D-Index & Metrics Best Publications
Computer Science
USA
2023

D-Index & Metrics D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines.

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 109 Citations 66,448 299 World Ranking 138 National Ranking 87

Research.com Recognitions

Awards & Achievements

2023 - Research.com Computer Science in United States Leader Award

2013 - ACM Fellow For contributions to provable security methods supporting high-quality, cost-effective cryptography.

2009 - ACM Paris Kanellakis Theory and Practice Award For their development of the field of Practice-Oriented Provable-Security and its widespread impact on the theory and practice of cryptography and security.

Overview

What is he best known for?

The fields of study Mihir Bellare is best known for:

  • Cryptography
  • Public-key cryptography
  • Block cipher

His Geometry research is linked to Mathematical proof and Signature (topology). In his research, Mihir Bellare undertakes multidisciplinary study on Mathematical proof and Geometry. His Computer security study frequently draws connections to other fields, such as Blind signature. With his scientific publications, his incorporates both Encryption and Computer network. Mihir Bellare performs integrative Computer network and Encryption research in his work. He conducts interdisciplinary study in the fields of Public-key cryptography and Plaintext through his works. Mihir Bellare performs multidisciplinary study in the fields of Plaintext and Ciphertext via his papers. He conducted interdisciplinary study in his works that combined Ciphertext and Probabilistic encryption. He combines Probabilistic encryption and Public-key cryptography in his research.

His most cited work include:

  • Entity Authentication and Key Distribution (1342 citations)
  • Authenticated Key Exchange Secure against Dictionary Attacks (1139 citations)
  • Keying Hash Functions for Message Authentication (994 citations)

What are the main themes of his work throughout his whole career to date

His studies link Key (lock) with Computer security. His research brings together the fields of Computer security and Key (lock). Mihir Bellare combines Theoretical computer science and Discrete mathematics in his research. He integrates Encryption with Ciphertext in his research. He carries out multidisciplinary research, doing studies in Cryptography and Public-key cryptography. Public-key cryptography and Cryptography are two areas of study in which Mihir Bellare engages in interdisciplinary work. He undertakes interdisciplinary study in the fields of Algorithm and Hash function through his works. Mihir Bellare integrates many fields in his works, including Hash function and Algorithm. His research on Mathematical analysis often connects related topics like Scheme (mathematics).

Mihir Bellare most often published in these fields:

  • Computer security (82.25%)
  • Theoretical computer science (68.64%)
  • Encryption (53.25%)

What were the highlights of his more recent work (between 2018-2022)?

  • Encryption (66.67%)
  • Computer security (50.00%)
  • Computer network (50.00%)

In recent works Mihir Bellare was focusing on the following fields of study:

His study deals with a combination of Encryption and Signcryption. He performs integrative study on Computer security and Provable security in his works. In his research, he undertakes multidisciplinary study on Provable security and Public-key cryptography. He applies his multidisciplinary studies on Public-key cryptography and Signcryption in his research. Computer network connects with themes related to Cryptographic nonce in his study. His Cryptographic nonce study typically links adjacent topics like Encryption. His Mathematical analysis study frequently links to other fields, such as Scheme (mathematics). His research on Scheme (mathematics) often connects related topics like Mathematical analysis. While working in this field, he studies both Theoretical computer science and Discrete mathematics.

Between 2018 and 2022, his most popular works were:

  • Separate Your Domains: NIST PQC KEMs, Oracle Cloning and Read-Only Indifferentiability (14 citations)
  • Nonces Are Noticed: AEAD Revisited (13 citations)
  • The Multi-Base Discrete Logarithm Problem: Tight Reductions and Non-rewinding Proofs for Schnorr Identification and Signatures (13 citations)

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

Random oracles are practical: a paradigm for designing efficient protocols

Mihir Bellare;Phillip Rogaway.
computer and communications security (1993)

5912 Citations

HMAC: Keyed-Hashing for Message Authentication

H. Krawczyk;M. Bellare;R. Canetti.
RFC (1997)

3722 Citations

Keying Hash Functions for Message Authentication

Mihir Bellare;Ran Canetti;Hugo Krawczyk.
international cryptology conference (1996)

2335 Citations

Entity authentication and key distribution

Mihir Bellare;Phillip Rogaway.
international cryptology conference (1993)

2178 Citations

Relations Among Notions of Security for Public-Key Encryption Schemes

Mihir Bellare;Anand Desai;David Pointcheval;David Pointcheval;Phillip Rogaway.
international cryptology conference (1998)

2126 Citations

Authenticated Key Exchange Secure Against Dictionary Attacks.

Mihir Bellare;David Pointcheval;Phillip Rogaway.
IACR Cryptology ePrint Archive (2000)

1822 Citations

The security of triple encryption and a framework for code-based game-playing proofs

Mihir Bellare;Phillip Rogaway.
Lecture Notes in Computer Science (2006)

1691 Citations

Optimal asymmetric encryption

Mihir Bellare;Phillip Rogaway.
theory and application of cryptographic techniques (1994)

1689 Citations

Authenticated key exchange secure against dictionary attacks

Mihir Bellare;David Pointcheval;Phillip Rogaway.
theory and application of cryptographic techniques (2000)

1674 Citations

A concrete security treatment of symmetric encryption

M. Bellare;A. Desai;E. Jokipii;P. Rogaway.
foundations of computer science (1997)

1386 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Mihir Bellare

Willy Susilo

Willy Susilo

University of Wollongong

Publications: 190

David Pointcheval

David Pointcheval

École Normale Supérieure

Publications: 146

Yi Mu

Yi Mu

Fujian Normal University

Publications: 145

Moti Yung

Moti Yung

Columbia University

Publications: 113

Dan Boneh

Dan Boneh

Stanford University

Publications: 111

Jonathan Katz

Jonathan Katz

University of Maryland, College Park

Publications: 110

Bart Preneel

Bart Preneel

KU Leuven

Publications: 98

Benoît Libert

Benoît Libert

École Normale Supérieure de Lyon

Publications: 97

Zhenfu Cao

Zhenfu Cao

East China Normal University

Publications: 97

Gene Tsudik

Gene Tsudik

University of California, Irvine

Publications: 95

Ran Canetti

Ran Canetti

Boston University

Publications: 93

Yevgeniy Dodis

Yevgeniy Dodis

New York University

Publications: 92

Colin Boyd

Colin Boyd

Norwegian University of Science and Technology

Publications: 91

Oded Goldreich

Oded Goldreich

Weizmann Institute of Science

Publications: 91

Rafail Ostrovsky

Rafail Ostrovsky

University of California, Los Angeles

Publications: 89

Marc Fischlin

Marc Fischlin

Technical University of Darmstadt

Publications: 89

Trending Scientists

Malte Helmert

Malte Helmert

University of Basel

Liam J. Bannon

Liam J. Bannon

University of Limerick

Tommy W. S. Chow

Tommy W. S. Chow

City University of Hong Kong

Bart Nooteboom

Bart Nooteboom

University of Groningen

Barry Bosworth

Barry Bosworth

Brookings Institution

Romano Fantacci

Romano Fantacci

University of Florence

Charles W. Tobias

Charles W. Tobias

University of California, Berkeley

Chunfei Wu

Chunfei Wu

Queen's University Belfast

Albin Pintar

Albin Pintar

University of Ljubljana

F. J. Himpsel

F. J. Himpsel

University of Wisconsin–Madison

Aart G. Jochemsen

Aart G. Jochemsen

Leiden University Medical Center

Gareth J. Dyke

Gareth J. Dyke

University of Debrecen

Meghan F. Cronin

Meghan F. Cronin

Pacific Marine Environmental Laboratory

Henning Tiemeier

Henning Tiemeier

Harvard University

Giuseppe Costa

Giuseppe Costa

University of Turin

Jenny E. Greene

Jenny E. Greene

Princeton University

Something went wrong. Please try again later.