Mihir Bellare

Affiliations: 
Computer Science and Engineering University of California, San Diego, La Jolla, CA 
Area:
Computer Science
Google:
"Mihir Bellare"

Parents

Sign in to add mentor
Silvio Micali grad student 1988-1991 MIT

Children

Sign in to add trainee
Anand Desai grad student 2000 UCSD (E-Tree)
Michel F. Abdalla grad student 2001 UCSD (E-Tree)
Chanathip Namprempre grad student 2002 UCSD (E-Tree)
Alexandra Boldyreva grad student 2004 UCSD (E-Tree)
Tadayoshi Kohno grad student 2006 UCSD (E-Tree)
Anton Mityagin grad student 2006 UCSD (E-Tree)
Adriana M. Palacio grad student 2006 UCSD (E-Tree)
Thomas Ristenpart grad student 2010 UCSD (E-Tree)
Sriram Keelveedhi Ravinarayanan grad student 2014 UCSD (E-Tree)
BETA: Related publications

Publications

You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect.

Bellare M. (2015) New Proofs for NMAC and HMAC: Security without Collision Resistance Journal of Cryptology. 28: 844-878
Bellare M, Hofheinz D, Kiltz E. (2015) Subtleties in the Definition of IND-CCA: When and How Should Challenge Decryption Be Disallowed? Journal of Cryptology. 28: 29-48
Bellare M, Ristov T. (2014) A Characterization of Chameleon Hash Functions and New, Efficient Designs Journal of Cryptology. 27: 799-823
Bellare M, Boldyreva A, Knudsen L, et al. (2012) On-line ciphers and the hash-CBC constructions Journal of Cryptology. 25: 640-679
Bellare M, Namprempre C, Neven G. (2009) Security proofs for identity-based identification and signature schemes Journal of Cryptology. 22: 1-61
Abdalla M, An JH, Bellare M, et al. (2008) From identification to signatures via the Fiat-Shamir transform: Necessary and sufficient conditions for security and forward-security Ieee Transactions On Information Theory. 54: 3631-3646
Bellare M, Shoup S. (2008) Two-tier signatures from the Fiat-Shamir transform, with applications to strongly unforgeable and one-time signatures Iet Information Security. 2: 47-63
Abdalla M, Bellare M, Catalano D, et al. (2008) Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions Journal of Cryptology. 21: 350-391
Bellare M, Boldyreva A, Kurosawa K, et al. (2007) Multirecipient encryption schemes: How to save on bandwidth and computation without sacrificing security Ieee Transactions On Information Theory. 53: 3927-3943
Bellare M, Palacio A. (2006) Protecting against key-exposure: strongly key-insulated encryption with optimal threshold Applicable Algebra in Engineering, Communication and Computing. 16: 379-396
See more...