| 2009 |
| 32 | EE | Michel Abdalla,
Dario Catalano,
Dario Fiore:
Verifiable Random Functions from Identity-Based Key Encapsulation.
EUROCRYPT 2009: 554-571 |
| 31 | EE | Michel Abdalla,
Xavier Boyen,
Céline Chevalier,
David Pointcheval:
Distributed Public-Key Cryptography from Weak Secrets.
Public Key Cryptography 2009: 139-159 |
| 2008 |
| 30 | EE | Michel Abdalla,
Malika Izabachène,
David Pointcheval:
Anonymous and Transparent Gateway-Based Password-Authenticated Key Exchange.
CANS 2008: 133-148 |
| 29 | EE | Michel Abdalla,
Dario Catalano,
Céline Chevalier,
David Pointcheval:
Efficient Two-Party Password-Based Key Exchange Protocols in the UC Framework.
CT-RSA 2008: 335-351 |
| 28 | EE | Michel Abdalla,
Jee Hea An,
Mihir Bellare,
Chanathip Namprempre:
From Identification to Signatures Via the Fiat-Shamir Transform: Necessary and Sufficient Conditions for Security and Forward-Security.
IEEE Transactions on Information Theory 54(8): 3631-3646 (2008) |
| 27 | EE | Michel Abdalla,
Mihir Bellare,
Dario Catalano,
Eike Kiltz,
Tadayoshi Kohno,
Tanja Lange,
John Malone-Lee,
Gregory Neven,
Pascal Paillier,
Haixia Shi:
Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions.
J. Cryptology 21(3): 350-391 (2008) |
| 2007 |
| 26 | EE | Michel Abdalla,
Eike Kiltz,
Gregory Neven:
Generalized Key Delegation for Hierarchical Identity-Based Encryption.
ESORICS 2007: 139-154 |
| 25 | EE | Michel Abdalla,
Alexander W. Dent,
John Malone-Lee,
Gregory Neven,
Duong Hieu Phan,
Nigel P. Smart:
Identity-Based Traitor Tracing.
Public Key Cryptography 2007: 361-376 |
| 24 | EE | Michel Abdalla,
Jens-Matthias Bohli,
Maria Isabel Gonzalez Vasco,
Rainer Steinwandt:
(Password) Authenticated Key Establishment: From 2-Party to Group.
TCC 2007: 499-514 |
| 23 | EE | Chanathip Namprempre,
Gregory Neven,
Michel Abdalla:
A Study of Blind Message Authentication Codes.
IEICE Transactions 90-A(1): 75-82 (2007) |
| 22 | EE | Michel Abdalla,
Emmanuel Bresson,
Olivier Chevassut,
Bodo Möller,
David Pointcheval:
Strong password-based authentication in TLS using the three-party group Diffie?Hellman protocol.
IJSN 2(3/4): 284-296 (2007) |
| 2006 |
| 21 | EE | Michel Abdalla,
Emmanuel Bresson,
Olivier Chevassut,
Bodo Möller,
David Pointcheval:
Provably secure password-based authentication in TLS.
ASIACCS 2006: 35-45 |
| 20 | EE | Michel Abdalla,
David Pointcheval:
A Scalable Password-Based Group Key Exchange Protocol in the Standard Model.
ASIACRYPT 2006: 332-347 |
| 19 | EE | Michel Abdalla,
Chanathip Namprempre,
Gregory Neven:
On the (Im)possibility of Blind Message Authentication Codes.
CT-RSA 2006: 262-279 |
| 18 | EE | Thomas Claveirole,
Marcelo Dias de Amorim,
Michel Abdalla,
Yannis Viniotis:
Resisting against aggregator compromises in sensor networks.
CoNEXT 2006: 24 |
| 17 | EE | Michel Abdalla,
Dario Catalano,
Alexander W. Dent,
John Malone-Lee,
Gregory Neven,
Nigel P. Smart:
Identity-Based Encryption Gone Wild.
ICALP (2) 2006: 300-311 |
| 16 | EE | Michel Abdalla,
Emmanuel Bresson,
Olivier Chevassut,
David Pointcheval:
Password-Based Group Key Exchange in a Constant Number of Rounds.
Public Key Cryptography 2006: 427-442 |
| 15 | EE | Thomas Claveirole,
Marcelo Dias de Amorim,
Michel Abdalla,
Yannis Viniotis:
Share and Disperse: How to Resist Against Aggregator Compromises in Sensor Networks
CoRR abs/cs/0610084: (2006) |
| 2005 |
| 14 | EE | Michel Abdalla,
Olivier Chevassut,
Pierre-Alain Fouque,
David Pointcheval:
A Simple Threshold Authenticated Key Exchange from Short Secrets.
ASIACRYPT 2005: 566-584 |
| 13 | EE | Michel Abdalla,
Mihir Bellare,
Dario Catalano,
Eike Kiltz,
Tadayoshi Kohno,
Tanja Lange,
John Malone-Lee,
Gregory Neven,
Pascal Paillier,
Haixia Shi:
Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions.
CRYPTO 2005: 205-222 |
| 12 | EE | Michel Abdalla,
David Pointcheval:
Simple Password-Based Encrypted Key Exchange Protocols.
CT-RSA 2005: 191-208 |
| 11 | EE | Michel Abdalla,
David Pointcheval:
Interactive Diffie-Hellman Assumptions with Applications to Password-Based Authentication.
Financial Cryptography 2005: 341-356 |
| 10 | EE | Michel Abdalla,
Olivier Chevassut,
David Pointcheval:
One-Time Verifier-Based Encrypted Key Exchange.
Public Key Cryptography 2005: 47-64 |
| 9 | EE | Michel Abdalla,
Pierre-Alain Fouque,
David Pointcheval:
Password-Based Authenticated Key Exchange in the Three-Party Setting.
Public Key Cryptography 2005: 65-84 |
| 2004 |
| 8 | EE | Michel Abdalla,
Bogdan Warinschi:
On the Minimal Assumptions of Group Signature Schemes.
ICICS 2004: 1-13 |
| 2002 |
| 7 | EE | Michel Abdalla,
Jee Hea An,
Mihir Bellare,
Chanathip Namprempre:
From Identification to Signatures via the Fiat-Shamir Transform: Minimizing Assumptions for Security and Forward-Security.
EUROCRYPT 2002: 418-433 |
| 2001 |
| 6 | EE | Michel Abdalla,
Mihir Bellare,
Phillip Rogaway:
The Oracle Diffie-Hellman Assumptions and an Analysis of DHIES.
CT-RSA 2001: 143-158 |
| 5 | EE | Michel Abdalla,
Sara K. Miner,
Chanathip Namprempre:
Forward-Secure Threshold Signature Schemes.
CT-RSA 2001: 441-456 |
| 2000 |
| 4 | EE | Michel Abdalla,
Leonid Reyzin:
A New Forward-Secure Digital Signature Scheme.
ASIACRYPT 2000: 116-129 |
| 3 | EE | Michel Abdalla,
Mihir Bellare:
Increasing the Lifetime of a Key: A Comparative Analysis of the Security of Re-keying Techniques.
ASIACRYPT 2000: 546-559 |
| 2 | EE | Michel Abdalla,
Yuval Shavitt,
Avishai Wool:
Key management for restricted multicast using broadcast encryption.
IEEE/ACM Trans. Netw. 8(4): 443-454 (2000) |
| 1999 |
| 1 | EE | Michel Abdalla,
Yuval Shavitt,
Avishai Wool:
Towards Making Broadcast Encryption Practical.
Financial Cryptography 1999: 140-157 |