BibTeX records: Michel Abdalla

download as .bib file

@article{DBLP:journals/dcc/KimSAP23,
  author       = {Hyoseung Kim and
                  Olivier Sanders and
                  Michel Abdalla and
                  Jong Hwan Park},
  title        = {Practical dynamic group signatures without knowledge extractors},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {3},
  pages        = {853--893},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-022-01129-w},
  doi          = {10.1007/S10623-022-01129-W},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/KimSAP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AbdallaEKKR22,
  author       = {Michel Abdalla and
                  Thorsten Eisenhofer and
                  Eike Kiltz and
                  Sabrina Kunzweiler and
                  Doreen Riepel},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {Password-Authenticated Key Exchange from Group Actions},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13508},
  pages        = {699--728},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15979-4\_24},
  doi          = {10.1007/978-3-031-15979-4\_24},
  timestamp    = {Sun, 13 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/AbdallaEKKR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbdallaEKKR22,
  author       = {Michel Abdalla and
                  Thorsten Eisenhofer and
                  Eike Kiltz and
                  Sabrina Kunzweiler and
                  Doreen Riepel},
  title        = {Password-Authenticated Key Exchange from Group Actions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {770},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/770},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbdallaEKKR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/KimLAP21,
  author       = {Hyoseung Kim and
                  Youngkyung Lee and
                  Michel Abdalla and
                  Jong Hwan Park},
  title        = {Practical dynamic group signature with efficient concurrent joins
                  and batch verifications},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {63},
  pages        = {103003},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.103003},
  doi          = {10.1016/J.JISA.2021.103003},
  timestamp    = {Mon, 29 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/KimLAP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/AbdallaBKLX21,
  author       = {Michel Abdalla and
                  Manuel Barbosa and
                  Jonathan Katz and
                  Julian Loss and
                  Jiayu Xu},
  editor       = {Mehdi Tibouchi and
                  Huaxiong Wang},
  title        = {Algebraic Adversaries in the Universal Composability Framework},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2021 - 27th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Singapore, December 6-10, 2021, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13092},
  pages        = {311--341},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-92078-4\_11},
  doi          = {10.1007/978-3-030-92078-4\_11},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/AbdallaBKLX21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/AbdallaHH21,
  author       = {Michel Abdalla and
                  Bj{\"{o}}rn Haase and
                  Julia Hesse},
  editor       = {Mehdi Tibouchi and
                  Huaxiong Wang},
  title        = {Security Analysis of CPace},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2021 - 27th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Singapore, December 6-10, 2021, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13093},
  pages        = {711--741},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-92068-5\_24},
  doi          = {10.1007/978-3-030-92068-5\_24},
  timestamp    = {Sat, 25 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/AbdallaHH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbdallaPS21,
  author       = {Michel Abdalla and
                  David Pointcheval and
                  Azam Soleimanian},
  title        = {2-Step Multi-Client Quadratic Functional Encryption from Decentralized
                  Function-Hiding Inner-Product},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/001},
  timestamp    = {Tue, 02 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/AbdallaPS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WaldnerMSA21,
  author       = {Hendrik Waldner and
                  Tilen Marc and
                  Miha Stopar and
                  Michel Abdalla},
  title        = {Private Stream Aggregation from Labeled Secret Sharing Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {81},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/081},
  timestamp    = {Tue, 02 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/WaldnerMSA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbdallaHH21,
  author       = {Michel Abdalla and
                  Bj{\"{o}}rn Haase and
                  Julia Hesse},
  title        = {Security Analysis of CPace},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {114},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/114},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/AbdallaHH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KimSAP21,
  author       = {Hyoseung Kim and
                  Olivier Sanders and
                  Michel Abdalla and
                  Jong Hwan Park},
  title        = {Practical Dynamic Group Signatures Without Knowledge Extractors},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {351},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/351},
  timestamp    = {Mon, 29 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KimSAP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbdallaBRRS21,
  author       = {Michel Abdalla and
                  Manuel Barbosa and
                  Peter B. R{\o}nne and
                  Peter Y. A. Ryan and
                  Petra Sala},
  title        = {Security Characterization of {J-PAKE} and its Variants},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {824},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/824},
  timestamp    = {Wed, 07 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbdallaBRRS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbdallaBKLX21,
  author       = {Michel Abdalla and
                  Manuel Barbosa and
                  Jonathan Katz and
                  Julian Loss and
                  Jiayu Xu},
  title        = {Algebraic Adversaries in the Universal Composability Framework},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1218},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1218},
  timestamp    = {Mon, 25 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbdallaBKLX21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/AbdallaBP20,
  author       = {Michel Abdalla and
                  Fabrice Benhamouda and
                  David Pointcheval},
  title        = {Corrigendum: Public-key encryption indistinguishable under plaintext-checkable
                  attacks},
  journal      = {{IET} Inf. Secur.},
  volume       = {14},
  number       = {3},
  pages        = {365--366},
  year         = {2020},
  url          = {https://doi.org/10.1049/iet-ifs.2019.0200},
  doi          = {10.1049/IET-IFS.2019.0200},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/AbdallaBP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/AbdallaCGU20,
  author       = {Michel Abdalla and
                  Dario Catalano and
                  Romain Gay and
                  Bogdan Ursu},
  editor       = {Shiho Moriai and
                  Huaxiong Wang},
  title        = {Inner-Product Functional Encryption with Fine-Grained Access Control},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12493},
  pages        = {467--497},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64840-4\_16},
  doi          = {10.1007/978-3-030-64840-4\_16},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/AbdallaCGU20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AbdallaBBJKX20,
  author       = {Michel Abdalla and
                  Manuel Barbosa and
                  Tatiana Bradley and
                  Stanislaw Jarecki and
                  Jonathan Katz and
                  Jiayu Xu},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {Universally Composable Relaxed Password Authenticated Key Exchange},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12170},
  pages        = {278--307},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56784-2\_10},
  doi          = {10.1007/978-3-030-56784-2\_10},
  timestamp    = {Wed, 26 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AbdallaBBJKX20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AbdallaGW20,
  author       = {Michel Abdalla and
                  Junqing Gong and
                  Hoeteck Wee},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {Functional Encryption for Attribute-Weighted Sums from k-Lin},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12170},
  pages        = {685--716},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56784-2\_23},
  doi          = {10.1007/978-3-030-56784-2\_23},
  timestamp    = {Thu, 07 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AbdallaGW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/AbdallaBMPSW20,
  author       = {Michel Abdalla and
                  Florian Bourse and
                  Hugo Marival and
                  David Pointcheval and
                  Azam Soleimanian and
                  Hendrik Waldner},
  editor       = {Clemente Galdi and
                  Vladimir Kolesnikov},
  title        = {Multi-Client Inner-Product Functional Encryption in the Random-Oracle
                  Model},
  booktitle    = {Security and Cryptography for Networks - 12th International Conference,
                  {SCN} 2020, Amalfi, Italy, September 14-16, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12238},
  pages        = {525--545},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-57990-6\_26},
  doi          = {10.1007/978-3-030-57990-6\_26},
  timestamp    = {Sat, 19 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/AbdallaBMPSW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbdallaBBJKX20,
  author       = {Michel Abdalla and
                  Manuel Barbosa and
                  Tatiana Bradley and
                  Stanislaw Jarecki and
                  Jonathan Katz and
                  Jiayu Xu},
  title        = {Universally Composable Relaxed Password Authenticated Key Exchange},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {320},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/320},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbdallaBBJKX20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbdallaCGU20,
  author       = {Michel Abdalla and
                  Dario Catalano and
                  Romain Gay and
                  Bogdan Ursu},
  title        = {Inner-Product Functional Encryption with Fine-Grained Access Control},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {577},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/577},
  timestamp    = {Wed, 27 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbdallaCGU20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbdallaGW20,
  author       = {Michel Abdalla and
                  Junqing Gong and
                  Hoeteck Wee},
  title        = {Functional Encryption for Attribute-Weighted Sums from k-Lin},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {762},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/762},
  timestamp    = {Thu, 07 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbdallaGW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbdallaBMPSW20,
  author       = {Michel Abdalla and
                  Florian Bourse and
                  Hugo Marival and
                  David Pointcheval and
                  Azam Soleimanian and
                  Hendrik Waldner},
  title        = {Multi-Client Inner-Product Functional Encryption in the Random-Oracle
                  Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {788},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/788},
  timestamp    = {Mon, 27 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbdallaBMPSW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Abdalla20,
  author       = {Michel Abdalla},
  title        = {Security Analysis of Olvid's SAS-based Trust Establishment Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {808},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/808},
  timestamp    = {Mon, 27 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Abdalla20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KimLAP20,
  author       = {Hyoseung Kim and
                  Youngkyung Lee and
                  Michel Abdalla and
                  Jong Hwan Park},
  title        = {Practical Dynamic Group Signature with Efficient Concurrent Joins
                  and Batch Verifications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {921},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/921},
  timestamp    = {Mon, 29 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KimLAP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/SeoALP19,
  author       = {Minhye Seo and
                  Michel Abdalla and
                  Dong Hoon Lee and
                  Jong Hwan Park},
  title        = {New technique for chosen-ciphertext security based on non-interactive
                  zero-knowledge},
  journal      = {Inf. Sci.},
  volume       = {490},
  pages        = {18--35},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.ins.2019.03.063},
  doi          = {10.1016/J.INS.2019.03.063},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/SeoALP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/AbdallaBP19,
  author       = {Michel Abdalla and
                  Fabrice Benhamouda and
                  David Pointcheval},
  title        = {On the Tightness of Forward-Secure Signature Reductions},
  journal      = {J. Cryptol.},
  volume       = {32},
  number       = {1},
  pages        = {84--150},
  year         = {2019},
  url          = {https://doi.org/10.1007/s00145-018-9283-2},
  doi          = {10.1007/S00145-018-9283-2},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/AbdallaBP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/AbdallaBP19,
  author       = {Michel Abdalla and
                  Fabrice Benhamouda and
                  Alain Passel{\`{e}}gue},
  editor       = {Steven D. Galbraith and
                  Shiho Moriai},
  title        = {Algebraic XOR-RKA-Secure Pseudorandom Functions from Post-Zeroizing
                  Multilinear Maps},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2019 - 25th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kobe, Japan, December 8-12, 2019, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11922},
  pages        = {386--412},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-34621-8\_14},
  doi          = {10.1007/978-3-030-34621-8\_14},
  timestamp    = {Tue, 26 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/AbdallaBP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/AbdallaBG19,
  author       = {Michel Abdalla and
                  Fabrice Benhamouda and
                  Romain Gay},
  editor       = {Steven D. Galbraith and
                  Shiho Moriai},
  title        = {From Single-Input to Multi-client Inner-Product Functional Encryption},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2019 - 25th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kobe, Japan, December 8-12, 2019, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11923},
  pages        = {552--582},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-34618-8\_19},
  doi          = {10.1007/978-3-030-34618-8\_19},
  timestamp    = {Tue, 26 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/AbdallaBG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AbdallaBKW19,
  author       = {Michel Abdalla and
                  Fabrice Benhamouda and
                  Markulf Kohlweiss and
                  Hendrik Waldner},
  editor       = {Dongdai Lin and
                  Kazue Sako},
  title        = {Decentralizing Inner-Product Functional Encryption},
  booktitle    = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Beijing, China,
                  April 14-17, 2019, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11443},
  pages        = {128--157},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-17259-6\_5},
  doi          = {10.1007/978-3-030-17259-6\_5},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/AbdallaBKW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbdallaBKW19,
  author       = {Michel Abdalla and
                  Fabrice Benhamouda and
                  Markulf Kohlweiss and
                  Hendrik Waldner},
  title        = {Decentralizing Inner-Product Functional Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {20},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/020},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbdallaBKW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbdallaBG19,
  author       = {Michel Abdalla and
                  Fabrice Benhamouda and
                  Romain Gay},
  title        = {From Single-Input to Multi-Client Inner-Product Functional Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {487},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/487},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbdallaBG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbdallaB19,
  author       = {Michel Abdalla and
                  Manuel Barbosa},
  title        = {Perfect Forward Security of {SPAKE2}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1194},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1194},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbdallaB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/AbdallaBN18,
  author       = {Michel Abdalla and
                  Mihir Bellare and
                  Gregory Neven},
  title        = {Robust Encryption},
  journal      = {J. Cryptol.},
  volume       = {31},
  number       = {2},
  pages        = {307--350},
  year         = {2018},
  url          = {https://doi.org/10.1007/s00145-017-9258-8},
  doi          = {10.1007/S00145-017-9258-8},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/AbdallaBN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/AbdallaBPP18,
  author       = {Michel Abdalla and
                  Fabrice Benhamouda and
                  Alain Passel{\`{e}}gue and
                  Kenneth G. Paterson},
  title        = {Related-Key Security for Pseudorandom Functions Beyond the Linear
                  Barrier},
  journal      = {J. Cryptol.},
  volume       = {31},
  number       = {4},
  pages        = {917--964},
  year         = {2018},
  url          = {https://doi.org/10.1007/s00145-017-9274-8},
  doi          = {10.1007/S00145-017-9274-8},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/AbdallaBPP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AbdallaCFGU18,
  author       = {Michel Abdalla and
                  Dario Catalano and
                  Dario Fiore and
                  Romain Gay and
                  Bogdan Ursu},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {Multi-Input Functional Encryption for Inner Products: Function-Hiding
                  Realizations and Constructions Without Pairings},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10991},
  pages        = {597--627},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96884-1\_20},
  doi          = {10.1007/978-3-319-96884-1\_20},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/AbdallaCFGU18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/2018-1,
  editor       = {Michel Abdalla and
                  Ricardo Dahab},
  title        = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Rio de Janeiro,
                  Brazil, March 25-29, 2018, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10769},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-76578-5},
  doi          = {10.1007/978-3-319-76578-5},
  isbn         = {978-3-319-76577-8},
  timestamp    = {Fri, 01 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/2018-1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/2018-2,
  editor       = {Michel Abdalla and
                  Ricardo Dahab},
  title        = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Rio de Janeiro,
                  Brazil, March 25-29, 2018, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10770},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-76581-5},
  doi          = {10.1007/978-3-319-76581-5},
  isbn         = {978-3-319-76580-8},
  timestamp    = {Fri, 01 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/2018-2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/AbdallaG0W17,
  author       = {Michel Abdalla and
                  Romain Gay and
                  Mariana Raykova and
                  Hoeteck Wee},
  editor       = {Jean{-}S{\'{e}}bastien Coron and
                  Jesper Buus Nielsen},
  title        = {Multi-input Inner-Product Functional Encryption from Pairings},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Paris, France, April 30 - May 4, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10210},
  pages        = {601--626},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-56620-7\_21},
  doi          = {10.1007/978-3-319-56620-7\_21},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/AbdallaG0W17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AbdallaBP17,
  author       = {Michel Abdalla and
                  Fabrice Benhamouda and
                  David Pointcheval},
  editor       = {Serge Fehr},
  title        = {Removing Erasures with Explainable Hash Proof Systems},
  booktitle    = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Amsterdam, The
                  Netherlands, March 28-31, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10174},
  pages        = {151--174},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-662-54365-8\_7},
  doi          = {10.1007/978-3-662-54365-8\_7},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/AbdallaBP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbdallaBP17,
  author       = {Michel Abdalla and
                  Fabrice Benhamouda and
                  Alain Passel{\`{e}}gue},
  title        = {Algebraic XOR-RKA-Secure Pseudorandom Functions from Post-Zeroizing
                  Multilinear Maps},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {500},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/500},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbdallaBP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbdallaBP17a,
  author       = {Michel Abdalla and
                  Fabrice Benhamouda and
                  David Pointcheval},
  title        = {On the Tightness of Forward-Secure Signature Reductions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {746},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/746},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbdallaBP17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbdallaCFGU17,
  author       = {Michel Abdalla and
                  Dario Catalano and
                  Dario Fiore and
                  Romain Gay and
                  Bogdan Ursu},
  title        = {Multi-Input Functional Encryption for Inner Products: Function-Hiding
                  Realizations and Constructions without Pairings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {972},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/972},
  timestamp    = {Thu, 06 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbdallaCFGU17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/AbdallaBP16,
  author       = {Michel Abdalla and
                  Fabrice Benhamouda and
                  David Pointcheval},
  title        = {Public-key encryption indistinguishable under plaintext-checkable
                  attacks},
  journal      = {{IET} Inf. Secur.},
  volume       = {10},
  number       = {6},
  pages        = {288--303},
  year         = {2016},
  url          = {https://doi.org/10.1049/iet-ifs.2015.0500},
  doi          = {10.1049/IET-IFS.2015.0500},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/AbdallaBP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/AbdallaFLT16,
  author       = {Michel Abdalla and
                  Pierre{-}Alain Fouque and
                  Vadim Lyubashevsky and
                  Mehdi Tibouchi},
  title        = {Tightly Secure Signatures From Lossy Identification Schemes},
  journal      = {J. Cryptol.},
  volume       = {29},
  number       = {3},
  pages        = {597--631},
  year         = {2016},
  url          = {https://doi.org/10.1007/s00145-015-9203-7},
  doi          = {10.1007/S00145-015-9203-7},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/joc/AbdallaFLT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cd/ONeillOMSMKHPAR16,
  author       = {M{\'{a}}ire O'Neill and
                  Elizabeth O'Sullivan and
                  Gavin McWilliams and
                  Markku{-}Juhani O. Saarinen and
                  Ciara Moore and
                  Ayesha Khalid and
                  James Howe and
                  Rafa{\"{e}}l Del Pino and
                  Michel Abdalla and
                  Francesco Regazzoni and
                  Felipe Valencia and
                  Tim G{\"{u}}neysu and
                  Tobias Oder and
                  Adrian Waller and
                  Glyn Jones and
                  Anthony Barnett and
                  Robert Griffin and
                  Andrew Byrne and
                  Bassem Ammar and
                  David Lund},
  editor       = {Gianluca Palermo and
                  John Feo},
  title        = {Secure architectures of future emerging cryptography \emph{SAFEcrypto}},
  booktitle    = {Proceedings of the {ACM} International Conference on Computing Frontiers,
                  CF'16, Como, Italy, May 16-19, 2016},
  pages        = {315--322},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2903150.2907756},
  doi          = {10.1145/2903150.2907756},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cd/ONeillOMSMKHPAR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/AbdallaCNP16,
  author       = {Michel Abdalla and
                  Mario Cornejo and
                  Anca Nitulescu and
                  David Pointcheval},
  editor       = {Ioannis G. Askoxylakis and
                  Sotiris Ioannidis and
                  Sokratis K. Katsikas and
                  Catherine Meadows},
  title        = {Robust Password-Protected Secret Sharing},
  booktitle    = {Computer Security - {ESORICS} 2016 - 21st European Symposium on Research
                  in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9879},
  pages        = {61--79},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45741-3\_4},
  doi          = {10.1007/978-3-319-45741-3\_4},
  timestamp    = {Tue, 19 Sep 2023 14:44:32 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/AbdallaCNP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbdallaBCP16,
  author       = {Michel Abdalla and
                  Florian Bourse and
                  Angelo De Caro and
                  David Pointcheval},
  title        = {Better Security for Functional Encryption for Inner Product Evaluations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {11},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/011},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbdallaBCP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbdallaCNP16,
  author       = {Michel Abdalla and
                  Mario Cornejo and
                  Anca Nitulescu and
                  David Pointcheval},
  title        = {Robust Password-Protected Secret Sharing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {123},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/123},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbdallaCNP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbdallaRW16,
  author       = {Michel Abdalla and
                  Mariana Raykova and
                  Hoeteck Wee},
  title        = {Multi-Input Inner-Product Functional Encryption from Pairings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {425},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/425},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbdallaRW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/AbdallaBPRV15,
  author       = {Michel Abdalla and
                  Sonia Bela{\"{\i}}d and
                  David Pointcheval and
                  Sylvain Ruhault and
                  Damien Vergnaud},
  editor       = {Tal Malkin and
                  Vladimir Kolesnikov and
                  Allison Bishop Lewko and
                  Michalis Polychronakis},
  title        = {Robust Pseudo-Random Number Generators with Input Secure Against Side-Channel
                  Attacks},
  booktitle    = {Applied Cryptography and Network Security - 13th International Conference,
                  {ACNS} 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9092},
  pages        = {635--654},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-28166-7\_31},
  doi          = {10.1007/978-3-319-28166-7\_31},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/AbdallaBPRV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/AbdallaBP15,
  author       = {Michel Abdalla and
                  Fabrice Benhamouda and
                  Alain Passel{\`{e}}gue},
  editor       = {Tetsu Iwata and
                  Jung Hee Cheon},
  title        = {Multilinear and Aggregate Pseudorandom Functions: New Constructions
                  and Improved Security},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Auckland, New Zealand, November 29 - December 3, 2015, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9452},
  pages        = {103--120},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48797-6\_5},
  doi          = {10.1007/978-3-662-48797-6\_5},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/AbdallaBP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AbdallaBP15,
  author       = {Michel Abdalla and
                  Fabrice Benhamouda and
                  Alain Passel{\`{e}}gue},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {An Algebraic Framework for Pseudorandom Functions and Applications
                  to Related-Key Security},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9215},
  pages        = {388--409},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-47989-6\_19},
  doi          = {10.1007/978-3-662-47989-6\_19},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AbdallaBP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/AbdallaBP15,
  author       = {Michel Abdalla and
                  Fabrice Benhamouda and
                  David Pointcheval},
  editor       = {Elisabeth Oswald and
                  Marc Fischlin},
  title        = {Disjunctions for Hash Proof Systems: New Constructions and Applications},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9057},
  pages        = {69--100},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46803-6\_3},
  doi          = {10.1007/978-3-662-46803-6\_3},
  timestamp    = {Thu, 14 Oct 2021 09:58:15 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/AbdallaBP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AbdallaBP15,
  author       = {Michel Abdalla and
                  Fabrice Benhamouda and
                  David Pointcheval},
  editor       = {Jonathan Katz},
  title        = {Public-Key Encryption Indistinguishable Under Plaintext-Checkable
                  Attacks},
  booktitle    = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD,
                  USA, March 30 - April 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9020},
  pages        = {332--352},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46447-2\_15},
  doi          = {10.1007/978-3-662-46447-2\_15},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/AbdallaBP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AbdallaBCP15,
  author       = {Michel Abdalla and
                  Florian Bourse and
                  Angelo De Caro and
                  David Pointcheval},
  editor       = {Jonathan Katz},
  title        = {Simple Functional Encryption Schemes for Inner Products},
  booktitle    = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD,
                  USA, March 30 - April 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9020},
  pages        = {733--751},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46447-2\_33},
  doi          = {10.1007/978-3-662-46447-2\_33},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/AbdallaBCP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/AbdallaBM15,
  author       = {Michel Abdalla and
                  Fabrice Benhamouda and
                  Philip MacKenzie},
  title        = {Security of the {J-PAKE} Password-Authenticated Key Exchange Protocol},
  booktitle    = {2015 {IEEE} Symposium on Security and Privacy, {SP} 2015, San Jose,
                  CA, USA, May 17-21, 2015},
  pages        = {571--587},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/SP.2015.41},
  doi          = {10.1109/SP.2015.41},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/AbdallaBM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbdallaBCP15,
  author       = {Michel Abdalla and
                  Florian Bourse and
                  Angelo De Caro and
                  David Pointcheval},
  title        = {Simple Functional Encryption Schemes for Inner Products},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {17},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/017},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbdallaBCP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbdallaBP15,
  author       = {Michel Abdalla and
                  Fabrice Benhamouda and
                  David Pointcheval},
  title        = {Tighter Reductions for Forward-Secure Signature Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {196},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/196},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbdallaBP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbdallaBF15,
  author       = {Michel Abdalla and
                  Sonia Bela{\"{\i}}d and
                  Pierre{-}Alain Fouque},
  title        = {Leakage-Resilient Symmetric Encryption via Re-keying},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {204},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/204},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbdallaBF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbdallaBP15a,
  author       = {Michel Abdalla and
                  Fabrice Benhamouda and
                  Alain Passel{\`{e}}gue},
  title        = {An Algebraic Framework for Pseudorandom Functions and Applications
                  to Related-Key Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {554},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/554},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbdallaBP15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbdallaBP15b,
  author       = {Michel Abdalla and
                  Fabrice Benhamouda and
                  Alain Passel{\`{e}}gue},
  title        = {Multilinear and Aggregate Pseudorandom Functions: New Constructions
                  and Improved Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {867},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/867},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbdallaBP15b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbdallaBPRV15,
  author       = {Michel Abdalla and
                  Sonia Bela{\"{\i}}d and
                  David Pointcheval and
                  Sylvain Ruhault and
                  Damien Vergnaud},
  title        = {Robust Pseudo-Random Number Generators with Input Secure Against Side-Channel
                  Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1219},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1219},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbdallaBPRV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/AbdallaCF14,
  author       = {Michel Abdalla and
                  Dario Catalano and
                  Dario Fiore},
  title        = {Verifiable Random Functions: Relations to Identity-Based Key Encapsulation
                  and New Constructions},
  journal      = {J. Cryptol.},
  volume       = {27},
  number       = {3},
  pages        = {544--593},
  year         = {2014},
  url          = {https://doi.org/10.1007/s00145-013-9153-x},
  doi          = {10.1007/S00145-013-9153-X},
  timestamp    = {Thu, 06 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/AbdallaCF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AbdallaBPP14,
  author       = {Michel Abdalla and
                  Fabrice Benhamouda and
                  Alain Passel{\`{e}}gue and
                  Kenneth G. Paterson},
  editor       = {Juan A. Garay and
                  Rosario Gennaro},
  title        = {Related-Key Security for Pseudorandom Functions Beyond the Linear
                  Barrier},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8616},
  pages        = {77--94},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44371-2\_5},
  doi          = {10.1007/978-3-662-44371-2\_5},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AbdallaBPP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/AbdallaCFJN14,
  author       = {Michel Abdalla and
                  Herv{\'{e}} Chabanne and
                  Houda Ferradi and
                  Julien Jainski and
                  David Naccache},
  editor       = {Xinyi Huang and
                  Jianying Zhou},
  title        = {Improving Thomlinson-Walker's Software Patching Scheme Using Standard
                  Cryptographic and Statistical Tools},
  booktitle    = {Information Security Practice and Experience - 10th International
                  Conference, {ISPEC} 2014, Fuzhou, China, May 5-8, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8434},
  pages        = {8--14},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-06320-1\_2},
  doi          = {10.1007/978-3-319-06320-1\_2},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/AbdallaCFJN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/Abdalla14,
  author       = {Michel Abdalla},
  editor       = {Sherman S. M. Chow and
                  Joseph K. Liu and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu},
  title        = {Password-Based Authenticated Key Exchange: An Overview},
  booktitle    = {Provable Security - 8th International Conference, ProvSec 2014, Hong
                  Kong, China, October 9-10, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8782},
  pages        = {1--9},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12475-9\_1},
  doi          = {10.1007/978-3-319-12475-9\_1},
  timestamp    = {Tue, 14 May 2019 10:00:45 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/Abdalla14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/scn/2014,
  editor       = {Michel Abdalla and
                  Roberto De Prisco},
  title        = {Security and Cryptography for Networks - 9th International Conference,
                  {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8642},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10879-7},
  doi          = {10.1007/978-3-319-10879-7},
  isbn         = {978-3-319-10878-0},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbdallaBP14,
  author       = {Michel Abdalla and
                  Fabrice Benhamouda and
                  David Pointcheval},
  title        = {Removing Erasures with Explainable Hash Proof Systems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {125},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/125},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbdallaBP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbdallaBP14a,
  author       = {Michel Abdalla and
                  Fabrice Benhamouda and
                  David Pointcheval},
  title        = {Disjunctions for Hash Proof Systems: New Constructions and Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {483},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/483},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbdallaBP14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbdallaBPP14,
  author       = {Michel Abdalla and
                  Fabrice Benhamouda and
                  Alain Passel{\`{e}}gue and
                  Kenneth G. Paterson},
  title        = {Related-Key Security for Pseudorandom Functions Beyond the Linear
                  Barrier},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {488},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/488},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbdallaBPP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbdallaBP14b,
  author       = {Michel Abdalla and
                  Fabrice Benhamouda and
                  David Pointcheval},
  title        = {{SPOKE:} Simple Password-Only Key Exchange in the Standard Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {609},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/609},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbdallaBP14b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/AbdallaBBCP13,
  author       = {Michel Abdalla and
                  Fabrice Benhamouda and
                  Olivier Blazy and
                  C{\'{e}}line Chevalier and
                  David Pointcheval},
  editor       = {Kazue Sako and
                  Palash Sarkar},
  title        = {SPHF-Friendly Non-interactive Commitments},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2013 - 19th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Bengaluru, India, December 1-5, 2013, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8269},
  pages        = {214--234},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-42033-7\_12},
  doi          = {10.1007/978-3-642-42033-7\_12},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/AbdallaBBCP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/AbdallaBF13,
  author       = {Michel Abdalla and
                  Sonia Bela{\"{\i}}d and
                  Pierre{-}Alain Fouque},
  editor       = {Guido Bertoni and
                  Jean{-}S{\'{e}}bastien Coron},
  title        = {Leakage-Resilient Symmetric Encryption via Re-keying},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2013 - 15th International
                  Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8086},
  pages        = {471--488},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40349-1\_27},
  doi          = {10.1007/978-3-642-40349-1\_27},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/AbdallaBF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AbdallaHP13,
  author       = {Michel Abdalla and
                  Fabrice Ben Hamouda and
                  David Pointcheval},
  editor       = {Kaoru Kurosawa and
                  Goichiro Hanaoka},
  title        = {Tighter Reductions for Forward-Secure Signature Schemes},
  booktitle    = {Public-Key Cryptography - {PKC} 2013 - 16th International Conference
                  on Practice and Theory in Public-Key Cryptography, Nara, Japan, February
                  26 - March 1, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7778},
  pages        = {292--311},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36362-7\_19},
  doi          = {10.1007/978-3-642-36362-7\_19},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/AbdallaHP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cans/2013,
  editor       = {Michel Abdalla and
                  Cristina Nita{-}Rotaru and
                  Ricardo Dahab},
  title        = {Cryptology and Network Security - 12th International Conference, {CANS}
                  2013, Paraty, Brazil, November 20-22. 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8257},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-02937-5},
  doi          = {10.1007/978-3-319-02937-5},
  isbn         = {978-3-319-02936-8},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/2013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pairing/2012,
  editor       = {Michel Abdalla and
                  Tanja Lange},
  title        = {Pairing-Based Cryptography - Pairing 2012 - 5th International Conference,
                  Cologne, Germany, May 16-18, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7708},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36334-4},
  doi          = {10.1007/978-3-642-36334-4},
  isbn         = {978-3-642-36333-7},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pairing/2012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbdallaBBCP13,
  author       = {Michel Abdalla and
                  Fabrice Benhamouda and
                  Olivier Blazy and
                  C{\'{e}}line Chevalier and
                  David Pointcheval},
  title        = {SPHF-Friendly Non-Interactive Commitments},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {588},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/588},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbdallaBBCP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbdallaFLT13,
  author       = {Michel Abdalla and
                  Pierre{-}Alain Fouque and
                  Vadim Lyubashevsky and
                  Mehdi Tibouchi},
  title        = {Tightly-Secure Signatures From Lossy Identification Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {856},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/856},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbdallaFLT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/AbdallaCP12,
  author       = {Michel Abdalla and
                  Angelo De Caro and
                  Duong Hieu Phan},
  title        = {Generalized Key Delegation for Wildcarded Identity-Based and Inner-Product
                  Encryption},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {7},
  number       = {6},
  pages        = {1695--1706},
  year         = {2012},
  url          = {https://doi.org/10.1109/TIFS.2012.2213594},
  doi          = {10.1109/TIFS.2012.2213594},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/AbdallaCP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/AbdallaFLT12,
  author       = {Michel Abdalla and
                  Pierre{-}Alain Fouque and
                  Vadim Lyubashevsky and
                  Mehdi Tibouchi},
  editor       = {David Pointcheval and
                  Thomas Johansson},
  title        = {Tightly-Secure Signatures from Lossy Identification Schemes},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2012 - 31st Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Cambridge, UK, April 15-19, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7237},
  pages        = {572--590},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29011-4\_34},
  doi          = {10.1007/978-3-642-29011-4\_34},
  timestamp    = {Sun, 12 Nov 2023 02:15:08 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/AbdallaFLT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/giis/PisaAD12,
  author       = {Pedro Silveira Pisa and
                  Michel Abdalla and
                  Otto Carlos Muniz Bandeira Duarte},
  title        = {Somewhat homomorphic encryption scheme for arithmetic operations on
                  large integers},
  booktitle    = {Global Information Infrastructure and Networking Symposium, {GIIS}
                  2012, Choroni, Venezuela, December 17-19, 2012},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/GIIS.2012.6466769},
  doi          = {10.1109/GIIS.2012.6466769},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/giis/PisaAD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/latincrypt/AbdallaV12,
  author       = {Michel Abdalla and
                  Jill{-}J{\^{e}}nn Vie},
  editor       = {Alejandro Hevia and
                  Gregory Neven},
  title        = {Leakage-Resilient Spatial Encryption},
  booktitle    = {Progress in Cryptology - {LATINCRYPT} 2012 - 2nd International Conference
                  on Cryptology and Information Security in Latin America, Santiago,
                  Chile, October 7-10, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7533},
  pages        = {78--99},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33481-8\_5},
  doi          = {10.1007/978-3-642-33481-8\_5},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/latincrypt/AbdallaV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/latincrypt/AbdallaCM12,
  author       = {Michel Abdalla and
                  Angelo De Caro and
                  Karina Mochetti},
  editor       = {Alejandro Hevia and
                  Gregory Neven},
  title        = {Lattice-Based Hierarchical Inner Product Encryption},
  booktitle    = {Progress in Cryptology - {LATINCRYPT} 2012 - 2nd International Conference
                  on Cryptology and Information Security in Latin America, Santiago,
                  Chile, October 7-10, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7533},
  pages        = {121--138},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33481-8\_7},
  doi          = {10.1007/978-3-642-33481-8\_7},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/latincrypt/AbdallaCM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AbdallaFL12,
  author       = {Michel Abdalla and
                  Dario Fiore and
                  Vadim Lyubashevsky},
  editor       = {Marc Fischlin and
                  Johannes Buchmann and
                  Mark Manulis},
  title        = {From Selective to Full Security: Semi-generic Transformations in the
                  Standard Model},
  booktitle    = {Public Key Cryptography - {PKC} 2012 - 15th International Conference
                  on Practice and Theory in Public Key Cryptography, Darmstadt, Germany,
                  May 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7293},
  pages        = {316--333},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30057-8\_19},
  doi          = {10.1007/978-3-642-30057-8\_19},
  timestamp    = {Thu, 06 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/AbdallaFL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbdallaFL12,
  author       = {Michel Abdalla and
                  Dario Fiore and
                  Vadim Lyubashevsky},
  title        = {From Selective to Full Security: Semi-Generic Transformations in the
                  Standard Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {341},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/341},
  timestamp    = {Thu, 06 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbdallaFL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/hal/Abdalla11,
  author       = {Michel Abdalla},
  title        = {Reducing The Need For Trusted Parties In Cryptography. (Limiter le
                  besoin de tiers de confiance en cryptographie)},
  year         = {2011},
  url          = {https://tel.archives-ouvertes.fr/tel-00917187},
  timestamp    = {Fri, 29 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/hal/Abdalla11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/AbdallaBCDMNSS11,
  author       = {Michel Abdalla and
                  James Birkett and
                  Dario Catalano and
                  Alexander W. Dent and
                  John Malone{-}Lee and
                  Gregory Neven and
                  Jacob C. N. Schuldt and
                  Nigel P. Smart},
  title        = {Wildcarded Identity-Based Encryption},
  journal      = {J. Cryptol.},
  volume       = {24},
  number       = {1},
  pages        = {42--82},
  year         = {2011},
  url          = {https://doi.org/10.1007/s00145-010-9060-3},
  doi          = {10.1007/S00145-010-9060-3},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/AbdallaBCDMNSS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/AbdallaCGP11,
  author       = {Michel Abdalla and
                  C{\'{e}}line Chevalier and
                  Louis Granboulan and
                  David Pointcheval},
  editor       = {Aggelos Kiayias},
  title        = {Contributory Password-Authenticated Group Key Exchange with Join Capability},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2011 - The Cryptographers' Track at
                  the {RSA} Conference 2011, San Francisco, CA, USA, February 14-18,
                  2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6558},
  pages        = {142--160},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-19074-2\_11},
  doi          = {10.1007/978-3-642-19074-2\_11},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/AbdallaCGP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/AbdallaCMP10,
  author       = {Michel Abdalla and
                  C{\'{e}}line Chevalier and
                  Mark Manulis and
                  David Pointcheval},
  editor       = {Daniel J. Bernstein and
                  Tanja Lange},
  title        = {Flexible Group Key Exchange with On-demand Computation of Subgroup
                  Keys},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2010, Third International Conference
                  on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6055},
  pages        = {351--368},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12678-9\_21},
  doi          = {10.1007/978-3-642-12678-9\_21},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/africacrypt/AbdallaCMP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/AbdallaBN10,
  author       = {Michel Abdalla and
                  Mihir Bellare and
                  Gregory Neven},
  editor       = {Daniele Micciancio},
  title        = {Robust Encryption},
  booktitle    = {Theory of Cryptography, 7th Theory of Cryptography Conference, {TCC}
                  2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5978},
  pages        = {480--497},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-11799-2\_28},
  doi          = {10.1007/978-3-642-11799-2\_28},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/AbdallaBN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/latincrypt/2010,
  editor       = {Michel Abdalla and
                  Paulo S. L. M. Barreto},
  title        = {Progress in Cryptology - {LATINCRYPT} 2010, First International Conference
                  on Cryptology and Information Security in Latin America, Puebla, Mexico,
                  August 8-11, 2010, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6212},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14712-8},
  doi          = {10.1007/978-3-642-14712-8},
  isbn         = {978-3-642-14711-1},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/latincrypt/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/AbdallaCCP09,
  author       = {Michel Abdalla and
                  Dario Catalano and
                  C{\'{e}}line Chevalier and
                  David Pointcheval},
  editor       = {Bart Preneel},
  title        = {Password-Authenticated Group Key Agreement with Adaptive Security
                  and Contributiveness},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2009, Second International
                  Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25,
                  2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5580},
  pages        = {254--271},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02384-2\_16},
  doi          = {10.1007/978-3-642-02384-2\_16},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/africacrypt/AbdallaCCP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AbdallaCP09,
  author       = {Michel Abdalla and
                  C{\'{e}}line Chevalier and
                  David Pointcheval},
  editor       = {Shai Halevi},
  title        = {Smooth Projective Hashing for Conditionally Extractable Commitments},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2009, 29th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5677},
  pages        = {671--689},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03356-8\_39},
  doi          = {10.1007/978-3-642-03356-8\_39},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/AbdallaCP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/AbdallaCF09,
  author       = {Michel Abdalla and
                  Dario Catalano and
                  Dario Fiore},
  editor       = {Antoine Joux},
  title        = {Verifiable Random Functions from Identity-Based Key Encapsulation},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2009, 28th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Cologne, Germany, April 26-30, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5479},
  pages        = {554--571},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-01001-9\_32},
  doi          = {10.1007/978-3-642-01001-9\_32},
  timestamp    = {Thu, 06 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/AbdallaCF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AbdallaBCP09,
  author       = {Michel Abdalla and
                  Xavier Boyen and
                  C{\'{e}}line Chevalier and
                  David Pointcheval},
  editor       = {Stanislaw Jarecki and
                  Gene Tsudik},
  title        = {Distributed Public-Key Cryptography from Weak Secrets},
  booktitle    = {Public Key Cryptography - {PKC} 2009, 12th International Conference
                  on Practice and Theory in Public Key Cryptography, Irvine, CA, USA,
                  March 18-20, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5443},
  pages        = {139--159},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00468-1\_9},
  doi          = {10.1007/978-3-642-00468-1\_9},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/AbdallaBCP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acns/2009,
  editor       = {Michel Abdalla and
                  David Pointcheval and
                  Pierre{-}Alain Fouque and
                  Damien Vergnaud},
  title        = {Applied Cryptography and Network Security, 7th International Conference,
                  {ACNS} 2009, Paris-Rocquencourt, France, June 2-5, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5536},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-01957-9},
  doi          = {10.1007/978-3-642-01957-9},
  isbn         = {978-3-642-01956-2},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/2009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cm/ClaveiroleAAV08,
  author       = {Thomas Claveirole and
                  Marcelo Dias de Amorim and
                  Michel Abdalla and
                  Yannis Viniotis},
  title        = {Securing wireless sensor networks against aggregator compromises},
  journal      = {{IEEE} Commun. Mag.},
  volume       = {46},
  number       = {4},
  pages        = {134--141},
  year         = {2008},
  url          = {https://doi.org/10.1109/MCOM.2008.4481352},
  doi          = {10.1109/MCOM.2008.4481352},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cm/ClaveiroleAAV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/AbdallaKN08,
  author       = {Michel Abdalla and
                  Eike Kiltz and
                  Gregory Neven},
  title        = {Generalised key delegation for hierarchical identity-based encryption},
  journal      = {{IET} Inf. Secur.},
  volume       = {2},
  number       = {3},
  pages        = {67--78},
  year         = {2008},
  url          = {https://doi.org/10.1049/iet-ifs:20070124},
  doi          = {10.1049/IET-IFS:20070124},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/AbdallaKN08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/AbdallaBCKKLMNPS08,
  author       = {Michel Abdalla and
                  Mihir Bellare and
                  Dario Catalano and
                  Eike Kiltz and
                  Tadayoshi Kohno and
                  Tanja Lange and
                  John Malone{-}Lee and
                  Gregory Neven and
                  Pascal Paillier and
                  Haixia Shi},
  title        = {Searchable Encryption Revisited: Consistency Properties, Relation
                  to Anonymous IBE, and Extensions},
  journal      = {J. Cryptol.},
  volume       = {21},
  number       = {3},
  pages        = {350--391},
  year         = {2008},
  url          = {https://doi.org/10.1007/s00145-007-9006-6},
  doi          = {10.1007/S00145-007-9006-6},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/AbdallaBCKKLMNPS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/AbdallaABN08,
  author       = {Michel Abdalla and
                  Jee Hea An and
                  Mihir Bellare and
                  Chanathip Namprempre},
  title        = {From Identification to Signatures Via the Fiat-Shamir Transform: Necessary
                  and Sufficient Conditions for Security and Forward-Security},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {54},
  number       = {8},
  pages        = {3631--3646},
  year         = {2008},
  url          = {https://doi.org/10.1109/TIT.2008.926303},
  doi          = {10.1109/TIT.2008.926303},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/AbdallaABN08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/AbdallaIP08,
  author       = {Michel Abdalla and
                  Malika Izabach{\`{e}}ne and
                  David Pointcheval},
  editor       = {Matthew K. Franklin and
                  Lucas Chi Kwong Hui and
                  Duncan S. Wong},
  title        = {Anonymous and Transparent Gateway-Based Password-Authenticated Key
                  Exchange},
  booktitle    = {Cryptology and Network Security, 7th International Conference, {CANS}
                  2008, Hong-Kong, China, December 2-4, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5339},
  pages        = {133--148},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89641-8\_10},
  doi          = {10.1007/978-3-540-89641-8\_10},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cans/AbdallaIP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/AbdallaCCP08,
  author       = {Michel Abdalla and
                  Dario Catalano and
                  C{\'{e}}line Chevalier and
                  David Pointcheval},
  editor       = {Tal Malkin},
  title        = {Efficient Two-Party Password-Based Key Exchange Protocols in the {UC}
                  Framework},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2008, The Cryptographers' Track at
                  the {RSA} Conference 2008, San Francisco, CA, USA, April 8-11, 2008.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4964},
  pages        = {335--351},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-79263-5\_22},
  doi          = {10.1007/978-3-540-79263-5\_22},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ctrsa/AbdallaCCP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbdallaBN08,
  author       = {Michel Abdalla and
                  Mihir Bellare and
                  Gregory Neven},
  title        = {Robust Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {440},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/440},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbdallaBN08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/NamprempreNA07,
  author       = {Chanathip Namprempre and
                  Gregory Neven and
                  Michel Abdalla},
  title        = {A Study of Blind Message Authentication Codes},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {90-A},
  number       = {1},
  pages        = {75--82},
  year         = {2007},
  url          = {https://doi.org/10.1093/ietfec/e90-a.1.75},
  doi          = {10.1093/IETFEC/E90-A.1.75},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/NamprempreNA07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/AbdallaBCMP07,
  author       = {Michel Abdalla and
                  Emmanuel Bresson and
                  Olivier Chevassut and
                  Bodo M{\"{o}}ller and
                  David Pointcheval},
  title        = {Strong password-based authentication in {TLS} using the three-party
                  group Diffie?Hellman protocol},
  journal      = {Int. J. Secur. Networks},
  volume       = {2},
  number       = {3/4},
  pages        = {284--296},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJSN.2007.013181},
  doi          = {10.1504/IJSN.2007.013181},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/AbdallaBCMP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/AbdallaKN07,
  author       = {Michel Abdalla and
                  Eike Kiltz and
                  Gregory Neven},
  editor       = {Joachim Biskup and
                  Javier L{\'{o}}pez},
  title        = {Generalized Key Delegation for Hierarchical Identity-Based Encryption},
  booktitle    = {Computer Security - {ESORICS} 2007, 12th European Symposium On Research
                  In Computer Security, Dresden, Germany, September 24-26, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4734},
  pages        = {139--154},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74835-9\_10},
  doi          = {10.1007/978-3-540-74835-9\_10},
  timestamp    = {Thu, 29 Aug 2019 08:09:59 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/AbdallaKN07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AbdallaDMNPS07,
  author       = {Michel Abdalla and
                  Alexander W. Dent and
                  John Malone{-}Lee and
                  Gregory Neven and
                  Duong Hieu Phan and
                  Nigel P. Smart},
  editor       = {Tatsuaki Okamoto and
                  Xiaoyun Wang},
  title        = {Identity-Based Traitor Tracing},
  booktitle    = {Public Key Cryptography - {PKC} 2007, 10th International Conference
                  on Practice and Theory in Public-Key Cryptography, Beijing, China,
                  April 16-20, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4450},
  pages        = {361--376},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-71677-8\_24},
  doi          = {10.1007/978-3-540-71677-8\_24},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/AbdallaDMNPS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/AbdallaBVS07,
  author       = {Michel Abdalla and
                  Jens{-}Matthias Bohli and
                  Mar{\'{\i}}a Isabel Gonz{\'{a}}lez Vasco and
                  Rainer Steinwandt},
  editor       = {Salil P. Vadhan},
  title        = {(Password) Authenticated Key Establishment: From 2-Party to Group},
  booktitle    = {Theory of Cryptography, 4th Theory of Cryptography Conference, {TCC}
                  2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4392},
  pages        = {499--514},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-70936-7\_27},
  doi          = {10.1007/978-3-540-70936-7\_27},
  timestamp    = {Mon, 31 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/AbdallaBVS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbdallaKN07,
  author       = {Michel Abdalla and
                  Eike Kiltz and
                  Gregory Neven},
  title        = {Generalized Key Delegation for Hierarchical Identity-Based Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {221},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/221},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbdallaKN07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/AbdallaP06,
  author       = {Michel Abdalla and
                  David Pointcheval},
  editor       = {Xuejia Lai and
                  Kefei Chen},
  title        = {A Scalable Password-Based Group Key Exchange Protocol in the Standard
                  Model},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2006, 12th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Shanghai, China, December 3-7, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4284},
  pages        = {332--347},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11935230\_22},
  doi          = {10.1007/11935230\_22},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/AbdallaP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AbdallaBCMP06,
  author       = {Michel Abdalla and
                  Emmanuel Bresson and
                  Olivier Chevassut and
                  Bodo M{\"{o}}ller and
                  David Pointcheval},
  editor       = {Ferng{-}Ching Lin and
                  Der{-}Tsai Lee and
                  Bao{-}Shuh Paul Lin and
                  Shiuhpyng Shieh and
                  Sushil Jajodia},
  title        = {Provably secure password-based authentication in {TLS}},
  booktitle    = {Proceedings of the 2006 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2006, Taipei, Taiwan, March 21-24,
                  2006},
  pages        = {35--45},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1128817.1128827},
  doi          = {10.1145/1128817.1128827},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/AbdallaBCMP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/conext/ClaveiroleAAV06,
  author       = {Thomas Claveirole and
                  Marcelo Dias de Amorim and
                  Michel Abdalla and
                  Yannis Viniotis},
  editor       = {Christophe Diot and
                  Mostafa H. Ammar},
  title        = {Resisting against aggregator compromises in sensor networks},
  booktitle    = {Proceedings of the 2006 {ACM} Conference on Emerging Network Experiment
                  and Technology, CoNEXT 2006, Lisboa, Portugal, December 4-7, 2006},
  pages        = {24},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1368436.1368468},
  doi          = {10.1145/1368436.1368468},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/conext/ClaveiroleAAV06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/AbdallaNN06,
  author       = {Michel Abdalla and
                  Chanathip Namprempre and
                  Gregory Neven},
  editor       = {David Pointcheval},
  title        = {On the (Im)possibility of Blind Message Authentication Codes},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2006, The Cryptographers' Track at
                  the {RSA} Conference 2006, San Jose, CA, USA, February 13-17, 2006,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3860},
  pages        = {262--279},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11605805\_17},
  doi          = {10.1007/11605805\_17},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ctrsa/AbdallaNN06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/AbdallaCDMNS06,
  author       = {Michel Abdalla and
                  Dario Catalano and
                  Alexander W. Dent and
                  John Malone{-}Lee and
                  Gregory Neven and
                  Nigel P. Smart},
  editor       = {Michele Bugliesi and
                  Bart Preneel and
                  Vladimiro Sassone and
                  Ingo Wegener},
  title        = {Identity-Based Encryption Gone Wild},
  booktitle    = {Automata, Languages and Programming, 33rd International Colloquium,
                  {ICALP} 2006, Venice, Italy, July 10-14, 2006, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4052},
  pages        = {300--311},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11787006\_26},
  doi          = {10.1007/11787006\_26},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/AbdallaCDMNS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AbdallaBCP06,
  author       = {Michel Abdalla and
                  Emmanuel Bresson and
                  Olivier Chevassut and
                  David Pointcheval},
  editor       = {Moti Yung and
                  Yevgeniy Dodis and
                  Aggelos Kiayias and
                  Tal Malkin},
  title        = {Password-Based Group Key Exchange in a Constant Number of Rounds},
  booktitle    = {Public Key Cryptography - {PKC} 2006, 9th International Conference
                  on Theory and Practice of Public-Key Cryptography, New York, NY, USA,
                  April 24-26, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3958},
  pages        = {427--442},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11745853\_28},
  doi          = {10.1007/11745853\_28},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/AbdallaBCP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-cs-0610084,
  author       = {Thomas Claveirole and
                  Marcelo Dias de Amorim and
                  Michel Abdalla and
                  Yannis Viniotis},
  title        = {Share and Disperse: How to Resist Against Aggregator Compromises in
                  Sensor Networks},
  journal      = {CoRR},
  volume       = {abs/cs/0610084},
  year         = {2006},
  url          = {http://arxiv.org/abs/cs/0610084},
  eprinttype    = {arXiv},
  eprint       = {cs/0610084},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-cs-0610084.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbdallaCDMNS06,
  author       = {Michel Abdalla and
                  Dario Catalano and
                  Alexander W. Dent and
                  John Malone{-}Lee and
                  Gregory Neven and
                  Nigel P. Smart},
  title        = {Identity-Based Encryption Gone Wild},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {304},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/304},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbdallaCDMNS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/AbdallaCFP05,
  author       = {Michel Abdalla and
                  Olivier Chevassut and
                  Pierre{-}Alain Fouque and
                  David Pointcheval},
  editor       = {Bimal K. Roy},
  title        = {A Simple Threshold Authenticated Key Exchange from Short Secrets},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2005, 11th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Chennai, India, December 4-8, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3788},
  pages        = {566--584},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11593447\_31},
  doi          = {10.1007/11593447\_31},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/AbdallaCFP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AbdallaBCKKLMNPS05,
  author       = {Michel Abdalla and
                  Mihir Bellare and
                  Dario Catalano and
                  Eike Kiltz and
                  Tadayoshi Kohno and
                  Tanja Lange and
                  John Malone{-}Lee and
                  Gregory Neven and
                  Pascal Paillier and
                  Haixia Shi},
  editor       = {Victor Shoup},
  title        = {Searchable Encryption Revisited: Consistency Properties, Relation
                  to Anonymous IBE, and Extensions},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2005: 25th Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 14-18,
                  2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3621},
  pages        = {205--222},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11535218\_13},
  doi          = {10.1007/11535218\_13},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/AbdallaBCKKLMNPS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/AbdallaP05,
  author       = {Michel Abdalla and
                  David Pointcheval},
  editor       = {Alfred Menezes},
  title        = {Simple Password-Based Encrypted Key Exchange Protocols},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2005, The Cryptographers' Track at
                  the {RSA} Conference 2005, San Francisco, CA, USA, February 14-18,
                  2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3376},
  pages        = {191--208},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-30574-3\_14},
  doi          = {10.1007/978-3-540-30574-3\_14},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/AbdallaP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/AbdallaP05,
  author       = {Michel Abdalla and
                  David Pointcheval},
  editor       = {Andrew S. Patrick and
                  Moti Yung},
  title        = {Interactive Diffie-Hellman Assumptions with Applications to Password-Based
                  Authentication},
  booktitle    = {Financial Cryptography and Data Security, 9th International Conference,
                  {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March
                  3, 2005, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3570},
  pages        = {341--356},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11507840\_31},
  doi          = {10.1007/11507840\_31},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/AbdallaP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AbdallaCP05,
  author       = {Michel Abdalla and
                  Olivier Chevassut and
                  David Pointcheval},
  editor       = {Serge Vaudenay},
  title        = {One-Time Verifier-Based Encrypted Key Exchange},
  booktitle    = {Public Key Cryptography - {PKC} 2005, 8th International Workshop on
                  Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland,
                  January 23-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3386},
  pages        = {47--64},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-30580-4\_5},
  doi          = {10.1007/978-3-540-30580-4\_5},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/AbdallaCP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AbdallaFP05,
  author       = {Michel Abdalla and
                  Pierre{-}Alain Fouque and
                  David Pointcheval},
  editor       = {Serge Vaudenay},
  title        = {Password-Based Authenticated Key Exchange in the Three-Party Setting},
  booktitle    = {Public Key Cryptography - {PKC} 2005, 8th International Workshop on
                  Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland,
                  January 23-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3386},
  pages        = {65--84},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-30580-4\_6},
  doi          = {10.1007/978-3-540-30580-4\_6},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/AbdallaFP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbdallaBCKKLMNPS05,
  author       = {Michel Abdalla and
                  Mihir Bellare and
                  Dario Catalano and
                  Eike Kiltz and
                  Tadayoshi Kohno and
                  Tanja Lange and
                  John Malone{-}Lee and
                  Gregory Neven and
                  Pascal Paillier and
                  Haixia Shi},
  title        = {Searchable Encryption Revisited: Consistency Properties, Relation
                  to Anonymous IBE, and Extensions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {254},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/254},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbdallaBCKKLMNPS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/AbdallaW04,
  author       = {Michel Abdalla and
                  Bogdan Warinschi},
  editor       = {Javier L{\'{o}}pez and
                  Sihan Qing and
                  Eiji Okamoto},
  title        = {On the Minimal Assumptions of Group Signature Schemes},
  booktitle    = {Information and Communications Security, 6th International Conference,
                  {ICICS} 2004, Malaga, Spain, October 27-29, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3269},
  pages        = {1--13},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30191-2\_1},
  doi          = {10.1007/978-3-540-30191-2\_1},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/AbdallaW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbdallaFP04,
  author       = {Michel Abdalla and
                  Pierre{-}Alain Fouque and
                  David Pointcheval},
  title        = {Password-Based Authenticated Key Exchange in the Three-Party Setting},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {233},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/233},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbdallaFP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/AbdallaABN02,
  author       = {Michel Abdalla and
                  Jee Hea An and
                  Mihir Bellare and
                  Chanathip Namprempre},
  editor       = {Lars R. Knudsen},
  title        = {From Identification to Signatures via the Fiat-Shamir Transform: Minimizing
                  Assumptions for Security and Forward-Security},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2002, International Conference
                  on the Theory and Applications of Cryptographic Techniques, Amsterdam,
                  The Netherlands, April 28 - May 2, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2332},
  pages        = {418--433},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-46035-7\_28},
  doi          = {10.1007/3-540-46035-7\_28},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/AbdallaABN02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbdallaABN02,
  author       = {Michel Abdalla and
                  Jee Hea An and
                  Mihir Bellare and
                  Chanathip Namprempre},
  title        = {From Identification to Signatures via the Fiat-Shamir Transform: Minimizing
                  Assumptions for Security and Forward-Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {22},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/022},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbdallaABN02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/AbdallaBR01,
  author       = {Michel Abdalla and
                  Mihir Bellare and
                  Phillip Rogaway},
  editor       = {David Naccache},
  title        = {The Oracle Diffie-Hellman Assumptions and an Analysis of {DHIES}},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2001, The Cryptographer's Track at
                  {RSA} Conference 2001, San Francisco, CA, USA, April 8-12, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2020},
  pages        = {143--158},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45353-9\_12},
  doi          = {10.1007/3-540-45353-9\_12},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ctrsa/AbdallaBR01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/AbdallaMN01,
  author       = {Michel Abdalla and
                  Sara K. Miner and
                  Chanathip Namprempre},
  editor       = {David Naccache},
  title        = {Forward-Secure Threshold Signature Schemes},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2001, The Cryptographer's Track at
                  {RSA} Conference 2001, San Francisco, CA, USA, April 8-12, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2020},
  pages        = {441--456},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45353-9\_32},
  doi          = {10.1007/3-540-45353-9\_32},
  timestamp    = {Sat, 16 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/AbdallaMN01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ton/AbdallaSW00,
  author       = {Michel Abdalla and
                  Yuval Shavitt and
                  Avishai Wool},
  title        = {Key management for restricted multicast using broadcast encryption},
  journal      = {{IEEE/ACM} Trans. Netw.},
  volume       = {8},
  number       = {4},
  pages        = {443--454},
  year         = {2000},
  url          = {https://doi.org/10.1109/90.865073},
  doi          = {10.1109/90.865073},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ton/AbdallaSW00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/AbdallaR00,
  author       = {Michel Abdalla and
                  Leonid Reyzin},
  editor       = {Tatsuaki Okamoto},
  title        = {A New Forward-Secure Digital Signature Scheme},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2000, 6th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kyoto, Japan, December 3-7, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1976},
  pages        = {116--129},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44448-3\_10},
  doi          = {10.1007/3-540-44448-3\_10},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/AbdallaR00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/AbdallaB00,
  author       = {Michel Abdalla and
                  Mihir Bellare},
  editor       = {Tatsuaki Okamoto},
  title        = {Increasing the Lifetime of a Key: {A} Comparative Analysis of the
                  Security of Re-keying Techniques},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2000, 6th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kyoto, Japan, December 3-7, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1976},
  pages        = {546--559},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44448-3\_42},
  doi          = {10.1007/3-540-44448-3\_42},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/AbdallaB00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbdallaR00,
  author       = {Michel Abdalla and
                  Leonid Reyzin},
  title        = {A New Forward-Secure Digital Signature Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {2},
  year         = {2000},
  url          = {http://eprint.iacr.org/2000/002},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbdallaR00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbdallaMN00,
  author       = {Michel Abdalla and
                  Sara K. Miner and
                  Chanathip Namprempre},
  title        = {Forward Security in Threshold Signature Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {31},
  year         = {2000},
  url          = {http://eprint.iacr.org/2000/031},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbdallaMN00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/AbdallaSW99,
  author       = {Michel Abdalla and
                  Yuval Shavitt and
                  Avishai Wool},
  editor       = {Matthew K. Franklin},
  title        = {Towards Making Broadcast Encryption Practical},
  booktitle    = {Financial Cryptography, Third International Conference, FC'99, Anguilla,
                  British West Indies, February 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1648},
  pages        = {140--157},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48390-X\_11},
  doi          = {10.1007/3-540-48390-X\_11},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/AbdallaSW99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbdallaBR99,
  author       = {Michel Abdalla and
                  Mihir Bellare and
                  Phillip Rogaway},
  title        = {{DHAES:} An Encryption Scheme Based on the Diffie-Hellman Problem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {7},
  year         = {1999},
  url          = {http://eprint.iacr.org/1999/007},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbdallaBR99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics