Phillip Rogaway
Affiliations:- University of California, Davis, USA
According to our database1,
Phillip Rogaway
authored at least 101 papers
between 1988 and 2022.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on id.loc.gov
-
on d-nb.info
On csauthors.net:
Bibliography
2022
2021
2020
Reimagining Secret Sharing: Creating a Safer and More Versatile Primitive by Adding Authenticity, Correcting Errors, and Reducing Randomness Requirements.
Proc. Priv. Enhancing Technol., 2020
2019
2018
Simplifying Game-Based Definitions: Indistinguishability up to Correctness and Its Application to Stateful AE.
IACR Cryptol. ePrint Arch., 2018
2017
Proceedings of the Progress in Cryptology - LATINCRYPT 2017, 2017
2016
IEEE Secur. Priv., 2016
IACR Cryptol. ePrint Arch., 2016
2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
2014
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
Privacy and Security in an Age of Surveillance (Dagstuhl Perspectives Workshop 14401).
Dagstuhl Reports, 2014
2013
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
2012
Adaptively Secure Garbling with Applications to One-Time Programs and Secure Outsourcing.
IACR Cryptol. ePrint Arch., 2012
Proceedings of the Fast Software Encryption - 19th International Workshop, 2012
Proceedings of the Advances in Cryptology - CRYPTO 2012, 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
2011
Proceedings of the Fast Software Encryption - 18th International Workshop, 2011
Proceedings of the Topics in Cryptology - CT-RSA 2011, 2011
2010
2009
Proceedings of the Symmetric Cryptography, 11.01. - 16.01.2009, 2009
Proceedings of the Symmetric Cryptography, 11.01. - 16.01.2009, 2009
Authentication without Elision: Partially Specified Protocols, Associated Data, and Cryptographic Models Described by Code.
Proceedings of the 22nd IEEE Computer Security Foundations Symposium, 2009
Proceedings of the Advances in Cryptology, 2009
2008
Proceedings of the Advances in Cryptology, 2008
Proceedings of the Advances in Cryptology, 2008
2007
Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption).
J. Cryptol., 2007
2006
Deterministic Authenticated-Encryption: A Provable-Security Treatment of the Key-Wrap Problem.
IACR Cryptol. ePrint Arch., 2006
IACR Cryptol. ePrint Arch., 2006
Robust Computational Secret Sharing and a Unified Account of Classical Secret-Sharing Goals.
IACR Cryptol. ePrint Arch., 2006
Proceedings of the Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28, 2006
The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs.
Proceedings of the Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28, 2006
2005
J. Cryptol., 2005
Proceedings of the Advances in Cryptology, 2005
2004
Cryptographic Hash-Function Basics: Definitions, Implications and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision Resistance.
IACR Cryptol. ePrint Arch., 2004
IACR Cryptol. ePrint Arch., 2004
Proceedings of the Fast Software Encryption, 11th International Workshop, 2004
Proceedings of the Fast Software Encryption, 11th International Workshop, 2004
Proceedings of the Advances in Computer Science, 2004
Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC.
Proceedings of the Advances in Cryptology, 2004
2003
ACM Trans. Inf. Syst. Secur., 2003
2002
IACR Cryptol. ePrint Arch., 2002
IACR Cryptol. ePrint Arch., 2002
IACR Cryptol. ePrint Arch., 2002
Proceedings of the 9th ACM Conference on Computer and Communications Security, 2002
2001
J. Cryptol., 2001
IACR Cryptol. ePrint Arch., 2001
Proceedings of the Topics in Cryptology, 2001
Proceedings of the CCS 2001, 2001
2000
J. Comput. Syst. Sci., 2000
IACR Cryptol. ePrint Arch., 2000
Proceedings of the Information Security and Cryptology, 2000
Encode-Then-Encipher Encryption: How to Exploit Nonces or Redundancy in Plaintexts for Efficient Cryptography.
Proceedings of the Advances in Cryptology, 2000
1999
IACR Cryptol. ePrint Arch., 1999
Proceedings of the Fast Software Encryption, 6th International Workshop, 1999
Proceedings of the Advances in Cryptology, 1999
1998
IACR Cryptol. ePrint Arch., 1998
Proceedings of the Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31, 1998
1997
IACR Cryptol. ePrint Arch., 1997
Proceedings of the Information and Communication Security, First International Conference, 1997
Proceedings of the 38th Annual Symposium on Foundations of Computer Science, 1997
1996
Proceedings of the Advances in Cryptology, 1996
Proceedings of the Advances in Cryptology, 1996
1995
Proceedings of the Twenty-Seventh Annual ACM Symposium on Theory of Computing, 1995
XOR MACs: New Methods for Message Authentication Using Finite Pseudorandom Functions.
Proceedings of the Advances in Cryptology, 1995
1994
Proceedings of the Advances in Cryptology, 1994
1993
Proceedings of the Fast Software Encryption, 1993
Proceedings of the Advances in Cryptology, 1993
Proceedings of the CCS '93, 1993
1991
1990
Proceedings of the 22nd Annual ACM Symposium on Theory of Computing, 1990
Proceedings of the Advances in Cryptology, 1990
1988
Proceedings of the Advances in Cryptology, 1988