Skip to Main content Skip to Navigation

hal-00915848v1  Journal articles
Michel AbdallaJames BirkettDario CatalanoAlexander W. DentJohn Malone-Lee et al.  Wildcarded Identity-Based Encryption
Journal of Cryptology, Springer Verlag, 2011, 24 (1), pp.42-82. ⟨10.1007/s00145-010-9060-3⟩
inria-00419147v1  Conference papers
Michel AbdallaDario CatalanoCéline ChevalierDavid Pointcheval. Password-Authenticated Group Key Agreement with Adaptive Security and Contributiveness
Second African International Conference on Cryptology (AfricaCrypt '09), 2009, Gammarth - Tunisie, Tunisia. pp.254--271
hal-00918539v1  Journal articles
Michel AbdallaEike KiltzGregory Neven. Generalised Key Delegation for Hierarchical Identity-Based Encryption
IET Information Security, Institution of Engineering and Technology, 2008, 2 (3), pp.67-78. ⟨10.1049/iet-ifs:20070124⟩
hal-01132190v1  Reports
Michel AbdallaFabrice BenhamoudaDavid Pointcheval. Tighter Reductions for Forward-Secure Signature Schemes
[Technical Report] Cryptology ePrint Archive: Report 2015/196, IACR. 2015
hal-00915711v1  Directions of work or proceedings
Michel AbdallaCristina Nita-RotaruRicardo Dahab. CANS 2013
Michel Abdalla and Cristina Nita-Rotaru and Ricardo Dahab. 8257, Springer, pp.349, 2013, Lecture Notes in Computer Science, 978-3-319-02936-8. ⟨10.1007/978-3-319-02937-5⟩
hal-01068420v1  Reports
Michel AbdallaFabrice BenhamoudaDavid Pointcheval. Disjunctions for Hash Proof Systems: New Constructions and Applications
[Technical Report] Cryptology ePrint Archive: Report 2014/483, IACR. 2014
hal-00918401v1  Journal articles
Michel AbdallaPierre-Alain FouqueDavid Pointcheval. Password-Based Authenticated Key Exchange in the Three-Party Setting
IEE Proceedings - Information Security, Institution of Electrical Engineers (IEE), 2006, 153 (1), pp.27-39. ⟨10.1049/ip-ifs:20055073⟩
hal-00915836v1  Conference papers
Michel AbdallaMihir BellareGregory Neven. Robust Encryption
TCC 2010, Feb 2010, Zurich, Switzerland. pp.480-497, ⟨10.1007/978-3-642-11799-2_28⟩
hal-00915796v1  Directions of work or proceedings
Michel AbdallaTanja Lange. Pairing-Based Cryptography - PAIRING 2012
Michel Abdalla and Tanja Lange. 7708, Springer, pp.333, 2013, Lecture Notes in Computer Science, 978-3-642-36334-4. ⟨10.1007/978-3-642-36334-4⟩
hal-00918504v1  Journal articles
Michel AbdallaYuval ShavittAvishai Wool. Key management for restricted multicast using broadcast encryption
IEEE/ACM Transactions on Networking, IEEE/ACM, 2000, 8 (4), pp.443-454. ⟨10.1109/90.865073⟩
inria-00419149v1  Conference papers
Michel AbdallaXavier BoyenCéline ChevalierDavid Pointcheval. Distributed Public-Key Cryptography from Weak Secrets
Conference on Practice and Theory in Public-Key Cryptography (PKC '09), 2009, Irvine, California, USA, United States. pp.139--159
inria-00419145v1  Conference papers
Michel AbdallaCéline ChevalierDavid Pointcheval. Smooth Projective Hashing for Conditionally Extractable Commitments
Advances in Cryptology -- Proceedings of CRYPTO '09, 2009, Santa-Barbara, Californie, United States. pp.671--689
hal-00915816v1  Conference papers
Michel AbdallaJill-Jênn Vie. Leakage-Resilient Spatial Encryption
LATINCRYPT 2012, Oct 2012, Santiago, Chile. pp.78-99, ⟨10.1007/978-3-642-33481-8_5⟩
tel-00917187v1  Habilitation à diriger des recherches
Michel Abdalla. Reducing The Need For Trusted Parties In Cryptography
Cryptography and Security [cs.CR]. Ecole Normale Supérieure de Paris - ENS Paris, 2011
hal-00918522v1  Journal articles
Michel AbdallaAngelo de CaroDuong Hieu Phan. Generalized Key Delegation for Wildcarded Identity-Based and Inner-Product Encryption
IEEE Transactions on Information Forensics and Security, Institute of Electrical and Electronics Engineers, 2012, 7 (6), pp.1695-1706. ⟨10.1109/TIFS.2012.2213594⟩
hal-01132195v1  Reports
Michel AbdallaSonia BelaïdPierre-Alain Fouque. Leakage-Resilient Symmetric Encryption via Re-keying
[Technical Report] Cryptology ePrint Archive: Report 2015/204, IACR. 2015