Follow
Mihir Bellare
Mihir Bellare
Professor, Department of Computer Science and Engineering, University of California San Diego (UCSD)
Verified email at eng.ucsd.edu - Homepage
Title
Cited by
Cited by
Year
Random oracles are practical: A paradigm for designing efficient protocols
M Bellare, P Rogaway
Proceedings of the 1st ACM Conference on Computer and Communications …, 1993
61191993
HMAC: Keyed-hashing for message authentication
H Krawczyk, M Bellare, R Canetti
37111997
Keying hash functions for message authentication
M Bellare, R Canetti, H Krawczyk
Advances in Cryptology—CRYPTO’96: 16th Annual International Cryptology …, 1996
23871996
Entity authentication and key distribution
M Bellare, P Rogaway
Advances in Cryptology—CRYPTO’93: 13th Annual International Cryptology …, 2001
22262001
Authenticated key exchange secure against dictionary attacks
M Bellare, D Pointcheval, P Rogaway
Cryptology ePrint Archive, 2000
18992000
Optimal asymmetric encryption
M Bellare, P Rogaway
Advances in Cryptology—EUROCRYPT'94: Workshop on the Theory and Application …, 1995
17421995
Relations among notions of security for public-key encryption schemes
M Bellare, A Desai, D Pointcheval, P Rogaway
Advances in Cryptology—CRYPTO'98: 18th Annual International Cryptology …, 1998
14901998
A concrete security treatment of symmetric encryption
M Bellare, A Desai, E Jokipii, P Rogaway
Proceedings 38th Annual Symposium on Foundations of Computer Science, 394-403, 1997
14341997
The exact security of digital signatures-How to sign with RSA and Rabin
M Bellare, P Rogaway
Eurocrypt 96, 399-416, 1996
13201996
Authenticated encryption: Relations among notions and analysis of the generic composition paradigm
M Bellare, C Namprempre
Advances in Cryptology—ASIACRYPT 2000: 6th International Conference on the …, 2000
11802000
Deterministic and efficiently searchable encryption
M Bellare, A Boldyreva, A O’Neill
Advances in Cryptology-CRYPTO 2007: 27th Annual International Cryptology …, 2007
10752007
OCB: A block-cipher mode of operation for efficient authenticated encryption
P Rogaway, M Bellare, J Black
ACM Transactions on Information and System Security (TISSEC) 6 (3), 365-403, 2003
9612003
Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions
M Bellare, D Micciancio, B Warinschi
Advances in Cryptology—EUROCRYPT 2003: International Conference on the …, 2003
9442003
A forward-secure digital signature scheme
M Bellare, SK Miner
Advances in Cryptology—CRYPTO’99: 19th Annual International Cryptology …, 1999
9401999
The security of triple encryption and a framework for code-based game-playing proofs
M Bellare, P Rogaway
Advances in Cryptology-EUROCRYPT 2006: 24th Annual International Conference …, 2006
8552006
Provably secure session key distribution: the three party case
M Bellare, P Rogaway
Proceedings of the twenty-seventh annual ACM symposium on Theory of …, 1995
8371995
Message-locked encryption and secure deduplication
M Bellare, S Keelveedhi, T Ristenpart
Advances in Cryptology–EUROCRYPT 2013: 32nd Annual International Conference …, 2013
8122013
DupLESS: Server-Aided Encryption for Deduplicated Storage.
M Bellare, S Keelveedhi, T Ristenpart
IACR Cryptol. ePrint Arch. 2013, 429, 2013
7882013
On defining proofs of knowledge
M Bellare, O Goldreich
Advances in Cryptology—CRYPTO’92: 12th Annual International Cryptology …, 2001
7862001
A modular approach to the design and analysis of authentication and key exchange protocols
M Bellare, R Canetti, H Krawczyk
Proceedings of the thirtieth annual ACM symposium on Theory of computing …, 1998
7411998
The system can't perform the operation now. Try again later.
Articles 1–20