Author pages are created from data sourced from our academic publisher partnerships and public sources.
- Publications
- Influence
Share This Author
Random oracles are practical: a paradigm for designing efficient protocols
- M. Bellare, P. Rogaway
- Computer Science, MathematicsCCS '93
- 1 December 1993
TLDR
Entity Authentication and Key Distribution
- M. Bellare, P. Rogaway
- Computer Science, MathematicsCRYPTO
- 22 August 1993
TLDR
Keying Hash Functions for Message Authentication
- M. Bellare, R. Canetti, H. Krawczyk
- Computer Science, MathematicsCRYPTO
- 18 August 1996
TLDR
HMAC: Keyed-Hashing for Message Authentication
- H. Krawczyk, M. Bellare, R. Canetti
- Computer Science, MathematicsRFC
- 1 February 1997
This document describes HMAC, a mechanism for message authentication using cryptographic hash functions. HMAC can be used with any iterative cryptographic hash function, e.g., MD5, SHA-1, in…
Authenticated Key Exchange Secure against Dictionary Attacks
- M. Bellare, D. Pointcheval, P. Rogaway
- Computer Science, MathematicsEUROCRYPT
- 14 May 2000
TLDR
Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm
- M. Bellare, C. Namprempre
- Computer Science, MathematicsJournal of Cryptology
- 4 September 2008
TLDR
Relations among Notions of Security for Public-Key Encryption Schemes
- M. Bellare, Anand Desai, D. Pointcheval, P. Rogaway
- Computer Science, MathematicsIACR Cryptol. ePrint Arch.
- 23 August 1998
TLDR
DupLESS: Server-Aided Encryption for Deduplicated Storage
- S. Keelveedhi, M. Bellare, T. Ristenpart
- Computer ScienceUSENIX Security Symposium
- 14 August 2013
TLDR
Message-Locked Encryption and Secure Deduplication
- M. Bellare, S. Keelveedhi, T. Ristenpart
- Computer Science, MathematicsEUROCRYPT
- 26 May 2013
TLDR
OCB: a block-cipher mode of operation for efficient authenticated encryption
- P. Rogaway, M. Bellare, J. Black, Ted Krovetz
- Computer Science, MathematicsCCS '01
- 5 November 2001
TLDR
...
...