default search action
Michel Abdalla
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j19]Hyoseung Kim, Olivier Sanders, Michel Abdalla, Jong Hwan Park:
Practical dynamic group signatures without knowledge extractors. Des. Codes Cryptogr. 91(3): 853-893 (2023) - 2022
- [c64]Michel Abdalla, Thorsten Eisenhofer, Eike Kiltz, Sabrina Kunzweiler, Doreen Riepel:
Password-Authenticated Key Exchange from Group Actions. CRYPTO (2) 2022: 699-728 - [i45]Michel Abdalla, Thorsten Eisenhofer, Eike Kiltz, Sabrina Kunzweiler, Doreen Riepel:
Password-Authenticated Key Exchange from Group Actions. IACR Cryptol. ePrint Arch. 2022: 770 (2022) - 2021
- [j18]Hyoseung Kim, Youngkyung Lee, Michel Abdalla, Jong Hwan Park:
Practical dynamic group signature with efficient concurrent joins and batch verifications. J. Inf. Secur. Appl. 63: 103003 (2021) - [c63]Michel Abdalla, Manuel Barbosa, Jonathan Katz, Julian Loss, Jiayu Xu:
Algebraic Adversaries in the Universal Composability Framework. ASIACRYPT (3) 2021: 311-341 - [c62]Michel Abdalla, Björn Haase, Julia Hesse:
Security Analysis of CPace. ASIACRYPT (4) 2021: 711-741 - [i44]Michel Abdalla, David Pointcheval, Azam Soleimanian:
2-Step Multi-Client Quadratic Functional Encryption from Decentralized Function-Hiding Inner-Product. IACR Cryptol. ePrint Arch. 2021: 1 (2021) - [i43]Hendrik Waldner, Tilen Marc, Miha Stopar, Michel Abdalla:
Private Stream Aggregation from Labeled Secret Sharing Schemes. IACR Cryptol. ePrint Arch. 2021: 81 (2021) - [i42]Michel Abdalla, Björn Haase, Julia Hesse:
Security Analysis of CPace. IACR Cryptol. ePrint Arch. 2021: 114 (2021) - [i41]Hyoseung Kim, Olivier Sanders, Michel Abdalla, Jong Hwan Park:
Practical Dynamic Group Signatures Without Knowledge Extractors. IACR Cryptol. ePrint Arch. 2021: 351 (2021) - [i40]Michel Abdalla, Manuel Barbosa, Peter B. Rønne, Peter Y. A. Ryan, Petra Sala:
Security Characterization of J-PAKE and its Variants. IACR Cryptol. ePrint Arch. 2021: 824 (2021) - [i39]Michel Abdalla, Manuel Barbosa, Jonathan Katz, Julian Loss, Jiayu Xu:
Algebraic Adversaries in the Universal Composability Framework. IACR Cryptol. ePrint Arch. 2021: 1218 (2021) - 2020
- [j17]Michel Abdalla, Fabrice Benhamouda, David Pointcheval:
Corrigendum: Public-key encryption indistinguishable under plaintext-checkable attacks. IET Inf. Secur. 14(3): 365-366 (2020) - [c61]Michel Abdalla, Dario Catalano, Romain Gay, Bogdan Ursu:
Inner-Product Functional Encryption with Fine-Grained Access Control. ASIACRYPT (3) 2020: 467-497 - [c60]Michel Abdalla, Manuel Barbosa, Tatiana Bradley, Stanislaw Jarecki, Jonathan Katz, Jiayu Xu:
Universally Composable Relaxed Password Authenticated Key Exchange. CRYPTO (1) 2020: 278-307 - [c59]Michel Abdalla, Junqing Gong, Hoeteck Wee:
Functional Encryption for Attribute-Weighted Sums from k-Lin. CRYPTO (1) 2020: 685-716 - [c58]Michel Abdalla, Florian Bourse, Hugo Marival, David Pointcheval, Azam Soleimanian, Hendrik Waldner:
Multi-Client Inner-Product Functional Encryption in the Random-Oracle Model. SCN 2020: 525-545 - [i38]Michel Abdalla, Manuel Barbosa, Tatiana Bradley, Stanislaw Jarecki, Jonathan Katz, Jiayu Xu:
Universally Composable Relaxed Password Authenticated Key Exchange. IACR Cryptol. ePrint Arch. 2020: 320 (2020) - [i37]Michel Abdalla, Dario Catalano, Romain Gay, Bogdan Ursu:
Inner-Product Functional Encryption with Fine-Grained Access Control. IACR Cryptol. ePrint Arch. 2020: 577 (2020) - [i36]Michel Abdalla, Junqing Gong, Hoeteck Wee:
Functional Encryption for Attribute-Weighted Sums from k-Lin. IACR Cryptol. ePrint Arch. 2020: 762 (2020) - [i35]Michel Abdalla, Florian Bourse, Hugo Marival, David Pointcheval, Azam Soleimanian, Hendrik Waldner:
Multi-Client Inner-Product Functional Encryption in the Random-Oracle Model. IACR Cryptol. ePrint Arch. 2020: 788 (2020) - [i34]Michel Abdalla:
Security Analysis of Olvid's SAS-based Trust Establishment Protocol. IACR Cryptol. ePrint Arch. 2020: 808 (2020) - [i33]Hyoseung Kim, Youngkyung Lee, Michel Abdalla, Jong Hwan Park:
Practical Dynamic Group Signature with Efficient Concurrent Joins and Batch Verifications. IACR Cryptol. ePrint Arch. 2020: 921 (2020)
2010 – 2019
- 2019
- [j16]Minhye Seo, Michel Abdalla, Dong Hoon Lee, Jong Hwan Park:
New technique for chosen-ciphertext security based on non-interactive zero-knowledge. Inf. Sci. 490: 18-35 (2019) - [j15]Michel Abdalla, Fabrice Benhamouda, David Pointcheval:
On the Tightness of Forward-Secure Signature Reductions. J. Cryptol. 32(1): 84-150 (2019) - [c57]Michel Abdalla, Fabrice Benhamouda, Alain Passelègue:
Algebraic XOR-RKA-Secure Pseudorandom Functions from Post-Zeroizing Multilinear Maps. ASIACRYPT (2) 2019: 386-412 - [c56]Michel Abdalla, Fabrice Benhamouda, Romain Gay:
From Single-Input to Multi-client Inner-Product Functional Encryption. ASIACRYPT (3) 2019: 552-582 - [c55]Michel Abdalla, Fabrice Benhamouda, Markulf Kohlweiss, Hendrik Waldner:
Decentralizing Inner-Product Functional Encryption. Public Key Cryptography (2) 2019: 128-157 - [i32]Michel Abdalla, Fabrice Benhamouda, Markulf Kohlweiss, Hendrik Waldner:
Decentralizing Inner-Product Functional Encryption. IACR Cryptol. ePrint Arch. 2019: 20 (2019) - [i31]Michel Abdalla, Fabrice Benhamouda, Romain Gay:
From Single-Input to Multi-Client Inner-Product Functional Encryption. IACR Cryptol. ePrint Arch. 2019: 487 (2019) - [i30]Michel Abdalla, Manuel Barbosa:
Perfect Forward Security of SPAKE2. IACR Cryptol. ePrint Arch. 2019: 1194 (2019) - 2018
- [j14]Michel Abdalla, Mihir Bellare, Gregory Neven:
Robust Encryption. J. Cryptol. 31(2): 307-350 (2018) - [j13]Michel Abdalla, Fabrice Benhamouda, Alain Passelègue, Kenneth G. Paterson:
Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier. J. Cryptol. 31(4): 917-964 (2018) - [c54]Michel Abdalla, Dario Catalano, Dario Fiore, Romain Gay, Bogdan Ursu:
Multi-Input Functional Encryption for Inner Products: Function-Hiding Realizations and Constructions Without Pairings. CRYPTO (1) 2018: 597-627 - [e7]Michel Abdalla, Ricardo Dahab:
Public-Key Cryptography - PKC 2018 - 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part I. Lecture Notes in Computer Science 10769, Springer 2018, ISBN 978-3-319-76577-8 [contents] - [e6]Michel Abdalla, Ricardo Dahab:
Public-Key Cryptography - PKC 2018 - 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part II. Lecture Notes in Computer Science 10770, Springer 2018, ISBN 978-3-319-76580-8 [contents] - 2017
- [c53]Michel Abdalla, Romain Gay, Mariana Raykova, Hoeteck Wee:
Multi-input Inner-Product Functional Encryption from Pairings. EUROCRYPT (1) 2017: 601-626 - [c52]Michel Abdalla, Fabrice Benhamouda, David Pointcheval:
Removing Erasures with Explainable Hash Proof Systems. Public Key Cryptography (1) 2017: 151-174 - [i29]Michel Abdalla, Fabrice Benhamouda, Alain Passelègue:
Algebraic XOR-RKA-Secure Pseudorandom Functions from Post-Zeroizing Multilinear Maps. IACR Cryptol. ePrint Arch. 2017: 500 (2017) - [i28]Michel Abdalla, Fabrice Benhamouda, David Pointcheval:
On the Tightness of Forward-Secure Signature Reductions. IACR Cryptol. ePrint Arch. 2017: 746 (2017) - [i27]Michel Abdalla, Dario Catalano, Dario Fiore, Romain Gay, Bogdan Ursu:
Multi-Input Functional Encryption for Inner Products: Function-Hiding Realizations and Constructions without Pairings. IACR Cryptol. ePrint Arch. 2017: 972 (2017) - 2016
- [j12]Michel Abdalla, Fabrice Benhamouda, David Pointcheval:
Public-key encryption indistinguishable under plaintext-checkable attacks. IET Inf. Secur. 10(6): 288-303 (2016) - [j11]Michel Abdalla, Pierre-Alain Fouque, Vadim Lyubashevsky, Mehdi Tibouchi:
Tightly Secure Signatures From Lossy Identification Schemes. J. Cryptol. 29(3): 597-631 (2016) - [c51]Máire O'Neill, Elizabeth O'Sullivan, Gavin McWilliams, Markku-Juhani O. Saarinen, Ciara Moore, Ayesha Khalid, James Howe, Rafaël Del Pino, Michel Abdalla, Francesco Regazzoni, Felipe Valencia, Tim Güneysu, Tobias Oder, Adrian Waller, Glyn Jones, Anthony Barnett, Robert Griffin, Andrew Byrne, Bassem Ammar, David Lund:
Secure architectures of future emerging cryptography SAFEcrypto. Conf. Computing Frontiers 2016: 315-322 - [c50]Michel Abdalla, Mario Cornejo, Anca Nitulescu, David Pointcheval:
Robust Password-Protected Secret Sharing. ESORICS (2) 2016: 61-79 - [i26]Michel Abdalla, Florian Bourse, Angelo De Caro, David Pointcheval:
Better Security for Functional Encryption for Inner Product Evaluations. IACR Cryptol. ePrint Arch. 2016: 11 (2016) - [i25]Michel Abdalla, Mario Cornejo, Anca Nitulescu, David Pointcheval:
Robust Password-Protected Secret Sharing. IACR Cryptol. ePrint Arch. 2016: 123 (2016) - [i24]Michel Abdalla, Mariana Raykova, Hoeteck Wee:
Multi-Input Inner-Product Functional Encryption from Pairings. IACR Cryptol. ePrint Arch. 2016: 425 (2016) - 2015
- [c49]Michel Abdalla, Sonia Belaïd, David Pointcheval, Sylvain Ruhault, Damien Vergnaud:
Robust Pseudo-Random Number Generators with Input Secure Against Side-Channel Attacks. ACNS 2015: 635-654 - [c48]Michel Abdalla, Fabrice Benhamouda, Alain Passelègue:
Multilinear and Aggregate Pseudorandom Functions: New Constructions and Improved Security. ASIACRYPT (1) 2015: 103-120 - [c47]Michel Abdalla, Fabrice Benhamouda, Alain Passelègue:
An Algebraic Framework for Pseudorandom Functions and Applications to Related-Key Security. CRYPTO (1) 2015: 388-409 - [c46]Michel Abdalla, Fabrice Benhamouda, David Pointcheval:
Disjunctions for Hash Proof Systems: New Constructions and Applications. EUROCRYPT (2) 2015: 69-100 - [c45]Michel Abdalla, Fabrice Benhamouda, David Pointcheval:
Public-Key Encryption Indistinguishable Under Plaintext-Checkable Attacks. Public Key Cryptography 2015: 332-352 - [c44]Michel Abdalla, Florian Bourse, Angelo De Caro, David Pointcheval:
Simple Functional Encryption Schemes for Inner Products. Public Key Cryptography 2015: 733-751 - [c43]Michel Abdalla, Fabrice Benhamouda, Philip MacKenzie:
Security of the J-PAKE Password-Authenticated Key Exchange Protocol. IEEE Symposium on Security and Privacy 2015: 571-587 - [i23]Michel Abdalla, Florian Bourse, Angelo De Caro, David Pointcheval:
Simple Functional Encryption Schemes for Inner Products. IACR Cryptol. ePrint Arch. 2015: 17 (2015) - [i22]Michel Abdalla, Fabrice Benhamouda, David Pointcheval:
Tighter Reductions for Forward-Secure Signature Schemes. IACR Cryptol. ePrint Arch. 2015: 196 (2015) - [i21]Michel Abdalla, Sonia Belaïd, Pierre-Alain Fouque:
Leakage-Resilient Symmetric Encryption via Re-keying. IACR Cryptol. ePrint Arch. 2015: 204 (2015) - [i20]Michel Abdalla, Fabrice Benhamouda, Alain Passelègue:
An Algebraic Framework for Pseudorandom Functions and Applications to Related-Key Security. IACR Cryptol. ePrint Arch. 2015: 554 (2015) - [i19]Michel Abdalla, Fabrice Benhamouda, Alain Passelègue:
Multilinear and Aggregate Pseudorandom Functions: New Constructions and Improved Security. IACR Cryptol. ePrint Arch. 2015: 867 (2015) - [i18]Michel Abdalla, Sonia Belaïd, David Pointcheval, Sylvain Ruhault, Damien Vergnaud:
Robust Pseudo-Random Number Generators with Input Secure Against Side-Channel Attacks. IACR Cryptol. ePrint Arch. 2015: 1219 (2015) - 2014
- [j10]Michel Abdalla, Dario Catalano, Dario Fiore:
Verifiable Random Functions: Relations to Identity-Based Key Encapsulation and New Constructions. J. Cryptol. 27(3): 544-593 (2014) - [c42]Michel Abdalla, Fabrice Benhamouda, Alain Passelègue, Kenneth G. Paterson:
Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier. CRYPTO (1) 2014: 77-94 - [c41]Michel Abdalla, Hervé Chabanne, Houda Ferradi, Julien Jainski, David Naccache:
Improving Thomlinson-Walker's Software Patching Scheme Using Standard Cryptographic and Statistical Tools. ISPEC 2014: 8-14 - [c40]Michel Abdalla:
Password-Based Authenticated Key Exchange: An Overview. ProvSec 2014: 1-9 - [e5]Michel Abdalla, Roberto De Prisco:
Security and Cryptography for Networks - 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings. Lecture Notes in Computer Science 8642, Springer 2014, ISBN 978-3-319-10878-0 [contents] - [i17]Michel Abdalla, Fabrice Benhamouda, David Pointcheval:
Removing Erasures with Explainable Hash Proof Systems. IACR Cryptol. ePrint Arch. 2014: 125 (2014) - [i16]Michel Abdalla, Fabrice Benhamouda, David Pointcheval:
Disjunctions for Hash Proof Systems: New Constructions and Applications. IACR Cryptol. ePrint Arch. 2014: 483 (2014) - [i15]Michel Abdalla, Fabrice Benhamouda, Alain Passelègue, Kenneth G. Paterson:
Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier. IACR Cryptol. ePrint Arch. 2014: 488 (2014) - [i14]Michel Abdalla, Fabrice Benhamouda, David Pointcheval:
SPOKE: Simple Password-Only Key Exchange in the Standard Model. IACR Cryptol. ePrint Arch. 2014: 609 (2014) - 2013
- [c39]Michel Abdalla, Fabrice Benhamouda, Olivier Blazy, Céline Chevalier, David Pointcheval:
SPHF-Friendly Non-interactive Commitments. ASIACRYPT (1) 2013: 214-234 - [c38]Michel Abdalla, Sonia Belaïd, Pierre-Alain Fouque:
Leakage-Resilient Symmetric Encryption via Re-keying. CHES 2013: 471-488 - [c37]Michel Abdalla, Fabrice Ben Hamouda, David Pointcheval:
Tighter Reductions for Forward-Secure Signature Schemes. Public Key Cryptography 2013: 292-311 - [e4]Michel Abdalla, Cristina Nita-Rotaru, Ricardo Dahab:
Cryptology and Network Security - 12th International Conference, CANS 2013, Paraty, Brazil, November 20-22. 2013. Proceedings. Lecture Notes in Computer Science 8257, Springer 2013, ISBN 978-3-319-02936-8 [contents] - [e3]Michel Abdalla, Tanja Lange:
Pairing-Based Cryptography - Pairing 2012 - 5th International Conference, Cologne, Germany, May 16-18, 2012, Revised Selected Papers. Lecture Notes in Computer Science 7708, Springer 2013, ISBN 978-3-642-36333-7 [contents] - [i13]Michel Abdalla, Fabrice Benhamouda, Olivier Blazy, Céline Chevalier, David Pointcheval:
SPHF-Friendly Non-Interactive Commitments. IACR Cryptol. ePrint Arch. 2013: 588 (2013) - [i12]Michel Abdalla, Pierre-Alain Fouque, Vadim Lyubashevsky, Mehdi Tibouchi:
Tightly-Secure Signatures From Lossy Identification Schemes. IACR Cryptol. ePrint Arch. 2013: 856 (2013) - 2012
- [j9]Michel Abdalla, Angelo De Caro, Duong Hieu Phan:
Generalized Key Delegation for Wildcarded Identity-Based and Inner-Product Encryption. IEEE Trans. Inf. Forensics Secur. 7(6): 1695-1706 (2012) - [c36]Michel Abdalla, Pierre-Alain Fouque, Vadim Lyubashevsky, Mehdi Tibouchi:
Tightly-Secure Signatures from Lossy Identification Schemes. EUROCRYPT 2012: 572-590 - [c35]Pedro Silveira Pisa, Michel Abdalla, Otto Carlos Muniz Bandeira Duarte:
Somewhat homomorphic encryption scheme for arithmetic operations on large integers. GIIS 2012: 1-8 - [c34]Michel Abdalla, Jill-Jênn Vie:
Leakage-Resilient Spatial Encryption. LATINCRYPT 2012: 78-99 - [c33]Michel Abdalla, Angelo De Caro, Karina Mochetti:
Lattice-Based Hierarchical Inner Product Encryption. LATINCRYPT 2012: 121-138 - [c32]Michel Abdalla, Dario Fiore, Vadim Lyubashevsky:
From Selective to Full Security: Semi-generic Transformations in the Standard Model. Public Key Cryptography 2012: 316-333 - [i11]Michel Abdalla, Dario Fiore, Vadim Lyubashevsky:
From Selective to Full Security: Semi-Generic Transformations in the Standard Model. IACR Cryptol. ePrint Arch. 2012: 341 (2012) - 2011
- [b1]Michel Abdalla:
Reducing The Need For Trusted Parties In Cryptography. (Limiter le besoin de tiers de confiance en cryptographie). École Normale Supérieure, Paris, France, 2011 - [j8]Michel Abdalla, James Birkett, Dario Catalano, Alexander W. Dent, John Malone-Lee, Gregory Neven, Jacob C. N. Schuldt, Nigel P. Smart:
Wildcarded Identity-Based Encryption. J. Cryptol. 24(1): 42-82 (2011) - [c31]Michel Abdalla, Céline Chevalier, Louis Granboulan, David Pointcheval:
Contributory Password-Authenticated Group Key Exchange with Join Capability. CT-RSA 2011: 142-160 - 2010
- [c30]Michel Abdalla, Céline Chevalier, Mark Manulis, David Pointcheval:
Flexible Group Key Exchange with On-demand Computation of Subgroup Keys. AFRICACRYPT 2010: 351-368 - [c29]Michel Abdalla, Mihir Bellare, Gregory Neven:
Robust Encryption. TCC 2010: 480-497 - [e2]Michel Abdalla, Paulo S. L. M. Barreto:
Progress in Cryptology - LATINCRYPT 2010, First International Conference on Cryptology and Information Security in Latin America, Puebla, Mexico, August 8-11, 2010, Proceedings. Lecture Notes in Computer Science 6212, Springer 2010, ISBN 978-3-642-14711-1 [contents]
2000 – 2009
- 2009
- [c28]Michel Abdalla, Dario Catalano, Céline Chevalier, David Pointcheval:
Password-Authenticated Group Key Agreement with Adaptive Security and Contributiveness. AFRICACRYPT 2009: 254-271 - [c27]Michel Abdalla, Céline Chevalier, David Pointcheval:
Smooth Projective Hashing for Conditionally Extractable Commitments. CRYPTO 2009: 671-689 - [c26]Michel Abdalla, Dario Catalano, Dario Fiore:
Verifiable Random Functions from Identity-Based Key Encapsulation. EUROCRYPT 2009: 554-571 - [c25]Michel Abdalla, Xavier Boyen, Céline Chevalier, David Pointcheval:
Distributed Public-Key Cryptography from Weak Secrets. Public Key Cryptography 2009: 139-159 - [e1]Michel Abdalla, David Pointcheval, Pierre-Alain Fouque, Damien Vergnaud:
Applied Cryptography and Network Security, 7th International Conference, ACNS 2009, Paris-Rocquencourt, France, June 2-5, 2009. Proceedings. Lecture Notes in Computer Science 5536, 2009, ISBN 978-3-642-01956-2 [contents] - 2008
- [j7]Thomas Claveirole, Marcelo Dias de Amorim, Michel Abdalla, Yannis Viniotis:
Securing wireless sensor networks against aggregator compromises. IEEE Commun. Mag. 46(4): 134-141 (2008) - [j6]Michel Abdalla, Eike Kiltz, Gregory Neven:
Generalised key delegation for hierarchical identity-based encryption. IET Inf. Secur. 2(3): 67-78 (2008) - [j5]Michel Abdalla, Mihir Bellare, Dario Catalano, Eike Kiltz, Tadayoshi Kohno, Tanja Lange, John Malone-Lee, Gregory Neven, Pascal Paillier, Haixia Shi:
Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions. J. Cryptol. 21(3): 350-391 (2008) - [j4]Michel Abdalla, Jee Hea An, Mihir Bellare, Chanathip Namprempre:
From Identification to Signatures Via the Fiat-Shamir Transform: Necessary and Sufficient Conditions for Security and Forward-Security. IEEE Trans. Inf. Theory 54(8): 3631-3646 (2008) - [c24]Michel Abdalla, Malika Izabachène, David Pointcheval:
Anonymous and Transparent Gateway-Based Password-Authenticated Key Exchange. CANS 2008: 133-148 - [c23]Michel Abdalla, Dario Catalano, Céline Chevalier, David Pointcheval:
Efficient Two-Party Password-Based Key Exchange Protocols in the UC Framework. CT-RSA 2008: 335-351 - [i10]Michel Abdalla, Mihir Bellare, Gregory Neven:
Robust Encryption. IACR Cryptol. ePrint Arch. 2008: 440 (2008) - 2007
- [j3]Chanathip Namprempre, Gregory Neven, Michel Abdalla:
A Study of Blind Message Authentication Codes. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 90-A(1): 75-82 (2007) - [j2]Michel Abdalla, Emmanuel Bresson, Olivier Chevassut, Bodo Möller, David Pointcheval:
Strong password-based authentication in TLS using the three-party group Diffie?Hellman protocol. Int. J. Secur. Networks 2(3/4): 284-296 (2007) - [c22]Michel Abdalla, Eike Kiltz, Gregory Neven:
Generalized Key Delegation for Hierarchical Identity-Based Encryption. ESORICS 2007: 139-154 - [c21]Michel Abdalla, Alexander W. Dent, John Malone-Lee, Gregory Neven, Duong Hieu Phan, Nigel P. Smart:
Identity-Based Traitor Tracing. Public Key Cryptography 2007: 361-376 - [c20]Michel Abdalla, Jens-Matthias Bohli, María Isabel González Vasco, Rainer Steinwandt:
(Password) Authenticated Key Establishment: From 2-Party to Group. TCC 2007: 499-514 - [i9]Michel Abdalla, Eike Kiltz, Gregory Neven:
Generalized Key Delegation for Hierarchical Identity-Based Encryption. IACR Cryptol. ePrint Arch. 2007: 221 (2007) - 2006
- [c19]Michel Abdalla, David Pointcheval:
A Scalable Password-Based Group Key Exchange Protocol in the Standard Model. ASIACRYPT 2006: 332-347 - [c18]Michel Abdalla, Emmanuel Bresson, Olivier Chevassut, Bodo Möller, David Pointcheval:
Provably secure password-based authentication in TLS. AsiaCCS 2006: 35-45 - [c17]Thomas Claveirole, Marcelo Dias de Amorim, Michel Abdalla, Yannis Viniotis:
Resisting against aggregator compromises in sensor networks. CoNEXT 2006: 24 - [c16]Michel Abdalla, Chanathip Namprempre, Gregory Neven:
On the (Im)possibility of Blind Message Authentication Codes. CT-RSA 2006: 262-279 - [c15]Michel Abdalla, Dario Catalano, Alexander W. Dent, John Malone-Lee, Gregory Neven, Nigel P. Smart:
Identity-Based Encryption Gone Wild. ICALP (2) 2006: 300-311 - [c14]Michel Abdalla, Emmanuel Bresson, Olivier Chevassut, David Pointcheval:
Password-Based Group Key Exchange in a Constant Number of Rounds. Public Key Cryptography 2006: 427-442 - [i8]Thomas Claveirole, Marcelo Dias de Amorim, Michel Abdalla, Yannis Viniotis:
Share and Disperse: How to Resist Against Aggregator Compromises in Sensor Networks. CoRR abs/cs/0610084 (2006) - [i7]Michel Abdalla, Dario Catalano, Alexander W. Dent, John Malone-Lee, Gregory Neven, Nigel P. Smart:
Identity-Based Encryption Gone Wild. IACR Cryptol. ePrint Arch. 2006: 304 (2006) - 2005
- [c13]Michel Abdalla, Olivier Chevassut, Pierre-Alain Fouque, David Pointcheval:
A Simple Threshold Authenticated Key Exchange from Short Secrets. ASIACRYPT 2005: 566-584 - [c12]Michel Abdalla, Mihir Bellare, Dario Catalano, Eike Kiltz, Tadayoshi Kohno, Tanja Lange, John Malone-Lee, Gregory Neven, Pascal Paillier, Haixia Shi:
Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions. CRYPTO 2005: 205-222 - [c11]Michel Abdalla, David Pointcheval:
Simple Password-Based Encrypted Key Exchange Protocols. CT-RSA 2005: 191-208 - [c10]Michel Abdalla, David Pointcheval:
Interactive Diffie-Hellman Assumptions with Applications to Password-Based Authentication. Financial Cryptography 2005: 341-356 - [c9]Michel Abdalla, Olivier Chevassut, David Pointcheval:
One-Time Verifier-Based Encrypted Key Exchange. Public Key Cryptography 2005: 47-64 - [c8]Michel Abdalla, Pierre-Alain Fouque, David Pointcheval:
Password-Based Authenticated Key Exchange in the Three-Party Setting. Public Key Cryptography 2005: 65-84 - [i6]Michel Abdalla, Mihir Bellare, Dario Catalano, Eike Kiltz, Tadayoshi Kohno, Tanja Lange, John Malone-Lee, Gregory Neven, Pascal Paillier, Haixia Shi:
Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions. IACR Cryptol. ePrint Arch. 2005: 254 (2005) - 2004
- [c7]Michel Abdalla, Bogdan Warinschi:
On the Minimal Assumptions of Group Signature Schemes. ICICS 2004: 1-13 - [i5]Michel Abdalla, Pierre-Alain Fouque, David Pointcheval:
Password-Based Authenticated Key Exchange in the Three-Party Setting. IACR Cryptol. ePrint Arch. 2004: 233 (2004) - 2002
- [c6]Michel Abdalla, Jee Hea An, Mihir Bellare, Chanathip Namprempre:
From Identification to Signatures via the Fiat-Shamir Transform: Minimizing Assumptions for Security and Forward-Security. EUROCRYPT 2002: 418-433 - [i4]Michel Abdalla, Jee Hea An, Mihir Bellare, Chanathip Namprempre:
From Identification to Signatures via the Fiat-Shamir Transform: Minimizing Assumptions for Security and Forward-Security. IACR Cryptol. ePrint Arch. 2002: 22 (2002) - 2001
- [c5]Michel Abdalla, Mihir Bellare, Phillip Rogaway:
The Oracle Diffie-Hellman Assumptions and an Analysis of DHIES. CT-RSA 2001: 143-158 - [c4]Michel Abdalla, Sara K. Miner, Chanathip Namprempre:
Forward-Secure Threshold Signature Schemes. CT-RSA 2001: 441-456 - 2000
- [j1]Michel Abdalla, Yuval Shavitt, Avishai Wool:
Key management for restricted multicast using broadcast encryption. IEEE/ACM Trans. Netw. 8(4): 443-454 (2000) - [c3]Michel Abdalla, Leonid Reyzin:
A New Forward-Secure Digital Signature Scheme. ASIACRYPT 2000: 116-129 - [c2]Michel Abdalla, Mihir Bellare:
Increasing the Lifetime of a Key: A Comparative Analysis of the Security of Re-keying Techniques. ASIACRYPT 2000: 546-559 - [i3]Michel Abdalla, Leonid Reyzin:
A New Forward-Secure Digital Signature Scheme. IACR Cryptol. ePrint Arch. 2000: 2 (2000) - [i2]Michel Abdalla, Sara K. Miner, Chanathip Namprempre:
Forward Security in Threshold Signature Schemes. IACR Cryptol. ePrint Arch. 2000: 31 (2000)
1990 – 1999
- 1999
- [c1]Michel Abdalla, Yuval Shavitt, Avishai Wool:
Towards Making Broadcast Encryption Practical. Financial Cryptography 1999: 140-157 - [i1]Michel Abdalla, Mihir Bellare, Phillip Rogaway:
DHAES: An Encryption Scheme Based on the Diffie-Hellman Problem. IACR Cryptol. ePrint Arch. 1999: 7 (1999)
Coauthor Index
aka: Fabrice Ben Hamouda
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-08 21:03 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint