Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,261,224 papers from all fields of science
Search
Sign In
Create Free Account
Phillip Rogaway
Phillip Rogaway is a professor of computer science at the University of California, Davis. He graduated with a BA in computer science from UC…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
20 relations
Computational indistinguishability
Computer science
Concrete security
Cryptography
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2015
Highly Cited
2015
Quantification of landslide velocity from active waveguide–generated acoustic emission
Alister Smith
,
N. Dixon
2015
Corpus ID: 54079677
Acoustic emission (AE) has become an established approach to monitor stability of soil slopes. However, the challenge has been to…
Expand
Highly Cited
2015
Highly Cited
2015
The difference between the mean radiant temperature and the air temperature within indoor environments: A case study during summer conditions
Nadine Walikewitz
,
Britta Jänicke
,
M. Langner
,
F. Meier
,
W. Endlicher
2015
Corpus ID: 44021088
Highly Cited
2014
Highly Cited
2014
Multi-Stage Key Exchange and the Case of Google's QUIC Protocol
M. Fischlin
,
Felix Günther
Conference on Computer and Communications…
2014
Corpus ID: 16265575
The traditional approach to build a secure connection is to run a key exchange protocol and, once the key has been established…
Expand
Review
2014
Review
2014
A PRELIMINARY SURVEY*
Carolyn J. Moses
,
Donald N. Hester
,
Benjamin H. Friedman
,
P. Cagan
,
W. Silber
2014
Corpus ID: 55885466
This paper provides a survey of ways in which financial innovations may affect the making of monetary policy. This subject has…
Expand
Highly Cited
2012
Highly Cited
2012
Memorability of Image Regions
A. Khosla
,
Jianxiong Xiao
,
A. Torralba
,
A. Oliva
Neural Information Processing Systems
2012
Corpus ID: 7874000
While long term human visual memory can store a remarkable amount of visual information, it tends to degrade over time. Recent…
Expand
Highly Cited
2012
Highly Cited
2012
Archaeologies of presence : art, performance and the persistence of being
G. Giannachi
,
Nick Kaye
,
M. Shanks
2012
Corpus ID: 190955294
1 Gabriella Giannachi, Nick Kaye and Michael Shanks Introduction: Archaeologies of Presence Being Here: place and time 2 Josette…
Expand
2012
2012
The Art of Record Production: An Introductory Reader for a New Academic Field
S. Frith
,
Simon Zagorski-Thomas
2012
Corpus ID: 191072340
Contents: Introduction, Simon Frith and Simon Zagorski-Thomas Part I Historical Approaches: The lacquer disc for immediate…
Expand
Highly Cited
2011
Highly Cited
2011
Composability of bellare-rogaway key exchange protocols
C. Brzuska
,
M. Fischlin
,
B. Warinschi
,
S. C. Williams
Conference on Computer and Communications…
2011
Corpus ID: 15615722
In this paper we examine composability properties for the fundamental task of key exchange. Roughly speaking, we show that key…
Expand
2008
2008
Towards automated proofs for asymmetric encryption schemes in the random oracle model
J. Courant
,
M. Daubignard
,
Cristian Ene
,
P. Lafourcade
,
Y. Lakhnech
Conference on Computer and Communications…
2008
Corpus ID: 7103500
Chosen-ciphertext security is by now a standard security property for asymmetric encryption. Many generic constructions for…
Expand
Highly Cited
2005
Highly Cited
2005
Wave overtopping at vertical and steep seawalls
W. Allsop
,
T. Bruce
,
J. Pearson
,
P. Besley
2005
Corpus ID: 73668540
Wave overtopping is the critical response of most sea defence structures and one of the more important responses for many coast…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE