Michel Abdalla
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2010 – today
- 2019
- [j15]Michel Abdalla, Fabrice Benhamouda, David Pointcheval:
On the Tightness of Forward-Secure Signature Reductions. J. Cryptology 32(1): 84-150 (2019) - [i30]Michel Abdalla, Fabrice Benhamouda, Markulf Kohlweiss, Hendrik Waldner:
Decentralizing Inner-Product Functional Encryption. IACR Cryptology ePrint Archive 2019: 20 (2019) - 2018
- [j14]Michel Abdalla, Mihir Bellare, Gregory Neven:
Robust Encryption. J. Cryptology 31(2): 307-350 (2018) - [j13]Michel Abdalla, Fabrice Benhamouda, Alain Passelègue, Kenneth G. Paterson:
Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier. J. Cryptology 31(4): 917-964 (2018) - [c54]Michel Abdalla, Dario Catalano, Dario Fiore, Romain Gay, Bogdan Ursu:
Multi-Input Functional Encryption for Inner Products: Function-Hiding Realizations and Constructions Without Pairings. CRYPTO (1) 2018: 597-627 - [e7]Michel Abdalla, Ricardo Dahab:
Public-Key Cryptography - PKC 2018 - 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part I. Lecture Notes in Computer Science 10769, Springer 2018, ISBN 978-3-319-76577-8 [contents] - [e6]Michel Abdalla, Ricardo Dahab:
Public-Key Cryptography - PKC 2018 - 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part II. Lecture Notes in Computer Science 10770, Springer 2018, ISBN 978-3-319-76580-8 [contents] - 2017
- [c53]Michel Abdalla, Romain Gay, Mariana Raykova, Hoeteck Wee:
Multi-input Inner-Product Functional Encryption from Pairings. EUROCRYPT (1) 2017: 601-626 - [c52]Michel Abdalla, Fabrice Benhamouda, David Pointcheval:
Removing Erasures with Explainable Hash Proof Systems. Public Key Cryptography (1) 2017: 151-174 - [i29]Michel Abdalla, Fabrice Benhamouda, Alain Passelègue:
Algebraic XOR-RKA-Secure Pseudorandom Functions from Post-Zeroizing Multilinear Maps. IACR Cryptology ePrint Archive 2017: 500 (2017) - [i28]Michel Abdalla, Fabrice Benhamouda, David Pointcheval:
On the Tightness of Forward-Secure Signature Reductions. IACR Cryptology ePrint Archive 2017: 746 (2017) - [i27]Michel Abdalla, Dario Catalano, Dario Fiore, Romain Gay, Bogdan Ursu:
Multi-Input Functional Encryption for Inner Products: Function-Hiding Realizations and Constructions without Pairings. IACR Cryptology ePrint Archive 2017: 972 (2017) - 2016
- [j12]Michel Abdalla, Fabrice Benhamouda, David Pointcheval:
Public-key encryption indistinguishable under plaintext-checkable attacks. IET Information Security 10(6): 288-303 (2016) - [j11]Michel Abdalla, Pierre-Alain Fouque, Vadim Lyubashevsky, Mehdi Tibouchi:
Tightly Secure Signatures From Lossy Identification Schemes. J. Cryptology 29(3): 597-631 (2016) - [c51]Máire O'Neill, Elizabeth O'Sullivan, Gavin McWilliams, Markku-Juhani Saarinen, Ciara Moore, Ayesha Khalid, James Howe, Rafaël Del Pino, Michel Abdalla, Francesco Regazzoni, Felipe Valencia, Tim Güneysu, Tobias Oder, Adrian Waller, Glyn Jones, Anthony Barnett, Robert Griffin, Andrew Byrne, Bassem Ammar, David Lund:
Secure architectures of future emerging cryptography SAFEcrypto. Conf. Computing Frontiers 2016: 315-322 - [c50]Michel Abdalla, Mario Cornejo, Anca Nitulescu, David Pointcheval:
Robust Password-Protected Secret Sharing. ESORICS (2) 2016: 61-79 - [i26]Michel Abdalla, Florian Bourse, Angelo De Caro, David Pointcheval:
Better Security for Functional Encryption for Inner Product Evaluations. IACR Cryptology ePrint Archive 2016: 11 (2016) - [i25]Michel Abdalla, Mario Cornejo, Anca Nitulescu, David Pointcheval:
Robust Password-Protected Secret Sharing. IACR Cryptology ePrint Archive 2016: 123 (2016) - [i24]Michel Abdalla, Mariana Raykova, Hoeteck Wee:
Multi-Input Inner-Product Functional Encryption from Pairings. IACR Cryptology ePrint Archive 2016: 425 (2016) - 2015
- [c49]Michel Abdalla, Sonia Belaïd, David Pointcheval, Sylvain Ruhault, Damien Vergnaud:
Robust Pseudo-Random Number Generators with Input Secure Against Side-Channel Attacks. ACNS 2015: 635-654 - [c48]Michel Abdalla, Fabrice Benhamouda, Alain Passelègue:
Multilinear and Aggregate Pseudorandom Functions: New Constructions and Improved Security. ASIACRYPT (1) 2015: 103-120 - [c47]Michel Abdalla, Fabrice Benhamouda, Alain Passelègue:
An Algebraic Framework for Pseudorandom Functions and Applications to Related-Key Security. CRYPTO (1) 2015: 388-409 - [c46]Michel Abdalla, Fabrice Benhamouda, David Pointcheval:
Disjunctions for Hash Proof Systems: New Constructions and Applications. EUROCRYPT (2) 2015: 69-100 - [c45]Michel Abdalla, Fabrice Benhamouda, David Pointcheval:
Public-Key Encryption Indistinguishable Under Plaintext-Checkable Attacks. Public Key Cryptography 2015: 332-352 - [c44]Michel Abdalla, Florian Bourse, Angelo De Caro, David Pointcheval:
Simple Functional Encryption Schemes for Inner Products. Public Key Cryptography 2015: 733-751 - [c43]Michel Abdalla, Fabrice Benhamouda, Philip MacKenzie:
Security of the J-PAKE Password-Authenticated Key Exchange Protocol. IEEE Symposium on Security and Privacy 2015: 571-587 - [i23]Michel Abdalla, Florian Bourse, Angelo De Caro, David Pointcheval:
Simple Functional Encryption Schemes for Inner Products. IACR Cryptology ePrint Archive 2015: 17 (2015) - [i22]Michel Abdalla, Fabrice Benhamouda, David Pointcheval:
Tighter Reductions for Forward-Secure Signature Schemes. IACR Cryptology ePrint Archive 2015: 196 (2015) - [i21]Michel Abdalla, Sonia Belaïd, Pierre-Alain Fouque:
Leakage-Resilient Symmetric Encryption via Re-keying. IACR Cryptology ePrint Archive 2015: 204 (2015) - [i20]Michel Abdalla, Fabrice Benhamouda, Alain Passelègue:
An Algebraic Framework for Pseudorandom Functions and Applications to Related-Key Security. IACR Cryptology ePrint Archive 2015: 554 (2015) - [i19]Michel Abdalla, Fabrice Benhamouda, Alain Passelègue:
Multilinear and Aggregate Pseudorandom Functions: New Constructions and Improved Security. IACR Cryptology ePrint Archive 2015: 867 (2015) - [i18]Michel Abdalla, Sonia Belaïd, David Pointcheval, Sylvain Ruhault, Damien Vergnaud:
Robust Pseudo-Random Number Generators with Input Secure Against Side-Channel Attacks. IACR Cryptology ePrint Archive 2015: 1219 (2015) - 2014
- [j10]Michel Abdalla, Dario Catalano, Dario Fiore:
Verifiable Random Functions: Relations to Identity-Based Key Encapsulation and New Constructions. J. Cryptology 27(3): 544-593 (2014) - [c42]Michel Abdalla, Fabrice Benhamouda, Alain Passelègue, Kenneth G. Paterson:
Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier. CRYPTO (1) 2014: 77-94 - [c41]Michel Abdalla, Hervé Chabanne, Houda Ferradi, Julien Jainski, David Naccache:
Improving Thomlinson-Walker's Software Patching Scheme Using Standard Cryptographic and Statistical Tools. ISPEC 2014: 8-14 - [c40]
- [e5]Michel Abdalla, Roberto De Prisco:
Security and Cryptography for Networks - 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings. Lecture Notes in Computer Science 8642, Springer 2014, ISBN 978-3-319-10878-0 [contents] - [i17]Michel Abdalla, Fabrice Benhamouda, David Pointcheval:
Removing Erasures with Explainable Hash Proof Systems. IACR Cryptology ePrint Archive 2014: 125 (2014) - [i16]Michel Abdalla, Fabrice Benhamouda, David Pointcheval:
Disjunctions for Hash Proof Systems: New Constructions and Applications. IACR Cryptology ePrint Archive 2014: 483 (2014) - [i15]Michel Abdalla, Fabrice Benhamouda, Alain Passelègue, Kenneth G. Paterson:
Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier. IACR Cryptology ePrint Archive 2014: 488 (2014) - [i14]Michel Abdalla, Fabrice Benhamouda, David Pointcheval:
SPOKE: Simple Password-Only Key Exchange in the Standard Model. IACR Cryptology ePrint Archive 2014: 609 (2014) - 2013
- [c39]Michel Abdalla, Fabrice Benhamouda, Olivier Blazy, Céline Chevalier, David Pointcheval:
SPHF-Friendly Non-interactive Commitments. ASIACRYPT (1) 2013: 214-234 - [c38]Michel Abdalla, Sonia Belaïd, Pierre-Alain Fouque:
Leakage-Resilient Symmetric Encryption via Re-keying. CHES 2013: 471-488 - [c37]Michel Abdalla, Fabrice Ben Hamouda, David Pointcheval:
Tighter Reductions for Forward-Secure Signature Schemes. Public Key Cryptography 2013: 292-311 - [e4]Michel Abdalla, Cristina Nita-Rotaru, Ricardo Dahab:
Cryptology and Network Security - 12th International Conference, CANS 2013, Paraty, Brazil, November 20-22. 2013. Proceedings. Lecture Notes in Computer Science 8257, Springer 2013, ISBN 978-3-319-02936-8 [contents] - [e3]Michel Abdalla, Tanja Lange:
Pairing-Based Cryptography - Pairing 2012 - 5th International Conference, Cologne, Germany, May 16-18, 2012, Revised Selected Papers. Lecture Notes in Computer Science 7708, Springer 2013, ISBN 978-3-642-36333-7 [contents] - [i13]Michel Abdalla, Fabrice Benhamouda, Olivier Blazy, Céline Chevalier, David Pointcheval:
SPHF-Friendly Non-Interactive Commitments. IACR Cryptology ePrint Archive 2013: 588 (2013) - [i12]Michel Abdalla, Pierre-Alain Fouque, Vadim Lyubashevsky, Mehdi Tibouchi:
Tightly-Secure Signatures From Lossy Identification Schemes. IACR Cryptology ePrint Archive 2013: 856 (2013) - 2012
- [j9]Michel Abdalla, Angelo De Caro, Duong Hieu Phan:
Generalized Key Delegation for Wildcarded Identity-Based and Inner-Product Encryption. IEEE Trans. Information Forensics and Security 7(6): 1695-1706 (2012) - [c36]Michel Abdalla, Pierre-Alain Fouque, Vadim Lyubashevsky, Mehdi Tibouchi:
Tightly-Secure Signatures from Lossy Identification Schemes. EUROCRYPT 2012: 572-590 - [c35]Pedro Silveira Pisa, Michel Abdalla, Otto Carlos Muniz Bandeira Duarte:
Somewhat homomorphic encryption scheme for arithmetic operations on large integers. GIIS 2012: 1-8 - [c34]
- [c33]Michel Abdalla, Angelo De Caro, Karina Mochetti:
Lattice-Based Hierarchical Inner Product Encryption. LATINCRYPT 2012: 121-138 - [c32]Michel Abdalla, Dario Fiore, Vadim Lyubashevsky:
From Selective to Full Security: Semi-generic Transformations in the Standard Model. Public Key Cryptography 2012: 316-333 - [i11]Michel Abdalla, Dario Fiore, Vadim Lyubashevsky:
From Selective to Full Security: Semi-Generic Transformations in the Standard Model. IACR Cryptology ePrint Archive 2012: 341 (2012) - 2011
- [b1]Michel Abdalla:
Reducing The Need For Trusted Parties In Cryptography. (Limiter le besoin de tiers de confiance en cryptographie). École Normale Supérieure, Paris, France 2011 - [j8]Michel Abdalla, James Birkett, Dario Catalano, Alexander W. Dent, John Malone-Lee, Gregory Neven, Jacob C. N. Schuldt, Nigel P. Smart:
Wildcarded Identity-Based Encryption. J. Cryptology 24(1): 42-82 (2011) - [c31]Michel Abdalla, Céline Chevalier, Louis Granboulan, David Pointcheval:
Contributory Password-Authenticated Group Key Exchange with Join Capability. CT-RSA 2011: 142-160 - 2010
- [c30]Michel Abdalla, Céline Chevalier, Mark Manulis, David Pointcheval:
Flexible Group Key Exchange with On-demand Computation of Subgroup Keys. AFRICACRYPT 2010: 351-368 - [c29]
- [e2]Michel Abdalla, Paulo S. L. M. Barreto:
Progress in Cryptology - LATINCRYPT 2010, First International Conference on Cryptology and Information Security in Latin America, Puebla, Mexico, August 8-11, 2010, Proceedings. Lecture Notes in Computer Science 6212, Springer 2010, ISBN 978-3-642-14711-1 [contents]
2000 – 2009
- 2009
- [c28]Michel Abdalla, Dario Catalano, Céline Chevalier, David Pointcheval:
Password-Authenticated Group Key Agreement with Adaptive Security and Contributiveness. AFRICACRYPT 2009: 254-271 - [c27]Michel Abdalla, Céline Chevalier, David Pointcheval:
Smooth Projective Hashing for Conditionally Extractable Commitments. CRYPTO 2009: 671-689 - [c26]Michel Abdalla, Dario Catalano, Dario Fiore:
Verifiable Random Functions from Identity-Based Key Encapsulation. EUROCRYPT 2009: 554-571 - [c25]Michel Abdalla, Xavier Boyen, Céline Chevalier, David Pointcheval:
Distributed Public-Key Cryptography from Weak Secrets. Public Key Cryptography 2009: 139-159 - [e1]Michel Abdalla, David Pointcheval, Pierre-Alain Fouque, Damien Vergnaud:
Applied Cryptography and Network Security, 7th International Conference, ACNS 2009, Paris-Rocquencourt, France, June 2-5, 2009. Proceedings. Lecture Notes in Computer Science 5536, 2009, ISBN 978-3-642-01956-2 [contents] - 2008
- [j7]Thomas Claveirole, Marcelo Dias de Amorim, Michel Abdalla, Yannis Viniotis:
Securing wireless sensor networks against aggregator compromises. IEEE Communications Magazine 46(4): 134-141 (2008) - [j6]Michel Abdalla, Eike Kiltz, Gregory Neven:
Generalised key delegation for hierarchical identity-based encryption. IET Information Security 2(3): 67-78 (2008) - [j5]Michel Abdalla, Mihir Bellare, Dario Catalano, Eike Kiltz, Tadayoshi Kohno, Tanja Lange, John Malone-Lee, Gregory Neven, Pascal Paillier, Haixia Shi:
Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions. J. Cryptology 21(3): 350-391 (2008) - [j4]Michel Abdalla, Jee Hea An, Mihir Bellare, Chanathip Namprempre:
From Identification to Signatures Via the Fiat-Shamir Transform: Necessary and Sufficient Conditions for Security and Forward-Security. IEEE Trans. Information Theory 54(8): 3631-3646 (2008) - [c24]Michel Abdalla, Malika Izabachène, David Pointcheval:
Anonymous and Transparent Gateway-Based Password-Authenticated Key Exchange. CANS 2008: 133-148 - [c23]Michel Abdalla, Dario Catalano, Céline Chevalier, David Pointcheval:
Efficient Two-Party Password-Based Key Exchange Protocols in the UC Framework. CT-RSA 2008: 335-351 - [i10]Michel Abdalla, Mihir Bellare, Gregory Neven:
Robust Encryption. IACR Cryptology ePrint Archive 2008: 440 (2008) - 2007
- [j3]Chanathip Namprempre, Gregory Neven, Michel Abdalla:
A Study of Blind Message Authentication Codes. IEICE Transactions 90-A(1): 75-82 (2007) - [j2]Michel Abdalla, Emmanuel Bresson, Olivier Chevassut, Bodo Möller, David Pointcheval:
Strong password-based authentication in TLS using the three-party group Diffie?Hellman protocol. IJSN 2(3/4): 284-296 (2007) - [c22]Michel Abdalla, Eike Kiltz, Gregory Neven:
Generalized Key Delegation for Hierarchical Identity-Based Encryption. ESORICS 2007: 139-154 - [c21]Michel Abdalla, Alexander W. Dent, John Malone-Lee, Gregory Neven, Duong Hieu Phan, Nigel P. Smart:
Identity-Based Traitor Tracing. Public Key Cryptography 2007: 361-376 - [c20]Michel Abdalla, Jens-Matthias Bohli, Maria Isabel Gonzalez Vasco, Rainer Steinwandt:
(Password) Authenticated Key Establishment: From 2-Party to Group. TCC 2007: 499-514 - [i9]Michel Abdalla, Eike Kiltz, Gregory Neven:
Generalized Key Delegation for Hierarchical Identity-Based Encryption. IACR Cryptology ePrint Archive 2007: 221 (2007) - 2006
- [c19]Michel Abdalla, David Pointcheval:
A Scalable Password-Based Group Key Exchange Protocol in the Standard Model. ASIACRYPT 2006: 332-347 - [c18]Michel Abdalla, Emmanuel Bresson, Olivier Chevassut, Bodo Möller, David Pointcheval:
Provably secure password-based authentication in TLS. AsiaCCS 2006: 35-45 - [c17]Thomas Claveirole, Marcelo Dias de Amorim, Michel Abdalla, Yannis Viniotis:
Resisting against aggregator compromises in sensor networks. CoNEXT 2006: 24 - [c16]Michel Abdalla, Chanathip Namprempre, Gregory Neven:
On the (Im)possibility of Blind Message Authentication Codes. CT-RSA 2006: 262-279 - [c15]Michel Abdalla, Dario Catalano, Alexander W. Dent, John Malone-Lee, Gregory Neven, Nigel P. Smart:
Identity-Based Encryption Gone Wild. ICALP (2) 2006: 300-311 - [c14]Michel Abdalla, Emmanuel Bresson, Olivier Chevassut, David Pointcheval:
Password-Based Group Key Exchange in a Constant Number of Rounds. Public Key Cryptography 2006: 427-442 - [i8]Thomas Claveirole, Marcelo Dias de Amorim, Michel Abdalla, Yannis Viniotis:
Share and Disperse: How to Resist Against Aggregator Compromises in Sensor Networks. CoRR abs/cs/0610084 (2006) - [i7]Michel Abdalla, Dario Catalano, Alexander W. Dent, John Malone-Lee, Gregory Neven, Nigel P. Smart:
Identity-Based Encryption Gone Wild. IACR Cryptology ePrint Archive 2006: 304 (2006) - 2005
- [c13]Michel Abdalla, Olivier Chevassut, Pierre-Alain Fouque, David Pointcheval:
A Simple Threshold Authenticated Key Exchange from Short Secrets. ASIACRYPT 2005: 566-584 - [c12]Michel Abdalla, Mihir Bellare, Dario Catalano, Eike Kiltz, Tadayoshi Kohno, Tanja Lange, John Malone-Lee, Gregory Neven, Pascal Paillier, Haixia Shi:
Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions. CRYPTO 2005: 205-222 - [c11]Michel Abdalla, David Pointcheval:
Simple Password-Based Encrypted Key Exchange Protocols. CT-RSA 2005: 191-208 - [c10]Michel Abdalla, David Pointcheval:
Interactive Diffie-Hellman Assumptions with Applications to Password-Based Authentication. Financial Cryptography 2005: 341-356 - [c9]Michel Abdalla, Olivier Chevassut, David Pointcheval:
One-Time Verifier-Based Encrypted Key Exchange. Public Key Cryptography 2005: 47-64 - [c8]Michel Abdalla, Pierre-Alain Fouque, David Pointcheval:
Password-Based Authenticated Key Exchange in the Three-Party Setting. Public Key Cryptography 2005: 65-84 - [i6]Michel Abdalla, Mihir Bellare, Dario Catalano, Eike Kiltz, Tadayoshi Kohno, Tanja Lange, John Malone-Lee, Gregory Neven, Pascal Paillier, Haixia Shi:
Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions. IACR Cryptology ePrint Archive 2005: 254 (2005) - 2004
- [c7]Michel Abdalla, Bogdan Warinschi:
On the Minimal Assumptions of Group Signature Schemes. ICICS 2004: 1-13 - [i5]Michel Abdalla, Pierre-Alain Fouque, David Pointcheval:
Password-Based Authenticated Key Exchange in the Three-Party Setting. IACR Cryptology ePrint Archive 2004: 233 (2004) - 2002
- [c6]Michel Abdalla, Jee Hea An, Mihir Bellare, Chanathip Namprempre:
From Identification to Signatures via the Fiat-Shamir Transform: Minimizing Assumptions for Security and Forward-Security. EUROCRYPT 2002: 418-433 - [i4]Michel Abdalla, Jee Hea An, Mihir Bellare, Chanathip Namprempre:
From Identification to Signatures via the Fiat-Shamir Transform: Minimizing Assumptions for Security and Forward-Security. IACR Cryptology ePrint Archive 2002: 22 (2002) - 2001
- [c5]Michel Abdalla, Mihir Bellare, Phillip Rogaway:
The Oracle Diffie-Hellman Assumptions and an Analysis of DHIES. CT-RSA 2001: 143-158 - [c4]Michel Abdalla, Sara K. Miner, Chanathip Namprempre:
Forward-Secure Threshold Signature Schemes. CT-RSA 2001: 441-456 - 2000
- [j1]Michel Abdalla, Yuval Shavitt, Avishai Wool:
Key management for restricted multicast using broadcast encryption. IEEE/ACM Trans. Netw. 8(4): 443-454 (2000) - [c3]Michel Abdalla, Leonid Reyzin:
A New Forward-Secure Digital Signature Scheme. ASIACRYPT 2000: 116-129 - [c2]Michel Abdalla, Mihir Bellare:
Increasing the Lifetime of a Key: A Comparative Analysis of the Security of Re-keying Techniques. ASIACRYPT 2000: 546-559 - [i3]Michel Abdalla, Leonid Reyzin:
A New Forward-Secure Digital Signature Scheme. IACR Cryptology ePrint Archive 2000: 2 (2000) - [i2]Michel Abdalla, Sara K. Miner, Chanathip Namprempre:
Forward Security in Threshold Signature Schemes. IACR Cryptology ePrint Archive 2000: 31 (2000)
1990 – 1999
- 1999
- [c1]Michel Abdalla, Yuval Shavitt, Avishai Wool:
Towards Making Broadcast Encryption Practical. Financial Cryptography 1999: 140-157 - [i1]Michel Abdalla, Mihir Bellare, Phillip Rogaway:
DHAES: An Encryption Scheme Based on the Diffie-Hellman Problem. IACR Cryptology ePrint Archive 1999: 7 (1999)
Coauthor Index
Fabrice Benhamouda
aka: Fabrice Ben Hamouda
aka: Fabrice Ben Hamouda
last updated on 2019-02-13 21:45 CET by the dblp team
data released under the ODC-BY 1.0 license
see also: Terms of Use | Privacy Policy | Imprint