2009 |
19 | EE | Mihir Bellare,
Chanathip Namprempre,
Gregory Neven:
Security Proofs for Identity-Based Identification and Signature Schemes.
J. Cryptology 22(1): 1-61 (2009) |
2008 |
18 | EE | Michel Abdalla,
Jee Hea An,
Mihir Bellare,
Chanathip Namprempre:
From Identification to Signatures Via the Fiat-Shamir Transform: Necessary and Sufficient Conditions for Security and Forward-Security.
IEEE Transactions on Information Theory 54(8): 3631-3646 (2008) |
17 | EE | Mihir Bellare,
Chanathip Namprempre:
Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm.
J. Cryptology 21(4): 469-491 (2008) |
2007 |
16 | EE | Mihir Bellare,
Chanathip Namprempre,
Gregory Neven:
Unrestricted Aggregate Signatures.
ICALP 2007: 411-422 |
15 | EE | Chanathip Namprempre,
Matthew N. Dailey:
Mitigating Dictionary Attacks with Text-Graphics Character Captchas.
IEICE Transactions 90-A(1): 179-186 (2007) |
14 | EE | Chanathip Namprempre,
Gregory Neven,
Michel Abdalla:
A Study of Blind Message Authentication Codes.
IEICE Transactions 90-A(1): 75-82 (2007) |
2006 |
13 | EE | Michel Abdalla,
Chanathip Namprempre,
Gregory Neven:
On the (Im)possibility of Blind Message Authentication Codes.
CT-RSA 2006: 262-279 |
2004 |
12 | EE | Mihir Bellare,
Chanathip Namprempre,
Gregory Neven:
Security Proofs for Identity-Based Identification and Signature Schemes.
EUROCRYPT 2004: 268-286 |
11 | EE | Mihir Bellare,
Tadayoshi Kohno,
Chanathip Namprempre:
Breaking and provably repairing the SSH authenticated encryption scheme: A case study of the Encode-then-Encrypt-and-MAC paradigm.
ACM Trans. Inf. Syst. Secur. 7(2): 206-241 (2004) |
2003 |
10 | EE | Mihir Bellare,
Chanathip Namprempre,
David Pointcheval,
Michael Semanko:
The One-More-RSA-Inversion Problems and the Security of Chaum's Blind Signature Scheme.
J. Cryptology 16(3): 185-215 (2003) |
2002 |
9 | EE | Mihir Bellare,
Tadayoshi Kohno,
Chanathip Namprempre:
Authenticated encryption in SSH: provably fixing the SSH binary packet protocol.
ACM Conference on Computer and Communications Security 2002: 1-11 |
8 | EE | Chanathip Namprempre:
Secure Channels Based on Authenticated Encryption Schemes: A Simple Characterization.
ASIACRYPT 2002: 515-532 |
7 | EE | Michel Abdalla,
Jee Hea An,
Mihir Bellare,
Chanathip Namprempre:
From Identification to Signatures via the Fiat-Shamir Transform: Minimizing Assumptions for Security and Forward-Security.
EUROCRYPT 2002: 418-433 |
2001 |
6 | EE | Mihir Bellare,
Alexandra Boldyreva,
Lars R. Knudsen,
Chanathip Namprempre:
Online Ciphers and the Hash-CBC Construction.
CRYPTO 2001: 292-309 |
5 | EE | Michel Abdalla,
Sara K. Miner,
Chanathip Namprempre:
Forward-Secure Threshold Signature Schemes.
CT-RSA 2001: 441-456 |
4 | EE | Mihir Bellare,
Chanathip Namprempre,
David Pointcheval,
Michael Semanko:
The Power of RSA Inversion Oracles and the Security of Chaum's RSA-Based Blind Signature Scheme.
Financial Cryptography 2001: 309-328 |
2000 |
3 | EE | Mihir Bellare,
Chanathip Namprempre:
Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm.
ASIACRYPT 2000: 531-545 |
1999 |
2 | EE | Chanathip Namprempre,
Jeremy B. Sussman,
Keith Marzullo:
Implementing Causal Logging Using OrbixWeb Interception.
COOTS 1999: 57-68 |
1996 |
1 | EE | Ron Weiss,
Bienvenido Vélez,
Mark A. Sheldon,
Chanathip Namprempre,
Peter Szilagyi,
Andrzej Duda,
David K. Gifford:
HyPursuit: A Hierarchical Network Search Engine that Exploits Content-Link Hypertext Clustering.
Hypertext 1996: 180-193 |