Cryptographers' World
 

Michel Abdalla


Author's Web Page Link

22 papers in database with 1182 citations StarStar

Editor of 1 conference proceedings book

H-number: 15

Conference Proceedings

 
1. Michel AbdallaDavid PointchevalPierre-Alain FouqueDamien Vergnaud, editors, Applied Cryptography and Network Security, 7th International Conference, ACNS 2009, Paris-Rocquencourt, France, June 2-5, 2009. Proceedings. Springer, 2009. ISBN 978-3-642-01956-2.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

Journal Papers

[Sort papers chronologically] [Sort papers by citations count]

 
1. Michel Abdalla,  Mihir Bellare,  Dario Catalano,  Eike Kiltz,  Tadayoshi Kohno,  Tanja Lange,  John Malone-Lee,  Gregory Neven,  Pascal Paillier,  Haixia Shi,  Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions, Journal of Cryptology, Volume 21(3), pp. 350 - 391, Springer, 2008.

[Cited 83 times Red Star]

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Michel Abdalla,  CĂ©line Chevalier,  David Pointcheval,  Smooth Projective Hashing for Conditionally Extractable Commitments, pp. 671 - 689, CRYPTO 2009.

[Electronic Edition][Cited 4 times ]

2. Michel Abdalla,  Dario Catalano,  Dario Fiore,  Verifiable Random Functions from Identity-Based Key Encapsulation, pp. 554 - 571, EUROCRYPT 2009.

[Electronic Edition][Cited 7 times ]

3. Michel Abdalla,  Xavier Boyen,  CĂ©line Chevalier,  David Pointcheval,  Distributed Public-Key Cryptography from Weak Secrets, pp. 139 - 159, PKC 2009.

[Electronic Edition][Cited 2 times ]

4. Michel Abdalla,  Dario Catalano,  CĂ©line Chevalier,  David Pointcheval,  Efficient Two-Party Password-Based Key Exchange Protocols in the UC Framework, pp. 335 - 351, CT-RSA 2008.

[Electronic Edition][Cited 15 times ]

5. Michel Abdalla,  Alexander W. Dent,  John Malone-Lee,  Gregory Neven,  Duong Hieu Phan,  Nigel P. Smart,  Identity-Based Traitor Tracing, pp. 361 - 376, PKC 2007.

[Electronic Edition][Cited 8 times ]

6. Michel Abdalla,  Jens-Matthias Bohli,  Maria Isabel Gonzalez Vasco,  Rainer Steinwandt,  (Password) Authenticated Key Establishment: From 2-Party to Group, pp. 499 - 514, TCC 2007.

[Electronic Edition][Cited 16 times ]

7. Michel Abdalla,  Emmanuel Bresson,  Olivier Chevassut,  David Pointcheval,  Password-Based Group Key Exchange in a Constant Number of Rounds, pp. 427 - 442, PKC 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 63 times Red Star]

8. Michel Abdalla,  Chanathip Namprempre,  Gregory Neven,  On the (Im)possibility of Blind Message Authentication Codes, pp. 262 - 279, CT-RSA 2006.

[Electronic Edition][Cited 9 times ]

9. Michel Abdalla,  David Pointcheval,  A Scalable Password-Based Group Key Exchange Protocol in the Standard Model, pp. 332 - 347, ASIACRYPT 2006.

[Electronic Edition][Cited 26 times ]

10. Michel Abdalla,  Olivier Chevassut,  Pierre-Alain Fouque,  David Pointcheval,  A Simple Threshold Authenticated Key Exchange from Short Secrets, pp. 566 - 584, ASIACRYPT 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 17 times ]

11. Michel Abdalla,  Mihir Bellare,  Dario Catalano,  Eike Kiltz,  Tadayoshi Kohno,  Tanja Lange,  John Malone-Lee,  Gregory Neven,  Pascal Paillier,  Haixia Shi,  Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions, pp. 205 - 222, CRYPTO 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 154 times Red StarRed Star]

12. Michel Abdalla,  David Pointcheval,  Simple Password-Based Encrypted Key Exchange Protocols, pp. 191 - 208, CT-RSA 2005.

[Electronic Edition][Cited 86 times Red Star]

13. Michel Abdalla,  David Pointcheval,  Interactive Diffie-Hellman Assumptions with Applications to Password-Based Authentication, pp. 341 - 356, FC 2005.

[Electronic Edition][Cited 65 times Red Star]

14. Michel Abdalla,  Olivier Chevassut,  David Pointcheval,  One-Time Verifier-Based Encrypted Key Exchange, pp. 47 - 64, PKC 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 61 times Red Star]

15. Michel Abdalla,  Pierre-Alain Fouque,  David Pointcheval,  Password-Based Authenticated Key Exchange in the Three-Party Setting, pp. 65 - 84, PKC 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 147 times Red StarRed Star]

16. Michel Abdalla,  Jee Hea An,  Mihir Bellare,  Chanathip Namprempre,  From Identification to Signatures via the Fiat-Shamir Transform: Minimizing Assumptions for Security and Forward-Security, pp. 418 - 433, EUROCRYPT 2002.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 60 times Red Star]

17. Michel Abdalla,  Mihir Bellare,  Phillip Rogaway,  The Oracle Diffie-Hellman Assumptions and an Analysis of DHIES, pp. 143 - 158, CT-RSA 2001.

[Electronic Edition][Cited 154 times Red StarRed Star]

18. Michel Abdalla,  Sara K. Miner,  Chanathip Namprempre,  Forward-Secure Threshold Signature Schemes, pp. 441 - 456, CT-RSA 2001.

[Electronic Edition][Cited 56 times Red Star]

19. Michel Abdalla,  Mihir Bellare,  Increasing the Lifetime of a Key: A Comparative Analysis of the Security of Re-keying Techniques, pp. 546 - 559, ASIACRYPT 2000.

[Electronic Edition][Cited 46 times ]

20. Michel Abdalla,  Leonid Reyzin,  A New Forward-Secure Digital Signature Scheme, pp. 116 - 129, ASIACRYPT 2000.

[Electronic Edition][Cited 160 times Red StarRed Star]

21. Michel Abdalla,  Yuval Shavitt,  Avishai Wool,  Towards Making Broadcast Encryption Practical, pp. 140 - 157, FC 1999.

[Electronic Edition][Cited 26 times ]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...