Amanote Research
Register
Sign In
Discover open access scientific publications
Search, annotate, share and cite publications
Publications by Mihir Bellare
Key-Versatile Signatures and Applications: RKA, KDM and Joint Enc/Sig
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Standard Security Does Not Imply Security Against Selective-Opening
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Public-Key Encryption in a Multi-User Setting: Security Proofs and Improvements
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
GQ and Schnorr Identification Schemes: Proofs of Security Against Impersonation Under Active and Concurrent Attacks
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Hash Functions in the Dedicated-Key Setting: Design Choices and MPP Transforms
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Hash Function Balance and Its Impact on Birthday Attacks
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Key Insulation and Intrusion Resilience Over a Public Channel
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
An Uninstantiable Random-Oracle-Model Scheme for a Hybrid-Encryption Problem
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Deterministic Encryption: Definitional Equivalences and Constructions Without Random Oracles
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
1
2
›