What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Michel Abdalla
Google Scholar
ORCID:
0000-0002-2447-4329
67
publications in security and cryptology related venues
Year
Venue
Title
2022
conf/crypto
Password-Authenticated Key Exchange from Group Actions.
Michel Abdalla
Thorsten Eisenhofer
Eike Kiltz
Sabrina Kunzweiler
Doreen Riepel
2021
journals/istr
Practical dynamic group signature with efficient concurrent joins and batch verifications.
Hyoseung Kim
Youngkyung Lee
Michel Abdalla
Jong Hwan Park
2021
conf/asiacrypt
Algebraic Adversaries in the Universal Composability Framework.
Michel Abdalla
Manuel Barbosa
Jonathan Katz
Julian Loss
Jiayu Xu
2021
conf/asiacrypt
Security Analysis of CPace.
Michel Abdalla
Björn Haase
Julia Hesse
2020
conf/crypto
Universally Composable Relaxed Password Authenticated Key Exchange.
Michel Abdalla
Manuel Barbosa
Tatiana Bradley
Stanislaw Jarecki
Jonathan Katz
Jiayu Xu
2020
conf/crypto
Functional Encryption for Attribute-Weighted Sums from k-Lin.
Michel Abdalla
Junqing Gong
Hoeteck Wee
2020
conf/asiacrypt
Inner-Product Functional Encryption with Fine-Grained Access Control.
Michel Abdalla
Dario Catalano
Romain Gay
Bogdan Ursu
2019
journals/joc
On the Tightness of Forward-Secure Signature Reductions.
Michel Abdalla
Fabrice Benhamouda
David Pointcheval
2019
conf/pkc
Decentralizing Inner-Product Functional Encryption.
Michel Abdalla
Fabrice Benhamouda
Markulf Kohlweiss
Hendrik Waldner
2019
conf/asiacrypt
Algebraic XOR-RKA-Secure Pseudorandom Functions from Post-Zeroizing Multilinear Maps.
Michel Abdalla
Fabrice Benhamouda
Alain Passelègue
2019
conf/asiacrypt
From Single-Input to Multi-client Inner-Product Functional Encryption.
Michel Abdalla
Fabrice Benhamouda
Romain Gay
2018
journals/joc
Robust Encryption.
Michel Abdalla
Mihir Bellare
Gregory Neven
2018
journals/joc
Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier.
Michel Abdalla
Fabrice Benhamouda
Alain Passelègue
Kenneth G. Paterson
2018
conf/crypto
Multi-Input Functional Encryption for Inner Products: Function-Hiding Realizations and Constructions Without Pairings.
Michel Abdalla
Dario Catalano
Dario Fiore
Romain Gay
Bogdan Ursu
2017
conf/pkc
Removing Erasures with Explainable Hash Proof Systems.
Michel Abdalla
Fabrice Benhamouda
David Pointcheval
2017
conf/eurocrypt
Multi-input Inner-Product Functional Encryption from Pairings.
Michel Abdalla
Romain Gay
Mariana Raykova
Hoeteck Wee
2016
journals/joc
Tightly Secure Signatures From Lossy Identification Schemes.
Michel Abdalla
Pierre-Alain Fouque
Vadim Lyubashevsky
Mehdi Tibouchi
2016
conf/esorics
Robust Password-Protected Secret Sharing.
Michel Abdalla
Mario Cornejo
Anca Nitulescu
David Pointcheval
2015
conf/crypto
An Algebraic Framework for Pseudorandom Functions and Applications to Related-Key Security.
Michel Abdalla
Fabrice Benhamouda
Alain Passelègue
2015
conf/sp
Security of the J-PAKE Password-Authenticated Key Exchange Protocol.
Michel Abdalla
Fabrice Benhamouda
Philip MacKenzie
2015
conf/acns
Robust Pseudo-Random Number Generators with Input Secure Against Side-Channel Attacks.
Michel Abdalla
Sonia Belaïd
David Pointcheval
Sylvain Ruhault
Damien Vergnaud
2015
conf/pkc
Public-Key Encryption Indistinguishable Under Plaintext-Checkable Attacks.
Michel Abdalla
Fabrice Benhamouda
David Pointcheval
2015
conf/pkc
Simple Functional Encryption Schemes for Inner Products.
Michel Abdalla
Florian Bourse
Angelo De Caro
David Pointcheval
2015
conf/eurocrypt
Disjunctions for Hash Proof Systems: New Constructions and Applications.
Michel Abdalla
Fabrice Benhamouda
David Pointcheval
2015
conf/asiacrypt
Multilinear and Aggregate Pseudorandom Functions: New Constructions and Improved Security.
Michel Abdalla
Fabrice Benhamouda
Alain Passelègue
2014
journals/joc
Verifiable Random Functions: Relations to Identity-Based Key Encapsulation and New Constructions.
Michel Abdalla
Dario Catalano
Dario Fiore
2014
conf/crypto
Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier.
Michel Abdalla
Fabrice Benhamouda
Alain Passelègue
Kenneth G. Paterson
2014
conf/provsec
Password-Based Authenticated Key Exchange: An Overview.
Michel Abdalla
2013
conf/ches
Leakage-Resilient Symmetric Encryption via Re-keying.
Michel Abdalla
Sonia Belaïd
Pierre-Alain Fouque
2013
conf/pkc
Tighter Reductions for Forward-Secure Signature Schemes.
Michel Abdalla
Fabrice Ben Hamouda
David Pointcheval
2013
conf/asiacrypt
SPHF-Friendly Non-interactive Commitments.
Michel Abdalla
Fabrice Benhamouda
Olivier Blazy
Céline Chevalier
David Pointcheval
2012
journals/tifs
Generalized Key Delegation for Wildcarded Identity-Based and Inner-Product Encryption.
Michel Abdalla
Angelo De Caro
Duong Hieu Phan
2012
conf/latincrypt
Lattice-Based Hierarchical Inner Product Encryption.
Michel Abdalla
Angelo De Caro
Karina Mochetti
2012
conf/latincrypt
Leakage-Resilient Spatial Encryption.
Michel Abdalla
Jill-Jênn Vie
2012
conf/pkc
From Selective to Full Security: Semi-generic Transformations in the Standard Model.
Michel Abdalla
Dario Fiore
Vadim Lyubashevsky
2012
conf/eurocrypt
Tightly-Secure Signatures from Lossy Identification Schemes.
Michel Abdalla
Pierre-Alain Fouque
Vadim Lyubashevsky
Mehdi Tibouchi
2011
journals/joc
Wildcarded Identity-Based Encryption.
Michel Abdalla
James Birkett
Dario Catalano
Alexander W. Dent
John Malone-Lee
Gregory Neven
Jacob C. N. Schuldt
Nigel P. Smart
2011
conf/ctrsa
Contributory Password-Authenticated Group Key Exchange with Join Capability.
Michel Abdalla
Céline Chevalier
Louis Granboulan
David Pointcheval
2010
conf/africacrypt
Flexible Group Key Exchange with On-demand Computation of Subgroup Keys.
Michel Abdalla
Céline Chevalier
Mark Manulis
David Pointcheval
2010
conf/tcc
Robust Encryption.
Michel Abdalla
Mihir Bellare
Gregory Neven
2009
conf/crypto
Smooth Projective Hashing for Conditionally Extractable Commitments.
Michel Abdalla
Céline Chevalier
David Pointcheval
2009
conf/pkc
Distributed Public-Key Cryptography from Weak Secrets.
Michel Abdalla
Xavier Boyen
Céline Chevalier
David Pointcheval
2009
conf/eurocrypt
Verifiable Random Functions from Identity-Based Key Encapsulation.
Michel Abdalla
Dario Catalano
Dario Fiore
2009
conf/africacrypt
Password-Authenticated Group Key Agreement with Adaptive Security and Contributiveness.
Michel Abdalla
Dario Catalano
Céline Chevalier
David Pointcheval
2008
journals/joc
Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions.
Michel Abdalla
Mihir Bellare
Dario Catalano
Eike Kiltz
Tadayoshi Kohno
Tanja Lange
John Malone-Lee
Gregory Neven
Pascal Paillier
Haixia Shi
2008
conf/ctrsa
Efficient Two-Party Password-Based Key Exchange Protocols in the UC Framework.
Michel Abdalla
Dario Catalano
Céline Chevalier
David Pointcheval
2008
conf/cans
Anonymous and Transparent Gateway-Based Password-Authenticated Key Exchange.
Michel Abdalla
Malika Izabachène
David Pointcheval
2007
conf/esorics
Generalized Key Delegation for Hierarchical Identity-Based Encryption.
Michel Abdalla
Eike Kiltz
Gregory Neven
2007
conf/pkc
Identity-Based Traitor Tracing.
Michel Abdalla
Alexander W. Dent
John Malone-Lee
Gregory Neven
Duong Hieu Phan
Nigel P. Smart
2007
conf/tcc
(Password) Authenticated Key Establishment: From 2-Party to Group.
Michel Abdalla
Jens-Matthias Bohli
María Isabel González Vasco
Rainer Steinwandt
2006
conf/ccs
Provably secure password-based authentication in TLS.
Michel Abdalla
Emmanuel Bresson
Olivier Chevassut
Bodo Möller
David Pointcheval
2006
conf/pkc
Password-Based Group Key Exchange in a Constant Number of Rounds.
Michel Abdalla
Emmanuel Bresson
Olivier Chevassut
David Pointcheval
2006
conf/ctrsa
On the (Im)possibility of Blind Message Authentication Codes.
Michel Abdalla
Chanathip Namprempre
Gregory Neven
2006
conf/asiacrypt
A Scalable Password-Based Group Key Exchange Protocol in the Standard Model.
Michel Abdalla
David Pointcheval
2005
conf/crypto
Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions.
Michel Abdalla
Mihir Bellare
Dario Catalano
Eike Kiltz
Tadayoshi Kohno
Tanja Lange
John Malone-Lee
Gregory Neven
Pascal Paillier
Haixia Shi
2005
conf/fc
Interactive Diffie-Hellman Assumptions with Applications to Password-Based Authentication.
Michel Abdalla
David Pointcheval
2005
conf/pkc
Password-Based Authenticated Key Exchange in the Three-Party Setting.
Michel Abdalla
Pierre-Alain Fouque
David Pointcheval
2005
conf/pkc
One-Time Verifier-Based Encrypted Key Exchange.
Michel Abdalla
Olivier Chevassut
David Pointcheval
2005
conf/ctrsa
Simple Password-Based Encrypted Key Exchange Protocols.
Michel Abdalla
David Pointcheval
2005
conf/asiacrypt
A Simple Threshold Authenticated Key Exchange from Short Secrets.
Michel Abdalla
Olivier Chevassut
Pierre-Alain Fouque
David Pointcheval
2004
conf/icics
On the Minimal Assumptions of Group Signature Schemes.
Michel Abdalla
Bogdan Warinschi
2002
conf/eurocrypt
From Identification to Signatures via the Fiat-Shamir Transform: Minimizing Assumptions for Security and Forward-Security.
Michel Abdalla
Jee Hea An
Mihir Bellare
Chanathip Namprempre
2001
conf/ctrsa
Forward-Secure Threshold Signature Schemes.
Michel Abdalla
Sara K. Miner
Chanathip Namprempre
2001
conf/ctrsa
The Oracle Diffie-Hellman Assumptions and an Analysis of DHIES.
Michel Abdalla
Mihir Bellare
Phillip Rogaway
2000
conf/asiacrypt
Increasing the Lifetime of a Key: A Comparative Analysis of the Security of Re-keying Techniques.
Michel Abdalla
Mihir Bellare
2000
conf/asiacrypt
A New Forward-Secure Digital Signature Scheme.
Michel Abdalla
Leonid Reyzin
1999
conf/fc
Towards Making Broadcast Encryption Practical.
Michel Abdalla
Yuval Shavitt
Avishai Wool
Coauthors
Alain Passelègue
(5)
Alexander W. Dent
(2)
Anca Nitulescu
(1)
Angelo De Caro
(3)
Avishai Wool
(1)
Björn Haase
(1)
Bodo Möller
(1)
Bogdan Ursu
(2)
Bogdan Warinschi
(1)
Céline Chevalier
(7)
Chanathip Namprempre
(3)
Damien Vergnaud
(1)
Dario Catalano
(9)
Dario Fiore
(4)
David Pointcheval
(24)
Doreen Riepel
(1)
Duong Hieu Phan
(2)
Eike Kiltz
(4)
Emmanuel Bresson
(2)
Fabrice Ben Hamouda
(1)
Fabrice Benhamouda
(13)
Florian Bourse
(1)
Gregory Neven
(8)
Haixia Shi
(2)
Hendrik Waldner
(1)
Hoeteck Wee
(2)
Hyoseung Kim
(1)
Jacob C. N. Schuldt
(1)
James Birkett
(1)
Jee Hea An
(1)
Jens-Matthias Bohli
(1)
Jiayu Xu
(2)
Jill-Jênn Vie
(1)
John Malone-Lee
(4)
Jonathan Katz
(2)
Jong Hwan Park
(1)
Julia Hesse
(1)
Julian Loss
(1)
Junqing Gong
(1)
Karina Mochetti
(1)
Kenneth G. Paterson
(2)
Leonid Reyzin
(1)
Louis Granboulan
(1)
Malika Izabachène
(1)
Manuel Barbosa
(2)
María Isabel González Vasco
(1)
Mariana Raykova
(1)
Mario Cornejo
(1)
Mark Manulis
(1)
Markulf Kohlweiss
(1)
Mehdi Tibouchi
(2)
Michel Abdalla
(67)
Mihir Bellare
(7)
Nigel P. Smart
(2)
Olivier Blazy
(1)
Olivier Chevassut
(4)
Pascal Paillier
(2)
Philip MacKenzie
(1)
Phillip Rogaway
(1)
Pierre-Alain Fouque
(5)
Rainer Steinwandt
(1)
Romain Gay
(4)
Sabrina Kunzweiler
(1)
Sara K. Miner
(1)
Sonia Belaïd
(2)
Stanislaw Jarecki
(1)
Sylvain Ruhault
(1)
Tadayoshi Kohno
(2)
Tanja Lange
(2)
Tatiana Bradley
(1)
Thorsten Eisenhofer
(1)
Vadim Lyubashevsky
(3)
Xavier Boyen
(1)
Youngkyung Lee
(1)
Yuval Shavitt
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to