Author pages are created from data sourced from our academic publisher partnerships and public sources.
- Publications
- Influence
Share This Author
Random oracles are practical: a paradigm for designing efficient protocols
- M. Bellare, P. Rogaway
- Computer Science, MathematicsCCS '93
- 1 December 1993
TLDR
Entity Authentication and Key Distribution
- M. Bellare, P. Rogaway
- Computer Science, MathematicsCRYPTO
- 22 August 1993
TLDR
Authenticated Key Exchange Secure against Dictionary Attacks
- M. Bellare, D. Pointcheval, P. Rogaway
- Computer Science, MathematicsEUROCRYPT
- 14 May 2000
TLDR
Relations among Notions of Security for Public-Key Encryption Schemes
- M. Bellare, Anand Desai, D. Pointcheval, P. Rogaway
- Computer Science, MathematicsIACR Cryptol. ePrint Arch.
- 23 August 1998
TLDR
OCB: a block-cipher mode of operation for efficient authenticated encryption
- P. Rogaway, M. Bellare, J. Black, Ted Krovetz
- Computer Science, MathematicsCCS '01
- 5 November 2001
TLDR
Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC
- P. Rogaway
- Computer Science, MathematicsASIACRYPT
- 5 December 2004
TLDR
A concrete security treatment of symmetric encryption
- M. Bellare, Anand Desai, E. Jokipii, P. Rogaway
- Computer Science, MathematicsProceedings 38th Annual Symposium on Foundations…
- 19 October 1997
TLDR
The Exact Security of Digital Signatures - HOw to Sign with RSA and Rabin
- M. Bellare, P. Rogaway
- Computer Science, MathematicsEUROCRYPT
- 12 May 1996
TLDR
Optimal Asymmetric Encryption
- M. Bellare, P. Rogaway
- Computer Science, MathematicsEUROCRYPT
- 9 May 1994
TLDR
Provably secure session key distribution: the three party case
- M. Bellare, P. Rogaway
- Computer Science, MathematicsSTOC '95
- 29 May 1995
TLDR
...
...