Advice
- M. Bellare
The PhD Experience. - M. Bellare
Technical Writing for Computer Scientists.
Talks
- M. Bellare
Caught in Between Theory, Practice and Peer Review
IACR Distinguished Lecture, Crypto 2014. - M. Bellare
Symmetric Encryption Revisited
IACR School on Symmetric Proof Techniques, 2018. - M. Bellare
Cryptography: From Theory to Practice
Microsoft, 2007. - M. Bellare
Talk at Silvio-Shafi Turing Award Fest
MIT, 2013.
Surveys
- M. Bellare
Practice-oriented provable-security
Proceedings of First International Workshop on Information Security (ISW 97), Lecture Notes in Computer Science Vol. 1396, E. Okamoto, G. Davida and M. Mambo eds., Springer Verlag, 1998. - M. Bellare, R. Canetti, and H. Krawczyk
Message authentication using hash functions: The HMAC construction
RSA Laboratories' CryptoBytes, Vol. 2, No. 1, Spring 1996. -
M. Bellare
Proof Checking and Approximation: Towards Tight Results
This is a slightly expanded version of a survey that appears in the Complexity Theory Column of Sigact News, Vol. 27, No. 1, March 1996.
Class lectures and notes
- M. Bellare
Invitation to modern cryptography
Lectures for a graduate course (CSE 207 at UCSD) on modern cryptography. - M. Bellare and P. Rogaway
Introduction to modern cryptography. - S. Goldwasser and M. Bellare
Lecture Notes on Cryptography. - M. Bellare
The Goldreich-Levin Theorem
Notes written for a graduate seminar. - M. Bellare
Tail Inequalities
Notes written for a graduate seminar. - M. Bellare
Lectures on NIZKs: A Concrete Security Treatment
Notes written for a graduate course, 2020.
Contributions to standards
-
H. Krawczyk, M. Bellare, R. Canetti
HMAC: Keyed-Hashing for Message Authentication
Internet RFC 2104, February 1997. - M. Abdalla, M. Bellare and P. Rogaway
DHIES: An Encryption Scheme Based on the Diffie-Hellman Problem
In IEEE P1363a, ANSI X9.63EC, and SECG. - M. Bellare, P. Rogaway and D. Wagner
EAX: A Conventional Authenticated Encryption Mode
In NIST Block Cipher Modes Development. - P. Rogaway, M. Bellare, J. Black and T. Krovetz
OCB: A Block-Cipher Mode of Operation for Efficient Authenticated Encryption
In draft standard IEEE P802.11e. Proposed to NIST. - J. Vance and M. Bellare
DFF: Delegatable Feistel-based Format-preserving Encryption Mode
In NIST Block Cipher Modes Development. - M. Bellare, P. Rogaway and T. Spies
FFX: Format-preserving Feistel-based Encryption Mode ; Addendum
In NIST Block Cipher Modes Development. - M. Bellare, T. Kohno and C. Namprempre
The Secure Shell (SSH) Transport Layer Encryption Modes
Internet RFC 4344, January 2006.
On the Lighter Side
- M. Bellare
Automatic Crypto Research Topic Generator.