Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Michel Abdalla
@article{DBLP:journals/dcc/KimSAP23, author = {Hyoseung Kim and Olivier Sanders and Michel Abdalla and Jong Hwan Park}, title = {Practical dynamic group signatures without knowledge extractors}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {3}, pages = {853--893}, year = {2023}, url = {https://doi.org/10.1007/s10623-022-01129-w}, doi = {10.1007/S10623-022-01129-W}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/KimSAP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AbdallaEKKR22, author = {Michel Abdalla and Thorsten Eisenhofer and Eike Kiltz and Sabrina Kunzweiler and Doreen Riepel}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Password-Authenticated Key Exchange from Group Actions}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13508}, pages = {699--728}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15979-4\_24}, doi = {10.1007/978-3-031-15979-4\_24}, timestamp = {Sun, 13 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/AbdallaEKKR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbdallaEKKR22, author = {Michel Abdalla and Thorsten Eisenhofer and Eike Kiltz and Sabrina Kunzweiler and Doreen Riepel}, title = {Password-Authenticated Key Exchange from Group Actions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {770}, year = {2022}, url = {https://eprint.iacr.org/2022/770}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbdallaEKKR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/KimLAP21, author = {Hyoseung Kim and Youngkyung Lee and Michel Abdalla and Jong Hwan Park}, title = {Practical dynamic group signature with efficient concurrent joins and batch verifications}, journal = {J. Inf. Secur. Appl.}, volume = {63}, pages = {103003}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.103003}, doi = {10.1016/J.JISA.2021.103003}, timestamp = {Mon, 29 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/KimLAP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/AbdallaBKLX21, author = {Michel Abdalla and Manuel Barbosa and Jonathan Katz and Julian Loss and Jiayu Xu}, editor = {Mehdi Tibouchi and Huaxiong Wang}, title = {Algebraic Adversaries in the Universal Composability Framework}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13092}, pages = {311--341}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-92078-4\_11}, doi = {10.1007/978-3-030-92078-4\_11}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/AbdallaBKLX21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/AbdallaHH21, author = {Michel Abdalla and Bj{\"{o}}rn Haase and Julia Hesse}, editor = {Mehdi Tibouchi and Huaxiong Wang}, title = {Security Analysis of CPace}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {13093}, pages = {711--741}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-92068-5\_24}, doi = {10.1007/978-3-030-92068-5\_24}, timestamp = {Sat, 25 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/AbdallaHH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbdallaPS21, author = {Michel Abdalla and David Pointcheval and Azam Soleimanian}, title = {2-Step Multi-Client Quadratic Functional Encryption from Decentralized Function-Hiding Inner-Product}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1}, year = {2021}, url = {https://eprint.iacr.org/2021/001}, timestamp = {Tue, 02 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/AbdallaPS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WaldnerMSA21, author = {Hendrik Waldner and Tilen Marc and Miha Stopar and Michel Abdalla}, title = {Private Stream Aggregation from Labeled Secret Sharing Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {81}, year = {2021}, url = {https://eprint.iacr.org/2021/081}, timestamp = {Tue, 02 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/WaldnerMSA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbdallaHH21, author = {Michel Abdalla and Bj{\"{o}}rn Haase and Julia Hesse}, title = {Security Analysis of CPace}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {114}, year = {2021}, url = {https://eprint.iacr.org/2021/114}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/AbdallaHH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KimSAP21, author = {Hyoseung Kim and Olivier Sanders and Michel Abdalla and Jong Hwan Park}, title = {Practical Dynamic Group Signatures Without Knowledge Extractors}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {351}, year = {2021}, url = {https://eprint.iacr.org/2021/351}, timestamp = {Mon, 29 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KimSAP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbdallaBRRS21, author = {Michel Abdalla and Manuel Barbosa and Peter B. R{\o}nne and Peter Y. A. Ryan and Petra Sala}, title = {Security Characterization of {J-PAKE} and its Variants}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {824}, year = {2021}, url = {https://eprint.iacr.org/2021/824}, timestamp = {Wed, 07 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbdallaBRRS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbdallaBKLX21, author = {Michel Abdalla and Manuel Barbosa and Jonathan Katz and Julian Loss and Jiayu Xu}, title = {Algebraic Adversaries in the Universal Composability Framework}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1218}, year = {2021}, url = {https://eprint.iacr.org/2021/1218}, timestamp = {Mon, 25 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbdallaBKLX21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/AbdallaBP20, author = {Michel Abdalla and Fabrice Benhamouda and David Pointcheval}, title = {Corrigendum: Public-key encryption indistinguishable under plaintext-checkable attacks}, journal = {{IET} Inf. Secur.}, volume = {14}, number = {3}, pages = {365--366}, year = {2020}, url = {https://doi.org/10.1049/iet-ifs.2019.0200}, doi = {10.1049/IET-IFS.2019.0200}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/AbdallaBP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/AbdallaCGU20, author = {Michel Abdalla and Dario Catalano and Romain Gay and Bogdan Ursu}, editor = {Shiho Moriai and Huaxiong Wang}, title = {Inner-Product Functional Encryption with Fine-Grained Access Control}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12493}, pages = {467--497}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64840-4\_16}, doi = {10.1007/978-3-030-64840-4\_16}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/AbdallaCGU20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AbdallaBBJKX20, author = {Michel Abdalla and Manuel Barbosa and Tatiana Bradley and Stanislaw Jarecki and Jonathan Katz and Jiayu Xu}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {Universally Composable Relaxed Password Authenticated Key Exchange}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12170}, pages = {278--307}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56784-2\_10}, doi = {10.1007/978-3-030-56784-2\_10}, timestamp = {Wed, 26 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AbdallaBBJKX20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AbdallaGW20, author = {Michel Abdalla and Junqing Gong and Hoeteck Wee}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {Functional Encryption for Attribute-Weighted Sums from k-Lin}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12170}, pages = {685--716}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56784-2\_23}, doi = {10.1007/978-3-030-56784-2\_23}, timestamp = {Thu, 07 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AbdallaGW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/AbdallaBMPSW20, author = {Michel Abdalla and Florian Bourse and Hugo Marival and David Pointcheval and Azam Soleimanian and Hendrik Waldner}, editor = {Clemente Galdi and Vladimir Kolesnikov}, title = {Multi-Client Inner-Product Functional Encryption in the Random-Oracle Model}, booktitle = {Security and Cryptography for Networks - 12th International Conference, {SCN} 2020, Amalfi, Italy, September 14-16, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12238}, pages = {525--545}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-57990-6\_26}, doi = {10.1007/978-3-030-57990-6\_26}, timestamp = {Sat, 19 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/AbdallaBMPSW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbdallaBBJKX20, author = {Michel Abdalla and Manuel Barbosa and Tatiana Bradley and Stanislaw Jarecki and Jonathan Katz and Jiayu Xu}, title = {Universally Composable Relaxed Password Authenticated Key Exchange}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {320}, year = {2020}, url = {https://eprint.iacr.org/2020/320}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbdallaBBJKX20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbdallaCGU20, author = {Michel Abdalla and Dario Catalano and Romain Gay and Bogdan Ursu}, title = {Inner-Product Functional Encryption with Fine-Grained Access Control}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {577}, year = {2020}, url = {https://eprint.iacr.org/2020/577}, timestamp = {Wed, 27 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbdallaCGU20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbdallaGW20, author = {Michel Abdalla and Junqing Gong and Hoeteck Wee}, title = {Functional Encryption for Attribute-Weighted Sums from k-Lin}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {762}, year = {2020}, url = {https://eprint.iacr.org/2020/762}, timestamp = {Thu, 07 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbdallaGW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbdallaBMPSW20, author = {Michel Abdalla and Florian Bourse and Hugo Marival and David Pointcheval and Azam Soleimanian and Hendrik Waldner}, title = {Multi-Client Inner-Product Functional Encryption in the Random-Oracle Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {788}, year = {2020}, url = {https://eprint.iacr.org/2020/788}, timestamp = {Mon, 27 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbdallaBMPSW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Abdalla20, author = {Michel Abdalla}, title = {Security Analysis of Olvid's SAS-based Trust Establishment Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {808}, year = {2020}, url = {https://eprint.iacr.org/2020/808}, timestamp = {Mon, 27 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Abdalla20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KimLAP20, author = {Hyoseung Kim and Youngkyung Lee and Michel Abdalla and Jong Hwan Park}, title = {Practical Dynamic Group Signature with Efficient Concurrent Joins and Batch Verifications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {921}, year = {2020}, url = {https://eprint.iacr.org/2020/921}, timestamp = {Mon, 29 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KimLAP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/SeoALP19, author = {Minhye Seo and Michel Abdalla and Dong Hoon Lee and Jong Hwan Park}, title = {New technique for chosen-ciphertext security based on non-interactive zero-knowledge}, journal = {Inf. Sci.}, volume = {490}, pages = {18--35}, year = {2019}, url = {https://doi.org/10.1016/j.ins.2019.03.063}, doi = {10.1016/J.INS.2019.03.063}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/SeoALP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/AbdallaBP19, author = {Michel Abdalla and Fabrice Benhamouda and David Pointcheval}, title = {On the Tightness of Forward-Secure Signature Reductions}, journal = {J. Cryptol.}, volume = {32}, number = {1}, pages = {84--150}, year = {2019}, url = {https://doi.org/10.1007/s00145-018-9283-2}, doi = {10.1007/S00145-018-9283-2}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/AbdallaBP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/AbdallaBP19, author = {Michel Abdalla and Fabrice Benhamouda and Alain Passel{\`{e}}gue}, editor = {Steven D. Galbraith and Shiho Moriai}, title = {Algebraic XOR-RKA-Secure Pseudorandom Functions from Post-Zeroizing Multilinear Maps}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8-12, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11922}, pages = {386--412}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34621-8\_14}, doi = {10.1007/978-3-030-34621-8\_14}, timestamp = {Tue, 26 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/AbdallaBP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/AbdallaBG19, author = {Michel Abdalla and Fabrice Benhamouda and Romain Gay}, editor = {Steven D. Galbraith and Shiho Moriai}, title = {From Single-Input to Multi-client Inner-Product Functional Encryption}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8-12, 2019, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11923}, pages = {552--582}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34618-8\_19}, doi = {10.1007/978-3-030-34618-8\_19}, timestamp = {Tue, 26 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/AbdallaBG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/AbdallaBKW19, author = {Michel Abdalla and Fabrice Benhamouda and Markulf Kohlweiss and Hendrik Waldner}, editor = {Dongdai Lin and Kazue Sako}, title = {Decentralizing Inner-Product Functional Encryption}, booktitle = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11443}, pages = {128--157}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17259-6\_5}, doi = {10.1007/978-3-030-17259-6\_5}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/AbdallaBKW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbdallaBKW19, author = {Michel Abdalla and Fabrice Benhamouda and Markulf Kohlweiss and Hendrik Waldner}, title = {Decentralizing Inner-Product Functional Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {20}, year = {2019}, url = {https://eprint.iacr.org/2019/020}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbdallaBKW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbdallaBG19, author = {Michel Abdalla and Fabrice Benhamouda and Romain Gay}, title = {From Single-Input to Multi-Client Inner-Product Functional Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {487}, year = {2019}, url = {https://eprint.iacr.org/2019/487}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbdallaBG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbdallaB19, author = {Michel Abdalla and Manuel Barbosa}, title = {Perfect Forward Security of {SPAKE2}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1194}, year = {2019}, url = {https://eprint.iacr.org/2019/1194}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbdallaB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/AbdallaBN18, author = {Michel Abdalla and Mihir Bellare and Gregory Neven}, title = {Robust Encryption}, journal = {J. Cryptol.}, volume = {31}, number = {2}, pages = {307--350}, year = {2018}, url = {https://doi.org/10.1007/s00145-017-9258-8}, doi = {10.1007/S00145-017-9258-8}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/AbdallaBN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/AbdallaBPP18, author = {Michel Abdalla and Fabrice Benhamouda and Alain Passel{\`{e}}gue and Kenneth G. Paterson}, title = {Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier}, journal = {J. Cryptol.}, volume = {31}, number = {4}, pages = {917--964}, year = {2018}, url = {https://doi.org/10.1007/s00145-017-9274-8}, doi = {10.1007/S00145-017-9274-8}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/AbdallaBPP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AbdallaCFGU18, author = {Michel Abdalla and Dario Catalano and Dario Fiore and Romain Gay and Bogdan Ursu}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {Multi-Input Functional Encryption for Inner Products: Function-Hiding Realizations and Constructions Without Pairings}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10991}, pages = {597--627}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96884-1\_20}, doi = {10.1007/978-3-319-96884-1\_20}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/AbdallaCFGU18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pkc/2018-1, editor = {Michel Abdalla and Ricardo Dahab}, title = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10769}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-76578-5}, doi = {10.1007/978-3-319-76578-5}, isbn = {978-3-319-76577-8}, timestamp = {Fri, 01 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/2018-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pkc/2018-2, editor = {Michel Abdalla and Ricardo Dahab}, title = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10770}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-76581-5}, doi = {10.1007/978-3-319-76581-5}, isbn = {978-3-319-76580-8}, timestamp = {Fri, 01 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/2018-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AbdallaG0W17, author = {Michel Abdalla and Romain Gay and Mariana Raykova and Hoeteck Wee}, editor = {Jean{-}S{\'{e}}bastien Coron and Jesper Buus Nielsen}, title = {Multi-input Inner-Product Functional Encryption from Pairings}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10210}, pages = {601--626}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-56620-7\_21}, doi = {10.1007/978-3-319-56620-7\_21}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AbdallaG0W17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/AbdallaBP17, author = {Michel Abdalla and Fabrice Benhamouda and David Pointcheval}, editor = {Serge Fehr}, title = {Removing Erasures with Explainable Hash Proof Systems}, booktitle = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10174}, pages = {151--174}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-662-54365-8\_7}, doi = {10.1007/978-3-662-54365-8\_7}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/AbdallaBP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbdallaBP17, author = {Michel Abdalla and Fabrice Benhamouda and Alain Passel{\`{e}}gue}, title = {Algebraic XOR-RKA-Secure Pseudorandom Functions from Post-Zeroizing Multilinear Maps}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {500}, year = {2017}, url = {http://eprint.iacr.org/2017/500}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbdallaBP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbdallaBP17a, author = {Michel Abdalla and Fabrice Benhamouda and David Pointcheval}, title = {On the Tightness of Forward-Secure Signature Reductions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {746}, year = {2017}, url = {http://eprint.iacr.org/2017/746}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbdallaBP17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbdallaCFGU17, author = {Michel Abdalla and Dario Catalano and Dario Fiore and Romain Gay and Bogdan Ursu}, title = {Multi-Input Functional Encryption for Inner Products: Function-Hiding Realizations and Constructions without Pairings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {972}, year = {2017}, url = {http://eprint.iacr.org/2017/972}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbdallaCFGU17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/AbdallaBP16, author = {Michel Abdalla and Fabrice Benhamouda and David Pointcheval}, title = {Public-key encryption indistinguishable under plaintext-checkable attacks}, journal = {{IET} Inf. Secur.}, volume = {10}, number = {6}, pages = {288--303}, year = {2016}, url = {https://doi.org/10.1049/iet-ifs.2015.0500}, doi = {10.1049/IET-IFS.2015.0500}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/AbdallaBP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/AbdallaFLT16, author = {Michel Abdalla and Pierre{-}Alain Fouque and Vadim Lyubashevsky and Mehdi Tibouchi}, title = {Tightly Secure Signatures From Lossy Identification Schemes}, journal = {J. Cryptol.}, volume = {29}, number = {3}, pages = {597--631}, year = {2016}, url = {https://doi.org/10.1007/s00145-015-9203-7}, doi = {10.1007/S00145-015-9203-7}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/joc/AbdallaFLT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cd/ONeillOMSMKHPAR16, author = {M{\'{a}}ire O'Neill and Elizabeth O'Sullivan and Gavin McWilliams and Markku{-}Juhani O. Saarinen and Ciara Moore and Ayesha Khalid and James Howe and Rafa{\"{e}}l Del Pino and Michel Abdalla and Francesco Regazzoni and Felipe Valencia and Tim G{\"{u}}neysu and Tobias Oder and Adrian Waller and Glyn Jones and Anthony Barnett and Robert Griffin and Andrew Byrne and Bassem Ammar and David Lund}, editor = {Gianluca Palermo and John Feo}, title = {Secure architectures of future emerging cryptography \emph{SAFEcrypto}}, booktitle = {Proceedings of the {ACM} International Conference on Computing Frontiers, CF'16, Como, Italy, May 16-19, 2016}, pages = {315--322}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2903150.2907756}, doi = {10.1145/2903150.2907756}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cd/ONeillOMSMKHPAR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/AbdallaCNP16, author = {Michel Abdalla and Mario Cornejo and Anca Nitulescu and David Pointcheval}, editor = {Ioannis G. Askoxylakis and Sotiris Ioannidis and Sokratis K. Katsikas and Catherine Meadows}, title = {Robust Password-Protected Secret Sharing}, booktitle = {Computer Security - {ESORICS} 2016 - 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9879}, pages = {61--79}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45741-3\_4}, doi = {10.1007/978-3-319-45741-3\_4}, timestamp = {Tue, 19 Sep 2023 14:44:32 +0200}, biburl = {https://dblp.org/rec/conf/esorics/AbdallaCNP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbdallaBCP16, author = {Michel Abdalla and Florian Bourse and Angelo De Caro and David Pointcheval}, title = {Better Security for Functional Encryption for Inner Product Evaluations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {11}, year = {2016}, url = {http://eprint.iacr.org/2016/011}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbdallaBCP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbdallaCNP16, author = {Michel Abdalla and Mario Cornejo and Anca Nitulescu and David Pointcheval}, title = {Robust Password-Protected Secret Sharing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {123}, year = {2016}, url = {http://eprint.iacr.org/2016/123}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbdallaCNP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbdallaRW16, author = {Michel Abdalla and Mariana Raykova and Hoeteck Wee}, title = {Multi-Input Inner-Product Functional Encryption from Pairings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {425}, year = {2016}, url = {http://eprint.iacr.org/2016/425}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbdallaRW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/AbdallaBPRV15, author = {Michel Abdalla and Sonia Bela{\"{\i}}d and David Pointcheval and Sylvain Ruhault and Damien Vergnaud}, editor = {Tal Malkin and Vladimir Kolesnikov and Allison Bishop Lewko and Michalis Polychronakis}, title = {Robust Pseudo-Random Number Generators with Input Secure Against Side-Channel Attacks}, booktitle = {Applied Cryptography and Network Security - 13th International Conference, {ACNS} 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9092}, pages = {635--654}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-28166-7\_31}, doi = {10.1007/978-3-319-28166-7\_31}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/AbdallaBPRV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/AbdallaBP15, author = {Michel Abdalla and Fabrice Benhamouda and Alain Passel{\`{e}}gue}, editor = {Tetsu Iwata and Jung Hee Cheon}, title = {Multilinear and Aggregate Pseudorandom Functions: New Constructions and Improved Security}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 - December 3, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9452}, pages = {103--120}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48797-6\_5}, doi = {10.1007/978-3-662-48797-6\_5}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/AbdallaBP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AbdallaBP15, author = {Michel Abdalla and Fabrice Benhamouda and Alain Passel{\`{e}}gue}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {An Algebraic Framework for Pseudorandom Functions and Applications to Related-Key Security}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9215}, pages = {388--409}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-47989-6\_19}, doi = {10.1007/978-3-662-47989-6\_19}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AbdallaBP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AbdallaBP15, author = {Michel Abdalla and Fabrice Benhamouda and David Pointcheval}, editor = {Elisabeth Oswald and Marc Fischlin}, title = {Disjunctions for Hash Proof Systems: New Constructions and Applications}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9057}, pages = {69--100}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46803-6\_3}, doi = {10.1007/978-3-662-46803-6\_3}, timestamp = {Thu, 14 Oct 2021 09:58:15 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AbdallaBP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/AbdallaBP15, author = {Michel Abdalla and Fabrice Benhamouda and David Pointcheval}, editor = {Jonathan Katz}, title = {Public-Key Encryption Indistinguishable Under Plaintext-Checkable Attacks}, booktitle = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9020}, pages = {332--352}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46447-2\_15}, doi = {10.1007/978-3-662-46447-2\_15}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/AbdallaBP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/AbdallaBCP15, author = {Michel Abdalla and Florian Bourse and Angelo De Caro and David Pointcheval}, editor = {Jonathan Katz}, title = {Simple Functional Encryption Schemes for Inner Products}, booktitle = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9020}, pages = {733--751}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46447-2\_33}, doi = {10.1007/978-3-662-46447-2\_33}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/AbdallaBCP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/AbdallaBM15, author = {Michel Abdalla and Fabrice Benhamouda and Philip MacKenzie}, title = {Security of the {J-PAKE} Password-Authenticated Key Exchange Protocol}, booktitle = {2015 {IEEE} Symposium on Security and Privacy, {SP} 2015, San Jose, CA, USA, May 17-21, 2015}, pages = {571--587}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/SP.2015.41}, doi = {10.1109/SP.2015.41}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/AbdallaBM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbdallaBCP15, author = {Michel Abdalla and Florian Bourse and Angelo De Caro and David Pointcheval}, title = {Simple Functional Encryption Schemes for Inner Products}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {17}, year = {2015}, url = {http://eprint.iacr.org/2015/017}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbdallaBCP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbdallaBP15, author = {Michel Abdalla and Fabrice Benhamouda and David Pointcheval}, title = {Tighter Reductions for Forward-Secure Signature Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {196}, year = {2015}, url = {http://eprint.iacr.org/2015/196}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbdallaBP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbdallaBF15, author = {Michel Abdalla and Sonia Bela{\"{\i}}d and Pierre{-}Alain Fouque}, title = {Leakage-Resilient Symmetric Encryption via Re-keying}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {204}, year = {2015}, url = {http://eprint.iacr.org/2015/204}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbdallaBF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbdallaBP15a, author = {Michel Abdalla and Fabrice Benhamouda and Alain Passel{\`{e}}gue}, title = {An Algebraic Framework for Pseudorandom Functions and Applications to Related-Key Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {554}, year = {2015}, url = {http://eprint.iacr.org/2015/554}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbdallaBP15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbdallaBP15b, author = {Michel Abdalla and Fabrice Benhamouda and Alain Passel{\`{e}}gue}, title = {Multilinear and Aggregate Pseudorandom Functions: New Constructions and Improved Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {867}, year = {2015}, url = {http://eprint.iacr.org/2015/867}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbdallaBP15b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbdallaBPRV15, author = {Michel Abdalla and Sonia Bela{\"{\i}}d and David Pointcheval and Sylvain Ruhault and Damien Vergnaud}, title = {Robust Pseudo-Random Number Generators with Input Secure Against Side-Channel Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1219}, year = {2015}, url = {http://eprint.iacr.org/2015/1219}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbdallaBPRV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/AbdallaCF14, author = {Michel Abdalla and Dario Catalano and Dario Fiore}, title = {Verifiable Random Functions: Relations to Identity-Based Key Encapsulation and New Constructions}, journal = {J. Cryptol.}, volume = {27}, number = {3}, pages = {544--593}, year = {2014}, url = {https://doi.org/10.1007/s00145-013-9153-x}, doi = {10.1007/S00145-013-9153-X}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/AbdallaCF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AbdallaBPP14, author = {Michel Abdalla and Fabrice Benhamouda and Alain Passel{\`{e}}gue and Kenneth G. Paterson}, editor = {Juan A. Garay and Rosario Gennaro}, title = {Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier}, booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8616}, pages = {77--94}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44371-2\_5}, doi = {10.1007/978-3-662-44371-2\_5}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AbdallaBPP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/AbdallaCFJN14, author = {Michel Abdalla and Herv{\'{e}} Chabanne and Houda Ferradi and Julien Jainski and David Naccache}, editor = {Xinyi Huang and Jianying Zhou}, title = {Improving Thomlinson-Walker's Software Patching Scheme Using Standard Cryptographic and Statistical Tools}, booktitle = {Information Security Practice and Experience - 10th International Conference, {ISPEC} 2014, Fuzhou, China, May 5-8, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8434}, pages = {8--14}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-06320-1\_2}, doi = {10.1007/978-3-319-06320-1\_2}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/AbdallaCFJN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/Abdalla14, author = {Michel Abdalla}, editor = {Sherman S. M. Chow and Joseph K. Liu and Lucas Chi Kwong Hui and Siu{-}Ming Yiu}, title = {Password-Based Authenticated Key Exchange: An Overview}, booktitle = {Provable Security - 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8782}, pages = {1--9}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12475-9\_1}, doi = {10.1007/978-3-319-12475-9\_1}, timestamp = {Tue, 14 May 2019 10:00:45 +0200}, biburl = {https://dblp.org/rec/conf/provsec/Abdalla14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/scn/2014, editor = {Michel Abdalla and Roberto De Prisco}, title = {Security and Cryptography for Networks - 9th International Conference, {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8642}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10879-7}, doi = {10.1007/978-3-319-10879-7}, isbn = {978-3-319-10878-0}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbdallaBP14, author = {Michel Abdalla and Fabrice Benhamouda and David Pointcheval}, title = {Removing Erasures with Explainable Hash Proof Systems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {125}, year = {2014}, url = {http://eprint.iacr.org/2014/125}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbdallaBP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbdallaBP14a, author = {Michel Abdalla and Fabrice Benhamouda and David Pointcheval}, title = {Disjunctions for Hash Proof Systems: New Constructions and Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {483}, year = {2014}, url = {http://eprint.iacr.org/2014/483}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbdallaBP14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbdallaBPP14, author = {Michel Abdalla and Fabrice Benhamouda and Alain Passel{\`{e}}gue and Kenneth G. Paterson}, title = {Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {488}, year = {2014}, url = {http://eprint.iacr.org/2014/488}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbdallaBPP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbdallaBP14b, author = {Michel Abdalla and Fabrice Benhamouda and David Pointcheval}, title = {{SPOKE:} Simple Password-Only Key Exchange in the Standard Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {609}, year = {2014}, url = {http://eprint.iacr.org/2014/609}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbdallaBP14b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/AbdallaBBCP13, author = {Michel Abdalla and Fabrice Benhamouda and Olivier Blazy and C{\'{e}}line Chevalier and David Pointcheval}, editor = {Kazue Sako and Palash Sarkar}, title = {SPHF-Friendly Non-interactive Commitments}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2013 - 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8269}, pages = {214--234}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-42033-7\_12}, doi = {10.1007/978-3-642-42033-7\_12}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/AbdallaBBCP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/AbdallaBF13, author = {Michel Abdalla and Sonia Bela{\"{\i}}d and Pierre{-}Alain Fouque}, editor = {Guido Bertoni and Jean{-}S{\'{e}}bastien Coron}, title = {Leakage-Resilient Symmetric Encryption via Re-keying}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2013 - 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8086}, pages = {471--488}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40349-1\_27}, doi = {10.1007/978-3-642-40349-1\_27}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/AbdallaBF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/AbdallaHP13, author = {Michel Abdalla and Fabrice Ben Hamouda and David Pointcheval}, editor = {Kaoru Kurosawa and Goichiro Hanaoka}, title = {Tighter Reductions for Forward-Secure Signature Schemes}, booktitle = {Public-Key Cryptography - {PKC} 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 - March 1, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7778}, pages = {292--311}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36362-7\_19}, doi = {10.1007/978-3-642-36362-7\_19}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/AbdallaHP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cans/2013, editor = {Michel Abdalla and Cristina Nita{-}Rotaru and Ricardo Dahab}, title = {Cryptology and Network Security - 12th International Conference, {CANS} 2013, Paraty, Brazil, November 20-22. 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8257}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-02937-5}, doi = {10.1007/978-3-319-02937-5}, isbn = {978-3-319-02936-8}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pairing/2012, editor = {Michel Abdalla and Tanja Lange}, title = {Pairing-Based Cryptography - Pairing 2012 - 5th International Conference, Cologne, Germany, May 16-18, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7708}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36334-4}, doi = {10.1007/978-3-642-36334-4}, isbn = {978-3-642-36333-7}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pairing/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbdallaBBCP13, author = {Michel Abdalla and Fabrice Benhamouda and Olivier Blazy and C{\'{e}}line Chevalier and David Pointcheval}, title = {SPHF-Friendly Non-Interactive Commitments}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {588}, year = {2013}, url = {http://eprint.iacr.org/2013/588}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbdallaBBCP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbdallaFLT13, author = {Michel Abdalla and Pierre{-}Alain Fouque and Vadim Lyubashevsky and Mehdi Tibouchi}, title = {Tightly-Secure Signatures From Lossy Identification Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {856}, year = {2013}, url = {http://eprint.iacr.org/2013/856}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbdallaFLT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/AbdallaCP12, author = {Michel Abdalla and Angelo De Caro and Duong Hieu Phan}, title = {Generalized Key Delegation for Wildcarded Identity-Based and Inner-Product Encryption}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {7}, number = {6}, pages = {1695--1706}, year = {2012}, url = {https://doi.org/10.1109/TIFS.2012.2213594}, doi = {10.1109/TIFS.2012.2213594}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/AbdallaCP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AbdallaFLT12, author = {Michel Abdalla and Pierre{-}Alain Fouque and Vadim Lyubashevsky and Mehdi Tibouchi}, editor = {David Pointcheval and Thomas Johansson}, title = {Tightly-Secure Signatures from Lossy Identification Schemes}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7237}, pages = {572--590}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29011-4\_34}, doi = {10.1007/978-3-642-29011-4\_34}, timestamp = {Sun, 12 Nov 2023 02:15:08 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/AbdallaFLT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/giis/PisaAD12, author = {Pedro Silveira Pisa and Michel Abdalla and Otto Carlos Muniz Bandeira Duarte}, title = {Somewhat homomorphic encryption scheme for arithmetic operations on large integers}, booktitle = {Global Information Infrastructure and Networking Symposium, {GIIS} 2012, Choroni, Venezuela, December 17-19, 2012}, pages = {1--8}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/GIIS.2012.6466769}, doi = {10.1109/GIIS.2012.6466769}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/giis/PisaAD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/latincrypt/AbdallaV12, author = {Michel Abdalla and Jill{-}J{\^{e}}nn Vie}, editor = {Alejandro Hevia and Gregory Neven}, title = {Leakage-Resilient Spatial Encryption}, booktitle = {Progress in Cryptology - {LATINCRYPT} 2012 - 2nd International Conference on Cryptology and Information Security in Latin America, Santiago, Chile, October 7-10, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7533}, pages = {78--99}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33481-8\_5}, doi = {10.1007/978-3-642-33481-8\_5}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/latincrypt/AbdallaV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/latincrypt/AbdallaCM12, author = {Michel Abdalla and Angelo De Caro and Karina Mochetti}, editor = {Alejandro Hevia and Gregory Neven}, title = {Lattice-Based Hierarchical Inner Product Encryption}, booktitle = {Progress in Cryptology - {LATINCRYPT} 2012 - 2nd International Conference on Cryptology and Information Security in Latin America, Santiago, Chile, October 7-10, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7533}, pages = {121--138}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33481-8\_7}, doi = {10.1007/978-3-642-33481-8\_7}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/latincrypt/AbdallaCM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/AbdallaFL12, author = {Michel Abdalla and Dario Fiore and Vadim Lyubashevsky}, editor = {Marc Fischlin and Johannes Buchmann and Mark Manulis}, title = {From Selective to Full Security: Semi-generic Transformations in the Standard Model}, booktitle = {Public Key Cryptography - {PKC} 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7293}, pages = {316--333}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30057-8\_19}, doi = {10.1007/978-3-642-30057-8\_19}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/AbdallaFL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbdallaFL12, author = {Michel Abdalla and Dario Fiore and Vadim Lyubashevsky}, title = {From Selective to Full Security: Semi-Generic Transformations in the Standard Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {341}, year = {2012}, url = {http://eprint.iacr.org/2012/341}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbdallaFL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/hal/Abdalla11, author = {Michel Abdalla}, title = {Reducing The Need For Trusted Parties In Cryptography. (Limiter le besoin de tiers de confiance en cryptographie)}, year = {2011}, url = {https://tel.archives-ouvertes.fr/tel-00917187}, timestamp = {Fri, 29 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/hal/Abdalla11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/AbdallaBCDMNSS11, author = {Michel Abdalla and James Birkett and Dario Catalano and Alexander W. Dent and John Malone{-}Lee and Gregory Neven and Jacob C. N. Schuldt and Nigel P. Smart}, title = {Wildcarded Identity-Based Encryption}, journal = {J. Cryptol.}, volume = {24}, number = {1}, pages = {42--82}, year = {2011}, url = {https://doi.org/10.1007/s00145-010-9060-3}, doi = {10.1007/S00145-010-9060-3}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/AbdallaBCDMNSS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/AbdallaCGP11, author = {Michel Abdalla and C{\'{e}}line Chevalier and Louis Granboulan and David Pointcheval}, editor = {Aggelos Kiayias}, title = {Contributory Password-Authenticated Group Key Exchange with Join Capability}, booktitle = {Topics in Cryptology - {CT-RSA} 2011 - The Cryptographers' Track at the {RSA} Conference 2011, San Francisco, CA, USA, February 14-18, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6558}, pages = {142--160}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-19074-2\_11}, doi = {10.1007/978-3-642-19074-2\_11}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/AbdallaCGP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/AbdallaCMP10, author = {Michel Abdalla and C{\'{e}}line Chevalier and Mark Manulis and David Pointcheval}, editor = {Daniel J. Bernstein and Tanja Lange}, title = {Flexible Group Key Exchange with On-demand Computation of Subgroup Keys}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2010, Third International Conference on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6055}, pages = {351--368}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12678-9\_21}, doi = {10.1007/978-3-642-12678-9\_21}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/africacrypt/AbdallaCMP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/AbdallaBN10, author = {Michel Abdalla and Mihir Bellare and Gregory Neven}, editor = {Daniele Micciancio}, title = {Robust Encryption}, booktitle = {Theory of Cryptography, 7th Theory of Cryptography Conference, {TCC} 2010, Zurich, Switzerland, February 9-11, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5978}, pages = {480--497}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-11799-2\_28}, doi = {10.1007/978-3-642-11799-2\_28}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/AbdallaBN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/latincrypt/2010, editor = {Michel Abdalla and Paulo S. L. M. Barreto}, title = {Progress in Cryptology - {LATINCRYPT} 2010, First International Conference on Cryptology and Information Security in Latin America, Puebla, Mexico, August 8-11, 2010, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6212}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14712-8}, doi = {10.1007/978-3-642-14712-8}, isbn = {978-3-642-14711-1}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/latincrypt/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/AbdallaCCP09, author = {Michel Abdalla and Dario Catalano and C{\'{e}}line Chevalier and David Pointcheval}, editor = {Bart Preneel}, title = {Password-Authenticated Group Key Agreement with Adaptive Security and Contributiveness}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2009, Second International Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5580}, pages = {254--271}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02384-2\_16}, doi = {10.1007/978-3-642-02384-2\_16}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/africacrypt/AbdallaCCP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AbdallaCP09, author = {Michel Abdalla and C{\'{e}}line Chevalier and David Pointcheval}, editor = {Shai Halevi}, title = {Smooth Projective Hashing for Conditionally Extractable Commitments}, booktitle = {Advances in Cryptology - {CRYPTO} 2009, 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5677}, pages = {671--689}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03356-8\_39}, doi = {10.1007/978-3-642-03356-8\_39}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/AbdallaCP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AbdallaCF09, author = {Michel Abdalla and Dario Catalano and Dario Fiore}, editor = {Antoine Joux}, title = {Verifiable Random Functions from Identity-Based Key Encapsulation}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5479}, pages = {554--571}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-01001-9\_32}, doi = {10.1007/978-3-642-01001-9\_32}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AbdallaCF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/AbdallaBCP09, author = {Michel Abdalla and Xavier Boyen and C{\'{e}}line Chevalier and David Pointcheval}, editor = {Stanislaw Jarecki and Gene Tsudik}, title = {Distributed Public-Key Cryptography from Weak Secrets}, booktitle = {Public Key Cryptography - {PKC} 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5443}, pages = {139--159}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00468-1\_9}, doi = {10.1007/978-3-642-00468-1\_9}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/AbdallaBCP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acns/2009, editor = {Michel Abdalla and David Pointcheval and Pierre{-}Alain Fouque and Damien Vergnaud}, title = {Applied Cryptography and Network Security, 7th International Conference, {ACNS} 2009, Paris-Rocquencourt, France, June 2-5, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5536}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-01957-9}, doi = {10.1007/978-3-642-01957-9}, isbn = {978-3-642-01956-2}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cm/ClaveiroleAAV08, author = {Thomas Claveirole and Marcelo Dias de Amorim and Michel Abdalla and Yannis Viniotis}, title = {Securing wireless sensor networks against aggregator compromises}, journal = {{IEEE} Commun. Mag.}, volume = {46}, number = {4}, pages = {134--141}, year = {2008}, url = {https://doi.org/10.1109/MCOM.2008.4481352}, doi = {10.1109/MCOM.2008.4481352}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cm/ClaveiroleAAV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/AbdallaKN08, author = {Michel Abdalla and Eike Kiltz and Gregory Neven}, title = {Generalised key delegation for hierarchical identity-based encryption}, journal = {{IET} Inf. Secur.}, volume = {2}, number = {3}, pages = {67--78}, year = {2008}, url = {https://doi.org/10.1049/iet-ifs:20070124}, doi = {10.1049/IET-IFS:20070124}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/AbdallaKN08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/AbdallaBCKKLMNPS08, author = {Michel Abdalla and Mihir Bellare and Dario Catalano and Eike Kiltz and Tadayoshi Kohno and Tanja Lange and John Malone{-}Lee and Gregory Neven and Pascal Paillier and Haixia Shi}, title = {Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions}, journal = {J. Cryptol.}, volume = {21}, number = {3}, pages = {350--391}, year = {2008}, url = {https://doi.org/10.1007/s00145-007-9006-6}, doi = {10.1007/S00145-007-9006-6}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/AbdallaBCKKLMNPS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/AbdallaABN08, author = {Michel Abdalla and Jee Hea An and Mihir Bellare and Chanathip Namprempre}, title = {From Identification to Signatures Via the Fiat-Shamir Transform: Necessary and Sufficient Conditions for Security and Forward-Security}, journal = {{IEEE} Trans. Inf. Theory}, volume = {54}, number = {8}, pages = {3631--3646}, year = {2008}, url = {https://doi.org/10.1109/TIT.2008.926303}, doi = {10.1109/TIT.2008.926303}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/AbdallaABN08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/AbdallaIP08, author = {Michel Abdalla and Malika Izabach{\`{e}}ne and David Pointcheval}, editor = {Matthew K. Franklin and Lucas Chi Kwong Hui and Duncan S. Wong}, title = {Anonymous and Transparent Gateway-Based Password-Authenticated Key Exchange}, booktitle = {Cryptology and Network Security, 7th International Conference, {CANS} 2008, Hong-Kong, China, December 2-4, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5339}, pages = {133--148}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-89641-8\_10}, doi = {10.1007/978-3-540-89641-8\_10}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cans/AbdallaIP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/AbdallaCCP08, author = {Michel Abdalla and Dario Catalano and C{\'{e}}line Chevalier and David Pointcheval}, editor = {Tal Malkin}, title = {Efficient Two-Party Password-Based Key Exchange Protocols in the {UC} Framework}, booktitle = {Topics in Cryptology - {CT-RSA} 2008, The Cryptographers' Track at the {RSA} Conference 2008, San Francisco, CA, USA, April 8-11, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4964}, pages = {335--351}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-79263-5\_22}, doi = {10.1007/978-3-540-79263-5\_22}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ctrsa/AbdallaCCP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbdallaBN08, author = {Michel Abdalla and Mihir Bellare and Gregory Neven}, title = {Robust Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {440}, year = {2008}, url = {http://eprint.iacr.org/2008/440}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbdallaBN08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/NamprempreNA07, author = {Chanathip Namprempre and Gregory Neven and Michel Abdalla}, title = {A Study of Blind Message Authentication Codes}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {90-A}, number = {1}, pages = {75--82}, year = {2007}, url = {https://doi.org/10.1093/ietfec/e90-a.1.75}, doi = {10.1093/IETFEC/E90-A.1.75}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/NamprempreNA07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/AbdallaBCMP07, author = {Michel Abdalla and Emmanuel Bresson and Olivier Chevassut and Bodo M{\"{o}}ller and David Pointcheval}, title = {Strong password-based authentication in {TLS} using the three-party group Diffie?Hellman protocol}, journal = {Int. J. Secur. Networks}, volume = {2}, number = {3/4}, pages = {284--296}, year = {2007}, url = {https://doi.org/10.1504/IJSN.2007.013181}, doi = {10.1504/IJSN.2007.013181}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/AbdallaBCMP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/AbdallaKN07, author = {Michel Abdalla and Eike Kiltz and Gregory Neven}, editor = {Joachim Biskup and Javier L{\'{o}}pez}, title = {Generalized Key Delegation for Hierarchical Identity-Based Encryption}, booktitle = {Computer Security - {ESORICS} 2007, 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24-26, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4734}, pages = {139--154}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74835-9\_10}, doi = {10.1007/978-3-540-74835-9\_10}, timestamp = {Thu, 29 Aug 2019 08:09:59 +0200}, biburl = {https://dblp.org/rec/conf/esorics/AbdallaKN07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/AbdallaDMNPS07, author = {Michel Abdalla and Alexander W. Dent and John Malone{-}Lee and Gregory Neven and Duong Hieu Phan and Nigel P. Smart}, editor = {Tatsuaki Okamoto and Xiaoyun Wang}, title = {Identity-Based Traitor Tracing}, booktitle = {Public Key Cryptography - {PKC} 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4450}, pages = {361--376}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-71677-8\_24}, doi = {10.1007/978-3-540-71677-8\_24}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/AbdallaDMNPS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/AbdallaBVS07, author = {Michel Abdalla and Jens{-}Matthias Bohli and Mar{\'{\i}}a Isabel Gonz{\'{a}}lez Vasco and Rainer Steinwandt}, editor = {Salil P. Vadhan}, title = {(Password) Authenticated Key Establishment: From 2-Party to Group}, booktitle = {Theory of Cryptography, 4th Theory of Cryptography Conference, {TCC} 2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4392}, pages = {499--514}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-70936-7\_27}, doi = {10.1007/978-3-540-70936-7\_27}, timestamp = {Mon, 31 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/AbdallaBVS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbdallaKN07, author = {Michel Abdalla and Eike Kiltz and Gregory Neven}, title = {Generalized Key Delegation for Hierarchical Identity-Based Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {221}, year = {2007}, url = {http://eprint.iacr.org/2007/221}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbdallaKN07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/AbdallaP06, author = {Michel Abdalla and David Pointcheval}, editor = {Xuejia Lai and Kefei Chen}, title = {A Scalable Password-Based Group Key Exchange Protocol in the Standard Model}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4284}, pages = {332--347}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11935230\_22}, doi = {10.1007/11935230\_22}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/AbdallaP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AbdallaBCMP06, author = {Michel Abdalla and Emmanuel Bresson and Olivier Chevassut and Bodo M{\"{o}}ller and David Pointcheval}, editor = {Ferng{-}Ching Lin and Der{-}Tsai Lee and Bao{-}Shuh Paul Lin and Shiuhpyng Shieh and Sushil Jajodia}, title = {Provably secure password-based authentication in {TLS}}, booktitle = {Proceedings of the 2006 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2006, Taipei, Taiwan, March 21-24, 2006}, pages = {35--45}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1128817.1128827}, doi = {10.1145/1128817.1128827}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AbdallaBCMP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/conext/ClaveiroleAAV06, author = {Thomas Claveirole and Marcelo Dias de Amorim and Michel Abdalla and Yannis Viniotis}, editor = {Christophe Diot and Mostafa H. Ammar}, title = {Resisting against aggregator compromises in sensor networks}, booktitle = {Proceedings of the 2006 {ACM} Conference on Emerging Network Experiment and Technology, CoNEXT 2006, Lisboa, Portugal, December 4-7, 2006}, pages = {24}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1368436.1368468}, doi = {10.1145/1368436.1368468}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/conext/ClaveiroleAAV06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/AbdallaNN06, author = {Michel Abdalla and Chanathip Namprempre and Gregory Neven}, editor = {David Pointcheval}, title = {On the (Im)possibility of Blind Message Authentication Codes}, booktitle = {Topics in Cryptology - {CT-RSA} 2006, The Cryptographers' Track at the {RSA} Conference 2006, San Jose, CA, USA, February 13-17, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3860}, pages = {262--279}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11605805\_17}, doi = {10.1007/11605805\_17}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ctrsa/AbdallaNN06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/AbdallaCDMNS06, author = {Michel Abdalla and Dario Catalano and Alexander W. Dent and John Malone{-}Lee and Gregory Neven and Nigel P. Smart}, editor = {Michele Bugliesi and Bart Preneel and Vladimiro Sassone and Ingo Wegener}, title = {Identity-Based Encryption Gone Wild}, booktitle = {Automata, Languages and Programming, 33rd International Colloquium, {ICALP} 2006, Venice, Italy, July 10-14, 2006, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {4052}, pages = {300--311}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11787006\_26}, doi = {10.1007/11787006\_26}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/icalp/AbdallaCDMNS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/AbdallaBCP06, author = {Michel Abdalla and Emmanuel Bresson and Olivier Chevassut and David Pointcheval}, editor = {Moti Yung and Yevgeniy Dodis and Aggelos Kiayias and Tal Malkin}, title = {Password-Based Group Key Exchange in a Constant Number of Rounds}, booktitle = {Public Key Cryptography - {PKC} 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3958}, pages = {427--442}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11745853\_28}, doi = {10.1007/11745853\_28}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/AbdallaBCP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-cs-0610084, author = {Thomas Claveirole and Marcelo Dias de Amorim and Michel Abdalla and Yannis Viniotis}, title = {Share and Disperse: How to Resist Against Aggregator Compromises in Sensor Networks}, journal = {CoRR}, volume = {abs/cs/0610084}, year = {2006}, url = {http://arxiv.org/abs/cs/0610084}, eprinttype = {arXiv}, eprint = {cs/0610084}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-cs-0610084.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbdallaCDMNS06, author = {Michel Abdalla and Dario Catalano and Alexander W. Dent and John Malone{-}Lee and Gregory Neven and Nigel P. Smart}, title = {Identity-Based Encryption Gone Wild}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {304}, year = {2006}, url = {http://eprint.iacr.org/2006/304}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbdallaCDMNS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/AbdallaCFP05, author = {Michel Abdalla and Olivier Chevassut and Pierre{-}Alain Fouque and David Pointcheval}, editor = {Bimal K. Roy}, title = {A Simple Threshold Authenticated Key Exchange from Short Secrets}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2005, 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3788}, pages = {566--584}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11593447\_31}, doi = {10.1007/11593447\_31}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/AbdallaCFP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AbdallaBCKKLMNPS05, author = {Michel Abdalla and Mihir Bellare and Dario Catalano and Eike Kiltz and Tadayoshi Kohno and Tanja Lange and John Malone{-}Lee and Gregory Neven and Pascal Paillier and Haixia Shi}, editor = {Victor Shoup}, title = {Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions}, booktitle = {Advances in Cryptology - {CRYPTO} 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3621}, pages = {205--222}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11535218\_13}, doi = {10.1007/11535218\_13}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/AbdallaBCKKLMNPS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/AbdallaP05, author = {Michel Abdalla and David Pointcheval}, editor = {Alfred Menezes}, title = {Simple Password-Based Encrypted Key Exchange Protocols}, booktitle = {Topics in Cryptology - {CT-RSA} 2005, The Cryptographers' Track at the {RSA} Conference 2005, San Francisco, CA, USA, February 14-18, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3376}, pages = {191--208}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-30574-3\_14}, doi = {10.1007/978-3-540-30574-3\_14}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/AbdallaP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/AbdallaP05, author = {Michel Abdalla and David Pointcheval}, editor = {Andrew S. Patrick and Moti Yung}, title = {Interactive Diffie-Hellman Assumptions with Applications to Password-Based Authentication}, booktitle = {Financial Cryptography and Data Security, 9th International Conference, {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March 3, 2005, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3570}, pages = {341--356}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11507840\_31}, doi = {10.1007/11507840\_31}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/AbdallaP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/AbdallaCP05, author = {Michel Abdalla and Olivier Chevassut and David Pointcheval}, editor = {Serge Vaudenay}, title = {One-Time Verifier-Based Encrypted Key Exchange}, booktitle = {Public Key Cryptography - {PKC} 2005, 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3386}, pages = {47--64}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-30580-4\_5}, doi = {10.1007/978-3-540-30580-4\_5}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/AbdallaCP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/AbdallaFP05, author = {Michel Abdalla and Pierre{-}Alain Fouque and David Pointcheval}, editor = {Serge Vaudenay}, title = {Password-Based Authenticated Key Exchange in the Three-Party Setting}, booktitle = {Public Key Cryptography - {PKC} 2005, 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3386}, pages = {65--84}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-30580-4\_6}, doi = {10.1007/978-3-540-30580-4\_6}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/AbdallaFP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbdallaBCKKLMNPS05, author = {Michel Abdalla and Mihir Bellare and Dario Catalano and Eike Kiltz and Tadayoshi Kohno and Tanja Lange and John Malone{-}Lee and Gregory Neven and Pascal Paillier and Haixia Shi}, title = {Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {254}, year = {2005}, url = {http://eprint.iacr.org/2005/254}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbdallaBCKKLMNPS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/AbdallaW04, author = {Michel Abdalla and Bogdan Warinschi}, editor = {Javier L{\'{o}}pez and Sihan Qing and Eiji Okamoto}, title = {On the Minimal Assumptions of Group Signature Schemes}, booktitle = {Information and Communications Security, 6th International Conference, {ICICS} 2004, Malaga, Spain, October 27-29, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3269}, pages = {1--13}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30191-2\_1}, doi = {10.1007/978-3-540-30191-2\_1}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/AbdallaW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbdallaFP04, author = {Michel Abdalla and Pierre{-}Alain Fouque and David Pointcheval}, title = {Password-Based Authenticated Key Exchange in the Three-Party Setting}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {233}, year = {2004}, url = {http://eprint.iacr.org/2004/233}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbdallaFP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AbdallaABN02, author = {Michel Abdalla and Jee Hea An and Mihir Bellare and Chanathip Namprempre}, editor = {Lars R. Knudsen}, title = {From Identification to Signatures via the Fiat-Shamir Transform: Minimizing Assumptions for Security and Forward-Security}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28 - May 2, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2332}, pages = {418--433}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-46035-7\_28}, doi = {10.1007/3-540-46035-7\_28}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/AbdallaABN02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbdallaABN02, author = {Michel Abdalla and Jee Hea An and Mihir Bellare and Chanathip Namprempre}, title = {From Identification to Signatures via the Fiat-Shamir Transform: Minimizing Assumptions for Security and Forward-Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {22}, year = {2002}, url = {http://eprint.iacr.org/2002/022}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbdallaABN02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/AbdallaBR01, author = {Michel Abdalla and Mihir Bellare and Phillip Rogaway}, editor = {David Naccache}, title = {The Oracle Diffie-Hellman Assumptions and an Analysis of {DHIES}}, booktitle = {Topics in Cryptology - {CT-RSA} 2001, The Cryptographer's Track at {RSA} Conference 2001, San Francisco, CA, USA, April 8-12, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2020}, pages = {143--158}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45353-9\_12}, doi = {10.1007/3-540-45353-9\_12}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ctrsa/AbdallaBR01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/AbdallaMN01, author = {Michel Abdalla and Sara K. Miner and Chanathip Namprempre}, editor = {David Naccache}, title = {Forward-Secure Threshold Signature Schemes}, booktitle = {Topics in Cryptology - {CT-RSA} 2001, The Cryptographer's Track at {RSA} Conference 2001, San Francisco, CA, USA, April 8-12, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2020}, pages = {441--456}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45353-9\_32}, doi = {10.1007/3-540-45353-9\_32}, timestamp = {Sat, 16 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/AbdallaMN01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ton/AbdallaSW00, author = {Michel Abdalla and Yuval Shavitt and Avishai Wool}, title = {Key management for restricted multicast using broadcast encryption}, journal = {{IEEE/ACM} Trans. Netw.}, volume = {8}, number = {4}, pages = {443--454}, year = {2000}, url = {https://doi.org/10.1109/90.865073}, doi = {10.1109/90.865073}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ton/AbdallaSW00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/AbdallaR00, author = {Michel Abdalla and Leonid Reyzin}, editor = {Tatsuaki Okamoto}, title = {A New Forward-Secure Digital Signature Scheme}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2000, 6th International Conference on the Theory and Application of Cryptology and Information Security, Kyoto, Japan, December 3-7, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1976}, pages = {116--129}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44448-3\_10}, doi = {10.1007/3-540-44448-3\_10}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/AbdallaR00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/AbdallaB00, author = {Michel Abdalla and Mihir Bellare}, editor = {Tatsuaki Okamoto}, title = {Increasing the Lifetime of a Key: {A} Comparative Analysis of the Security of Re-keying Techniques}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2000, 6th International Conference on the Theory and Application of Cryptology and Information Security, Kyoto, Japan, December 3-7, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1976}, pages = {546--559}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44448-3\_42}, doi = {10.1007/3-540-44448-3\_42}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/AbdallaB00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbdallaR00, author = {Michel Abdalla and Leonid Reyzin}, title = {A New Forward-Secure Digital Signature Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {2}, year = {2000}, url = {http://eprint.iacr.org/2000/002}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbdallaR00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbdallaMN00, author = {Michel Abdalla and Sara K. Miner and Chanathip Namprempre}, title = {Forward Security in Threshold Signature Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {31}, year = {2000}, url = {http://eprint.iacr.org/2000/031}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbdallaMN00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/AbdallaSW99, author = {Michel Abdalla and Yuval Shavitt and Avishai Wool}, editor = {Matthew K. Franklin}, title = {Towards Making Broadcast Encryption Practical}, booktitle = {Financial Cryptography, Third International Conference, FC'99, Anguilla, British West Indies, February 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1648}, pages = {140--157}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48390-X\_11}, doi = {10.1007/3-540-48390-X\_11}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/AbdallaSW99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbdallaBR99, author = {Michel Abdalla and Mihir Bellare and Phillip Rogaway}, title = {{DHAES:} An Encryption Scheme Based on the Diffie-Hellman Problem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {7}, year = {1999}, url = {http://eprint.iacr.org/1999/007}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbdallaBR99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.