Folgen
Phillip Rogaway
Phillip Rogaway
Bestätigte E-Mail-Adresse bei cs.ucdavis.edu - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Random oracles are practical: A paradigm for designing efficient protocols
M Bellare, P Rogaway
Proceedings of the 1st ACM Conference on Computer and Communications …, 1993
62111993
Entity authentication and key distribution
M Bellare, P Rogaway
Advances in Cryptology—CRYPTO’93: 13th Annual International Cryptology …, 2001
22592001
Authenticated key exchange secure against dictionary attacks
M Bellare, D Pointcheval, P Rogaway
Cryptology ePrint Archive, 2000
19102000
Optimal asymmetric encryption
M Bellare, P Rogaway
Advances in Cryptology—EUROCRYPT'94: Workshop on the Theory and Application …, 1995
17581995
Relations among notions of security for public-key encryption schemes
M Bellare, A Desai, D Pointcheval, P Rogaway
Advances in Cryptology—CRYPTO'98: 18th Annual International Cryptology …, 1998
15021998
A concrete security treatment of symmetric encryption
M Bellare, A Desai, E Jokipii, P Rogaway
Proceedings 38th Annual Symposium on Foundations of Computer Science, 394-403, 1997
14371997
The exact security of digital signatures-How to sign with RSA and Rabin
M Bellare, P Rogaway
Eurocrypt 96, 399-416, 1996
13281996
OCB: A block-cipher mode of operation for efficient authenticated encryption
P Rogaway, M Bellare, J Black
ACM Transactions on Information and System Security (TISSEC) 6 (3), 365-403, 2003
9742003
The round complexity of secure protocols
D Beaver, S Micali, P Rogaway
Proceedings of the twenty-second annual ACM symposium on Theory of computing …, 1990
9361990
The security of triple encryption and a framework for code-based game-playing proofs
M Bellare, P Rogaway
Advances in Cryptology-EUROCRYPT 2006: 24th Annual International Conference …, 2006
8822006
Provably secure session key distribution: the three party case
M Bellare, P Rogaway
Proceedings of the twenty-seventh annual ACM symposium on Theory of …, 1995
8441995
Cryptographic hash-function basics: Definitions, implications, and separations for preimage resistance, second-preimage resistance, and collision resistance
P Rogaway, T Shrimpton
FSE 3017, 371-388, 2004
8412004
The security of the cipher block chaining message authentication code
M Bellare, J Kilian, P Rogaway
Journal of Computer and System Sciences 61 (3), 362-399, 2000
7052000
The security of cipher block chaining
M Bellare, J Kilian, P Rogaway
Advances in Cryptology—CRYPTO’94: 14th Annual International Cryptology …, 2001
6302001
UMAC: Fast and secure message authentication
J Black, S Halevi, H Krawczyk, T Krovetz, P Rogaway
Advances in Cryptology—CRYPTO’99: 19th Annual International Cryptology …, 1999
6191999
Foundations of garbled circuits
M Bellare, VT Hoang, P Rogaway
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
6132012
Authenticated-encryption with associated-data
P Rogaway
Proceedings of the 9th ACM Conference on Computer and Communications …, 2002
6012002
The oracle Diffie-Hellman assumptions and an analysis of DHIES
M Abdalla, M Bellare, P Rogaway
Topics in Cryptology—CT-RSA 2001: The Cryptographers’ Track at RSA …, 2001
5562001
Efficient instantiations of tweakable blockciphers and refinements to modes OCB and PMAC
P Rogaway
Advances in Cryptology-ASIACRYPT 2004: 10th International Conference on the …, 2004
5382004
Secure computation
S Micali, P Rogaway
Advances in Cryptology—CRYPTO’91: Proceedings 11, 392-404, 1992
5341992
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20