DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» Phillip Rogaway
Phillip Rogaway
Substitution-Permutation Networks, Pseudorandom Functions, and Natural Proofs∗
1 Review of Counter-Mode Encryption ¡
Lecture Notes in Computer Science 6841 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan Van Leeuwen
Secure Image Transferring Using Asymmetric Crypto System
Identity-Based Format-Preserving Encryption
Tweakable Block Ciphers
Protecting Communications Against Forgery
How to Protect DES Against Exhaustive Key Search (An Analysis of DESX)
Privacy-Preserving Shortest Path Computation (Extended Version)
Substring-Searchable Symmetric Encryption
The Moral Character of Cryptographic Work⋆
Proofs of Space
Contents U U U
CTR-Mode Encryption
Arxiv:1907.07896V1 [Cs.CR]
Research and Teaching: Phillip Rogaway for Further Information Visit
Introduction to Modern Cryptography
Publicly Verifiable Proofs of Sequential Work
Top View
IACR Petition on Australia's Defence Trade Controls Act 15/07/15 8:37
Message Franking Via Committing Authenticated Encryption
A Block-Cipher Mode of Operation for Parallelizable Message Authentication
RSA-OAEP Encryption Scheme / Chapter 1
Phillip Rogaway
Notation and Sources of Quotations, Images, and Ornaments
On the Lossiness of the Rabin Trapdoor Function⋆
On Adaptive Security of Delayed-Input Sigma Protocols and Fiat-Shamir Nizks
A Simple and Generic Construction of Authenticated Encryption with Associated Data
48Th International Colloquium on Automata, Languages, and Programming
Author Index
Julius: Secure Mode of Operation for Authenticated Encryption Based on ECB and Nite Eld Multiplications
SAT-Based Finite Model Generation for Higher-Order Logic
Phillip Rogaway
[email protected]
Introduction to Modern Cryptography
Signing with Partially Adversarial Hashing 1 Introduction
The Moral Character of Cryptographic Work⋆
How to Generate Pseudorandom Permutations Over Other Groups: Even-Mansour and Feistel Revisited