Skip to Main content Skip to Navigation


hal-02391557v1  Conference papers
Michel AbdallaLeonid Reyzin. A New Forward-Secure Digital Signature Scheme
Advances in Cryptology - ASIACRYPT 2000, Dec 2000, Kyoto, Japan. pp.116-129, ⟨10.1007/3-540-44448-3_10⟩
hal-01524105v1  Conference papers
Michel AbdallaRomain GayMariana RaykovaHoeteck Wee. Multi-Input Inner-Product Functional Encryption from Pairings
EUROCRYPT 2017 - Advances in Cryptology, Apr 2017, Paris, France. pp.601-626, ⟨10.1007/978-3-319-56620-7_21⟩
hal-02391603v1  Conference papers
Michel AbdallaYuval ShavittAvishai Wool. Towards Making Broadcast Encryption Practical
Financial Cryptography - FC 1999, Feb 1999, Anguilla, Anguilla. pp.140-157, ⟨10.1007/3-540-48390-X_11⟩
hal-02391472v1  Conference papers
Michel AbdallaPierre-Alain FouqueDavid Pointcheval. Password-Based Authenticated Key Exchange in the Three-Party Setting
Public Key Cryptography - PKC 2005, Jan 2005, Les Diablerets, Switzerland. pp.65-84, ⟨10.1007/978-3-540-30580-4_6⟩
hal-02391427v1  Conference papers
Michel AbdallaEmmanuel BressonOlivier ChevassutDavid Pointcheval. Password-Based Group Key Exchange in a Constant Number of Rounds
Public Key Cryptography - PKC 2006, Apr 2009, New York, United States. pp.427-442, ⟨10.1007/11745853_28⟩
hal-02391537v1  Conference papers
Michel AbdallaMihir BellarePhillip Rogaway. The Oracle Diffie-Hellman Assumptions and an Analysis of DHIES
Topics in Cryptology - CT-RSA 2001, Apr 2001, San Francisco, United States. pp.143-158, ⟨10.1007/3-540-45353-9_12⟩
...
hal-02948657v1  Conference papers
Michel AbdallaFlorian BourseHugo MarivalDavid PointchevalAzam Soleimanian et al.  Multi-Client Inner-Product Functional Encryption in the Random-Oracle Model
SCN 2020 - 12th International Conference Security and Cryptography for Networks., Sep 2020, Amalfi / Virtual, Italy. pp.525-545, ⟨10.1007/978-3-030-57990-6_26⟩
hal-01380726v1  Reports
Michel AbdallaFlorian BourseAngelo de CaroDavid Pointcheval. Better Security for Functional Encryption for Inner Product Evaluations
[Technical Report] Cryptology ePrint Archive: Report 2016/011, IACR. 2016
hal-01380730v1  Reports
Michel AbdallaMario CornejoAnca NitulescuDavid Pointcheval. Robust Password-Protected Secret Sharing
[Technical Report] Cryptology ePrint Archive: Report 2016/123, IACR. 2016
hal-01380699v1  Conference papers
Michel AbdallaMario CornejoAnca NitulescuDavid Pointcheval. Robust Password-Protected Secret Sharing
ESORICS 2016 - 21st European Symposium on Research in Computer Security, Sep 2016, Heraklion, Greece. pp.61-79, ⟨10.1007/978-3-319-45741-3_4⟩
hal-01380735v1  Reports
Michel AbdallaRomain GayMariana RaykovaHoeteck Wee. Multi-Input Inner-Product Functional Encryption from Pairings
[Technical Report] Cryptology ePrint Archive: Report 2016/425, IACR. 2016
hal-01471896v1  Conference papers
Michel AbdallaFabrice BenhamoudaDavid Pointcheval. Removing Erasures with Explainable Hash Proof Systems
Public-Key Cryptography - PKC 2017 - 20th International Conference on Practice and Theory in Public-Key Cryptography, Mar 2017, Amsterdam, Netherlands. pp.151-174, ⟨10.1007/978-3-662-54365-8_7⟩
hal-02293219v1  Directions of work or proceedings
Michel AbdallaRicardo Dahab. Public-Key Cryptography – PKC 2018
Michel Abdalla; Ricardo Dahab. Public-Key Cryptography – PKC 2018, Mar 2018, Rio de Janeiro, Brazil. 10770, Springer, 2018, Lecture Notes in Computer Science, ⟨10.1007/978-3-319-76581-5⟩
hal-00790626v1  Conference papers
Michel AbdallaFabrice Ben HamoudaDavid Pointcheval. Tighter Reductions for Forward-Secure Signature Scheme
Public-Key Cryptography (PKC 2013), Feb 2013, Nara, Japan. pp.292-311, ⟨10.1007/978-3-642-36362-7_19⟩
hal-00915796v1  Directions of work or proceedings
Michel AbdallaTanja Lange. Pairing-Based Cryptography - PAIRING 2012
Michel Abdalla and Tanja Lange. 7708, Springer, pp.333, 2013, Lecture Notes in Computer Science, 978-3-642-36334-4. ⟨10.1007/978-3-642-36334-4⟩
hal-00915836v1  Conference papers
Michel AbdallaMihir BellareGregory Neven. Robust Encryption
TCC 2010, Feb 2010, Zurich, Switzerland. pp.480-497, ⟨10.1007/978-3-642-11799-2_28⟩
hal-00918522v1  Journal articles
Michel AbdallaAngelo de CaroDuong Hieu Phan. Generalized Key Delegation for Wildcarded Identity-Based and Inner-Product Encryption
IEEE Transactions on Information Forensics and Security, Institute of Electrical and Electronics Engineers, 2012, 7 (6), pp.1695-1706. ⟨10.1109/TIFS.2012.2213594⟩
...
inria-00419145v1  Conference papers
Michel AbdallaCéline ChevalierDavid Pointcheval. Smooth Projective Hashing for Conditionally Extractable Commitments
Advances in Cryptology -- Proceedings of CRYPTO '09, 2009, Santa-Barbara, Californie, United States. pp.671--689
...
inria-00539541v1  Conference papers
Michel AbdallaCéline ChevalierMark ManulisDavid Pointcheval. Flexible Group Key Exchange with On-Demand Computation of Subgroup Keys
Third African International Conference on Cryptology (AfricaCrypt '10), 2010, Stellenbosch, South Africa. pp.351--368
hal-01068442v1  Reports
Michel AbdallaFabrice BenhamoudaDavid Pointcheval. Removing Erasures with Explainable Hash Proof Systems
[Technical Report] Cryptology ePrint Archive: Report 2014/125, IACR. 2014
inria-00539538v1  Directions of work or proceedings
Michel AbdallaDavid PointchevalPierre-Alain FouqueDamien Vergnaud. Proceedings of the 7th International Conference on Applied Cryptography and Network Security (ACNS '09)
Abdalla, Michel and Pointcheval, David and Fouque, Pierre-Alain and Vergnaud, Damien. 5536, Springer, pp.534, 2009, LNCS, 978-3-642-01957-9. ⟨10.1007/978-3-642-01957-9⟩