Cryptographers' World
 

Mihir Bellare


Author's Web Page Link

73 papers in database with 11369 citations StarStarStarStarStar

Editor of 1 conference proceedings book

H-number: 46

Conference Proceedings

 
1. Mihir Bellare, editor, Advances in Cryptology - CRYPTO 2000, 20th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2000, Proceedings. Springer, 2000. ISBN 3-540-67907-3.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

Journal Papers

[Sort papers chronologically] [Sort papers by citations count]

 
1. Mihir Bellare,  Chanathip Namprempre,  Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm, Journal of Cryptology, Volume 21(4), pp. 469 - 491, Springer, 2008.

[Cited 278 times Red StarRed StarRed Star]

2. Michel Abdalla,  Mihir Bellare,  Dario Catalano,  Eike Kiltz,  Tadayoshi Kohno,  Tanja Lange,  John Malone-Lee,  Gregory Neven,  Pascal Paillier,  Haixia Shi,  Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions, Journal of Cryptology, Volume 21(3), pp. 350 - 391, Springer, 2008.

[Cited 83 times Red Star]

3. Mihir Bellare,  Chanathip Namprempre,  David Pointcheval,  Michael Semanko,  The One-More-RSA-Inversion Problems and the Security of Chaum's Blind Signature Scheme, Journal of Cryptology, Volume 16(3), pp. 185 - 215, Springer, 2003.

[Cited 78 times Red Star]

4. Mihir Bellare,  A Note on Negligible Functions, Journal of Cryptology, Volume 15(4), pp. 271 - 284, Springer, 2002.

[Cited 31 times ]

5. Mihir Bellare,  Joe Kilian,  Phillip Rogaway,  Security of the Cipher Block Chaining Message Authentication Code , Journal of Computer and System Sciences, Volume 61(3), pp. 362 - 399, Elsevier, 2000.

[Cited 453 times Red StarRed StarRed Star]

6. Mihir Bellare,  Ronald L. Rivest,  Translucent Cryptography - An Alternative to Key Escrow, and Its Implementation via Fractional Oblivious Transfer, Journal of Cryptology, Volume 12(2), pp. 117 - 139, Springer, 1999.

[Cited 9 times ]

7. Mihir Bellare,  Moti Yung,  Certifying Permutations: Noninteractive Zero-Knowledge Based on Any Trapdoor Permutation, Journal of Cryptology, Volume 9(3), pp. 149 - 166, Springer, 1996.

[Cited 35 times ]

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Mihir Bellare,  Zvika Brakerski,  Moni Naor,  Thomas Ristenpart,  Gil Segev,  Hovav Shacham,  Scott Yilek,  Hedged Public-Key Encryption: How to Protect against Bad Randomness, pp. 232 - 249, ASIACRYPT 2009.

[Electronic Edition][Cited 4 times ]

2. Mihir Bellare,  Thomas Ristenpart,  Simulation without the Artificial Abort: Simplified Proof and Improved Concrete Security for Waters' IBE Scheme, pp. 407 - 424, EUROCRYPT 2009.

[Electronic Edition][Cited 10 times ]

3. Mihir Bellare,  Dennis Hofheinz,  Scott Yilek,  Possibility and Impossibility Results for Encryption and Commitment Secure under Selective Opening, pp. 1 - 35, EUROCRYPT 2009.

[Electronic Edition][Cited 24 times ]

4. Mihir Bellare,  Todor Ristov,  Hash Functions from Sigma Protocols and Improvements to VSH, pp. 125 - 142, ASIACRYPT 2008.

[Electronic Edition][Cited 5 times ]

5. Mihir Bellare,  Marc Fischlin,  Adam O'Neill,  Thomas Ristenpart,  Deterministic Encryption: Definitional Equivalences and Constructions without Random Oracles, pp. 360 - 378, CRYPTO 2008.

[Electronic Edition][Cited 15 times ]

6. Mihir Bellare,  Gregory Neven,  Identity-Based Multi-signatures from RSA, pp. 145 - 162, CT-RSA 2007.

[Electronic Edition][Cited 24 times ]

7. Mihir Bellare,  Alexandra Boldyreva,  Adam O'Neill,  Deterministic and Efficiently Searchable Encryption, pp. 535 - 552, CRYPTO 2007.

[Electronic Edition][Cited 51 times Red Star]

8. Mihir Bellare,  Sarah Shoup,  Two-Tier Signatures, Strongly Unforgeable Signatures, and Fiat-Shamir Without Random Oracles, pp. 201 - 216, PKC 2007.

[Electronic Edition][Cited 27 times ]

9. Mihir Bellare,  Phillip Rogaway,  The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs, pp. 409 - 426, EUROCRYPT 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 81 times Red Star]

10. Mihir Bellare,  Thomas Ristenpart,  Multi-Property-Preserving Hash Domain Extension and the EMD Transform, pp. 299 - 314, ASIACRYPT 2006.

[Electronic Edition][Cited 95 times Red Star]

11. Mihir Bellare,  New Proofs for NMAC and HMAC: Security Without Collision-Resistance, pp. 602 - 619, CRYPTO 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 118 times Red StarRed Star]

12. Mihir Bellare,  Krzysztof Pietrzak,  Phillip Rogaway,  Improved Security Analyses for CBC MACs, pp. 527 - 545, CRYPTO 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 27 times ]

13. Michel Abdalla,  Mihir Bellare,  Dario Catalano,  Eike Kiltz,  Tadayoshi Kohno,  Tanja Lange,  John Malone-Lee,  Gregory Neven,  Pascal Paillier,  Haixia Shi,  Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions, pp. 205 - 222, CRYPTO 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 154 times Red StarRed Star]

14. Mihir Bellare,  Haixia Shi,  Chong Zhang,  Foundations of Group Signatures: The Case of Dynamic Groups, pp. 136 - 153, CT-RSA 2005.

[Electronic Edition][Cited 171 times Red StarRed Star]

15. Mihir Bellare,  Adriana Palacio,  Towards Plaintext-Aware Public-Key Encryption Without Random Oracles, pp. 48 - 62, ASIACRYPT 2004.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 58 times Red Star]

16. Mihir Bellare,  Adriana Palacio,  The Knowledge-of-Exponent Assumptions and 3-Round Zero-Knowledge Protocols, pp. 273 - 289, CRYPTO 2004.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 83 times Red Star]

17. Mihir Bellare,  Chanathip Namprempre,  Gregory Neven,  Security Proofs for Identity-Based Identification and Signature Schemes, pp. 268 - 286, EUROCRYPT 2004.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 179 times Red StarRed Star]

18. Mihir Bellare,  Alexandra Boldyreva,  Adriana Palacio,  An Uninstantiable Random-Oracle-Model Scheme for a Hybrid-Encryption Problem, pp. 171 - 188, EUROCRYPT 2004.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 159 times Red StarRed Star]

19. Mihir Bellare,  Tadayoshi Kohno,  Hash Function Balance and Its Impact on Birthday Attacks, pp. 401 - 418, EUROCRYPT 2004.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 53 times Red Star]

20. Mihir Bellare,  Phillip Rogaway,  David Wagner,  The EAX Mode of Operation, pp. 389 - 407, FSE 2004.

[Electronic Edition][Cited 81 times Red Star]

21. Mihir Bellare,  Daniele Micciancio,  Bogdan Warinschi,  Foundations of Group Signatures: Formal Definitions, Simplified Requirements, and a Construction Based on General Assumptions, pp. 614 - 629, EUROCRYPT 2003.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 268 times Red StarRed StarRed Star]

22. Mihir Bellare,  Tadayoshi Kohno,  A Theoretical Treatment of Related-Key Attacks: RKA-PRPs, RKA-PRFs, and Applications, pp. 491 - 506, EUROCRYPT 2003.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 57 times Red Star]

23. Mihir Bellare,  Bennet S. Yee,  Forward-Security in Private-Key Cryptography, pp. 1 - 18, CT-RSA 2003.

[Electronic Edition][Cited 126 times Red StarRed Star]

24. Mihir Bellare,  Alexandra Boldyreva,  Jessica Staddon,  Randomness Re-use in Multi-recipient Encryption Schemes, pp. 85 - 99, PKC 2003.

[Electronic Edition][Cited 42 times ]

25. Mihir Bellare,  Gregory Neven,  Transitive Signatures Based on Factoring and RSA, pp. 397 - 414, ASIACRYPT 2002.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 46 times ]

26. Mihir Bellare,  Adriana Palacio,  GQ and Schnorr Identification Schemes: Proofs of Security against Impersonation under Active and Concurrent Attacks, pp. 162 - 177, CRYPTO 2002.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 140 times Red StarRed Star]

27. Michel Abdalla,  Jee Hea An,  Mihir Bellare,  Chanathip Namprempre,  From Identification to Signatures via the Fiat-Shamir Transform: Minimizing Assumptions for Security and Forward-Security, pp. 418 - 433, EUROCRYPT 2002.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 60 times Red Star]

28. Mihir Bellare,  Alexandra Boldyreva,  Anand Desai,  David Pointcheval,  Key-Privacy in Public-Key Encryption, pp. 566 - 582, ASIACRYPT 2001.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 184 times Red StarRed Star]

29. Mihir Bellare,  Alexandra Boldyreva,  Lars R. Knudsen,  Chanathip Namprempre,  Online Ciphers and the Hash-CBC Construction, pp. 292 - 309, CRYPTO 2001.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 21 times ]

30. Jee Hea An,  Mihir Bellare,  Does Encryption with Redundancy Provide Authenticity?, pp. 512 - 528, EUROCRYPT 2001.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 23 times ]

31. Mihir Bellare,  Marc Fischlin,  Shafi Goldwasser,  Silvio Micali,  Identification Protocols Secure against Reset Attacks, pp. 495 - 511, EUROCRYPT 2001.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 50 times Red Star]

32. Michel Abdalla,  Mihir Bellare,  Phillip Rogaway,  The Oracle Diffie-Hellman Assumptions and an Analysis of DHIES, pp. 143 - 158, CT-RSA 2001.

[Electronic Edition][Cited 154 times Red StarRed Star]

33. Mihir Bellare,  Chanathip Namprempre,  David Pointcheval,  Michael Semanko,  The Power of RSA Inversion Oracles and the Security of Chaum's RSA-Based Blind Signature Scheme, pp. 309 - 328, FC 2001.

[Electronic Edition][Cited 53 times Red Star]

34. Mihir Bellare,  Chanathip Namprempre,  Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm, pp. 531 - 545, ASIACRYPT 2000.

[Electronic Edition][Cited 402 times Red StarRed StarRed Star]

35. Mihir Bellare,  Phillip Rogaway,  Encode-Then-Encipher Encryption: How to Exploit Nonces or Redundancy in Plaintexts for Efficient Cryptography, pp. 317 - 330, ASIACRYPT 2000.

[Electronic Edition][Cited 54 times Red Star]

36. Michel Abdalla,  Mihir Bellare,  Increasing the Lifetime of a Key: A Comparative Analysis of the Security of Re-keying Techniques, pp. 546 - 559, ASIACRYPT 2000.

[Electronic Edition][Cited 46 times ]

37. Mihir Bellare,  Alexandra Boldyreva,  The Security of Chaffing and Winnowing, pp. 517 - 530, ASIACRYPT 2000.

[Electronic Edition][Cited 20 times ]

38. Mihir Bellare,  Alexandra Boldyreva,  Silvio Micali,  Public-Key Encryption in a Multi-user Setting: Security Proofs and Improvements, pp. 259 - 274, EUROCRYPT 2000.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 185 times Red StarRed Star]

39. Mihir Bellare,  David Pointcheval,  Phillip Rogaway,  Authenticated Key Exchange Secure against Dictionary Attacks, pp. 139 - 155, EUROCRYPT 2000.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 671 times Red StarRed StarRed StarRed Star]

40. Jee Hea An,  Mihir Bellare,  Constructing VIL-MACs from FIL-MACs: Message Authentication under Weakened Assumptions, pp. 252 - 269, CRYPTO 1999.

[Electronic Edition][Cited 54 times Red Star]

41. Mihir Bellare,  Sara K. Miner,  A Forward-Secure Digital Signature Scheme, pp. 431 - 448, CRYPTO 1999.

[Electronic Edition][Cited 394 times Red StarRed StarRed Star]

42. Mihir Bellare,  Amit Sahai,  Non-malleable Encryption: Equivalence between Two Notions, and an Indistinguishability-Based Characterization, pp. 519 - 536, CRYPTO 1999.

[Electronic Edition][Cited 103 times Red StarRed Star]

43. Mihir Bellare,  Oded Goldreich,  Hugo Krawczyk,  Stateless Evaluation of Pseudorandom Functions: Security beyond the Birthday Barrier, pp. 270 - 287, CRYPTO 1999.

[Electronic Edition][Cited 31 times ]

44. Mihir Bellare,  Phillip Rogaway,  On the Construction of Variable-Input-Length Ciphers, pp. 231 - 244, FSE 1999.

[Electronic Edition][Cited 34 times ]

45. William Aiello,  Mihir Bellare,  Giovanni Di Crescenzo,  Ramarathnam Venkatesan,  Security Amplification by Composition: The Case of Doubly-Iterated, Ideal Ciphers, pp. 390 - 407, CRYPTO 1998.

[Electronic Edition][Cited 26 times ]

46. Mihir Bellare,  Anand Desai,  David Pointcheval,  Phillip Rogaway,  Relations Among Notions of Security for Public-Key Encryption Schemes, pp. 26 - 45, CRYPTO 1998.

[Electronic Edition][Cited 699 times Red StarRed StarRed StarRed Star]

47. Mihir Bellare,  Shai Halevi,  Amit Sahai,  Salil P. Vadhan,  Many-to-One Trapdoor Functions and Their Relation to Public-Key Cryptosystems, pp. 283 - 298, CRYPTO 1998.

[Electronic Edition][Cited 37 times ]

48. Mihir Bellare,  Juan A. Garay,  Tal Rabin,  Fast Batch Verification for Modular Exponentiation and Digital Signatures, pp. 236 - 250, EUROCRYPT 1998.

[Electronic Edition][Cited 212 times Red StarRed Star]

49. Mihir Bellare,  Ted Krovetz,  Phillip Rogaway,  Luby-Rackoff Backwards: Increasing Security by Making Block Ciphers Non-invertible, pp. 266 - 280, EUROCRYPT 1998.

[Electronic Edition][Cited 30 times ]

50. Mihir Bellare,  Phillip Rogaway,  Collision-Resistant Hashing: Towards Making UOWHFs Practical, pp. 470 - 484, CRYPTO 1997.

[Electronic Edition][Cited 148 times Red StarRed Star]

51. Mihir Bellare,  Shafi Goldwasser,  Daniele Micciancio,  Pseudo-Random Number Generation Within Cryptographic Algorithms: The DSS Case, pp. 277 - 291, CRYPTO 1997.

[Electronic Edition][Cited 36 times ]

52. Mihir Bellare,  Markus Jakobsson,  Moti Yung,  Round-Optimal Zero-Knowledge Arguments Based on any One-Way Function, pp. 280 - 305, EUROCRYPT 1997.

[Electronic Edition][Cited 39 times ]

53. Mihir Bellare,  Daniele Micciancio,  A New Paradigm for Collision-Free Hashing: Incrementality at Reduced Cost, pp. 163 - 192, EUROCRYPT 1997.

[Electronic Edition][Cited 134 times Red StarRed Star]

54. Mihir Bellare,  Ran Canetti,  Hugo Krawczyk,  Keying Hash Functions for Message Authentication, pp. 1 - 15, CRYPTO 1996.

[Electronic Edition][Cited 913 times Red StarRed StarRed StarRed Star]

55. Mihir Bellare,  Phillip Rogaway,  The Exact Security of Digital Signatures - How to Sign with RSA and Rabin, pp. 399 - 416, EUROCRYPT 1996.

[Electronic Edition][Cited 604 times Red StarRed StarRed StarRed Star]

56. Mihir Bellare,  Roch Guérin,  Phillip Rogaway,  XOR MACs: New Methods for Message Authentication Using Finite Pseudorandom Functions, pp. 15 - 28, CRYPTO 1995.

[Electronic Edition][Cited 186 times Red StarRed Star]

57. Mihir Bellare,  Oded Goldreich,  Shafi Goldwasser,  Incremental Cryptography: The Case of Hashing and Signing, pp. 216 - 233, CRYPTO 1994.

[Electronic Edition][Cited 121 times Red StarRed Star]

58. Mihir Bellare,  Joe Kilian,  Phillip Rogaway,  The Security of Cipher Block Chaining, pp. 341 - 358, CRYPTO 1994.

[Electronic Edition][Cited 553 times Red StarRed StarRed StarRed Star]

59. Mihir Bellare,  Phillip Rogaway,  Optimal Asymmetric Encryption, pp. 92 - 111, EUROCRYPT 1994.

[Electronic Edition][Cited 827 times Red StarRed StarRed StarRed Star]

60. Mihir Bellare,  Phillip Rogaway,  Entity Authentication and Key Distribution, pp. 232 - 249, CRYPTO 1993.

[Electronic Edition][Cited 930 times Red StarRed StarRed StarRed Star]

61. Mihir Bellare,  Oded Goldreich,  On Defining Proofs of Knowledge, pp. 390 - 420, CRYPTO 1992.

[Electronic Edition][Cited 257 times Red StarRed StarRed Star]

62. Mihir Bellare,  Moti Yung,  Certifying Cryptographic Tools: The Case of Trapdoor Permutations, pp. 442 - 460, CRYPTO 1992.

[Electronic Edition][Cited 20 times ]

63. Mihir Bellare,  Shafi Goldwasser,  New Paradigms for Digital Signatures and Message Authentication Based on Non-Interactive Zero Knowledge Proofs, pp. 194 - 211, CRYPTO 1989.

[Electronic Edition][Cited 64 times Red Star]

64. Mihir Bellare,  Silvio Micali,  Non-Interactive Oblivious Transfer and Applications, pp. 547 - 557, CRYPTO 1989.

[Electronic Edition][Cited 196 times Red StarRed Star]

65. Mihir Bellare,  Lenore Cowen,  Shafi Goldwasser,  On the Structure of Secret Key Exchange Protocols, pp. 604 - 605, CRYPTO 1989.

[Electronic Edition][Cited 8 times ]

66. Mihir Bellare,  Silvio Micali,  How To Sign Given Any Trapdoor Function, pp. 200 - 215, CRYPTO 1988.

[Electronic Edition][Cited 86 times Red Star]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...