1
George R Blakley III, Phillip W Rogaway: Method to protect information on a computer storage device. International Business Machines Corporation, Jeffrey S LaBaw, David H Judson, October 14, 1997: US05677952 (242 worldwide citation)

A method, using a secret key, to protect information in a storage disk of a computer, where the secret key is derived from a password entered into the computer by an authorized user. The method begins by applying a length-increasing pseudorandom function to the secret key and an index to generate a ...


2
Mihir M Bellare, Phillip W Rogaway: Method and apparatus for three-party entity authentication and key distribution using message authentication codes. International Business Machines Corporation, Jeffrey S LaBaw, Melvin A Hunn, Andrew J Dillon, February 13, 1996: US05491750 (126 worldwide citation)

A method is provided for authenticating communication partners utilizing communication flows which are passed over an insecure communication channel. The method includes a number of method steps. A trusted intermediary is provided which is capable of communication with the communication partners ove ...


3
Mihir Bellare, Phillip W Rogaway: Block cipher mode of operation for secure, length-preserving encryption. International Business Machines Corporation, David H Judson, Jeffrey S LaBaw, September 30, 1997: US05673319 (93 worldwide citation)

A method for encrypting a plaintext string into ciphertext begins by cipher block chaining (CBC) the plaintext using a first key and a null initialization vector to generate a CBC message authentication code (MAC) whose length is equal to the block length. The plaintext string is then cipher block c ...


4
Don Coppersmith, Phillip W Rogaway: Software-efficient pseudorandom function and the use thereof for encryption. International Business Machines Corporation, David H Judson, Jeffrey S LaBaw, September 26, 1995: US05454039 (59 worldwide citation)

A software-efficient pseudorandom function maps an index and an encryption key to a pseudorandom bit string useful for constructing a stream cipher. The method begins by preprocessing the encryption key into a table of pseudorandom values. The index and a set of values from the table is then used to ...


5
Phillip W Rogaway: Method and apparatus for entity authentication and key distribution secure against off-line adversarial attacks. International Business Machines Corporation, Jeffrey S LaBaw, Melvin A Hunn, Andrew J Dillon, February 13, 1996: US05491749 (43 worldwide citation)

A method is described for substantially concurrently performing entity authentication operations and short-lived secret key distribution operations over an insecure communication channel between communication partners, wherein authenticity of communication partners is determined by possession of the ...


6
Phillip W Rogaway: Method and apparatus for facilitating efficient authenticated encryption. Park Vaughan & Fleming, May 16, 2006: US07046802 (25 worldwide citation)

A block-cipher based encryption scheme providing both privacy and authenticity that encrypts an arbitrary-length message into a minimal-length ciphertext. In one embodiment, “OCB”, a message is encrypted using a nonce by partitioning it into 128-bit message blocks and a possibly shorter message frag ...


7
Phillip W Rogaway: Software-efficient message authentication. International Business Machines Corporation, Jeffrey S LaBaw, David H Judson, July 22, 1997: US05651069 (24 worldwide citation)

Fast message authentication code generation is achieved by preprocessing a secret key into an efficiently-computable representation of a hash function selected from a family of hash functions that share a characteristic property. The secret key is also mapped into a particular cryptographic transfor ...


8
Don Coppersmith, Phillip W Rogaway: Software-efficient pseudorandom function and the use thereof for decryption. International Business Machines Corporation, Jeffrey S LaBaw, David H Judson, November 10, 1998: US05835597 (23 worldwide citation)

A software-efficient pseudorandom function maps an index and an encryption key to a pseudorandom bit string useful for constructing a stream cipher. The method begins by preprocessing the encryption key into a table of pseudorandom values. The index and a set of values from the table is then used to ...


9
Don Coppersmith, Phillip W Rogaway: Computer readable device implementing a software-efficient pseudorandom function encryption. International Business Machines Corporation, Jeffrey S LaBaw, David H Judson, October 7, 1997: US05675652 (11 worldwide citation)

A software-efficient pseudorandom function maps an index and an encryption key to a pseudorandom bit string useful for constructing a stream cipher. The method begins by preprocessing the encryption key into a table of pseudorandom values. The index and a set of values from the table is then used to ...


10
Phillip W Rogaway: Method and apparatus for facilitating efficient authenticated encryption. Park Vaughan Fleming & Dowler, Laxman Sahasrabuddhe, November 27, 2012: US08321675 (2 worldwide citation)

A shared-key encryption scheme that uses identically keyed block-cipher calls, low additional overhead, supports the encryption of arbitrary-length strings, produces a minimal-length-ciphertext, and is fully parallelizable. In one embodiment, “OCB”, a key shared between communicating parties is mapp ...