Mihir Bellare

Results: 34



#Item
11On Chromatic Sums and Distributed Resource Allocation Amotz Bar-Noy∗ Mihir Bellare† Hadas Shachnai§

On Chromatic Sums and Distributed Resource Allocation Amotz Bar-Noy∗ Mihir Bellare† Hadas Shachnai§

Add to Reading List

Source URL: www.cs.technion.ac.il

Language: English - Date: 2013-04-15 10:45:37
12Improved Security Analyses for CBC MACs Mihir Bellare University of California, San Diego Krzysztof Pietrzak ETH Z¨urich Phillip Rogaway

Improved Security Analyses for CBC MACs Mihir Bellare University of California, San Diego Krzysztof Pietrzak ETH Z¨urich Phillip Rogaway

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2005-08-31 11:29:11
13Sponge based CCA2 secure asymmetric encryption for arbitrary length message Tarun Kumar Bansal Donghoon Chang Somitra Kumar Sanadhya Indraprastha Institute of Information Technology, Delhi (IIIT-D), India

Sponge based CCA2 secure asymmetric encryption for arbitrary length message Tarun Kumar Bansal Donghoon Chang Somitra Kumar Sanadhya Indraprastha Institute of Information Technology, Delhi (IIIT-D), India

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-19 14:57:29
14How	
  Secure	
  is	
  Determinis0c	
  Encryp0on?	
    Mihir	
  Bellare	
   Rafael	
  Dowsley	
   Sriram	
  Keelveedhi	
  	
   	
  

How  Secure  is  Determinis0c  Encryp0on?   Mihir  Bellare   Rafael  Dowsley   Sriram  Keelveedhi      

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2015-04-09 10:28:09
15SYMMETRIC ENCRYPTION  Mihir Bellare UCSD

SYMMETRIC ENCRYPTION Mihir Bellare UCSD

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2015-04-22 17:34:42
16Abstract appearing in Proceedings of the 27th ACM Symposium on the Theory of Computing, MayIncremental Cryptography and Application to Virus Protection Mihir Bellare∗

Abstract appearing in Proceedings of the 27th ACM Symposium on the Theory of Computing, MayIncremental Cryptography and Application to Virus Protection Mihir Bellare∗

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2004-08-02 17:51:17
17AUTHENTICATED ENCRYPTION  Mihir Bellare UCSD

AUTHENTICATED ENCRYPTION Mihir Bellare UCSD

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2015-03-29 23:38:04
18HASH FUNCTIONS  Mihir Bellare UCSD

HASH FUNCTIONS Mihir Bellare UCSD

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2015-03-29 15:51:13
    19BLOCK CIPHERS  Mihir Bellare UCSD

    BLOCK CIPHERS Mihir Bellare UCSD

    Add to Reading List

    Source URL: cseweb.ucsd.edu

    Language: English - Date: 2015-04-02 14:28:56
    20Course Information  CSE 207 — Modern Cryptography Instructor: Mihir Bellare Website: http://cseweb.ucsd.edu/~mihir/cse207

    Course Information CSE 207 — Modern Cryptography Instructor: Mihir Bellare Website: http://cseweb.ucsd.edu/~mihir/cse207

    Add to Reading List

    Source URL: cseweb.ucsd.edu

    Language: English - Date: 2014-03-29 12:23:51