M. Bellare

From MaRDI portal
Person:171914

Available identifiers

zbMath Open bellare.mihirDBLPb/MBellareWikidataQ1932841 ScholiaQ1932841MaRDI QIDQ171914

List of research outcomes





PublicationDate of PublicationType
Succinctly-committing authenticated encryption2024-12-13Paper
Symmetric and dual PRFs from standard assumptions: a generic validation of a prevailing assumption2024-10-11Paper
When messages are keys: is HMAC a dual-PRF?2024-02-02Paper
Hardening signature schemes via derive-then-derandomize: stronger security proofs for EdDSA2023-11-24Paper
Flexible password-based encryption: securing cloud storage and provably resisting partitioning-oracle attacks2023-10-04Paper
Forward-security under continual leakage2023-08-02Paper
Better than advertised security for non-interactive threshold signatures2023-07-07Paper
Chain Reductions for Multi-signatures and the HBMS Scheme2023-05-26Paper
Efficient schemes for committing authenticated encryption2022-08-30Paper
Incremental cryptography revisited: PRFs, nonces and modular design2022-07-06Paper
Dual-mode NIZKs: possibility and impossibility results for property transfer2022-07-06Paper
The multi-base discrete logarithm problem: tight reductions and non-rewinding proofs for Schnorr identification and signatures2022-07-06Paper
Security under message-derived keys: signcryption in iMessage2021-12-01Paper
Nonces are noticed: AEAD revisited2020-05-20Paper
The local forking lemma and its application to deterministic encryption2020-05-11Paper
Robust encryption2018-05-28Paper
Public-key encryption resistant to parameter subversion and its realization from efficiently-embeddable groups2018-05-16Paper
Ratcheted encryption and key exchange: the security of messaging2017-10-27Paper
Deterring Certificate Subversion: Efficient Double-Authentication-Preventing Signatures2017-06-13Paper
From Identification to Signatures, Tightly: A Framework and Generic Transforms2017-01-06Paper
NIZKs with an untrusted CRS: security in the face of parameter subversion2017-01-06Paper
Big-key symmetric encryption: resisting key exfiltration2016-11-30Paper
The multi-user security of authenticated encryption: AES-GCM in TLS 1.32016-11-30Paper
Hash-Function Based PRFs: AMAC and Its Multi-User Security2016-09-09Paper
Nonce-based cryptography: retaining security when randomness fails2016-09-09Paper
Improved non-approximability results2016-09-01Paper
Corrigendum to: ``Efficient probabilistic checkable proofs and applications to approximation2016-09-01Paper
New negative results on differing-inputs obfuscation2016-07-15Paper
Contention in cryptoland: obfuscation, leakage and UCE2016-04-08Paper
Point-function obfuscation: a framework and generic constructions2016-04-08Paper
New proofs for NMAC and HMAC: security without collision resistance2016-01-11Paper
Keying hash functions for message authentication2015-11-11Paper
Resisting randomness subversion: fast deterministic and hedged public-key encryption in the standard model2015-09-30Paper
Distributed pseudo-random bit generators---a new way to speed-up shared coin tossing2015-09-11Paper
Adaptive Witness Encryption and Asymmetric Password-Based Cryptography2015-08-27Paper
How secure is deterministic encryption?2015-08-27Paper
Interactive Message-Locked Encryption and Secure Deduplication2015-08-27Paper
Efficient probabilistically checkable proofs and applications to approximations2015-05-07Paper
Subtleties in the definition of IND-CCA: when and how should challenge decryption be disallowed?2015-03-25Paper
A characterization of chameleon hash functions and new, efficient designs2015-01-07Paper
Poly-Many Hardcore Bits for Any One-Way Function and a Framework for Differing-Inputs Obfuscation2015-01-06Paper
The exact security of digital signatures -- how to sign with RSA and Rabin2014-08-20Paper
Security of symmetric encryption against mass surveillance2014-08-07Paper
Cryptography from compression functions: the UCE bridge to the ROM2014-08-07Paper
Key-Versatile Signatures and Applications: RKA, KDM and Joint Enc/Sig2014-05-27Paper
Policy-Based Signatures2014-03-25Paper
Instantiating random oracles via UCEs2013-09-17Paper
Message-locked encryption and secure deduplication2013-05-31Paper
Adaptively Secure Garbling with Applications to One-Time Programs and Secure Outsourcing2013-03-19Paper
RKA security beyond the linear barrier: IBE, encryption and signatures2013-03-19Paper
On-line ciphers and the Hash-CBC constructions2013-01-04Paper
Semantic security for the wiretap channel2012-09-25Paper
Multi-instance security and its application to password-based cryptography2012-09-25Paper
Standard security does not imply security against selective-opening2012-06-29Paper
Identity-based (lossy) trapdoor functions and applications2012-06-29Paper
Cryptography secure against related-key attacks and tampering2011-12-02Paper
Proving computational ability2011-08-19Paper
On probabilistic versus deterministic provers in the definition of proofs of knowledge2011-08-19Paper
Authenticated and misuse-resistant encryption of key-dependent data2011-08-12Paper
Identity-based encryption secure against selective opening attack2011-05-19Paper
Pseudorandom functions and permutations provably secure against related-key attacks2010-08-24Paper
Cryptographic agility and its relation to circular encryption2010-06-01Paper
Robust Encryption2010-02-24Paper
Hedged public-key encryption: how to protect against bad randomness2009-12-15Paper
Format-preserving encryption2009-12-09Paper
Security proofs for identity-based identification and signature schemes2009-06-30Paper
Authenticated encryption: relations among notions and analysis of the generic composition paradigm2009-06-08Paper
Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions2009-06-08Paper
Simulation without the Artificial Abort: Simplified Proof and Improved Concrete Security for Waters’ IBE Scheme2009-05-12Paper
Possibility and Impossibility Results for Encryption and Commitment Secure under Selective Opening2009-05-12Paper
Key Insulation and Intrusion Resilience over a Public Channel2009-04-29Paper
Deterministic and Efficiently Searchable Encryption2009-03-10Paper
From Identification to Signatures Via the Fiat–Shamir Transform: Necessary and Sufficient Conditions for Security and Forward-Security2009-02-24Paper
Hash Functions from Sigma Protocols and Improvements to VSH2009-02-10Paper
Deterministic Encryption: Definitional Equivalences and Constructions without Random Oracles2009-02-10Paper
Breaking and provably repairing the SSH authenticated encryption scheme2008-12-21Paper
Transitive Signatures: New Schemes and Proofs2008-12-21Paper
Multirecipient Encryption Schemes: How to Save on Bandwidth and Computation Without Sacrificing Security2008-12-21Paper
Multi-Property-Preserving Hash Domain Extension and the EMD Transform2008-04-24Paper
Identity-Based Multi-signatures from RSA2008-04-17Paper
Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions2008-03-17Paper
Improved Security Analyses for CBC MACs2008-03-17Paper
Unrestricted Aggregate Signatures2007-11-28Paper
Hash Functions in the Dedicated-Key Setting: Design Choices and MPP Transforms2007-11-28Paper
Advances in Cryptology - EUROCRYPT 20042007-09-25Paper
Advances in Cryptology - EUROCRYPT 20042007-09-25Paper
Advances in Cryptology - EUROCRYPT 20042007-09-25Paper
The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs2007-09-24Paper
Two-Tier Signatures, Strongly Unforgeable Signatures, and Fiat-Shamir Without Random Oracles2007-09-04Paper
New Proofs for NMAC and HMAC: Security Without Collision-Resistance2007-09-04Paper
Protecting against key-exposure: strongly key-insulated encryption with optimal threshold2006-09-12Paper
Authenticated key exchange secure against dictionary attacks2006-03-01Paper
https://portal.mardi4nfdi.de/entity/Q33749132006-03-01Paper
Fast Software Encryption2005-12-27Paper
Topics in Cryptology – CT-RSA 20052005-12-08Paper
Advances in Cryptology – CRYPTO 20042005-08-23Paper
Towards Plaintext-Aware Public-Key Encryption Without Random Oracles2005-08-12Paper
https://portal.mardi4nfdi.de/entity/Q47395252004-08-12Paper
https://portal.mardi4nfdi.de/entity/Q47372612004-08-11Paper
https://portal.mardi4nfdi.de/entity/Q44742002004-08-04Paper
https://portal.mardi4nfdi.de/entity/Q44348952003-11-26Paper
https://portal.mardi4nfdi.de/entity/Q44349022003-11-26Paper
The one-more-RSA-inversion problems and the security of Chaum's blind signature scheme2003-08-27Paper
https://portal.mardi4nfdi.de/entity/Q44185232003-08-10Paper
Randomness Re-use in Multi-recipient Encryption Schemeas2003-07-27Paper
Transitive Signatures Based on Factoring and RSA2003-07-16Paper
https://portal.mardi4nfdi.de/entity/Q44091162003-06-30Paper
A note on negligible functions2003-03-25Paper
Uniform generation of NP-witnesses using an NP-oracle2003-01-14Paper
https://portal.mardi4nfdi.de/entity/Q47837322002-12-08Paper
https://portal.mardi4nfdi.de/entity/Q42496432002-10-08Paper
https://portal.mardi4nfdi.de/entity/Q31496762002-09-30Paper
https://portal.mardi4nfdi.de/entity/Q27244342002-09-01Paper
https://portal.mardi4nfdi.de/entity/Q45425602002-08-01Paper
https://portal.mardi4nfdi.de/entity/Q27788632002-03-21Paper
https://portal.mardi4nfdi.de/entity/Q42340952002-01-29Paper
The complexity of approximating a nonlinear program2001-09-18Paper
https://portal.mardi4nfdi.de/entity/Q27074522001-07-03Paper
https://portal.mardi4nfdi.de/entity/Q27074512001-07-03Paper
The security of the cipher block chaining message authentication code2001-04-17Paper
https://portal.mardi4nfdi.de/entity/Q27074502001-04-03Paper
https://portal.mardi4nfdi.de/entity/Q27074282001-04-03Paper
https://portal.mardi4nfdi.de/entity/Q49418772000-08-27Paper
https://portal.mardi4nfdi.de/entity/Q49418722000-08-24Paper
https://portal.mardi4nfdi.de/entity/Q49418592000-07-26Paper
https://portal.mardi4nfdi.de/entity/Q42527282000-04-26Paper
https://portal.mardi4nfdi.de/entity/Q42527272000-04-26Paper
https://portal.mardi4nfdi.de/entity/Q49418152000-03-19Paper
https://portal.mardi4nfdi.de/entity/Q49418602000-03-19Paper
https://portal.mardi4nfdi.de/entity/Q42508952000-03-07Paper
https://portal.mardi4nfdi.de/entity/Q49407082000-03-01Paper
https://portal.mardi4nfdi.de/entity/Q49406982000-03-01Paper
Translucent cryptography -- an alternative to key escrow, and its implementation via fractional oblivious transfer2000-02-04Paper
https://portal.mardi4nfdi.de/entity/Q42510222000-01-12Paper
https://portal.mardi4nfdi.de/entity/Q42340501999-07-26Paper
https://portal.mardi4nfdi.de/entity/Q42340511999-07-22Paper
https://portal.mardi4nfdi.de/entity/Q42493461999-06-17Paper
https://portal.mardi4nfdi.de/entity/Q42493181999-06-17Paper
https://portal.mardi4nfdi.de/entity/Q42496411999-06-17Paper
https://portal.mardi4nfdi.de/entity/Q42493371999-06-17Paper
On chromatic sums and distributed resource allocation1998-09-27Paper
https://portal.mardi4nfdi.de/entity/Q43736071998-06-07Paper
Free Bits, PCPs, and Nonapproximability---Towards Tight Results1998-05-10Paper
https://portal.mardi4nfdi.de/entity/Q43645711998-03-10Paper
https://portal.mardi4nfdi.de/entity/Q43657321998-02-19Paper
https://portal.mardi4nfdi.de/entity/Q43645581998-01-07Paper
https://portal.mardi4nfdi.de/entity/Q43434181997-11-23Paper
https://portal.mardi4nfdi.de/entity/Q43417511997-09-24Paper
Linearity testing in characteristic two1997-08-07Paper
Certifying permutations: Noninteractive zero-knowledge based on any trapdoor permutation1997-05-19Paper
The complexity of approximating a nonlinear program1996-02-12Paper
https://portal.mardi4nfdi.de/entity/Q43187111995-11-06Paper
https://portal.mardi4nfdi.de/entity/Q43187141995-08-08Paper
How to sign given any trapdoor permutation1994-08-21Paper
Randomness in interactive proofs1994-05-08Paper
The Complexity of Decision Versus Search1994-04-27Paper
https://portal.mardi4nfdi.de/entity/Q32101411991-01-01Paper
https://portal.mardi4nfdi.de/entity/Q32029441990-01-01Paper
https://portal.mardi4nfdi.de/entity/Q32101631990-01-01Paper
https://portal.mardi4nfdi.de/entity/Q32101621990-01-01Paper

Research outcomes over time

This page was built for person: M. Bellare