2009 |
32 | EE | Michel Abdalla,
Dario Catalano,
Dario Fiore:
Verifiable Random Functions from Identity-Based Key Encapsulation.
EUROCRYPT 2009: 554-571 |
31 | EE | Michel Abdalla,
Xavier Boyen,
Céline Chevalier,
David Pointcheval:
Distributed Public-Key Cryptography from Weak Secrets.
Public Key Cryptography 2009: 139-159 |
2008 |
30 | EE | Michel Abdalla,
Malika Izabachène,
David Pointcheval:
Anonymous and Transparent Gateway-Based Password-Authenticated Key Exchange.
CANS 2008: 133-148 |
29 | EE | Michel Abdalla,
Dario Catalano,
Céline Chevalier,
David Pointcheval:
Efficient Two-Party Password-Based Key Exchange Protocols in the UC Framework.
CT-RSA 2008: 335-351 |
28 | EE | Michel Abdalla,
Jee Hea An,
Mihir Bellare,
Chanathip Namprempre:
From Identification to Signatures Via the Fiat-Shamir Transform: Necessary and Sufficient Conditions for Security and Forward-Security.
IEEE Transactions on Information Theory 54(8): 3631-3646 (2008) |
27 | EE | Michel Abdalla,
Mihir Bellare,
Dario Catalano,
Eike Kiltz,
Tadayoshi Kohno,
Tanja Lange,
John Malone-Lee,
Gregory Neven,
Pascal Paillier,
Haixia Shi:
Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions.
J. Cryptology 21(3): 350-391 (2008) |
2007 |
26 | EE | Michel Abdalla,
Eike Kiltz,
Gregory Neven:
Generalized Key Delegation for Hierarchical Identity-Based Encryption.
ESORICS 2007: 139-154 |
25 | EE | Michel Abdalla,
Alexander W. Dent,
John Malone-Lee,
Gregory Neven,
Duong Hieu Phan,
Nigel P. Smart:
Identity-Based Traitor Tracing.
Public Key Cryptography 2007: 361-376 |
24 | EE | Michel Abdalla,
Jens-Matthias Bohli,
Maria Isabel Gonzalez Vasco,
Rainer Steinwandt:
(Password) Authenticated Key Establishment: From 2-Party to Group.
TCC 2007: 499-514 |
23 | EE | Chanathip Namprempre,
Gregory Neven,
Michel Abdalla:
A Study of Blind Message Authentication Codes.
IEICE Transactions 90-A(1): 75-82 (2007) |
22 | EE | Michel Abdalla,
Emmanuel Bresson,
Olivier Chevassut,
Bodo Möller,
David Pointcheval:
Strong password-based authentication in TLS using the three-party group Diffie?Hellman protocol.
IJSN 2(3/4): 284-296 (2007) |
2006 |
21 | EE | Michel Abdalla,
Emmanuel Bresson,
Olivier Chevassut,
Bodo Möller,
David Pointcheval:
Provably secure password-based authentication in TLS.
ASIACCS 2006: 35-45 |
20 | EE | Michel Abdalla,
David Pointcheval:
A Scalable Password-Based Group Key Exchange Protocol in the Standard Model.
ASIACRYPT 2006: 332-347 |
19 | EE | Michel Abdalla,
Chanathip Namprempre,
Gregory Neven:
On the (Im)possibility of Blind Message Authentication Codes.
CT-RSA 2006: 262-279 |
18 | EE | Thomas Claveirole,
Marcelo Dias de Amorim,
Michel Abdalla,
Yannis Viniotis:
Resisting against aggregator compromises in sensor networks.
CoNEXT 2006: 24 |
17 | EE | Michel Abdalla,
Dario Catalano,
Alexander W. Dent,
John Malone-Lee,
Gregory Neven,
Nigel P. Smart:
Identity-Based Encryption Gone Wild.
ICALP (2) 2006: 300-311 |
16 | EE | Michel Abdalla,
Emmanuel Bresson,
Olivier Chevassut,
David Pointcheval:
Password-Based Group Key Exchange in a Constant Number of Rounds.
Public Key Cryptography 2006: 427-442 |
15 | EE | Thomas Claveirole,
Marcelo Dias de Amorim,
Michel Abdalla,
Yannis Viniotis:
Share and Disperse: How to Resist Against Aggregator Compromises in Sensor Networks
CoRR abs/cs/0610084: (2006) |
2005 |
14 | EE | Michel Abdalla,
Olivier Chevassut,
Pierre-Alain Fouque,
David Pointcheval:
A Simple Threshold Authenticated Key Exchange from Short Secrets.
ASIACRYPT 2005: 566-584 |
13 | EE | Michel Abdalla,
Mihir Bellare,
Dario Catalano,
Eike Kiltz,
Tadayoshi Kohno,
Tanja Lange,
John Malone-Lee,
Gregory Neven,
Pascal Paillier,
Haixia Shi:
Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions.
CRYPTO 2005: 205-222 |
12 | EE | Michel Abdalla,
David Pointcheval:
Simple Password-Based Encrypted Key Exchange Protocols.
CT-RSA 2005: 191-208 |
11 | EE | Michel Abdalla,
David Pointcheval:
Interactive Diffie-Hellman Assumptions with Applications to Password-Based Authentication.
Financial Cryptography 2005: 341-356 |
10 | EE | Michel Abdalla,
Olivier Chevassut,
David Pointcheval:
One-Time Verifier-Based Encrypted Key Exchange.
Public Key Cryptography 2005: 47-64 |
9 | EE | Michel Abdalla,
Pierre-Alain Fouque,
David Pointcheval:
Password-Based Authenticated Key Exchange in the Three-Party Setting.
Public Key Cryptography 2005: 65-84 |
2004 |
8 | EE | Michel Abdalla,
Bogdan Warinschi:
On the Minimal Assumptions of Group Signature Schemes.
ICICS 2004: 1-13 |
2002 |
7 | EE | Michel Abdalla,
Jee Hea An,
Mihir Bellare,
Chanathip Namprempre:
From Identification to Signatures via the Fiat-Shamir Transform: Minimizing Assumptions for Security and Forward-Security.
EUROCRYPT 2002: 418-433 |
2001 |
6 | EE | Michel Abdalla,
Mihir Bellare,
Phillip Rogaway:
The Oracle Diffie-Hellman Assumptions and an Analysis of DHIES.
CT-RSA 2001: 143-158 |
5 | EE | Michel Abdalla,
Sara K. Miner,
Chanathip Namprempre:
Forward-Secure Threshold Signature Schemes.
CT-RSA 2001: 441-456 |
2000 |
4 | EE | Michel Abdalla,
Leonid Reyzin:
A New Forward-Secure Digital Signature Scheme.
ASIACRYPT 2000: 116-129 |
3 | EE | Michel Abdalla,
Mihir Bellare:
Increasing the Lifetime of a Key: A Comparative Analysis of the Security of Re-keying Techniques.
ASIACRYPT 2000: 546-559 |
2 | EE | Michel Abdalla,
Yuval Shavitt,
Avishai Wool:
Key management for restricted multicast using broadcast encryption.
IEEE/ACM Trans. Netw. 8(4): 443-454 (2000) |
1999 |
1 | EE | Michel Abdalla,
Yuval Shavitt,
Avishai Wool:
Towards Making Broadcast Encryption Practical.
Financial Cryptography 1999: 140-157 |