DOCSLIB.ORG
  • Sign Up
  • Log In
  • Upload
  • Sign Up
  • Log In
  • Upload
  • Home
  • »  Tags
  • »  Phillip Rogaway

Phillip Rogaway

  • Substitution-Permutation Networks, Pseudorandom Functions, and Natural Proofs∗

    Substitution-Permutation Networks, Pseudorandom Functions, and Natural Proofs∗

  • 1 Review of Counter-Mode Encryption ¡

    1 Review of Counter-Mode Encryption ¡

  • Lecture Notes in Computer Science 6841 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan Van Leeuwen

    Lecture Notes in Computer Science 6841 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan Van Leeuwen

  • Secure Image Transferring Using Asymmetric Crypto System

    Secure Image Transferring Using Asymmetric Crypto System

  • Identity-Based Format-Preserving Encryption

    Identity-Based Format-Preserving Encryption

  • Tweakable Block Ciphers

    Tweakable Block Ciphers

  • Protecting Communications Against Forgery

    Protecting Communications Against Forgery

  • How to Protect DES Against Exhaustive Key Search (An Analysis of DESX)

    How to Protect DES Against Exhaustive Key Search (An Analysis of DESX)

  • Privacy-Preserving Shortest Path Computation (Extended Version)

    Privacy-Preserving Shortest Path Computation (Extended Version)

  • Substring-Searchable Symmetric Encryption

    Substring-Searchable Symmetric Encryption

  • The Moral Character of Cryptographic Work⋆

    The Moral Character of Cryptographic Work⋆

  • Proofs of Space

    Proofs of Space

  • Contents U U U

    Contents U U U

  • CTR-Mode Encryption

    CTR-Mode Encryption

  • Arxiv:1907.07896V1 [Cs.CR]

    Arxiv:1907.07896V1 [Cs.CR]

  • Research and Teaching: Phillip Rogaway for Further Information Visit

    Research and Teaching: Phillip Rogaway for Further Information Visit

  • Introduction to Modern Cryptography

    Introduction to Modern Cryptography

  • Publicly Verifiable Proofs of Sequential Work

    Publicly Verifiable Proofs of Sequential Work

Top View
  • IACR Petition on Australia's Defence Trade Controls Act 15/07/15 8:37
  • Message Franking Via Committing Authenticated Encryption
  • A Block-Cipher Mode of Operation for Parallelizable Message Authentication
  • RSA-OAEP Encryption Scheme / Chapter 1
  • Phillip Rogaway
  • Notation and Sources of Quotations, Images, and Ornaments
  • On the Lossiness of the Rabin Trapdoor Function⋆
  • On Adaptive Security of Delayed-Input Sigma Protocols and Fiat-Shamir Nizks
  • A Simple and Generic Construction of Authenticated Encryption with Associated Data
  • 48Th International Colloquium on Automata, Languages, and Programming
  • Author Index
  • Julius: Secure Mode of Operation for Authenticated Encryption Based on ECB and Nite Eld Multiplications
  • SAT-Based Finite Model Generation for Higher-Order Logic
  • Phillip Rogaway [email protected]
  • Introduction to Modern Cryptography
  • Signing with Partially Adversarial Hashing 1 Introduction
  • The Moral Character of Cryptographic Work⋆
  • How to Generate Pseudorandom Permutations Over Other Groups: Even-Mansour and Feistel Revisited


© 2024 Docslib.org    Feedback