Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Phillip Rogaway
@inproceedings{DBLP:conf/esorics/ChanR22, author = {John Chan and Phillip Rogaway}, editor = {Vijayalakshmi Atluri and Roberto Di Pietro and Christian Damsgaard Jensen and Weizhi Meng}, title = {On Committing Authenticated-Encryption}, booktitle = {Computer Security - {ESORICS} 2022 - 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26-30, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13555}, pages = {275--294}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-17146-8\_14}, doi = {10.1007/978-3-031-17146-8\_14}, timestamp = {Tue, 27 Sep 2022 21:07:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/ChanR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChanR22, author = {John Chan and Phillip Rogaway}, title = {On Committing Authenticated Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1260}, year = {2022}, url = {https://eprint.iacr.org/2022/1260}, timestamp = {Sat, 22 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChanR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/KrovetzR21, author = {Ted Krovetz and Phillip Rogaway}, title = {The Design and Evolution of {OCB}}, journal = {J. Cryptol.}, volume = {34}, number = {4}, pages = {36}, year = {2021}, url = {https://doi.org/10.1007/s00145-021-09399-8}, doi = {10.1007/S00145-021-09399-8}, timestamp = {Wed, 01 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/KrovetzR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/BellareDR20, author = {Mihir Bellare and Wei Dai and Phillip Rogaway}, title = {Reimagining Secret Sharing: Creating a Safer and More Versatile Primitive by Adding Authenticity, Correcting Errors, and Reducing Randomness Requirements}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2020}, number = {4}, pages = {461--490}, year = {2020}, url = {https://doi.org/10.2478/popets-2020-0082}, doi = {10.2478/POPETS-2020-0082}, timestamp = {Wed, 15 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/BellareDR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BellareDR20, author = {Mihir Bellare and Wei Dai and Phillip Rogaway}, title = {Reimagining Secret Sharing: Creating a Safer and More Versatile Primitive by Adding Authenticity, Correcting Errors, and Reducing Randomness Requirements}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {800}, year = {2020}, url = {https://eprint.iacr.org/2020/800}, timestamp = {Wed, 15 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BellareDR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/ChanR19, author = {John Chan and Phillip Rogaway}, editor = {Steven D. Galbraith and Shiho Moriai}, title = {Anonymous {AE}}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8-12, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11922}, pages = {183--208}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34621-8\_7}, doi = {10.1007/978-3-030-34621-8\_7}, timestamp = {Fri, 22 Nov 2019 13:52:52 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/ChanR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChanR19, author = {John Chan and Phillip Rogaway}, title = {Anonymous {AE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1033}, year = {2019}, url = {https://eprint.iacr.org/2019/1033}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChanR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/MorrisRS18, author = {Ben Morris and Phillip Rogaway and Till Stegers}, title = {Deterministic Encryption with the Thorp Shuffle}, journal = {J. Cryptol.}, volume = {31}, number = {2}, pages = {521--536}, year = {2018}, url = {https://doi.org/10.1007/s00145-017-9262-z}, doi = {10.1007/S00145-017-9262-Z}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/MorrisRS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/RogawayZ18, author = {Phillip Rogaway and Yusi Zhang}, title = {Onion-AE: Foundations of Nested Encryption}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2018}, number = {2}, pages = {85--104}, year = {2018}, url = {https://doi.org/10.1515/popets-2018-0014}, doi = {10.1515/POPETS-2018-0014}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/RogawayZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/RogawayZ18, author = {Phillip Rogaway and Yusi Zhang}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {Simplifying Game-Based Definitions - Indistinguishability up to Correctness and Its Application to Stateful {AE}}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10992}, pages = {3--32}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96881-0\_1}, doi = {10.1007/978-3-319-96881-0\_1}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/RogawayZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RogawayZ18, author = {Phillip Rogaway and Yusi Zhang}, title = {Onion-AE: Foundations of Nested Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {126}, year = {2018}, url = {http://eprint.iacr.org/2018/126}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RogawayZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RogawayZ18a, author = {Phillip Rogaway and Yusi Zhang}, title = {Simplifying Game-Based Definitions: Indistinguishability up to Correctness and Its Application to Stateful {AE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {558}, year = {2018}, url = {https://eprint.iacr.org/2018/558}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RogawayZ18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/latincrypt/Rogaway17, author = {Phillip Rogaway}, editor = {Tanja Lange and Orr Dunkelman}, title = {An Obsession with Definitions}, booktitle = {Progress in Cryptology - {LATINCRYPT} 2017 - 5th International Conference on Cryptology and Information Security in Latin America, Havana, Cuba, September 20-22, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11368}, pages = {3--20}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-030-25283-0\_1}, doi = {10.1007/978-3-030-25283-0\_1}, timestamp = {Mon, 22 Jul 2019 13:20:38 +0200}, biburl = {https://dblp.org/rec/conf/latincrypt/Rogaway17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Rogaway16, author = {Phillip Rogaway}, title = {Practice-Oriented Provable Security and the Social Construction of Cryptography}, journal = {{IEEE} Secur. Priv.}, volume = {14}, number = {6}, pages = {10--17}, year = {2016}, url = {https://doi.org/10.1109/MSP.2016.122}, doi = {10.1109/MSP.2016.122}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Rogaway16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BellareKR16, author = {Mihir Bellare and Daniel Kane and Phillip Rogaway}, editor = {Matthew Robshaw and Jonathan Katz}, title = {Big-Key Symmetric Encryption: Resisting Key Exfiltration}, booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9814}, pages = {373--402}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53018-4\_14}, doi = {10.1007/978-3-662-53018-4\_14}, timestamp = {Tue, 09 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BellareKR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BellareKR16, author = {Mihir Bellare and Daniel Kane and Phillip Rogaway}, title = {Big-Key Symmetric Encryption: Resisting Key Exfiltration}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {541}, year = {2016}, url = {http://eprint.iacr.org/2016/541}, timestamp = {Tue, 09 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BellareKR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dagstuhl-manifestos/PreneelRRR15, author = {Bart Preneel and Phillip Rogaway and Mark Dermot Ryan and Peter Y. A. Ryan}, title = {Privacy and Security in an Age of Surveillance (Dagstuhl Perspectives Workshop 14401)}, journal = {Dagstuhl Manifestos}, volume = {5}, number = {1}, pages = {25--37}, year = {2015}, url = {https://doi.org/10.4230/DagMan.5.1.25}, doi = {10.4230/DAGMAN.5.1.25}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dagstuhl-manifestos/PreneelRRR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/HoangRRV15, author = {Viet Tung Hoang and Reza Reyhanitabar and Phillip Rogaway and Damian Viz{\'{a}}r}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Online Authenticated-Encryption and its Nonce-Reuse Misuse-Resistance}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9215}, pages = {493--517}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-47989-6\_24}, doi = {10.1007/978-3-662-47989-6\_24}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/HoangRRV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/HoangKR15, author = {Viet Tung Hoang and Ted Krovetz and Phillip Rogaway}, editor = {Elisabeth Oswald and Marc Fischlin}, title = {Robust Authenticated-Encryption {AEZ} and the Problem That It Solves}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9056}, pages = {15--44}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46800-5\_2}, doi = {10.1007/978-3-662-46800-5\_2}, timestamp = {Thu, 14 Oct 2021 09:58:16 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/HoangKR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/Badertscher0MRT15, author = {Christian Badertscher and Christian Matt and Ueli Maurer and Phillip Rogaway and Bj{\"{o}}rn Tackmann}, editor = {Jens Groth}, title = {Robust Authenticated Encryption and the Limits of Symmetric Cryptography}, booktitle = {Cryptography and Coding - 15th {IMA} International Conference, {IMACC} 2015, Oxford, UK, December 15-17, 2015. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9496}, pages = {112--129}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-27239-9\_7}, doi = {10.1007/978-3-319-27239-9\_7}, timestamp = {Wed, 18 Mar 2020 16:00:58 +0100}, biburl = {https://dblp.org/rec/conf/ima/Badertscher0MRT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/Badertscher0MRT15, author = {Christian Badertscher and Christian Matt and Ueli Maurer and Phillip Rogaway and Bj{\"{o}}rn Tackmann}, editor = {Man Ho Au and Atsuko Miyaji}, title = {Augmented Secure Channels and the Goal of the {TLS} 1.3 Record Layer}, booktitle = {Provable Security - 9th International Conference, ProvSec 2015, Kanazawa, Japan, November 24-26, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9451}, pages = {85--104}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26059-4\_5}, doi = {10.1007/978-3-319-26059-4\_5}, timestamp = {Tue, 14 May 2019 10:00:45 +0200}, biburl = {https://dblp.org/rec/conf/provsec/Badertscher0MRT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HoangRRV15, author = {Viet Tung Hoang and Reza Reyhanitabar and Phillip Rogaway and Damian Viz{\'{a}}r}, title = {Online Authenticated-Encryption and its Nonce-Reuse Misuse-Resistance}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {189}, year = {2015}, url = {http://eprint.iacr.org/2015/189}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HoangRRV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Badertscher0MRT15, author = {Christian Badertscher and Christian Matt and Ueli Maurer and Phillip Rogaway and Bj{\"{o}}rn Tackmann}, title = {Augmented Secure Channels and the Goal of the {TLS} 1.3 Record Layer}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {394}, year = {2015}, url = {http://eprint.iacr.org/2015/394}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Badertscher0MRT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Badertscher0MRT15a, author = {Christian Badertscher and Christian Matt and Ueli Maurer and Phillip Rogaway and Bj{\"{o}}rn Tackmann}, title = {Robust Authenticated Encryption and the Limits of Symmetric Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {893}, year = {2015}, url = {http://eprint.iacr.org/2015/893}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Badertscher0MRT15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Rogaway15, author = {Phillip Rogaway}, title = {The Moral Character of Cryptographic Work}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1162}, year = {2015}, url = {http://eprint.iacr.org/2015/1162}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Rogaway15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BellarePR14, author = {Mihir Bellare and Kenneth G. Paterson and Phillip Rogaway}, editor = {Juan A. Garay and Rosario Gennaro}, title = {Security of Symmetric Encryption against Mass Surveillance}, booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8616}, pages = {1--19}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44371-2\_1}, doi = {10.1007/978-3-662-44371-2\_1}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BellarePR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/NamprempreRS14, author = {Chanathip Namprempre and Phillip Rogaway and Thomas Shrimpton}, editor = {Phong Q. Nguyen and Elisabeth Oswald}, title = {Reconsidering Generic Composition}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8441}, pages = {257--274}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-55220-5\_15}, doi = {10.1007/978-3-642-55220-5\_15}, timestamp = {Thu, 14 Oct 2021 09:58:16 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/NamprempreRS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/MorrisR14, author = {Ben Morris and Phillip Rogaway}, editor = {Phong Q. Nguyen and Elisabeth Oswald}, title = {Sometimes-Recurse Shuffle - Almost-Random Permutations in Logarithmic Expected Time}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8441}, pages = {311--326}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-55220-5\_18}, doi = {10.1007/978-3-642-55220-5\_18}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/MorrisR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dagstuhl-reports/PreneelRRR14, author = {Bart Preneel and Phillip Rogaway and Mark Dermot Ryan and Peter Y. A. Ryan}, title = {Privacy and Security in an Age of Surveillance (Dagstuhl Perspectives Workshop 14401)}, journal = {Dagstuhl Reports}, volume = {4}, number = {9}, pages = {106--123}, year = {2014}, url = {https://doi.org/10.4230/DagRep.4.9.106}, doi = {10.4230/DAGREP.4.9.106}, timestamp = {Wed, 07 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dagstuhl-reports/PreneelRRR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NamprempreRS14, author = {Chanathip Namprempre and Phillip Rogaway and Thomas Shrimpton}, title = {Reconsidering Generic Composition}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {206}, year = {2014}, url = {http://eprint.iacr.org/2014/206}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NamprempreRS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BellarePR14, author = {Mihir Bellare and Kenneth G. Paterson and Phillip Rogaway}, title = {Security of Symmetric Encryption against Mass Surveillance}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {438}, year = {2014}, url = {http://eprint.iacr.org/2014/438}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BellarePR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HoangKR14, author = {Viet Tung Hoang and Ted Krovetz and Phillip Rogaway}, title = {Robust Authenticated-Encryption: {AEZ} and the Problem that it Solves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {793}, year = {2014}, url = {http://eprint.iacr.org/2014/793}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HoangKR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/rfc/rfc7253, author = {Ted Krovetz and Phillip Rogaway}, title = {The {OCB} Authenticated-Encryption Algorithm}, journal = {{RFC}}, volume = {7253}, pages = {1--19}, year = {2014}, url = {https://doi.org/10.17487/RFC7253}, doi = {10.17487/RFC7253}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/rfc/rfc7253.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/BellareHKR13, author = {Mihir Bellare and Viet Tung Hoang and Sriram Keelveedhi and Phillip Rogaway}, title = {Efficient Garbling from a Fixed-Key Blockcipher}, booktitle = {2013 {IEEE} Symposium on Security and Privacy, {SP} 2013, Berkeley, CA, USA, May 19-22, 2013}, pages = {478--492}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/SP.2013.39}, doi = {10.1109/SP.2013.39}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/BellareHKR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NamprempreRS13, author = {Chanathip Namprempre and Phillip Rogaway and Tom Shrimpton}, title = {{AE5} Security Notions: Definitions Implicit in the {CAESAR} Call}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {242}, year = {2013}, url = {http://eprint.iacr.org/2013/242}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NamprempreRS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BellareHKR13, author = {Mihir Bellare and Viet Tung Hoang and Sriram Keelveedhi and Phillip Rogaway}, title = {Efficient Garbling from a Fixed-Key Blockcipher}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {426}, year = {2013}, url = {http://eprint.iacr.org/2013/426}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BellareHKR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MorrisR13, author = {Ben Morris and Phillip Rogaway}, title = {Sometimes-Recurse Shuffle: Almost-Random Permutations in Logarithmic Expected Time}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {560}, year = {2013}, url = {http://eprint.iacr.org/2013/560}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MorrisR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BellareHR12, author = {Mihir Bellare and Viet Tung Hoang and Phillip Rogaway}, editor = {Xiaoyun Wang and Kazue Sako}, title = {Adaptively Secure Garbling with Applications to One-Time Programs and Secure Outsourcing}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2012 - 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7658}, pages = {134--153}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34961-4\_10}, doi = {10.1007/978-3-642-34961-4\_10}, timestamp = {Mon, 25 Nov 2019 15:32:14 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/BellareHR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BellareHR12, author = {Mihir Bellare and Viet Tung Hoang and Phillip Rogaway}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Foundations of garbled circuits}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {784--796}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382279}, doi = {10.1145/2382196.2382279}, timestamp = {Tue, 12 Apr 2022 13:28:49 +0200}, biburl = {https://dblp.org/rec/conf/ccs/BellareHR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/HoangMR12, author = {Viet Tung Hoang and Ben Morris and Phillip Rogaway}, editor = {Reihaneh Safavi{-}Naini and Ran Canetti}, title = {An Enciphering Scheme Based on a Card Shuffle}, booktitle = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7417}, pages = {1--13}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32009-5\_1}, doi = {10.1007/978-3-642-32009-5\_1}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/HoangMR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/RogawayWZ12, author = {Phillip Rogaway and Mark Wooding and Haibin Zhang}, editor = {Anne Canteaut}, title = {The Security of Ciphertext Stealing}, booktitle = {Fast Software Encryption - 19th International Workshop, {FSE} 2012, Washington, DC, USA, March 19-21, 2012. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7549}, pages = {180--195}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34047-5\_11}, doi = {10.1007/978-3-642-34047-5\_11}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/RogawayWZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1208-1176, author = {Viet Tung Hoang and Ben Morris and Phillip Rogaway}, title = {An Enciphering Scheme Based on a Card Shuffle}, journal = {CoRR}, volume = {abs/1208.1176}, year = {2012}, url = {http://arxiv.org/abs/1208.1176}, eprinttype = {arXiv}, eprint = {1208.1176}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1208-1176.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dagstuhl-reports/ArmknechtLPR12, author = {Frederik Armknecht and Stefan Lucks and Bart Preneel and Phillip Rogaway}, title = {Symmetric Cryptography (Dagstuhl Seminar 12031)}, journal = {Dagstuhl Reports}, volume = {2}, number = {1}, pages = {39--49}, year = {2012}, url = {https://doi.org/10.4230/DagRep.2.1.39}, doi = {10.4230/DAGREP.2.1.39}, timestamp = {Wed, 07 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dagstuhl-reports/ArmknechtLPR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BellareHR12, author = {Mihir Bellare and Viet Tung Hoang and Phillip Rogaway}, title = {Garbling Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {265}, year = {2012}, url = {http://eprint.iacr.org/2012/265}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BellareHR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BellareHR12a, author = {Mihir Bellare and Viet Tung Hoang and Phillip Rogaway}, title = {Adaptively Secure Garbling with Applications to One-Time Programs and Secure Outsourcing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {564}, year = {2012}, url = {http://eprint.iacr.org/2012/564}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BellareHR12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/Rogaway11, author = {Phillip Rogaway}, title = {Constructing cryptographic definitions}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {3}, number = {2}, pages = {69--76}, year = {2011}, url = {https://doi.org/10.22042/isecure.2015.3.2.2}, doi = {10.22042/ISECURE.2015.3.2.2}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isecure/Rogaway11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/RogawayZ11, author = {Phillip Rogaway and Haibin Zhang}, editor = {Aggelos Kiayias}, title = {Online Ciphers from Tweakable Blockciphers}, booktitle = {Topics in Cryptology - {CT-RSA} 2011 - The Cryptographers' Track at the {RSA} Conference 2011, San Francisco, CA, USA, February 14-18, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6558}, pages = {237--249}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-19074-2\_16}, doi = {10.1007/978-3-642-19074-2\_16}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/RogawayZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/KrovetzR11, author = {Ted Krovetz and Phillip Rogaway}, editor = {Antoine Joux}, title = {The Software Performance of Authenticated-Encryption Modes}, booktitle = {Fast Software Encryption - 18th International Workshop, {FSE} 2011, Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6733}, pages = {306--327}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21702-9\_18}, doi = {10.1007/978-3-642-21702-9\_18}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/KrovetzR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/crypto/2011, editor = {Phillip Rogaway}, title = {Advances in Cryptology - {CRYPTO} 2011 - 31st Annual Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6841}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22792-9}, doi = {10.1007/978-3-642-22792-9}, isbn = {978-3-642-22791-2}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/BlackRSS10, author = {John Black and Phillip Rogaway and Thomas Shrimpton and Martijn Stam}, title = {An Analysis of the Blockcipher-Based Hash Functions from {PGV}}, journal = {J. Cryptol.}, volume = {23}, number = {4}, pages = {519--545}, year = {2010}, url = {https://doi.org/10.1007/s00145-010-9071-0}, doi = {10.1007/S00145-010-9071-0}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/BlackRSS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/HoangR10, author = {Viet Tung Hoang and Phillip Rogaway}, editor = {Tal Rabin}, title = {On Generalized Feistel Networks}, booktitle = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6223}, pages = {613--630}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14623-7\_33}, doi = {10.1007/978-3-642-14623-7\_33}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/HoangR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HoangR10, author = {Viet Tung Hoang and Phillip Rogaway}, title = {On generalized Feistel networks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {301}, year = {2010}, url = {http://eprint.iacr.org/2010/301}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HoangR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/MorrisRS09, author = {Ben Morris and Phillip Rogaway and Till Stegers}, editor = {Shai Halevi}, title = {How to Encipher Messages on a Small Domain}, booktitle = {Advances in Cryptology - {CRYPTO} 2009, 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5677}, pages = {286--302}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03356-8\_17}, doi = {10.1007/978-3-642-03356-8\_17}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/MorrisRS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/RogawayS09, author = {Phillip Rogaway and Till Stegers}, title = {Authentication without Elision: Partially Specified Protocols, Associated Data, and Cryptographic Models Described by Code}, booktitle = {Proceedings of the 22nd {IEEE} Computer Security Foundations Symposium, {CSF} 2009, Port Jefferson, New York, USA, July 8-10, 2009}, pages = {26--39}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CSF.2009.23}, doi = {10.1109/CSF.2009.23}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/RogawayS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/BellareRRS09, author = {Mihir Bellare and Thomas Ristenpart and Phillip Rogaway and Till Stegers}, editor = {Michael J. Jacobson Jr. and Vincent Rijmen and Reihaneh Safavi{-}Naini}, title = {Format-Preserving Encryption}, booktitle = {Selected Areas in Cryptography, 16th Annual International Workshop, {SAC} 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5867}, pages = {295--312}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-05445-7\_19}, doi = {10.1007/978-3-642-05445-7\_19}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/BellareRRS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/dagstuhl/2009P9031, editor = {Helena Handschuh and Stefan Lucks and Bart Preneel and Phillip Rogaway}, title = {Symmetric Cryptography, 11.01. - 16.01.2009}, series = {Dagstuhl Seminar Proceedings}, volume = {09031}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, Germany}, year = {2009}, url = {http://drops.dagstuhl.de/portals/09031/}, timestamp = {Thu, 10 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dagstuhl/2009P9031.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dagstuhl/HandschuhLPR09, author = {Helena Handschuh and Stefan Lucks and Bart Preneel and Phillip Rogaway}, editor = {Helena Handschuh and Stefan Lucks and Bart Preneel and Phillip Rogaway}, title = {09031 Abstracts Collection - Symmetric Cryptography}, booktitle = {Symmetric Cryptography, 11.01. - 16.01.2009}, series = {Dagstuhl Seminar Proceedings}, volume = {09031}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, Germany}, year = {2009}, url = {http://drops.dagstuhl.de/opus/volltexte/2009/1960/}, timestamp = {Thu, 10 Jun 2021 13:02:06 +0200}, biburl = {https://dblp.org/rec/conf/dagstuhl/HandschuhLPR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dagstuhl/HandschuhLPR09a, author = {Helena Handschuh and Stefan Lucks and Bart Preneel and Phillip Rogaway}, editor = {Helena Handschuh and Stefan Lucks and Bart Preneel and Phillip Rogaway}, title = {09031 Executive Summary - Symmetric Cryptography}, booktitle = {Symmetric Cryptography, 11.01. - 16.01.2009}, series = {Dagstuhl Seminar Proceedings}, volume = {09031}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, Germany}, year = {2009}, url = {http://drops.dagstuhl.de/opus/volltexte/2009/1959/}, timestamp = {Thu, 23 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dagstuhl/HandschuhLPR09a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BellareRRS09, author = {Mihir Bellare and Thomas Ristenpart and Phillip Rogaway and Till Stegers}, title = {Format-Preserving Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {251}, year = {2009}, url = {http://eprint.iacr.org/2009/251}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BellareRRS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/RogawayS08, author = {Phillip Rogaway and John P. Steinberger}, editor = {David A. Wagner}, title = {Constructing Cryptographic Hash Functions from Fixed-Key Blockciphers}, booktitle = {Advances in Cryptology - {CRYPTO} 2008, 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5157}, pages = {433--450}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85174-5\_24}, doi = {10.1007/978-3-540-85174-5\_24}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/RogawayS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/RogawayS08, author = {Phillip Rogaway and John P. Steinberger}, editor = {Nigel P. Smart}, title = {Security/Efficiency Tradeoffs for Permutation-Based Hashing}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2008, 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4965}, pages = {220--236}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78967-3\_13}, doi = {10.1007/978-3-540-78967-3\_13}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/RogawayS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/AbadiR07, author = {Mart{\'{\i}}n Abadi and Phillip Rogaway}, title = {Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption)}, journal = {J. Cryptol.}, volume = {20}, number = {3}, pages = {395}, year = {2007}, url = {https://doi.org/10.1007/s00145-007-0203-0}, doi = {10.1007/S00145-007-0203-0}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/AbadiR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/RogawayB07, author = {Phillip Rogaway and Mihir Bellare}, editor = {Peng Ning and Sabrina De Capitani di Vimercati and Paul F. Syverson}, title = {Robust computational secret sharing and a unified account of classical secret-sharing goals}, booktitle = {Proceedings of the 2007 {ACM} Conference on Computer and Communications Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007}, pages = {172--184}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1315245.1315268}, doi = {10.1145/1315245.1315268}, timestamp = {Tue, 10 Nov 2020 20:00:14 +0100}, biburl = {https://dblp.org/rec/conf/ccs/RogawayB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/RistenpartR07, author = {Thomas Ristenpart and Phillip Rogaway}, editor = {Alex Biryukov}, title = {How to Enrich the Message Space of a Cipher}, booktitle = {Fast Software Encryption, 14th International Workshop, {FSE} 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4593}, pages = {101--118}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74619-5\_7}, doi = {10.1007/978-3-540-74619-5\_7}, timestamp = {Sun, 25 Oct 2020 23:06:50 +0100}, biburl = {https://dblp.org/rec/conf/fse/RistenpartR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RistenpartR07, author = {Thomas Ristenpart and Phillip Rogaway}, title = {How to Enrich the Message Space of a Cipher}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {109}, year = {2007}, url = {http://eprint.iacr.org/2007/109}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RistenpartR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/KrovetzR06, author = {Ted Krovetz and Phillip Rogaway}, title = {Variationally universal hashing}, journal = {Inf. Process. Lett.}, volume = {100}, number = {1}, pages = {36--39}, year = {2006}, url = {https://doi.org/10.1016/j.ipl.2005.11.026}, doi = {10.1016/J.IPL.2005.11.026}, timestamp = {Tue, 06 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/KrovetzR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/RogawayS06, author = {Phillip Rogaway and Thomas Shrimpton}, editor = {Serge Vaudenay}, title = {A Provable-Security Treatment of the Key-Wrap Problem}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28 - June 1, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4004}, pages = {373--390}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11761679\_23}, doi = {10.1007/11761679\_23}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/RogawayS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BellareR06, author = {Mihir Bellare and Phillip Rogaway}, editor = {Serge Vaudenay}, title = {The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28 - June 1, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4004}, pages = {409--426}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11761679\_25}, doi = {10.1007/11761679\_25}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/BellareR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vietcrypt/Rogaway06, author = {Phillip Rogaway}, editor = {Phong Q. Nguyen}, title = {Formalizing Human Ignorance}, booktitle = {Progressin Cryptology - {VIETCRYPT} 2006, First International Conference on Cryptology in Vietnam, Hanoi, Vietnam, September 25-28, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4341}, pages = {211--228}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11958239\_14}, doi = {10.1007/11958239\_14}, timestamp = {Tue, 14 May 2019 10:00:55 +0200}, biburl = {https://dblp.org/rec/conf/vietcrypt/Rogaway06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RogawayS06, author = {Phillip Rogaway and Thomas Shrimpton}, title = {Deterministic Authenticated-Encryption: {A} Provable-Security Treatment of the Key-Wrap Problem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {221}, year = {2006}, url = {http://eprint.iacr.org/2006/221}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RogawayS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Rogaway06, author = {Phillip Rogaway}, title = {Formalizing Human Ignorance: Collision-Resistant Hashing without the Keys}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {281}, year = {2006}, url = {http://eprint.iacr.org/2006/281}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Rogaway06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BellareR06a, author = {Mihir Bellare and Phillip Rogaway}, title = {Robust Computational Secret Sharing and a Unified Account of Classical Secret-Sharing Goals}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {449}, year = {2006}, url = {http://eprint.iacr.org/2006/449}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BellareR06a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/BlackR05, author = {John Black and Phillip Rogaway}, title = {{CBC} MACs for Arbitrary-Length Messages: The Three-Key Constructions}, journal = {J. Cryptol.}, volume = {18}, number = {2}, pages = {111--131}, year = {2005}, url = {https://doi.org/10.1007/s00145-004-0016-3}, doi = {10.1007/S00145-004-0016-3}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/BlackR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BellarePR05, author = {Mihir Bellare and Krzysztof Pietrzak and Phillip Rogaway}, editor = {Victor Shoup}, title = {Improved Security Analyses for {CBC} MACs}, booktitle = {Advances in Cryptology - {CRYPTO} 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3621}, pages = {527--545}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11535218\_32}, doi = {10.1007/11535218\_32}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BellarePR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/Rogaway04, author = {Phillip Rogaway}, editor = {Pil Joong Lee}, title = {Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes {OCB} and {PMAC}}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2004, 10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, Korea, December 5-9, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3329}, pages = {16--31}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30539-2\_2}, doi = {10.1007/978-3-540-30539-2\_2}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/Rogaway04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asian/Rogaway04, author = {Phillip Rogaway}, editor = {Michael J. Maher}, title = {On the Role Definitions in and Beyond Cryptography}, booktitle = {Advances in Computer Science - {ASIAN} 2004, Higher-Level Decision Making, 9th Asian Computing Science Conference, Dedicated to Jean-Louis Lassez on the Occasion of His 5th Cycle Birthday, Chiang Mai, Thailand, December 8-10, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3321}, pages = {13--32}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30502-6\_2}, doi = {10.1007/978-3-540-30502-6\_2}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/asian/Rogaway04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/HaleviR04, author = {Shai Halevi and Phillip Rogaway}, editor = {Tatsuaki Okamoto}, title = {A Parallelizable Enciphering Mode}, booktitle = {Topics in Cryptology - {CT-RSA} 2004, The Cryptographers' Track at the {RSA} Conference 2004, San Francisco, CA, USA, February 23-27, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2964}, pages = {292--304}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24660-2\_23}, doi = {10.1007/978-3-540-24660-2\_23}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/HaleviR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Rogaway04, author = {Phillip Rogaway}, editor = {Bimal K. Roy and Willi Meier}, title = {Nonce-Based Symmetric Encryption}, booktitle = {Fast Software Encryption, 11th International Workshop, {FSE} 2004, Delhi, India, February 5-7, 2004, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3017}, pages = {348--359}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-25937-4\_22}, doi = {10.1007/978-3-540-25937-4\_22}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/Rogaway04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/RogawayS04, author = {Phillip Rogaway and Thomas Shrimpton}, editor = {Bimal K. Roy and Willi Meier}, title = {Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision Resistance}, booktitle = {Fast Software Encryption, 11th International Workshop, {FSE} 2004, Delhi, India, February 5-7, 2004, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3017}, pages = {371--388}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-25937-4\_24}, doi = {10.1007/978-3-540-25937-4\_24}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/RogawayS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BellareRW04, author = {Mihir Bellare and Phillip Rogaway and David A. Wagner}, editor = {Bimal K. Roy and Willi Meier}, title = {The {EAX} Mode of Operation}, booktitle = {Fast Software Encryption, 11th International Workshop, {FSE} 2004, Delhi, India, February 5-7, 2004, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3017}, pages = {389--407}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-25937-4\_25}, doi = {10.1007/978-3-540-25937-4\_25}, timestamp = {Wed, 14 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/BellareRW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RogawayS04, author = {Phillip Rogaway and Thomas Shrimpton}, title = {Cryptographic Hash-Function Basics: Definitions, Implications and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision Resistance}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {35}, year = {2004}, url = {http://eprint.iacr.org/2004/035}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RogawayS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BellareR04, author = {Mihir Bellare and Phillip Rogaway}, title = {Code-Based Game-Playing Proofs and the Security of Triple Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {331}, year = {2004}, url = {http://eprint.iacr.org/2004/331}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BellareR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/RogawayBB03, author = {Phillip Rogaway and Mihir Bellare and John Black}, title = {{OCB:} {A} block-cipher mode of operation for efficient authenticated encryption}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {6}, number = {3}, pages = {365--403}, year = {2003}, url = {https://doi.org/10.1145/937527.937529}, doi = {10.1145/937527.937529}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/RogawayBB03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/HaleviR03, author = {Shai Halevi and Phillip Rogaway}, editor = {Dan Boneh}, title = {A Tweakable Enciphering Mode}, booktitle = {Advances in Cryptology - {CRYPTO} 2003, 23rd Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2729}, pages = {482--499}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45146-4\_28}, doi = {10.1007/978-3-540-45146-4\_28}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/HaleviR03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BellareRW03, author = {Mihir Bellare and Phillip Rogaway and David A. Wagner}, title = {{EAX:} {A} Conventional Authenticated-Encryption Mode}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {69}, year = {2003}, url = {http://eprint.iacr.org/2003/069}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BellareRW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RogawayW03, author = {Phillip Rogaway and David A. Wagner}, title = {A Critique of {CCM}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {70}, year = {2003}, url = {http://eprint.iacr.org/2003/070}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RogawayW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HaleviR03, author = {Shai Halevi and Phillip Rogaway}, title = {A Parallelizable Enciphering Mode}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {147}, year = {2003}, url = {http://eprint.iacr.org/2003/147}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HaleviR03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HaleviR03a, author = {Shai Halevi and Phillip Rogaway}, title = {A Tweakable Enciphering Mode}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {148}, year = {2003}, url = {http://eprint.iacr.org/2003/148}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HaleviR03a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/AbadiR02, author = {Mart{\'{\i}}n Abadi and Phillip Rogaway}, title = {Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption)}, journal = {J. Cryptol.}, volume = {15}, number = {2}, pages = {103--127}, year = {2002}, url = {https://doi.org/10.1007/s00145-001-0014-7}, doi = {10.1007/S00145-001-0014-7}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/AbadiR02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Rogaway02, author = {Phillip Rogaway}, editor = {Vijayalakshmi Atluri}, title = {Authenticated-encryption with associated-data}, booktitle = {Proceedings of the 9th {ACM} Conference on Computer and Communications Security, {CCS} 2002, Washington, DC, USA, November 18-22, 2002}, pages = {98--107}, publisher = {{ACM}}, year = {2002}, url = {https://doi.org/10.1145/586110.586125}, doi = {10.1145/586110.586125}, timestamp = {Tue, 10 Nov 2020 20:00:47 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Rogaway02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BlackRS02, author = {John Black and Phillip Rogaway and Thomas Shrimpton}, editor = {Moti Yung}, title = {Black-Box Analysis of the Block-Cipher-Based Hash-Function Constructions from {PGV}}, booktitle = {Advances in Cryptology - {CRYPTO} 2002, 22nd Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2442}, pages = {320--335}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45708-9\_21}, doi = {10.1007/3-540-45708-9\_21}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BlackRS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/BlackR02, author = {John Black and Phillip Rogaway}, editor = {Bart Preneel}, title = {Ciphers with Arbitrary Finite Domains}, booktitle = {Topics in Cryptology - {CT-RSA} 2002, The Cryptographer's Track at the {RSA} Conference, 2002, San Jose, CA, USA, February 18-22, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2271}, pages = {114--130}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45760-7\_9}, doi = {10.1007/3-540-45760-7\_9}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/BlackR02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BlackR02, author = {John Black and Phillip Rogaway}, editor = {Lars R. Knudsen}, title = {A Block-Cipher Mode of Operation for Parallelizable Message Authentication}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28 - May 2, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2332}, pages = {384--397}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-46035-7\_25}, doi = {10.1007/3-540-46035-7\_25}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BlackR02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/BlackRS02, author = {John Black and Phillip Rogaway and Thomas Shrimpton}, editor = {Kaisa Nyberg and Howard M. Heys}, title = {Encryption-Scheme Security in the Presence of Key-Dependent Messages}, booktitle = {Selected Areas in Cryptography, 9th Annual International Workshop, {SAC} 2002, St. John's, Newfoundland, Canada, August 15-16, 2002. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2595}, pages = {62--75}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36492-7\_6}, doi = {10.1007/3-540-36492-7\_6}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/BlackRS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlackRS02, author = {John Black and Phillip Rogaway and Thomas Shrimpton}, title = {Black-Box Analysis of the Block-Cipher-Based Hash-Function Constructions from {PGV}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {66}, year = {2002}, url = {http://eprint.iacr.org/2002/066}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlackRS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlackRS02a, author = {John Black and Phillip Rogaway and Thomas Shrimpton}, title = {Encryption-Scheme Security in the Presence of Key-Dependent Messages}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {100}, year = {2002}, url = {http://eprint.iacr.org/2002/100}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlackRS02a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Rogaway02, author = {Phillip Rogaway}, title = {The {EMD} Mode of Operation {(A} Tweaked, Wide-Blocksize, Strong {PRP)}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {148}, year = {2002}, url = {http://eprint.iacr.org/2002/148}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Rogaway02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/KilianR01, author = {Joe Kilian and Phillip Rogaway}, title = {How to Protect {DES} Against Exhaustive Key Search (an Analysis of {DESX)}}, journal = {J. Cryptol.}, volume = {14}, number = {1}, pages = {17--35}, year = {2001}, url = {https://doi.org/10.1007/s001450010015}, doi = {10.1007/S001450010015}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/KilianR01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/RogawayBBK01, author = {Phillip Rogaway and Mihir Bellare and John Black and Ted Krovetz}, editor = {Michael K. Reiter and Pierangela Samarati}, title = {{OCB:} a block-cipher mode of operation for efficient authenticated encryption}, booktitle = {{CCS} 2001, Proceedings of the 8th {ACM} Conference on Computer and Communications Security, Philadelphia, Pennsylvania, USA, November 6-8, 2001}, pages = {196--205}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/501983.502011}, doi = {10.1145/501983.502011}, timestamp = {Tue, 10 Nov 2020 20:00:35 +0100}, biburl = {https://dblp.org/rec/conf/ccs/RogawayBBK01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/AbdallaBR01, author = {Michel Abdalla and Mihir Bellare and Phillip Rogaway}, editor = {David Naccache}, title = {The Oracle Diffie-Hellman Assumptions and an Analysis of {DHIES}}, booktitle = {Topics in Cryptology - {CT-RSA} 2001, The Cryptographer's Track at {RSA} Conference 2001, San Francisco, CA, USA, April 8-12, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2020}, pages = {143--158}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45353-9\_12}, doi = {10.1007/3-540-45353-9\_12}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ctrsa/AbdallaBR01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlackR01, author = {John Black and Phillip Rogaway}, title = {Ciphers with Arbitrary Finite Domains}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {12}, year = {2001}, url = {http://eprint.iacr.org/2001/012}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlackR01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RogawayBBK01, author = {Phillip Rogaway and Mihir Bellare and John Black and Ted Krovetz}, title = {{OCB} Mode}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {26}, year = {2001}, url = {http://eprint.iacr.org/2001/026}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RogawayBBK01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlackR01a, author = {John Black and Phillip Rogaway}, title = {A Block-Cipher Mode of Operation for Parallelizable Message Authentication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {27}, year = {2001}, url = {http://eprint.iacr.org/2001/027}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlackR01a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcss/BellareKR00, author = {Mihir Bellare and Joe Kilian and Phillip Rogaway}, title = {The Security of the Cipher Block Chaining Message Authentication Code}, journal = {J. Comput. Syst. Sci.}, volume = {61}, number = {3}, pages = {362--399}, year = {2000}, url = {https://doi.org/10.1006/jcss.1999.1694}, doi = {10.1006/JCSS.1999.1694}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcss/BellareKR00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BellareR00, author = {Mihir Bellare and Phillip Rogaway}, editor = {Tatsuaki Okamoto}, title = {Encode-Then-Encipher Encryption: How to Exploit Nonces or Redundancy in Plaintexts for Efficient Cryptography}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2000, 6th International Conference on the Theory and Application of Cryptology and Information Security, Kyoto, Japan, December 3-7, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1976}, pages = {317--330}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44448-3\_24}, doi = {10.1007/3-540-44448-3\_24}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/BellareR00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BlackR00, author = {John Black and Phillip Rogaway}, editor = {Mihir Bellare}, title = {{CBC} MACs for Arbitrary-Length Messages: The Three-Key Constructions}, booktitle = {Advances in Cryptology - {CRYPTO} 2000, 20th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1880}, pages = {197--215}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44598-6\_12}, doi = {10.1007/3-540-44598-6\_12}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BlackR00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BellarePR00, author = {Mihir Bellare and David Pointcheval and Phillip Rogaway}, editor = {Bart Preneel}, title = {Authenticated Key Exchange Secure against Dictionary Attacks}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2000, International Conference on the Theory and Application of Cryptographic Techniques, Bruges, Belgium, May 14-18, 2000, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1807}, pages = {139--155}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-45539-6\_11}, doi = {10.1007/3-540-45539-6\_11}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BellarePR00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/KrovetzR00, author = {Ted Krovetz and Phillip Rogaway}, editor = {Dongho Won}, title = {Fast Universal Hashing with Small Keys and No Preprocessing: The PolyR Construction}, booktitle = {Information Security and Cryptology - {ICISC} 2000, Third International Conference, Seoul, Korea, December 8-9, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2015}, pages = {73--89}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-45247-8\_7}, doi = {10.1007/3-540-45247-8\_7}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/icisc/KrovetzR00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifipTCS/AbadiR00, author = {Mart{\'{\i}}n Abadi and Phillip Rogaway}, editor = {Jan van Leeuwen and Osamu Watanabe and Masami Hagiya and Peter D. Mosses and Takayasu Ito}, title = {Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption)}, booktitle = {Theoretical Computer Science, Exploring New Frontiers of Theoretical Informatics, International Conference {IFIP} {TCS} 2000, Sendai, Japan, August 17-19, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1872}, pages = {3--22}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44929-9\_1}, doi = {10.1007/3-540-44929-9\_1}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/ifipTCS/AbadiR00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BellarePR00, author = {Mihir Bellare and David Pointcheval and Phillip Rogaway}, title = {Authenticated Key Exchange Secure Against Dictionary Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {14}, year = {2000}, url = {http://eprint.iacr.org/2000/014}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BellarePR00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/Rogaway99, author = {Phillip Rogaway}, title = {Bucket Hashing and Its Application to Fast Message Authentication}, journal = {J. Cryptol.}, volume = {12}, number = {2}, pages = {91--115}, year = {1999}, url = {https://doi.org/10.1007/PL00003822}, doi = {10.1007/PL00003822}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/Rogaway99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BlackHKKR99, author = {John Black and Shai Halevi and Hugo Krawczyk and Ted Krovetz and Phillip Rogaway}, editor = {Michael J. Wiener}, title = {{UMAC:} Fast and Secure Message Authentication}, booktitle = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1666}, pages = {216--233}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48405-1\_14}, doi = {10.1007/3-540-48405-1\_14}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BlackHKKR99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BellareR99, author = {Mihir Bellare and Phillip Rogaway}, editor = {Lars R. Knudsen}, title = {On the Construction of Variable-Input-Length Ciphers}, booktitle = {Fast Software Encryption, 6th International Workshop, {FSE} '99, Rome, Italy, March 24-26, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1636}, pages = {231--244}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48519-8\_17}, doi = {10.1007/3-540-48519-8\_17}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/BellareR99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbdallaBR99, author = {Michel Abdalla and Mihir Bellare and Phillip Rogaway}, title = {{DHAES:} An Encryption Scheme Based on the Diffie-Hellman Problem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {7}, year = {1999}, url = {http://eprint.iacr.org/1999/007}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbdallaBR99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/RogawayC98, author = {Phillip Rogaway and Don Coppersmith}, title = {A Software-Optimized Encryption Algorithm}, journal = {J. Cryptol.}, volume = {11}, number = {4}, pages = {273--287}, year = {1998}, url = {https://doi.org/10.1007/s001459900048}, doi = {10.1007/S001459900048}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/RogawayC98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BellareDPR98, author = {Mihir Bellare and Anand Desai and David Pointcheval and Phillip Rogaway}, editor = {Hugo Krawczyk}, title = {Relations Among Notions of Security for Public-Key Encryption Schemes}, booktitle = {Advances in Cryptology - {CRYPTO} '98, 18th Annual International Cryptology Conference, Santa Barbara, California, USA, August 23-27, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1462}, pages = {26--45}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0055718}, doi = {10.1007/BFB0055718}, timestamp = {Tue, 01 Jun 2021 15:21:29 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BellareDPR98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BellareKR98, author = {Mihir Bellare and Ted Krovetz and Phillip Rogaway}, editor = {Kaisa Nyberg}, title = {Luby-Rackoff Backwards: Increasing Security by Making Block Ciphers Non-invertible}, booktitle = {Advances in Cryptology - {EUROCRYPT} '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31 - June 4, 1998, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1403}, pages = {266--280}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0054132}, doi = {10.1007/BFB0054132}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BellareKR98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BellareDPR98, author = {Mihir Bellare and Anand Desai and David Pointcheval and Phillip Rogaway}, title = {Relations among Notions of Security for Public-Key Encryption Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {21}, year = {1998}, url = {http://eprint.iacr.org/1998/021}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BellareDPR98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/BeaverFKR97, author = {Donald Beaver and Joan Feigenbaum and Joe Kilian and Phillip Rogaway}, title = {Locally Random Reductions: Improvements and Applications}, journal = {J. Cryptol.}, volume = {10}, number = {1}, pages = {17--36}, year = {1997}, url = {https://doi.org/10.1007/s001459900017}, doi = {10.1007/S001459900017}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/BeaverFKR97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BellareR97, author = {Mihir Bellare and Phillip Rogaway}, editor = {Burton S. Kaliski Jr.}, title = {Collision-Resistant Hashing: Towards Making UOWHFs Practical}, booktitle = {Advances in Cryptology - {CRYPTO} '97, 17th Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1294}, pages = {470--484}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0052256}, doi = {10.1007/BFB0052256}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BellareR97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/BellareDJR97, author = {Mihir Bellare and Anand Desai and E. Jokipii and Phillip Rogaway}, title = {A Concrete Security Treatment of Symmetric Encryption}, booktitle = {38th Annual Symposium on Foundations of Computer Science, {FOCS} '97, Miami Beach, Florida, USA, October 19-22, 1997}, pages = {394--403}, publisher = {{IEEE} Computer Society}, year = {1997}, url = {https://doi.org/10.1109/SFCS.1997.646128}, doi = {10.1109/SFCS.1997.646128}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/BellareDJR97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/BellareR97, author = {Mihir Bellare and Phillip Rogaway}, editor = {Yongfei Han and Tatsuaki Okamoto and Sihan Qing}, title = {Minimizing the use of random oracles in authenticated encryption schemes}, booktitle = {Information and Communication Security, First International Conference, ICICS'97, Beijing, China, November 11-14, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1334}, pages = {1--16}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0028457}, doi = {10.1007/BFB0028457}, timestamp = {Tue, 14 May 2019 10:00:37 +0200}, biburl = {https://dblp.org/rec/conf/icics/BellareR97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BellareR97, author = {Mihir Bellare and Phillip Rogaway}, title = {Collision-Resistant Hashing: Towards Making UOWHFs Practical}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {9}, year = {1997}, url = {http://eprint.iacr.org/1997/009}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BellareR97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KilianR96, author = {Joe Kilian and Phillip Rogaway}, editor = {Neal Koblitz}, title = {How to Protect {DES} Against Exhaustive Key Search}, booktitle = {Advances in Cryptology - {CRYPTO} '96, 16th Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1109}, pages = {252--267}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-68697-5\_20}, doi = {10.1007/3-540-68697-5\_20}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KilianR96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BellareR96, author = {Mihir Bellare and Phillip Rogaway}, editor = {Ueli M. Maurer}, title = {The Exact Security of Digital Signatures - HOw to Sign with {RSA} and Rabin}, booktitle = {Advances in Cryptology - {EUROCRYPT} '96, International Conference on the Theory and Application of Cryptographic Techniques, Saragossa, Spain, May 12-16, 1996, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1070}, pages = {399--416}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-68339-9\_34}, doi = {10.1007/3-540-68339-9\_34}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BellareR96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mp/BellareR95, author = {Mihir Bellare and Phillip Rogaway}, title = {The complexity of approximating a nonlinear program}, journal = {Math. Program.}, volume = {69}, pages = {429--441}, year = {1995}, url = {https://doi.org/10.1007/BF01585569}, doi = {10.1007/BF01585569}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mp/BellareR95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BellareGR95, author = {Mihir Bellare and Roch Gu{\'{e}}rin and Phillip Rogaway}, editor = {Don Coppersmith}, title = {{XOR} MACs: New Methods for Message Authentication Using Finite Pseudorandom Functions}, booktitle = {Advances in Cryptology - {CRYPTO} '95, 15th Annual International Cryptology Conference, Santa Barbara, California, USA, August 27-31, 1995, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {963}, pages = {15--28}, publisher = {Springer}, year = {1995}, url = {https://doi.org/10.1007/3-540-44750-4\_2}, doi = {10.1007/3-540-44750-4\_2}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BellareGR95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Rogaway95, author = {Phillip Rogaway}, editor = {Don Coppersmith}, title = {Bucket Hashing and its Application to Fast Message Authentication}, booktitle = {Advances in Cryptology - {CRYPTO} '95, 15th Annual International Cryptology Conference, Santa Barbara, California, USA, August 27-31, 1995, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {963}, pages = {29--42}, publisher = {Springer}, year = {1995}, url = {https://doi.org/10.1007/3-540-44750-4\_3}, doi = {10.1007/3-540-44750-4\_3}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Rogaway95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/BellareR95, author = {Mihir Bellare and Phillip Rogaway}, editor = {Frank Thomson Leighton and Allan Borodin}, title = {Provably secure session key distribution: the three party case}, booktitle = {Proceedings of the Twenty-Seventh Annual {ACM} Symposium on Theory of Computing, 29 May-1 June 1995, Las Vegas, Nevada, {USA}}, pages = {57--66}, publisher = {{ACM}}, year = {1995}, url = {https://doi.org/10.1145/225058.225084}, doi = {10.1145/225058.225084}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/BellareR95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BellareKR94, author = {Mihir Bellare and Joe Kilian and Phillip Rogaway}, editor = {Yvo Desmedt}, title = {The Security of Cipher Block Chaining}, booktitle = {Advances in Cryptology - {CRYPTO} '94, 14th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {839}, pages = {341--358}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/3-540-48658-5\_32}, doi = {10.1007/3-540-48658-5\_32}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BellareKR94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BellareR94, author = {Mihir Bellare and Phillip Rogaway}, editor = {Alfredo De Santis}, title = {Optimal Asymmetric Encryption}, booktitle = {Advances in Cryptology - {EUROCRYPT} '94, Workshop on the Theory and Application of Cryptographic Techniques, Perugia, Italy, May 9-12, 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {950}, pages = {92--111}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/BFb0053428}, doi = {10.1007/BFB0053428}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BellareR94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BellareR93, author = {Mihir Bellare and Phillip Rogaway}, editor = {Dorothy E. Denning and Raymond Pyle and Ravi Ganesan and Ravi S. Sandhu and Victoria Ashby}, title = {Random Oracles are Practical: {A} Paradigm for Designing Efficient Protocols}, booktitle = {{CCS} '93, Proceedings of the 1st {ACM} Conference on Computer and Communications Security, Fairfax, Virginia, USA, November 3-5, 1993}, pages = {62--73}, publisher = {{ACM}}, year = {1993}, url = {https://doi.org/10.1145/168588.168596}, doi = {10.1145/168588.168596}, timestamp = {Tue, 10 Nov 2020 20:00:40 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BellareR93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BellareR93, author = {Mihir Bellare and Phillip Rogaway}, editor = {Douglas R. Stinson}, title = {Entity Authentication and Key Distribution}, booktitle = {Advances in Cryptology - {CRYPTO} '93, 13th Annual International Cryptology Conference, Santa Barbara, California, USA, August 22-26, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {773}, pages = {232--249}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-48329-2\_21}, doi = {10.1007/3-540-48329-2\_21}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BellareR93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/RogawayC93, author = {Phillip Rogaway and Don Coppersmith}, editor = {Ross J. Anderson}, title = {A Software-Optimised Encryption Algorithm}, booktitle = {Fast Software Encryption, Cambridge Security Workshop, Cambridge, UK, December 9-11, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {809}, pages = {56--63}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-58108-1\_8}, doi = {10.1007/3-540-58108-1\_8}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/RogawayC93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/MicaliR91, author = {Silvio Micali and Phillip Rogaway}, editor = {Joan Feigenbaum}, title = {Secure Computation (Abstract)}, booktitle = {Advances in Cryptology - {CRYPTO} '91, 11th Annual International Cryptology Conference, Santa Barbara, California, USA, August 11-15, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {576}, pages = {392--404}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-46766-1\_32}, doi = {10.1007/3-540-46766-1\_32}, timestamp = {Fri, 17 Jul 2020 16:12:45 +0200}, biburl = {https://dblp.org/rec/conf/crypto/MicaliR91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BeaverFKR90, author = {Donald Beaver and Joan Feigenbaum and Joe Kilian and Phillip Rogaway}, editor = {Alfred Menezes and Scott A. Vanstone}, title = {Security with Low Communication Overhead}, booktitle = {Advances in Cryptology - {CRYPTO} '90, 10th Annual International Cryptology Conference, Santa Barbara, California, USA, August 11-15, 1990, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {537}, pages = {62--76}, publisher = {Springer}, year = {1990}, url = {https://doi.org/10.1007/3-540-38424-3\_5}, doi = {10.1007/3-540-38424-3\_5}, timestamp = {Fri, 17 Jul 2020 16:12:45 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BeaverFKR90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/BeaverMR90, author = {Donald Beaver and Silvio Micali and Phillip Rogaway}, editor = {Harriet Ortiz}, title = {The Round Complexity of Secure Protocols (Extended Abstract)}, booktitle = {Proceedings of the 22nd Annual {ACM} Symposium on Theory of Computing, May 13-17, 1990, Baltimore, Maryland, {USA}}, pages = {503--513}, publisher = {{ACM}}, year = {1990}, url = {https://doi.org/10.1145/100216.100287}, doi = {10.1145/100216.100287}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/BeaverMR90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Ben-OrGGHKMR88, author = {Michael Ben{-}Or and Oded Goldreich and Shafi Goldwasser and Johan H{\aa}stad and Joe Kilian and Silvio Micali and Phillip Rogaway}, editor = {Shafi Goldwasser}, title = {Everything Provable is Provable in Zero-Knowledge}, booktitle = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {403}, pages = {37--56}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/0-387-34799-2\_4}, doi = {10.1007/0-387-34799-2\_4}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Ben-OrGGHKMR88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.