Michel Abdalla
Michel Abdalla
Dirección de correo verificada de ens.fr - Página principal
Título
Citado por
Citado por
Año
Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions
M Abdalla, M Bellare, D Catalano, E Kiltz, T Kohno, T Lange, ...
Advances in Cryptology — CRYPTO 2005, 205-222, 2005
5972005
Password-based authenticated key exchange in the three-party setting
M Abdalla, PA Fouque, D Pointcheval
Public-Key Cryptography — PKC 2005, 65-84, 2005
4762005
The oracle Diffie-Hellman assumptions and an analysis of DHIES
M Abdalla, M Bellare, P Rogaway
Topics in Cryptology — CT-RSA 2001, 143-158, 2001
4552001
Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions
M Abdalla, M Bellare, D Catalano, E Kiltz, T Kohno, T Lange, ...
Journal of Cryptology 21 (3), 350-391, 2008
3712008
Simple Password-Based Encrypted Key Exchange Protocols
M Abdalla, D Pointcheval
Topics in Cryptology — CT-RSA 2005 3376, 191-208, 2005
3452005
A new forward-secure digital signature scheme
M Abdalla, L Reyzin
Advances in Cryptology — ASIACRYPT 2000, 116-129, 2000
3372000
DHIES: An encryption scheme based on the Diffie-Hellman problem
M Abdalla, M Bellare, P Rogaway
Submission to IEEE P1363a 280, 1998
1961998
From identification to signatures via the Fiat-Shamir transform: Minimizing assumptions for security and forward-security
M Abdalla, JH An, M Bellare, C Namprempre
Advances in Cryptology — EUROCRYPT 2002, 418-433, 2002
1672002
Interactive Diffie-Hellman assumptions with applications to password-based authentication
M Abdalla, D Pointcheval
FC 2005, 341-356, 2005
1492005
Simple functional encryption schemes for inner products
M Abdalla, F Bourse, A De Caro, D Pointcheval
Public-Key Cryptography — PKC 2015, 733-751, 2015
1342015
Password-based group key exchange in a constant number of rounds
M Abdalla, E Bresson, O Chevassut, D Pointcheval
Public-Key Cryptography — PKC 2006, 427-442, 2006
1342006
Identity-based encryption gone wild
M Abdalla, D Catalano, AW Dent, J Malone-Lee, G Neven, NP Smart
ICALP 2006, 300-311, 2006
1282006
Increasing the lifetime of a key: a comparative analysis of the security of re-keying techniques
M Abdalla, M Bellare
Advances in Cryptology — ASIACRYPT 2000, 546-559, 2000
1282000
One-time verifier-based encrypted key exchange
M Abdalla, O Chevassut, D Pointcheval
Public-Key Cryptography — PKC 2005, 47-64, 2005
1252005
Robust encryption
M Abdalla, M Bellare, G Neven
Theory of Cryptography Conference — TCC 2010, 480-497, 2010
1242010
Forward-secure threshold signature schemes
M Abdalla, S Miner, C Namprempre
Topics in Cryptology — CT-RSA 2001, 441-456, 2001
1232001
Key management for restricted multicast using broadcast encryption
M Abdalla, Y Shavitt, A Wool
IEEE/ACM Transactions on Networking 8 (4), 443-454, 2000
1082000
Smooth Projective Hashing for Conditionally Extractable Commitments.
M Abdalla, C Chevalier, D Pointcheval
Advances in Cryptology — CRYPTO 2009, 671-689, 2009
882009
Generalized key delegation for hierarchical identity-based encryption
M Abdalla, E Kiltz, G Neven
Computer Security — ESORICS 2007, 139-154, 2007
802007
Password-based authenticated key exchange in the three-party setting
M Abdalla, PA Fouque, D Pointcheval
IEE Proceedings-Information Security 153 (1), 27-39, 2006
732006
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20