Search
International Association for Cryptologic Research
What's new
Archive
Best Papers
Videos
Authors
Coauthors
By year
By conference
All Committees
Most Committees
Report errors
Maps
About
John Black
Search web for home page
Program Committees
1
2012
Eurocrypt
pc
2
2011
FSE
pc
3
2011
PKC
pc
4
2009
Crypto
general chair
5
2008
Crypto
pc
6
2008
FSE
pc
7
2005
Crypto
pc
8
2004
Eurocrypt
pc
9
2004
Crypto
pc
Publications
year
title
booktitle
pages
1
2010
An Analysis of the Blockcipher-Based Hash Functions from PGV
jofc
519-545
2
2009
On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions
jofc
311-329
3
2009
MAC Reforgeability
fse
345-362
4
2007
On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions
eprint
online
5
2006
MAC Reforgeability
eprint
online
6
2006
The Ideal-Cipher Model, Revisited: An Uninstantiable Blockcipher-Based Hash Function
fse
online
7
2006
A Study of the MD5 Attacks: Insights and Improvements
fse
online
8
2005
The Ideal-Cipher Model, Revisited: An Uninstantiable Blockcipher-Based Hash Function
eprint
online
9
2005
On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions
eurocrypt
online
10
2005
CBC MACs for Arbitrary-Length Messages: The Three-Key Constructions
jofc
111-131
11
2004
On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions
eprint
online
12
2004
How to Cheat at Chess: A Security Analysis of the Internet Chess Club
eprint
online
13
2003
Building Secure Cryptographic Transforms, or How to Encrypt and MAC
eprint
online
14
2002
A Block-Cipher Mode of Operation for Parallelizable Message Authentication
eurocrypt
online
15
2002
Black-Box Analysis of the Block-Cipher-Based Hash-Function Constructions from PGV
eprint
online
16
2002
Encryption-Scheme Security in the Presence of Key-Dependent Messages
eprint
online
17
2002
Black-Box Analysis of the Block-Cipher-Based Hash-Function Constructions from PGV
crypto
online
18
2001
Ciphers with Arbitrary Finite Domains
eprint
online
19
2001
OCB Mode
eprint
online
20
2001
A Block-Cipher Mode of Operation for Parallelizable Message Authentication
eprint
online
21
2000
CBC MACs for Arbitrary-Length Messages: The Three-Key Constructions
crypto
197-215
22
1999
UMAC: Fast and Secure Message Authentication
crypto
216-233
Coauthors of John Black
Mihir Bellare
Martin Cochran
Ryan Gardner
Shai Halevi
Trevor Highland
Tadayoshi Kohno
Hugo Krawczyk
Ted Krovetz
Adriana Palacio
Phillip Rogaway
Thomas Shrimpton
Martijn Stam