A technique for upper bounding the spectral norm with applications to learning
Format-Preserving Encryption
Random oracles are practical
The Security of the Cipher Block Chaining Message Authentication Code
Improved non-approximability results
Proceedings of the twenty-sixth annual ACM symposium on Theory of computing - STOC ’94
Journal of Computer and System Sciences
Proceedings of the 1st ACM conference on Computer and communications security - CCS ’93
Lecture Notes in Computer Science
Proceedings of the fifth annual workshop on Computational learning theory - COLT ’92
Phillip Rogaway
Till Stegers
Thomas Ristenpart
Joe Kilian
Madhu Sudan
ADS-B Encryption: Confidentiality in the Friendly Skies
Towards Developing a Trust-based Security Solution
Two prover protocols
Efficient Diffie-Hellmann two-party key agreement protocols based on elliptic curves