Mihir Bellare

Results: 34



#Item
21COMPUTATIONAL NUMBER THEORY and ASYMMETRIC CRYPTOGRAPHY Mihir Bellare

COMPUTATIONAL NUMBER THEORY and ASYMMETRIC CRYPTOGRAPHY Mihir Bellare

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2015-05-03 20:58:58
22MESSAGE AUTHENTICATION CODES and PRF DOMAIN EXTENSION Mihir Bellare

MESSAGE AUTHENTICATION CODES and PRF DOMAIN EXTENSION Mihir Bellare

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2015-03-30 11:36:13
23ASYMMETRIC (PUBLIC-KEY) ENCRYPTION  Mihir Bellare UCSD

ASYMMETRIC (PUBLIC-KEY) ENCRYPTION Mihir Bellare UCSD

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2015-05-03 20:59:14
24PSEUDO-RANDOM FUNCTIONS  Mihir Bellare UCSD

PSEUDO-RANDOM FUNCTIONS Mihir Bellare UCSD

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2015-04-16 11:27:32
25The proceedings version of this paper appears in ACM CCSThis is the full version of that paper.  Robust Computational Secret Sharing and a Unified Account of Classical Secret-Sharing Goals Mihir Bellare∗

The proceedings version of this paper appears in ACM CCSThis is the full version of that paper. Robust Computational Secret Sharing and a Unified Account of Classical Secret-Sharing Goals Mihir Bellare∗

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-08-20 03:48:31
26Introduction to Modern Cryptography  Mihir Bellare1 Phillip Rogaway2

Introduction to Modern Cryptography Mihir Bellare1 Phillip Rogaway2

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2005-09-21 13:38:39
27Professor Ravi Sandhu University of Texas at San Antonio Executive Director and Founder, Institute for Cyber Security Lutcher Brown Endowed Chair in Cyber Security Professor of Computer Science, College of Sciences www.p

Professor Ravi Sandhu University of Texas at San Antonio Executive Director and Founder, Institute for Cyber Security Lutcher Brown Endowed Chair in Cyber Security Professor of Computer Science, College of Sciences www.p

Add to Reading List

Source URL: www.profsandhu.com

Language: English - Date: 2013-10-09 14:40:49
28LOSSY Identity-based (Lossy) Trapdoor Functions and Applications  Mihir Bellare, Eike Kiltz, Chris Peikert, Brent Waters

LOSSY Identity-based (Lossy) Trapdoor Functions and Applications Mihir Bellare, Eike Kiltz, Chris Peikert, Brent Waters

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2012-04-21 02:35:56
29DupLESS: Server-Aided Encryption for Deduplicated Storage∗ Mihir Bellare  Sriram Keelveedhi

DupLESS: Server-Aided Encryption for Deduplicated Storage∗ Mihir Bellare Sriram Keelveedhi

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-07-02 21:51:23
30Towards Plaintext-Aware Public-Key Encryption without Random Oracles Mihir Bellare and Adriana Palacio Dept. of Computer Science & Engineering, University of California, San Diego 9500 Gilman Drive, La Jolla, CA 92093, U

Towards Plaintext-Aware Public-Key Encryption without Random Oracles Mihir Bellare and Adriana Palacio Dept. of Computer Science & Engineering, University of California, San Diego 9500 Gilman Drive, La Jolla, CA 92093, U

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:54