#### Filter Results:

- Full text PDF available (35)

#### Publication Year

1993

2017

- This year (0)
- Last 5 years (10)
- Last 10 years (25)

#### Publication Type

#### Co-author

#### Journals and Conferences

Learn More

- Phillip Rogaway, Mihir Bellare, John Black, Ted Krovetz
- ACM Conference on Computer and Communications…
- 2001

We describe a parallelizable block-cipher mode of operation that simultaneously provides privacy and authenticity. OCB encrypts-and-authenticates a nonempty string M ε {0,1}• using \lceil |M|/n\rceil… (More)

- John Black, Shai Halevi, Hugo Krawczyk, Ted Krovetz, Phillip Rogaway
- CRYPTO
- 1999

We describe a message authentication algorithm, UMAC, which authenticates messages (in software, on contemporary machines) roughly an order of magnitude faster than current practice (e.g.,… (More)

- John Black, Phillip Rogaway, Thomas Shrimpton
- IACR Cryptology ePrint Archive
- 2002

Preneel, Govaerts, and Vandewalle [7] considered the 64 most basic ways to construct a hash function H : {0, 1}∗ → {0, 1}n from a block cipher E: {0, 1}n × {0, 1}n → {0, 1}n. They regarded 12 of… (More)

- John Black, Phillip Rogaway
- IACR Cryptology ePrint Archive
- 2001

We define and analyze a simple and fully parallelizable blockcipher mode of operation for message authentication. Parallelizability does not come at the expense of serial efficiency: in a… (More)

- John Black, Phillip Rogaway
- IACR Cryptology ePrint Archive
- 2001

We explore the problem of enciphering members of a finite setM where k = |M| is arbitrary (in particular, it need not be a power of two). We want to achieve this goal starting from a block cipher… (More)

- John Black, Martin Cochran, Thomas Shrimpton
- Journal of Cryptology
- 2004

Fix a small nonempty set of blockcipher keys $\mathcal{K}$ . We say a blockcipher-based hash function is highly-efficient if it makes exactly one blockcipher call for each message block hashed, and… (More)

- John Black, Hector Urtubia
- USENIX Security Symposium
- 2002

Vaudenay recently demonstrated side-channel attacks on a common encryption scheme, CBC Mode encryption, exploiting a “valid padding” oracle [Vau02]. Mirroring the side-channel attacks of… (More)

- Christopher Wilks, Melissa S. Cline, +23 authors Daniel Maltbie
- Database
- 2014

The Cancer Genomics Hub (CGHub) is the online repository of the sequencing programs of the National Cancer Institute (NCI), including The Cancer Genomics Atlas (TCGA), the Cancer Cell Line… (More)

- John Black, Phillip Rogaway
- Journal of Cryptology
- 2000

We suggest some simple variants of the CBC MAC that enable the efficient authentication of arbitrary-length messages. Our constructions use three keys, K1, K2, K3, to avoid unnecessary padding and… (More)

- John Black, Martin Cochran, Trevor Highland
- FSE
- 2006

MD5 is a well-known and widely-used cryptographic hash function. It has received renewed attention from researchers subsequent to the recent announcement of collisions found by Wang et al. [16]. To… (More)