Bellare

Results: 43



#Item
11Expander graph / Random walk / Adjacency matrix / Expected value / Mathematics / Algebraic graph theory / Stochastic processes

Addendum to the paper \Randomness in Interactive Proofs" Mihir Bellare Oded Goldreichy

Add to Reading List

Source URL: www.wisdom.weizmann.ac.il

Language: English - Date: 2014-06-22 06:24:28
12Complexity classes / Probabilistic complexity theory / Quantum complexity theory / Analysis of algorithms / Randomized algorithm / PP / NP / P / Theoretical computer science / Computational complexity theory / Applied mathematics

Uniform Generation of NP-witnesses using an NP-oracle Mihir Bellare Oded Goldreichy

Add to Reading List

Source URL: www.wisdom.weizmann.ac.il

Language: English - Date: 2014-06-22 06:24:53
13Graph coloring / NP-complete problems / Edge coloring / Independent set / Matching / Maximal independent set / Interval graph / Bipartite graph / Domatic number / Graph theory / Mathematics / Theoretical computer science

On Chromatic Sums and Distributed Resource Allocation Amotz Bar-Noy∗ Mihir Bellare† Hadas Shachnai§

Add to Reading List

Source URL: www.cs.technion.ac.il

Language: English - Date: 2013-04-15 10:45:37
14Mathematics / FO / Finite model theory / Pi

Improved Security Analyses for CBC MACs Mihir Bellare University of California, San Diego Krzysztof Pietrzak ETH Z¨urich Phillip Rogaway

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2005-08-31 11:29:11
15One-way function / Padding / Random oracle / Key encapsulation / Malleability / Feistel cipher / Chosen-ciphertext attack / Mihir Bellare / RSA / Cryptography / Optimal asymmetric encryption padding / Adaptive chosen-ciphertext attack

Sponge based CCA2 secure asymmetric encryption for arbitrary length message Tarun Kumar Bansal Donghoon Chang Somitra Kumar Sanadhya Indraprastha Institute of Information Technology, Delhi (IIIT-D), India

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-19 14:57:29
16Cryptography / Ciphertext indistinguishability

How  Secure  is  Determinis0c  Encryp0on?   Mihir  Bellare   Rafael  Dowsley   Sriram  Keelveedhi      

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2015-04-09 10:28:09
17Block cipher / Ciphertext / Format-preserving encryption / Cryptography / Mihir Bellare / Block cipher modes of operation

SYMMETRIC ENCRYPTION Mihir Bellare UCSD

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2015-04-22 17:34:42
18Message authentication codes / Digital signature / Cryptographic hash function / Cryptographic primitive / RSA / Key / Probabilistic encryption / Block cipher / Galois/Counter Mode / Cryptography / Public-key cryptography / Key management

Abstract appearing in Proceedings of the 27th ACM Symposium on the Theory of Computing, MayIncremental Cryptography and Application to Virus Protection Mihir Bellare∗

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2004-08-02 17:51:17
19Advantage / Ciphertext indistinguishability / RSA / EAX mode / Cryptography / Authenticated encryption / Mihir Bellare

AUTHENTICATED ENCRYPTION Mihir Bellare UCSD

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2015-03-29 23:38:04
20Mihir Bellare

HASH FUNCTIONS Mihir Bellare UCSD

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2015-03-29 15:51:13
    UPDATE