2009 - ACM Paris Kanellakis Theory and Practice Award For their development of the field of Practice-Oriented Provable-Security and its widespread impact on the theory and practice of cryptography and security.
Much of his study explores Computer security relationship to Triple DES. Phillip Rogaway incorporates Theoretical computer science and Programming language in his research. His study deals with a combination of Programming language and Theoretical computer science. Encryption and Cipher are two areas of study in which he engages in interdisciplinary research. He integrates Cryptography and Hash function in his research. In his research, Phillip Rogaway undertakes multidisciplinary study on Hash function and Algorithm. His work on Algorithm is being expanded to include thematically relevant topics such as Pseudorandom function family. His Pseudorandom function family study frequently draws connections between related disciplines such as Pseudorandom number generator. Pseudorandom number generator and Block cipher are two areas of study in which he engages in interdisciplinary research.
Many of his studies on Computer security involve topics that are commonly interrelated, such as Key (lock). His research ties Computer security and Key (lock) together. He connects Theoretical computer science with Programming language in his study. Phillip Rogaway undertakes interdisciplinary study in the fields of Programming language and Theoretical computer science through his works. Encryption and Cryptographic nonce are frequently intertwined in his study. In his articles, Phillip Rogaway combines various disciplines, including Cryptography and Message authentication code. Borrowing concepts from Cryptography, he weaves in ideas under Message authentication code. He combines Algorithm and Pseudorandom number generator in his research. He combines Hash function and Double hashing in his studies.
His study explores the link between Dimension (graph theory) and topics such as Pure mathematics that cross with problems in Field (mathematics). Phillip Rogaway combines topics linked to Pure mathematics with his work on Field (mathematics). His study explores the link between Abstraction and topics such as Epistemology that cross with problems in Simple (philosophy). His research links Epistemology with Simple (philosophy). His work blends Encryption and Secure channel studies together. He merges Secure channel with Encryption in his study. Phillip Rogaway connects Computer security with Internet privacy in his study. By researching both Internet privacy and Computer security, Phillip Rogaway produces research that crosses academic boundaries. His multidisciplinary approach integrates Authenticated encryption and Semantic security in his work.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Random oracles are practical: a paradigm for designing efficient protocols
Mihir Bellare;Phillip Rogaway.
computer and communications security (1993)
Entity authentication and key distribution
Mihir Bellare;Phillip Rogaway.
international cryptology conference (1993)
Relations Among Notions of Security for Public-Key Encryption Schemes
Mihir Bellare;Anand Desai;David Pointcheval;David Pointcheval;Phillip Rogaway.
international cryptology conference (1998)
Authenticated Key Exchange Secure Against Dictionary Attacks.
Mihir Bellare;David Pointcheval;Phillip Rogaway.
IACR Cryptology ePrint Archive (2000)
The security of triple encryption and a framework for code-based game-playing proofs
Mihir Bellare;Phillip Rogaway.
Lecture Notes in Computer Science (2006)
Optimal asymmetric encryption
Mihir Bellare;Phillip Rogaway.
theory and application of cryptographic techniques (1994)
Authenticated key exchange secure against dictionary attacks
Mihir Bellare;David Pointcheval;Phillip Rogaway.
theory and application of cryptographic techniques (2000)
A concrete security treatment of symmetric encryption
M. Bellare;A. Desai;E. Jokipii;P. Rogaway.
foundations of computer science (1997)
The exact security of digital signatures-how to sign with RSA and Rabin
Mihir Bellare;Phillip Rogaway.
theory and application of cryptographic techniques (1996)
Cryptographic hash-function basics: Definitions, implications, and separations for preimage resistance, second-preimage resistance, and collision resistance
Phillip Rogaway;Thomas Shrimpton.
Lecture Notes in Computer Science (2004)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below:
University of California, San Diego
IBM (United States)
École Normale Supérieure
University of California, Berkeley
Algorand Foundation
ETH Zurich
Cornell University
MIT
Algorand Foundation
École Normale Supérieure
Rutgers, The State University of New Jersey
KU Leuven
University of Michigan–Ann Arbor
University of Science and Technology of China
University of Barcelona
Spanish National Research Council
Kyungpook National University
Chinese Academy of Sciences
Shahed University
City University of New York
Van Andel Institute
Université Catholique de Louvain
Maastricht University
Université Laval
Academia Sinica
University of Basel