Volgen
John Black
John Black
Professor of Computer Science, University of Colorado at Boulder
Geverifieerd e-mailadres voor cs.colorado.edu
Titel
Geciteerd door
Geciteerd door
Jaar
OCB: A block-cipher mode of operation for efficient authenticated encryption
P Rogaway, M Bellare, J Black
ACM Transactions on Information and System Security (TISSEC) 6 (3), 365-403, 2003
9512003
UMAC: Fast and secure message authentication
J Black, S Halevi, H Krawczyk, T Krovetz, P Rogaway
Annual International Cryptology Conference, 216-233, 1999
6131999
Black-box analysis of the block-cipher-based hash-function constructions from PGV
J Black, P Rogaway, T Shrimpton
Annual International Cryptology Conference, 320-335, 2002
4552002
A block-cipher mode of operation for parallelizable message authentication
J Black, P Rogaway
International Conference on the Theory and Applications of Cryptographic …, 2002
3582002
Encryption-scheme security in the presence of key-dependent messages
J Black, P Rogaway, T Shrimpton
International Workshop on Selected Areas in Cryptography, 62-75, 2002
2882002
Ciphers with arbitrary finite domains
J Black, P Rogaway
Cryptographers’ track at the RSA conference, 114-130, 2002
2802002
CBC MACs for arbitrary-length messages: The three-key constructions
J Black, P Rogaway
Annual International Cryptology Conference, 197-215, 2000
2722000
CBC MACs for arbitrary-length messages: The three-key constructions
J Black, P Rogaway
Journal of cryptology 18 (2), 111-131, 2005
1282005
A study of the MD5 attacks: Insights and improvements
J Black, M Cochran, T Highland
International Workshop on Fast Software Encryption, 262-277, 2006
1192006
UMAC: Message authentication code using universal hashing
T Krovetz
1152006
Moving cheaply: energetics of walking in the African elephant.
VA Langman, TJ Roberts, J Black, GM Maloiy, NC Heglund, JM Weber, ...
The Journal of Experimental Biology 198 (3), 629-632, 1995
1121995
On the impossibility of highly-efficient blockcipher-based hash functions
J Black, M Cochran, T Shrimpton
Annual International Conference on the Theory and Applications of …, 2005
1002005
{Side-Channel} Attacks on Symmetric Encryption Schemes: The Case for Authenticated Encryption
J Black, H Urtubia
11th USENIX Security Symposium (USENIX Security 02), 2002
992002
Competencies in the context of entry‐level registered nurse practice: a collaborative project in Canada
J Black, D Allen, L Redfern, L Muzio, B Rushowick, B Balaski, P Martens, ...
International nursing review 55 (2), 171-178, 2008
862008
The ideal-cipher model, revisited: An uninstantiable blockcipher-based hash function
J Black
International Workshop on Fast Software Encryption, 328-340, 2006
842006
Compare-by-Hash: A Reasoned Analysis.
J Black
USENIX Annual Technical Conference, General Track, 85-90, 2006
822006
An analysis of the blockcipher-based hash functions from PGV
J Black, P Rogaway, T Shrimpton, M Stam
Journal of Cryptology 23 (4), 519-545, 2010
762010
Nocturnal behavior in a group of unchained female African elephants
RC Brockett, TS Stoinski, J Black, T Markowitz, TL Maple
Zoo Biology: Published in affiliation with the American Zoo and Aquarium …, 1999
651999
Authenticated Encryption.
J Black
Encyclopedia of Cryptography and Security, 11-21, 2005
502005
Message authentication codes
JR Black Jr
University of California, Davis, 2000
432000
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20