Mihir Bellare
Affiliations: | Computer Science and Engineering | University of California, San Diego, La Jolla, CA |
Area:
Computer ScienceGoogle:
"Mihir Bellare"Children
Sign in to add traineeAnand Desai | grad student | 2000 | UCSD (E-Tree) |
Michel F. Abdalla | grad student | 2001 | UCSD (E-Tree) |
Chanathip Namprempre | grad student | 2002 | UCSD (E-Tree) |
Alexandra Boldyreva | grad student | 2004 | UCSD (E-Tree) |
Tadayoshi Kohno | grad student | 2006 | UCSD (E-Tree) |
Anton Mityagin | grad student | 2006 | UCSD (E-Tree) |
Adriana M. Palacio | grad student | 2006 | UCSD (E-Tree) |
Thomas Ristenpart | grad student | 2010 | UCSD (E-Tree) |
Sriram Keelveedhi Ravinarayanan | grad student | 2014 | UCSD (E-Tree) |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Bellare M. (2015) New Proofs for NMAC and HMAC: Security without Collision Resistance Journal of Cryptology. 28: 844-878 |
Bellare M, Hofheinz D, Kiltz E. (2015) Subtleties in the Definition of IND-CCA: When and How Should Challenge Decryption Be Disallowed? Journal of Cryptology. 28: 29-48 |
Bellare M, Ristov T. (2014) A Characterization of Chameleon Hash Functions and New, Efficient Designs Journal of Cryptology. 27: 799-823 |
Bellare M, Boldyreva A, Knudsen L, et al. (2012) On-line ciphers and the hash-CBC constructions Journal of Cryptology. 25: 640-679 |
Bellare M, Namprempre C, Neven G. (2009) Security proofs for identity-based identification and signature schemes Journal of Cryptology. 22: 1-61 |
Abdalla M, An JH, Bellare M, et al. (2008) From identification to signatures via the Fiat-Shamir transform: Necessary and sufficient conditions for security and forward-security Ieee Transactions On Information Theory. 54: 3631-3646 |
Bellare M, Shoup S. (2008) Two-tier signatures from the Fiat-Shamir transform, with applications to strongly unforgeable and one-time signatures Iet Information Security. 2: 47-63 |
Abdalla M, Bellare M, Catalano D, et al. (2008) Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions Journal of Cryptology. 21: 350-391 |
Bellare M, Boldyreva A, Kurosawa K, et al. (2007) Multirecipient encryption schemes: How to save on bandwidth and computation without sacrificing security Ieee Transactions On Information Theory. 53: 3927-3943 |
Bellare M, Palacio A. (2006) Protecting against key-exposure: strongly key-insulated encryption with optimal threshold Applicable Algebra in Engineering, Communication and Computing. 16: 379-396 |