Rogaway, Phillip
39  results:
Search for persons X
?
1

On Committing Authenticated-Encryption:

, In: Computer Security – ESORICS 2022; Lecture Notes in Computer Science,
Chan, John ; Rogaway, Phillip - p. 275-294 , 2022
 
?
2

The Design and Evolution of OCB:

Krovetz, Ted ; Rogaway, Phillip
Journal of Cryptology.  34 (2021)  4 - p. , 2021
 
?
4

Reimagining Secret Sharing: Creating a Safer and More Versa..:

Bellare, Mihir ; Dai, Wei ; Rogaway, Phillip
Proceedings on Privacy Enhancing Technologies.  2020 (2020)  4 - p. 461-490 , 2020
 
?
5

Anonymous AE:

, In: Lecture Notes in Computer Science; Advances in Cryptology – ASIACRYPT 2019,
Chan, John ; Rogaway, Phillip - p. 183-208 , 2019
 
?
6

An Obsession with Definitions:

, In: Progress in Cryptology – LATINCRYPT 2017; Lecture Notes in Computer Science,
Rogaway, Phillip - p. 3-20 , 2019
 
?
7

Simplifying Game-Based Definitions: Indistinguishability up..:

, In: Lecture Notes in Computer Science; Advances in Cryptology – CRYPTO 2018,
Rogaway, Phillip ; Zhang, Yusi - p. 3-32 , 2018
 
?
8

Onion-AE: Foundations of Nested Encryption:

Rogaway, Phillip ; Zhang, Yusi
Proceedings on Privacy Enhancing Technologies.  2018 (2018)  2 - p. 85-104 , 2018
 
?
 
?
10

Practice-Oriented Provable Security and the Social Construc..:

Rogaway, Phillip
IEEE Security & Privacy.  14 (2016)  6 - p. 10-17 , 2016
 
?
11

Efficient Garbling from a Fixed-Key Blockcipher:

, In: 2013 IEEE Symposium on Security and Privacy,
 
?
12

Foundations of garbled circuits:

, In: Proceedings of the 2012 ACM conference on Computer and communications security,
 
?
13

Advances in cryptology - CRYPTO 2011 

31st Annual Cryptology Conference, Santa Barbara, CA, USA, ...  Lecture notes in computer science ; 6841
 
?
14

Robust computational secret sharing and a unified account o..:

, In: Proceedings of the 14th ACM conference on Computer and communications security,
Bellare, Mihir ; Rogaway, Phillip - p. 172-184 , 2007
 
1-15