×
Compute Distance To:
Author ID: bellare.mihir Recent zbMATH articles by "Bellare, Mihir"
Published as: Bellare, Mihir; Bellare, M.
External Links: MGP · Wikidata · dblp · GND
all top 5

Co-Authors

6 single-authored
24 Rogaway, Phillip
12 Namprempre, Chanathip
11 Goldreich, Oded
11 Goldwasser, Shafi
10 Neven, Gregory
9 Boldyreva, Alexandra
8 Abdalla, Michel
8 Ristenpart, Thomas
6 Keelveedhi, Sriram
6 Palacio, Adriana
6 Stepanovs, Igors
6 Sudan, Madhu
5 Hoang, Viet Tung
5 Kiltz, Eike
5 Kohno, Tadayoshi
5 Micali, Silvio
5 Pointcheval, David
5 Tessaro, Stefano
4 An, Jee Hea
4 Waters, Brent
4 Yilek, Scott
3 Cash, David M.
3 Krawczyk, Hugo
3 Shi, Haixia
3 Tackmann, Björn
2 Aiello, William A.
2 Arte, Vivek
2 Brakerski, Zvika
2 Canetti, Ran
2 Catalano, Dario
2 Coppersmith, Don
2 Dai, Wei
2 Desai, Anand
2 Dowsley, Rafael
2 Fischlin, Marc
2 Fuchsbauer, Georg
2 Garay, Juan A.
2 Halevi, Shai
2 Håstad, Johan Torkel
2 Hofheinz, Dennis
2 Kilian, Joe
2 Kiwi, Marcos A.
2 Knudsen, Lars Ramkilde
2 Lange, Tanja
2 Malone-Lee, John
2 Micciancio, Daniele
2 O’Neill, Adam
2 Paillier, Pascal
2 Paterson, Kenneth G.
2 Poettering, Bertram
2 Rabin, Tal
2 Ristov, Todor
2 Sahai, Amit
2 Semanko, Michael
2 Staddon, Jessica N.
2 Stebila, Douglas
2 Thomson, Susan
2 Vadhan, Salil P.
2 Venkatesan, Ramarathnam
2 Yung, Moti
1 Acar, Tolga
1 Auerbach, Benedikt
1 Avigad, Lidor
1 Bar-Noy, Amotz
1 Belenkiy, Mira
1 Bernstein, Daniel Julius
1 Cowen, Lenore J.
1 Davis, Hannah
1 Di Crescenzo, Giovanni
1 Duan, Shanshan
1 Guérin, Roch
1 Halldórsson, Magnús Mar
1 Jaeger, Joseph
1 Kane, Daniel M.
1 Kaufman, Tali
1 Khati, Louiza
1 Krovetz, Ted
1 Kurosawa, Kaoru
1 Levin, Leonid A.
1 Li, Lucy
1 Meiklejohn, Sarah
1 Miller, Rachel
1 Miner, Sara K.
1 Naor, Moni
1 Ng, Ruth
1 Nisan, Noam
1 Nyayapati, Maya
1 Peikert, Chris
1 Petrank, Erez
1 Pietrzak, Krzysztof
1 Rivest, Ronald Linn
1 Ron, Dana
1 Scafuro, Alessandra
1 Segev, Gil
1 Shacham, Hovav
1 Shachnai, Hadas
1 Shoup, Sarah
1 Singh, Asha Camper
1 Stegers, Till
1 Tamir, Tami
...and 9 more Co-Authors

Publications by Year

Citations contained in zbMATH Open

149 Publications have been cited 2,897 times in 1,671 Documents Cited by Year
Entity authentication and key distribution. Zbl 0870.94019
Bellare, Mihir; Rogaway, Phillip
128
1994
The security of triple encryption and a framework for code-based game-playing proofs. Zbl 1140.94321
Bellare, Mihir; Rogaway, Phillip
109
2006
Authenticated key exchange secure against dictionary attacks. Zbl 1082.94533
Bellare, Mihir; Pointcheval, David; Rogaway, Phillip
87
2000
Free bits, PCPs, and nonapproximability – towards tight results. Zbl 0912.68041
Bellare, Mihir; Goldreich, Oded; Sudan, Madhu
81
1998
Relations among notions of security for public-key encryption schemes. Zbl 0931.94014
Bellare, Mihir; Desai, Anand; Pointcheval, David; Rogaway, Phillip
80
1998
The exact security of digital signatures – how to sign with RSA and Rabin. Zbl 1304.94094
Bellare, Mihir; Rogaway, Phillip
79
1996
Optimal asymmetric encryption. Zbl 0881.94010
Bellare, Mihir; Rogaway, Phillip
72
1995
Keying hash functions for message authentication. Zbl 1329.94051
Bellare, Mihir; Canetti, Ran; Krawczyk, Hugo
69
1996
Authenticated encryption: Relations among notions and analysis of the generic composition paradigm. Zbl 0973.68059
Bellare, Mihir; Namprempre, Chanathip
66
2000
Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions. Zbl 1038.94552
Bellare, Mihir; Micciancio, Daniele; Warinschi, Bogdan
62
2003
Efficient probabilistically checkable proofs and applications to approximations. Zbl 1310.68083
Bellare, M.; Goldwasser, S.; Lund, C.; Russell, A.
60
1993
On defining proofs of knowledge. Zbl 0823.94016
Bellare, Mihir; Goldreich, Oded
59
1993
Provably secure session key distribution – The three party case. Zbl 0916.94006
Bellare, Mihir; Rogaway, Phillip
51
1995
A theoretical treatment of related-key attacks: RKA-PRPs, RKA-PRFs, and applications. Zbl 1038.94520
Bellare, Mihir; Kohno, Tadayoshi
50
2003
Deterministic and efficiently searchable encryption. Zbl 1215.94032
Bellare, Mihir; Boldyreva, Alexandra; O’Neill, Adam
46
2007
Possibility and impossibility results for encryption and commitment secure under selective opening. Zbl 1239.94033
Bellare, Mihir; Hofheinz, Dennis; Yilek, Scott
46
2009
Public-key encryption in a multi-user setting: security proofs and improvements. Zbl 1082.94504
Bellare, Mihir; Boldyreva, Alexandra; Micali, Silvio
45
2000
Key-privacy in public-key encryption. Zbl 1064.94553
Bellare, Mihir; Boldyreva, Alexandra; Desai, Anand; Pointcheval, David
43
2001
A modular approach to the design and analysis of authentication and key exchange protocols. Zbl 1028.68015
Bellare, Mihir; Canetti, Ran; Krawczyk, Hugo
42
1998
On chromatic sums and distributed resource allocation. Zbl 0895.68022
Bar-Noy, Amotz; Bellare, Mihir; Halldórsson, Magnús M.; Shachnai, Hadas; Tamir, Tami
39
1998
A forward-secure digital signature scheme. Zbl 0942.94026
Bellare, Mihir; Miner, Sara K.
38
1999
Foundations of group signatures: the case of dynamic groups. Zbl 1079.94013
Bellare, Mihir; Shi, Haixia; Zhang, Chong
36
2005
The oracle Diffie-Hellman assumptions and an analysis of DHIES. Zbl 0991.94033
Abdalla, Michel; Bellare, Mihir; Rogaway, Phillip
36
2001
Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions. Zbl 1145.94430
Abdalla, Michel; Bellare, Mihir; Catalano, Dario; Kiltz, Eike; Kohno, Tadayoshi; Lange, Tanja; Malone-Lee, John; Neven, Gregory; Paillier, Pascal; Shi, Haixia
36
2005
The one-more-RSA-inversion problems and the security of Chaum’s blind signature scheme. Zbl 1045.94012
Bellare, M.; Namprempre, C.; Pointcheval, D.; Semanko, M.
35
2003
The security of the cipher block chaining message authentication code. Zbl 0970.68054
Bellare, Mihir; Kilian, Joe; Rogaway, Phillip
34
2000
The knowledge-of-exponent assumptions and 3-round zero-knowledge protocols. Zbl 1104.94043
Bellare, Mihir; Palacio, Adriana
32
2004
New proofs for NMAC and HMAC: security without collision-resistance. Zbl 1161.68437
Bellare, Mihir
32
2006
Linearity testing in characteristic two. Zbl 0867.68060
Bellare, Mihir; Coppersmith, Don; Håstad, Johan; Kiwi, Marcos; Sudan, Madhu
31
1996
Security proofs for identity-based identification and signature schemes. Zbl 1120.94309
Bellare, Mihir; Namprempre, Chanathip; Neven, Gregory
30
2004
Encode-then-encipher encryption: How to exploit nonces or redundancy in plaintexts for efficient cryptography. Zbl 0974.94008
Bellare, Mihir; Rogaway, Phillip
28
2000
Instantiating random oracles via UCEs. Zbl 1316.94060
Bellare, Mihir; Hoang, Viet Tung; Keelveedhi, Sriram
27
2013
Two-tier signatures, strongly unforgeable signatures, and Fiat-Shamir without random oracles. Zbl 1127.94019
Bellare, Mihir; Shoup, Sarah
27
2007
Fast batch verification for modular exponentiation and digital signatures. Zbl 0929.68053
Bellare, Mihir; Garay, Juan A.; Rabin, Tal
26
1998
Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions. Zbl 1161.94378
Abdalla, Michel; Bellare, Mihir; Catalano, Dario; Kiltz, Eike; Kohno, Tadayoshi; Lange, Tanja; Malone-Lee, John; Neven, Gregory; Paillier, Pascal; Shi, Haixia
25
2008
Cryptography secure against related-key attacks and tampering. Zbl 1227.94028
Bellare, Mihir; Cash, David; Miller, Rachel
23
2011
Pseudorandom functions and permutations provably secure against related-key attacks. Zbl 1283.94050
Bellare, Mihir; Cash, David
23
2010
Deterministic encryption: Definitional equivalences and constructions without random oracles. Zbl 1183.94020
Bellare, Mihir; Fischlin, Marc; O’Neill, Adam; Ristenpart, Thomas
23
2008
Security of symmetric encryption against mass surveillance. Zbl 1317.94084
Bellare, Mihir; Paterson, Kenneth G.; Rogaway, Phillip
23
2014
Multi-property-preserving hash domain extension and the EMD transform. Zbl 1172.94561
Bellare, Mihir; Ristenpart, Thomas
23
2006
Collision-resistant hashing: Towards making UOWHFs practical. Zbl 0882.94015
Bellare, Mihir; Rogaway, Phillip
22
1997
Improved non-approximability results. Zbl 1344.68094
Bellare, Mihir; Sudan, Madhu
22
1994
The security of cipher block chaining. Zbl 0939.94554
Bellare, Mihir; Kilian, Joe; Rogaway, Phillip
21
1994
Simulation without the artificial abort: simplified proof and improved concrete security for Waters’ IBE scheme. Zbl 1239.94034
Bellare, Mihir; Ristenpart, Thomas
21
2009
Poly-many hardcore bits for any one-way function and a framework for differing-inputs obfuscation. Zbl 1317.94085
Bellare, Mihir; Stepanovs, Igors; Tessaro, Stefano
21
2014
Towards plaintext-aware public-key encryption without random oracles. Zbl 1094.94506
Bellare, Mihir; Palacio, Adriana
19
2004
From identification to signatures via the Fiat-Shamir transform: minimizing assumptions for security and forward-security. Zbl 1056.94519
Abdalla, Michel; An, Jee Hea; Bellare, Mihir; Namprempre, Chanathip
19
2002
Standard security does not imply security against selective-opening. Zbl 1297.94046
Bellare, Mihir; Dowsley, Rafael; Waters, Brent; Yilek, Scott
18
2012
Forward-security in private-key cryptography. Zbl 1039.94510
Bellare, Mihir; Yee, Bennet
18
2003
The complexity of approximating a nonlinear program. Zbl 0968.90527
Bellare, Mihir; Rogaway, Phillip
18
1993
Incremental cryptography: The case of hashing and signing. Zbl 0939.94530
Bellare, Mihir; Goldreich, Oded; Goldwasser, Shafi
18
1994
Free bits, PCPs and non-approximability – towards tight results. Zbl 0938.68820
Bellare, Mihir; Goldreich, Oded; Sudan, Madhu
18
1995
Format-preserving encryption. Zbl 1267.94037
Bellare, Mihir; Ristenpart, Thomas; Rogaway, Phillip; Stegers, Till
17
2009
Identity-based encryption secure against selective opening attack. Zbl 1295.94020
Bellare, Mihir; Waters, Brent; Yilek, Scott
17
2011
Adaptively secure garbling with applications to one-time programs and secure outsourcing. Zbl 1292.94027
Bellare, Mihir; Hoang, Viet Tung; Rogaway, Phillip
17
2012
An uninstantiable random-oracle-Model scheme for a hybrid-encryption problem. Zbl 1122.94350
Bellare, Mihir; Boldyreva, Alexandra; Palacio, Adriana
17
2004
GQ and Schnorr identification schemes: Proofs of security against impersonation under active and concurrent attacks. Zbl 1026.94521
Bellare, Mihir; Palacio, Adriana
16
2002
The EAX mode of operation. Zbl 1079.68537
Bellare, Mihir; Rogaway, Phillip; Wagner, David
16
2004
RKA security beyond the linear barrier: IBE, encryption and signatures. Zbl 1292.94028
Bellare, Mihir; Paterson, Kenneth G.; Thomson, Susan
16
2012
New paradigms for digital signatures and message authentication based on non-interactive zero knowledge proofs. Zbl 0722.68042
Bellare, Mihir; Goldwasser, Shafi
16
1990
Resisting randomness subversion: fast deterministic and hedged public-key encryption in the standard model. Zbl 1375.94100
Bellare, Mihir; Hoang, Viet Tung
15
2015
NIZKs with an untrusted CRS: security in the face of parameter subversion. Zbl 1407.94082
Bellare, Mihir; Fuchsbauer, Georg; Scafuro, Alessandra
15
2016
Hedged public-key encryption: how to protect against bad randomness. Zbl 1267.94036
Bellare, Mihir; Brakerski, Zvika; Naor, Moni; Ristenpart, Thomas; Segev, Gil; Shacham, Hovav; Yilek, Scott
15
2009
Non-malleable encryption: Equivalence between two notions, and an indistinguishability-based characterization. Zbl 0942.94024
Bellare, Mihir; Sahai, Amit
15
1999
The complexity of approximating a nonlinear program. Zbl 0839.90104
Bellare, Mihir; Rogaway, Phillip
15
1995
Authenticated encryption: relations among notions and analysis of the generic composition paradigm. Zbl 1161.94435
Bellare, Mihir; Namprempre, Chanathip
15
2008
Certifying permutations: Noninteractive zero-knowledge based on any trapdoor permutation. Zbl 0861.94013
Bellare, Mihir; Yung, Moti
14
1996
Incremental cryptography and application to virus protection. Zbl 0916.94005
Bellare, Mihir; Goldreich, Oded; Goldwasser, Shafi
14
1995
Identity-based (lossy) trapdoor functions and applications. Zbl 1297.94047
Bellare, Mihir; Kiltz, Eike; Peikert, Chris; Waters, Brent
13
2012
The complexity of decision versus search. Zbl 0802.68052
Bellare, Mihir; Goldwasser, Shafi
13
1994
Randomness in interactive proofs. Zbl 0802.68053
Bellare, Mihir; Goldreich, Oded; Goldwasser, Shafi
13
1993
Robust encryption. Zbl 1274.94032
Abdalla, Michel; Bellare, Mihir; Neven, Gregory
13
2010
Unrestricted aggregate signatures. Zbl 1171.94363
Bellare, Mihir; Namprempre, Chanathip; Neven, Gregory
13
2007
Protecting against key-exposure: strongly key-insulated encryption with optimal threshold. Zbl 1098.94020
Bellare, Mihir; Palacio, Adriana
13
2006
Improved security analyses for CBC MACs. Zbl 1145.94432
Bellare, Mihir; Pietrzak, Krzysztof; Rogaway, Phillip
13
2005
Online ciphers and the Hash-CBC construction. Zbl 1002.94520
Bellare, Mihir; Boldyreva, Alexandra; Knudsen, Lars; Namprempre, Chanathip
13
2001
Randomness re-use in multi-recipient encryption schemes. Zbl 1033.94511
Bellare, Mihir; Boldyreva, Alexandra; Staddon, Jessica
12
2002
Luby-Rackoff backwards: increasing security by making block ciphers non-invertible. Zbl 0994.94521
Bellare, Mihir; Krovetz, Ted; Rogaway, Phillip
12
1998
Semantic security for the wiretap channel. Zbl 1296.94081
Bellare, Mihir; Tessaro, Stefano; Vardy, Alexander
11
2012
XOR MACs: New methods for message authentication using finite pseudorandom functions. Zbl 0876.94020
Bellare, Mihir; Guérin, Roch; Rogaway, Phillip
11
1995
Hash functions in the dedicated-key setting: Design choices and MPP transforms. Zbl 1171.94339
Bellare, Mihir; Ristenpart, Thomas
11
2007
Hash function balance and its impact on birthday attacks. Zbl 1122.94351
Bellare, Mihir; Kohno, Tadayoshi
11
2004
Uniform generation of NP-witnesses using an NP-oracle. Zbl 1006.68050
Bellare, Mihir; Goldreich, Oded; Petrank, Erez
10
2000
The multi-user security of authenticated encryption: AES-GCM in TLS 1.3. Zbl 1378.94023
Bellare, Mihir; Tackmann, Björn
10
2016
Security proofs for identity-based identification and signature schemes. Zbl 1166.94008
Bellare, Mihir; Namprempre, Chanathip; Neven, Gregory
10
2009
Policy-based signatures. Zbl 1335.94031
Bellare, Mihir; Fuchsbauer, Georg
10
2014
The power of RSA inversion oracles and the security of Chaum’s RSA-based blind signature scheme. Zbl 1051.94510
Bellare, Mihir; Namprempre, Chanathip; Pointcheval, David; Semanko, Michael
9
2002
Hash-function based PRFs: AMAC and its multi-user security. Zbl 1385.94010
Bellare, Mihir; Bernstein, Daniel J.; Tessaro, Stefano
9
2016
Cryptographic agility and its relation to circular encryption. Zbl 1280.94034
Acar, Tolga; Belenkiy, Mira; Bellare, Mihir; Cash, David
9
2010
Minimizing the use of random oracles in authenticated encryption schemes. Zbl 0888.94009
Bellare, Mihir; Rogaway, Phillip
9
1997
Breaking and provably repairing the SSH authenticated encryption scheme: a case study of the encode-then-encrypt-and-MAC paradigm. Zbl 1291.94056
Bellare, Mihir; Kohno, Tadayoshi; Namprempre, Chanathip
9
2004
Many-to-one trapdoor functions and their relation to public-key cryptosystems. Zbl 0931.94015
Bellare, Mihir; Halevi, Shai; Sahai, Amit; Vadhan, Salil
9
1998
Identification protocols secure against reset attacks. Zbl 1012.94554
Bellare, Mihir; Fischlin, Marc; Goldwasser, Shafi; Micali, Silvio
9
2001
Contention in cryptoland: obfuscation, leakage and UCE. Zbl 1382.94062
Bellare, Mihir; Stepanovs, Igors; Tessaro, Stefano
9
2016
‘Pseudo-random’ number generation within cryptographic algorithms: The DDS case. Zbl 0893.94044
Bellare, Mihir; Goldwasser, Shafi; Micciancio, Daniele
8
1997
New proofs for NMAC and HMAC: security without collision resistance. Zbl 1332.94056
Bellare, Mihir
8
2015
Multirecipient encryption schemes: how to save on bandwidth and computation without sacrificing security. Zbl 1326.94073
Bellare, Mihir; Boldyreva, Alexandra; Kurosawa, K.; Staddon, Jessica
8
2007
Point-function obfuscation: a framework and generic constructions. Zbl 1382.94061
Bellare, Mihir; Stepanovs, Igors
8
2016
Multi-instance security and its application to password-based cryptography. Zbl 1296.94080
Bellare, Mihir; Ristenpart, Thomas; Tessaro, Stefano
7
2012
From identification to signatures, tightly: a framework and generic transforms. Zbl 1407.94083
Bellare, Mihir; Poettering, Bertram; Stebila, Douglas
7
2016
Separate your domains: NIST PQC KEMs, oracle cloning and read-only indifferentiability. Zbl 07496544
Bellare, Mihir; Davis, Hannah; Günther, Felix
3
2020
The multi-base discrete logarithm problem: tight reductions and non-rewinding proofs for Schnorr identification and signatures. Zbl 07553884
Bellare, Mihir; Dai, Wei
2
2020
Security under message-derived keys: signcryption in iMessage. Zbl 07436955
Bellare, Mihir; Stepanovs, Igors
1
2020
Incremental cryptography revisited: PRFs, nonces and modular design. Zbl 07553886
Arte, Vivek; Bellare, Mihir; Khati, Louiza
1
2020
Dual-mode NIZKs: possibility and impossibility results for property transfer. Zbl 07553898
Arte, Vivek; Bellare, Mihir
1
2020
Nonces are noticed: AEAD revisited. Zbl 07202387
Bellare, Mihir; Ng, Ruth; Tackmann, Björn
3
2019
Public-key encryption resistant to parameter subversion and its realization from efficiently-embeddable groups. Zbl 1385.94008
Auerbach, Benedikt; Bellare, Mihir; Kiltz, Eike
3
2018
Robust encryption. Zbl 1444.94035
Abdalla, Michel; Bellare, Mihir; Neven, Gregory
1
2018
Ratcheted encryption and key exchange: the security of messaging. Zbl 1418.94032
Bellare, Mihir; Singh, Asha Camper; Jaeger, Joseph; Nyayapati, Maya; Stepanovs, Igors
5
2017
Deterring certificate subversion: efficient double-authentication-preventing signatures. Zbl 1400.94117
Bellare, Mihir; Poettering, Bertram; Stebila, Douglas
1
2017
NIZKs with an untrusted CRS: security in the face of parameter subversion. Zbl 1407.94082
Bellare, Mihir; Fuchsbauer, Georg; Scafuro, Alessandra
15
2016
The multi-user security of authenticated encryption: AES-GCM in TLS 1.3. Zbl 1378.94023
Bellare, Mihir; Tackmann, Björn
10
2016
Hash-function based PRFs: AMAC and its multi-user security. Zbl 1385.94010
Bellare, Mihir; Bernstein, Daniel J.; Tessaro, Stefano
9
2016
Contention in cryptoland: obfuscation, leakage and UCE. Zbl 1382.94062
Bellare, Mihir; Stepanovs, Igors; Tessaro, Stefano
9
2016
Point-function obfuscation: a framework and generic constructions. Zbl 1382.94061
Bellare, Mihir; Stepanovs, Igors
8
2016
From identification to signatures, tightly: a framework and generic transforms. Zbl 1407.94083
Bellare, Mihir; Poettering, Bertram; Stebila, Douglas
7
2016
New negative results on differing-inputs obfuscation. Zbl 1371.94625
Bellare, Mihir; Stepanovs, Igors; Waters, Brent
6
2016
Big-key symmetric encryption: resisting key exfiltration. Zbl 1379.94030
Bellare, Mihir; Kane, Daniel; Rogaway, Phillip
5
2016
Nonce-based cryptography: retaining security when randomness fails. Zbl 1385.94011
Bellare, Mihir; Tackmann, Björn
4
2016
Resisting randomness subversion: fast deterministic and hedged public-key encryption in the standard model. Zbl 1375.94100
Bellare, Mihir; Hoang, Viet Tung
15
2015
New proofs for NMAC and HMAC: security without collision resistance. Zbl 1332.94056
Bellare, Mihir
8
2015
Subtleties in the definition of IND-CCA: when and how should challenge decryption be disallowed? Zbl 1308.94059
Bellare, Mihir; Hofheinz, Dennis; Kiltz, Eike
7
2015
Adaptive witness encryption and asymmetric password-based cryptography. Zbl 1345.94039
Bellare, Mihir; Hoang, Viet Tung
5
2015
How secure is deterministic encryption? Zbl 1345.94038
Bellare, Mihir; Dowsley, Rafael; Keelveedhi, Sriram
4
2015
Interactive message-locked encryption and secure deduplication. Zbl 1345.94040
Bellare, Mihir; Keelveedhi, Sriram
4
2015
Security of symmetric encryption against mass surveillance. Zbl 1317.94084
Bellare, Mihir; Paterson, Kenneth G.; Rogaway, Phillip
23
2014
Poly-many hardcore bits for any one-way function and a framework for differing-inputs obfuscation. Zbl 1317.94085
Bellare, Mihir; Stepanovs, Igors; Tessaro, Stefano
21
2014
Policy-based signatures. Zbl 1335.94031
Bellare, Mihir; Fuchsbauer, Georg
10
2014
Key-versatile signatures and applications: RKA, KDM and joint enc/Sig. Zbl 1327.94031
Bellare, Mihir; Meiklejohn, Sarah; Thomson, Susan
2
2014
Cryptography from compression functions: the UCE bridge to the ROM. Zbl 1343.94043
Bellare, Mihir; Hoang, Viet Tung; Keelveedhi, Sriram
2
2014
A characterization of chameleon hash functions and new, efficient designs. Zbl 1301.94107
Bellare, Mihir; Ristov, Todor
2
2014
Instantiating random oracles via UCEs. Zbl 1316.94060
Bellare, Mihir; Hoang, Viet Tung; Keelveedhi, Sriram
27
2013
Message-locked encryption and secure deduplication. Zbl 1306.94025
Bellare, Mihir; Keelveedhi, Sriram; Ristenpart, Thomas
6
2013
Standard security does not imply security against selective-opening. Zbl 1297.94046
Bellare, Mihir; Dowsley, Rafael; Waters, Brent; Yilek, Scott
18
2012
Adaptively secure garbling with applications to one-time programs and secure outsourcing. Zbl 1292.94027
Bellare, Mihir; Hoang, Viet Tung; Rogaway, Phillip
17
2012
RKA security beyond the linear barrier: IBE, encryption and signatures. Zbl 1292.94028
Bellare, Mihir; Paterson, Kenneth G.; Thomson, Susan
16
2012
Identity-based (lossy) trapdoor functions and applications. Zbl 1297.94047
Bellare, Mihir; Kiltz, Eike; Peikert, Chris; Waters, Brent
13
2012
Semantic security for the wiretap channel. Zbl 1296.94081
Bellare, Mihir; Tessaro, Stefano; Vardy, Alexander
11
2012
Multi-instance security and its application to password-based cryptography. Zbl 1296.94080
Bellare, Mihir; Ristenpart, Thomas; Tessaro, Stefano
7
2012
On-line ciphers and the Hash-CBC constructions. Zbl 1286.94058
Bellare, M.; Boldyreva, A.; Knudsen, L.; Namprempre, C.
5
2012
Cryptography secure against related-key attacks and tampering. Zbl 1227.94028
Bellare, Mihir; Cash, David; Miller, Rachel
23
2011
Identity-based encryption secure against selective opening attack. Zbl 1295.94020
Bellare, Mihir; Waters, Brent; Yilek, Scott
17
2011
On probabilistic versus deterministic provers in the definition of proofs of knowledge. Zbl 1343.94042
Bellare, Mihir; Goldreich, Oded
5
2011
Authenticated and misuse-resistant encryption of key-dependent data. Zbl 1290.94144
Bellare, Mihir; Keelveedhi, Sriram
1
2011
Proving computational ability. Zbl 1343.94041
Bellare, Mihir; Goldreich, Oded
1
2011
Pseudorandom functions and permutations provably secure against related-key attacks. Zbl 1283.94050
Bellare, Mihir; Cash, David
23
2010
Robust encryption. Zbl 1274.94032
Abdalla, Michel; Bellare, Mihir; Neven, Gregory
13
2010
Cryptographic agility and its relation to circular encryption. Zbl 1280.94034
Acar, Tolga; Belenkiy, Mira; Bellare, Mihir; Cash, David
9
2010
Possibility and impossibility results for encryption and commitment secure under selective opening. Zbl 1239.94033
Bellare, Mihir; Hofheinz, Dennis; Yilek, Scott
46
2009
Simulation without the artificial abort: simplified proof and improved concrete security for Waters’ IBE scheme. Zbl 1239.94034
Bellare, Mihir; Ristenpart, Thomas
21
2009
Format-preserving encryption. Zbl 1267.94037
Bellare, Mihir; Ristenpart, Thomas; Rogaway, Phillip; Stegers, Till
17
2009
Hedged public-key encryption: how to protect against bad randomness. Zbl 1267.94036
Bellare, Mihir; Brakerski, Zvika; Naor, Moni; Ristenpart, Thomas; Segev, Gil; Shacham, Hovav; Yilek, Scott
15
2009
Security proofs for identity-based identification and signature schemes. Zbl 1166.94008
Bellare, Mihir; Namprempre, Chanathip; Neven, Gregory
10
2009
Key insulation and intrusion resilience over a public channel. Zbl 1237.94049
Bellare, Mihir; Duan, Shanshan; Palacio, Adriana
3
2009
Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions. Zbl 1161.94378
Abdalla, Michel; Bellare, Mihir; Catalano, Dario; Kiltz, Eike; Kohno, Tadayoshi; Lange, Tanja; Malone-Lee, John; Neven, Gregory; Paillier, Pascal; Shi, Haixia
25
2008
Deterministic encryption: Definitional equivalences and constructions without random oracles. Zbl 1183.94020
Bellare, Mihir; Fischlin, Marc; O’Neill, Adam; Ristenpart, Thomas
23
2008
Authenticated encryption: relations among notions and analysis of the generic composition paradigm. Zbl 1161.94435
Bellare, Mihir; Namprempre, Chanathip
15
2008
Hash functions from sigma protocols and improvements to VSH. Zbl 1206.94053
Bellare, Mihir; Ristov, Todor
4
2008
From identification to signatures via the Fiat-Shamir transform: necessary and sufficient conditions for security and forward-security. Zbl 1329.94049
Abdalla, Michel; An, Jee Hea; Bellare, Mihir; Namprempre, Chanathip
3
2008
Deterministic and efficiently searchable encryption. Zbl 1215.94032
Bellare, Mihir; Boldyreva, Alexandra; O’Neill, Adam
46
2007
Two-tier signatures, strongly unforgeable signatures, and Fiat-Shamir without random oracles. Zbl 1127.94019
Bellare, Mihir; Shoup, Sarah
27
2007
Unrestricted aggregate signatures. Zbl 1171.94363
Bellare, Mihir; Namprempre, Chanathip; Neven, Gregory
13
2007
Hash functions in the dedicated-key setting: Design choices and MPP transforms. Zbl 1171.94339
Bellare, Mihir; Ristenpart, Thomas
11
2007
Multirecipient encryption schemes: how to save on bandwidth and computation without sacrificing security. Zbl 1326.94073
Bellare, Mihir; Boldyreva, Alexandra; Kurosawa, K.; Staddon, Jessica
8
2007
The security of triple encryption and a framework for code-based game-playing proofs. Zbl 1140.94321
Bellare, Mihir; Rogaway, Phillip
109
2006
New proofs for NMAC and HMAC: security without collision-resistance. Zbl 1161.68437
Bellare, Mihir
32
2006
Multi-property-preserving hash domain extension and the EMD transform. Zbl 1172.94561
Bellare, Mihir; Ristenpart, Thomas
23
2006
Protecting against key-exposure: strongly key-insulated encryption with optimal threshold. Zbl 1098.94020
Bellare, Mihir; Palacio, Adriana
13
2006
Identity-based multi-signatures from RSA. Zbl 1177.94181
Bellare, Mihir; Neven, Gregory
5
2006
Foundations of group signatures: the case of dynamic groups. Zbl 1079.94013
Bellare, Mihir; Shi, Haixia; Zhang, Chong
36
2005
Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions. Zbl 1145.94430
Abdalla, Michel; Bellare, Mihir; Catalano, Dario; Kiltz, Eike; Kohno, Tadayoshi; Lange, Tanja; Malone-Lee, John; Neven, Gregory; Paillier, Pascal; Shi, Haixia
36
2005
Improved security analyses for CBC MACs. Zbl 1145.94432
Bellare, Mihir; Pietrzak, Krzysztof; Rogaway, Phillip
13
2005
Transitive signatures: new schemes and proofs. Zbl 1282.94076
Bellare, Mihir; Neven, Gregory
7
2005
The knowledge-of-exponent assumptions and 3-round zero-knowledge protocols. Zbl 1104.94043
Bellare, Mihir; Palacio, Adriana
32
2004
Security proofs for identity-based identification and signature schemes. Zbl 1120.94309
Bellare, Mihir; Namprempre, Chanathip; Neven, Gregory
30
2004
Towards plaintext-aware public-key encryption without random oracles. Zbl 1094.94506
Bellare, Mihir; Palacio, Adriana
19
2004
An uninstantiable random-oracle-Model scheme for a hybrid-encryption problem. Zbl 1122.94350
Bellare, Mihir; Boldyreva, Alexandra; Palacio, Adriana
17
2004
The EAX mode of operation. Zbl 1079.68537
Bellare, Mihir; Rogaway, Phillip; Wagner, David
16
2004
Hash function balance and its impact on birthday attacks. Zbl 1122.94351
Bellare, Mihir; Kohno, Tadayoshi
11
2004
Breaking and provably repairing the SSH authenticated encryption scheme: a case study of the encode-then-encrypt-and-MAC paradigm. Zbl 1291.94056
Bellare, Mihir; Kohno, Tadayoshi; Namprempre, Chanathip
9
2004
Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions. Zbl 1038.94552
Bellare, Mihir; Micciancio, Daniele; Warinschi, Bogdan
62
2003
A theoretical treatment of related-key attacks: RKA-PRPs, RKA-PRFs, and applications. Zbl 1038.94520
Bellare, Mihir; Kohno, Tadayoshi
50
2003
The one-more-RSA-inversion problems and the security of Chaum’s blind signature scheme. Zbl 1045.94012
Bellare, M.; Namprempre, C.; Pointcheval, D.; Semanko, M.
35
2003
Forward-security in private-key cryptography. Zbl 1039.94510
Bellare, Mihir; Yee, Bennet
18
2003
From identification to signatures via the Fiat-Shamir transform: minimizing assumptions for security and forward-security. Zbl 1056.94519
Abdalla, Michel; An, Jee Hea; Bellare, Mihir; Namprempre, Chanathip
19
2002
GQ and Schnorr identification schemes: Proofs of security against impersonation under active and concurrent attacks. Zbl 1026.94521
Bellare, Mihir; Palacio, Adriana
16
2002
Randomness re-use in multi-recipient encryption schemes. Zbl 1033.94511
Bellare, Mihir; Boldyreva, Alexandra; Staddon, Jessica
12
2002
The power of RSA inversion oracles and the security of Chaum’s RSA-based blind signature scheme. Zbl 1051.94510
Bellare, Mihir; Namprempre, Chanathip; Pointcheval, David; Semanko, Michael
9
2002
Transitive signatures based on factoring and RSA. Zbl 1065.94561
Bellare, Mihir; Neven, Gregory
5
2002
A note on negligible functions. Zbl 1022.94009
Bellare, Mihir
4
2002
Key-privacy in public-key encryption. Zbl 1064.94553
Bellare, Mihir; Boldyreva, Alexandra; Desai, Anand; Pointcheval, David
43
2001
The oracle Diffie-Hellman assumptions and an analysis of DHIES. Zbl 0991.94033
Abdalla, Michel; Bellare, Mihir; Rogaway, Phillip
36
2001
Online ciphers and the Hash-CBC construction. Zbl 1002.94520
Bellare, Mihir; Boldyreva, Alexandra; Knudsen, Lars; Namprempre, Chanathip
13
2001
Identification protocols secure against reset attacks. Zbl 1012.94554
Bellare, Mihir; Fischlin, Marc; Goldwasser, Shafi; Micali, Silvio
9
2001
Does encryption with redundancy provide authenticity? Zbl 0981.94034
An, Jee Hea; Bellare, Mihir
3
2001
Authenticated key exchange secure against dictionary attacks. Zbl 1082.94533
Bellare, Mihir; Pointcheval, David; Rogaway, Phillip
87
2000
Authenticated encryption: Relations among notions and analysis of the generic composition paradigm. Zbl 0973.68059
Bellare, Mihir; Namprempre, Chanathip
66
2000
Public-key encryption in a multi-user setting: security proofs and improvements. Zbl 1082.94504
Bellare, Mihir; Boldyreva, Alexandra; Micali, Silvio
45
2000
The security of the cipher block chaining message authentication code. Zbl 0970.68054
Bellare, Mihir; Kilian, Joe; Rogaway, Phillip
34
2000
Encode-then-encipher encryption: How to exploit nonces or redundancy in plaintexts for efficient cryptography. Zbl 0974.94008
Bellare, Mihir; Rogaway, Phillip
28
2000
...and 49 more Documents
all top 5

Cited by 2,470 Authors

31 Bellare, Mihir
29 Susilo, Willy
25 Kiltz, Eike
25 Mu, Yi
23 Goldreich, Oded
23 Hofheinz, Dennis
22 Libert, Benoît
22 Yung, Moti
19 Jager, Tibor
18 Wang, Huaxiong
17 Venturi, Daniele
17 Waters, Brent
16 Nandi, Mridul
16 Tessaro, Stefano
15 Fuchsbauer, Georg
15 Hanaoka, Goichiro
14 Paterson, Kenneth G.
14 Stebila, Douglas
13 Segev, Gil
13 Tanaka, Keisuke
13 Wong, Duncan S.
13 Yang, Guomin
12 Canetti, Ran
12 Cao, Zhenfu
12 Gu, Dawu
12 Guo, Fuchun
12 Ling, San
12 Liu, Shengli
12 Matsuda, Takahiro
12 Nguyen, Khoa
12 Pointcheval, David
11 Abdalla, Michel
11 Camenisch, Jan L.
11 Farshim, Pooya
11 Fischlin, Marc
11 Lee, Kwangsu
11 Rogaway, Phillip
11 Sahai, Amit
11 Seurin, Yannick
10 Abe, Masayuki
10 Backes, Michael
10 Boneh, Dan
10 Chiesa, Alessandro
10 Herranz, Javier
10 Katsumata, Shuichi
10 Katz, Jonathan N.
10 Ostrovsky, Rafail
10 Qin, Baodong
10 Warinschi, Bogdan
10 Weng, Jian
10 Wichs, Daniel
9 Ateniese, Giuseppe
9 Boldyreva, Alexandra
9 Chen, Rongmao
9 Dodis, Yevgeniy
9 Iwata, Tetsu
9 Li, Bao
9 Mennink, Bart
9 Minematsu, Kazuhiko
9 Pan, Jiaxin
9 Park, Jonghwan
9 Safavi-Naini, Reihaneh
9 Steinwandt, Rainer
9 Wu, Qianhong
9 Zhandry, Mark
8 Bitansky, Nir
8 Boyd, Colin A.
8 Emura, Keita
8 Håstad, Johan Torkel
8 Huang, Xinyi
8 Ishai, Yuval
8 Nielsen, Jesper Buus
8 Pass, Rafael
8 Pietrzak, Krzysztof
8 Slamanig, Daniel
8 Smart, Nigel P.
8 Vaikuntanathan, Vinod
8 Yasuda, Kan
8 Yu, Jia
7 Andreeva, Elena Anatol’evna
7 Applebaum, Benny
7 Blazy, Olivier
7 Chen, Kefei
7 Chen, Yu
7 Gennaro, Rosario
7 Hao, Rong
7 Lehmann, Anja
7 Li, Jin
7 Liu, JianWei
7 Lu, Xianhui
7 Neven, Gregory
7 Phan, Raphael Chung-Wei
7 Preneel, Bart
7 Stam, Martijn
7 Takagi, Tsuyoshi
7 Trevisan, Luca
7 Yoneyama, Kazuki
7 Zhao, Yunlei
6 Au, Man Ho
6 Ben-Sasson, Eli
...and 2,370 more Authors
all top 5

Cited in 122 Serials

132 Journal of Cryptology
112 Theoretical Computer Science
93 Designs, Codes and Cryptography
84 Information Sciences
46 Information Processing Letters
34 Journal of Computer and System Sciences
30 Discrete Applied Mathematics
20 Information and Computation
20 Journal of Mathematical Cryptology
18 SIAM Journal on Computing
16 Algorithmica
14 Cryptography and Communications
12 International Journal of Foundations of Computer Science
12 Matematicheskie Voprosy Kriptografii
11 Soft Computing
11 Journal of Discrete Mathematical Sciences & Cryptography
10 Applied Mathematics and Computation
10 Applicable Algebra in Engineering, Communication and Computing
9 Computational Complexity
8 Random Structures & Algorithms
8 Science in China. Series F
8 Prikladnaya Diskretnaya Matematika
7 Mathematical Programming. Series A. Series B
7 Quantum Information Processing
7 Journal of Shanghai Jiaotong University (Science)
6 Mathematical and Computer Modelling
6 Wuhan University Journal of Natural Sciences (WUJNS)
6 Science China. Information Sciences
5 Computers & Mathematics with Applications
5 Operations Research Letters
5 Journal of Automated Reasoning
5 Journal of Discrete Algorithms
5 Advances in Mathematics of Communications
5 Discrete Mathematics, Algorithms and Applications
4 International Journal of Computer Mathematics
4 Mathematical Problems in Engineering
4 Theory of Computing Systems
4 Interdisciplinary Information Sciences (IIS)
4 International Journal of Applied Mathematics and Computer Science
4 Frontiers of Computer Science
3 International Journal of Theoretical Physics
3 Computers & Operations Research
3 European Journal of Operational Research
3 Distributed Computing
3 Tatra Mountains Mathematical Publications
3 Nonlinear Dynamics
3 Journal of Combinatorial Optimization
3 Journal of Zhejiang University. Science A
2 Acta Informatica
2 Artificial Intelligence
2 Computing
2 Combinatorica
2 Journal of Computer Science and Technology
2 Computational Geometry
2 Bulletin of the American Mathematical Society. New Series
2 Cybernetics and Systems Analysis
2 Annals of Mathematics and Artificial Intelligence
2 Journal of the ACM
2 Discrete Optimization
2 Mathematics in Computer Science
2 Optimization Letters
2 Symmetry
2 Arabian Journal for Science and Engineering
2 Computer Science Review
1 Communications in Mathematical Physics
1 Discrete Mathematics
1 IEEE Transactions on Information Theory
1 Israel Journal of Mathematics
1 Journal of the Franklin Institute
1 Chaos, Solitons and Fractals
1 Acta Mathematica
1 International Journal of Mathematics and Mathematical Sciences
1 Journal of Computational and Applied Mathematics
1 Journal of Graph Theory
1 Journal of Number Theory
1 Journal of Optimization Theory and Applications
1 Mathematica Slovaca
1 Networks
1 Operations Research
1 Programming and Computer Software
1 Synthese
1 Cryptologia
1 European Journal of Combinatorics
1 Science of Computer Programming
1 Annals of Pure and Applied Logic
1 Graphs and Combinatorics
1 Journal of Complexity
1 Discrete & Computational Geometry
1 Facta Universitatis. Series Mathematics and Informatics
1 Science in China. Series A
1 Neural Networks
1 Computational Mathematics and Modeling
1 Annals of Operations Research
1 MSCS. Mathematical Structures in Computer Science
1 Journal of Global Optimization
1 Linear Algebra and its Applications
1 SIAM Journal on Optimization
1 Combinatorics, Probability and Computing
1 Turkish Journal of Mathematics
1 Finite Fields and their Applications
...and 22 more Serials

Citations by Year

The data are displayed as stored in Wikidata under a Creative Commons CC0 License. Updates and corrections should be made in Wikidata.