Mihir Bellare
Mihir Bellare
Professor, Department of Computer Science and Engineering, University of California San Diego (UCSD)
Email verificata su eng.ucsd.edu - Home page
Titolo
Citata da
Citata da
Anno
Random oracles are practical: A paradigm for designing efficient protocols
M Bellare, P Rogaway
Proceedings of the 1st ACM Conference on Computer and Communications …, 1993
57011993
HMAC: Keyed-hashing for message authentication
H Krawczyk, M Bellare, R Canetti
RFc 2104, February 2 (5.3), 1997
36201997
Keying hash functions for message authentication
M Bellare, R Canetti, H Krawczyk
Annual international cryptology conference, 1-15, 1996
22651996
Entity authentication and key distribution
M Bellare, P Rogaway
Annual international cryptology conference, 232-249, 1993
21121993
Authenticated key exchange secure against dictionary attacks
M Bellare, D Pointcheval, P Rogaway
International conference on the theory and applications of cryptographic …, 2000
17592000
Optimal asymmetric encryption
M Bellare, P Rogaway
Workshop on the Theory and Application of of Cryptographic Techniques, 92-111, 1994
16421994
Relations among notions of security for public-key encryption schemes
M Bellare, A Desai, D Pointcheval, P Rogaway
Annual International Cryptology Conference, 26-45, 1998
14171998
A concrete security treatment of symmetric encryption
M Bellare, A Desai, E Jokipii, P Rogaway
Proceedings 38th Annual Symposium on Foundations of Computer Science, 394-403, 1997
13411997
The exact security of digital signatures-How to sign with RSA and Rabin
M Bellare, P Rogaway
International conference on the theory and applications of cryptographic …, 1996
12661996
Authenticated encryption: Relations among notions and analysis of the generic composition paradigm
M Bellare, C Namprempre
International Conference on the Theory and Application of Cryptology and …, 2000
10802000
Deterministic and efficiently searchable encryption
M Bellare, A Boldyreva, A O’Neill
Annual International Cryptology Conference, 535-552, 2007
10012007
OCB: A block-cipher mode of operation for efficient authenticated encryption
P Rogaway, M Bellare, J Black
ACM Transactions on Information and System Security (TISSEC) 6 (3), 365-403, 2003
9062003
A forward-secure digital signature scheme
M Bellare, SK Miner
Annual international cryptology conference, 431-448, 1999
8951999
Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions
M Bellare, D Micciancio, B Warinschi
International conference on the theory and applications of cryptographic …, 2003
8712003
Provably secure session key distribution: the three party case
M Bellare, P Rogaway
Proceedings of the twenty-seventh annual ACM symposium on Theory of …, 1995
8171995
The security of triple encryption and a framework for code-based game-playing proofs
M Bellare, P Rogaway
Annual International Conference on the Theory and Applications of …, 2006
7642006
On defining proofs of knowledge
M Bellare, O Goldreich
Annual International Cryptology Conference, 390-420, 1992
7351992
Message-locked encryption and secure deduplication
M Bellare, S Keelveedhi, T Ristenpart
Annual international conference on the theory and applications of …, 2013
7242013
A modular approach to the design and analysis of authentication and key exchange protocols
M Bellare, R Canetti, H Krawczyk
Proceedings of the thirtieth annual ACM symposium on Theory of computing …, 1998
7121998
DupLESS: Server-aided encryption for deduplicated storage
S Keelveedhi, M Bellare, T Ristenpart
22nd {USENIX} Security Symposium ({USENIX} Security 13), 179-194, 2013
7112013
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20