John Black
#72,125
Most Influential Person Now
American cryptographer and security researcher
John Black 's AcademicInfluence.com Rankings
John Black computer-science Degrees
Computer Science
#3090
World Rank
#3240
Historical Rank
#1236
USA Rank
Operating Systems
#26
World Rank
#27
Historical Rank
#9
USA Rank
Database
#8691
World Rank
#9115
Historical Rank
#1177
USA Rank

Download Badge
Computer Science
John Black 's Degrees
- PhD Computer Science Stanford University
- Bachelors Computer Science Carnegie Mellon University
Similar Degrees You Can Earn
Why Is John Black Influential?
(Suggest an Edit or Addition)According to Wikipedia, John Richard Black, Jr. is a cryptologist, programmer, and professor of computer science at the University of Colorado Boulder focusing on computer security. He graduated with a BA in computer science from CSU East Bay in 1988 and completed his PhD in cryptography at UC Davis with Phillip Rogaway in 2000. He has taught at CU-Boulder since 2002.
John Black 's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- OCB: a block-cipher mode of operation for efficient authenticated encryption (2001) (700)
- UMAC: Fast and Secure Message Authentication (1999) (441)
- Black-Box Analysis of the Block-Cipher-Based Hash-Function Constructions from PGV (2002) (388)
- A Block-Cipher Mode of Operation for Parallelizable Message Authentication (2002) (298)
- CBC MACs for Arbitrary-Length Messages: The Three-Key Constructions (2000) (287)
- Encryption-Scheme Security in the Presence of Key-Dependent Messages (2002) (246)
- Ciphers with Arbitrary Finite Domains (2002) (216)
- OCB: A block-cipher mode of operation for efficient authenticated encryption (2003) (135)
- Scaffold: Quantum Programming Language (2012) (116)
- On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions (2005) (97)
- A Study of the MD5 Attacks: Insights and Improvements (2006) (87)
- Side-Channel Attacks on Symmetric Encryption Schemes: The Case for Authenticated Encryption (2002) (74)
- The Ideal-Cipher Model, Revisited: An Uninstantiable Blockcipher-Based Hash Function (2006) (72)
- An Analysis of the Blockcipher-Based Hash Functions from PGV (2010) (66)
- Compare-by-Hash: A Reasoned Analysis (2006) (65)
- Message authentication codes (2000) (37)
- MAC Reforgeability (2009) (30)
- Authenticated Encryption (2005) (27)
- Building Secure Cryptographic Transforms, or How to Encrypt and MAC (2003) (27)
- Comments to NIST concerning AES Modes of Operations : A Suggestion for Handling Arbitrary-Length Messages with the CBC MAC (1998) (23)
- PMAC: A Parallelizable Message Authentication Code (2001) (13)
- Supporting CS education via virtualization and packages: tools for successfully accommodating "bring-your-own-device" at scale (2014) (10)
- MyZone: A Next-Generation Online Social Network (2011) (9)
- Lessons learned: a security analysis of the Internet Chess Club (2005) (6)
- Limited-linkable Group Signatures with Distributed-Trust Traceability (2012) (3)
- The Impossibility of Technology-Based DRM and a Modest Suggestion (2005) (2)
- Support for Security and Privacy in SenSearch (2008) (0)
- MyZone: A Next-Generation Online Social Network Tech. Report (2021) (0)
- Security and Privacy in a Sensor-Based Search and Rescue System (2009) (0)
- MyZone: A Next-Generation Online Social Network ; CU-CS-1089-11 (2011) (0)
- There is a new Advanced Encryption Standard . . . Now What ? (2002) (0)
- A Security Framework for SenSearch (2009) (0)
This paper list is powered by the following services:
Other Resources About John Black
What Schools Are Affiliated With John Black ?
John Black is affiliated with the following schools: