Skip to Main content Skip to Navigation

hal-00915848v1  Journal articles
Michel AbdallaJames BirkettDario CatalanoAlexander W. DentJohn Malone-Lee et al.  Wildcarded Identity-Based Encryption
Journal of Cryptology, Springer Verlag, 2011, 24 (1), pp.42-82. ⟨10.1007/s00145-010-9060-3⟩
inria-00419147v1  Conference papers
Michel AbdallaDario CatalanoCéline ChevalierDavid Pointcheval. Password-Authenticated Group Key Agreement with Adaptive Security and Contributiveness
Second African International Conference on Cryptology (AfricaCrypt '09), 2009, Gammarth - Tunisie, Tunisia. pp.254--271
hal-00918539v1  Journal articles
Michel AbdallaEike KiltzGregory Neven. Generalised Key Delegation for Hierarchical Identity-Based Encryption
IET Information Security, Institution of Engineering and Technology, 2008, 2 (3), pp.67-78. ⟨10.1049/iet-ifs:20070124⟩
hal-01132190v1  Reports
Michel AbdallaFabrice BenhamoudaDavid Pointcheval. Tighter Reductions for Forward-Secure Signature Schemes
[Technical Report] Cryptology ePrint Archive: Report 2015/196, IACR. 2015
hal-00915711v1  Directions of work or proceedings
Michel AbdallaCristina Nita-RotaruRicardo Dahab. CANS 2013
Michel Abdalla and Cristina Nita-Rotaru and Ricardo Dahab. 8257, Springer, pp.349, 2013, Lecture Notes in Computer Science, 978-3-319-02936-8. ⟨10.1007/978-3-319-02937-5⟩
hal-01068420v1  Reports
Michel AbdallaFabrice BenhamoudaDavid Pointcheval. Disjunctions for Hash Proof Systems: New Constructions and Applications
[Technical Report] Cryptology ePrint Archive: Report 2014/483, IACR. 2014
hal-00918401v1  Journal articles
Michel AbdallaPierre-Alain FouqueDavid Pointcheval. Password-Based Authenticated Key Exchange in the Three-Party Setting
IEE Proceedings - Information Security, Institution of Electrical Engineers (IEE), 2006, 153 (1), pp.27-39. ⟨10.1049/ip-ifs:20055073⟩
hal-00915836v1  Conference papers
Michel AbdallaMihir BellareGregory Neven. Robust Encryption
TCC 2010, Feb 2010, Zurich, Switzerland. pp.480-497, ⟨10.1007/978-3-642-11799-2_28⟩
hal-00915796v1  Directions of work or proceedings
Michel AbdallaTanja Lange. Pairing-Based Cryptography - PAIRING 2012
Michel Abdalla and Tanja Lange. 7708, Springer, pp.333, 2013, Lecture Notes in Computer Science, 978-3-642-36334-4. ⟨10.1007/978-3-642-36334-4⟩
hal-00918504v1  Journal articles
Michel AbdallaYuval ShavittAvishai Wool. Key management for restricted multicast using broadcast encryption
IEEE/ACM Transactions on Networking, IEEE/ACM, 2000, 8 (4), pp.443-454. ⟨10.1109/90.865073⟩
inria-00419149v1  Conference papers
Michel AbdallaXavier BoyenCéline ChevalierDavid Pointcheval. Distributed Public-Key Cryptography from Weak Secrets
Conference on Practice and Theory in Public-Key Cryptography (PKC '09), 2009, Irvine, California, USA, United States. pp.139--159
inria-00419145v1  Conference papers
Michel AbdallaCéline ChevalierDavid Pointcheval. Smooth Projective Hashing for Conditionally Extractable Commitments
Advances in Cryptology -- Proceedings of CRYPTO '09, 2009, Santa-Barbara, Californie, United States. pp.671--689
hal-00915816v1  Conference papers
Michel AbdallaJill-Jênn Vie. Leakage-Resilient Spatial Encryption
LATINCRYPT 2012, Oct 2012, Santiago, Chile. pp.78-99, ⟨10.1007/978-3-642-33481-8_5⟩
tel-00917187v1  Habilitation à diriger des recherches
Michel Abdalla. Reducing The Need For Trusted Parties In Cryptography
Cryptography and Security [cs.CR]. Ecole Normale Supérieure de Paris - ENS Paris, 2011
hal-00918522v1  Journal articles
Michel AbdallaAngelo de CaroDuong Hieu Phan. Generalized Key Delegation for Wildcarded Identity-Based and Inner-Product Encryption
IEEE Transactions on Information Forensics and Security, Institute of Electrical and Electronics Engineers, 2012, 7 (6), pp.1695-1706. ⟨10.1109/TIFS.2012.2213594⟩
hal-01132195v1  Reports
Michel AbdallaSonia BelaïdPierre-Alain Fouque. Leakage-Resilient Symmetric Encryption via Re-keying
[Technical Report] Cryptology ePrint Archive: Report 2015/204, IACR. 2015
inria-00419150v1  Conference papers
Michel AbdallaMalika IzabachèneDavid Pointcheval. Anonymous and Transparent Gateway-based Password-Authenticated Key Exchange
The 7th International Workshop on Cryptology and Network Security (CANS '08), 2008, Hong-Kong, China. pp.133--148
inria-00539541v1  Conference papers
Michel AbdallaCéline ChevalierMark ManulisDavid Pointcheval. Flexible Group Key Exchange with On-Demand Computation of Subgroup Keys
Third African International Conference on Cryptology (AfricaCrypt '10), 2010, Stellenbosch, South Africa. pp.351--368
inria-00419157v1  Conference papers
Michel AbdallaDario CatalanoCéline ChevalierDavid Pointcheval. Efficient Two-Party Password-Based Key Exchange Protocols in the UC Framework
The Cryptographers' Track at RSA Conference '08 (CT-RSA '08), 2008, San Francisco, Californie, Germany. pp.335--351
hal-00790626v1  Conference papers
Michel AbdallaFabrice Ben HamoudaDavid Pointcheval. Tighter Reductions for Forward-Secure Signature Scheme
Public-Key Cryptography (PKC 2013), Feb 2013, Nara, Japan. pp.292-311, ⟨10.1007/978-3-642-36362-7_19⟩
hal-01108287v1  Reports
Michel AbdallaFlorian BourseAngelo de CaroDavid Pointcheval. Simple Functional Encryption Schemes for Inner Products
[Technical Report] Cryptology ePrint Archive: Report 2015/017, IACR. 2015
hal-01068374v1  Directions of work or proceedings
Michel AbdallaRoberto de Prisco. Security and Cryptography for Networks - SCN 2014
Michel Abdalla; Roberto De Prisco. Security and Cryptography for Networks - SCN 2014, Sep 2014, Amalfi, Italy. 8642, Springer, pp.609, 2014, Lecture Notes in Computer Science, 978-3-319-10878-0. ⟨10.1007/978-3-319-10879-7⟩
hal-00915803v1  Directions of work or proceedings
Michel AbdallaPaulo S. L. M. Barreto. Progress in Cryptology - LATINCRYPT 2010
Michel Abdalla and Paulo Barreto. 6212, Springer, pp.323, 2010, Lecture Notes in Computer Science, 978-3-642-14711-1. ⟨10.1007/978-3-642-14712-8⟩
hal-01380699v1  Conference papers
Michel AbdallaMario CornejoAnca NitulescuDavid Pointcheval. Robust Password-Protected Secret Sharing
ESORICS 2016 - 21st European Symposium on Research in Computer Security, Sep 2016, Heraklion, Greece. pp.61-79, ⟨10.1007/978-3-319-45741-3_4⟩
hal-01068416v1  Reports
Michel AbdallaFabrice BenhamoudaDavid Pointcheval. Public-Key Encryption Indistinguishable Under Plaintext-Checkable Attacks
[Technical Report] Cryptology ePrint Archive: Report 2014/609, IACR. 2014
hal-01068442v1  Reports
Michel AbdallaFabrice BenhamoudaDavid Pointcheval. Removing Erasures with Explainable Hash Proof Systems
[Technical Report] Cryptology ePrint Archive: Report 2014/125, IACR. 2014
hal-01175785v1  Conference papers
Michel AbdallaFabrice BenhamoudaPhilip Mackenzie. Security of the J-PAKE Password-Authenticated Key Exchange Protocol
2015 IEEE Symposium on Security and Privacy, May 2015, San Jose, United States. pp.571-587, ⟨10.1109/SP.2015.41⟩
inria-00539538v1  Directions of work or proceedings
Michel AbdallaDavid PointchevalPierre-Alain FouqueDamien Vergnaud. Proceedings of the 7th International Conference on Applied Cryptography and Network Security (ACNS '09)
Abdalla, Michel and Pointcheval, David and Fouque, Pierre-Alain and Vergnaud, Damien. 5536, Springer, pp.534, 2009, LNCS, 978-3-642-01957-9. ⟨10.1007/978-3-642-01957-9⟩