Bellare

Results: 43



#Item
21Permutation / Mihir Bellare / Inverse function / Inverse / Function / Lucifer / Format-preserving encryption / Advantage / Cryptography / Mathematics / Block cipher

BLOCK CIPHERS Mihir Bellare UCSD

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2015-04-02 14:28:56
22Bitcoin / Adversary / Alice and Bob / Science / Computing / Mathematical sciences / Public-key cryptography / Cryptography / Cryptographic protocols / Encryption

Course Information CSE 207 — Modern Cryptography Instructor: Mihir Bellare Website: http://cseweb.ucsd.edu/~mihir/cse207

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2014-03-29 12:23:51
23Ciphertext indistinguishability / IP / Oracle Database / Oracle / Public-key cryptography / Random oracle / Cryptography / Advantage / Oracle machine

On Session Identifiers in Provably Secure Protocols The Bellare-Rogaway Three-Party Key Distribution Protocol Revisited⋆ Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock, and Greg Maitland

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-12-07 21:15:33
24Public-key cryptography / Diffie–Hellman key exchange / RSA / Mihir Bellare / XTR / SPEKE / Cryptography / Cryptographic protocols / Electronic commerce

COMPUTATIONAL NUMBER THEORY and ASYMMETRIC CRYPTOGRAPHY Mihir Bellare

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2015-05-03 20:58:58
25Advantage / Cryptography / Message authentication codes / Mihir Bellare

MESSAGE AUTHENTICATION CODES and PRF DOMAIN EXTENSION Mihir Bellare

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2015-03-30 11:36:13
26Advantage / Public-key cryptography / Key generation / Cryptography / Mihir Bellare / Ciphertext indistinguishability

ASYMMETRIC (PUBLIC-KEY) ENCRYPTION Mihir Bellare UCSD

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2015-05-03 20:59:14
27Mihir Bellare / Alan Turing / British people / English people / United Kingdom

PSEUDO-RANDOM FUNCTIONS Mihir Bellare UCSD

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2015-04-16 11:27:32
28Commitment scheme / Proactive secret sharing / Ciphertext indistinguishability / Adversary model / Advantage / Cryptography / Cryptographic protocols / Secret sharing

The proceedings version of this paper appears in ACM CCSThis is the full version of that paper. Robust Computational Secret Sharing and a Unified Account of Classical Secret-Sharing Goals Mihir Bellare∗

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-08-20 03:48:31
29Chiang Mai / Block cipher modes of operation / Concrete security / Message authentication codes / Cryptography / Mihir Bellare / Phillip Rogaway

Introduction to Modern Cryptography Mihir Bellare1 Phillip Rogaway2

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2005-09-21 13:38:39
30Lattice theory / Lattice-based access control / Role-based access control / Mihir Bellare / National Security Agency / Principal investigator / Public-key cryptography / PERMIS / Cryptography / Computer security / Security

Professor Ravi Sandhu University of Texas at San Antonio Executive Director and Founder, Institute for Cyber Security Lutcher Brown Endowed Chair in Cyber Security Professor of Computer Science, College of Sciences www.p

Add to Reading List

Source URL: www.profsandhu.com

Language: English - Date: 2013-10-09 14:40:49
UPDATE