Skip to Main content Skip to Navigation

hal-00867887v1  Journal articles
Lokman Abbas-TurkiDamien Lamberton. European Options Sensitivity with Respect to the Correlation for Multidimensional Heston Models
International Journal of Theoretical and Applied Finance, World Scientific Publishing, 2014, 17 (03), pp.DOI: 10.1142/S0219024914500150
hal-01202019v1  Conference papers
Emanuela AbbateNejib ZemzemiYves CoudièreJean-Frédéric Gerbeau. In silico assessment of drugs effects on human embryonic stem cells derived cardiomyocytes electrical activity
LACM 2015 (2nd International Workshop on Latest Advances in Cardiac Modeling), Mar 2015, German Heart Center, Munich, Germany
hal-01132195v1  Reports
Michel AbdallaSonia BelaïdPierre-Alain Fouque. Leakage-Resilient Symmetric Encryption via Re-keying
[Technical Report] Cryptology ePrint Archive: Report 2015/204, IACR. 2015
inria-00539538v1  Directions of work or proceedings
Michel AbdallaDavid PointchevalPierre-Alain FouqueDamien Vergnaud. Proceedings of the 7th International Conference on Applied Cryptography and Network Security (ACNS '09)
Abdalla, Michel and Pointcheval, David and Fouque, Pierre-Alain and Vergnaud, Damien. 5536, Springer, pp.534, 2009, LNCS, 978-3-642-01957-9. ⟨10.1007/978-3-642-01957-9⟩
inria-00539541v1  Conference papers
Michel AbdallaCéline ChevalierMark ManulisDavid Pointcheval. Flexible Group Key Exchange with On-Demand Computation of Subgroup Keys
Third African International Conference on Cryptology (AfricaCrypt '10), 2010, Stellenbosch, South Africa. pp.351--368
inria-00419145v1  Conference papers
Michel AbdallaCéline ChevalierDavid Pointcheval. Smooth Projective Hashing for Conditionally Extractable Commitments
Advances in Cryptology -- Proceedings of CRYPTO '09, 2009, Santa-Barbara, Californie, United States. pp.671--689
inria-00419149v1  Conference papers
Michel AbdallaXavier BoyenCéline ChevalierDavid Pointcheval. Distributed Public-Key Cryptography from Weak Secrets
Conference on Practice and Theory in Public-Key Cryptography (PKC '09), 2009, Irvine, California, USA, United States. pp.139--159
inria-00419150v1  Conference papers
Michel AbdallaMalika IzabachèneDavid Pointcheval. Anonymous and Transparent Gateway-based Password-Authenticated Key Exchange
The 7th International Workshop on Cryptology and Network Security (CANS '08), 2008, Hong-Kong, China. pp.133--148
hal-00915836v1  Conference papers
Michel AbdallaMihir BellareGregory Neven. Robust Encryption
TCC 2010, Feb 2010, Zurich, Switzerland. pp.480-497, ⟨10.1007/978-3-642-11799-2_28⟩
inria-00419157v1  Conference papers
Michel AbdallaDario CatalanoCéline ChevalierDavid Pointcheval. Efficient Two-Party Password-Based Key Exchange Protocols in the UC Framework
The Cryptographers' Track at RSA Conference '08 (CT-RSA '08), 2008, San Francisco, Californie, Germany. pp.335--351
inria-00419147v1  Conference papers
Michel AbdallaDario CatalanoCéline ChevalierDavid Pointcheval. Password-Authenticated Group Key Agreement with Adaptive Security and Contributiveness
Second African International Conference on Cryptology (AfricaCrypt '09), 2009, Gammarth - Tunisie, Tunisia. pp.254--271
hal-00918539v1  Journal articles
Michel AbdallaEike KiltzGregory Neven. Generalised Key Delegation for Hierarchical Identity-Based Encryption
IET Information Security, Institution of Engineering and Technology, 2008, 2 (3), pp.67-78. ⟨10.1049/iet-ifs:20070124⟩
hal-00915816v1  Conference papers
Michel AbdallaJill-Jênn Vie. Leakage-Resilient Spatial Encryption
LATINCRYPT 2012, Oct 2012, Santiago, Chile. pp.78-99, ⟨10.1007/978-3-642-33481-8_5⟩
hal-00915848v1  Journal articles
Michel AbdallaJames BirkettDario CatalanoAlexander W. DentJohn Malone-Lee et al.  Wildcarded Identity-Based Encryption
Journal of Cryptology, Springer Verlag, 2011, 24 (1), pp.42-82. ⟨10.1007/s00145-010-9060-3⟩
hal-00915796v1  Directions of work or proceedings
Michel AbdallaTanja Lange. Pairing-Based Cryptography - PAIRING 2012
Michel Abdalla and Tanja Lange. 7708, Springer, pp.333, 2013, Lecture Notes in Computer Science, 978-3-642-36334-4. ⟨10.1007/978-3-642-36334-4⟩
tel-00917187v1  Habilitation à diriger des recherches
Michel Abdalla. Reducing The Need For Trusted Parties In Cryptography
Cryptography and Security [cs.CR]. Ecole Normale Supérieure de Paris - ENS Paris, 2011
hal-00918504v1  Journal articles
Michel AbdallaYuval ShavittAvishai Wool. Key management for restricted multicast using broadcast encryption
IEEE/ACM Transactions on Networking, IEEE/ACM, 2000, 8 (4), pp.443-454. ⟨10.1109/90.865073⟩
hal-01132190v1  Reports
Michel AbdallaFabrice BenhamoudaDavid Pointcheval. Tighter Reductions for Forward-Secure Signature Schemes
[Technical Report] Cryptology ePrint Archive: Report 2015/196, IACR. 2015
hal-00790626v1  Conference papers
Michel AbdallaFabrice Ben HamoudaDavid Pointcheval. Tighter Reductions for Forward-Secure Signature Scheme
Public-Key Cryptography (PKC 2013), Feb 2013, Nara, Japan. pp.292-311, ⟨10.1007/978-3-642-36362-7_19⟩