H-Index & Metrics Top Publications

H-Index & Metrics

Discipline name H-index Citations Publications World Ranking National Ranking
Computer Science H-index 72 Citations 39,621 116 World Ranking 724 National Ranking 442

Research.com Recognitions

Awards & Achievements

2009 - ACM Paris Kanellakis Theory and Practice Award For their development of the field of Practice-Oriented Provable-Security and its widespread impact on the theory and practice of cryptography and security.

Overview

What is he best known for?

The fields of study he is best known for:

  • Cryptography
  • Programming language
  • Algorithm

His primary areas of investigation include Theoretical computer science, Computer security, Cryptography, Encryption and Provable security. His study in Theoretical computer science is interdisciplinary in nature, drawing from both CBC-MAC, Triple DES, Hash function, Probabilistic encryption and Concrete security. His CBC-MAC research is multidisciplinary, relying on both Discrete mathematics and Authenticated encryption.

His work in the fields of Computer security, such as Plaintext and Public-key cryptography, intersects with other areas such as Authenticated Key Exchange and Function. His study looks at the relationship between Cryptography and fields such as Key, as well as how they intersect with chemical problems. His Provable security study integrates concerns from other disciplines, such as Computational hardness assumption and Pseudorandom function family.

His most cited work include:

  • Random oracles are practical: a paradigm for designing efficient protocols (4108 citations)
  • Entity authentication and key distribution (1580 citations)
  • Authenticated key exchange secure against dictionary attacks (1233 citations)

What are the main themes of his work throughout his whole career to date?

Phillip Rogaway mainly focuses on Theoretical computer science, Encryption, Cryptography, Computer security and Block cipher. Phillip Rogaway interconnects Provable security, Hash function, Symmetric-key algorithm, Message authentication code and Concrete security in the investigation of issues within Theoretical computer science. His Encryption study frequently involves adjacent topics like Key.

His Cryptographic primitive study, which is part of a larger body of work in Cryptography, is frequently linked to Simple, bridging the gap between disciplines. He has included themes like Discrete mathematics, Padding, Parallel computing and Block cipher mode of operation in his Block cipher study. His research investigates the connection between Block cipher mode of operation and topics such as CBC-MAC that intersect with problems in Adversary.

He most often published in these fields:

  • Theoretical computer science (47.94%)
  • Encryption (41.24%)
  • Cryptography (32.47%)

What were the highlights of his more recent work (between 2010-2020)?

  • Encryption (41.24%)
  • Theoretical computer science (47.94%)
  • Computer security (23.20%)

In recent papers he was focusing on the following fields of study:

His main research concerns Encryption, Theoretical computer science, Computer security, Authenticated encryption and Cryptography. His work in Encryption covers topics such as Scheme which are related to areas like Confidentiality. His research in Theoretical computer science intersects with topics in Key, Symmetric-key algorithm and String.

His studies deal with areas such as Abstraction and Internet privacy as well as Computer security. His study on Authenticated encryption also encompasses disciplines like

  • Cryptographic nonce that connect with fields like Parallel computing,
  • Plaintext and related Ciphertext. His study on Concrete security and Provable security is often connected to Character and Field as part of broader study in Cryptography.

Between 2010 and 2020, his most popular works were:

  • Foundations of garbled circuits (322 citations)
  • Efficient Garbling from a Fixed-Key Blockcipher (215 citations)
  • The software performance of authenticated-encryption modes (149 citations)

In his most recent research, the most cited papers focused on:

  • Cryptography
  • Programming language
  • Algorithm

The scientist’s investigation covers issues in Encryption, Computer security, Theoretical computer science, Scheme and Authenticated encryption. Phillip Rogaway combines topics linked to Algorithm with his work on Encryption. In the field of Computer security, his study on Adaptive security, Security parameter and Cryptographic primitive overlaps with subjects such as Simple and Outsourcing.

His studies in Theoretical computer science integrate themes in fields like Discrete mathematics, Ciphertext, Provable security, Cryptography and Round function. His work deals with themes such as Random permutation, Key and Artificial intelligence, which intersect with Cryptography. His work in the fields of Concrete security overlaps with other areas such as The Internet and Composition.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Top Publications

Random oracles are practical: a paradigm for designing efficient protocols

Mihir Bellare;Phillip Rogaway.
computer and communications security (1993)

5470 Citations

Entity authentication and key distribution

Mihir Bellare;Phillip Rogaway.
international cryptology conference (1993)

2040 Citations

Authenticated key exchange secure against dictionary attacks

Mihir Bellare;David Pointcheval;Phillip Rogaway.
theory and application of cryptographic techniques (2000)

1674 Citations

Optimal asymmetric encryption

Mihir Bellare;Phillip Rogaway.
theory and application of cryptographic techniques (1994)

1614 Citations

Relations Among Notions of Security for Public-Key Encryption Schemes

Mihir Bellare;Anand Desai;David Pointcheval;David Pointcheval;Phillip Rogaway.
international cryptology conference (1998)

1399 Citations

A concrete security treatment of symmetric encryption

M. Bellare;A. Desai;E. Jokipii;P. Rogaway.
foundations of computer science (1997)

1274 Citations

The exact security of digital signatures-how to sign with RSA and Rabin

Mihir Bellare;Phillip Rogaway.
theory and application of cryptographic techniques (1996)

1234 Citations

OCB: a block-cipher mode of operation for efficient authenticated encryption

Phillip Rogaway;Mihir Bellare;John Black;Ted Krovetz.
computer and communications security (2001)

864 Citations

OCB: A block-cipher mode of operation for efficient authenticated encryption

Phillip Rogaway;Mihir Bellare;John Black.
ACM Transactions on Information and System Security (2003)

863 Citations

Provably secure session key distribution: the three party case

Mihir Bellare;Phillip Rogaway.
symposium on the theory of computing (1995)

807 Citations

Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking h-index is inferred from publications deemed to belong to the considered discipline.

If you think any of the details on this page are incorrect, let us know.

Contact us

Top Scientists Citing Phillip Rogaway

David Pointcheval

David Pointcheval

École Normale Supérieure

Publications: 137

Mihir Bellare

Mihir Bellare

University of California, San Diego

Publications: 131

Willy Susilo

Willy Susilo

University of Wollongong

Publications: 98

Jonathan Katz

Jonathan Katz

University of Maryland, College Park

Publications: 96

Moti Yung

Moti Yung

Columbia University

Publications: 79

Ran Canetti

Ran Canetti

Boston University

Publications: 78

Marc Fischlin

Marc Fischlin

TU Darmstadt

Publications: 78

Yi Mu

Yi Mu

Fujian Normal University

Publications: 77

Bart Preneel

Bart Preneel

KU Leuven

Publications: 76

Dan Boneh

Dan Boneh

Stanford University

Publications: 72

Yevgeniy Dodis

Yevgeniy Dodis

New York University

Publications: 71

Benoît Libert

Benoît Libert

École Normale Supérieure de Lyon

Publications: 70

Hideki Imai

Hideki Imai

Chuo University

Publications: 70

Colin Boyd

Colin Boyd

Norwegian University of Science and Technology

Publications: 68

Zhenfu Cao

Zhenfu Cao

East China Normal University

Publications: 65

Something went wrong. Please try again later.