dblp.uni-trier.dewww.uni-trier.de

Mihir Bellare Vis

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo
Home Page

*2009
129EEMihir Bellare, Shanshan Duan, Adriana Palacio: Key Insulation and Intrusion Resilience over a Public Channel. CT-RSA 2009: 84-99
128EEMihir Bellare, Dennis Hofheinz, Scott Yilek: Possibility and Impossibility Results for Encryption and Commitment Secure under Selective Opening. EUROCRYPT 2009: 1-35
127EEMihir Bellare, Thomas Ristenpart: Simulation without the Artificial Abort: Simplified Proof and Improved Concrete Security for Waters' IBE Scheme. EUROCRYPT 2009: 407-424
126EEMihir Bellare, Chanathip Namprempre, Gregory Neven: Security Proofs for Identity-Based Identification and Signature Schemes. J. Cryptology 22(1): 1-61 (2009)
2008
125EEMihir Bellare, Todor Ristov: Hash Functions from Sigma Protocols and Improvements to VSH. ASIACRYPT 2008: 125-142
124EEMihir Bellare, Marc Fischlin, Adam O'Neill, Thomas Ristenpart: Deterministic Encryption: Definitional Equivalences and Constructions without Random Oracles. CRYPTO 2008: 360-378
123EEMichel Abdalla, Jee Hea An, Mihir Bellare, Chanathip Namprempre: From Identification to Signatures Via the Fiat-Shamir Transform: Necessary and Sufficient Conditions for Security and Forward-Security. IEEE Transactions on Information Theory 54(8): 3631-3646 (2008)
122EEMichel Abdalla, Mihir Bellare, Dario Catalano, Eike Kiltz, Tadayoshi Kohno, Tanja Lange, John Malone-Lee, Gregory Neven, Pascal Paillier, Haixia Shi: Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions. J. Cryptology 21(3): 350-391 (2008)
121EEMihir Bellare, Chanathip Namprempre: Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm. J. Cryptology 21(4): 469-491 (2008)
2007
120EEPhillip Rogaway, Mihir Bellare: Robust computational secret sharing and a unified account of classical secret-sharing goals. ACM Conference on Computer and Communications Security 2007: 172-184
119EEMihir Bellare, Alexandra Boldyreva, Adam O'Neill: Deterministic and Efficiently Searchable Encryption. CRYPTO 2007: 535-552
118EEMihir Bellare, Gregory Neven: Identity-Based Multi-signatures from RSA. CT-RSA 2007: 145-162
117EEMihir Bellare, Thomas Ristenpart: Hash Functions in the Dedicated-Key Setting: Design Choices and MPP Transforms. ICALP 2007: 399-410
116EEMihir Bellare, Chanathip Namprempre, Gregory Neven: Unrestricted Aggregate Signatures. ICALP 2007: 411-422
115EEMihir Bellare, Sarah Shoup: Two-Tier Signatures, Strongly Unforgeable Signatures, and Fiat-Shamir Without Random Oracles. Public Key Cryptography 2007: 201-216
114EEMihir Bellare, Alexandra Boldyreva, K. Kurosawa, Jessica Staddon: Multirecipient Encryption Schemes: How to Save on Bandwidth and Computation Without Sacrificing Security. IEEE Transactions on Information Theory 53(11): 3927-3943 (2007)
2006
113EEMihir Bellare, Tadayoshi Kohno, Victor Shoup: Stateful public-key cryptosystems: how to encrypt with one 160-bit exponentiation. ACM Conference on Computer and Communications Security 2006: 380-389
112EEMihir Bellare, Gregory Neven: Multi-signatures in the plain public-Key model and a general forking lemma. ACM Conference on Computer and Communications Security 2006: 390-399
111EEMihir Bellare, Thomas Ristenpart: Multi-Property-Preserving Hash Domain Extension and the EMD Transform. ASIACRYPT 2006: 299-314
110EEMihir Bellare: New Proofs for. CRYPTO 2006: 602-619
109EEMihir Bellare, Phillip Rogaway: The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs. EUROCRYPT 2006: 409-426
108EEMihir Bellare, Adriana Palacio: Protecting against key-exposure: strongly key-insulated encryption with optimal threshold. Appl. Algebra Eng. Commun. Comput. 16(6): 379-396 (2006)
107EEMihir Bellare, Oded Goldreich: On Probabilistic versus Deterministic Provers in the Definition of Proofs Of Knowledge. Electronic Colloquium on Computational Complexity (ECCC) 13(136): (2006)
2005
106EEMichel Abdalla, Mihir Bellare, Dario Catalano, Eike Kiltz, Tadayoshi Kohno, Tanja Lange, John Malone-Lee, Gregory Neven, Pascal Paillier, Haixia Shi: Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions. CRYPTO 2005: 205-222
105EEMihir Bellare, Krzysztof Pietrzak, Phillip Rogaway: Improved Security Analyses for CBC MACs. CRYPTO 2005: 527-545
104EEMihir Bellare, Haixia Shi, Chong Zhang: Foundations of Group Signatures: The Case of Dynamic Groups. CT-RSA 2005: 136-153
103EEMihir Bellare, Gregory Neven: Transitive signatures: new schemes and proofs. IEEE Transactions on Information Theory 51(6): 2133-2151 (2005)
2004
102EEMihir Bellare, Adriana Palacio: Towards Plaintext-Aware Public-Key Encryption Without Random Oracles. ASIACRYPT 2004: 48-62
101EEMihir Bellare, Adriana Palacio: The Knowledge-of-Exponent Assumptions and 3-Round Zero-Knowledge Protocols. CRYPTO 2004: 273-289
100EEMihir Bellare, Alexandra Boldyreva, Adriana Palacio: An Uninstantiable Random-Oracle-Model Scheme for a Hybrid-Encryption Problem. EUROCRYPT 2004: 171-188
99EEMihir Bellare, Chanathip Namprempre, Gregory Neven: Security Proofs for Identity-Based Identification and Signature Schemes. EUROCRYPT 2004: 268-286
98EEMihir Bellare, Tadayoshi Kohno: Hash Function Balance and Its Impact on Birthday Attacks. EUROCRYPT 2004: 401-418
97EEMihir Bellare, Phillip Rogaway, David Wagner: The EAX Mode of Operation. FSE 2004: 389-407
96EEMihir Bellare, Tadayoshi Kohno, Chanathip Namprempre: Breaking and provably repairing the SSH authenticated encryption scheme: A case study of the Encode-then-Encrypt-and-MAC paradigm. ACM Trans. Inf. Syst. Secur. 7(2): 206-241 (2004)
2003
95EEMihir Bellare, Bennet S. Yee: Forward-Security in Private-Key Cryptography. CT-RSA 2003: 1-18
94EEMihir Bellare, Tadayoshi Kohno: A Theoretical Treatment of Related-Key Attacks: RKA-PRPs, RKA-PRFs, and Applications. EUROCRYPT 2003: 491-506
93EEMihir Bellare, Daniele Micciancio, Bogdan Warinschi: Foundations of Group Signatures: Formal Definitions, Simplified Requirements, and a Construction Based on General Assumptions. EUROCRYPT 2003: 614-629
92EEMihir Bellare, Alexandra Boldyreva, Jessica Staddon: Randomness Re-use in Multi-recipient Encryption Schemeas. Public Key Cryptography 2003: 85-99
91EEPhillip Rogaway, Mihir Bellare, John Black: OCB: A block-cipher mode of operation for efficient authenticated encryption. ACM Trans. Inf. Syst. Secur. 6(3): 365-403 (2003)
90EEMihir Bellare, Chanathip Namprempre, David Pointcheval, Michael Semanko: The One-More-RSA-Inversion Problems and the Security of Chaum's Blind Signature Scheme. J. Cryptology 16(3): 185-215 (2003)
2002
89EEMihir Bellare, Tadayoshi Kohno, Chanathip Namprempre: Authenticated encryption in SSH: provably fixing the SSH binary packet protocol. ACM Conference on Computer and Communications Security 2002: 1-11
88EEMihir Bellare, Gregory Neven: Transitive Signatures Based on Factoring and RSA. ASIACRYPT 2002: 397-414
87EEMihir Bellare, Adriana Palacio: GQ and Schnorr Identification Schemes: Proofs of Security against Impersonation under Active and Concurrent Attacks. CRYPTO 2002: 162-177
86EEMichel Abdalla, Jee Hea An, Mihir Bellare, Chanathip Namprempre: From Identification to Signatures via the Fiat-Shamir Transform: Minimizing Assumptions for Security and Forward-Security. EUROCRYPT 2002: 418-433
85EEMihir Bellare: A Note on Negligible Functions. J. Cryptology 15(4): 271-284 (2002)
2001
84EEPhillip Rogaway, Mihir Bellare, John Black, Ted Krovetz: OCB: a block-cipher mode of operation for efficient authenticated encryption. ACM Conference on Computer and Communications Security 2001: 196-205
83EEMihir Bellare, Alexandra Boldyreva, Anand Desai, David Pointcheval: Key-Privacy in Public-Key Encryption. ASIACRYPT 2001: 566-582
82EEMihir Bellare, Alexandra Boldyreva, Lars R. Knudsen, Chanathip Namprempre: Online Ciphers and the Hash-CBC Construction. CRYPTO 2001: 292-309
81EEMichel Abdalla, Mihir Bellare, Phillip Rogaway: The Oracle Diffie-Hellman Assumptions and an Analysis of DHIES. CT-RSA 2001: 143-158
80EEMihir Bellare, Marc Fischlin, Shafi Goldwasser, Silvio Micali: Identification Protocols Secure against Reset Attacks. EUROCRYPT 2001: 495-511
79EEJee Hea An, Mihir Bellare: Does Encryption with Redundancy Provide Authenticity? EUROCRYPT 2001: 512-528
78EEMihir Bellare, Chanathip Namprempre, David Pointcheval, Michael Semanko: The Power of RSA Inversion Oracles and the Security of Chaum's RSA-Based Blind Signature Scheme. Financial Cryptography 2001: 309-328
2000
77 Mihir Bellare: Advances in Cryptology - CRYPTO 2000, 20th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2000, Proceedings Springer 2000
76EEMihir Bellare, Phillip Rogaway: Encode-Then-Encipher Encryption: How to Exploit Nonces or Redundancy in Plaintexts for Efficient Cryptography. ASIACRYPT 2000: 317-330
75EEMihir Bellare, Alexandra Boldyreva: The Security of Chaffing and Winnowing. ASIACRYPT 2000: 517-530
74EEMihir Bellare, Chanathip Namprempre: Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm. ASIACRYPT 2000: 531-545
73EEMichel Abdalla, Mihir Bellare: Increasing the Lifetime of a Key: A Comparative Analysis of the Security of Re-keying Techniques. ASIACRYPT 2000: 546-559
72EEMihir Bellare, David Pointcheval, Phillip Rogaway: Authenticated Key Exchange Secure against Dictionary Attacks. EUROCRYPT 2000: 139-155
71EEMihir Bellare, Alexandra Boldyreva, Silvio Micali: Public-Key Encryption in a Multi-user Setting: Security Proofs and Improvements. EUROCRYPT 2000: 259-274
70 Mihir Bellare, Oded Goldreich, Erez Petrank: Uniform Generation of NP-Witnesses Using an NP-Oracle. Inf. Comput. 163(2): 510-526 (2000)
69 Mihir Bellare, Joe Kilian, Phillip Rogaway: The Security of the Cipher Block Chaining Message Authentication Code. J. Comput. Syst. Sci. 61(3): 362-399 (2000)
1999
68EEJee Hea An, Mihir Bellare: Constructing VIL-MACsfrom FIL-MACs: Message Authentication under Weakened Assumptions. CRYPTO 1999: 252-269
67EEMihir Bellare, Oded Goldreich, Hugo Krawczyk: Stateless Evaluation of Pseudorandom Functions: Security beyond the Birthday Barrier. CRYPTO 1999: 270-287
66EEMihir Bellare, Sara K. Miner: A Forward-Secure Digital Signature Scheme. CRYPTO 1999: 431-448
65EEMihir Bellare, Amit Sahai: Non-malleable Encryption: Equivalence between Two Notions, and an Indistinguishability-Based Characterization. CRYPTO 1999: 519-536
64EEMihir Bellare, Phillip Rogaway: On the Construction of Variable-Input-Length Ciphers. FSE 1999: 231-244
63EEMihir Bellare, Ronald L. Rivest: Translucent Cryptography - An Alternative to Key Escrow, and Its Implementation via Fractional Oblivious Transfer. J. Cryptology 12(2): 117-139 (1999)
1998
62EEMihir Bellare, Anand Desai, David Pointcheval, Phillip Rogaway: Relations Among Notions of Security for Public-Key Encryption Schemes. CRYPTO 1998: 26-45
61EEMihir Bellare, Shai Halevi, Amit Sahai, Salil P. Vadhan: Many-to-One Trapdoor Functions and Their Ralation to Public-Key Cryptosystems. CRYPTO 1998: 283-298
60EEWilliam Aiello, Mihir Bellare, Giovanni Di Crescenzo, Ramarathnam Venkatesan: Security Amplification by Composition: The Case of Doubly-Iterated, Ideal Ciphers. CRYPTO 1998: 390-407
59EEMihir Bellare, Juan A. Garay, Tal Rabin: Fast Batch Verification for Modular Exponentiation and Digital Signatures. EUROCRYPT 1998: 236-250
58EEMihir Bellare, Ted Krovetz, Phillip Rogaway: Luby-Rackoff Backwards: Increasing Security by Making Block Ciphers Non-invertible. EUROCRYPT 1998: 266-280
57EEMihir Bellare, Juan A. Garay, Tal Rabin: Batch Verification with Applications to Cryptography and Checking. LATIN 1998: 170-191
56EEMihir Bellare: Practice-Oriented Provable Security. Lectures on Data Security 1998: 1-15
55EEMihir Bellare, Ran Canetti, Hugo Krawczyk: A Modular Approach to the Design and Analysis of Authentication and Key Exchange Protocols (Extended Abstract). STOC 1998: 419-428
54EEWilliam Aiello, Mihir Bellare, Giovanni Di Crescenzo, Ramarathnam Venkatesan: Security amplification by composition: The case of doubly-iterated ideal ciphers CoRR cs.CR/9809031: (1998)
53EEMihir Bellare, Oded Goldreich, Erez Petrank: Uniform Generation of NP-witnesses using an NP-oracle. Electronic Colloquium on Computational Complexity (ECCC) 5(32): (1998)
52 Amotz Bar-Noy, Mihir Bellare, Magnús M. Halldórsson, Hadas Shachnai, Tami Tamir: On Chromatic Sums and Distributed Resource Allocation. Inf. Comput. 140(2): 183-202 (1998)
51 Mihir Bellare, Oded Goldreich, Madhu Sudan: Free Bits, PCPs, and Nonapproximability-Towards Tight Results. SIAM J. Comput. 27(3): 804-915 (1998)
1997
50EEMihir Bellare, Shafi Goldwasser: Verifiable Partial Key Escrow. ACM Conference on Computer and Communications Security 1997: 78-91
49EEMihir Bellare, Shafi Goldwasser, Daniele Micciancio: "Pseudo-Random" Number Generation Within Cryptographic Algorithms: The DDS Case. CRYPTO 1997: 277-291
48EEMihir Bellare, Phillip Rogaway: Collision-Resistant Hashing: Towards Making UOWHFs Practical. CRYPTO 1997: 470-484
47EEMihir Bellare, Daniele Micciancio: A New Paradigm for Collision-Free Hashing: Incrementality at Reduced Cost. EUROCRYPT 1997: 163-192
46EEMihir Bellare, Markus Jakobsson, Moti Yung: Round-Optimal Zero-Knowledge Arguments Based on any One-Way Function. EUROCRYPT 1997: 280-305
45EEMihir Bellare, Russell Impagliazzo, Moni Naor: Does Parallel Repetition Lower the Error in Computationally Sound Protocols? FOCS 1997: 374-383
44EEMihir Bellare, Anand Desai, E. Jokipii, Phillip Rogaway: A Concrete Security Treatment of Symmetric Encryption. FOCS 1997: 394-403
43 Mihir Bellare, Phillip Rogaway: Minimizing the use of random oracles in authenticated encryption schemes. ICICS 1997: 1-16
42 Mihir Bellare: Practice-Oriented Provable-Security. ISW 1997: 221-231
1996
41EEMihir Bellare, Ran Canetti, Hugo Krawczyk: Keying Hash Functions for Message Authentication. CRYPTO 1996: 1-15
40EEMihir Bellare, Phillip Rogaway: The Exact Security of Digital Signatures - HOw to Sign with RSA and Rabin. EUROCRYPT 1996: 399-416
39 Mihir Bellare, Ran Canetti, Hugo Krawczyk: Pseudorandom Functions Revisited: The Cascade Construction and Its Concrete Security. FOCS 1996: 514-523
38 Mihir Bellare, Juan A. Garay, Tal Rabin: Distributed Pseudo-Random Bit Generators - A New Way to Speed-Up Shared Coin Tossing. PODC 1996: 191-200
37 Mihir Bellare, Don Coppersmith, Johan Håstad, Marcos A. Kiwi, Madhu Sudan: Linearity testing in characteristic two. IEEE Transactions on Information Theory 42(6): 1781-1795 (1996)
36 Mihir Bellare, Moti Yung: Certifying Permutations: Noninteractive Zero-Knowledge Based on Any Trapdoor Permutation. J. Cryptology 9(3): 149-166 (1996)
1995
35EEMihir Bellare, Roch Guérin, Phillip Rogaway: XOR MACs: New Methods for Message Authentication Using Finite Pseudorandom Functions. CRYPTO 1995: 15-28
34 Mihir Bellare, Oded Goldreich, Madhu Sudan: Free Bits, PCPs and Non-Approximability - Towards Tight Results. FOCS 1995: 422-431
33 Mihir Bellare, Don Coppersmith, Johan Håstad, Marcos A. Kiwi, Madhu Sudan: Linearity Testing in Characteristic Two. FOCS 1995: 432-441
32 Mihir Bellare, Uriel Feige, Joe Kilian: On the Role of Shared Randomness in Two Prover Proof Systems. ISTCS 1995: 199-208
31EEMihir Bellare, Oded Goldreich, Shafi Goldwasser: Incremental cryptography and application to virus protection. STOC 1995: 45-56
30EEWilliam Aiello, Mihir Bellare, Ramarathnam Venkatesan: Knowledge on the average-perfect, statistical and logarithmic. STOC 1995: 469-478
29EEMihir Bellare, Phillip Rogaway: Provably secure session key distribution: the three party case. STOC 1995: 57-66
28EEMihir Bellare, Oded Goldreich, Madhu Sudan: Free Bits, PCP and Non-Approximability - Towards Tight Results Electronic Colloquium on Computational Complexity (ECCC) 2(24): (1995)
27 Mihir Bellare, Phillip Rogaway: The complexity of approximating a nonlinear program. Math. Program. 69: 429-441 (1995)
1994
26EEMihir Bellare, Oded Goldreich, Shafi Goldwasser: Incremental Cryptography: The Case of Hashing and Signing. CRYPTO 1994: 216-233
25EEMihir Bellare, Joe Kilian, Phillip Rogaway: The Security of Cipher Block Chaining. CRYPTO 1994: 341-358
24EEMihir Bellare, Phillip Rogaway: Optimal Asymmetric Encryption. EUROCRYPT 1994: 92-111
23 Mihir Bellare, John Rompel: Randomness-Efficient Oblivious Sampling FOCS 1994: 276-287
22EEMihir Bellare, Madhu Sudan: Improved non-approximability results. STOC 1994: 184-193
21EEMihir Bellare, Shafi Goldwasser, Carsten Lund, Alexander Russell: Efficient probabilistic checkable proofs and applications to approximation. STOC 1994: 820
20 Mihir Bellare, Shafi Goldwasser: The Complexity of Decision Versus Search. SIAM J. Comput. 23(1): 97-119 (1994)
1993
19EEMihir Bellare, Phillip Rogaway: Random Oracles are Practical: A Paradigm for Designing Efficient Protocols. ACM Conference on Computer and Communications Security 1993: 62-73
18EEMihir Bellare, Phillip Rogaway: Entity Authentication and Key Distribution. CRYPTO 1993: 232-249
17 Mihir Bellare: Interactive Proofs and Approximation: Reduction from Two Provers in One Round. ISTCS 1993: 266-274
16EEMihir Bellare, Shafi Goldwasser, Carsten Lund, A. Russeli: Efficient probabilistically checkable proofs and applications to approximations. STOC 1993: 294-304
15 Mihir Bellare, Oded Goldreich, Shafi Goldwasser: Randomness in Interactive Proofs. Computational Complexity 3: 319-354 (1993)
1992
14EEMihir Bellare: A Technique for Upper Bounding the Spectral Norm with Applications to Learning. COLT 1992: 62-70
13EEMihir Bellare, Oded Goldreich: On Defining Proofs of Knowledge. CRYPTO 1992: 390-420
12EEMihir Bellare, Moti Yung: Certifying Cryptographic Tools: The Case of Trapdoor Permutations. CRYPTO 1992: 442-460
11 Mihir Bellare, Erez Petrank: Making Zero-Knowledge Provers Efficient STOC 1992: 711-722
10EEMihir Bellare, Silvio Micali: How to Sign Given Any Trapdoor Permutation. J. ACM 39(1): 214-233 (1992)
1991
9 Richard Beigel, Mihir Bellare, Joan Feigenbaum, Shafi Goldwasser: Languages that Are Easier than their Proofs FOCS 1991: 19-28
1990
8 Mihir Bellare, Oded Goldreich, Shafi Goldwasser: Randomness in Interactive Proofs FOCS 1990: 563-572
7 Mihir Bellare, Silvio Micali, Rafail Ostrovsky: Perfect Zero-Knowledge in Constant Rounds STOC 1990: 482-493
6 Mihir Bellare, Silvio Micali, Rafail Ostrovsky: The (True) Complexity of Statistical Zero Knowledge STOC 1990: 494-502
1989
5EEMihir Bellare, Shafi Goldwasser: New Paradigms for Digital Signatures and Message Authentication Based on Non-Interative Zero Knowledge Proofs. CRYPTO 1989: 194-211
4EEMihir Bellare, Silvio Micali: Non-Interactive Oblivious Transfer and Spplications. CRYPTO 1989: 547-557
3EEMihir Bellare, Lenore Cowen, Shafi Goldwasser: On the Structure of Secret Key Exchange Protocols. CRYPTO 1989: 604-605
1988
2EEMihir Bellare, Silvio Micali: How To Sign Given Any Trapdoor Function. CRYPTO 1988: 200-215
1 Mihir Bellare, Silvio Micali: How to Sign Given Any Trapdoor Function (Extended Abstract) STOC 1988: 32-42

Coauthor Index

1Michel Abdalla [73] [81] [86] [106] [122] [123]
2William Aiello [30] [54] [60]
3Jee Hea An [68] [79] [86] [123]
4Amotz Bar-Noy [52]
5Richard Beigel [9]
6John Black [84] [91]
7Alexandra Boldyreva [71] [75] [82] [83] [92] [100] [114] [119]
8Ran Canetti [39] [41] [55]
9Dario Catalano [106] [122]
10Don Coppersmith [33] [37]
11Lenore Cowen [3]
12Giovanni Di Crescenzo [54] [60]
13Anand Desai [44] [62] [83]
14Shanshan Duan [129]
15Uriel Feige [32]
16Joan Feigenbaum [9]
17Marc Fischlin [80] [124]
18Juan A. Garay [38] [57] [59]
19Oded Goldreich [8] [13] [15] [26] [28] [31] [34] [51] [53] [67] [70] [107]
20Shafi Goldwasser [3] [5] [8] [9] [15] [16] [20] [21] [26] [31] [49] [50] [80]
21Roch Guérin [35]
22Shai Halevi [61]
23Magnús M. Halldórsson [52]
24Johan Håstad [33] [37]
25Dennis Hofheinz [128]
26Russell Impagliazzo [45]
27Markus Jakobsson [46]
28E. Jokipii [44]
29Joe Kilian [25] [32] [69]
30Eike Kiltz [106] [122]
31Marcos A. Kiwi [33] [37]
32Lars R. Knudsen [82]
33Tadayoshi Kohno [89] [94] [96] [98] [106] [113] [122]
34Hugo Krawczyk [39] [41] [55] [67]
35Ted Krovetz [58] [84]
36K. Kurosawa [114]
37Tanja Lange [106] [122]
38Carsten Lund [16] [21]
39John Malone-Lee [106] [122]
40Silvio Micali [1] [2] [4] [6] [7] [10] [71] [80]
41Daniele Micciancio [47] [49] [93]
42Sara K. Miner [66]
43Chanathip Namprempre [74] [78] [82] [86] [89] [90] [96] [99] [116] [121] [123] [126]
44Moni Naor [45]
45Gregory Neven [88] [99] [103] [106] [112] [116] [118] [122] [126]
46Adam O'Neill [119] [124]
47Rafail Ostrovsky [6] [7]
48Pascal Paillier [106] [122]
49Adriana Palacio [87] [100] [101] [102] [108] [129]
50Erez Petrank [11] [53] [70]
51Krzysztof Pietrzak [105]
52David Pointcheval [62] [72] [78] [83] [90]
53Tal Rabin [38] [57] [59]
54Thomas Ristenpart [111] [117] [124] [127]
55Todor Ristov [125]
56Ronald L. Rivest [63]
57Phillip Rogaway [18] [19] [24] [25] [27] [29] [35] [40] [43] [44] [48] [58] [62] [64] [69] [72] [76] [81] [84] [91] [97] [105] [109] [120]
58John Rompel [23]
59A. Russeli [16]
60Alexander Russell [21]
61Amit Sahai [61] [65]
62Michael Semanko [78] [90]
63Hadas Shachnai [52]
64Haixia Shi [104] [106] [122]
65Sarah Shoup [115]
66Victor Shoup [113]
67Jessica Staddon [92] [114]
68Madhu Sudan [22] [28] [33] [34] [37] [51]
69Tami Tamir [52]
70Salil P. Vadhan [61]
71Ramarathnam Venkatesan [30] [54] [60]
72David Wagner [97]
73Bogdan Warinschi [93]
74Bennet S. Yee [95]
75Scott Yilek [128]
76Moti Yung (Mordechai M. Yung) [12] [36] [46]
77Chong Zhang [104]

Colors in the list of coauthors

Copyright © Tue Nov 3 08:52:44 2009 by Michael Ley (ley@uni-trier.de)