Follow
Mihir Bellare
Mihir Bellare
Professor, Dept. of Computer Science and Engineering, University of California San Diego (UCSD)
Verified email at ucsd.edu - Homepage
Title
Cited by
Cited by
Year
Random oracles are practical: A paradigm for designing efficient protocols
M Bellare, P Rogaway
Proceedings of the 1st ACM Conference on Computer and Communications …, 1993
64741993
HMAC: Keyed-hashing for message authentication
H Krawczyk, M Bellare, R Canetti
36391997
Keying hash functions for message authentication
M Bellare, R Canetti, H Krawczyk
Advances in Cryptology—CRYPTO’96: 16th Annual International Cryptology …, 1996
25171996
Entity authentication and key distribution
M Bellare, P Rogaway
Annual international cryptology conference, 232-249, 1993
23151993
Authenticated key exchange secure against dictionary attacks
M Bellare, D Pointcheval, P Rogaway
International conference on the theory and applications of cryptographic …, 2000
19832000
Optimal asymmetric encryption
M Bellare, P Rogaway
Advances in Cryptology—EUROCRYPT'94: Workshop on the Theory and Application …, 1995
18241995
Relations among notions of security for public-key encryption schemes
M Bellare, A Desai, D Pointcheval, P Rogaway
Advances in Cryptology—CRYPTO'98: 18th Annual International Cryptology …, 1998
15371998
A concrete security treatment of symmetric encryption
M Bellare, A Desai, E Jokipii, P Rogaway
Proceedings 38th Annual Symposium on Foundations of Computer Science, 394-403, 1997
14991997
The exact security of digital signatures-How to sign with RSA and Rabin
M Bellare, P Rogaway
International conference on the theory and applications of cryptographic …, 1996
13671996
Authenticated encryption: Relations among notions and analysis of the generic composition paradigm
M Bellare, C Namprempre
International Conference on the Theory and Application of Cryptology and …, 2000
12692000
Deterministic and efficiently searchable encryption
M Bellare, A Boldyreva, A O’Neill
Advances in Cryptology-CRYPTO 2007: 27th Annual International Cryptology …, 2007
11242007
OCB: A block-cipher mode of operation for efficient authenticated encryption
P Rogaway, M Bellare, J Black
ACM Transactions on Information and System Security (TISSEC) 6 (3), 365-403, 2003
10102003
Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions
M Bellare, D Micciancio, B Warinschi
Advances in Cryptology—EUROCRYPT 2003: International Conference on the …, 2003
10002003
A forward-secure digital signature scheme
M Bellare, SK Miner
Annual international cryptology conference, 431-448, 1999
9801999
The security of triple encryption and a framework for code-based game-playing proofs
M Bellare, P Rogaway
Annual International Conference on the Theory and Applications of …, 2006
9492006
Message-locked encryption and secure deduplication
M Bellare, S Keelveedhi, T Ristenpart
Annual international conference on the theory and applications of …, 2013
9072013
{DupLESS}:{Server-Aided} encryption for deduplicated storage
S Keelveedhi, M Bellare, T Ristenpart
22nd USENIX security symposium (USENIX security 13), 179-194, 2013
8872013
Provably secure session key distribution: the three party case
M Bellare, P Rogaway
Proceedings of the twenty-seventh annual ACM symposium on Theory of …, 1995
8471995
On defining proofs of knowledge
M Bellare, O Goldreich
Annual International Cryptology Conference, 390-420, 1992
8161992
Multi-signatures in the plain public-key model and a general forking lemma
M Bellare, G Neven
Proceedings of the 13th ACM conference on Computer and communications …, 2006
8062006
Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions
M Abdalla, M Bellare, D Catalano, E Kiltz, T Kohno, T Lange, ...
Advances in Cryptology–CRYPTO 2005: 25th Annual International Cryptology …, 2005
7902005
Security proofs for identity-based identification and signature schemes
M Bellare, C Namprempre, G Neven
Journal of Cryptology 22 (1), 1-61, 2009
7572009
A modular approach to the design and analysis of authentication and key exchange protocols
M Bellare, R Canetti, H Krawczyk
Proceedings of the thirtieth annual ACM symposium on Theory of computing …, 1998
7481998
The security of the cipher block chaining message authentication code
M Bellare, J Kilian, P Rogaway
Journal of Computer and System Sciences 61 (3), 362-399, 2000
7382000
Foundations of group signatures: The case of dynamic groups
M Bellare, H Shi, C Zhang
Cryptographers’ track at the RSA conference, 136-153, 2005
7022005
Foundations of garbled circuits
M Bellare, VT Hoang, P Rogaway
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
6802012
Public-key encryption in a multi-user setting: Security proofs and improvements
M Bellare, A Boldyreva, S Micali
Advances in Cryptology—EUROCRYPT 2000: International Conference on the …, 2000
6722000
Key-privacy in public-key encryption
M Bellare, A Boldyreva, A Desai, D Pointcheval
International Conference on the Theory and Application of Cryptology and …, 2001
6562001
The security of cipher block chaining
M Bellare, J Kilian, P Rogaway
Annual International Cryptology Conference, 341-358, 1994
6431994
Fast batch verification for modular exponentiation and digital signatures
M Bellare, JA Garay, T Rabin
Advances in Cryptology—EUROCRYPT'98: International Conference on the Theory …, 1998
6111998
The oracle Diffie-Hellman assumptions and an analysis of DHIES
M Abdalla, M Bellare, P Rogaway
Topics in Cryptology—CT-RSA 2001: The Cryptographers’ Track at RSA …, 2001
5872001
Free bits, PCPs, and nonapproximability---towards tight results
M Bellare, O Goldreich, M Sudan
SIAM Journal on Computing 27 (3), 804-915, 1998
5801998
New proofs for NMAC and HMAC: Security without collision resistance
M Bellare
Journal of Cryptology 28, 844-878, 2015
5482015
Non-interactive oblivious transfer and applications
M Bellare, S Micali
Conference on the Theory and Application of Cryptology, 547-557, 1989
4761989
The one-more-RSA-inversion problems and the security of Chaum's blind signature scheme
Bellare, Namprempre, Pointcheval, Semanko
Journal of Cryptology 16, 185-215, 2003
4752003
GQ and Schnorr identification schemes: Proofs of security against impersonation under active and concurrent attacks
M Bellare, A Palacio
Advances in Cryptology—CRYPTO 2002: 22nd Annual International Cryptology …, 2002
4702002
Authenticated encryption: Relations among notions and analysis of the generic composition paradigm
M Bellare, C Namprempre
Journal of cryptology 21 (4), 469-491, 2008
4632008
Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions
M Abdalla, M Bellare, D Catalano, E Kiltz, T Kohno, T Lange, ...
Journal of cryptology 21, 350-391, 2008
4562008
Efficient probabilistically checkable proofs and applications to approximations
M Bellare, S Goldwasser, C Lund, A Russell
Proceedings of the twenty-fifth annual ACM symposium on Theory of computing …, 1993
4421993
Incremental cryptography: The case of hashing and signing
M Bellare, O Goldreich, S Goldwasser
Advances in Cryptology—CRYPTO’94: 14th Annual International Cryptology …, 1994
4381994
The system can't perform the operation now. Try again later.
Articles 1–40