Skip to Main content Skip to Navigation


hal-00915796v1  Directions of work or proceedings
Michel AbdallaTanja Lange. Pairing-Based Cryptography - PAIRING 2012
Michel Abdalla and Tanja Lange. 7708, Springer, pp.333, 2013, Lecture Notes in Computer Science, 978-3-642-36334-4. ⟨10.1007/978-3-642-36334-4⟩
hal-00915848v1  Journal articles
Michel AbdallaJames BirkettDario CatalanoAlexander W. DentJohn Malone-Lee et al.  Wildcarded Identity-Based Encryption
Journal of Cryptology, Springer Verlag, 2011, 24 (1), pp.42-82. ⟨10.1007/s00145-010-9060-3⟩
hal-00915836v1  Conference papers
Michel AbdallaMihir BellareGregory Neven. Robust Encryption
TCC 2010, Feb 2010, Zurich, Switzerland. pp.480-497, ⟨10.1007/978-3-642-11799-2_28⟩
hal-00918522v1  Journal articles
Michel AbdallaAngelo de CaroDuong Hieu Phan. Generalized Key Delegation for Wildcarded Identity-Based and Inner-Product Encryption
IEEE Transactions on Information Forensics and Security, Institute of Electrical and Electronics Engineers, 2012, 7 (6), pp.1695-1706. ⟨10.1109/TIFS.2012.2213594⟩
hal-01132195v1  Reports
Michel AbdallaSonia BelaïdPierre-Alain Fouque. Leakage-Resilient Symmetric Encryption via Re-keying
[Technical Report] Cryptology ePrint Archive: Report 2015/204, IACR. 2015
...
inria-00419145v1  Conference papers
Michel AbdallaCéline ChevalierDavid Pointcheval. Smooth Projective Hashing for Conditionally Extractable Commitments
Advances in Cryptology -- Proceedings of CRYPTO '09, 2009, Santa-Barbara, Californie, United States. pp.671--689
...
inria-00539541v1  Conference papers
Michel AbdallaCéline ChevalierMark ManulisDavid Pointcheval. Flexible Group Key Exchange with On-Demand Computation of Subgroup Keys
Third African International Conference on Cryptology (AfricaCrypt '10), 2010, Stellenbosch, South Africa. pp.351--368
...
inria-00419149v1  Conference papers
Michel AbdallaXavier BoyenCéline ChevalierDavid Pointcheval. Distributed Public-Key Cryptography from Weak Secrets
Conference on Practice and Theory in Public-Key Cryptography (PKC '09), 2009, Irvine, California, USA, United States. pp.139--159
hal-01068442v1  Reports
Michel AbdallaFabrice BenhamoudaDavid Pointcheval. Removing Erasures with Explainable Hash Proof Systems
[Technical Report] Cryptology ePrint Archive: Report 2014/125, IACR. 2014
inria-00539538v1  Directions of work or proceedings
Michel AbdallaDavid PointchevalPierre-Alain FouqueDamien Vergnaud. Proceedings of the 7th International Conference on Applied Cryptography and Network Security (ACNS '09)
Abdalla, Michel and Pointcheval, David and Fouque, Pierre-Alain and Vergnaud, Damien. 5536, Springer, pp.534, 2009, LNCS, 978-3-642-01957-9. ⟨10.1007/978-3-642-01957-9⟩
...
inria-00419150v1  Conference papers
Michel AbdallaMalika IzabachèneDavid Pointcheval. Anonymous and Transparent Gateway-based Password-Authenticated Key Exchange
The 7th International Workshop on Cryptology and Network Security (CANS '08), 2008, Hong-Kong, China. pp.133--148
...
inria-00419147v1  Conference papers
Michel AbdallaDario CatalanoCéline ChevalierDavid Pointcheval. Password-Authenticated Group Key Agreement with Adaptive Security and Contributiveness
Second African International Conference on Cryptology (AfricaCrypt '09), 2009, Gammarth - Tunisie, Tunisia. pp.254--271
hal-01068420v1  Reports
Michel AbdallaFabrice BenhamoudaDavid Pointcheval. Disjunctions for Hash Proof Systems: New Constructions and Applications
[Technical Report] Cryptology ePrint Archive: Report 2014/483, IACR. 2014
...
tel-00917187v1  Habilitation à diriger des recherches
Michel Abdalla. Reducing The Need For Trusted Parties In Cryptography
Cryptography and Security [cs.CR]. Ecole Normale Supérieure de Paris - ENS Paris, 2011
hal-00915816v1  Conference papers
Michel AbdallaJill-Jênn Vie. Leakage-Resilient Spatial Encryption
LATINCRYPT 2012, Oct 2012, Santiago, Chile. pp.78-99, ⟨10.1007/978-3-642-33481-8_5⟩
hal-00918539v1  Journal articles
Michel AbdallaEike KiltzGregory Neven. Generalised Key Delegation for Hierarchical Identity-Based Encryption
IET Information Security, Institution of Engineering and Technology, 2008, 2 (3), pp.67-78. ⟨10.1049/iet-ifs:20070124⟩
hal-02391396v1  Conference papers
Michel AbdallaChanathip NamprempreGregory Neven. On the (Im)possibility of Blind Message Authentication Codes
Topics in Cryptology - CT-RSA 2006, Feb 2006, San Jose, United States. pp.262-279, ⟨10.1007/11605805_17⟩
hal-02391547v1  Conference papers
Michel AbdallaSara MinerChanathip Namprempre. Forward-Secure Threshold Signature Schemes
Topics in Cryptology - 2001, Apr 2001, San Francisco, United States. pp.441-456, ⟨10.1007/3-540-45353-9_32⟩
hal-02391460v1  Conference papers
Michel AbdallaOlivier ChevassutDavid Pointcheval. One-Time Verifier-Based Encrypted Key Exchange
Public Key Cryptography - PKC 2005, Jan 2005, Les Diablerets, Switzerland. pp.47-64, ⟨10.1007/978-3-540-30580-4_5⟩