BibTeX records: Phillip Rogaway

download as .bib file

@inproceedings{DBLP:conf/esorics/ChanR22,
  author       = {John Chan and
                  Phillip Rogaway},
  editor       = {Vijayalakshmi Atluri and
                  Roberto Di Pietro and
                  Christian Damsgaard Jensen and
                  Weizhi Meng},
  title        = {On Committing Authenticated-Encryption},
  booktitle    = {Computer Security - {ESORICS} 2022 - 27th European Symposium on Research
                  in Computer Security, Copenhagen, Denmark, September 26-30, 2022,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13555},
  pages        = {275--294},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-17146-8\_14},
  doi          = {10.1007/978-3-031-17146-8\_14},
  timestamp    = {Tue, 27 Sep 2022 21:07:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/ChanR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChanR22,
  author       = {John Chan and
                  Phillip Rogaway},
  title        = {On Committing Authenticated Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1260},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1260},
  timestamp    = {Sat, 22 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChanR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/KrovetzR21,
  author       = {Ted Krovetz and
                  Phillip Rogaway},
  title        = {The Design and Evolution of {OCB}},
  journal      = {J. Cryptol.},
  volume       = {34},
  number       = {4},
  pages        = {36},
  year         = {2021},
  url          = {https://doi.org/10.1007/s00145-021-09399-8},
  doi          = {10.1007/S00145-021-09399-8},
  timestamp    = {Wed, 01 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/KrovetzR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/BellareDR20,
  author       = {Mihir Bellare and
                  Wei Dai and
                  Phillip Rogaway},
  title        = {Reimagining Secret Sharing: Creating a Safer and More Versatile Primitive
                  by Adding Authenticity, Correcting Errors, and Reducing Randomness
                  Requirements},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2020},
  number       = {4},
  pages        = {461--490},
  year         = {2020},
  url          = {https://doi.org/10.2478/popets-2020-0082},
  doi          = {10.2478/POPETS-2020-0082},
  timestamp    = {Wed, 15 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/BellareDR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellareDR20,
  author       = {Mihir Bellare and
                  Wei Dai and
                  Phillip Rogaway},
  title        = {Reimagining Secret Sharing: Creating a Safer and More Versatile Primitive
                  by Adding Authenticity, Correcting Errors, and Reducing Randomness
                  Requirements},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {800},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/800},
  timestamp    = {Wed, 15 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellareDR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/ChanR19,
  author       = {John Chan and
                  Phillip Rogaway},
  editor       = {Steven D. Galbraith and
                  Shiho Moriai},
  title        = {Anonymous {AE}},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2019 - 25th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kobe, Japan, December 8-12, 2019, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11922},
  pages        = {183--208},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-34621-8\_7},
  doi          = {10.1007/978-3-030-34621-8\_7},
  timestamp    = {Fri, 22 Nov 2019 13:52:52 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/ChanR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChanR19,
  author       = {John Chan and
                  Phillip Rogaway},
  title        = {Anonymous {AE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1033},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1033},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChanR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/MorrisRS18,
  author       = {Ben Morris and
                  Phillip Rogaway and
                  Till Stegers},
  title        = {Deterministic Encryption with the Thorp Shuffle},
  journal      = {J. Cryptol.},
  volume       = {31},
  number       = {2},
  pages        = {521--536},
  year         = {2018},
  url          = {https://doi.org/10.1007/s00145-017-9262-z},
  doi          = {10.1007/S00145-017-9262-Z},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/MorrisRS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/RogawayZ18,
  author       = {Phillip Rogaway and
                  Yusi Zhang},
  title        = {Onion-AE: Foundations of Nested Encryption},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2018},
  number       = {2},
  pages        = {85--104},
  year         = {2018},
  url          = {https://doi.org/10.1515/popets-2018-0014},
  doi          = {10.1515/POPETS-2018-0014},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/RogawayZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/RogawayZ18,
  author       = {Phillip Rogaway and
                  Yusi Zhang},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {Simplifying Game-Based Definitions - Indistinguishability up to Correctness
                  and Its Application to Stateful {AE}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10992},
  pages        = {3--32},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96881-0\_1},
  doi          = {10.1007/978-3-319-96881-0\_1},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/RogawayZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RogawayZ18,
  author       = {Phillip Rogaway and
                  Yusi Zhang},
  title        = {Onion-AE: Foundations of Nested Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {126},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/126},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RogawayZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RogawayZ18a,
  author       = {Phillip Rogaway and
                  Yusi Zhang},
  title        = {Simplifying Game-Based Definitions: Indistinguishability up to Correctness
                  and Its Application to Stateful {AE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {558},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/558},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RogawayZ18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/latincrypt/Rogaway17,
  author       = {Phillip Rogaway},
  editor       = {Tanja Lange and
                  Orr Dunkelman},
  title        = {An Obsession with Definitions},
  booktitle    = {Progress in Cryptology - {LATINCRYPT} 2017 - 5th International Conference
                  on Cryptology and Information Security in Latin America, Havana, Cuba,
                  September 20-22, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11368},
  pages        = {3--20},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-030-25283-0\_1},
  doi          = {10.1007/978-3-030-25283-0\_1},
  timestamp    = {Mon, 22 Jul 2019 13:20:38 +0200},
  biburl       = {https://dblp.org/rec/conf/latincrypt/Rogaway17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Rogaway16,
  author       = {Phillip Rogaway},
  title        = {Practice-Oriented Provable Security and the Social Construction of
                  Cryptography},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {14},
  number       = {6},
  pages        = {10--17},
  year         = {2016},
  url          = {https://doi.org/10.1109/MSP.2016.122},
  doi          = {10.1109/MSP.2016.122},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Rogaway16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BellareKR16,
  author       = {Mihir Bellare and
                  Daniel Kane and
                  Phillip Rogaway},
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {Big-Key Symmetric Encryption: Resisting Key Exfiltration},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9814},
  pages        = {373--402},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53018-4\_14},
  doi          = {10.1007/978-3-662-53018-4\_14},
  timestamp    = {Tue, 09 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BellareKR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellareKR16,
  author       = {Mihir Bellare and
                  Daniel Kane and
                  Phillip Rogaway},
  title        = {Big-Key Symmetric Encryption: Resisting Key Exfiltration},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {541},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/541},
  timestamp    = {Tue, 09 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellareKR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dagstuhl-manifestos/PreneelRRR15,
  author       = {Bart Preneel and
                  Phillip Rogaway and
                  Mark Dermot Ryan and
                  Peter Y. A. Ryan},
  title        = {Privacy and Security in an Age of Surveillance (Dagstuhl Perspectives
                  Workshop 14401)},
  journal      = {Dagstuhl Manifestos},
  volume       = {5},
  number       = {1},
  pages        = {25--37},
  year         = {2015},
  url          = {https://doi.org/10.4230/DagMan.5.1.25},
  doi          = {10.4230/DAGMAN.5.1.25},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dagstuhl-manifestos/PreneelRRR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/HoangRRV15,
  author       = {Viet Tung Hoang and
                  Reza Reyhanitabar and
                  Phillip Rogaway and
                  Damian Viz{\'{a}}r},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {Online Authenticated-Encryption and its Nonce-Reuse Misuse-Resistance},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9215},
  pages        = {493--517},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-47989-6\_24},
  doi          = {10.1007/978-3-662-47989-6\_24},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/HoangRRV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/HoangKR15,
  author       = {Viet Tung Hoang and
                  Ted Krovetz and
                  Phillip Rogaway},
  editor       = {Elisabeth Oswald and
                  Marc Fischlin},
  title        = {Robust Authenticated-Encryption {AEZ} and the Problem That It Solves},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9056},
  pages        = {15--44},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46800-5\_2},
  doi          = {10.1007/978-3-662-46800-5\_2},
  timestamp    = {Thu, 14 Oct 2021 09:58:16 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/HoangKR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/Badertscher0MRT15,
  author       = {Christian Badertscher and
                  Christian Matt and
                  Ueli Maurer and
                  Phillip Rogaway and
                  Bj{\"{o}}rn Tackmann},
  editor       = {Jens Groth},
  title        = {Robust Authenticated Encryption and the Limits of Symmetric Cryptography},
  booktitle    = {Cryptography and Coding - 15th {IMA} International Conference, {IMACC}
                  2015, Oxford, UK, December 15-17, 2015. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9496},
  pages        = {112--129},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27239-9\_7},
  doi          = {10.1007/978-3-319-27239-9\_7},
  timestamp    = {Wed, 18 Mar 2020 16:00:58 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/Badertscher0MRT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/Badertscher0MRT15,
  author       = {Christian Badertscher and
                  Christian Matt and
                  Ueli Maurer and
                  Phillip Rogaway and
                  Bj{\"{o}}rn Tackmann},
  editor       = {Man Ho Au and
                  Atsuko Miyaji},
  title        = {Augmented Secure Channels and the Goal of the {TLS} 1.3 Record Layer},
  booktitle    = {Provable Security - 9th International Conference, ProvSec 2015, Kanazawa,
                  Japan, November 24-26, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9451},
  pages        = {85--104},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26059-4\_5},
  doi          = {10.1007/978-3-319-26059-4\_5},
  timestamp    = {Tue, 14 May 2019 10:00:45 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/Badertscher0MRT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HoangRRV15,
  author       = {Viet Tung Hoang and
                  Reza Reyhanitabar and
                  Phillip Rogaway and
                  Damian Viz{\'{a}}r},
  title        = {Online Authenticated-Encryption and its Nonce-Reuse Misuse-Resistance},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {189},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/189},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HoangRRV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Badertscher0MRT15,
  author       = {Christian Badertscher and
                  Christian Matt and
                  Ueli Maurer and
                  Phillip Rogaway and
                  Bj{\"{o}}rn Tackmann},
  title        = {Augmented Secure Channels and the Goal of the {TLS} 1.3 Record Layer},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {394},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/394},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Badertscher0MRT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Badertscher0MRT15a,
  author       = {Christian Badertscher and
                  Christian Matt and
                  Ueli Maurer and
                  Phillip Rogaway and
                  Bj{\"{o}}rn Tackmann},
  title        = {Robust Authenticated Encryption and the Limits of Symmetric Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {893},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/893},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Badertscher0MRT15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Rogaway15,
  author       = {Phillip Rogaway},
  title        = {The Moral Character of Cryptographic Work},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1162},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1162},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Rogaway15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BellarePR14,
  author       = {Mihir Bellare and
                  Kenneth G. Paterson and
                  Phillip Rogaway},
  editor       = {Juan A. Garay and
                  Rosario Gennaro},
  title        = {Security of Symmetric Encryption against Mass Surveillance},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8616},
  pages        = {1--19},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44371-2\_1},
  doi          = {10.1007/978-3-662-44371-2\_1},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BellarePR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/NamprempreRS14,
  author       = {Chanathip Namprempre and
                  Phillip Rogaway and
                  Thomas Shrimpton},
  editor       = {Phong Q. Nguyen and
                  Elisabeth Oswald},
  title        = {Reconsidering Generic Composition},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Copenhagen, Denmark, May 11-15, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8441},
  pages        = {257--274},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-55220-5\_15},
  doi          = {10.1007/978-3-642-55220-5\_15},
  timestamp    = {Thu, 14 Oct 2021 09:58:16 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/NamprempreRS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/MorrisR14,
  author       = {Ben Morris and
                  Phillip Rogaway},
  editor       = {Phong Q. Nguyen and
                  Elisabeth Oswald},
  title        = {Sometimes-Recurse Shuffle - Almost-Random Permutations in Logarithmic
                  Expected Time},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Copenhagen, Denmark, May 11-15, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8441},
  pages        = {311--326},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-55220-5\_18},
  doi          = {10.1007/978-3-642-55220-5\_18},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/MorrisR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dagstuhl-reports/PreneelRRR14,
  author       = {Bart Preneel and
                  Phillip Rogaway and
                  Mark Dermot Ryan and
                  Peter Y. A. Ryan},
  title        = {Privacy and Security in an Age of Surveillance (Dagstuhl Perspectives
                  Workshop 14401)},
  journal      = {Dagstuhl Reports},
  volume       = {4},
  number       = {9},
  pages        = {106--123},
  year         = {2014},
  url          = {https://doi.org/10.4230/DagRep.4.9.106},
  doi          = {10.4230/DAGREP.4.9.106},
  timestamp    = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dagstuhl-reports/PreneelRRR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NamprempreRS14,
  author       = {Chanathip Namprempre and
                  Phillip Rogaway and
                  Thomas Shrimpton},
  title        = {Reconsidering Generic Composition},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {206},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/206},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NamprempreRS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellarePR14,
  author       = {Mihir Bellare and
                  Kenneth G. Paterson and
                  Phillip Rogaway},
  title        = {Security of Symmetric Encryption against Mass Surveillance},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {438},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/438},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellarePR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HoangKR14,
  author       = {Viet Tung Hoang and
                  Ted Krovetz and
                  Phillip Rogaway},
  title        = {Robust Authenticated-Encryption: {AEZ} and the Problem that it Solves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {793},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/793},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HoangKR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc7253,
  author       = {Ted Krovetz and
                  Phillip Rogaway},
  title        = {The {OCB} Authenticated-Encryption Algorithm},
  journal      = {{RFC}},
  volume       = {7253},
  pages        = {1--19},
  year         = {2014},
  url          = {https://doi.org/10.17487/RFC7253},
  doi          = {10.17487/RFC7253},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/rfc/rfc7253.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/BellareHKR13,
  author       = {Mihir Bellare and
                  Viet Tung Hoang and
                  Sriram Keelveedhi and
                  Phillip Rogaway},
  title        = {Efficient Garbling from a Fixed-Key Blockcipher},
  booktitle    = {2013 {IEEE} Symposium on Security and Privacy, {SP} 2013, Berkeley,
                  CA, USA, May 19-22, 2013},
  pages        = {478--492},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SP.2013.39},
  doi          = {10.1109/SP.2013.39},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/BellareHKR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NamprempreRS13,
  author       = {Chanathip Namprempre and
                  Phillip Rogaway and
                  Tom Shrimpton},
  title        = {{AE5} Security Notions: Definitions Implicit in the {CAESAR} Call},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {242},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/242},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NamprempreRS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellareHKR13,
  author       = {Mihir Bellare and
                  Viet Tung Hoang and
                  Sriram Keelveedhi and
                  Phillip Rogaway},
  title        = {Efficient Garbling from a Fixed-Key Blockcipher},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {426},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/426},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellareHKR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MorrisR13,
  author       = {Ben Morris and
                  Phillip Rogaway},
  title        = {Sometimes-Recurse Shuffle: Almost-Random Permutations in Logarithmic
                  Expected Time},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {560},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/560},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MorrisR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BellareHR12,
  author       = {Mihir Bellare and
                  Viet Tung Hoang and
                  Phillip Rogaway},
  editor       = {Xiaoyun Wang and
                  Kazue Sako},
  title        = {Adaptively Secure Garbling with Applications to One-Time Programs
                  and Secure Outsourcing},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2012 - 18th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Beijing, China, December 2-6, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7658},
  pages        = {134--153},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34961-4\_10},
  doi          = {10.1007/978-3-642-34961-4\_10},
  timestamp    = {Mon, 25 Nov 2019 15:32:14 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BellareHR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BellareHR12,
  author       = {Mihir Bellare and
                  Viet Tung Hoang and
                  Phillip Rogaway},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Foundations of garbled circuits},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {784--796},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382279},
  doi          = {10.1145/2382196.2382279},
  timestamp    = {Tue, 12 Apr 2022 13:28:49 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/BellareHR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/HoangMR12,
  author       = {Viet Tung Hoang and
                  Ben Morris and
                  Phillip Rogaway},
  editor       = {Reihaneh Safavi{-}Naini and
                  Ran Canetti},
  title        = {An Enciphering Scheme Based on a Card Shuffle},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 19-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7417},
  pages        = {1--13},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32009-5\_1},
  doi          = {10.1007/978-3-642-32009-5\_1},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/HoangMR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/RogawayWZ12,
  author       = {Phillip Rogaway and
                  Mark Wooding and
                  Haibin Zhang},
  editor       = {Anne Canteaut},
  title        = {The Security of Ciphertext Stealing},
  booktitle    = {Fast Software Encryption - 19th International Workshop, {FSE} 2012,
                  Washington, DC, USA, March 19-21, 2012. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7549},
  pages        = {180--195},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34047-5\_11},
  doi          = {10.1007/978-3-642-34047-5\_11},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/RogawayWZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1208-1176,
  author       = {Viet Tung Hoang and
                  Ben Morris and
                  Phillip Rogaway},
  title        = {An Enciphering Scheme Based on a Card Shuffle},
  journal      = {CoRR},
  volume       = {abs/1208.1176},
  year         = {2012},
  url          = {http://arxiv.org/abs/1208.1176},
  eprinttype    = {arXiv},
  eprint       = {1208.1176},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1208-1176.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dagstuhl-reports/ArmknechtLPR12,
  author       = {Frederik Armknecht and
                  Stefan Lucks and
                  Bart Preneel and
                  Phillip Rogaway},
  title        = {Symmetric Cryptography (Dagstuhl Seminar 12031)},
  journal      = {Dagstuhl Reports},
  volume       = {2},
  number       = {1},
  pages        = {39--49},
  year         = {2012},
  url          = {https://doi.org/10.4230/DagRep.2.1.39},
  doi          = {10.4230/DAGREP.2.1.39},
  timestamp    = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dagstuhl-reports/ArmknechtLPR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellareHR12,
  author       = {Mihir Bellare and
                  Viet Tung Hoang and
                  Phillip Rogaway},
  title        = {Garbling Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {265},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/265},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellareHR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellareHR12a,
  author       = {Mihir Bellare and
                  Viet Tung Hoang and
                  Phillip Rogaway},
  title        = {Adaptively Secure Garbling with Applications to One-Time Programs
                  and Secure Outsourcing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {564},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/564},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellareHR12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/Rogaway11,
  author       = {Phillip Rogaway},
  title        = {Constructing cryptographic definitions},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {3},
  number       = {2},
  pages        = {69--76},
  year         = {2011},
  url          = {https://doi.org/10.22042/isecure.2015.3.2.2},
  doi          = {10.22042/ISECURE.2015.3.2.2},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isecure/Rogaway11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/RogawayZ11,
  author       = {Phillip Rogaway and
                  Haibin Zhang},
  editor       = {Aggelos Kiayias},
  title        = {Online Ciphers from Tweakable Blockciphers},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2011 - The Cryptographers' Track at
                  the {RSA} Conference 2011, San Francisco, CA, USA, February 14-18,
                  2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6558},
  pages        = {237--249},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-19074-2\_16},
  doi          = {10.1007/978-3-642-19074-2\_16},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/RogawayZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/KrovetzR11,
  author       = {Ted Krovetz and
                  Phillip Rogaway},
  editor       = {Antoine Joux},
  title        = {The Software Performance of Authenticated-Encryption Modes},
  booktitle    = {Fast Software Encryption - 18th International Workshop, {FSE} 2011,
                  Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6733},
  pages        = {306--327},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21702-9\_18},
  doi          = {10.1007/978-3-642-21702-9\_18},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/KrovetzR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2011,
  editor       = {Phillip Rogaway},
  title        = {Advances in Cryptology - {CRYPTO} 2011 - 31st Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 14-18, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6841},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22792-9},
  doi          = {10.1007/978-3-642-22792-9},
  isbn         = {978-3-642-22791-2},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/BlackRSS10,
  author       = {John Black and
                  Phillip Rogaway and
                  Thomas Shrimpton and
                  Martijn Stam},
  title        = {An Analysis of the Blockcipher-Based Hash Functions from {PGV}},
  journal      = {J. Cryptol.},
  volume       = {23},
  number       = {4},
  pages        = {519--545},
  year         = {2010},
  url          = {https://doi.org/10.1007/s00145-010-9071-0},
  doi          = {10.1007/S00145-010-9071-0},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/BlackRSS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/HoangR10,
  author       = {Viet Tung Hoang and
                  Phillip Rogaway},
  editor       = {Tal Rabin},
  title        = {On Generalized Feistel Networks},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 15-19, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6223},
  pages        = {613--630},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14623-7\_33},
  doi          = {10.1007/978-3-642-14623-7\_33},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/HoangR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HoangR10,
  author       = {Viet Tung Hoang and
                  Phillip Rogaway},
  title        = {On generalized Feistel networks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {301},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/301},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HoangR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/MorrisRS09,
  author       = {Ben Morris and
                  Phillip Rogaway and
                  Till Stegers},
  editor       = {Shai Halevi},
  title        = {How to Encipher Messages on a Small Domain},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2009, 29th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5677},
  pages        = {286--302},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03356-8\_17},
  doi          = {10.1007/978-3-642-03356-8\_17},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/MorrisRS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/RogawayS09,
  author       = {Phillip Rogaway and
                  Till Stegers},
  title        = {Authentication without Elision: Partially Specified Protocols, Associated
                  Data, and Cryptographic Models Described by Code},
  booktitle    = {Proceedings of the 22nd {IEEE} Computer Security Foundations Symposium,
                  {CSF} 2009, Port Jefferson, New York, USA, July 8-10, 2009},
  pages        = {26--39},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CSF.2009.23},
  doi          = {10.1109/CSF.2009.23},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/RogawayS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/BellareRRS09,
  author       = {Mihir Bellare and
                  Thomas Ristenpart and
                  Phillip Rogaway and
                  Till Stegers},
  editor       = {Michael J. Jacobson Jr. and
                  Vincent Rijmen and
                  Reihaneh Safavi{-}Naini},
  title        = {Format-Preserving Encryption},
  booktitle    = {Selected Areas in Cryptography, 16th Annual International Workshop,
                  {SAC} 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5867},
  pages        = {295--312},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-05445-7\_19},
  doi          = {10.1007/978-3-642-05445-7\_19},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/BellareRRS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dagstuhl/2009P9031,
  editor       = {Helena Handschuh and
                  Stefan Lucks and
                  Bart Preneel and
                  Phillip Rogaway},
  title        = {Symmetric Cryptography, 11.01. - 16.01.2009},
  series       = {Dagstuhl Seminar Proceedings},
  volume       = {09031},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, Germany},
  year         = {2009},
  url          = {http://drops.dagstuhl.de/portals/09031/},
  timestamp    = {Thu, 10 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/2009P9031.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/HandschuhLPR09,
  author       = {Helena Handschuh and
                  Stefan Lucks and
                  Bart Preneel and
                  Phillip Rogaway},
  editor       = {Helena Handschuh and
                  Stefan Lucks and
                  Bart Preneel and
                  Phillip Rogaway},
  title        = {09031 Abstracts Collection - Symmetric Cryptography},
  booktitle    = {Symmetric Cryptography, 11.01. - 16.01.2009},
  series       = {Dagstuhl Seminar Proceedings},
  volume       = {09031},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, Germany},
  year         = {2009},
  url          = {http://drops.dagstuhl.de/opus/volltexte/2009/1960/},
  timestamp    = {Thu, 10 Jun 2021 13:02:06 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/HandschuhLPR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/HandschuhLPR09a,
  author       = {Helena Handschuh and
                  Stefan Lucks and
                  Bart Preneel and
                  Phillip Rogaway},
  editor       = {Helena Handschuh and
                  Stefan Lucks and
                  Bart Preneel and
                  Phillip Rogaway},
  title        = {09031 Executive Summary - Symmetric Cryptography},
  booktitle    = {Symmetric Cryptography, 11.01. - 16.01.2009},
  series       = {Dagstuhl Seminar Proceedings},
  volume       = {09031},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, Germany},
  year         = {2009},
  url          = {http://drops.dagstuhl.de/opus/volltexte/2009/1959/},
  timestamp    = {Thu, 23 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/HandschuhLPR09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellareRRS09,
  author       = {Mihir Bellare and
                  Thomas Ristenpart and
                  Phillip Rogaway and
                  Till Stegers},
  title        = {Format-Preserving Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {251},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/251},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellareRRS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/RogawayS08,
  author       = {Phillip Rogaway and
                  John P. Steinberger},
  editor       = {David A. Wagner},
  title        = {Constructing Cryptographic Hash Functions from Fixed-Key Blockciphers},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2008, 28th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5157},
  pages        = {433--450},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85174-5\_24},
  doi          = {10.1007/978-3-540-85174-5\_24},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/RogawayS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/RogawayS08,
  author       = {Phillip Rogaway and
                  John P. Steinberger},
  editor       = {Nigel P. Smart},
  title        = {Security/Efficiency Tradeoffs for Permutation-Based Hashing},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2008, 27th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Istanbul, Turkey, April 13-17, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4965},
  pages        = {220--236},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78967-3\_13},
  doi          = {10.1007/978-3-540-78967-3\_13},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/RogawayS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/AbadiR07,
  author       = {Mart{\'{\i}}n Abadi and
                  Phillip Rogaway},
  title        = {Reconciling Two Views of Cryptography (The Computational Soundness
                  of Formal Encryption)},
  journal      = {J. Cryptol.},
  volume       = {20},
  number       = {3},
  pages        = {395},
  year         = {2007},
  url          = {https://doi.org/10.1007/s00145-007-0203-0},
  doi          = {10.1007/S00145-007-0203-0},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/AbadiR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/RogawayB07,
  author       = {Phillip Rogaway and
                  Mihir Bellare},
  editor       = {Peng Ning and
                  Sabrina De Capitani di Vimercati and
                  Paul F. Syverson},
  title        = {Robust computational secret sharing and a unified account of classical
                  secret-sharing goals},
  booktitle    = {Proceedings of the 2007 {ACM} Conference on Computer and Communications
                  Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007},
  pages        = {172--184},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1315245.1315268},
  doi          = {10.1145/1315245.1315268},
  timestamp    = {Tue, 10 Nov 2020 20:00:14 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/RogawayB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/RistenpartR07,
  author       = {Thomas Ristenpart and
                  Phillip Rogaway},
  editor       = {Alex Biryukov},
  title        = {How to Enrich the Message Space of a Cipher},
  booktitle    = {Fast Software Encryption, 14th International Workshop, {FSE} 2007,
                  Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4593},
  pages        = {101--118},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74619-5\_7},
  doi          = {10.1007/978-3-540-74619-5\_7},
  timestamp    = {Sun, 25 Oct 2020 23:06:50 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/RistenpartR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RistenpartR07,
  author       = {Thomas Ristenpart and
                  Phillip Rogaway},
  title        = {How to Enrich the Message Space of a Cipher},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {109},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/109},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RistenpartR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/KrovetzR06,
  author       = {Ted Krovetz and
                  Phillip Rogaway},
  title        = {Variationally universal hashing},
  journal      = {Inf. Process. Lett.},
  volume       = {100},
  number       = {1},
  pages        = {36--39},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.ipl.2005.11.026},
  doi          = {10.1016/J.IPL.2005.11.026},
  timestamp    = {Tue, 06 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/KrovetzR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/RogawayS06,
  author       = {Phillip Rogaway and
                  Thomas Shrimpton},
  editor       = {Serge Vaudenay},
  title        = {A Provable-Security Treatment of the Key-Wrap Problem},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2006, 25th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  St. Petersburg, Russia, May 28 - June 1, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4004},
  pages        = {373--390},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11761679\_23},
  doi          = {10.1007/11761679\_23},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/RogawayS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BellareR06,
  author       = {Mihir Bellare and
                  Phillip Rogaway},
  editor       = {Serge Vaudenay},
  title        = {The Security of Triple Encryption and a Framework for Code-Based Game-Playing
                  Proofs},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2006, 25th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  St. Petersburg, Russia, May 28 - June 1, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4004},
  pages        = {409--426},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11761679\_25},
  doi          = {10.1007/11761679\_25},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BellareR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vietcrypt/Rogaway06,
  author       = {Phillip Rogaway},
  editor       = {Phong Q. Nguyen},
  title        = {Formalizing Human Ignorance},
  booktitle    = {Progressin Cryptology - {VIETCRYPT} 2006, First International Conference
                  on Cryptology in Vietnam, Hanoi, Vietnam, September 25-28, 2006, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4341},
  pages        = {211--228},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11958239\_14},
  doi          = {10.1007/11958239\_14},
  timestamp    = {Tue, 14 May 2019 10:00:55 +0200},
  biburl       = {https://dblp.org/rec/conf/vietcrypt/Rogaway06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RogawayS06,
  author       = {Phillip Rogaway and
                  Thomas Shrimpton},
  title        = {Deterministic Authenticated-Encryption: {A} Provable-Security Treatment
                  of the Key-Wrap Problem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {221},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/221},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RogawayS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Rogaway06,
  author       = {Phillip Rogaway},
  title        = {Formalizing Human Ignorance: Collision-Resistant Hashing without the
                  Keys},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {281},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/281},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Rogaway06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellareR06a,
  author       = {Mihir Bellare and
                  Phillip Rogaway},
  title        = {Robust Computational Secret Sharing and a Unified Account of Classical
                  Secret-Sharing Goals},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {449},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/449},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellareR06a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/BlackR05,
  author       = {John Black and
                  Phillip Rogaway},
  title        = {{CBC} MACs for Arbitrary-Length Messages: The Three-Key Constructions},
  journal      = {J. Cryptol.},
  volume       = {18},
  number       = {2},
  pages        = {111--131},
  year         = {2005},
  url          = {https://doi.org/10.1007/s00145-004-0016-3},
  doi          = {10.1007/S00145-004-0016-3},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/BlackR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BellarePR05,
  author       = {Mihir Bellare and
                  Krzysztof Pietrzak and
                  Phillip Rogaway},
  editor       = {Victor Shoup},
  title        = {Improved Security Analyses for {CBC} MACs},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2005: 25th Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 14-18,
                  2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3621},
  pages        = {527--545},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11535218\_32},
  doi          = {10.1007/11535218\_32},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BellarePR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/Rogaway04,
  author       = {Phillip Rogaway},
  editor       = {Pil Joong Lee},
  title        = {Efficient Instantiations of Tweakable Blockciphers and Refinements
                  to Modes {OCB} and {PMAC}},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2004, 10th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Jeju Island, Korea, December 5-9, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3329},
  pages        = {16--31},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30539-2\_2},
  doi          = {10.1007/978-3-540-30539-2\_2},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/Rogaway04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asian/Rogaway04,
  author       = {Phillip Rogaway},
  editor       = {Michael J. Maher},
  title        = {On the Role Definitions in and Beyond Cryptography},
  booktitle    = {Advances in Computer Science - {ASIAN} 2004, Higher-Level Decision
                  Making, 9th Asian Computing Science Conference, Dedicated to Jean-Louis
                  Lassez on the Occasion of His 5th Cycle Birthday, Chiang Mai, Thailand,
                  December 8-10, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3321},
  pages        = {13--32},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30502-6\_2},
  doi          = {10.1007/978-3-540-30502-6\_2},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/asian/Rogaway04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/HaleviR04,
  author       = {Shai Halevi and
                  Phillip Rogaway},
  editor       = {Tatsuaki Okamoto},
  title        = {A Parallelizable Enciphering Mode},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2004, The Cryptographers' Track at
                  the {RSA} Conference 2004, San Francisco, CA, USA, February 23-27,
                  2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2964},
  pages        = {292--304},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24660-2\_23},
  doi          = {10.1007/978-3-540-24660-2\_23},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/HaleviR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Rogaway04,
  author       = {Phillip Rogaway},
  editor       = {Bimal K. Roy and
                  Willi Meier},
  title        = {Nonce-Based Symmetric Encryption},
  booktitle    = {Fast Software Encryption, 11th International Workshop, {FSE} 2004,
                  Delhi, India, February 5-7, 2004, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3017},
  pages        = {348--359},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-25937-4\_22},
  doi          = {10.1007/978-3-540-25937-4\_22},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Rogaway04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/RogawayS04,
  author       = {Phillip Rogaway and
                  Thomas Shrimpton},
  editor       = {Bimal K. Roy and
                  Willi Meier},
  title        = {Cryptographic Hash-Function Basics: Definitions, Implications, and
                  Separations for Preimage Resistance, Second-Preimage Resistance, and
                  Collision Resistance},
  booktitle    = {Fast Software Encryption, 11th International Workshop, {FSE} 2004,
                  Delhi, India, February 5-7, 2004, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3017},
  pages        = {371--388},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-25937-4\_24},
  doi          = {10.1007/978-3-540-25937-4\_24},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/RogawayS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BellareRW04,
  author       = {Mihir Bellare and
                  Phillip Rogaway and
                  David A. Wagner},
  editor       = {Bimal K. Roy and
                  Willi Meier},
  title        = {The {EAX} Mode of Operation},
  booktitle    = {Fast Software Encryption, 11th International Workshop, {FSE} 2004,
                  Delhi, India, February 5-7, 2004, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3017},
  pages        = {389--407},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-25937-4\_25},
  doi          = {10.1007/978-3-540-25937-4\_25},
  timestamp    = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/BellareRW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RogawayS04,
  author       = {Phillip Rogaway and
                  Thomas Shrimpton},
  title        = {Cryptographic Hash-Function Basics: Definitions, Implications and
                  Separations for Preimage Resistance, Second-Preimage Resistance, and
                  Collision Resistance},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {35},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/035},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RogawayS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellareR04,
  author       = {Mihir Bellare and
                  Phillip Rogaway},
  title        = {Code-Based Game-Playing Proofs and the Security of Triple Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {331},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/331},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellareR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/RogawayBB03,
  author       = {Phillip Rogaway and
                  Mihir Bellare and
                  John Black},
  title        = {{OCB:} {A} block-cipher mode of operation for efficient authenticated
                  encryption},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {6},
  number       = {3},
  pages        = {365--403},
  year         = {2003},
  url          = {https://doi.org/10.1145/937527.937529},
  doi          = {10.1145/937527.937529},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/RogawayBB03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/HaleviR03,
  author       = {Shai Halevi and
                  Phillip Rogaway},
  editor       = {Dan Boneh},
  title        = {A Tweakable Enciphering Mode},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2003, 23rd Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 17-21,
                  2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2729},
  pages        = {482--499},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45146-4\_28},
  doi          = {10.1007/978-3-540-45146-4\_28},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/HaleviR03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellareRW03,
  author       = {Mihir Bellare and
                  Phillip Rogaway and
                  David A. Wagner},
  title        = {{EAX:} {A} Conventional Authenticated-Encryption Mode},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {69},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/069},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellareRW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RogawayW03,
  author       = {Phillip Rogaway and
                  David A. Wagner},
  title        = {A Critique of {CCM}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {70},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/070},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RogawayW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HaleviR03,
  author       = {Shai Halevi and
                  Phillip Rogaway},
  title        = {A Parallelizable Enciphering Mode},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {147},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/147},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HaleviR03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HaleviR03a,
  author       = {Shai Halevi and
                  Phillip Rogaway},
  title        = {A Tweakable Enciphering Mode},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {148},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/148},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HaleviR03a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/AbadiR02,
  author       = {Mart{\'{\i}}n Abadi and
                  Phillip Rogaway},
  title        = {Reconciling Two Views of Cryptography (The Computational Soundness
                  of Formal Encryption)},
  journal      = {J. Cryptol.},
  volume       = {15},
  number       = {2},
  pages        = {103--127},
  year         = {2002},
  url          = {https://doi.org/10.1007/s00145-001-0014-7},
  doi          = {10.1007/S00145-001-0014-7},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/AbadiR02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Rogaway02,
  author       = {Phillip Rogaway},
  editor       = {Vijayalakshmi Atluri},
  title        = {Authenticated-encryption with associated-data},
  booktitle    = {Proceedings of the 9th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2002, Washington, DC, USA, November 18-22, 2002},
  pages        = {98--107},
  publisher    = {{ACM}},
  year         = {2002},
  url          = {https://doi.org/10.1145/586110.586125},
  doi          = {10.1145/586110.586125},
  timestamp    = {Tue, 10 Nov 2020 20:00:47 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Rogaway02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BlackRS02,
  author       = {John Black and
                  Phillip Rogaway and
                  Thomas Shrimpton},
  editor       = {Moti Yung},
  title        = {Black-Box Analysis of the Block-Cipher-Based Hash-Function Constructions
                  from {PGV}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2002, 22nd Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 18-22,
                  2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2442},
  pages        = {320--335},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45708-9\_21},
  doi          = {10.1007/3-540-45708-9\_21},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BlackRS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/BlackR02,
  author       = {John Black and
                  Phillip Rogaway},
  editor       = {Bart Preneel},
  title        = {Ciphers with Arbitrary Finite Domains},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2002, The Cryptographer's Track at
                  the {RSA} Conference, 2002, San Jose, CA, USA, February 18-22, 2002,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2271},
  pages        = {114--130},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45760-7\_9},
  doi          = {10.1007/3-540-45760-7\_9},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/BlackR02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BlackR02,
  author       = {John Black and
                  Phillip Rogaway},
  editor       = {Lars R. Knudsen},
  title        = {A Block-Cipher Mode of Operation for Parallelizable Message Authentication},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2002, International Conference
                  on the Theory and Applications of Cryptographic Techniques, Amsterdam,
                  The Netherlands, April 28 - May 2, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2332},
  pages        = {384--397},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-46035-7\_25},
  doi          = {10.1007/3-540-46035-7\_25},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BlackR02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/BlackRS02,
  author       = {John Black and
                  Phillip Rogaway and
                  Thomas Shrimpton},
  editor       = {Kaisa Nyberg and
                  Howard M. Heys},
  title        = {Encryption-Scheme Security in the Presence of Key-Dependent Messages},
  booktitle    = {Selected Areas in Cryptography, 9th Annual International Workshop,
                  {SAC} 2002, St. John's, Newfoundland, Canada, August 15-16, 2002.
                  Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2595},
  pages        = {62--75},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36492-7\_6},
  doi          = {10.1007/3-540-36492-7\_6},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/BlackRS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlackRS02,
  author       = {John Black and
                  Phillip Rogaway and
                  Thomas Shrimpton},
  title        = {Black-Box Analysis of the Block-Cipher-Based Hash-Function Constructions
                  from {PGV}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {66},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/066},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlackRS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlackRS02a,
  author       = {John Black and
                  Phillip Rogaway and
                  Thomas Shrimpton},
  title        = {Encryption-Scheme Security in the Presence of Key-Dependent Messages},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {100},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/100},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlackRS02a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Rogaway02,
  author       = {Phillip Rogaway},
  title        = {The {EMD} Mode of Operation {(A} Tweaked, Wide-Blocksize, Strong {PRP)}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {148},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/148},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Rogaway02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/KilianR01,
  author       = {Joe Kilian and
                  Phillip Rogaway},
  title        = {How to Protect {DES} Against Exhaustive Key Search (an Analysis of
                  {DESX)}},
  journal      = {J. Cryptol.},
  volume       = {14},
  number       = {1},
  pages        = {17--35},
  year         = {2001},
  url          = {https://doi.org/10.1007/s001450010015},
  doi          = {10.1007/S001450010015},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/KilianR01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/RogawayBBK01,
  author       = {Phillip Rogaway and
                  Mihir Bellare and
                  John Black and
                  Ted Krovetz},
  editor       = {Michael K. Reiter and
                  Pierangela Samarati},
  title        = {{OCB:} a block-cipher mode of operation for efficient authenticated
                  encryption},
  booktitle    = {{CCS} 2001, Proceedings of the 8th {ACM} Conference on Computer and
                  Communications Security, Philadelphia, Pennsylvania, USA, November
                  6-8, 2001},
  pages        = {196--205},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/501983.502011},
  doi          = {10.1145/501983.502011},
  timestamp    = {Tue, 10 Nov 2020 20:00:35 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/RogawayBBK01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/AbdallaBR01,
  author       = {Michel Abdalla and
                  Mihir Bellare and
                  Phillip Rogaway},
  editor       = {David Naccache},
  title        = {The Oracle Diffie-Hellman Assumptions and an Analysis of {DHIES}},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2001, The Cryptographer's Track at
                  {RSA} Conference 2001, San Francisco, CA, USA, April 8-12, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2020},
  pages        = {143--158},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45353-9\_12},
  doi          = {10.1007/3-540-45353-9\_12},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ctrsa/AbdallaBR01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlackR01,
  author       = {John Black and
                  Phillip Rogaway},
  title        = {Ciphers with Arbitrary Finite Domains},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {12},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/012},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlackR01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RogawayBBK01,
  author       = {Phillip Rogaway and
                  Mihir Bellare and
                  John Black and
                  Ted Krovetz},
  title        = {{OCB} Mode},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {26},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/026},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RogawayBBK01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlackR01a,
  author       = {John Black and
                  Phillip Rogaway},
  title        = {A Block-Cipher Mode of Operation for Parallelizable Message Authentication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {27},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/027},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlackR01a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcss/BellareKR00,
  author       = {Mihir Bellare and
                  Joe Kilian and
                  Phillip Rogaway},
  title        = {The Security of the Cipher Block Chaining Message Authentication Code},
  journal      = {J. Comput. Syst. Sci.},
  volume       = {61},
  number       = {3},
  pages        = {362--399},
  year         = {2000},
  url          = {https://doi.org/10.1006/jcss.1999.1694},
  doi          = {10.1006/JCSS.1999.1694},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcss/BellareKR00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BellareR00,
  author       = {Mihir Bellare and
                  Phillip Rogaway},
  editor       = {Tatsuaki Okamoto},
  title        = {Encode-Then-Encipher Encryption: How to Exploit Nonces or Redundancy
                  in Plaintexts for Efficient Cryptography},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2000, 6th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kyoto, Japan, December 3-7, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1976},
  pages        = {317--330},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44448-3\_24},
  doi          = {10.1007/3-540-44448-3\_24},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BellareR00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BlackR00,
  author       = {John Black and
                  Phillip Rogaway},
  editor       = {Mihir Bellare},
  title        = {{CBC} MACs for Arbitrary-Length Messages: The Three-Key Constructions},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2000, 20th Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 20-24,
                  2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1880},
  pages        = {197--215},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44598-6\_12},
  doi          = {10.1007/3-540-44598-6\_12},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BlackR00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BellarePR00,
  author       = {Mihir Bellare and
                  David Pointcheval and
                  Phillip Rogaway},
  editor       = {Bart Preneel},
  title        = {Authenticated Key Exchange Secure against Dictionary Attacks},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2000, International Conference
                  on the Theory and Application of Cryptographic Techniques, Bruges,
                  Belgium, May 14-18, 2000, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1807},
  pages        = {139--155},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-45539-6\_11},
  doi          = {10.1007/3-540-45539-6\_11},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BellarePR00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/KrovetzR00,
  author       = {Ted Krovetz and
                  Phillip Rogaway},
  editor       = {Dongho Won},
  title        = {Fast Universal Hashing with Small Keys and No Preprocessing: The PolyR
                  Construction},
  booktitle    = {Information Security and Cryptology - {ICISC} 2000, Third International
                  Conference, Seoul, Korea, December 8-9, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2015},
  pages        = {73--89},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-45247-8\_7},
  doi          = {10.1007/3-540-45247-8\_7},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/KrovetzR00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifipTCS/AbadiR00,
  author       = {Mart{\'{\i}}n Abadi and
                  Phillip Rogaway},
  editor       = {Jan van Leeuwen and
                  Osamu Watanabe and
                  Masami Hagiya and
                  Peter D. Mosses and
                  Takayasu Ito},
  title        = {Reconciling Two Views of Cryptography (The Computational Soundness
                  of Formal Encryption)},
  booktitle    = {Theoretical Computer Science, Exploring New Frontiers of Theoretical
                  Informatics, International Conference {IFIP} {TCS} 2000, Sendai, Japan,
                  August 17-19, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1872},
  pages        = {3--22},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44929-9\_1},
  doi          = {10.1007/3-540-44929-9\_1},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/ifipTCS/AbadiR00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellarePR00,
  author       = {Mihir Bellare and
                  David Pointcheval and
                  Phillip Rogaway},
  title        = {Authenticated Key Exchange Secure Against Dictionary Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {14},
  year         = {2000},
  url          = {http://eprint.iacr.org/2000/014},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellarePR00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/Rogaway99,
  author       = {Phillip Rogaway},
  title        = {Bucket Hashing and Its Application to Fast Message Authentication},
  journal      = {J. Cryptol.},
  volume       = {12},
  number       = {2},
  pages        = {91--115},
  year         = {1999},
  url          = {https://doi.org/10.1007/PL00003822},
  doi          = {10.1007/PL00003822},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/Rogaway99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BlackHKKR99,
  author       = {John Black and
                  Shai Halevi and
                  Hugo Krawczyk and
                  Ted Krovetz and
                  Phillip Rogaway},
  editor       = {Michael J. Wiener},
  title        = {{UMAC:} Fast and Secure Message Authentication},
  booktitle    = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1666},
  pages        = {216--233},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48405-1\_14},
  doi          = {10.1007/3-540-48405-1\_14},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BlackHKKR99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BellareR99,
  author       = {Mihir Bellare and
                  Phillip Rogaway},
  editor       = {Lars R. Knudsen},
  title        = {On the Construction of Variable-Input-Length Ciphers},
  booktitle    = {Fast Software Encryption, 6th International Workshop, {FSE} '99, Rome,
                  Italy, March 24-26, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1636},
  pages        = {231--244},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48519-8\_17},
  doi          = {10.1007/3-540-48519-8\_17},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/BellareR99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbdallaBR99,
  author       = {Michel Abdalla and
                  Mihir Bellare and
                  Phillip Rogaway},
  title        = {{DHAES:} An Encryption Scheme Based on the Diffie-Hellman Problem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {7},
  year         = {1999},
  url          = {http://eprint.iacr.org/1999/007},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbdallaBR99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/RogawayC98,
  author       = {Phillip Rogaway and
                  Don Coppersmith},
  title        = {A Software-Optimized Encryption Algorithm},
  journal      = {J. Cryptol.},
  volume       = {11},
  number       = {4},
  pages        = {273--287},
  year         = {1998},
  url          = {https://doi.org/10.1007/s001459900048},
  doi          = {10.1007/S001459900048},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/RogawayC98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BellareDPR98,
  author       = {Mihir Bellare and
                  Anand Desai and
                  David Pointcheval and
                  Phillip Rogaway},
  editor       = {Hugo Krawczyk},
  title        = {Relations Among Notions of Security for Public-Key Encryption Schemes},
  booktitle    = {Advances in Cryptology - {CRYPTO} '98, 18th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 23-27, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1462},
  pages        = {26--45},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0055718},
  doi          = {10.1007/BFB0055718},
  timestamp    = {Tue, 01 Jun 2021 15:21:29 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BellareDPR98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BellareKR98,
  author       = {Mihir Bellare and
                  Ted Krovetz and
                  Phillip Rogaway},
  editor       = {Kaisa Nyberg},
  title        = {Luby-Rackoff Backwards: Increasing Security by Making Block Ciphers
                  Non-invertible},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '98, International Conference
                  on the Theory and Application of Cryptographic Techniques, Espoo,
                  Finland, May 31 - June 4, 1998, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1403},
  pages        = {266--280},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0054132},
  doi          = {10.1007/BFB0054132},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BellareKR98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellareDPR98,
  author       = {Mihir Bellare and
                  Anand Desai and
                  David Pointcheval and
                  Phillip Rogaway},
  title        = {Relations among Notions of Security for Public-Key Encryption Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {21},
  year         = {1998},
  url          = {http://eprint.iacr.org/1998/021},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellareDPR98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/BeaverFKR97,
  author       = {Donald Beaver and
                  Joan Feigenbaum and
                  Joe Kilian and
                  Phillip Rogaway},
  title        = {Locally Random Reductions: Improvements and Applications},
  journal      = {J. Cryptol.},
  volume       = {10},
  number       = {1},
  pages        = {17--36},
  year         = {1997},
  url          = {https://doi.org/10.1007/s001459900017},
  doi          = {10.1007/S001459900017},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/BeaverFKR97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BellareR97,
  author       = {Mihir Bellare and
                  Phillip Rogaway},
  editor       = {Burton S. Kaliski Jr.},
  title        = {Collision-Resistant Hashing: Towards Making UOWHFs Practical},
  booktitle    = {Advances in Cryptology - {CRYPTO} '97, 17th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 17-21, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1294},
  pages        = {470--484},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0052256},
  doi          = {10.1007/BFB0052256},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BellareR97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/BellareDJR97,
  author       = {Mihir Bellare and
                  Anand Desai and
                  E. Jokipii and
                  Phillip Rogaway},
  title        = {A Concrete Security Treatment of Symmetric Encryption},
  booktitle    = {38th Annual Symposium on Foundations of Computer Science, {FOCS} '97,
                  Miami Beach, Florida, USA, October 19-22, 1997},
  pages        = {394--403},
  publisher    = {{IEEE} Computer Society},
  year         = {1997},
  url          = {https://doi.org/10.1109/SFCS.1997.646128},
  doi          = {10.1109/SFCS.1997.646128},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/BellareDJR97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/BellareR97,
  author       = {Mihir Bellare and
                  Phillip Rogaway},
  editor       = {Yongfei Han and
                  Tatsuaki Okamoto and
                  Sihan Qing},
  title        = {Minimizing the use of random oracles in authenticated encryption schemes},
  booktitle    = {Information and Communication Security, First International Conference,
                  ICICS'97, Beijing, China, November 11-14, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1334},
  pages        = {1--16},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0028457},
  doi          = {10.1007/BFB0028457},
  timestamp    = {Tue, 14 May 2019 10:00:37 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/BellareR97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellareR97,
  author       = {Mihir Bellare and
                  Phillip Rogaway},
  title        = {Collision-Resistant Hashing: Towards Making UOWHFs Practical},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {9},
  year         = {1997},
  url          = {http://eprint.iacr.org/1997/009},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellareR97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KilianR96,
  author       = {Joe Kilian and
                  Phillip Rogaway},
  editor       = {Neal Koblitz},
  title        = {How to Protect {DES} Against Exhaustive Key Search},
  booktitle    = {Advances in Cryptology - {CRYPTO} '96, 16th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 18-22, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1109},
  pages        = {252--267},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-68697-5\_20},
  doi          = {10.1007/3-540-68697-5\_20},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/KilianR96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BellareR96,
  author       = {Mihir Bellare and
                  Phillip Rogaway},
  editor       = {Ueli M. Maurer},
  title        = {The Exact Security of Digital Signatures - HOw to Sign with {RSA}
                  and Rabin},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '96, International Conference
                  on the Theory and Application of Cryptographic Techniques, Saragossa,
                  Spain, May 12-16, 1996, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1070},
  pages        = {399--416},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-68339-9\_34},
  doi          = {10.1007/3-540-68339-9\_34},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BellareR96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mp/BellareR95,
  author       = {Mihir Bellare and
                  Phillip Rogaway},
  title        = {The complexity of approximating a nonlinear program},
  journal      = {Math. Program.},
  volume       = {69},
  pages        = {429--441},
  year         = {1995},
  url          = {https://doi.org/10.1007/BF01585569},
  doi          = {10.1007/BF01585569},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mp/BellareR95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BellareGR95,
  author       = {Mihir Bellare and
                  Roch Gu{\'{e}}rin and
                  Phillip Rogaway},
  editor       = {Don Coppersmith},
  title        = {{XOR} MACs: New Methods for Message Authentication Using Finite Pseudorandom
                  Functions},
  booktitle    = {Advances in Cryptology - {CRYPTO} '95, 15th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 27-31, 1995, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {963},
  pages        = {15--28},
  publisher    = {Springer},
  year         = {1995},
  url          = {https://doi.org/10.1007/3-540-44750-4\_2},
  doi          = {10.1007/3-540-44750-4\_2},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BellareGR95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Rogaway95,
  author       = {Phillip Rogaway},
  editor       = {Don Coppersmith},
  title        = {Bucket Hashing and its Application to Fast Message Authentication},
  booktitle    = {Advances in Cryptology - {CRYPTO} '95, 15th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 27-31, 1995, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {963},
  pages        = {29--42},
  publisher    = {Springer},
  year         = {1995},
  url          = {https://doi.org/10.1007/3-540-44750-4\_3},
  doi          = {10.1007/3-540-44750-4\_3},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Rogaway95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/BellareR95,
  author       = {Mihir Bellare and
                  Phillip Rogaway},
  editor       = {Frank Thomson Leighton and
                  Allan Borodin},
  title        = {Provably secure session key distribution: the three party case},
  booktitle    = {Proceedings of the Twenty-Seventh Annual {ACM} Symposium on Theory
                  of Computing, 29 May-1 June 1995, Las Vegas, Nevada, {USA}},
  pages        = {57--66},
  publisher    = {{ACM}},
  year         = {1995},
  url          = {https://doi.org/10.1145/225058.225084},
  doi          = {10.1145/225058.225084},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/BellareR95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BellareKR94,
  author       = {Mihir Bellare and
                  Joe Kilian and
                  Phillip Rogaway},
  editor       = {Yvo Desmedt},
  title        = {The Security of Cipher Block Chaining},
  booktitle    = {Advances in Cryptology - {CRYPTO} '94, 14th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 21-25, 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {839},
  pages        = {341--358},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/3-540-48658-5\_32},
  doi          = {10.1007/3-540-48658-5\_32},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BellareKR94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BellareR94,
  author       = {Mihir Bellare and
                  Phillip Rogaway},
  editor       = {Alfredo De Santis},
  title        = {Optimal Asymmetric Encryption},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '94, Workshop on the Theory and
                  Application of Cryptographic Techniques, Perugia, Italy, May 9-12,
                  1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {950},
  pages        = {92--111},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/BFb0053428},
  doi          = {10.1007/BFB0053428},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BellareR94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BellareR93,
  author       = {Mihir Bellare and
                  Phillip Rogaway},
  editor       = {Dorothy E. Denning and
                  Raymond Pyle and
                  Ravi Ganesan and
                  Ravi S. Sandhu and
                  Victoria Ashby},
  title        = {Random Oracles are Practical: {A} Paradigm for Designing Efficient
                  Protocols},
  booktitle    = {{CCS} '93, Proceedings of the 1st {ACM} Conference on Computer and
                  Communications Security, Fairfax, Virginia, USA, November 3-5, 1993},
  pages        = {62--73},
  publisher    = {{ACM}},
  year         = {1993},
  url          = {https://doi.org/10.1145/168588.168596},
  doi          = {10.1145/168588.168596},
  timestamp    = {Tue, 10 Nov 2020 20:00:40 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BellareR93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BellareR93,
  author       = {Mihir Bellare and
                  Phillip Rogaway},
  editor       = {Douglas R. Stinson},
  title        = {Entity Authentication and Key Distribution},
  booktitle    = {Advances in Cryptology - {CRYPTO} '93, 13th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 22-26, 1993, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {773},
  pages        = {232--249},
  publisher    = {Springer},
  year         = {1993},
  url          = {https://doi.org/10.1007/3-540-48329-2\_21},
  doi          = {10.1007/3-540-48329-2\_21},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BellareR93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/RogawayC93,
  author       = {Phillip Rogaway and
                  Don Coppersmith},
  editor       = {Ross J. Anderson},
  title        = {A Software-Optimised Encryption Algorithm},
  booktitle    = {Fast Software Encryption, Cambridge Security Workshop, Cambridge,
                  UK, December 9-11, 1993, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {809},
  pages        = {56--63},
  publisher    = {Springer},
  year         = {1993},
  url          = {https://doi.org/10.1007/3-540-58108-1\_8},
  doi          = {10.1007/3-540-58108-1\_8},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/RogawayC93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/MicaliR91,
  author       = {Silvio Micali and
                  Phillip Rogaway},
  editor       = {Joan Feigenbaum},
  title        = {Secure Computation (Abstract)},
  booktitle    = {Advances in Cryptology - {CRYPTO} '91, 11th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 11-15, 1991, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {576},
  pages        = {392--404},
  publisher    = {Springer},
  year         = {1991},
  url          = {https://doi.org/10.1007/3-540-46766-1\_32},
  doi          = {10.1007/3-540-46766-1\_32},
  timestamp    = {Fri, 17 Jul 2020 16:12:45 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/MicaliR91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BeaverFKR90,
  author       = {Donald Beaver and
                  Joan Feigenbaum and
                  Joe Kilian and
                  Phillip Rogaway},
  editor       = {Alfred Menezes and
                  Scott A. Vanstone},
  title        = {Security with Low Communication Overhead},
  booktitle    = {Advances in Cryptology - {CRYPTO} '90, 10th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 11-15, 1990, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {537},
  pages        = {62--76},
  publisher    = {Springer},
  year         = {1990},
  url          = {https://doi.org/10.1007/3-540-38424-3\_5},
  doi          = {10.1007/3-540-38424-3\_5},
  timestamp    = {Fri, 17 Jul 2020 16:12:45 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BeaverFKR90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/BeaverMR90,
  author       = {Donald Beaver and
                  Silvio Micali and
                  Phillip Rogaway},
  editor       = {Harriet Ortiz},
  title        = {The Round Complexity of Secure Protocols (Extended Abstract)},
  booktitle    = {Proceedings of the 22nd Annual {ACM} Symposium on Theory of Computing,
                  May 13-17, 1990, Baltimore, Maryland, {USA}},
  pages        = {503--513},
  publisher    = {{ACM}},
  year         = {1990},
  url          = {https://doi.org/10.1145/100216.100287},
  doi          = {10.1145/100216.100287},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/BeaverMR90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Ben-OrGGHKMR88,
  author       = {Michael Ben{-}Or and
                  Oded Goldreich and
                  Shafi Goldwasser and
                  Johan H{\aa}stad and
                  Joe Kilian and
                  Silvio Micali and
                  Phillip Rogaway},
  editor       = {Shafi Goldwasser},
  title        = {Everything Provable is Provable in Zero-Knowledge},
  booktitle    = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {403},
  pages        = {37--56},
  publisher    = {Springer},
  year         = {1988},
  url          = {https://doi.org/10.1007/0-387-34799-2\_4},
  doi          = {10.1007/0-387-34799-2\_4},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Ben-OrGGHKMR88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics