Bellare

Results: 43



#Item
1

Multi-Signatures in the Plain Public-Key Model and a General Forking Lemma Mihir Bellare Gregory Neven

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2007-03-07 03:55:29
    2

    A Preliminary version of this paper appeared in Proceedings of the 31st Annual IEEE Symposium on the Foundations of Computer Science, IEEERandomness in Interactive Proofs Mihir Bellare

    Add to Reading List

    Source URL: www.wisdom.weizmann.ac.il

    Language: English - Date: 2014-06-22 06:24:29
      3

      Improved Security Analyses for CBC MACs (preliminary full version) M. Bellare ∗ K. Pietrzak †

      Add to Reading List

      Source URL: web.cs.ucdavis.edu

      - Date: 2006-03-28 11:44:45
        4Cryptography / Secret sharing / Public-key cryptography / Proactive secret sharing / Commitment scheme / Ciphertext indistinguishability / Adversary model / Digital signature / Encryption / Information-theoretic security

        The proceedings version of this paper appears in ACM CCSThis is the full version of that paper. Robust Computational Secret Sharing and a Unified Account of Classical Secret-Sharing Goals Mihir Bellare∗

        Add to Reading List

        Source URL: web.cs.ucdavis.edu

        Language: English - Date: 2007-08-20 03:37:31
        5

        Composability of Bellare-Rogaway Key Exchange Protocols Christina Brzuska Marc Fischlin

        Add to Reading List

        Source URL: www.cs.bris.ac.uk

        Language: English - Date: 2011-11-01 07:56:00
          6

          Foundations of Group Signatures: Formal Definitions, Simplified Requirements, and a Construction Based on General Assumptions Mihir Bellare Daniele Micciancio

          Add to Reading List

          Source URL: www.cs.bris.ac.uk

          Language: English - Date: 2007-01-08 08:20:23
            7

            Policy-based signatures Georg Fuchsbauer IST Austria joint work with Mihir Bellare available on eprint

            Add to Reading List

            Source URL: www.di.ens.fr

            Language: English - Date: 2013-10-29 07:08:12
              8

              Verifiable Partial Key Escrow MIHIR BELLARE* SHAFI GOLDWASSER~ Abstract

              Add to Reading List

              Source URL: groups.csail.mit.edu

              Language: English - Date: 2003-04-15 15:57:55
                9

                Technical Report CS97-529, Department of Computer Science and Engineering, University of California at San Diego, MarchRevised MarchA Note on Negligible Functions Mihir Bellare∗ Dept. of Computer Science

                Add to Reading List

                Source URL: eprint.iacr.org

                - Date: 2002-03-01 13:12:41
                  10IP / Interactive proof system / Mathematics / Zero-knowledge proof / Soundness / Expected value / Non-interactive zero-knowledge proof / Information / Cryptographic protocols / Applied mathematics / Proof of knowledge

                  Proving Computational Ability Mihir Bellare Oded Goldreichy August 1992

                  Add to Reading List

                  Source URL: www.wisdom.weizmann.ac.il

                  Language: English - Date: 2014-06-22 06:28:46
                  UPDATE