The SCEAS System
Navigation Menu

Search the dblp DataBase


Michel Abdalla: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Michel Abdalla, Mihir Bellare
    Increasing the Lifetime of a Key: A Comparative Analysis of the Security of Re-keying Techniques. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2000, pp:546-559 [Conf]
  2. Michel Abdalla, Olivier Chevassut, Pierre-Alain Fouque, David Pointcheval
    A Simple Threshold Authenticated Key Exchange from Short Secrets. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2005, pp:566-584 [Conf]
  3. Michel Abdalla, David Pointcheval
    A Scalable Password-Based Group Key Exchange Protocol in the Standard Model. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2006, pp:332-347 [Conf]
  4. Michel Abdalla, Leonid Reyzin
    A New Forward-Secure Digital Signature Scheme. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2000, pp:116-129 [Conf]
  5. Michel Abdalla, Emmanuel Bresson, Olivier Chevassut, Bodo Möller, David Pointcheval
    Provably secure password-based authentication in TLS. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2006, pp:35-45 [Conf]
  6. Michel Abdalla, Mihir Bellare, Dario Catalano, Eike Kiltz, Tadayoshi Kohno, Tanja Lange, John Malone-Lee, Gregory Neven, Pascal Paillier, Haixia Shi
    Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2005, pp:205-222 [Conf]
  7. Michel Abdalla, Mihir Bellare, Phillip Rogaway
    The Oracle Diffie-Hellman Assumptions and an Analysis of DHIES. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2001, pp:143-158 [Conf]
  8. Michel Abdalla, Sara K. Miner, Chanathip Namprempre
    Forward-Secure Threshold Signature Schemes. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2001, pp:441-456 [Conf]
  9. Michel Abdalla, Chanathip Namprempre, Gregory Neven
    On the (Im)possibility of Blind Message Authentication Codes. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2006, pp:262-279 [Conf]
  10. Michel Abdalla, David Pointcheval
    Simple Password-Based Encrypted Key Exchange Protocols. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2005, pp:191-208 [Conf]
  11. Michel Abdalla, Jee Hea An, Mihir Bellare, Chanathip Namprempre
    From Identification to Signatures via the Fiat-Shamir Transform: Minimizing Assumptions for Security and Forward-Security. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2002, pp:418-433 [Conf]
  12. Michel Abdalla, David Pointcheval
    Interactive Diffie-Hellman Assumptions with Applications to Password-Based Authentication. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2005, pp:341-356 [Conf]
  13. Michel Abdalla, Yuval Shavitt, Avishai Wool
    Towards Making Broadcast Encryption Practical. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 1999, pp:140-157 [Conf]
  14. Michel Abdalla, Dario Catalano, Alexander W. Dent, John Malone-Lee, Gregory Neven, Nigel P. Smart
    Identity-Based Encryption Gone Wild. [Citation Graph (0, 0)][DBLP]
    ICALP (2), 2006, pp:300-311 [Conf]
  15. Michel Abdalla, Bogdan Warinschi
    On the Minimal Assumptions of Group Signature Schemes. [Citation Graph (0, 0)][DBLP]
    ICICS, 2004, pp:1-13 [Conf]
  16. Michel Abdalla, Emmanuel Bresson, Olivier Chevassut, David Pointcheval
    Password-Based Group Key Exchange in a Constant Number of Rounds. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2006, pp:427-442 [Conf]
  17. Michel Abdalla, Olivier Chevassut, David Pointcheval
    One-Time Verifier-Based Encrypted Key Exchange. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2005, pp:47-64 [Conf]
  18. Michel Abdalla, Pierre-Alain Fouque, David Pointcheval
    Password-Based Authenticated Key Exchange in the Three-Party Setting. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2005, pp:65-84 [Conf]
  19. Michel Abdalla, Jens-Matthias Bohli, Maria Isabel Gonzalez Vasco, Rainer Steinwandt
    (Password) Authenticated Key Establishment: From 2-Party to Group. [Citation Graph (0, 0)][DBLP]
    TCC, 2007, pp:499-514 [Conf]
  20. Michel Abdalla, Yuval Shavitt, Avishai Wool
    Key management for restricted multicast using broadcast encryption. [Citation Graph (0, 0)][DBLP]
    IEEE/ACM Trans. Netw., 2000, v:8, n:4, pp:443-454 [Journal]
  21. Michel Abdalla, Eike Kiltz, Gregory Neven
    Generalized Key Delegation for Hierarchical Identity-Based Encryption. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2007, pp:139-154 [Conf]
  22. Michel Abdalla, Alexander W. Dent, John Malone-Lee, Gregory Neven, Duong Hieu Phan, Nigel P. Smart
    Identity-Based Traitor Tracing. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2007, pp:361-376 [Conf]
  23. Thomas Claveirole, Marcelo Dias de Amorim, Michel Abdalla, Yannis Viniotis
    Share and Disperse: How to Resist Against Aggregator Compromises in Sensor Networks [Citation Graph (0, 0)][DBLP]
    CoRR, 2006, v:0, n:, pp:- [Journal]

  24. Anonymous and Transparent Gateway-Based Password-Authenticated Key Exchange. [Citation Graph (, )][DBLP]

  25. Smooth Projective Hashing for Conditionally Extractable Commitments. [Citation Graph (, )][DBLP]

  26. Efficient Two-Party Password-Based Key Exchange Protocols in the UC Framework. [Citation Graph (, )][DBLP]

  27. Verifiable Random Functions from Identity-Based Key Encapsulation. [Citation Graph (, )][DBLP]

  28. Distributed Public-Key Cryptography from Weak Secrets. [Citation Graph (, )][DBLP]

  29. Robust Encryption. [Citation Graph (, )][DBLP]

  30. Resisting against aggregator compromises in sensor networks. [Citation Graph (, )][DBLP]

  31. Password-Authenticated Group Key Agreement with Adaptive Security and Contributiveness. [Citation Graph (, )][DBLP]

  32. Flexible Group Key Exchange with On-demand Computation of Subgroup Keys. [Citation Graph (, )][DBLP]

Search in 0.028secs, Finished in 0.029secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002