OCB: A block-cipher mode of operation for efficient authenticated encryption P Rogaway, M Bellare, J Black, T Krovetz ACM Conference on Computer and Communications Security (CCS 2001), 196-205, 2001 | 881 | 2001 |
UMAC: Fast and secure message authentication J Black, S Halevi, H Krawczyk, T Krovetz, P Rogaway Advances in Cryptology - CRYPTO ’99, 216-233, 1999 | 567 | 1999 |
The software performance of authenticated-encryption modes T Krovetz, P Rogaway Fast Software Encryption - FSE '11, 306-327, 2011 | 259 | 2011 |
Robust authenticated-encryption AEZ and the problem that it solves VT Hoang, T Krovetz, P Rogaway Annual International Conference on the Theory and Applications of …, 2015 | 147 | 2015 |
UMAC: Message authentication code using universal hashing T Krovetz | 108 | 2006 |
Luby-Rackoff backwards: Increasing security by making block ciphers non-invertible M Bellare, T Krovetz, P Rogaway Advances in Cryptology - EUROCRYPT '98, 266-280, 1998 | 96 | 1998 |
The OCB Authenticated-Encryption Algorithm T Krovetz, P Rogaway | 61* | 2011 |
Message authentication on 64-bit architectures T Krovetz Selected Areas in Cryptography - SAC '06, 327-341, 2007 | 56 | 2007 |
Fast universal hashing with small keys and no preprocessing: The PolyR construction T Krovetz, P Rogaway Information Security and Cryptology - ICISC '00, 73-89, 2001 | 46 | 2001 |
Software-optimized universal hashing and message authentication TD Krovetz University of California, Davis, 2000 | 32 | 2000 |
AEZ v1: authenticated-encryption by enciphering VT Hoang, T Krovetz, P Rogaway CAESAR 1st Round, competitions. cr. yp. to/round1/aezv1. pdfl, 2014 | 28 | 2014 |
OCB Mode: Proposal to NIST for a block-cipher mode of operation which simultaneously provides privacy and authenticity P Rogaway, M Bellare, J Black, T Krovetz Contribution to NIST, Apr, 2001, 2001 | 24* | 2001 |
OCB (v1. 1) T Krovetz, P Rogaway Submission to the CAESAR Competition, 2016 | 14 | 2016 |
HS1-SIV (v2) T Krovetz | 13* | 2015 |
Variationally universal hashing T Krovetz, P Rogaway Information processing letters 100 (1), 36-39, 2006 | 9 | 2006 |
VHASH Security W Dai, T Krovetz Cryptology ePrint Archive, Report 2007/338, 2007 | 8 | 2007 |
UMAC T Krovetz, J Black, S Halevi, A Hevia, H Krawczyk, P Rogaway Primitive submitted to NESSIE, 38, 2000 | 7 | 2000 |
The Definition and Software Performance of Hashstream, a Fast Length-Flexible PRF T Krovetz Cryptography 2 (4), 31, 2018 | 1 | 2018 |
Patent-Free Authenticated-Encryption As Fast As OCB T Krovetz Innovative algorithms and techniques in automation, industrial electronics …, 2007 | 1 | 2007 |