What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Mihir Bellare
Google Scholar
151
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/pkc
Public-Algorithm Substitution Attacks: Subverting Hashing and Verification.
Mihir Bellare
Doreen Riepel
Laura Shea
2025
conf/pkc
Intermundium-DL: Assessing the Resilience of Current Schemes to Discrete-Log-Computation Attacks on Public Parameters.
Mihir Bellare
Doreen Riepel
Laura Shea
2024
journals/joc
Symmetric and Dual PRFs from Standard Assumptions: A Generic Validation of a Prevailing Assumption.
Mihir Bellare
Anna Lysyanskaya
2024
conf/crypto
Succinctly-Committing Authenticated Encryption.
Mihir Bellare
Viet Tung Hoang
2024
conf/asiacrypt
Count Corruptions, Not Users: Improved Tightness for Signatures, Encryption and Authenticated Key Exchange.
Mihir Bellare
Doreen Riepel
Stefano Tessaro
Yizhao Zhang
2024
conf/asiacrypt
The Concrete Security of Two-Party Computation: Simple Definitions, and Tight Proofs for PSI and OPRFs.
Mihir Bellare
Rishabh Ranjan
Doreen Riepel
Ali Aldakheel
2023
conf/crypto
When Messages Are Keys: Is HMAC a Dual-PRF?
Matilda Backendal
Mihir Bellare
Felix Günther
Matteo Scarlata
2023
conf/pkc
Hardening Signature Schemes via Derive-then-Derandomize: Stronger Security Proofs for EdDSA.
Mihir Bellare
Hannah Davis
Zijing Di
2023
conf/ctrsa
Flexible Password-Based Encryption: Securing Cloud Storage and Provably Resisting Partitioning-Oracle Attacks.
Mihir Bellare
Laura Shea
2022
conf/crypto
Better than Advertised Security for Non-interactive Threshold Signatures.
Mihir Bellare
Elizabeth C. Crites
Chelsea Komlo
Mary Maller
Stefano Tessaro
Chenzhi Zhu
2022
conf/eurocrypt
Efficient Schemes for Committing Authenticated Encryption.
Mihir Bellare
Viet Tung Hoang
2021
conf/asiacrypt
Chain Reductions for Multi-signatures and the HBMS Scheme.
Mihir Bellare
Wei Dai
2020
journals/popets
Reimagining Secret Sharing: Creating a Safer and More Versatile Primitive by Adding Authenticity, Correcting Errors, and Reducing Randomness Requirements.
Mihir Bellare
Wei Dai
Phillip Rogaway
2020
conf/eurocrypt
Security Under Message-Derived Keys: Signcryption in iMessage.
Mihir Bellare
Igors Stepanovs
2020
conf/eurocrypt
Separate Your Domains: NIST PQC KEMs, Oracle Cloning and Read-Only Indifferentiability.
Mihir Bellare
Hannah Davis
Felix Günther
2019
conf/crypto
Nonces Are Noticed: AEAD Revisited.
Mihir Bellare
Ruth Ng
Björn Tackmann
2019
conf/asiacrypt
The Local Forking Lemma and Its Application to Deterministic Encryption.
Mihir Bellare
Wei Dai
Lucy Li
2018
journals/joc
Robust Encryption.
Michel Abdalla
Mihir Bellare
Gregory Neven
2018
conf/pkc
Public-Key Encryption Resistant to Parameter Subversion and Its Realization from Efficiently-Embeddable Groups.
Benedikt Auerbach
Mihir Bellare
Eike Kiltz
2017
conf/ccs
Defending Against Key Exfiltration: Efficiency Improvements for Big-Key Cryptography via Large-Alphabet Subkey Prediction.
Mihir Bellare
Wei Dai
2017
conf/ccs
Identity-Based Format-Preserving Encryption.
Mihir Bellare
Viet Tung Hoang
2017
conf/ccs
Better Than Advertised: Improved Collision-Resistance Guarantees for MD-Based Hash Functions.
Mihir Bellare
Joseph Jaeger
Julia Len
2017
conf/crypto
Ratcheted Encryption and Key Exchange: The Security of Messaging.
Mihir Bellare
Asha Camper Singh
Joseph Jaeger
Maya Nyayapati
Igors Stepanovs
2017
conf/pkc
Deterring Certificate Subversion: Efficient Double-Authentication-Preventing Signatures.
Mihir Bellare
Bertram Poettering
Douglas Stebila
2017
conf/cans
Forward-Security Under Continual Leakage.
Mihir Bellare
Adam O'Neill
Igors Stepanovs
2016
conf/ccs
Message-Recovery Attacks on Feistel-Based Format Preserving Encryption.
Mihir Bellare
Viet Tung Hoang
Stefano Tessaro
2016
conf/crypto
Big-Key Symmetric Encryption: Resisting Key Exfiltration.
Mihir Bellare
Daniel Kane
Phillip Rogaway
2016
conf/crypto
The Multi-user Security of Authenticated Encryption: AES-GCM in TLS 1.3.
Mihir Bellare
Björn Tackmann
2016
conf/eurocrypt
New Negative Results on Differing-Inputs Obfuscation.
Mihir Bellare
Igors Stepanovs
Brent Waters
2016
conf/eurocrypt
Nonce-Based Cryptography: Retaining Security When Randomness Fails.
Mihir Bellare
Björn Tackmann
2016
conf/eurocrypt
Hash-Function Based PRFs: AMAC and Its Multi-User Security.
Mihir Bellare
Daniel J. Bernstein
Stefano Tessaro
2016
conf/asiacrypt
From Identification to Signatures, Tightly: A Framework and Generic Transforms.
Mihir Bellare
Bertram Poettering
Douglas Stebila
2016
conf/asiacrypt
NIZKs with an Untrusted CRS: Security in the Face of Parameter Subversion.
Mihir Bellare
Georg Fuchsbauer
Alessandra Scafuro
2016
conf/tcc
Point-Function Obfuscation: A Framework and Generic Constructions.
Mihir Bellare
Igors Stepanovs
2016
conf/tcc
Contention in Cryptoland: Obfuscation, Leakage and UCE.
Mihir Bellare
Igors Stepanovs
Stefano Tessaro
2015
journals/joc
New Proofs for NMAC and HMAC: Security without Collision Resistance.
Mihir Bellare
2015
journals/joc
Subtleties in the Definition of IND-CCA: When and How Should Challenge Decryption Be Disallowed?
Mihir Bellare
Dennis Hofheinz
Eike Kiltz
2015
conf/ccs
Mass-surveillance without the State: Strongly Undetectable Algorithm-Substitution Attacks.
Mihir Bellare
Joseph Jaeger
Daniel Kane
2015
conf/pkc
Interactive Message-Locked Encryption and Secure Deduplication.
Mihir Bellare
Sriram Keelveedhi
2015
conf/pkc
How Secure is Deterministic Encryption?
Mihir Bellare
Rafael Dowsley
Sriram Keelveedhi
2015
conf/pkc
Adaptive Witness Encryption and Asymmetric Password-Based Cryptography.
Mihir Bellare
Viet Tung Hoang
2015
conf/eurocrypt
Resisting Randomness Subversion: Fast Deterministic and Hedged Public-Key Encryption in the Standard Model.
Mihir Bellare
Viet Tung Hoang
2014
journals/joc
A Characterization of Chameleon Hash Functions and New, Efficient Designs.
Mihir Bellare
Todor Ristov
2014
conf/crypto
Cryptography from Compression Functions: The UCE Bridge to the ROM.
Mihir Bellare
Viet Tung Hoang
Sriram Keelveedhi
2014
conf/crypto
Security of Symmetric Encryption against Mass Surveillance.
Mihir Bellare
Kenneth G. Paterson
Phillip Rogaway
2014
conf/pkc
Policy-Based Signatures.
Mihir Bellare
Georg Fuchsbauer
2014
conf/eurocrypt
Key-Versatile Signatures and Applications: RKA, KDM and Joint Enc/Sig.
Mihir Bellare
Sarah Meiklejohn
Susan Thomson
2014
conf/asiacrypt
Poly-Many Hardcore Bits for Any One-Way Function and a Framework for Differing-Inputs Obfuscation.
Mihir Bellare
Igors Stepanovs
Stefano Tessaro
2013
conf/uss
DupLESS: Server-Aided Encryption for Deduplicated Storage.
Sriram Keelveedhi
Mihir Bellare
Thomas Ristenpart
2013
conf/crypto
Instantiating Random Oracles via UCEs.
Mihir Bellare
Viet Tung Hoang
Sriram Keelveedhi
2013
conf/sp
Efficient Garbling from a Fixed-Key Blockcipher.
Mihir Bellare
Viet Tung Hoang
Sriram Keelveedhi
Phillip Rogaway
2013
conf/eurocrypt
Message-Locked Encryption and Secure Deduplication.
Mihir Bellare
Sriram Keelveedhi
Thomas Ristenpart
2013
conf/cans
Semantically-Secure Functional Encryption: Possibility Results, Impossibility Results and the Quest for a General Definition.
Mihir Bellare
Adam O'Neill
2012
journals/joc
On-line Ciphers and the Hash-CBC Constructions.
Mihir Bellare
Alexandra Boldyreva
Lars R. Knudsen
Chanathip Namprempre
2012
conf/ccs
Foundations of garbled circuits.
Mihir Bellare
Viet Tung Hoang
Phillip Rogaway
2012
conf/crypto
Multi-instance Security and Its Application to Password-Based Cryptography.
Mihir Bellare
Thomas Ristenpart
Stefano Tessaro
2012
conf/crypto
Semantic Security for the Wiretap Channel.
Mihir Bellare
Stefano Tessaro
Alexander Vardy
2012
conf/eurocrypt
Identity-Based (Lossy) Trapdoor Functions and Applications.
Mihir Bellare
Eike Kiltz
Chris Peikert
Brent Waters
2012
conf/eurocrypt
Standard Security Does Not Imply Security against Selective-Opening.
Mihir Bellare
Rafael Dowsley
Brent Waters
Scott Yilek
2012
conf/asiacrypt
Adaptively Secure Garbling with Applications to One-Time Programs and Secure Outsourcing.
Mihir Bellare
Viet Tung Hoang
Phillip Rogaway
2012
conf/asiacrypt
RKA Security beyond the Linear Barrier: IBE, Encryption and Signatures.
Mihir Bellare
Kenneth G. Paterson
Susan Thomson
2011
conf/ccs
Ciphers that securely encipher their own keys.
Mihir Bellare
David Cash
Sriram Keelveedhi
2011
conf/crypto
Authenticated and Misuse-Resistant Encryption of Key-Dependent Data.
Mihir Bellare
Sriram Keelveedhi
2011
conf/asiacrypt
Cryptography Secure against Related-Key Attacks and Tampering.
Mihir Bellare
David Cash
Rachel Miller
2011
conf/tcc
Identity-Based Encryption Secure against Selective Opening Attack.
Mihir Bellare
Brent Waters
Scott Yilek
2010
conf/crypto
Pseudorandom Functions and Permutations Provably Secure against Related-Key Attacks.
Mihir Bellare
David Cash
2010
conf/eurocrypt
Cryptographic Agility and Its Relation to Circular Encryption.
Tolga Acar
Mira Belenkiy
Mihir Bellare
David Cash
2010
conf/tcc
Robust Encryption.
Michel Abdalla
Mihir Bellare
Gregory Neven
2009
journals/joc
Security Proofs for Identity-Based Identification and Signature Schemes.
Mihir Bellare
Chanathip Namprempre
Gregory Neven
2009
conf/ctrsa
Key Insulation and Intrusion Resilience over a Public Channel.
Mihir Bellare
Shanshan Duan
Adriana Palacio
2009
conf/eurocrypt
Possibility and Impossibility Results for Encryption and Commitment Secure under Selective Opening.
Mihir Bellare
Dennis Hofheinz
Scott Yilek
2009
conf/eurocrypt
Simulation without the Artificial Abort: Simplified Proof and Improved Concrete Security for Waters' IBE Scheme.
Mihir Bellare
Thomas Ristenpart
2009
conf/asiacrypt
Hedged Public-Key Encryption: How to Protect against Bad Randomness.
Mihir Bellare
Zvika Brakerski
Moni Naor
Thomas Ristenpart
Gil Segev
Hovav Shacham
Scott Yilek
2009
conf/sacrypt
Format-Preserving Encryption.
Mihir Bellare
Thomas Ristenpart
Phillip Rogaway
Till Stegers
2008
journals/joc
Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm.
Mihir Bellare
Chanathip Namprempre
2008
journals/joc
Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions.
Michel Abdalla
Mihir Bellare
Dario Catalano
Eike Kiltz
Tadayoshi Kohno
Tanja Lange
John Malone-Lee
Gregory Neven
Pascal Paillier
Haixia Shi
2008
conf/crypto
Deterministic Encryption: Definitional Equivalences and Constructions without Random Oracles.
Mihir Bellare
Marc Fischlin
Adam O'Neill
Thomas Ristenpart
2008
conf/asiacrypt
Hash Functions from Sigma Protocols and Improvements to VSH.
Mihir Bellare
Todor Ristov
2007
conf/ccs
Robust computational secret sharing and a unified account of classical secret-sharing goals.
Phillip Rogaway
Mihir Bellare
2007
conf/crypto
Deterministic and Efficiently Searchable Encryption.
Mihir Bellare
Alexandra Boldyreva
Adam O'Neill
2007
conf/pkc
Two-Tier Signatures, Strongly Unforgeable Signatures, and Fiat-Shamir Without Random Oracles.
Mihir Bellare
Sarah Shoup
2007
conf/ctrsa
Identity-Based Multi-signatures from RSA.
Mihir Bellare
Gregory Neven
2006
conf/ccs
Stateful public-key cryptosystems: how to encrypt with one 160-bit exponentiation.
Mihir Bellare
Tadayoshi Kohno
Victor Shoup
2006
conf/ccs
Multi-signatures in the plain public-Key model and a general forking lemma.
Mihir Bellare
Gregory Neven
2006
conf/crypto
New Proofs for NMAC and HMAC: Security without collision-resistance.
Mihir Bellare
2006
conf/eurocrypt
The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs.
Mihir Bellare
Phillip Rogaway
2006
conf/asiacrypt
Multi-Property-Preserving Hash Domain Extension and the EMD Transform.
Mihir Bellare
Thomas Ristenpart
2005
conf/crypto
Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions.
Michel Abdalla
Mihir Bellare
Dario Catalano
Eike Kiltz
Tadayoshi Kohno
Tanja Lange
John Malone-Lee
Gregory Neven
Pascal Paillier
Haixia Shi
2005
conf/crypto
Improved Security Analyses for CBC MACs.
Mihir Bellare
Krzysztof Pietrzak
Phillip Rogaway
2005
conf/ctrsa
Foundations of Group Signatures: The Case of Dynamic Groups.
Mihir Bellare
Haixia Shi
Chong Zhang
2004
conf/fse
The EAX Mode of Operation.
Mihir Bellare
Phillip Rogaway
David A. Wagner
2004
conf/crypto
The Knowledge-of-Exponent Assumptions and 3-Round Zero-Knowledge Protocols.
Mihir Bellare
Adriana Palacio
2004
conf/eurocrypt
An Uninstantiable Random-Oracle-Model Scheme for a Hybrid-Encryption Problem.
Mihir Bellare
Alexandra Boldyreva
Adriana Palacio
2004
conf/eurocrypt
Security Proofs for Identity-Based Identification and Signature Schemes.
Mihir Bellare
Chanathip Namprempre
Gregory Neven
2004
conf/eurocrypt
Hash Function Balance and Its Impact on Birthday Attacks.
Mihir Bellare
Tadayoshi Kohno
2004
conf/asiacrypt
Towards Plaintext-Aware Public-Key Encryption Without Random Oracles.
Mihir Bellare
Adriana Palacio
2003
journals/joc
The One-More-RSA-Inversion Problems and the Security of Chaum's Blind Signature Scheme.
Mihir Bellare
Chanathip Namprempre
David Pointcheval
Michael Semanko
2003
conf/pkc
Randomness Re-use in Multi-recipient Encryption Schemeas.
Mihir Bellare
Alexandra Boldyreva
Jessica Staddon
2003
conf/ctrsa
Forward-Security in Private-Key Cryptography.
Mihir Bellare
Bennet S. Yee
2003
conf/eurocrypt
Foundations of Group Signatures: Formal Definitions, Simplified Requirements, and a Construction Based on General Assumptions.
Mihir Bellare
Daniele Micciancio
Bogdan Warinschi
2003
conf/eurocrypt
A Theoretical Treatment of Related-Key Attacks: RKA-PRPs, RKA-PRFs, and Applications.
Mihir Bellare
Tadayoshi Kohno
2002
journals/joc
A Note on Negligible Functions.
Mihir Bellare
2002
conf/ccs
Authenticated encryption in SSH: provably fixing the SSH binary packet protocol.
Mihir Bellare
Tadayoshi Kohno
Chanathip Namprempre
2002
conf/crypto
GQ and Schnorr Identification Schemes: Proofs of Security against Impersonation under Active and Concurrent Attacks.
Mihir Bellare
Adriana Palacio
2002
conf/eurocrypt
From Identification to Signatures via the Fiat-Shamir Transform: Minimizing Assumptions for Security and Forward-Security.
Michel Abdalla
Jee Hea An
Mihir Bellare
Chanathip Namprempre
2002
conf/asiacrypt
Transitive Signatures Based on Factoring and RSA.
Mihir Bellare
Gregory Neven
2001
conf/ccs
OCB: a block-cipher mode of operation for efficient authenticated encryption.
Phillip Rogaway
Mihir Bellare
John Black
Ted Krovetz
2001
conf/crypto
Online Ciphers and the Hash-CBC Construction.
Mihir Bellare
Alexandra Boldyreva
Lars R. Knudsen
Chanathip Namprempre
2001
conf/fc
The Power of RSA Inversion Oracles and the Security of Chaum's RSA-Based Blind Signature Scheme.
Mihir Bellare
Chanathip Namprempre
David Pointcheval
Michael Semanko
2001
conf/ctrsa
The Oracle Diffie-Hellman Assumptions and an Analysis of DHIES.
Michel Abdalla
Mihir Bellare
Phillip Rogaway
2001
conf/eurocrypt
Identification Protocols Secure against Reset Attacks.
Mihir Bellare
Marc Fischlin
Shafi Goldwasser
Silvio Micali
2001
conf/eurocrypt
Does Encryption with Redundancy Provide Authenticity?
Jee Hea An
Mihir Bellare
2001
conf/asiacrypt
Key-Privacy in Public-Key Encryption.
Mihir Bellare
Alexandra Boldyreva
Anand Desai
David Pointcheval
2000
conf/eurocrypt
Authenticated Key Exchange Secure against Dictionary Attacks.
Mihir Bellare
David Pointcheval
Phillip Rogaway
2000
conf/eurocrypt
Public-Key Encryption in a Multi-user Setting: Security Proofs and Improvements.
Mihir Bellare
Alexandra Boldyreva
Silvio Micali
2000
conf/asiacrypt
The Security of Chaffing and Winnowing.
Mihir Bellare
Alexandra Boldyreva
2000
conf/asiacrypt
Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm.
Mihir Bellare
Chanathip Namprempre
2000
conf/asiacrypt
Encode-Then-Encipher Encryption: How to Exploit Nonces or Redundancy in Plaintexts for Efficient Cryptography.
Mihir Bellare
Phillip Rogaway
2000
conf/asiacrypt
Increasing the Lifetime of a Key: A Comparative Analysis of the Security of Re-keying Techniques.
Michel Abdalla
Mihir Bellare
1999
journals/joc
Translucent Cryptography - An Alternative to Key Escrow, and Its Implementation via Fractional Oblivious Transfer.
Mihir Bellare
Ronald L. Rivest
1999
conf/fse
On the Construction of Variable-Input-Length Ciphers.
Mihir Bellare
Phillip Rogaway
1999
conf/crypto
Stateless Evaluation of Pseudorandom Functions: Security beyond the Birthday Barrier.
Mihir Bellare
Oded Goldreich
Hugo Krawczyk
1999
conf/crypto
Constructing VIL-MACsfrom FIL-MACs: Message Authentication under Weakened Assumptions.
Jee Hea An
Mihir Bellare
1999
conf/crypto
Non-malleable Encryption: Equivalence between Two Notions, and an Indistinguishability-Based Characterization.
Mihir Bellare
Amit Sahai
1999
conf/crypto
A Forward-Secure Digital Signature Scheme.
Mihir Bellare
Sara K. Miner
1998
conf/crypto
Security Amplification by Composition: The Case of Doubly-Iterated, Ideal Ciphers.
William Aiello
Mihir Bellare
Giovanni Di Crescenzo
Ramarathnam Venkatesan
1998
conf/crypto
Relations Among Notions of Security for Public-Key Encryption Schemes.
Mihir Bellare
Anand Desai
David Pointcheval
Phillip Rogaway
1998
conf/crypto
Many-to-One Trapdoor Functions and Their Ralation to Public-Key Cryptosystems.
Mihir Bellare
Shai Halevi
Amit Sahai
Salil P. Vadhan
1998
conf/eurocrypt
Luby-Rackoff Backwards: Increasing Security by Making Block Ciphers Non-invertible.
Mihir Bellare
Ted Krovetz
Phillip Rogaway
1998
conf/eurocrypt
Fast Batch Verification for Modular Exponentiation and Digital Signatures.
Mihir Bellare
Juan A. Garay
Tal Rabin
1997
conf/ccs
Verifiable Partial Key Escrow.
Mihir Bellare
Shafi Goldwasser
1997
conf/crypto
"Pseudo-Random" Number Generation Within Cryptographic Algorithms: The DDS Case.
Mihir Bellare
Shafi Goldwasser
Daniele Micciancio
1997
conf/crypto
Collision-Resistant Hashing: Towards Making UOWHFs Practical.
Mihir Bellare
Phillip Rogaway
1997
conf/icics
Minimizing the use of random oracles in authenticated encryption schemes.
Mihir Bellare
Phillip Rogaway
1997
conf/eurocrypt
A New Paradigm for Collision-Free Hashing: Incrementality at Reduced Cost.
Mihir Bellare
Daniele Micciancio
1997
conf/eurocrypt
Round-Optimal Zero-Knowledge Arguments Based on any One-Way Function.
Mihir Bellare
Markus Jakobsson
Moti Yung
1996
journals/joc
Certifying Permutations: Noninteractive Zero-Knowledge Based on Any Trapdoor Permutation.
Mihir Bellare
Moti Yung
1996
conf/crypto
Keying Hash Functions for Message Authentication.
Mihir Bellare
Ran Canetti
Hugo Krawczyk
1996
conf/eurocrypt
The Exact Security of Digital Signatures - HOw to Sign with RSA and Rabin.
Mihir Bellare
Phillip Rogaway
1995
conf/crypto
XOR MACs: New Methods for Message Authentication Using Finite Pseudorandom Functions.
Mihir Bellare
Roch Guérin
Phillip Rogaway
1994
conf/crypto
The Security of Cipher Block Chaining.
Mihir Bellare
Joe Kilian
Phillip Rogaway
1994
conf/crypto
Incremental Cryptography: The Case of Hashing and Signing.
Mihir Bellare
Oded Goldreich
Shafi Goldwasser
1994
conf/eurocrypt
Optimal Asymmetric Encryption.
Mihir Bellare
Phillip Rogaway
1993
conf/ccs
Random Oracles are Practical: A Paradigm for Designing Efficient Protocols.
Mihir Bellare
Phillip Rogaway
1993
conf/crypto
Entity Authentication and Key Distribution.
Mihir Bellare
Phillip Rogaway
1992
conf/crypto
On Defining Proofs of Knowledge.
Mihir Bellare
Oded Goldreich
1992
conf/crypto
Certifying Cryptographic Tools: The Case of Trapdoor Permutations.
Mihir Bellare
Moti Yung
1989
conf/crypto
On the Structure of Secret Key Exchange Protocols.
Mihir Bellare
Lenore Cowen
Shafi Goldwasser
1989
conf/crypto
Non-Interactive Oblivious Transfer and Applications.
Mihir Bellare
Silvio Micali
1989
conf/crypto
New Paradigms for Digital Signatures and Message Authentication Based on Non-Interative Zero Knowledge Proofs.
Mihir Bellare
Shafi Goldwasser
1988
conf/crypto
How To Sign Given Any Trapdoor Function.
Mihir Bellare
Silvio Micali
Coauthors
Adam O'Neill
(4)
Adriana Palacio
(5)
Alessandra Scafuro
(1)
Alexander Vardy
(1)
Alexandra Boldyreva
(8)
Ali Aldakheel
(1)
Amit Sahai
(2)
Anand Desai
(2)
Anna Lysyanskaya
(1)
Asha Camper Singh
(1)
Benedikt Auerbach
(1)
Bennet S. Yee
(1)
Bertram Poettering
(2)
Björn Tackmann
(3)
Bogdan Warinschi
(1)
Brent Waters
(4)
Chanathip Namprempre
(10)
Chelsea Komlo
(1)
Chenzhi Zhu
(1)
Chong Zhang
(1)
Chris Peikert
(1)
Daniel J. Bernstein
(1)
Daniel Kane
(2)
Daniele Micciancio
(3)
Dario Catalano
(2)
David A. Wagner
(1)
David Cash
(4)
David Pointcheval
(5)
Dennis Hofheinz
(2)
Doreen Riepel
(4)
Douglas Stebila
(2)
Eike Kiltz
(5)
Elizabeth C. Crites
(1)
Felix Günther
(2)
Georg Fuchsbauer
(2)
Gil Segev
(1)
Giovanni Di Crescenzo
(1)
Gregory Neven
(9)
Haixia Shi
(3)
Hannah Davis
(2)
Hovav Shacham
(1)
Hugo Krawczyk
(2)
Igors Stepanovs
(7)
Jee Hea An
(3)
Jessica Staddon
(1)
Joe Kilian
(1)
John Black
(1)
John Malone-Lee
(2)
Joseph Jaeger
(3)
Juan A. Garay
(1)
Julia Len
(1)
Kenneth G. Paterson
(2)
Krzysztof Pietrzak
(1)
Lars R. Knudsen
(2)
Laura Shea
(3)
Lenore Cowen
(1)
Lucy Li
(1)
Marc Fischlin
(2)
Markus Jakobsson
(1)
Mary Maller
(1)
Matilda Backendal
(1)
Matteo Scarlata
(1)
Maya Nyayapati
(1)
Michael Semanko
(2)
Michel Abdalla
(7)
Mihir Bellare
(151)
Mira Belenkiy
(1)
Moni Naor
(1)
Moti Yung
(3)
Oded Goldreich
(3)
Pascal Paillier
(2)
Phillip Rogaway
(26)
Rachel Miller
(1)
Rafael Dowsley
(2)
Ramarathnam Venkatesan
(1)
Ran Canetti
(1)
Rishabh Ranjan
(1)
Roch Guérin
(1)
Ronald L. Rivest
(1)
Ruth Ng
(1)
Salil P. Vadhan
(1)
Sara K. Miner
(1)
Sarah Meiklejohn
(1)
Sarah Shoup
(1)
Scott Yilek
(4)
Shafi Goldwasser
(6)
Shai Halevi
(1)
Shanshan Duan
(1)
Silvio Micali
(4)
Sriram Keelveedhi
(9)
Stefano Tessaro
(8)
Susan Thomson
(2)
Tadayoshi Kohno
(6)
Tal Rabin
(1)
Tanja Lange
(2)
Ted Krovetz
(2)
Thomas Ristenpart
(8)
Till Stegers
(1)
Todor Ristov
(2)
Tolga Acar
(1)
Victor Shoup
(1)
Viet Tung Hoang
(11)
Wei Dai
(4)
William Aiello
(1)
Yizhao Zhang
(1)
Zijing Di
(1)
Zvika Brakerski
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to