Random oracles are practical: A paradigm for designing efficient protocols M Bellare, P Rogaway Proceedings of the 1st ACM Conference on Computer and Communications …, 1993 | 6540 | 1993 |
HMAC: Keyed-hashing for message authentication H Krawczyk, M Bellare, R Canetti | 3547 | 1997 |
Keying hash functions for message authentication M Bellare, R Canetti, H Krawczyk Advances in Cryptology—CRYPTO’96: 16th Annual International Cryptology …, 1996 | 2520 | 1996 |
Entity authentication and key distribution M Bellare, P Rogaway Annual international cryptology conference, 232-249, 1993 | 2344 | 1993 |
Authenticated key exchange secure against dictionary attacks M Bellare, D Pointcheval, P Rogaway International conference on the theory and applications of cryptographic …, 2000 | 2007 | 2000 |
Optimal asymmetric encryption M Bellare, P Rogaway Advances in Cryptology—EUROCRYPT'94: Workshop on the Theory and Application …, 1995 | 1829 | 1995 |
Relations among notions of security for public-key encryption schemes M Bellare, A Desai, D Pointcheval, P Rogaway Advances in Cryptology—CRYPTO'98: 18th Annual International Cryptology …, 1998 | 1544 | 1998 |
A concrete security treatment of symmetric encryption M Bellare, A Desai, E Jokipii, P Rogaway Proceedings 38th Annual Symposium on Foundations of Computer Science, 394-403, 1997 | 1509 | 1997 |
The exact security of digital signatures-How to sign with RSA and Rabin M Bellare, P Rogaway International conference on the theory and applications of cryptographic …, 1996 | 1382 | 1996 |
Authenticated encryption: Relations among notions and analysis of the generic composition paradigm M Bellare, C Namprempre International Conference on the Theory and Application of Cryptology and …, 2000 | 1272 | 2000 |
Deterministic and efficiently searchable encryption M Bellare, A Boldyreva, A O’Neill Advances in Cryptology-CRYPTO 2007: 27th Annual International Cryptology …, 2007 | 1126 | 2007 |
OCB: A block-cipher mode of operation for efficient authenticated encryption P Rogaway, M Bellare, J Black ACM Transactions on Information and System Security (TISSEC) 6 (3), 365-403, 2003 | 1012 | 2003 |
Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions M Bellare, D Micciancio, B Warinschi Advances in Cryptology—EUROCRYPT 2003: International Conference on the …, 2003 | 1006 | 2003 |
A forward-secure digital signature scheme M Bellare, SK Miner Annual international cryptology conference, 431-448, 1999 | 984 | 1999 |
The security of triple encryption and a framework for code-based game-playing proofs M Bellare, P Rogaway Annual International Conference on the Theory and Applications of …, 2006 | 970 | 2006 |
Message-locked encryption and secure deduplication M Bellare, S Keelveedhi, T Ristenpart Annual international conference on the theory and applications of …, 2013 | 927 | 2013 |
{DupLESS}:{Server-Aided} encryption for deduplicated storage S Keelveedhi, M Bellare, T Ristenpart 22nd USENIX security symposium (USENIX security 13), 179-194, 2013 | 901 | 2013 |
Provably secure session key distribution: the three party case M Bellare, P Rogaway Proceedings of the twenty-seventh annual ACM symposium on Theory of …, 1995 | 851 | 1995 |
On defining proofs of knowledge M Bellare, O Goldreich Annual International Cryptology Conference, 390-420, 1992 | 827 | 1992 |
Multi-signatures in the plain public-key model and a general forking lemma M Bellare, G Neven Proceedings of the 13th ACM conference on Computer and communications …, 2006 | 819 | 2006 |