Follow
Thomas Shrimpton
Thomas Shrimpton
Professor of Computer Science, University of Florida
Verified email at ufl.edu - Homepage
Title
Cited by
Cited by
Year
Cryptographic hash-function basics: Definitions, implications, and separations for preimage resistance, second-preimage resistance, and collision resistance
P Rogaway, T Shrimpton
FSE 3017, 371-388, 2004
8352004
Peek-a-boo, i still see you: Why efficient traffic analysis countermeasures fail
KP Dyer, SE Coull, T Ristenpart, T Shrimpton
2012 IEEE symposium on security and privacy, 332-346, 2012
5322012
Black-box analysis of the block-cipher-based hash-function constructions from PGV
J Black, P Rogaway, T Shrimpton
Crypto 2442, 320-335, 2002
4652002
A provable-security treatment of the key-wrap problem
P Rogaway, T Shrimpton
Advances in Cryptology-EUROCRYPT 2006: 24th Annual International Conference …, 2006
4492006
Encryption-scheme security in the presence of key-dependent messages
J Black, P Rogaway, T Shrimpton
Selected Areas in Cryptography: 9th Annual International Workshop, SAC 2002 …, 2003
2942003
Threshold password-authenticated key exchange
P MacKenzie, T Shrimpton, M Jakobsson
Advances in Cryptology—CRYPTO 2002: 22nd Annual International Cryptology …, 2002
1862002
Careful with composition: Limitations of the indifferentiability framework
T Ristenpart, H Shacham, T Shrimpton
Advances in Cryptology–EUROCRYPT 2011: 30th Annual International Conference …, 2011
1802011
Tag Size Does Matter: Attacks and Proofs for the TLS Record Protocol
KG Paterson, T Ristenpart, T Shrimpton
Advances in Cryptology–ASIACRYPT 2011: 17th International Conference on the …, 2011
1552011
Protocol misidentification made easy with format-transforming encryption
KP Dyer, SE Coull, T Ristenpart, T Shrimpton
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
1472013
Reconsidering generic composition
C Namprempre, P Rogaway, T Shrimpton
Advances in Cryptology–EUROCRYPT 2014: 33rd Annual International Conference …, 2014
1382014
Identity and content authentication for phone calls
PG Traynor, BG Reaves, LE Blue, L Vargas, H Abdullah, T Shrimpton
US Patent 10,764,043, 2020
1332020
Salvaging Merkle-Damgård for practical applications
Y Dodis, T Ristenpart, T Shrimpton
Advances in Cryptology-EUROCRYPT 2009: 28th Annual International Conference …, 2009
1222009
Seven-property-preserving iterated hashing: ROX
E Andreeva, G Neven, B Preneel, T Shrimpton
Advances in Cryptology–ASIACRYPT 2007: 13th International Conference on the …, 2007
1032007
Seeing through network-protocol obfuscation
L Wang, KP Dyer, A Akella, T Ristenpart, T Shrimpton
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
1022015
On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions.
J Black, M Cochran, T Shrimpton
Eurocrypt 3494, 526-541, 2005
1012005
Random Oracles with (out) Programmability.
M Fischlin, A Lehmann, T Ristenpart, T Shrimpton, M Stam, S Tessaro
ASIACRYPT 6477, 303-320, 2010
932010
Tweakable Blockciphers with Beyond Birthday-Bound Security.
W Landecker, T Shrimpton, RS Terashima
Crypto 7417, 14-30, 2012
822012
An analysis of the blockcipher-based hash functions from PGV
J Black, P Rogaway, T Shrimpton, M Stam
Journal of Cryptology 23 (4), 519-545, 2010
782010
Marionette: A programmable network traffic obfuscation system
KP Dyer, SE Coull, T Shrimpton
24th {USENIX} Security Symposium ({USENIX} Security 15), 367-382, 2015
682015
Building a collision-resistant compression function from non-compressing primitives
T Shrimpton, M Stam
Automata, Languages and Programming: 35th International Colloquium, ICALP …, 2008
672008
The system can't perform the operation now. Try again later.
Articles 1–20