M. Bellare

From MaRDI portal
(Redirected from Person:171914)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Succinctly-committing authenticated encryption2024-12-13Paper
Symmetric and dual PRFs from standard assumptions: a generic validation of a prevailing assumption
Journal of Cryptology
2024-10-11Paper
When messages are keys: is HMAC a dual-PRF?
Advances in Cryptology – CRYPTO 2023
2024-02-02Paper
Hardening signature schemes via derive-then-derandomize: stronger security proofs for EdDSA
Lecture Notes in Computer Science
2023-11-24Paper
Flexible password-based encryption: securing cloud storage and provably resisting partitioning-oracle attacks
Topics in Cryptology – CT-RSA 2023
2023-10-04Paper
Forward-security under continual leakage
Cryptology and Network Security
2023-08-02Paper
Better than advertised security for non-interactive threshold signatures
Advances in Cryptology – CRYPTO 2022
2023-07-07Paper
Chain Reductions for Multi-signatures and the HBMS Scheme
Lecture Notes in Computer Science
2023-05-26Paper
Efficient schemes for committing authenticated encryption2022-08-30Paper
Incremental cryptography revisited: PRFs, nonces and modular design2022-07-06Paper
Dual-mode NIZKs: possibility and impossibility results for property transfer2022-07-06Paper
The multi-base discrete logarithm problem: tight reductions and non-rewinding proofs for Schnorr identification and signatures2022-07-06Paper
Security under message-derived keys: signcryption in iMessage2021-12-01Paper
Nonces are noticed: AEAD revisited2020-05-20Paper
The local forking lemma and its application to deterministic encryption2020-05-11Paper
Robust encryption
Journal of Cryptology
2018-05-28Paper
Public-key encryption resistant to parameter subversion and its realization from efficiently-embeddable groups2018-05-16Paper
Ratcheted encryption and key exchange: the security of messaging2017-10-27Paper
Deterring Certificate Subversion: Efficient Double-Authentication-Preventing Signatures
Lecture Notes in Computer Science
2017-06-13Paper
From Identification to Signatures, Tightly: A Framework and Generic Transforms
Advances in Cryptology – ASIACRYPT 2016
2017-01-06Paper
NIZKs with an untrusted CRS: security in the face of parameter subversion
Advances in Cryptology – ASIACRYPT 2016
2017-01-06Paper
Big-key symmetric encryption: resisting key exfiltration
Advances in Cryptology – CRYPTO 2016
2016-11-30Paper
The multi-user security of authenticated encryption: AES-GCM in TLS 1.3
Advances in Cryptology – CRYPTO 2016
2016-11-30Paper
Hash-Function Based PRFs: AMAC and Its Multi-User Security
Advances in Cryptology – EUROCRYPT 2016
2016-09-09Paper
Nonce-based cryptography: retaining security when randomness fails
Advances in Cryptology – EUROCRYPT 2016
2016-09-09Paper
Improved non-approximability results
Proceedings of the twenty-sixth annual ACM symposium on Theory of computing - STOC '94
2016-09-01Paper
Corrigendum to: ``Efficient probabilistic checkable proofs and applications to approximation
Proceedings of the twenty-sixth annual ACM symposium on Theory of computing - STOC '94
2016-09-01Paper
New negative results on differing-inputs obfuscation
Advances in Cryptology – EUROCRYPT 2016
2016-07-15Paper
Contention in cryptoland: obfuscation, leakage and UCE
Theory of Cryptography
2016-04-08Paper
Point-function obfuscation: a framework and generic constructions
Theory of Cryptography
2016-04-08Paper
New proofs for NMAC and HMAC: security without collision resistance
Journal of Cryptology
2016-01-11Paper
Keying hash functions for message authentication
Advances in Cryptology — CRYPTO ’96
2015-11-11Paper
Resisting randomness subversion: fast deterministic and hedged public-key encryption in the standard model
Advances in Cryptology - EUROCRYPT 2015
2015-09-30Paper
Distributed pseudo-random bit generators---a new way to speed-up shared coin tossing
Proceedings of the fifteenth annual ACM symposium on Principles of distributed computing - PODC '96
2015-09-11Paper
Adaptive Witness Encryption and Asymmetric Password-Based Cryptography
Lecture Notes in Computer Science
2015-08-27Paper
How secure is deterministic encryption?
Lecture Notes in Computer Science
2015-08-27Paper
Interactive Message-Locked Encryption and Secure Deduplication
Lecture Notes in Computer Science
2015-08-27Paper
Efficient probabilistically checkable proofs and applications to approximations
Proceedings of the twenty-fifth annual ACM symposium on Theory of computing - STOC '93
2015-05-07Paper
Subtleties in the definition of IND-CCA: when and how should challenge decryption be disallowed?
Journal of Cryptology
2015-03-25Paper
A characterization of chameleon hash functions and new, efficient designs
Journal of Cryptology
2015-01-07Paper
Poly-Many Hardcore Bits for Any One-Way Function and a Framework for Differing-Inputs Obfuscation
Lecture Notes in Computer Science
2015-01-06Paper
The exact security of digital signatures -- how to sign with RSA and Rabin
Advances in Cryptology — EUROCRYPT ’96
2014-08-20Paper
Security of symmetric encryption against mass surveillance
Advances in Cryptology – CRYPTO 2014
2014-08-07Paper
Cryptography from compression functions: the UCE bridge to the ROM
Advances in Cryptology – CRYPTO 2014
2014-08-07Paper
Key-Versatile Signatures and Applications: RKA, KDM and Joint Enc/Sig
Advances in Cryptology – EUROCRYPT 2014
2014-05-27Paper
Policy-Based Signatures
Public-Key Cryptography – PKC 2014
2014-03-25Paper
Instantiating random oracles via UCEs
Advances in Cryptology – CRYPTO 2013
2013-09-17Paper
Message-locked encryption and secure deduplication
Advances in cryptology -- EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26--30, 2013. Proceedings
2013-05-31Paper
Adaptively Secure Garbling with Applications to One-Time Programs and Secure Outsourcing
Advances in Cryptology – ASIACRYPT 2012
2013-03-19Paper
RKA security beyond the linear barrier: IBE, encryption and signatures
Advances in Cryptology – ASIACRYPT 2012
2013-03-19Paper
On-line ciphers and the Hash-CBC constructions
Journal of Cryptology
2013-01-04Paper
Semantic security for the wiretap channel
Lecture Notes in Computer Science
2012-09-25Paper
Multi-instance security and its application to password-based cryptography
Lecture Notes in Computer Science
2012-09-25Paper
Standard security does not imply security against selective-opening
Advances in Cryptology – EUROCRYPT 2012
2012-06-29Paper
Identity-based (lossy) trapdoor functions and applications
Advances in Cryptology – EUROCRYPT 2012
2012-06-29Paper
Cryptography secure against related-key attacks and tampering
Lecture Notes in Computer Science
2011-12-02Paper
Proving computational ability
Studies in Complexity and Cryptography. Miscellanea on the Interplay between Randomness and Computation
2011-08-19Paper
On probabilistic versus deterministic provers in the definition of proofs of knowledge
Studies in Complexity and Cryptography. Miscellanea on the Interplay between Randomness and Computation
2011-08-19Paper
Authenticated and misuse-resistant encryption of key-dependent data
Advances in Cryptology – CRYPTO 2011
2011-08-12Paper
Identity-based encryption secure against selective opening attack
Theory of Cryptography
2011-05-19Paper
Pseudorandom functions and permutations provably secure against related-key attacks
Advances in Cryptology – CRYPTO 2010
2010-08-24Paper
Cryptographic agility and its relation to circular encryption
Advances in Cryptology – EUROCRYPT 2010
2010-06-01Paper
Robust Encryption
Theory of Cryptography
2010-02-24Paper
Hedged public-key encryption: how to protect against bad randomness
Advances in Cryptology – ASIACRYPT 2009
2009-12-15Paper
Format-preserving encryption
Selected Areas in Cryptography
2009-12-09Paper
Security proofs for identity-based identification and signature schemes
Journal of Cryptology
2009-06-30Paper
Authenticated encryption: relations among notions and analysis of the generic composition paradigm
Journal of Cryptology
2009-06-08Paper
Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions
Journal of Cryptology
2009-06-08Paper
Simulation without the Artificial Abort: Simplified Proof and Improved Concrete Security for Waters’ IBE Scheme
Advances in Cryptology - EUROCRYPT 2009
2009-05-12Paper
Possibility and Impossibility Results for Encryption and Commitment Secure under Selective Opening
Advances in Cryptology - EUROCRYPT 2009
2009-05-12Paper
Key Insulation and Intrusion Resilience over a Public Channel
Topics in Cryptology – CT-RSA 2009
2009-04-29Paper
Deterministic and Efficiently Searchable Encryption
Advances in Cryptology - CRYPTO 2007
2009-03-10Paper
From Identification to Signatures Via the Fiat–Shamir Transform: Necessary and Sufficient Conditions for Security and Forward-Security
IEEE Transactions on Information Theory
2009-02-24Paper
Hash Functions from Sigma Protocols and Improvements to VSH
Advances in Cryptology - ASIACRYPT 2008
2009-02-10Paper
Deterministic Encryption: Definitional Equivalences and Constructions without Random Oracles
Lecture Notes in Computer Science
2009-02-10Paper
Breaking and provably repairing the SSH authenticated encryption scheme
ACM Transactions on Information and System Security
2008-12-21Paper
Transitive Signatures: New Schemes and Proofs
IEEE Transactions on Information Theory
2008-12-21Paper
Multirecipient Encryption Schemes: How to Save on Bandwidth and Computation Without Sacrificing Security
IEEE Transactions on Information Theory
2008-12-21Paper
Multi-Property-Preserving Hash Domain Extension and the EMD Transform
Advances in Cryptology – ASIACRYPT 2006
2008-04-24Paper
Identity-Based Multi-signatures from RSA
Lecture Notes in Computer Science
2008-04-17Paper
Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions
Advances in Cryptology – CRYPTO 2005
2008-03-17Paper
Improved Security Analyses for CBC MACs
Advances in Cryptology – CRYPTO 2005
2008-03-17Paper
Unrestricted Aggregate Signatures
Automata, Languages and Programming
2007-11-28Paper
Hash Functions in the Dedicated-Key Setting: Design Choices and MPP Transforms
Automata, Languages and Programming
2007-11-28Paper
Advances in Cryptology - EUROCRYPT 2004
Lecture Notes in Computer Science
2007-09-25Paper
Advances in Cryptology - EUROCRYPT 2004
Lecture Notes in Computer Science
2007-09-25Paper
Advances in Cryptology - EUROCRYPT 2004
Lecture Notes in Computer Science
2007-09-25Paper
The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs
Advances in Cryptology - EUROCRYPT 2006
2007-09-24Paper
Two-Tier Signatures, Strongly Unforgeable Signatures, and Fiat-Shamir Without Random Oracles
Public Key Cryptography – PKC 2007
2007-09-04Paper
New Proofs for NMAC and HMAC: Security Without Collision-Resistance
Lecture Notes in Computer Science
2007-09-04Paper
Protecting against key-exposure: strongly key-insulated encryption with optimal threshold
Applicable Algebra in Engineering, Communication and Computing
2006-09-12Paper
Authenticated key exchange secure against dictionary attacks2006-03-01Paper
scientific article; zbMATH DE number 5009203 (Why is no real title available?)2006-03-01Paper
Fast Software Encryption
Lecture Notes in Computer Science
2005-12-27Paper
Topics in Cryptology – CT-RSA 2005
Lecture Notes in Computer Science
2005-12-08Paper
Advances in Cryptology – CRYPTO 2004
Lecture Notes in Computer Science
2005-08-23Paper
Towards Plaintext-Aware Public-Key Encryption Without Random Oracles2005-08-12Paper
scientific article; zbMATH DE number 2088331 (Why is no real title available?)2004-08-12Paper
scientific article; zbMATH DE number 2086722 (Why is no real title available?)2004-08-11Paper
scientific article; zbMATH DE number 2081087 (Why is no real title available?)2004-08-04Paper
scientific article; zbMATH DE number 2009976 (Why is no real title available?)2003-11-26Paper
scientific article; zbMATH DE number 2009983 (Why is no real title available?)2003-11-26Paper
The one-more-RSA-inversion problems and the security of Chaum's blind signature scheme
Journal of Cryptology
2003-08-27Paper
scientific article; zbMATH DE number 1962139 (Why is no real title available?)2003-08-10Paper
Randomness Re-use in Multi-recipient Encryption Schemeas
Public Key Cryptography — PKC 2003
2003-07-27Paper
Transitive Signatures Based on Factoring and RSA
Lecture Notes in Computer Science
2003-07-16Paper
scientific article; zbMATH DE number 1942419 (Why is no real title available?)2003-06-30Paper
A note on negligible functions
Journal of Cryptology
2003-03-25Paper
Uniform generation of NP-witnesses using an NP-oracle
Information and Computation
2003-01-14Paper
scientific article; zbMATH DE number 1842498 (Why is no real title available?)2002-12-08Paper
scientific article; zbMATH DE number 1303128 (Why is no real title available?)2002-10-08Paper
scientific article; zbMATH DE number 1808214 (Why is no real title available?)2002-09-30Paper
scientific article; zbMATH DE number 1617924 (Why is no real title available?)2002-09-01Paper
scientific article; zbMATH DE number 1775427 (Why is no real title available?)2002-08-01Paper
scientific article; zbMATH DE number 1722691 (Why is no real title available?)2002-03-21Paper
scientific article; zbMATH DE number 1263223 (Why is no real title available?)2002-01-29Paper
The complexity of approximating a nonlinear program2001-09-18Paper
scientific article; zbMATH DE number 1583805 (Why is no real title available?)2001-07-03Paper
scientific article; zbMATH DE number 1583804 (Why is no real title available?)2001-07-03Paper
The security of the cipher block chaining message authentication code
Journal of Computer and System Sciences
2001-04-17Paper
scientific article; zbMATH DE number 1583803 (Why is no real title available?)2001-04-03Paper
scientific article; zbMATH DE number 1583788 (Why is no real title available?)2001-04-03Paper
scientific article; zbMATH DE number 1418315 (Why is no real title available?)2000-08-27Paper
scientific article; zbMATH DE number 1418310 (Why is no real title available?)2000-08-24Paper
scientific article; zbMATH DE number 1418299 (Why is no real title available?)2000-07-26Paper
scientific article; zbMATH DE number 1306876 (Why is no real title available?)2000-04-26Paper
scientific article; zbMATH DE number 1306875 (Why is no real title available?)2000-04-26Paper
scientific article; zbMATH DE number 1418256 (Why is no real title available?)2000-03-19Paper
scientific article; zbMATH DE number 1418300 (Why is no real title available?)2000-03-19Paper
scientific article; zbMATH DE number 1304183 (Why is no real title available?)2000-03-07Paper
scientific article; zbMATH DE number 1406792 (Why is no real title available?)2000-03-01Paper
scientific article; zbMATH DE number 1406782 (Why is no real title available?)2000-03-01Paper
Translucent cryptography -- an alternative to key escrow, and its implementation via fractional oblivious transfer
Journal of Cryptology
2000-02-04Paper
scientific article; zbMATH DE number 1304296 (Why is no real title available?)2000-01-12Paper
scientific article; zbMATH DE number 1263180 (Why is no real title available?)1999-07-26Paper
scientific article; zbMATH DE number 1263181 (Why is no real title available?)1999-07-22Paper
scientific article; zbMATH DE number 1302861 (Why is no real title available?)1999-06-17Paper
scientific article; zbMATH DE number 1302836 (Why is no real title available?)1999-06-17Paper
scientific article; zbMATH DE number 1303126 (Why is no real title available?)1999-06-17Paper
scientific article; zbMATH DE number 1302853 (Why is no real title available?)1999-06-17Paper
On chromatic sums and distributed resource allocation
Information and Computation
1998-09-27Paper
scientific article; zbMATH DE number 1107669 (Why is no real title available?)1998-06-07Paper
Free Bits, PCPs, and Nonapproximability---Towards Tight Results
SIAM Journal on Computing
1998-05-10Paper
scientific article; zbMATH DE number 1088254 (Why is no real title available?)1998-03-10Paper
scientific article; zbMATH DE number 1088907 (Why is no real title available?)1998-02-19Paper
scientific article; zbMATH DE number 1088241 (Why is no real title available?)1998-01-07Paper
scientific article; zbMATH DE number 1030978 (Why is no real title available?)1997-11-23Paper
scientific article; zbMATH DE number 1024060 (Why is no real title available?)1997-09-24Paper
Linearity testing in characteristic two
IEEE Transactions on Information Theory
1997-08-07Paper
Certifying permutations: Noninteractive zero-knowledge based on any trapdoor permutation
Journal of Cryptology
1997-05-19Paper
The complexity of approximating a nonlinear program
Mathematical Programming. Series A. Series B
1996-02-12Paper
scientific article; zbMATH DE number 708820 (Why is no real title available?)1995-11-06Paper
scientific article; zbMATH DE number 708823 (Why is no real title available?)1995-08-08Paper
How to sign given any trapdoor permutation
Journal of the ACM
1994-08-21Paper
Randomness in interactive proofs
Computational Complexity
1994-05-08Paper
The Complexity of Decision Versus Search
SIAM Journal on Computing
1994-04-27Paper
scientific article; zbMATH DE number 4191077 (Why is no real title available?)1991-01-01Paper
scientific article; zbMATH DE number 4179279 (Why is no real title available?)1990-01-01Paper
scientific article; zbMATH DE number 4191103 (Why is no real title available?)1990-01-01Paper
scientific article; zbMATH DE number 4191102 (Why is no real title available?)1990-01-01Paper


Research outcomes over time


This page was built for person: M. Bellare