H-Index & Metrics Best Publications

H-Index & Metrics

Discipline name H-index Citations Publications World Ranking National Ranking
Computer Science D-index 105 Citations 63,606 212 World Ranking 114 National Ranking 71

Research.com Recognitions

Awards & Achievements

2013 - ACM Fellow For contributions to provable security methods supporting high-quality, cost-effective cryptography.

2009 - ACM Paris Kanellakis Theory and Practice Award For their development of the field of Practice-Oriented Provable-Security and its widespread impact on the theory and practice of cryptography and security.

Overview

What is he best known for?

The fields of study he is best known for:

  • Cryptography
  • Programming language
  • Algorithm

Mihir Bellare mainly focuses on Theoretical computer science, Computer security, Encryption, Cryptography and Public-key cryptography. Mihir Bellare has included themes like CBC-MAC, Triple DES, Provable security, Hash function and Message authentication code in his Theoretical computer science study. His research in Computer security intersects with topics in Scheme and Identification.

His Encryption research focuses on Adversary and how it relates to Ciphertext. Mihir Bellare has researched Cryptography in several fields, including Arithmetic, Schnorr signature, Authentication and Anonymity. His study on Random oracle and Symmetric-key algorithm is often connected to Security convergence as part of broader study in Public-key cryptography.

His most cited work include:

  • Random oracles are practical: a paradigm for designing efficient protocols (4108 citations)
  • Entity authentication and key distribution (1580 citations)
  • HMAC: Keyed-Hashing for Message Authentication (1572 citations)

What are the main themes of his work throughout his whole career to date?

His primary areas of study are Theoretical computer science, Computer security, Encryption, Cryptography and Random oracle. Mihir Bellare interconnects Scheme, Ciphertext, Key, Mathematical proof and Hash function in the investigation of issues within Theoretical computer science. The study incorporates disciplines such as Computer network and Identification in addition to Computer security.

His Adversary research extends to the thematically linked field of Encryption. His work deals with themes such as Digital signature and Public-key cryptography, which intersect with Cryptography. His Random oracle research is multidisciplinary, relying on both Signature, Identification scheme, Schnorr signature and Oracle.

He most often published in these fields:

  • Theoretical computer science (43.53%)
  • Computer security (35.26%)
  • Encryption (32.78%)

What were the highlights of his more recent work (between 2014-2021)?

  • Computer security (35.26%)
  • Theoretical computer science (43.53%)
  • Encryption (32.78%)

In recent papers he was focusing on the following fields of study:

His main research concerns Computer security, Theoretical computer science, Encryption, Random oracle and Symmetric-key algorithm. His work on Cryptographic nonce, Adversary and Certificate authority as part of general Computer security research is frequently linked to Randomness, bridging the gap between disciplines. Mihir Bellare incorporates Theoretical computer science and NIST in his research.

The various areas that Mihir Bellare examines in his Random oracle study include Deterministic encryption, Identification scheme, Identification, Hash function and On-the-fly encryption. His work on Collision resistance as part of general Hash function research is often related to Grey box, thus linking different fields of science. His research integrates issues of Stateless protocol, Substitution and Pseudorandom generator, Cryptography in his study of Symmetric-key algorithm.

Between 2014 and 2021, his most popular works were:

  • Interactive Message-Locked Encryption and Secure Deduplication (66 citations)
  • NIZKs with an Untrusted CRS: Security in the Face of Parameter Subversion (47 citations)
  • Mass-surveillance without the State: Strongly Undetectable Algorithm-Substitution Attacks (44 citations)

In his most recent research, the most cited papers focused on:

  • Cryptography
  • Programming language
  • Algorithm

Mihir Bellare focuses on Computer security, Encryption, Theoretical computer science, Random oracle and Symmetric-key algorithm. His study in the fields of Cryptographic nonce, Session key and Secure messaging under the domain of Computer security overlaps with other disciplines such as Subversion. His Encryption study combines topics in areas such as Adversary, Protocol and Cryptography.

The concepts of his Cryptography study are interwoven with issues in Attribute-based encryption and Client-side encryption. In his research, Mihir Bellare undertakes multidisciplinary study on Theoretical computer science and Meaning. His studies in Random oracle integrate themes in fields like Probabilistic encryption, 40-bit encryption, 56-bit encryption, On-the-fly encryption and Standard model.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

Random oracles are practical: a paradigm for designing efficient protocols

Mihir Bellare;Phillip Rogaway.
computer and communications security (1993)

5470 Citations

HMAC: Keyed-Hashing for Message Authentication

H. Krawczyk;M. Bellare;R. Canetti.
RFC (1997)

3239 Citations

Keying Hash Functions for Message Authentication

Mihir Bellare;Ran Canetti;Hugo Krawczyk.
international cryptology conference (1996)

2182 Citations

Entity authentication and key distribution

Mihir Bellare;Phillip Rogaway.
international cryptology conference (1993)

2040 Citations

Authenticated key exchange secure against dictionary attacks

Mihir Bellare;David Pointcheval;Phillip Rogaway.
theory and application of cryptographic techniques (2000)

1674 Citations

Optimal asymmetric encryption

Mihir Bellare;Phillip Rogaway.
theory and application of cryptographic techniques (1994)

1614 Citations

Relations Among Notions of Security for Public-Key Encryption Schemes

Mihir Bellare;Anand Desai;David Pointcheval;David Pointcheval;Phillip Rogaway.
international cryptology conference (1998)

1399 Citations

A concrete security treatment of symmetric encryption

M. Bellare;A. Desai;E. Jokipii;P. Rogaway.
foundations of computer science (1997)

1274 Citations

The exact security of digital signatures-how to sign with RSA and Rabin

Mihir Bellare;Phillip Rogaway.
theory and application of cryptographic techniques (1996)

1234 Citations

Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm

Mihir Bellare;Chanathip Namprempre.
international conference on the theory and application of cryptology and information security (2000)

1015 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Mihir Bellare

Willy Susilo

Willy Susilo

University of Wollongong

Publications: 190

David Pointcheval

David Pointcheval

École Normale Supérieure

Publications: 146

Yi Mu

Yi Mu

Fujian Normal University

Publications: 145

Moti Yung

Moti Yung

Columbia University

Publications: 113

Dan Boneh

Dan Boneh

Stanford University

Publications: 111

Jonathan Katz

Jonathan Katz

University of Maryland, College Park

Publications: 110

Bart Preneel

Bart Preneel

KU Leuven

Publications: 98

Benoît Libert

Benoît Libert

École Normale Supérieure de Lyon

Publications: 97

Zhenfu Cao

Zhenfu Cao

East China Normal University

Publications: 97

Gene Tsudik

Gene Tsudik

University of California, Irvine

Publications: 95

Ran Canetti

Ran Canetti

Boston University

Publications: 93

Yevgeniy Dodis

Yevgeniy Dodis

New York University

Publications: 92

Colin Boyd

Colin Boyd

Norwegian University of Science and Technology

Publications: 91

Oded Goldreich

Oded Goldreich

Weizmann Institute of Science

Publications: 91

Rafail Ostrovsky

Rafail Ostrovsky

University of California, Los Angeles

Publications: 89

Marc Fischlin

Marc Fischlin

TU Darmstadt

Publications: 89

Something went wrong. Please try again later.