HAL will be down for maintenance from Friday, June 10 at 4pm through Monday, June 13 at 9am. More information
Skip to Main content Skip to Navigation


hal-02391557v1  Conference papers
Michel AbdallaLeonid Reyzin. A New Forward-Secure Digital Signature Scheme
Advances in Cryptology - ASIACRYPT 2000, Dec 2000, Kyoto, Japan. pp.116-129, ⟨10.1007/3-540-44448-3_10⟩
inria-00539538v1  Directions of work or proceedings
Michel AbdallaDavid PointchevalPierre-Alain FouqueDamien Vergnaud. Proceedings of the 7th International Conference on Applied Cryptography and Network Security (ACNS '09)
Abdalla, Michel and Pointcheval, David and Fouque, Pierre-Alain and Vergnaud, Damien. 5536, Springer, pp.534, 2009, LNCS, 978-3-642-01957-9. ⟨10.1007/978-3-642-01957-9⟩
hal-00918522v1  Journal articles
Michel AbdallaAngelo de CaroDuong Hieu Phan. Generalized Key Delegation for Wildcarded Identity-Based and Inner-Product Encryption
IEEE Transactions on Information Forensics and Security, Institute of Electrical and Electronics Engineers, 2012, 7 (6), pp.1695-1706. ⟨10.1109/TIFS.2012.2213594⟩
hal-00915803v1  Directions of work or proceedings
Michel AbdallaPaulo S. L. M. Barreto. Progress in Cryptology - LATINCRYPT 2010
Michel Abdalla and Paulo Barreto. 6212, Springer, pp.323, 2010, Lecture Notes in Computer Science, 978-3-642-14711-1. ⟨10.1007/978-3-642-14712-8⟩
...
inria-00419149v1  Conference papers
Michel AbdallaXavier BoyenCéline ChevalierDavid Pointcheval. Distributed Public-Key Cryptography from Weak Secrets
Conference on Practice and Theory in Public-Key Cryptography (PKC '09), 2009, Irvine, California, USA, United States. pp.139--159
...
inria-00419157v1  Conference papers
Michel AbdallaDario CatalanoCéline ChevalierDavid Pointcheval. Efficient Two-Party Password-Based Key Exchange Protocols in the UC Framework
The Cryptographers' Track at RSA Conference '08 (CT-RSA '08), 2008, San Francisco, Californie, Germany. pp.335--351
...
inria-00539541v1  Conference papers
Michel AbdallaCéline ChevalierMark ManulisDavid Pointcheval. Flexible Group Key Exchange with On-Demand Computation of Subgroup Keys
Third African International Conference on Cryptology (AfricaCrypt '10), 2010, Stellenbosch, South Africa. pp.351--368
hal-00918368v1  Journal articles
Thomas ClaveiroleMarcelo Dias de AmorimMichel AbdallaYannis Viniotis. Securing Wireless Sensor Networks Against Aggregator Compromises
IEEE Communications Magazine, Institute of Electrical and Electronics Engineers, 2008, 46 (4), pp.134-141. ⟨10.1109/MCOM.2008.4481352⟩
...
inria-00419147v1  Conference papers
Michel AbdallaDario CatalanoCéline ChevalierDavid Pointcheval. Password-Authenticated Group Key Agreement with Adaptive Security and Contributiveness
Second African International Conference on Cryptology (AfricaCrypt '09), 2009, Gammarth - Tunisie, Tunisia. pp.254--271
...
inria-00419145v1  Conference papers
Michel AbdallaCéline ChevalierDavid Pointcheval. Smooth Projective Hashing for Conditionally Extractable Commitments
Advances in Cryptology -- Proceedings of CRYPTO '09, 2009, Santa-Barbara, Californie, United States. pp.671--689
hal-00918539v1  Journal articles
Michel AbdallaEike KiltzGregory Neven. Generalised Key Delegation for Hierarchical Identity-Based Encryption
IET Information Security, Institution of Engineering and Technology, 2008, 2 (3), pp.67-78. ⟨10.1049/iet-ifs:20070124⟩
hal-00918388v1  Journal articles
Chanathip NamprempreGregory NevenMichel Abdalla. A Study of Blind Message Authentication Codes
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Institute of Electronics, Information and Communication Engineers, 2007, E90-A (1), pp.75-82. ⟨10.1093/ietfec/e90-a.1.75⟩
hal-00915848v1  Journal articles
Michel AbdallaJames BirkettDario CatalanoAlexander W. DentJohn Malone-Lee et al.  Wildcarded Identity-Based Encryption
Journal of Cryptology, Springer Verlag, 2011, 24 (1), pp.42-82. ⟨10.1007/s00145-010-9060-3⟩
...
hal-02948674v1  Conference papers
Michel AbdallaJunqing GongHoeteck Wee. Functional Encryption for Attribute-Weighted Sums from k-Lin
CRYPTO 2020 - 40th Annual International Cryptology Conference, Aug 2020, Santa Barbara / Virtual, United States. pp.685-716, ⟨10.1007/978-3-030-56784-2_23⟩
hal-01524105v1  Conference papers
Michel AbdallaRomain GayMariana RaykovaHoeteck Wee. Multi-Input Inner-Product Functional Encryption from Pairings
EUROCRYPT 2017 - Advances in Cryptology, Apr 2017, Paris, France. pp.601-626, ⟨10.1007/978-3-319-56620-7_21⟩
hal-00915796v1  Directions of work or proceedings
Michel AbdallaTanja Lange. Pairing-Based Cryptography - PAIRING 2012
Michel Abdalla and Tanja Lange. 7708, Springer, pp.333, 2013, Lecture Notes in Computer Science, 978-3-642-36334-4. ⟨10.1007/978-3-642-36334-4⟩
hal-00915816v1  Conference papers
Michel AbdallaJill-Jênn Vie. Leakage-Resilient Spatial Encryption
LATINCRYPT 2012, Oct 2012, Santiago, Chile. pp.78-99, ⟨10.1007/978-3-642-33481-8_5⟩
hal-00918401v1  Journal articles
Michel AbdallaPierre-Alain FouqueDavid Pointcheval. Password-Based Authenticated Key Exchange in the Three-Party Setting
IEE Proceedings - Information Security, Institution of Electrical Engineers (IEE), 2006, 153 (1), pp.27-39. ⟨10.1049/ip-ifs:20055073⟩
hal-00790626v1  Conference papers
Michel AbdallaFabrice BenhamoudaDavid Pointcheval. Tighter Reductions for Forward-Secure Signature Scheme
Public-Key Cryptography (PKC 2013), Feb 2013, Nara, Japan. pp.292-311, ⟨10.1007/978-3-642-36362-7_19⟩
...
inria-00419150v1  Conference papers
Michel AbdallaMalika IzabachèneDavid Pointcheval. Anonymous and Transparent Gateway-based Password-Authenticated Key Exchange
The 7th International Workshop on Cryptology and Network Security (CANS '08), 2008, Hong-Kong, China. pp.133--148