Michel Abdalla
Michel Abdalla
Verified email at ens.fr - Homepage
Title
Cited by
Cited by
Year
Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions
M Abdalla, M Bellare, D Catalano, E Kiltz, T Kohno, T Lange, ...
Advances in Cryptology — CRYPTO 2005, 205-222, 2005
6052005
Password-based authenticated key exchange in the three-party setting
M Abdalla, PA Fouque, D Pointcheval
Public-Key Cryptography — PKC 2005, 65-84, 2005
4932005
The oracle Diffie-Hellman assumptions and an analysis of DHIES
M Abdalla, M Bellare, P Rogaway
Topics in Cryptology — CT-RSA 2001, 143-158, 2001
4602001
Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions
M Abdalla, M Bellare, D Catalano, E Kiltz, T Kohno, T Lange, ...
Journal of Cryptology 21 (3), 350-391, 2008
3722008
Simple Password-Based Encrypted Key Exchange Protocols
M Abdalla, D Pointcheval
Topics in Cryptology — CT-RSA 2005 3376, 191-208, 2005
3492005
A new forward-secure digital signature scheme
M Abdalla, L Reyzin
Advances in Cryptology — ASIACRYPT 2000, 116-129, 2000
3422000
DHIES: An encryption scheme based on the Diffie-Hellman problem
M Abdalla, M Bellare, P Rogaway
Submission to IEEE P1363a 280, 1998
1881998
From identification to signatures via the Fiat-Shamir transform: Minimizing assumptions for security and forward-security
M Abdalla, JH An, M Bellare, C Namprempre
Advances in Cryptology — EUROCRYPT 2002, 418-433, 2002
1692002
Interactive Diffie-Hellman assumptions with applications to password-based authentication
M Abdalla, D Pointcheval
FC 2005, 341-356, 2005
1502005
Simple functional encryption schemes for inner products
M Abdalla, F Bourse, A De Caro, D Pointcheval
Public-Key Cryptography — PKC 2015, 733-751, 2015
1472015
Identity-based encryption gone wild
M Abdalla, D Catalano, AW Dent, J Malone-Lee, G Neven, NP Smart
ICALP 2006, 300-311, 2006
1372006
Password-based group key exchange in a constant number of rounds
M Abdalla, E Bresson, O Chevassut, D Pointcheval
Public-Key Cryptography — PKC 2006, 427-442, 2006
1362006
Increasing the lifetime of a key: a comparative analysis of the security of re-keying techniques
M Abdalla, M Bellare
Advances in Cryptology — ASIACRYPT 2000, 546-559, 2000
1312000
Robust encryption
M Abdalla, M Bellare, G Neven
Theory of Cryptography Conference — TCC 2010, 480-497, 2010
1282010
Forward-secure threshold signature schemes
M Abdalla, S Miner, C Namprempre
Topics in Cryptology — CT-RSA 2001, 441-456, 2001
1262001
One-time verifier-based encrypted key exchange
M Abdalla, O Chevassut, D Pointcheval
Public-Key Cryptography — PKC 2005, 47-64, 2005
1252005
Key management for restricted multicast using broadcast encryption
M Abdalla, Y Shavitt, A Wool
IEEE/ACM Transactions on Networking 8 (4), 443-454, 2000
1082000
Smooth Projective Hashing for Conditionally Extractable Commitments.
M Abdalla, C Chevalier, D Pointcheval
Advances in Cryptology — CRYPTO 2009, 671-689, 2009
962009
Generalized key delegation for hierarchical identity-based encryption
M Abdalla, E Kiltz, G Neven
Computer Security — ESORICS 2007, 139-154, 2007
852007
Password-based authenticated key exchange in the three-party setting
M Abdalla, PA Fouque, D Pointcheval
IEE Proceedings-Information Security 153 (1), 27-39, 2006
772006
The system can't perform the operation now. Try again later.
Articles 1–20