Cryptographers' World
 

John Black


Author's Web Page Link

11 papers in database with 878 citations StarStar

H-number: 9

Journal Papers

[Sort papers chronologically] [Sort papers by citations count]

 
1. John Black,  Phillip Rogaway,  CBC MACs for Arbitrary-Length Messages: The Three-Key Constructions, Journal of Cryptology, Volume 18(2), pp. 111 - 131, Springer, 2005.

[Cited 81 times Red Star]

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. John Black,  Martin Cochran,  MAC Reforgeability, pp. 345 - 362, FSE 2009.

[Electronic Edition][Cited 2 times ]

2. John Black,  Martin Cochran,  Trevor Highland,  A Study of the MD5 Attacks: Insights and Improvements, pp. 262 - 277, FSE 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 39 times ]

3. John Black,  The Ideal-Cipher Model, Revisited: An Uninstantiable Blockcipher-Based Hash Function, pp. 328 - 340, FSE 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 24 times ]

4. John Black,  Martin Cochran,  Thomas Shrimpton,  On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions, pp. 526 - 541, EUROCRYPT 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 48 times ]

5. John Black,  Phillip Rogaway,  Thomas Shrimpton,  Black-Box Analysis of the Block-Cipher-Based Hash-Function Constructions from PGV, pp. 320 - 335, CRYPTO 2002.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 189 times Red StarRed Star]

6. John Black,  Phillip Rogaway,  Thomas Shrimpton,  Encryption-Scheme Security in the Presence of Key-Dependent Messages, pp. 62 - 75, SAC 2002.

[Electronic Edition][Cited 63 times Red Star]

7. John Black,  Phillip Rogaway,  A Block-Cipher Mode of Operation for Parallelizable Message Authentication, pp. 384 - 397, EUROCRYPT 2002.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 106 times Red StarRed Star]

8. John Black,  Phillip Rogaway,  Ciphers with Arbitrary Finite Domains, pp. 114 - 130, CT-RSA 2002.

[Electronic Edition][Cited 61 times Red Star]

9. John Black,  Phillip Rogaway,  CBC MACs for Arbitrary-Length Messages: The Three-Key Constructions, pp. 197 - 215, CRYPTO 2000.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 119 times Red StarRed Star]

10. John Black,  Shai Halevi,  Hugo Krawczyk,  Ted Krovetz,  Phillip Rogaway,  UMAC: Fast and Secure Message Authentication, pp. 216 - 233, CRYPTO 1999.

[Electronic Edition][Cited 227 times Red StarRed Star]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...