Search results for: Mihir Bellare
Journal of Cryptology > 2018 > 31 > 2 > 307-350
Lecture Notes in Computer Science > Topics in Cryptology — CT-RSA 2001 > Reductions, Constructions and Security Proofs > 143-158
Lecture Notes in Computer Science > Advances in Cryptology - EUROCRYPT 2004 > Signatures II > 268-286
Lecture Notes in Computer Science > Advances in Cryptology - EUROCRYPT 2006 > Block Ciphers > 409-426
Lecture Notes in Computer Science > Advances in Cryptology — EUROCRYPT 2000 > Key Management Protocols > 139-155
Lecture Notes in Computer Science > Advances in Cryptology – CRYPTO 2008 > Public-Key Crypto II > 360-378
Lecture Notes in Computer Science > Advances in Cryptology — ASIACRYPT 2000 > Symmetric-Key Schemes II > 546-559
Lecture Notes in Computer Science > Advances in Cryptology — CRYPTO’ 99 > Signature Schemes > 431-448
Lecture Notes in Computer Science > Advances in Cryptology - EUROCRYPT 2009 > Security, Proofs and Models (2) > 407-424
Lecture Notes in Computer Science > Advances in Cryptology — ASIACRYPT 2000 > Symmetric-Key Schemes II > 531-545
Lecture Notes in Computer Science > Advances in Cryptology — EUROCRYPT 2001 > Authentication and Identification > 495-511
Lecture Notes in Computer Science > Advances in Cryptology - EUROCRYPT 2004 > Foundations I > 171-188
Lecture Notes in Computer Science > Advances in Cryptology — CRYPTO’ 89 Proceedings > Impromptu talks > 604-605