scispace - formally typeset
P

Phillip Rogaway

Researcher at University of California, Davis

Publications -  183
Citations -  35371

Phillip Rogaway is an academic researcher from University of California, Davis. The author has contributed to research in topics: Encryption & Cryptography. The author has an hindex of 85, co-authored 182 publications receiving 33414 citations. Previous affiliations of Phillip Rogaway include Chiang Mai University & University of California.

Papers
More filters
Proceedings ArticleDOI

Random oracles are practical: a paradigm for designing efficient protocols

TL;DR: It is argued that the random oracles model—where all parties have access to a public random oracle—provides a bridge between cryptographic theory and cryptographic practice, and yields protocols much more efficient than standard ones while retaining many of the advantages of provable security.
Book ChapterDOI

Entity authentication and key distribution

TL;DR: This work provides the first formal treatment of entity authentication and authenticated key distribution appropriate to the distributed environment and presents a definition, protocol, and proof that the protocol meets its goal, assuming only the existence of a pseudorandom function.
Book ChapterDOI

Authenticated key exchange secure against dictionary attacks

TL;DR: Correctness for the idea at the center of the Encrypted Key-Exchange protocol of Bellovin and Merritt is proved: it is proved security, in an ideal-cipher model, of the two-flow protocol at the core of EKE.
Proceedings ArticleDOI

A concrete security treatment of symmetric encryption

TL;DR: This work studies notions and schemes for symmetric (ie. private key) encryption in a concrete security framework and gives four different notions of security against chosen plaintext attack, providing both upper and lower bounds, and obtaining tight relations.
Book ChapterDOI

The exact security of digital signatures-how to sign with RSA and Rabin

TL;DR: An RSA-based signing scheme which combines essentially optimal efficiency with attractive security properties and a second scheme which maintains all of the above features and in addition provides message recovery is provided.