Global Information Lookup Global Information

Phillip Rogaway information


Phillip Rogaway (also referred to as Phil Rogaway[1][2]) is an American cryptographer who is a professor of computer science at the University of California, Davis. He graduated from Beverly Hills High School, and later earned a BA in computer science from UC Berkeley and completed his PhD in cryptography at MIT, in the Theory of Computation group. He has taught at UC Davis since 1994. He was awarded the Paris Kanellakis Award in 2009[3] and the first Levchin Prize for Real World Cryptography in 2016.[4] Rogaway received an NSF CAREER award in 1996, which the NSA had attempted to prevent by influencing the NSF.[5]

He has been interviewed in multiple media outlets[6] regarding his stance[7] on the ethical obligations that cryptographers and computer scientists have to serve to the public good,[8] specifically in the areas of internet privacy and digital surveillance.[9]

Rogaway's papers cover topics including:

  • CMAC
  • Concrete security
  • DES and DES-X
  • Format-preserving encryption
  • OCB mode
  • Random oracle model
  • SEAL
  • UMAC
  • Zero-knowledge proofs
  1. ^ Rogaway, Phil. "Phil Rogaway - Students". Archived from the original on 7 April 2024. Retrieved 7 April 2024.
  2. ^ "Phil Rogaway, 2012 IACR Fellow". IACR. International Association for Cryptologic Research. Retrieved 10 April 2024.
  3. ^ "ACM Awards Recognize Computer Scientists for Innovations that Have Real World Impact" (Press release). Association for Computing Machinery. 2010-03-30. Archived from the original on 2012-12-02. Retrieved 2014-06-04.
  4. ^ "The Levchin Prize for Real-World Cryptography". Real World Crypto Symposium. International Association for Cryptologic Research. Retrieved 9 April 2024.
  5. ^ "The Moral Character of Cryptographic Work" (PDF) (Press release). December 2015. p. 37. Retrieved 2017-06-09.
  6. ^ Naughton, John. "Algorithm writers need a code of conduct". The Guardian. Guardian News and Media Limited. Retrieved 12 December 2015.
  7. ^ Rogaway, Phillip. "The Moral Character of Cryptographic Work?" (PDF). Retrieved 12 December 2015.
  8. ^ Waddell, Kaveh (11 December 2015). "The Moral Failure of Computer Scientists". The Atlantic. Atlantic Media Company. Retrieved 12 December 2015.
  9. ^ Bereznak, Alyssa. "Encryption wars heating up in wake of terror attacks". Yahoo. Yahoo News. Retrieved 12 December 2015.

and 19 Related for: Phillip Rogaway information

Request time (Page generated in 0.8156 seconds.)

Phillip Rogaway

Last Update:

Phillip Rogaway (also referred to as Phil Rogaway) is an American cryptographer who is a professor of computer science at the University of California...

Word Count : 349

OCB mode

Last Update:

operation for cryptographic block ciphers. OCB mode was designed by Phillip Rogaway, who credits Mihir Bellare, John Black, and Ted Krovetz with assistance...

Word Count : 835

Probabilistic signature scheme

Last Update:

is a cryptographic signature scheme designed by Mihir Bellare and Phillip Rogaway. RSA-PSS is an adaptation of their work and is standardized as part...

Word Count : 191

PKCS 1

Last Update:

asymmetric encryption padding (OAEP) scheme proposed by Mihir Bellare and Phillip Rogaway. Recommended for new applications. There are also two schemes for dealing...

Word Count : 1484

Random oracle

Last Update:

their way into cryptography by the publication of Mihir Bellare and Phillip Rogaway in 1993, which introduced them as a formal cryptographic model to be...

Word Count : 1775

Silvio Micali

Last Update:

Halevi, Rafail Ostrovsky, Jing Chen, Rafael Pass, Chris Peikert, and Phillip Rogaway. In 2001 Micali co-founded CoreStreet Ltd, a software company originally...

Word Count : 624

CAESAR Competition

Last Update:

Belgium) Vincent Rijmen (KU Leuven, Belgium) Matt Robshaw (Impinj, USA) Phillip Rogaway (University of California at Davis, USA) Greg Rose (kitchen4140, USA)...

Word Count : 217

Cryptography

Last Update:

of Theoretical Computer Science. Vol. 1. Elsevier. Bellare, Mihir; Rogaway, Phillip (21 September 2005). "Introduction". Introduction to Modern Cryptography...

Word Count : 10726

Transport Layer Security

Last Update:

demonstrated for this vulnerability, which was originally discovered by Phillip Rogaway in 2002. The vulnerability of the attack had been fixed with TLS 1...

Word Count : 17154

Full Domain Hash

Last Update:

of Full Domain Hash. CRYPTO 2000: pp. 229–235 (PDF) Mihir Bellare, Phillip Rogaway: The Exact Security of Digital Signatures - How to Sign with RSA and...

Word Count : 298

Pseudorandom permutation

Last Update:

Protocols. Chapman and Hall/CRC. ISBN 978-1584885511. Mihir Bellare, Phillip Rogaway (2005-05-11). "Chapter 4: Pseudorandom functions" (PDF). Introduction...

Word Count : 1303

EAX mode

Last Update:

it can't pre-process it). The authors of EAX mode, Mihir Bellare, Phillip Rogaway, and David Wagner placed the work under public domain and have stated...

Word Count : 659

List of cryptographers

Last Update:

zero-knowledge proofs. Oded Regev, inventor of learning with errors. Phillip Rogaway, US, UC Davis, co-proposer of the Random oracle model. Amit Sahai,...

Word Count : 2349

Mihir Bellare

Last Update:

the area of provable security), many of which were co-written with Phillip Rogaway. Bellare has published a number of papers in the field of Format-Preserving...

Word Count : 341

Computational indistinguishability

Last Update:

Introduction to Cryptography Donald Beaver and Silvio Micali and Phillip Rogaway, The Round Complexity of Secure Protocols (Extended Abstract), 1990...

Word Count : 420

Disk encryption software

Last Update:

broken if their output is discernible from random. Mihir Bellare, Phillip Rogaway (2005-09-20). "Chapter 3: Pseudorandom functions". Introduction to...

Word Count : 1333

International Association for Cryptologic Research

Last Update:

contributions to the design and analysis of cryptographic systems." Phillip Rogaway 2012 "For fundamental contributions to the theory and practice of cryptography...

Word Count : 1420

Encryption by date

Last Update:

John Wiley & Sons. pp. 263–267. ISBN 0-471-89192-4. Joe Kilian and Phillip Rogaway, How to protect DES against exhaustive key search (PostScript), Advances...

Word Count : 130

Paris Kanellakis

Last Update:

Buchberger, Corinna Cortes and Vladimir Vapnik, Mihir Bellare and Phillip Rogaway, Kurt Mehlhorn, Hanan Samet, Andrei Broder, Moses Charikar, and Piotr...

Word Count : 3732

PDF Search Engine © AllGlobal.net