Mihir Bellare

From MaRDI portal
Person:171914

Available identifiers

zbMath Open bellare.mihirWikidataQ1932841 ScholiaQ1932841MaRDI QIDQ171914

List of research outcomes

PublicationDate of PublicationType
When messages are keys: is HMAC a dual-PRF?2024-02-02Paper
Hardening signature schemes via derive-then-derandomize: stronger security proofs for EdDSA2023-11-24Paper
Flexible password-based encryption: securing cloud storage and provably resisting partitioning-oracle attacks2023-10-04Paper
Forward-security under continual leakage2023-08-02Paper
Better than advertised security for non-interactive threshold signatures2023-07-07Paper
Chain Reductions for Multi-signatures and the HBMS Scheme2023-05-26Paper
Efficient schemes for committing authenticated encryption2022-08-30Paper
The multi-base discrete logarithm problem: tight reductions and non-rewinding proofs for Schnorr identification and signatures2022-07-06Paper
Incremental cryptography revisited: PRFs, nonces and modular design2022-07-06Paper
Dual-mode NIZKs: possibility and impossibility results for property transfer2022-07-06Paper
Security under message-derived keys: signcryption in iMessage2021-12-01Paper
Nonces are noticed: AEAD revisited2020-05-20Paper
The local forking lemma and its application to deterministic encryption2020-05-11Paper
Robust encryption2018-05-28Paper
Public-key encryption resistant to parameter subversion and its realization from efficiently-embeddable groups2018-05-16Paper
Ratcheted encryption and key exchange: the security of messaging2017-10-27Paper
Deterring Certificate Subversion: Efficient Double-Authentication-Preventing Signatures2017-06-13Paper
From Identification to Signatures, Tightly: A Framework and Generic Transforms2017-01-06Paper
NIZKs with an Untrusted CRS: Security in the Face of Parameter Subversion2017-01-06Paper
The Multi-user Security of Authenticated Encryption: AES-GCM in TLS 1.32016-11-30Paper
Big-Key Symmetric Encryption: Resisting Key Exfiltration2016-11-30Paper
Hash-Function Based PRFs: AMAC and Its Multi-User Security2016-09-09Paper
Nonce-Based Cryptography: Retaining Security When Randomness Fails2016-09-09Paper
Improved non-approximability results2016-09-01Paper
Efficient probabilistic checkable proofs and applications to approximation2016-09-01Paper
New Negative Results on Differing-Inputs Obfuscation2016-07-15Paper
Contention in Cryptoland: Obfuscation, Leakage and UCE2016-04-08Paper
Point-Function Obfuscation: A Framework and Generic Constructions2016-04-08Paper
New proofs for NMAC and HMAC: security without collision resistance2016-01-11Paper
Keying Hash Functions for Message Authentication2015-11-11Paper
Resisting Randomness Subversion: Fast Deterministic and Hedged Public-Key Encryption in the Standard Model2015-09-30Paper
Distributed pseudo-random bit generators---a new way to speed-up shared coin tossing2015-09-11Paper
How Secure is Deterministic Encryption?2015-08-27Paper
Adaptive Witness Encryption and Asymmetric Password-Based Cryptography2015-08-27Paper
Interactive Message-Locked Encryption and Secure Deduplication2015-08-27Paper
Efficient probabilistically checkable proofs and applications to approximations2015-05-07Paper
Subtleties in the definition of IND-CCA: when and how should challenge decryption be disallowed?2015-03-25Paper
A characterization of chameleon hash functions and new, efficient designs2015-01-07Paper
Poly-Many Hardcore Bits for Any One-Way Function and a Framework for Differing-Inputs Obfuscation2015-01-06Paper
The Exact Security of Digital Signatures-How to Sign with RSA and Rabin2014-08-20Paper
Security of Symmetric Encryption against Mass Surveillance2014-08-07Paper
Cryptography from Compression Functions: The UCE Bridge to the ROM2014-08-07Paper
Key-Versatile Signatures and Applications: RKA, KDM and Joint Enc/Sig2014-05-27Paper
Policy-Based Signatures2014-03-25Paper
Instantiating Random Oracles via UCEs2013-09-17Paper
Message-Locked Encryption and Secure Deduplication2013-05-31Paper
Adaptively Secure Garbling with Applications to One-Time Programs and Secure Outsourcing2013-03-19Paper
RKA Security beyond the Linear Barrier: IBE, Encryption and Signatures2013-03-19Paper
On-line ciphers and the Hash-CBC constructions2013-01-04Paper
Semantic Security for the Wiretap Channel2012-09-25Paper
Multi-instance Security and Its Application to Password-Based Cryptography2012-09-25Paper
Identity-Based (Lossy) Trapdoor Functions and Applications2012-06-29Paper
Standard Security Does Not Imply Security against Selective-Opening2012-06-29Paper
Cryptography Secure against Related-Key Attacks and Tampering2011-12-02Paper
Proving Computational Ability2011-08-19Paper
On Probabilistic versus Deterministic Provers in the Definition of Proofs of Knowledge2011-08-19Paper
Authenticated and Misuse-Resistant Encryption of Key-Dependent Data2011-08-12Paper
Identity-Based Encryption Secure against Selective Opening Attack2011-05-19Paper
Pseudorandom Functions and Permutations Provably Secure against Related-Key Attacks2010-08-24Paper
Cryptographic Agility and Its Relation to Circular Encryption2010-06-01Paper
Robust Encryption2010-02-24Paper
Hedged Public-Key Encryption: How to Protect against Bad Randomness2009-12-15Paper
Format-Preserving Encryption2009-12-09Paper
Security proofs for identity-based identification and signature schemes2009-06-30Paper
Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions2009-06-08Paper
Authenticated encryption: relations among notions and analysis of the generic composition paradigm2009-06-08Paper
Possibility and Impossibility Results for Encryption and Commitment Secure under Selective Opening2009-05-12Paper
Simulation without the Artificial Abort: Simplified Proof and Improved Concrete Security for Waters’ IBE Scheme2009-05-12Paper
Key Insulation and Intrusion Resilience over a Public Channel2009-04-29Paper
Deterministic and Efficiently Searchable Encryption2009-03-10Paper
From Identification to Signatures Via the Fiat–Shamir Transform: Necessary and Sufficient Conditions for Security and Forward-Security2009-02-24Paper
Deterministic Encryption: Definitional Equivalences and Constructions without Random Oracles2009-02-10Paper
Hash Functions from Sigma Protocols and Improvements to VSH2009-02-10Paper
Breaking and provably repairing the SSH authenticated encryption scheme2008-12-21Paper
Transitive Signatures: New Schemes and Proofs2008-12-21Paper
Multirecipient Encryption Schemes: How to Save on Bandwidth and Computation Without Sacrificing Security2008-12-21Paper
Multi-Property-Preserving Hash Domain Extension and the EMD Transform2008-04-24Paper
Identity-Based Multi-signatures from RSA2008-04-17Paper
Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions2008-03-17Paper
Improved Security Analyses for CBC MACs2008-03-17Paper
Hash Functions in the Dedicated-Key Setting: Design Choices and MPP Transforms2007-11-28Paper
Unrestricted Aggregate Signatures2007-11-28Paper
Advances in Cryptology - EUROCRYPT 20042007-09-25Paper
Advances in Cryptology - EUROCRYPT 20042007-09-25Paper
Advances in Cryptology - EUROCRYPT 20042007-09-25Paper
The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs2007-09-24Paper
Two-Tier Signatures, Strongly Unforgeable Signatures, and Fiat-Shamir Without Random Oracles2007-09-04Paper
New Proofs for NMAC and HMAC: Security Without Collision-Resistance2007-09-04Paper
Protecting against key-exposure: strongly key-insulated encryption with optimal threshold2006-09-12Paper
https://portal.mardi4nfdi.de/entity/Q33749052006-03-01Paper
https://portal.mardi4nfdi.de/entity/Q33749132006-03-01Paper
Fast Software Encryption2005-12-27Paper
Topics in Cryptology – CT-RSA 20052005-12-08Paper
Advances in Cryptology – CRYPTO 20042005-08-23Paper
Towards Plaintext-Aware Public-Key Encryption Without Random Oracles2005-08-12Paper
https://portal.mardi4nfdi.de/entity/Q47395252004-08-12Paper
https://portal.mardi4nfdi.de/entity/Q47372612004-08-11Paper
https://portal.mardi4nfdi.de/entity/Q44742002004-08-04Paper
https://portal.mardi4nfdi.de/entity/Q44348952003-11-26Paper
https://portal.mardi4nfdi.de/entity/Q44349022003-11-26Paper
The one-more-RSA-inversion problems and the security of Chaum's blind signature scheme2003-08-27Paper
https://portal.mardi4nfdi.de/entity/Q44185232003-08-10Paper
Randomness Re-use in Multi-recipient Encryption Schemeas2003-07-27Paper
Transitive Signatures Based on Factoring and RSA2003-07-16Paper
https://portal.mardi4nfdi.de/entity/Q44091162003-06-30Paper
A note on negligible functions2003-03-25Paper
Uniform generation of NP-witnesses using an NP-oracle2003-01-14Paper
https://portal.mardi4nfdi.de/entity/Q47837322002-12-08Paper
https://portal.mardi4nfdi.de/entity/Q42496432002-10-08Paper
https://portal.mardi4nfdi.de/entity/Q31496762002-09-30Paper
https://portal.mardi4nfdi.de/entity/Q27244342002-09-01Paper
https://portal.mardi4nfdi.de/entity/Q45425602002-08-01Paper
https://portal.mardi4nfdi.de/entity/Q27788632002-03-21Paper
https://portal.mardi4nfdi.de/entity/Q42340952002-01-29Paper
https://portal.mardi4nfdi.de/entity/Q27439642001-09-18Paper
https://portal.mardi4nfdi.de/entity/Q27074512001-07-03Paper
https://portal.mardi4nfdi.de/entity/Q27074522001-07-03Paper
The security of the cipher block chaining message authentication code2001-04-17Paper
https://portal.mardi4nfdi.de/entity/Q27074282001-04-03Paper
https://portal.mardi4nfdi.de/entity/Q27074502001-04-03Paper
https://portal.mardi4nfdi.de/entity/Q49418772000-08-27Paper
https://portal.mardi4nfdi.de/entity/Q49418722000-08-24Paper
https://portal.mardi4nfdi.de/entity/Q49418592000-07-26Paper
https://portal.mardi4nfdi.de/entity/Q42527272000-04-26Paper
https://portal.mardi4nfdi.de/entity/Q42527282000-04-26Paper
https://portal.mardi4nfdi.de/entity/Q49418152000-03-19Paper
https://portal.mardi4nfdi.de/entity/Q49418602000-03-19Paper
https://portal.mardi4nfdi.de/entity/Q42508952000-03-07Paper
https://portal.mardi4nfdi.de/entity/Q49406982000-03-01Paper
https://portal.mardi4nfdi.de/entity/Q49407082000-03-01Paper
Translucent cryptography -- an alternative to key escrow, and its implementation via fractional oblivious transfer2000-02-04Paper
https://portal.mardi4nfdi.de/entity/Q42510222000-01-12Paper
https://portal.mardi4nfdi.de/entity/Q42340501999-07-26Paper
https://portal.mardi4nfdi.de/entity/Q42340511999-07-22Paper
https://portal.mardi4nfdi.de/entity/Q42493181999-06-17Paper
https://portal.mardi4nfdi.de/entity/Q42493371999-06-17Paper
https://portal.mardi4nfdi.de/entity/Q42493461999-06-17Paper
https://portal.mardi4nfdi.de/entity/Q42496411999-06-17Paper
On chromatic sums and distributed resource allocation1998-09-27Paper
https://portal.mardi4nfdi.de/entity/Q43736071998-06-07Paper
Free Bits, PCPs, and Nonapproximability---Towards Tight Results1998-05-10Paper
https://portal.mardi4nfdi.de/entity/Q43645711998-03-10Paper
https://portal.mardi4nfdi.de/entity/Q43657321998-02-19Paper
https://portal.mardi4nfdi.de/entity/Q43645581998-01-07Paper
https://portal.mardi4nfdi.de/entity/Q43434181997-11-23Paper
https://portal.mardi4nfdi.de/entity/Q43417511997-09-24Paper
Linearity testing in characteristic two1997-08-07Paper
Certifying permutations: Noninteractive zero-knowledge based on any trapdoor permutation1997-05-19Paper
The complexity of approximating a nonlinear program1996-02-12Paper
https://portal.mardi4nfdi.de/entity/Q43187111995-11-06Paper
https://portal.mardi4nfdi.de/entity/Q43187141995-08-08Paper
How to sign given any trapdoor permutation1994-08-21Paper
Randomness in interactive proofs1994-05-08Paper
The Complexity of Decision Versus Search1994-04-27Paper
https://portal.mardi4nfdi.de/entity/Q32101411991-01-01Paper
https://portal.mardi4nfdi.de/entity/Q32029441990-01-01Paper
https://portal.mardi4nfdi.de/entity/Q32101621990-01-01Paper
https://portal.mardi4nfdi.de/entity/Q32101631990-01-01Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Mihir Bellare