On-line Ciphers and the Hash-CBC Constructions
Bellare, M., Boldyreva, A., Knudsen, L., Namprempre, C.
Published in Journal of cryptology (01.10.2012)
Published in Journal of cryptology (01.10.2012)
Get full text
Journal Article
Design, implementation, and deployment of the iKP secure electronic payment system
Bellare, M., Garay, J.A., Hauser, R., Herzberg, A., Krawczyk, H., Steiner, M., Tsudik, G., Van Herreweghen, E., Waidner, M.
Published in IEEE journal on selected areas in communications (01.04.2000)
Published in IEEE journal on selected areas in communications (01.04.2000)
Get full text
Journal Article
Linearity testing in characteristic two
Bellare, M., Coppersmith, D., Hastad, J., Kiwi, M., Sudan, M.
Published in IEEE transactions on information theory (01.11.1996)
Published in IEEE transactions on information theory (01.11.1996)
Get full text
Journal Article
A concrete security treatment of symmetric encryption
Bellare, M., Desai, A., Jokipii, E., Rogaway, P.
Published in Annual Symposium on Foundations of Computer Science (1997)
Published in Annual Symposium on Foundations of Computer Science (1997)
Get full text
Conference Proceeding
Journal Article
The Security of the Cipher Block Chaining Message Authentication Code
Bellare, Mihir, Kilian, Joe, Rogaway, Phillip
Published in Journal of computer and system sciences (01.12.2000)
Published in Journal of computer and system sciences (01.12.2000)
Get full text
Journal Article
Randomness-efficient oblivious sampling
Bellare, M., Rompel, J.
Published in Proceedings 35th Annual Symposium on Foundations of Computer Science (1994)
Published in Proceedings 35th Annual Symposium on Foundations of Computer Science (1994)
Get full text
Conference Proceeding
Does parallel repetition lower the error in computationally sound protocols?
Bellare, M., Impagliazzo, R., Naor, M.
Published in Annual Symposium on Foundations of Computer Science (1997)
Published in Annual Symposium on Foundations of Computer Science (1997)
Get full text
Conference Proceeding
Journal Article
Pseudorandom functions revisited: the cascade construction and its concrete security
Bellare, M., Canetti, R., Krawczyk, H.
Published in Annual Symposium on Foundations of Computer Science (1996)
Published in Annual Symposium on Foundations of Computer Science (1996)
Get full text
Conference Proceeding
Journal Article
Free bits, PCPs and non-approximability-towards tight results
Bellare, M., Goldreich, O., Sudan, M.
Published in Annual Symposium on Foundations of Computer Science (1995)
Published in Annual Symposium on Foundations of Computer Science (1995)
Get full text
Conference Proceeding
Journal Article
On Chromatic Sums and Distributed Resource Allocation
Bar-Noy, Amotz, Bellare, Mihir, Halldórsson, Magnús M, Shachnai, Hadas, Tamir, Tami
Published in Information and computation (01.02.1998)
Published in Information and computation (01.02.1998)
Get full text
Journal Article
Uniform Generation of NP-Witnesses Using an NP-Oracle
Bellare, Mihir, Goldreich, Oded, Petrank, Erez
Published in Information and computation (01.12.2000)
Published in Information and computation (01.12.2000)
Get full text
Journal Article
Linearity testing in characteristic two
Bellare, M., Coppersmith, D., Hastad, J., Kiwi, M., Sudan, M.
Published in Annual Symposium on Foundations of Computer Science (1995)
Published in Annual Symposium on Foundations of Computer Science (1995)
Get full text
Conference Proceeding
Journal Article