvements and Applications, Journal of Cryptology, Volume 10(1), pp. 17 - 36, Springer, 1997.

[Cited 40 times ]

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Ben Morris,  Phillip Rogaway,  Till Stegers,  How to Encipher Messages on a Small Domain, pp. 286 - 302, CRYPTO 2009.

[Electronic Edition][Cited 2 times ]

2. Phillip Rogaway,  John P. Steinberger,  Constructing Cryptographic Hash Functions from Fixed-Key Blockciphers, pp. 433 - 450, CRYPTO 2008.

[Electronic Edition][Cited 29 times ]

3. Phillip Rogaway,  John P. Steinberger,  Security/Efficiency Tradeoffs for Permutation-Based Hashing, pp. 220 - 236, EUROCRYPT 2008.

[Electronic Edition][Cited 34 times ]

4. Thomas Ristenpart,  Phillip Rogaway,  How to Enrich the Message Space of a Cipher, pp. 101 - 118, FSE 2007.

[Electronic Edition][Cited 6 times ]

5. Phillip Rogaway,  Formalizing Human Ignorance, pp. 211 - 228, VIETCRYPT 2006.

[Electronic Edition][Cited 52 times Red Star]

6. Mihir Bellare,  Phillip Rogaway,  The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs, pp. 409 - 426, EUROCRYPT 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 81 times Red Star]

7. Phillip Rogaway,  Thomas Shrimpton,  A Provable-Security Treatment of the Key-Wrap Problem, pp. 373 - 390, EUROCRYPT 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 28 times ]

8. Mihir Bellare,  Krzysztof Pietrzak,  Phillip Rogaway,  Improved Security Analyses for CBC MACs, pp. 527 - 545, CRYPTO 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 27 times ]

9. Phillip Rogaway,  Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC, pp. 16 - 31, ASIACRYPT 2004.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 59 times Red Star]

10. Shai Halevi,  Phillip Rogaway,  A Parallelizable Enciphering Mode, pp. 292 - 304, CT-RSA 2004.

[Electronic Edition][Cited 93 times Red Star]

11. Phillip Rogaway,  Nonce-Based Symmetric Encryption, pp. 348 - 359, FSE 2004.

[Electronic Edition][Cited 24 times ]

12. Mihir Bellare,  Phillip Rogaway,  David Wagner,  The EAX Mode of Operation, pp. 389 - 407, FSE 2004.

[Electronic Edition][Cited 81 times Red Star]

13. Phillip Rogaway,  Thomas Shrimpton,  Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision Resistance, pp. 371 - 388, FSE 2004.

[Electronic Edition][Cited 173 times Red StarRed Star]

14. Shai Halevi,  Phillip Rogaway,  A Tweakable Enciphering Mode, pp. 482 - 499, CRYPTO 2003.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 105 times Red StarRed Star]

15. John Black,  Phillip Rogaway,  Thomas Shrimpton,  Black-Box Analysis of the Block-Cipher-Based Hash-Function Constructions from PGV, pp. 320 - 335, CRYPTO 2002.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 189 times Red StarRed Star]

16. John Black,  Phillip Rogaway,  Thomas Shrimpton,  Encryption-Scheme Security in the Presence of Key-Dependent Messages, pp. 62 - 75, SAC 2002.

[Electronic Edition][Cited 63 times Red Star]

17. John Black,  Phillip Rogaway,  A Block-Cipher Mode of Operation for Parallelizable Message Authentication, pp. 384 - 397, EUROCRYPT 2002.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 106 times Red StarRed Star]

18. John Black,  Phillip Rogaway,  Ciphers with Arbitrary Finite Domains, pp. 114 - 130, CT-RSA 2002.

[Electronic Edition][Cited 61 times Red Star]

19. Michel Abdalla,  Mihir Bellare,  Phillip Rogaway,  The Oracle Diffie-Hellman Assumptions and an Analysis of DHIES, pp. 143 - 158, CT-RSA 2001.

[Electronic Edition][Cited 154 times Red StarRed Star]

20. Mihir Bellare,  Phillip Rogaway,  Encode-Then-Encipher Encryption: How to Exploit Nonces or Redundancy in Plaintexts for Efficient Cryptography, pp. 317 - 330, ASIACRYPT 2000.

[Electronic Edition][Cited 54 times Red Star]

21. John Black,  Phillip Rogaway,  CBC MACs for Arbitrary-Length Messages: The Three-Key Constructions, pp. 197 - 215, CRYPTO 2000.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 119 times Red StarRed Star]

22. Mihir Bellare,  David Pointcheval,  Phillip Rogaway,  Authenticated Key Exchange Secure against Dictionary Attacks, pp. 139 - 155, EUROCRYPT 2000.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 671 times Red StarRed StarRed StarRed Star]

23. John Black,  Shai Halevi,  Hugo Krawczyk,  Ted Krovetz,  Phillip Rogaway,  UMAC: Fast and Secure Message Authentication, pp. 216 - 233, CRYPTO 1999.

[Electronic Edition][Cited 227 times Red StarRed Star]

24. Mihir Bellare,  Phillip Rogaway,  On the Construction of Variable-Input-Length Ciphers, pp. 231 - 244, FSE 1999.

[Electronic Edition][Cited 34 times ]

25. Mihir Bellare,  Anand Desai,  David Pointcheval,  Phillip Rogaway,  Relations Among Notions of Security for Public-Key Encryption Schemes, pp. 26 - 45, CRYPTO 1998.

[Electronic Edition][Cited 699 times Red StarRed StarRed StarRed Star]

26. Mihir Bellare,  Ted Krovetz,  Phillip Rogaway,  Luby-Rackoff Backwards: Increasing Security by Making Block Ciphers Non-invertible, pp. 266 - 280, EUROCRYPT 1998.

[Electronic Edition][Cited 30 times ]

27. Mihir Bellare,  Phillip Rogaway,  Collision-Resistant Hashing: Towards Making UOWHFs Practical, pp. 470 - 484, CRYPTO 1997.

[Electronic Edition][Cited 148 times Red StarRed Star]

28. Joe Kilian,  Phillip Rogaway,  How to Protect DES Against Exhaustive Key Search, pp. 252 - 267, CRYPTO 1996.

[Electronic Edition][Cited 165 times Red StarRed Star]

29. Mihir Bellare,  Phillip Rogaway,  The Exact Security of Digital Signatures - How to Sign with RSA and Rabin, pp. 399 - 416, EUROCRYPT 1996.

[Electronic Edition][Cited 604 times Red StarRed StarRed StarRed Star]

30. Phillip Rogaway,  Bucket Hashing and its Application to Fast Message Authentication, pp. 29 - 42, CRYPTO 1995.

[Electronic Edition][Cited 81 times Red Star]

31. Mihir Bellare,  Roch Guérin,  Phillip Rogaway,  XOR MACs: New Methods for Message Authentication Using Finite Pseudorandom Functions, pp. 15 - 28, CRYPTO 1995.

[Electronic Edition][Cited 186 times Red StarRed Star]

32. Mihir Bellare,  Joe Kilian,  Phillip Rogaway,  The Security of Cipher Block Chaining, pp. 341 - 358, CRYPTO 1994.

[Electronic Edition][Cited 553 times Red StarRed StarRed StarRed Star]

33. Mihir Bellare,  Phillip Rogaway,  Optimal Asymmetric Encryption, pp. 92 - 111, EUROCRYPT 1994.

[Electronic Edition][Cited 827 times Red StarRed StarRed StarRed Star]

34. Phillip Rogaway,  Don Coppersmith,  A Software-Optimized Encryption Algorithm, pp. 56 - 63, FSE 1993.

[Electronic Edition][Cited 103 times Red StarRed Star]

35. Mihir Bellare,  Phillip Rogaway,  Entity Authentication and Key Distribution, pp. 232 - 249, CRYPTO 1993.

[Electronic Edition][Cited 930 times Red StarRed StarRed StarRed Star]

36. Silvio Micali,  Phillip Rogaway,  Secure Computation (Abstract), pp. 392 - 404, CRYPTO 1991.

[Electronic Edition][Cited 304 times Red StarRed StarRed Star]

37. Donald Beaver,  Joan Feigenbaum,  Joe Kilian,  Phillip Rogaway,  Security with Low Communication Overhead, pp. 62 - 76, CRYPTO 1990.

[Electronic Edition][Cited 89 times Red Star]

38. Michael Ben-Or,  Oded Goldreich,  Shafi Goldwasser,  Johan HÃ¥stad,  Joe Kilian,  Silvio Micali,  Phillip Rogaway,  Everything Provable is Provable in Zero-Knowledge, pp. 37 - 56, CRYPTO 1988.

[Electronic Edition][Cited 149 times Red StarRed Star]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...