|
Search the dblp DataBase
Michel Abdalla:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Michel Abdalla, Mihir Bellare
Increasing the Lifetime of a Key: A Comparative Analysis of the Security of Re-keying Techniques. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 2000, pp:546-559 [Conf]
- Michel Abdalla, Olivier Chevassut, Pierre-Alain Fouque, David Pointcheval
A Simple Threshold Authenticated Key Exchange from Short Secrets. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 2005, pp:566-584 [Conf]
- Michel Abdalla, David Pointcheval
A Scalable Password-Based Group Key Exchange Protocol in the Standard Model. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 2006, pp:332-347 [Conf]
- Michel Abdalla, Leonid Reyzin
A New Forward-Secure Digital Signature Scheme. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 2000, pp:116-129 [Conf]
- Michel Abdalla, Emmanuel Bresson, Olivier Chevassut, Bodo Möller, David Pointcheval
Provably secure password-based authentication in TLS. [Citation Graph (0, 0)][DBLP] ASIACCS, 2006, pp:35-45 [Conf]
- Michel Abdalla, Mihir Bellare, Dario Catalano, Eike Kiltz, Tadayoshi Kohno, Tanja Lange, John Malone-Lee, Gregory Neven, Pascal Paillier, Haixia Shi
Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions. [Citation Graph (0, 0)][DBLP] CRYPTO, 2005, pp:205-222 [Conf]
- Michel Abdalla, Mihir Bellare, Phillip Rogaway
The Oracle Diffie-Hellman Assumptions and an Analysis of DHIES. [Citation Graph (0, 0)][DBLP] CT-RSA, 2001, pp:143-158 [Conf]
- Michel Abdalla, Sara K. Miner, Chanathip Namprempre
Forward-Secure Threshold Signature Schemes. [Citation Graph (0, 0)][DBLP] CT-RSA, 2001, pp:441-456 [Conf]
- Michel Abdalla, Chanathip Namprempre, Gregory Neven
On the (Im)possibility of Blind Message Authentication Codes. [Citation Graph (0, 0)][DBLP] CT-RSA, 2006, pp:262-279 [Conf]
- Michel Abdalla, David Pointcheval
Simple Password-Based Encrypted Key Exchange Protocols. [Citation Graph (0, 0)][DBLP] CT-RSA, 2005, pp:191-208 [Conf]
- Michel Abdalla, Jee Hea An, Mihir Bellare, Chanathip Namprempre
From Identification to Signatures via the Fiat-Shamir Transform: Minimizing Assumptions for Security and Forward-Security. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 2002, pp:418-433 [Conf]
- Michel Abdalla, David Pointcheval
Interactive Diffie-Hellman Assumptions with Applications to Password-Based Authentication. [Citation Graph (0, 0)][DBLP] Financial Cryptography, 2005, pp:341-356 [Conf]
- Michel Abdalla, Yuval Shavitt, Avishai Wool
Towards Making Broadcast Encryption Practical. [Citation Graph (0, 0)][DBLP] Financial Cryptography, 1999, pp:140-157 [Conf]
- Michel Abdalla, Dario Catalano, Alexander W. Dent, John Malone-Lee, Gregory Neven, Nigel P. Smart
Identity-Based Encryption Gone Wild. [Citation Graph (0, 0)][DBLP] ICALP (2), 2006, pp:300-311 [Conf]
- Michel Abdalla, Bogdan Warinschi
On the Minimal Assumptions of Group Signature Schemes. [Citation Graph (0, 0)][DBLP] ICICS, 2004, pp:1-13 [Conf]
- Michel Abdalla, Emmanuel Bresson, Olivier Chevassut, David Pointcheval
Password-Based Group Key Exchange in a Constant Number of Rounds. [Citation Graph (0, 0)][DBLP] Public Key Cryptography, 2006, pp:427-442 [Conf]
- Michel Abdalla, Olivier Chevassut, David Pointcheval
One-Time Verifier-Based Encrypted Key Exchange. [Citation Graph (0, 0)][DBLP] Public Key Cryptography, 2005, pp:47-64 [Conf]
- Michel Abdalla, Pierre-Alain Fouque, David Pointcheval
Password-Based Authenticated Key Exchange in the Three-Party Setting. [Citation Graph (0, 0)][DBLP] Public Key Cryptography, 2005, pp:65-84 [Conf]
- Michel Abdalla, Jens-Matthias Bohli, Maria Isabel Gonzalez Vasco, Rainer Steinwandt
(Password) Authenticated Key Establishment: From 2-Party to Group. [Citation Graph (0, 0)][DBLP] TCC, 2007, pp:499-514 [Conf]
- Michel Abdalla, Yuval Shavitt, Avishai Wool
Key management for restricted multicast using broadcast encryption. [Citation Graph (0, 0)][DBLP] IEEE/ACM Trans. Netw., 2000, v:8, n:4, pp:443-454 [Journal]
- Michel Abdalla, Eike Kiltz, Gregory Neven
Generalized Key Delegation for Hierarchical Identity-Based Encryption. [Citation Graph (0, 0)][DBLP] ESORICS, 2007, pp:139-154 [Conf]
- Michel Abdalla, Alexander W. Dent, John Malone-Lee, Gregory Neven, Duong Hieu Phan, Nigel P. Smart
Identity-Based Traitor Tracing. [Citation Graph (0, 0)][DBLP] Public Key Cryptography, 2007, pp:361-376 [Conf]
- Thomas Claveirole, Marcelo Dias de Amorim, Michel Abdalla, Yannis Viniotis
Share and Disperse: How to Resist Against Aggregator Compromises in Sensor Networks [Citation Graph (0, 0)][DBLP] CoRR, 2006, v:0, n:, pp:- [Journal]
Anonymous and Transparent Gateway-Based Password-Authenticated Key Exchange. [Citation Graph (, )][DBLP]
Smooth Projective Hashing for Conditionally Extractable Commitments. [Citation Graph (, )][DBLP]
Efficient Two-Party Password-Based Key Exchange Protocols in the UC Framework. [Citation Graph (, )][DBLP]
Verifiable Random Functions from Identity-Based Key Encapsulation. [Citation Graph (, )][DBLP]
Distributed Public-Key Cryptography from Weak Secrets. [Citation Graph (, )][DBLP]
Robust Encryption. [Citation Graph (, )][DBLP]
Resisting against aggregator compromises in sensor networks. [Citation Graph (, )][DBLP]
Password-Authenticated Group Key Agreement with Adaptive Security and Contributiveness. [Citation Graph (, )][DBLP]
Flexible Group Key Exchange with On-demand Computation of Subgroup Keys. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.326secs
|