×

zbMATH — the first resource for mathematics

Bellare, Mihir

Compute Distance To:
Author ID: bellare.mihir Recent zbMATH articles by "Bellare, Mihir"
Published as: Bellare, Mihir; Bellare, M.
External Links: MGP · Wikidata · dblp · GND
Documents Indexed: 148 Publications since 1990, including 1 Book
all top 5

Co-Authors

6 single-authored
24 Rogaway, Phillip
12 Namprempre, Chanathip
10 Goldreich, Oded
10 Goldwasser, Shafi
10 Neven, Gregory
9 Boldyreva, Alexandra
8 Abdalla, Michel
8 Ristenpart, Thomas
6 Keelveedhi, Sriram
6 Palacio, Adriana
5 Hoang, Viet Tung
5 Kiltz, Eike
5 Kohno, Tadayoshi
5 Micali, Silvio
5 Pointcheval, David
5 Stepanovs, Igors
5 Sudan, Madhu
5 Tessaro, Stefano
4 An, Jee Hea
4 Waters, Brent
4 Yilek, Scott
3 Cash, David M.
3 Krawczyk, Hugo
3 Shi, Haixia
3 Tackmann, Björn
2 Aiello, William A.
2 Canetti, Ran
2 Catalano, Dario
2 Coppersmith, Don
2 Desai, Anand
2 Dowsley, Rafael
2 Fischlin, Marc
2 Fuchsbauer, Georg
2 Garay, Juan A.
2 Håstad, Johan Torkel
2 Hofheinz, Dennis
2 Kilian, Joe
2 Kiwi, Marcos A.
2 Knudsen, Lars Ramkilde
2 Lange, Tanja
2 Malone-Lee, John
2 Micciancio, Daniele
2 O’Neill, Adam
2 Paillier, Pascal
2 Paterson, Kenneth G.
2 Poettering, Bertram
2 Rabin, Tal
2 Ristov, Todor
2 Sahai, Amit
2 Semanko, Michael
2 Staddon, Jessica N.
2 Stebila, Douglas
2 Thomson, Susan
2 Venkatesan, Ramarathnam
2 Yung, Moti
1 Acar, Tolga
1 Auerbach, Benedikt
1 Bar-Noy, Amotz
1 Belenkiy, Mira
1 Bernstein, Daniel Julius
1 Brakerski, Zvika
1 Cowen, Lenore J.
1 Dai, Wei
1 Di Crescenzo, Giovanni
1 Duan, Shanshan
1 Guérin, Roch
1 Halevi, Shai
1 Halldórsson, Magnús Mar
1 Jaeger, Joseph
1 Kane, Daniel M.
1 Krovetz, Ted
1 Kurosawa, Kaoru
1 Li, Lucy
1 Meiklejohn, Sarah
1 Miller, Rachel
1 Miner, Sara K.
1 Naor, Moni
1 Ng, Ruth
1 Nyayapati, Maya
1 Peikert, Chris
1 Petrank, Erez
1 Pietrzak, Krzysztof
1 Rivest, Ronald Linn
1 Scafuro, Alessandra
1 Segev, Gil
1 Shacham, Hovav
1 Shachnai, Hadas
1 Shoup, Sarah
1 Singh, Asha Camper
1 Stegers, Till
1 Tamir, Tami
1 Vadhan, Salil P.
1 Vardy, Alexander
1 Wagner, David A.
1 Warinschi, Bogdan
1 Yee, Bennet
1 Zhang, Chong

Publications by Year

Citations contained in zbMATH Open

143 Publications have been cited 2,308 times in 1,338 Documents Cited by Year
Entity authentication and key distribution. Zbl 0870.94019
Bellare, Mihir; Rogaway, Phillip
105
1994
The security of triple encryption and a framework for code-based game-playing proofs. Zbl 1140.94321
Bellare, Mihir; Rogaway, Phillip
78
2006
Free bits, PCPs, and nonapproximability – towards tight results. Zbl 0912.68041
Bellare, Mihir; Goldreich, Oded; Sudan, Madhu
77
1998
Authenticated key exchange secure against dictionary attacks. Zbl 1082.94533
Bellare, Mihir; Pointcheval, David; Rogaway, Phillip
74
2000
The exact security of digital signatures – how to sign with RSA and Rabin. Zbl 1304.94094
Bellare, Mihir; Rogaway, Phillip
65
1996
Relations among notions of security for public-key encryption schemes. Zbl 0931.94014
Bellare, Mihir; Desai, Anand; Pointcheval, David; Rogaway, Phillip
61
1998
Optimal asymmetric encryption. Zbl 0881.94010
Bellare, Mihir; Rogaway, Phillip
58
1995
Efficient probabilistically checkable proofs and applications to approximations. Zbl 1310.68083
Bellare, M.; Goldwasser, S.; Lund, C.; Russell, A.
58
1993
Authenticated encryption: Relations among notions and analysis of the generic composition paradigm. Zbl 0973.68059
Bellare, Mihir; Namprempre, Chanathip
50
2000
Keying hash functions for message authentication. Zbl 1329.94051
Bellare, Mihir; Canetti, Ran; Krawczyk, Hugo
49
1996
On defining proofs of knowledge. Zbl 0823.94016
Bellare, Mihir; Goldreich, Oded
47
1993
Provably secure session key distribution – The three party case. Zbl 0916.94006
Bellare, Mihir; Rogaway, Phillip
45
1995
Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions. Zbl 1038.94552
Bellare, Mihir; Micciancio, Daniele; Warinschi, Bogdan
42
2003
A theoretical treatment of related-key attacks: RKA-PRPs, RKA-PRFs, and applications. Zbl 1038.94520
Bellare, Mihir; Kohno, Tadayoshi
40
2003
Deterministic and efficiently searchable encryption. Zbl 1215.94032
Bellare, Mihir; Boldyreva, Alexandra; O’Neill, Adam
39
2007
On chromatic sums and distributed resource allocation. Zbl 0895.68022
Bar-Noy, Amotz; Bellare, Mihir; Halldórsson, Magnús M.; Shachnai, Hadas; Tamir, Tami
37
1998
A modular approach to the design and analysis of authentication and key exchange protocols. Zbl 1028.68015
Bellare, Mihir; Canetti, Ran; Krawczyk, Hugo
36
1998
Public-key encryption in a multi-user setting: security proofs and improvements. Zbl 1082.94504
Bellare, Mihir; Boldyreva, Alexandra; Micali, Silvio
35
2000
A forward-secure digital signature scheme. Zbl 0942.94026
Bellare, Mihir; Miner, Sara K.
34
1999
Key-privacy in public-key encryption. Zbl 1064.94553
Bellare, Mihir; Boldyreva, Alexandra; Desai, Anand; Pointcheval, David
32
2001
Possibility and impossibility results for encryption and commitment secure under selective opening. Zbl 1239.94033
Bellare, Mihir; Hofheinz, Dennis; Yilek, Scott
32
2009
The security of the cipher block chaining message authentication code. Zbl 0970.68054
Bellare, Mihir; Kilian, Joe; Rogaway, Phillip
30
2000
Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions. Zbl 1145.94430
Abdalla, Michel; Bellare, Mihir; Catalano, Dario; Kiltz, Eike; Kohno, Tadayoshi; Lange, Tanja; Malone-Lee, John; Neven, Gregory; Paillier, Pascal; Shi, Haixia
30
2005
Linearity testing in characteristic two. Zbl 0867.68060
Bellare, Mihir; Coppersmith, Don; Håstad, Johan; Kiwi, Marcos; Sudan, Madhu
27
1996
Security proofs for identity-based identification and signature schemes. Zbl 1120.94309
Bellare, Mihir; Namprempre, Chanathip; Neven, Gregory
27
2004
The knowledge-of-exponent assumptions and 3-round zero-knowledge protocols. Zbl 1104.94043
Bellare, Mihir; Palacio, Adriana
26
2004
The one-more-RSA-inversion problems and the security of Chaum’s blind signature scheme. Zbl 1045.94012
Bellare, M.; Namprempre, C.; Pointcheval, D.; Semanko, M.
26
2003
The oracle Diffie-Hellman assumptions and an analysis of DHIES. Zbl 0991.94033
Abdalla, Michel; Bellare, Mihir; Rogaway, Phillip
25
2001
Encode-then-encipher encryption: How to exploit nonces or redundancy in plaintexts for efficient cryptography. Zbl 0974.94008
Bellare, Mihir; Rogaway, Phillip
24
2000
Foundations of group signatures: the case of dynamic groups. Zbl 1079.94013
Bellare, Mihir; Shi, Haixia; Zhang, Chong
24
2005
Two-tier signatures, strongly unforgeable signatures, and Fiat-Shamir without random oracles. Zbl 1127.94019
Bellare, Mihir; Shoup, Sarah
24
2007
Improved non-approximability results. Zbl 1344.68094
Bellare, Mihir; Sudan, Madhu
22
1994
Collision-resistant hashing: Towards making UOWHFs practical. Zbl 0882.94015
Bellare, Mihir; Rogaway, Phillip
22
1997
Instantiating random oracles via UCEs. Zbl 1316.94060
Bellare, Mihir; Hoang, Viet Tung; Keelveedhi, Sriram
22
2013
Deterministic encryption: Definitional equivalences and constructions without random oracles. Zbl 1183.94020
Bellare, Mihir; Fischlin, Marc; O’Neill, Adam; Ristenpart, Thomas
22
2008
New proofs for NMAC and HMAC: security without collision-resistance. Zbl 1161.68437
Bellare, Mihir
22
2006
Fast batch verification for modular exponentiation and digital signatures. Zbl 0929.68053
Bellare, Mihir; Garay, Juan A.; Rabin, Tal
21
1998
Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions. Zbl 1161.94378
Abdalla, Michel; Bellare, Mihir; Catalano, Dario; Kiltz, Eike; Kohno, Tadayoshi; Lange, Tanja; Malone-Lee, John; Neven, Gregory; Paillier, Pascal; Shi, Haixia
21
2008
Multi-property-preserving hash domain extension and the EMD transform. Zbl 1172.94561
Bellare, Mihir; Ristenpart, Thomas
21
2006
Cryptography secure against related-key attacks and tampering. Zbl 1227.94028
Bellare, Mihir; Cash, David; Miller, Rachel
20
2011
Poly-many hardcore bits for any one-way function and a framework for differing-inputs obfuscation. Zbl 1317.94085
Bellare, Mihir; Stepanovs, Igors; Tessaro, Stefano
20
2014
Free bits, PCPs and non-approximability – towards tight results. Zbl 0938.68820
Bellare, Mihir; Goldreich, Oded; Sudan, Madhu
18
1995
The complexity of approximating a nonlinear program. Zbl 0968.90527
Bellare, Mihir; Rogaway, Phillip
17
1993
The security of cipher block chaining. Zbl 0939.94554
Bellare, Mihir; Kilian, Joe; Rogaway, Phillip
17
1994
Simulation without the artificial abort: simplified proof and improved concrete security for Waters’ IBE scheme. Zbl 1239.94034
Bellare, Mihir; Ristenpart, Thomas
17
2009
Pseudorandom functions and permutations provably secure against related-key attacks. Zbl 1283.94050
Bellare, Mihir; Cash, David
17
2010
An uninstantiable random-oracle-Model scheme for a hybrid-encryption problem. Zbl 1122.94350
Bellare, Mihir; Boldyreva, Alexandra; Palacio, Adriana
16
2004
Security of symmetric encryption against mass surveillance. Zbl 1317.94084
Bellare, Mihir; Paterson, Kenneth G.; Rogaway, Phillip
15
2014
The complexity of approximating a nonlinear program. Zbl 0839.90104
Bellare, Mihir; Rogaway, Phillip
14
1995
The EAX mode of operation. Zbl 1079.68537
Bellare, Mihir; Rogaway, Phillip; Wagner, David
14
2004
Forward-security in private-key cryptography. Zbl 1039.94510
Bellare, Mihir; Yee, Bennet
14
2003
Identity-based encryption secure against selective opening attack. Zbl 1295.94020
Bellare, Mihir; Waters, Brent; Yilek, Scott
14
2011
RKA security beyond the linear barrier: IBE, encryption and signatures. Zbl 1292.94028
Bellare, Mihir; Paterson, Kenneth G.; Thomson, Susan
14
2012
Incremental cryptography: The case of hashing and signing. Zbl 0939.94530
Bellare, Mihir; Goldreich, Oded; Goldwasser, Shafi
13
1994
Non-malleable encryption: Equivalence between two notions, and an indistinguishability-based characterization. Zbl 0942.94024
Bellare, Mihir; Sahai, Amit
13
1999
Towards plaintext-aware public-key encryption without random oracles. Zbl 1094.94506
Bellare, Mihir; Palacio, Adriana
13
2004
New paradigms for digital signatures and message authentication based on non-interactive zero knowledge proofs. Zbl 0722.68042
Bellare, Mihir; Goldwasser, Shafi
13
1990
Format-preserving encryption. Zbl 1267.94037
Bellare, Mihir; Ristenpart, Thomas; Rogaway, Phillip; Stegers, Till
13
2009
Resisting randomness subversion: fast deterministic and hedged public-key encryption in the standard model. Zbl 1375.94100
Bellare, Mihir; Hoang, Viet Tung
13
2015
Standard security does not imply security against selective-opening. Zbl 1297.94046
Bellare, Mihir; Dowsley, Rafael; Waters, Brent; Yilek, Scott
13
2012
Certifying permutations: Noninteractive zero-knowledge based on any trapdoor permutation. Zbl 0861.94013
Bellare, Mihir; Yung, Moti
12
1996
GQ and Schnorr identification schemes: Proofs of security against impersonation under active and concurrent attacks. Zbl 1026.94521
Bellare, Mihir; Palacio, Adriana
12
2002
From identification to signatures via the Fiat-Shamir transform: minimizing assumptions for security and forward-security. Zbl 1056.94519
Abdalla, Michel; An, Jee Hea; Bellare, Mihir; Namprempre, Chanathip
12
2002
Randomness in interactive proofs. Zbl 0802.68053
Bellare, Mihir; Goldreich, Oded; Goldwasser, Shafi
12
1993
Authenticated encryption: relations among notions and analysis of the generic composition paradigm. Zbl 1161.94435
Bellare, Mihir; Namprempre, Chanathip
12
2008
Online ciphers and the Hash-CBC construction. Zbl 1002.94520
Bellare, Mihir; Boldyreva, Alexandra; Knudsen, Lars; Namprempre, Chanathip
11
2001
The complexity of decision versus search. Zbl 0802.68052
Bellare, Mihir; Goldwasser, Shafi
11
1994
Hedged public-key encryption: how to protect against bad randomness. Zbl 1267.94036
Bellare, Mihir; Brakerski, Zvika; Naor, Moni; Ristenpart, Thomas; Segev, Gil; Shacham, Hovav; Yilek, Scott
11
2009
Hash functions in the dedicated-key setting: Design choices and MPP transforms. Zbl 1171.94339
Bellare, Mihir; Ristenpart, Thomas
11
2007
Unrestricted aggregate signatures. Zbl 1171.94363
Bellare, Mihir; Namprempre, Chanathip; Neven, Gregory
11
2007
Improved security analyses for CBC MACs. Zbl 1145.94432
Bellare, Mihir; Pietrzak, Krzysztof; Rogaway, Phillip
11
2005
Incremental cryptography and application to virus protection. Zbl 0916.94005
Bellare, Mihir; Goldreich, Oded; Goldwasser, Shafi
10
1995
Uniform generation of NP-witnesses using an NP-oracle. Zbl 1006.68050
Bellare, Mihir; Goldreich, Oded; Petrank, Erez
10
2000
Randomness re-use in multi-recipient encryption schemes. Zbl 1033.94511
Bellare, Mihir; Boldyreva, Alexandra; Staddon, Jessica
10
2002
Protecting against key-exposure: strongly key-insulated encryption with optimal threshold. Zbl 1098.94020
Bellare, Mihir; Palacio, Adriana
10
2006
Hash function balance and its impact on birthday attacks. Zbl 1122.94351
Bellare, Mihir; Kohno, Tadayoshi
10
2004
Luby-Rackoff backwards: increasing security by making block ciphers non-invertible. Zbl 0994.94521
Bellare, Mihir; Krovetz, Ted; Rogaway, Phillip
9
1998
Identity-based (lossy) trapdoor functions and applications. Zbl 1297.94047
Bellare, Mihir; Kiltz, Eike; Peikert, Chris; Waters, Brent
9
2012
Adaptively secure garbling with applications to one-time programs and secure outsourcing. Zbl 1292.94027
Bellare, Mihir; Hoang, Viet Tung; Rogaway, Phillip
9
2012
Identification protocols secure against reset attacks. Zbl 1012.94554
Bellare, Mihir; Fischlin, Marc; Goldwasser, Shafi; Micali, Silvio
8
2001
XOR MACs: New methods for message authentication using finite pseudorandom functions. Zbl 0876.94020
Bellare, Mihir; Guérin, Roch; Rogaway, Phillip
8
1995
Semantic security for the wiretap channel. Zbl 1296.94081
Bellare, Mihir; Tessaro, Stefano; Vardy, Alexander
8
2012
Robust encryption. Zbl 1274.94032
Abdalla, Michel; Bellare, Mihir; Neven, Gregory
8
2010
Breaking and provably repairing the SSH authenticated encryption scheme: a case study of the encode-then-encrypt-and-MAC paradigm. Zbl 1291.94056
Bellare, Mihir; Kohno, Tadayoshi; Namprempre, Chanathip
8
2004
Linearity testing in characteristic two. Zbl 0938.68926
Bellare, M.; Coppersmith, D.; Håstad, J.; Kiwi, M.; Sudan, M.
7
1995
Non-interactive oblivious transfer and applications. Zbl 0722.68041
Bellare, Mihir; Micali, Silvio
7
1990
Contention in cryptoland: obfuscation, leakage and UCE. Zbl 1382.94062
Bellare, Mihir; Stepanovs, Igors; Tessaro, Stefano
7
2016
Security proofs for identity-based identification and signature schemes. Zbl 1166.94008
Bellare, Mihir; Namprempre, Chanathip; Neven, Gregory
7
2009
NIZKs with an untrusted CRS: security in the face of parameter subversion. Zbl 1407.94082
Bellare, Mihir; Fuchsbauer, Georg; Scafuro, Alessandra
7
2016
Transitive signatures: new schemes and proofs. Zbl 1282.94076
Bellare, Mihir; Neven, Gregory
7
2005
Policy-based signatures. Zbl 1335.94031
Bellare, Mihir; Fuchsbauer, Georg
7
2014
Cryptographic agility and its relation to circular encryption. Zbl 1280.94034
Acar, Tolga; Belenkiy, Mira; Bellare, Mihir; Cash, David
7
2010
‘Pseudo-random’ number generation within cryptographic algorithms: The DDS case. Zbl 0893.94044
Bellare, Mihir; Goldwasser, Shafi; Micciancio, Daniele
6
1997
Minimizing the use of random oracles in authenticated encryption schemes. Zbl 0888.94009
Bellare, Mihir; Rogaway, Phillip
6
1997
The power of RSA inversion oracles and the security of Chaum’s RSA-based blind signature scheme. Zbl 1051.94510
Bellare, Mihir; Namprempre, Chanathip; Pointcheval, David; Semanko, Michael
6
2002
Point-function obfuscation: a framework and generic constructions. Zbl 1382.94061
Bellare, Mihir; Stepanovs, Igors
6
2016
The multi-user security of authenticated encryption: AES-GCM in TLS 1.3. Zbl 1378.94023
Bellare, Mihir; Tackmann, Björn
6
2016
Multirecipient encryption schemes: how to save on bandwidth and computation without sacrificing security. Zbl 1326.94073
Bellare, Mihir; Boldyreva, Alexandra; Kurosawa, K.; Staddon, Jessica
6
2007
Many-to-one trapdoor functions and their relation to public-key cryptosystems. Zbl 0931.94015
Bellare, Mihir; Halevi, Shai; Sahai, Amit; Vadhan, Salil
5
1998
Multi-instance security and its application to password-based cryptography. Zbl 1296.94080
Bellare, Mihir; Ristenpart, Thomas; Tessaro, Stefano
5
2012
Nonces are noticed: AEAD revisited. Zbl 07202387
Bellare, Mihir; Ng, Ruth; Tackmann, Björn
1
2019
Public-key encryption resistant to parameter subversion and its realization from efficiently-embeddable groups. Zbl 1385.94008
Auerbach, Benedikt; Bellare, Mihir; Kiltz, Eike
3
2018
Ratcheted encryption and key exchange: the security of messaging. Zbl 1418.94032
Bellare, Mihir; Singh, Asha Camper; Jaeger, Joseph; Nyayapati, Maya; Stepanovs, Igors
1
2017
Deterring certificate subversion: efficient double-authentication-preventing signatures. Zbl 1400.94117
Bellare, Mihir; Poettering, Bertram; Stebila, Douglas
1
2017
Contention in cryptoland: obfuscation, leakage and UCE. Zbl 1382.94062
Bellare, Mihir; Stepanovs, Igors; Tessaro, Stefano
7
2016
NIZKs with an untrusted CRS: security in the face of parameter subversion. Zbl 1407.94082
Bellare, Mihir; Fuchsbauer, Georg; Scafuro, Alessandra
7
2016
Point-function obfuscation: a framework and generic constructions. Zbl 1382.94061
Bellare, Mihir; Stepanovs, Igors
6
2016
The multi-user security of authenticated encryption: AES-GCM in TLS 1.3. Zbl 1378.94023
Bellare, Mihir; Tackmann, Björn
6
2016
From identification to signatures, tightly: a framework and generic transforms. Zbl 1407.94083
Bellare, Mihir; Poettering, Bertram; Stebila, Douglas
4
2016
Hash-function based PRFs: AMAC and its multi-user security. Zbl 1385.94010
Bellare, Mihir; Bernstein, Daniel J.; Tessaro, Stefano
4
2016
Nonce-based cryptography: retaining security when randomness fails. Zbl 1385.94011
Bellare, Mihir; Tackmann, Björn
3
2016
New negative results on differing-inputs obfuscation. Zbl 1371.94625
Bellare, Mihir; Stepanovs, Igors; Waters, Brent
3
2016
Big-key symmetric encryption: resisting key exfiltration. Zbl 1379.94030
Bellare, Mihir; Kane, Daniel; Rogaway, Phillip
2
2016
Resisting randomness subversion: fast deterministic and hedged public-key encryption in the standard model. Zbl 1375.94100
Bellare, Mihir; Hoang, Viet Tung
13
2015
Interactive message-locked encryption and secure deduplication. Zbl 1345.94040
Bellare, Mihir; Keelveedhi, Sriram
4
2015
Subtleties in the definition of IND-CCA: when and how should challenge decryption be disallowed? Zbl 1308.94059
Bellare, Mihir; Hofheinz, Dennis; Kiltz, Eike
3
2015
How secure is deterministic encryption? Zbl 1345.94038
Bellare, Mihir; Dowsley, Rafael; Keelveedhi, Sriram
3
2015
Adaptive witness encryption and asymmetric password-based cryptography. Zbl 1345.94039
Bellare, Mihir; Hoang, Viet Tung
3
2015
New proofs for NMAC and HMAC: security without collision resistance. Zbl 1332.94056
Bellare, Mihir
1
2015
Poly-many hardcore bits for any one-way function and a framework for differing-inputs obfuscation. Zbl 1317.94085
Bellare, Mihir; Stepanovs, Igors; Tessaro, Stefano
20
2014
Security of symmetric encryption against mass surveillance. Zbl 1317.94084
Bellare, Mihir; Paterson, Kenneth G.; Rogaway, Phillip
15
2014
Policy-based signatures. Zbl 1335.94031
Bellare, Mihir; Fuchsbauer, Georg
7
2014
Cryptography from compression functions: the UCE bridge to the ROM. Zbl 1343.94043
Bellare, Mihir; Hoang, Viet Tung; Keelveedhi, Sriram
2
2014
Key-versatile signatures and applications: RKA, KDM and joint enc/Sig. Zbl 1327.94031
Bellare, Mihir; Meiklejohn, Sarah; Thomson, Susan
2
2014
A characterization of chameleon hash functions and new, efficient designs. Zbl 1301.94107
Bellare, Mihir; Ristov, Todor
1
2014
Instantiating random oracles via UCEs. Zbl 1316.94060
Bellare, Mihir; Hoang, Viet Tung; Keelveedhi, Sriram
22
2013
Message-locked encryption and secure deduplication. Zbl 1306.94025
Bellare, Mihir; Keelveedhi, Sriram; Ristenpart, Thomas
5
2013
RKA security beyond the linear barrier: IBE, encryption and signatures. Zbl 1292.94028
Bellare, Mihir; Paterson, Kenneth G.; Thomson, Susan
14
2012
Standard security does not imply security against selective-opening. Zbl 1297.94046
Bellare, Mihir; Dowsley, Rafael; Waters, Brent; Yilek, Scott
13
2012
Identity-based (lossy) trapdoor functions and applications. Zbl 1297.94047
Bellare, Mihir; Kiltz, Eike; Peikert, Chris; Waters, Brent
9
2012
Adaptively secure garbling with applications to one-time programs and secure outsourcing. Zbl 1292.94027
Bellare, Mihir; Hoang, Viet Tung; Rogaway, Phillip
9
2012
Semantic security for the wiretap channel. Zbl 1296.94081
Bellare, Mihir; Tessaro, Stefano; Vardy, Alexander
8
2012
Multi-instance security and its application to password-based cryptography. Zbl 1296.94080
Bellare, Mihir; Ristenpart, Thomas; Tessaro, Stefano
5
2012
On-line ciphers and the Hash-CBC constructions. Zbl 1286.94058
Bellare, M.; Boldyreva, A.; Knudsen, L.; Namprempre, C.
5
2012
Cryptography secure against related-key attacks and tampering. Zbl 1227.94028
Bellare, Mihir; Cash, David; Miller, Rachel
20
2011
Identity-based encryption secure against selective opening attack. Zbl 1295.94020
Bellare, Mihir; Waters, Brent; Yilek, Scott
14
2011
On probabilistic versus deterministic provers in the definition of proofs of knowledge. Zbl 1343.94042
Bellare, Mihir; Goldreich, Oded
4
2011
Proving computational ability. Zbl 1343.94041
Bellare, Mihir; Goldreich, Oded
1
2011
Authenticated and misuse-resistant encryption of key-dependent data. Zbl 1290.94144
Bellare, Mihir; Keelveedhi, Sriram
1
2011
Pseudorandom functions and permutations provably secure against related-key attacks. Zbl 1283.94050
Bellare, Mihir; Cash, David
17
2010
Robust encryption. Zbl 1274.94032
Abdalla, Michel; Bellare, Mihir; Neven, Gregory
8
2010
Cryptographic agility and its relation to circular encryption. Zbl 1280.94034
Acar, Tolga; Belenkiy, Mira; Bellare, Mihir; Cash, David
7
2010
Possibility and impossibility results for encryption and commitment secure under selective opening. Zbl 1239.94033
Bellare, Mihir; Hofheinz, Dennis; Yilek, Scott
32
2009
Simulation without the artificial abort: simplified proof and improved concrete security for Waters’ IBE scheme. Zbl 1239.94034
Bellare, Mihir; Ristenpart, Thomas
17
2009
Format-preserving encryption. Zbl 1267.94037
Bellare, Mihir; Ristenpart, Thomas; Rogaway, Phillip; Stegers, Till
13
2009
Hedged public-key encryption: how to protect against bad randomness. Zbl 1267.94036
Bellare, Mihir; Brakerski, Zvika; Naor, Moni; Ristenpart, Thomas; Segev, Gil; Shacham, Hovav; Yilek, Scott
11
2009
Security proofs for identity-based identification and signature schemes. Zbl 1166.94008
Bellare, Mihir; Namprempre, Chanathip; Neven, Gregory
7
2009
Key insulation and intrusion resilience over a public channel. Zbl 1237.94049
Bellare, Mihir; Duan, Shanshan; Palacio, Adriana
3
2009
Deterministic encryption: Definitional equivalences and constructions without random oracles. Zbl 1183.94020
Bellare, Mihir; Fischlin, Marc; O’Neill, Adam; Ristenpart, Thomas
22
2008
Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions. Zbl 1161.94378
Abdalla, Michel; Bellare, Mihir; Catalano, Dario; Kiltz, Eike; Kohno, Tadayoshi; Lange, Tanja; Malone-Lee, John; Neven, Gregory; Paillier, Pascal; Shi, Haixia
21
2008
Authenticated encryption: relations among notions and analysis of the generic composition paradigm. Zbl 1161.94435
Bellare, Mihir; Namprempre, Chanathip
12
2008
Hash functions from sigma protocols and improvements to VSH. Zbl 1206.94053
Bellare, Mihir; Ristov, Todor
3
2008
From identification to signatures via the Fiat-Shamir transform: necessary and sufficient conditions for security and forward-security. Zbl 1329.94049
Abdalla, Michel; An, Jee Hea; Bellare, Mihir; Namprempre, Chanathip
1
2008
Deterministic and efficiently searchable encryption. Zbl 1215.94032
Bellare, Mihir; Boldyreva, Alexandra; O’Neill, Adam
39
2007
Two-tier signatures, strongly unforgeable signatures, and Fiat-Shamir without random oracles. Zbl 1127.94019
Bellare, Mihir; Shoup, Sarah
24
2007
Hash functions in the dedicated-key setting: Design choices and MPP transforms. Zbl 1171.94339
Bellare, Mihir; Ristenpart, Thomas
11
2007
Unrestricted aggregate signatures. Zbl 1171.94363
Bellare, Mihir; Namprempre, Chanathip; Neven, Gregory
11
2007
Multirecipient encryption schemes: how to save on bandwidth and computation without sacrificing security. Zbl 1326.94073
Bellare, Mihir; Boldyreva, Alexandra; Kurosawa, K.; Staddon, Jessica
6
2007
The security of triple encryption and a framework for code-based game-playing proofs. Zbl 1140.94321
Bellare, Mihir; Rogaway, Phillip
78
2006
New proofs for NMAC and HMAC: security without collision-resistance. Zbl 1161.68437
Bellare, Mihir
22
2006
Multi-property-preserving hash domain extension and the EMD transform. Zbl 1172.94561
Bellare, Mihir; Ristenpart, Thomas
21
2006
Protecting against key-exposure: strongly key-insulated encryption with optimal threshold. Zbl 1098.94020
Bellare, Mihir; Palacio, Adriana
10
2006
Identity-based multi-signatures from RSA. Zbl 1177.94181
Bellare, Mihir; Neven, Gregory
3
2006
Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions. Zbl 1145.94430
Abdalla, Michel; Bellare, Mihir; Catalano, Dario; Kiltz, Eike; Kohno, Tadayoshi; Lange, Tanja; Malone-Lee, John; Neven, Gregory; Paillier, Pascal; Shi, Haixia
30
2005
Foundations of group signatures: the case of dynamic groups. Zbl 1079.94013
Bellare, Mihir; Shi, Haixia; Zhang, Chong
24
2005
Improved security analyses for CBC MACs. Zbl 1145.94432
Bellare, Mihir; Pietrzak, Krzysztof; Rogaway, Phillip
11
2005
Transitive signatures: new schemes and proofs. Zbl 1282.94076
Bellare, Mihir; Neven, Gregory
7
2005
Security proofs for identity-based identification and signature schemes. Zbl 1120.94309
Bellare, Mihir; Namprempre, Chanathip; Neven, Gregory
27
2004
The knowledge-of-exponent assumptions and 3-round zero-knowledge protocols. Zbl 1104.94043
Bellare, Mihir; Palacio, Adriana
26
2004
An uninstantiable random-oracle-Model scheme for a hybrid-encryption problem. Zbl 1122.94350
Bellare, Mihir; Boldyreva, Alexandra; Palacio, Adriana
16
2004
The EAX mode of operation. Zbl 1079.68537
Bellare, Mihir; Rogaway, Phillip; Wagner, David
14
2004
Towards plaintext-aware public-key encryption without random oracles. Zbl 1094.94506
Bellare, Mihir; Palacio, Adriana
13
2004
Hash function balance and its impact on birthday attacks. Zbl 1122.94351
Bellare, Mihir; Kohno, Tadayoshi
10
2004
Breaking and provably repairing the SSH authenticated encryption scheme: a case study of the encode-then-encrypt-and-MAC paradigm. Zbl 1291.94056
Bellare, Mihir; Kohno, Tadayoshi; Namprempre, Chanathip
8
2004
Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions. Zbl 1038.94552
Bellare, Mihir; Micciancio, Daniele; Warinschi, Bogdan
42
2003
A theoretical treatment of related-key attacks: RKA-PRPs, RKA-PRFs, and applications. Zbl 1038.94520
Bellare, Mihir; Kohno, Tadayoshi
40
2003
The one-more-RSA-inversion problems and the security of Chaum’s blind signature scheme. Zbl 1045.94012
Bellare, M.; Namprempre, C.; Pointcheval, D.; Semanko, M.
26
2003
Forward-security in private-key cryptography. Zbl 1039.94510
Bellare, Mihir; Yee, Bennet
14
2003
GQ and Schnorr identification schemes: Proofs of security against impersonation under active and concurrent attacks. Zbl 1026.94521
Bellare, Mihir; Palacio, Adriana
12
2002
From identification to signatures via the Fiat-Shamir transform: minimizing assumptions for security and forward-security. Zbl 1056.94519
Abdalla, Michel; An, Jee Hea; Bellare, Mihir; Namprempre, Chanathip
12
2002
Randomness re-use in multi-recipient encryption schemes. Zbl 1033.94511
Bellare, Mihir; Boldyreva, Alexandra; Staddon, Jessica
10
2002
The power of RSA inversion oracles and the security of Chaum’s RSA-based blind signature scheme. Zbl 1051.94510
Bellare, Mihir; Namprempre, Chanathip; Pointcheval, David; Semanko, Michael
6
2002
A note on negligible functions. Zbl 1022.94009
Bellare, Mihir
3
2002
Transitive signatures based on factoring and RSA. Zbl 1065.94561
Bellare, Mihir; Neven, Gregory
3
2002
Key-privacy in public-key encryption. Zbl 1064.94553
Bellare, Mihir; Boldyreva, Alexandra; Desai, Anand; Pointcheval, David
32
2001
The oracle Diffie-Hellman assumptions and an analysis of DHIES. Zbl 0991.94033
Abdalla, Michel; Bellare, Mihir; Rogaway, Phillip
25
2001
Online ciphers and the Hash-CBC construction. Zbl 1002.94520
Bellare, Mihir; Boldyreva, Alexandra; Knudsen, Lars; Namprempre, Chanathip
11
2001
Identification protocols secure against reset attacks. Zbl 1012.94554
Bellare, Mihir; Fischlin, Marc; Goldwasser, Shafi; Micali, Silvio
8
2001
Does encryption with redundancy provide authenticity? Zbl 0981.94034
An, Jee Hea; Bellare, Mihir
3
2001
Authenticated key exchange secure against dictionary attacks. Zbl 1082.94533
Bellare, Mihir; Pointcheval, David; Rogaway, Phillip
74
2000
Authenticated encryption: Relations among notions and analysis of the generic composition paradigm. Zbl 0973.68059
Bellare, Mihir; Namprempre, Chanathip
50
2000
Public-key encryption in a multi-user setting: security proofs and improvements. Zbl 1082.94504
Bellare, Mihir; Boldyreva, Alexandra; Micali, Silvio
35
2000
The security of the cipher block chaining message authentication code. Zbl 0970.68054
Bellare, Mihir; Kilian, Joe; Rogaway, Phillip
30
2000
Encode-then-encipher encryption: How to exploit nonces or redundancy in plaintexts for efficient cryptography. Zbl 0974.94008
Bellare, Mihir; Rogaway, Phillip
24
2000
Uniform generation of NP-witnesses using an NP-oracle. Zbl 1006.68050
Bellare, Mihir; Goldreich, Oded; Petrank, Erez
10
2000
Increasing the lifetime of a key: A comparative analysis of the security of re-keying techniques. Zbl 0973.68060
Abdalla, Michel; Bellare, Mihir
1
2000
Advances in cryptology - CRYPTO 2000. 20th annual international conference, Santa Barbara, CA, USA, August 20–24, 2000. Proceedings. Zbl 0944.00095
Bellare, Mihir
1
2000
A forward-secure digital signature scheme. Zbl 0942.94026
Bellare, Mihir; Miner, Sara K.
34
1999
Non-malleable encryption: Equivalence between two notions, and an indistinguishability-based characterization. Zbl 0942.94024
Bellare, Mihir; Sahai, Amit
13
1999
On the construction of variable-input-length ciphers. Zbl 0942.94012
Bellare, Mihir; Rogaway, Phillip
4
1999
...and 43 more Documents
all top 5

Cited by 2,058 Authors

26 Bellare, Mihir
25 Mu, Yi
25 Susilo, Willy
22 Goldreich, Oded
20 Kiltz, Eike
19 Hofheinz, Dennis
16 Yung, Moti
15 Libert, Benoît
14 Nandi, Mridul
14 Venturi, Daniele
13 Cao, Zhenfu
13 Fuchsbauer, Georg
13 Wang, Huaxiong
13 Waters, Brent
13 Wong, Duncan S.
12 Hanaoka, Goichiro
12 Yang, Guomin
11 Guo, Fuchun
11 Rogaway, Phillip
10 Abdalla, Michel
10 Camenisch, Jan L.
10 Gu, Dawu
10 Herranz, Javier
10 Jager, Tibor
10 Katz, Jonathan N.
10 Paterson, Kenneth G.
10 Pointcheval, David
10 Stebila, Douglas
9 Lee, Kwangsu
9 Li, Bao
9 Ling, San
9 Liu, Shengli
9 Park, Jonghwan
9 Sahai, Amit
9 Segev, Gil
9 Tessaro, Stefano
9 Warinschi, Bogdan
9 Weng, Jian
9 Wu, Qianhong
8 Ateniese, Giuseppe
8 Boneh, Dan
8 Boyd, Colin A.
8 Canetti, Ran
8 Fischlin, Marc
8 Håstad, Johan Torkel
8 Matsuda, Takahiro
8 Minematsu, Kazuhiko
8 Qin, Baodong
8 Seurin, Yannick
8 Tanaka, Keisuke
8 Yasuda, Kan
7 Abe, Masayuki
7 Boldyreva, Alexandra
7 Chen, Rongmao
7 Dodis, Yevgeniy
7 Farshim, Pooya
7 Feng, Dengguo
7 Gennaro, Rosario
7 Hao, Rong
7 Huang, Xinyi
7 Iwata, Tetsu
7 Li, Jin
7 Lu, Xianhui
7 Nguyen, Khoa
7 Ostrovsky, Rafail
7 Pass, Rafael
7 Phan, Raphael Chung-Wei
7 Pietrzak, Krzysztof
7 Smart, Nigel P.
7 Steinwandt, Rainer
7 Trevisan, Luca
7 Wichs, Daniel
7 Yu, Jia
7 Zhandry, Mark
6 Applebaum, Benny
6 Ben-Sasson, Eli
6 Bitansky, Nir
6 Chen, Kefei
6 Chen, Xiaofeng
6 Chen, Yu
6 Cheng, Xiangguo
6 Chiesa, Alessandro
6 De Santis, Alfredo
6 Dinur, Irit
6 González Nieto, Juan Manuel
6 He, Debiao
6 Huang, Qiong
6 Ishai, Yuval
6 Joye, Marc
6 Lakhnech, Yassine
6 Lin, Dongdai
6 Liu, JianWei
6 Long, Yu
6 Menezes, Alfred J.
6 Mennink, Bart
6 Neven, Gregory
6 Safavi-Naini, Reihaneh
6 Slamanig, Daniel
6 Takagi, Tsuyoshi
6 Vadhan, Salil P.
...and 1,958 more Authors
all top 5

Cited in 109 Serials

125 Journal of Cryptology
104 Theoretical Computer Science
83 Designs, Codes and Cryptography
81 Information Sciences
45 Information Processing Letters
34 Journal of Computer and System Sciences
30 Discrete Applied Mathematics
20 Journal of Mathematical Cryptology
16 Algorithmica
16 Information and Computation
13 SIAM Journal on Computing
12 International Journal of Foundations of Computer Science
12 Cryptography and Communications
10 Applied Mathematics and Computation
10 Applicable Algebra in Engineering, Communication and Computing
10 Science in China. Series F
9 Computational Complexity
9 Soft Computing
8 Random Structures & Algorithms
7 Quantum Information Processing
7 Journal of Shanghai Jiaotong University (Science)
7 Prikladnaya Diskretnaya Matematika
6 Mathematical and Computer Modelling
6 Mathematical Programming. Series A. Series B
6 Wuhan University Journal of Natural Sciences (WUJNS)
6 Science China. Information Sciences
5 Computers & Mathematics with Applications
5 Operations Research Letters
5 Journal of Automated Reasoning
5 Journal of Discrete Algorithms
5 Advances in Mathematics of Communications
5 Discrete Mathematics, Algorithms and Applications
4 International Journal of Computer Mathematics
4 Mathematical Problems in Engineering
4 Theory of Computing Systems
4 Frontiers of Computer Science
3 International Journal of Theoretical Physics
3 Computers & Operations Research
3 European Journal of Operational Research
3 Distributed Computing
3 Tatra Mountains Mathematical Publications
3 Nonlinear Dynamics
3 Journal of Combinatorial Optimization
3 Journal of Zhejiang University. Science A
2 Acta Informatica
2 Artificial Intelligence
2 Computing
2 Combinatorica
2 Journal of Computer Science and Technology
2 Computational Geometry
2 Bulletin of the American Mathematical Society. New Series
2 Cybernetics and Systems Analysis
2 Annals of Mathematics and Artificial Intelligence
2 Journal of the ACM
2 Interdisciplinary Information Sciences (IIS)
2 International Journal of Applied Mathematics and Computer Science
2 Discrete Optimization
2 Mathematics in Computer Science
2 Optimization Letters
2 Symmetry
2 Arabian Journal for Science and Engineering
2 Computer Science Review
1 Communications in Mathematical Physics
1 Discrete Mathematics
1 Israel Journal of Mathematics
1 Journal of the Franklin Institute
1 Acta Mathematica
1 Journal of Computational and Applied Mathematics
1 Journal of Graph Theory
1 Journal of Number Theory
1 Journal of Optimization Theory and Applications
1 Networks
1 Operations Research
1 Cryptologia
1 European Journal of Combinatorics
1 Science of Computer Programming
1 Annals of Pure and Applied Logic
1 Graphs and Combinatorics
1 Journal of Complexity
1 Discrete & Computational Geometry
1 Facta Universitatis. Series Mathematics and Informatics
1 Science in China. Series A
1 Neural Networks
1 Computational Mathematics and Modeling
1 Annals of Operations Research
1 MSCS. Mathematical Structures in Computer Science
1 Journal of Global Optimization
1 Linear Algebra and its Applications
1 SIAM Journal on Optimization
1 Combinatorics, Probability and Computing
1 Turkish Journal of Mathematics
1 Finite Fields and their Applications
1 International Transactions in Operational Research
1 Journal of Heuristics
1 Optimization Methods & Software
1 Journal of Scheduling
1 Journal of Discrete Mathematical Sciences & Cryptography
1 CEJOR. Central European Journal of Operations Research
1 RAIRO. Operations Research
1 The Journal of Logic and Algebraic Programming
...and 9 more Serials

Citations by Year

Wikidata Timeline

The data are displayed as stored in Wikidata under a Creative Commons CC0 License. Updates and corrections should be made in Wikidata.