2023 - Research.com Computer Science in United States Leader Award
2013 - ACM Fellow For contributions to provable security methods supporting high-quality, cost-effective cryptography.
2009 - ACM Paris Kanellakis Theory and Practice Award For their development of the field of Practice-Oriented Provable-Security and its widespread impact on the theory and practice of cryptography and security.
His Geometry research is linked to Mathematical proof and Signature (topology). In his research, Mihir Bellare undertakes multidisciplinary study on Mathematical proof and Geometry. His Computer security study frequently draws connections to other fields, such as Blind signature. With his scientific publications, his incorporates both Encryption and Computer network. Mihir Bellare performs integrative Computer network and Encryption research in his work. He conducts interdisciplinary study in the fields of Public-key cryptography and Plaintext through his works. Mihir Bellare performs multidisciplinary study in the fields of Plaintext and Ciphertext via his papers. He conducted interdisciplinary study in his works that combined Ciphertext and Probabilistic encryption. He combines Probabilistic encryption and Public-key cryptography in his research.
His studies link Key (lock) with Computer security. His research brings together the fields of Computer security and Key (lock). Mihir Bellare combines Theoretical computer science and Discrete mathematics in his research. He integrates Encryption with Ciphertext in his research. He carries out multidisciplinary research, doing studies in Cryptography and Public-key cryptography. Public-key cryptography and Cryptography are two areas of study in which Mihir Bellare engages in interdisciplinary work. He undertakes interdisciplinary study in the fields of Algorithm and Hash function through his works. Mihir Bellare integrates many fields in his works, including Hash function and Algorithm. His research on Mathematical analysis often connects related topics like Scheme (mathematics).
His study deals with a combination of Encryption and Signcryption. He performs integrative study on Computer security and Provable security in his works. In his research, he undertakes multidisciplinary study on Provable security and Public-key cryptography. He applies his multidisciplinary studies on Public-key cryptography and Signcryption in his research. Computer network connects with themes related to Cryptographic nonce in his study. His Cryptographic nonce study typically links adjacent topics like Encryption. His Mathematical analysis study frequently links to other fields, such as Scheme (mathematics). His research on Scheme (mathematics) often connects related topics like Mathematical analysis. While working in this field, he studies both Theoretical computer science and Discrete mathematics.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Random oracles are practical: a paradigm for designing efficient protocols
Mihir Bellare;Phillip Rogaway.
computer and communications security (1993)
HMAC: Keyed-Hashing for Message Authentication
H. Krawczyk;M. Bellare;R. Canetti.
RFC (1997)
Keying Hash Functions for Message Authentication
Mihir Bellare;Ran Canetti;Hugo Krawczyk.
international cryptology conference (1996)
Entity authentication and key distribution
Mihir Bellare;Phillip Rogaway.
international cryptology conference (1993)
Relations Among Notions of Security for Public-Key Encryption Schemes
Mihir Bellare;Anand Desai;David Pointcheval;David Pointcheval;Phillip Rogaway.
international cryptology conference (1998)
Authenticated Key Exchange Secure Against Dictionary Attacks.
Mihir Bellare;David Pointcheval;Phillip Rogaway.
IACR Cryptology ePrint Archive (2000)
The security of triple encryption and a framework for code-based game-playing proofs
Mihir Bellare;Phillip Rogaway.
Lecture Notes in Computer Science (2006)
Optimal asymmetric encryption
Mihir Bellare;Phillip Rogaway.
theory and application of cryptographic techniques (1994)
Authenticated key exchange secure against dictionary attacks
Mihir Bellare;David Pointcheval;Phillip Rogaway.
theory and application of cryptographic techniques (2000)
A concrete security treatment of symmetric encryption
M. Bellare;A. Desai;E. Jokipii;P. Rogaway.
foundations of computer science (1997)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below:
University of California, Davis
Cornell University
University of Washington
DFINITY
MIT
Weizmann Institute of Science
École Normale Supérieure
École Normale Supérieure
Ruhr University Bochum
The University of Texas at Austin
University of Basel
University of Limerick
City University of Hong Kong
University of Groningen
Brookings Institution
University of Florence
University of California, Berkeley
Queen's University Belfast
University of Ljubljana
University of Wisconsin–Madison
Leiden University Medical Center
University of Debrecen
Pacific Marine Environmental Laboratory
Harvard University
University of Turin
Princeton University