Authenticated encryption: Relations among notions and analysis of the generic composition paradigm M Bellare, C Namprempre International Conference on the Theory and Application of Cryptology and …, 2000 | 1274 | 2000 |
Security proofs for identity-based identification and signature schemes M Bellare, C Namprempre, G Neven Journal of Cryptology 22 (1), 1-61, 2009 | 767 | 2009 |
The one-more-RSA-inversion problems and the security of Chaum's blind signature scheme Bellare, Namprempre, Pointcheval, Semanko Journal of Cryptology 16, 185-215, 2003 | 478 | 2003 |
Authenticated encryption: Relations among notions and analysis of the generic composition paradigm M Bellare, C Namprempre Journal of cryptology 21 (4), 469-491, 2008 | 465 | 2008 |
HyPursuit: A hierarchical network search engine that exploits content-link hypertext clustering R Weiss, B Velez, MA Sheldon Proceedings of the the seventh ACM conference on Hypertext, 180-193, 1996 | 434 | 1996 |
From identification to signatures via the Fiat-Shamir transform: Minimizing assumptions for security and forward-security M Abdalla, JH An, M Bellare, C Namprempre Advances in Cryptology—EUROCRYPT 2002: International Conference on the …, 2002 | 271 | 2002 |
Authenticated encryption in SSH: provably fixing the SSH binary packet protocol M Bellare, T Kohno, C Namprempre Proceedings of the 9th ACM conference on Computer and communications …, 2002 | 177 | 2002 |
Unrestricted aggregate signatures M Bellare, C Namprempre, G Neven Automata, Languages and Programming: 34th International Colloquium, ICALP …, 2007 | 171 | 2007 |
Reconsidering generic composition C Namprempre, P Rogaway, T Shrimpton Advances in Cryptology–EUROCRYPT 2014: 33rd Annual International Conference …, 2014 | 161 | 2014 |
Breaking and provably repairing the SSH authenticated encryption scheme: A case study of the Encode-then-Encrypt-and-MAC paradigm M Bellare, T Kohno, C Namprempre ACM Transactions on Information and System Security (TISSEC) 7 (2), 206-241, 2004 | 153 | 2004 |
Forward-secure threshold signature schemes M Abdalla, S Miner, C Namprempre Topics in Cryptology—CT-RSA 2001: The Cryptographers’ Track at RSA …, 2001 | 139 | 2001 |
Online ciphers and the hash-CBC construction M Bellare, A Boldyreva, L Knudsen, C Namprempre Advances in Cryptology—CRYPTO 2001: 21st Annual International Cryptology …, 2001 | 113 | 2001 |
The power of RSA inversion oracles and the security of Chaum’s RSA-based blind signature scheme M Bellare, C Namprempre, D Pointcheval, M Semanko Financial Cryptography: 5th International Conference, FC 2001 Grand Cayman …, 2002 | 94 | 2002 |
The secure shell (SSH) transport layer encryption modes M Bellare, T Kohno, C Namprempre | 53 | 2006 |
From Identification to Signatures Via the Fiat–Shamir Transform: Necessary and Sufficient Conditions for Security and Forward-Security M Abdalla, JH An, M Bellare, C Namprempre IEEE Transactions on Information Theory 54 (8), 3631-3646, 2008 | 47 | 2008 |
On the (im) possibility of blind message authentication codes M Abdalla, C Namprempre, G Neven Topics in Cryptology–CT-RSA 2006: The Cryptographers’ Track at the RSA …, 2006 | 42 | 2006 |
A text graphics character CAPTCHA for password authentication M Dailey, C Namprempre 2004 IEEE Region 10 Conference TENCON 2004., 45-48, 2004 | 28 | 2004 |
On-line ciphers and the hash-CBC constructions M Bellare, A Boldyreva, L Knudsen, C Namprempre Journal of Cryptology 25, 640-679, 2012 | 26 | 2012 |
Secure channels based on authenticated encryption schemes: A simple characterization C Namprempre International Conference on the Theory and Application of Cryptology and …, 2002 | 24 | 2002 |
AE5 security notions: Definitions implicit in the CAESAR call C Namprempre, P Rogaway, T Shrimpton Cryptology ePrint Archive, 2013 | 14 | 2013 |