Year |
Citation |
Score |
2014 |
Namprempre C, Rogaway P, Shrimpton T. Reconsidering generic composition Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8441: 257-274. DOI: 10.1007/978-3-642-55220-5_15 |
0.438 |
|
2012 |
Bellare M, Boldyreva A, Knudsen L, Namprempre C. On-line ciphers and the hash-CBC constructions Journal of Cryptology. 25: 640-679. DOI: 10.1007/S00145-011-9106-1 |
0.735 |
|
2009 |
Bellare M, Namprempre C, Neven G. Security proofs for identity-based identification and signature schemes Journal of Cryptology. 22: 1-61. DOI: 10.1007/S00145-008-9028-8 |
0.801 |
|
2008 |
Abdalla M, An JH, Bellare M, Namprempre C. From identification to signatures via the Fiat-Shamir transform: Necessary and sufficient conditions for security and forward-security Ieee Transactions On Information Theory. 54: 3631-3646. DOI: 10.1109/Tit.2008.926303 |
0.745 |
|
2007 |
Namprempre C, Neven G, Abdalla M. A study of blind message authentication codes Ieice Transactions On Fundamentals of Electronics, Communications and Computer Sciences. 75-82. DOI: 10.1093/Ietfec/E90-A.1.75 |
0.738 |
|
2007 |
Namprempre C, Dailey MN. Mitigating dictionary attacks with text-graphics character CAPTCHAs Ieice Transactions On Fundamentals of Electronics, Communications and Computer Sciences. 179-186. DOI: 10.1093/Ietfec/E90-A.1.179 |
0.609 |
|
2007 |
Bellare M, Namprempre C, Neven G. Unrestricted aggregate signatures Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4596: 411-422. |
0.573 |
|
2006 |
Abdalla M, Namprempre C, Neven G. On the (im)possibility of blind message authentication codes Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3960: 262-279. DOI: 10.1007/11605805_17 |
0.555 |
|
2004 |
Bellare M, Kohno T, Namprempre C. Breaking and provably repairing the SSH authenticated encryption scheme: A case study of the encode-then-encrypt-and-MAC paradigm Acm Transactions On Information and System Security. 7: 206-241. DOI: 10.1145/996943.996945 |
0.777 |
|
2004 |
Dailey M, Namprempre C. A text-graphics character captcha for password authentication Ieee Region 10 Annual International Conference, Proceedings/Tencon. |
0.438 |
|
2003 |
Bellare M, Namprempre C, Pointcheval D, Semanko M. The one-more-RSA-inversion problems and the security of chaum's blind signature scheme Journal of Cryptology. 16: 185-215. DOI: 10.1007/S00145-002-0120-1 |
0.706 |
|
2002 |
Namprempre C. Secure channels based on authenticated encryption schemes: A simple characterization Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2501: 515-532. DOI: 10.1007/3-540-36178-2_32 |
0.7 |
|
2002 |
Abdalla M, An JH, Bellare M, Namprempre C. From identification to signatures via the fiat-shamir transform: Minimizing assumptions for security and forward-security Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2332: 418-433. |
0.737 |
|
2002 |
Bellare M, Kohno T, Namprempre C. Authenticated encryption in SSH: Provably fixing the SSH binary packet protocol Proceedings of the Acm Conference On Computer and Communications Security. 1-11. |
0.648 |
|
2002 |
Bellare M, Namprempre C, Pointcheval D, Semanko M. The power of RSA inversion oracles and the security of chaum’s RSA-based blind signature scheme Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2339: 319-338. |
0.629 |
|
2001 |
Abdalla M, Miner S, Namprempre C. Forward-secure threshold signature schemes Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2020: 441-456. |
0.714 |
|
2001 |
Bellare M, Boldyreva A, Knudsen L, Namprempre C. Online ciphers and the Hash-CBC construction Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2139: 292-309. |
0.765 |
|
2000 |
Bellare M, Namprempre C. Authenticated encryption: Relations among notions and analysis of the generic composition paradigm Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1976: 517-530. DOI: 10.1007/S00145-008-9026-X |
0.802 |
|
Show low-probability matches. |