Random oracles are practical: A paradigm for designing efficient protocols M Bellare, P Rogaway Proceedings of the 1st ACM Conference on Computer and Communications …, 1993 | 6541 | 1993 |
Entity authentication and key distribution M Bellare, P Rogaway Annual international cryptology conference, 232-249, 1993 | 2344 | 1993 |
Authenticated key exchange secure against dictionary attacks M Bellare, D Pointcheval, P Rogaway International conference on the theory and applications of cryptographic …, 2000 | 2008 | 2000 |
Optimal asymmetric encryption M Bellare, P Rogaway Advances in Cryptology—EUROCRYPT'94: Workshop on the Theory and Application …, 1995 | 1831 | 1995 |
Relations among notions of security for public-key encryption schemes M Bellare, A Desai, D Pointcheval, P Rogaway Advances in Cryptology—CRYPTO'98: 18th Annual International Cryptology …, 1998 | 1544 | 1998 |
A concrete security treatment of symmetric encryption M Bellare, A Desai, E Jokipii, P Rogaway Proceedings 38th Annual Symposium on Foundations of Computer Science, 394-403, 1997 | 1509 | 1997 |
The exact security of digital signatures-How to sign with RSA and Rabin M Bellare, P Rogaway International conference on the theory and applications of cryptographic …, 1996 | 1382 | 1996 |
The round complexity of secure protocols D Beaver, S Micali, P Rogaway Proceedings of the twenty-second annual ACM symposium on Theory of computing …, 1990 | 1038 | 1990 |
OCB: A block-cipher mode of operation for efficient authenticated encryption P Rogaway, M Bellare, J Black ACM Transactions on Information and System Security (TISSEC) 6 (3), 365-403, 2003 | 1012 | 2003 |
The security of triple encryption and a framework for code-based game-playing proofs M Bellare, P Rogaway Annual International Conference on the Theory and Applications of …, 2006 | 971 | 2006 |
Cryptographic hash-function basics: Definitions, implications, and separations for preimage resistance, second-preimage resistance, and collision resistance P Rogaway, T Shrimpton Fast Software Encryption: 11th International Workshop, FSE 2004, Delhi …, 2004 | 925 | 2004 |
Provably secure session key distribution: the three party case M Bellare, P Rogaway Proceedings of the twenty-seventh annual ACM symposium on Theory of …, 1995 | 851 | 1995 |
The security of the cipher block chaining message authentication code M Bellare, J Kilian, P Rogaway Journal of Computer and System Sciences 61 (3), 362-399, 2000 | 750 | 2000 |
Foundations of garbled circuits M Bellare, VT Hoang, P Rogaway Proceedings of the 2012 ACM conference on Computer and communications …, 2012 | 700 | 2012 |
Authenticated-encryption with associated-data P Rogaway Proceedings of the 9th ACM Conference on Computer and Communications …, 2002 | 687 | 2002 |
UMAC: Fast and secure message authentication J Black, S Halevi, H Krawczyk, T Krovetz, P Rogaway Advances in Cryptology—CRYPTO’99: 19th Annual International Cryptology …, 1999 | 649 | 1999 |
The security of cipher block chaining M Bellare, J Kilian, P Rogaway Annual International Cryptology Conference, 341-358, 1994 | 646 | 1994 |
The oracle Diffie-Hellman assumptions and an analysis of DHIES M Abdalla, M Bellare, P Rogaway Topics in Cryptology—CT-RSA 2001: The Cryptographers’ Track at RSA …, 2001 | 599 | 2001 |
Efficient instantiations of tweakable blockciphers and refinements to modes OCB and PMAC P Rogaway International Conference on the Theory and Application of Cryptology and …, 2004 | 584 | 2004 |
Secure computation S Micali, P Rogaway Advances in Cryptology—CRYPTO’91: Proceedings 11, 392-404, 1992 | 541 | 1992 |