Nombre de documents

62

Michel Abdalla's Publications


Article dans une revue13 documents

  • Michel Abdalla, Fabrice Benhamouda, David Pointcheval. Public-key encryption indistinguishable under plaintext-checkable attacks. IET Information Security, Institution of Engineering and Technology, 2016, 10 (6), pp.288-303. <10.1049/iet-ifs.2015.0500>. <hal-01385178>
  • Michel Abdalla, Pierre-Alain Fouque, Vadim Lyubashevsky, Mehdi Tibouchi. Tightly Secure Signatures From Lossy Identification Schemes. Journal of Cryptology, Springer Verlag, 2015, pp.35. <10.1007/s00145-015-9203-7>. <hal-01136799>
  • Michel Abdalla, Dario Catalano, Dario Fiore. Verifiable Random Functions: Relations to Identity-Based Key Encapsulation and New Constructions. Journal of Cryptology, Springer Verlag, 2014, 27 (3), pp.544-593. <http://link.springer.com/article/10.1007%2Fs00145-013-9153-x>. <10.1007/s00145-013-9153-x>. <hal-00915548>
  • Michel Abdalla, Angelo De Caro, Duong Hieu Phan. Generalized Key Delegation for Wildcarded Identity-Based and Inner-Product Encryption. IEEE Transactions on Information Forensics and Security, Institute of Electrical and Electronics Engineers, 2012, 7 (6), pp.1695-1706. <10.1109/TIFS.2012.2213594>. <hal-00918522>
  • Michel Abdalla, James Birkett, Dario Catalano, Alexander W. Dent, John Malone-Lee, et al.. Wildcarded Identity-Based Encryption. Journal of Cryptology, Springer Verlag, 2011, 24 (1), pp.42-82. <10.1007/s00145-010-9060-3>. <hal-00915848>
  • Michel Abdalla, Mihir Bellare, Dario Catalano, Eike Kiltz, Tadayoshi Kohno, et al.. Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions. Journal of Cryptology, Springer Verlag, 2008, 21 (3), pp.350-391. <10.1007/s00145-007-9006-6>. <hal-00918362>
  • Thomas Claveirole, Marcelo Dias de Amorim, Michel Abdalla, Yannis Viniotis. Securing Wireless Sensor Networks Against Aggregator Compromises. IEEE Communications Magazine, Institute of Electrical and Electronics Engineers, 2008, 46 (4), pp.134-141. <10.1109/MCOM.2008.4481352>. <hal-00918368>
  • Michel Abdalla, Jee Hea An, Mihir Bellare, Chanathip Namprempre. From Identification to Signatures Via the Fiat-Shamir Transform: Necessary and Sufficient Conditions for Security and Forward-Security. IEEE Transactions on Information Theory, Institute of Electrical and Electronics Engineers, 2008, 54 (8), pp.3631-3646. <10.1109/TIT.2008.926303>. <hal-00917092>
  • Michel Abdalla, Eike Kiltz, Gregory Neven. Generalised Key Delegation for Hierarchical Identity-Based Encryption. IET Information Security, Institution of Engineering and Technology, 2008, 2 (3), pp.67-78. <10.1049/iet-ifs:20070124>. <hal-00918539>
  • Chanathip Namprempre, Gregory Neven, Michel Abdalla. A Study of Blind Message Authentication Codes. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Institute of Electronics, Information and Communication Engineers, 2007, E90-A (1), pp.75-82. <10.1093/ietfec/e90-a.1.75>. <hal-00918388>
  • Michel Abdalla, Emmanuel Bresson, Olivier Chevassut, Bodo Möller, David Pointcheval. Strong Password-Based Authentication in TLS using the Three-Party Group Diffie-Hellman Protocol. International Journal of Security and Networks, Inderscience, 2007, 2 (3/4), pp.284-296. <10.1504/IJSN.2007.013181>. <hal-00918396>
  • Michel Abdalla, Pierre-Alain Fouque, David Pointcheval. Password-Based Authenticated Key Exchange in the Three-Party Setting. IEE Proceedings - Information Security, Institution of Electrical Engineers (IEE), 2006, 153 (1), pp.27-39. <10.1049/ip-ifs:20055073>. <hal-00918401>
  • Michel Abdalla, Yuval Shavitt, Avishai Wool. Key management for restricted multicast using broadcast encryption. IEEE/ACM Transactions on Networking, IEEE/ACM, 2000, 8 (4), pp.443-454. <10.1109/90.865073>. <hal-00918504>

Communication dans un congrès31 documents

  • Michel Abdalla, Mario Cornejo, Anca Nitulescu, David Pointcheval. Robust Password-Protected Secret Sharing. Ioannis Askoxylakis; Sotiris Ioannidis; Sokratis Katsikas ; Catherine Meadows ESORICS 2016 - 21st European Symposium on Research in Computer Security, Sep 2016, Heraklion, Greece. Springer, 9879, pp.61-79, 2016, Lecture Notes in Computer Science. <https://eprint.iacr.org/2016/123>. <10.1007/978-3-319-45741-3_4>. <hal-01380699>
  • Michel Abdalla, Sonia Belaïd, David Pointcheval, Sylvain Ruhault, Damien Vergnaud. Robust Pseudo-Random Number Generators with Input Secure Against Side-Channel Attacks. Tal Malkin; Vladimir Kolesnikov; Allison Bishop Lewko; Michalis Polychronakis. ACNS 2015, Jun 2015, New York, United States. Springer, 9092, Lecture Notes in Computer Science. <10.1007/978-3-319-28166-7_31>. <hal-01242003>
  • Michel Abdalla, Fabrice Benhamouda, David Pointcheval. Public-Key Encryption Indistinguishable Under Plaintext-Checkable Attacks. Jonathan Katz. PKC 2015, Mar 2015, Maryland, United States. Springer, 9020, pp.332-352, 2015, Lecture Notes in Computer Science. <10.1007/978-3-662-46447-2_15>. <hal-01131982>
  • Michel Abdalla, Florian Bourse, Angelo De Caro, David Pointcheval. Simple Functional Encryption Schemes for Inner Products. Jonathan Katz. PKC 2015, Mar 2015, Maryland, United States. Springer, 9020, pp.733-751, 2015, Lecture Notes in Computer Science. <10.1007/978-3-662-46447-2_33>. <hal-01131971>
  • Michel Abdalla, Fabrice Benhamouda, David Pointcheval. Disjunctions for Hash Proof Systems: New Constructions and Applications. Elisabeth Oswald; Marc Fischlin. EUROCRYPT 2015, Apr 2015, Sofia, Bulgaria. Springer, 9057, pp.69-100, 2015, Lecture Notes in Computer Science. <10.1007/978-3-662-46803-6_3>. <hal-01131994>
  • Michel Abdalla, Fabrice Benhamouda, Alain Passelègue. An Algebraic Framework for Pseudorandom Functions and Applications to Related-Key Security. Rosario Gennaro; Matthew Robshaw. CRYPTO 2015, Aug 2015, Santa Barbara, United States. Springer, 9215, pp.388-409, 2015, Lecture Notes in Computer Science. <10.1007/978-3-662-47989-6_19>. <hal-01175786>
  • Michel Abdalla, Fabrice Benhamouda, Philip Mackenzie. Security of the J-PAKE Password-Authenticated Key Exchange Protocol. 2015 IEEE Symposium on Security and Privacy, May 2015, San Jose, United States. IEEE Computer Society, pp.571-587, 2015, <10.1109/SP.2015.41>. <hal-01175785>
  • Michel Abdalla, Fabrice Benhamouda, Alain Passelègue. Multilinear and Aggregate Pseudorandom Functions: New Constructions and Improved Security. Tetsu Iwata; Jung Hee Cheon. ASIACRYPT 2015, Nov 2015, Auckland, New Zealand. Springer, 9452, pp.103-120, Lecture Notes in Computer Science. <10.1007/978-3-662-48797-6_5>. <hal-01233740>
  • Michel Abdalla, Fabrice Benhamouda, Alain Passelègue, Kenneth G. Paterson. Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier. Juan A. Garay and Rosario Gennaro. CRYPTO 2014, Aug 2014, Santa Barbara, United States. 8616, pp.77-94, 2014, Lecture Notes in Computer Science; Advances in Cryptology - CRYPTO 2014. <10.1007/978-3-662-44371-2_5>. <hal-01068388>
  • Michel Abdalla, Hervé Chabanne, Houda Ferradi, Julien Jainski, David Naccache. Improving Thomlinson-Walker's Software Patching Scheme Using Standard Cryptographic and Statistical Tools. Xinyi Huang; Jianying Zhou. ISPEC 2014, May 2014, Fuzhou, China. Springer, 8434, pp.8-14, 2014, Lecture Notes in Computer Science. <10.1007/978-3-319-06320-1_2>. <hal-01071319>
  • Michel Abdalla. Password-Based Authenticated Key Exchange: An Overview. Sherman S. M. Chow; Joseph K. Liu; Lucas C. K. Hui; Siu Ming Yiu. PROVSEC 2014, Oct 2014, Hong Kong, China. Springer, 8782, pp.1-9, 2014, <10.1007/978-3-319-12475-9_1>. <hal-01071313>
  • Michel Abdalla, Sonia Belaid, Pierre-Alain Fouque. Leakage-Resilient Symmetric Encryption via Re-keying. Cryptographic Hardware and Embedded Systems - 2013, Aug 2013, Santa Barbara, United States. Springer, LNCS 8086, pp.18, 2013, CHES 2013. <10.1007/978-3-642-40349-1_27>. <hal-01094306>
  • Michel Abdalla, Fabrice Benhamouda, Olivier Blazy, Céline Chevalier, David Pointcheval. SPHF-Friendly Non-Interactive Commitments. Kazue Sako and Palash Sarkar. ASIACRYPT 2013, Dec 2013, Bangalore, India. Springer, 8269, pp.214-234, 2013, Lecture Notes in Computer Science; Advances in Cryptology - ASIACRYPT 2013. <10.1007/978-3-642-42033-7_12>. <hal-00915542>
  • Michel Abdalla, Sonia Belaid, Pierre-Alain Fouque. Leakage-Resilient Symmetric Encryption via Re-keying. Guido Bertoni and Jean-Sébastien Coron. Cryptographic Hardware and Embedded Systems - CHES 2013, Aug 2013, Santa Barbara, United States. Springer, 8086, pp.471-488, 2013, Lecture Notes in Computer Science. <10.1007/978-3-642-40349-1_27>. <hal-00870955>
  • Michel Abdalla, Fabrice Ben Hamouda, David Pointcheval. Tighter Reductions for Forward-Secure Signature Scheme. K. Kurosawa and G. Hanaoka. Public-Key Cryptography (PKC 2013), Feb 2013, Nara, Japan. Springer, 7778, pp.292-311, 2013, LNCS; Public-Key Cryptography (PKC 2013). <10.1007/978-3-642-36362-7_19>. <hal-00790626>
  • Michel Abdalla, Pierre-Alain Fouque, Vadim Lyubashevsky, Mehdi Tibouchi. Tightly-Secure Signatures from Lossy Identification Schemes. Advances in Cryptology - 2012, Apr 2012, Cambridge, United Kingdom. Springer, LNCS 7237, pp.19, 2012, EUROCRYPT 2012. <10.1007/978-3-642-29011-4_34>. <hal-01094318>
  • Michel Abdalla, Dario Fiore, Vadim Lyubashevsky. From Selective to Full Security: Semi-Generic Transformations in the Standard Model. Marc Fischlin and Johannes Buchmann and Mark Manulis. PKC 2012, May 2012, Darmstadt, Germany. Springer, 7293, pp.316-333, 2012, Lecture Notes in Computer Science; Public Key Cryptography - PKC 2012. <10.1007/978-3-642-30057-8_19>. <hal-00915817>
  • Michel Abdalla, Céline Chevalier, Louis Granboulan, David Pointcheval. Contributory Password-Authenticated Group Key Exchange with Join Capability. Aggelos Kiayias. CT-RSA 2011, Feb 2012, San Francisco, United States. Springer, 6558, pp.142-160, 2011, Lecture Notes in Computer Science; Topics in Cryptology - CT-RSA 2011. <10.1007/978-3-642-19074-2_11>. <hal-00915828>
  • Michel Abdalla, Jill-Jênn Vie. Leakage-Resilient Spatial Encryption. Alejandro Hevia and Gregory Neven. LATINCRYPT 2012, Oct 2012, Santiago, Chile. Springer, 7533, pp.78-99, 2012, Lecture Notes in Computer Science; Progress in Cryptology - LATINCRYPT 2012. <10.1007/978-3-642-33481-8_5>. <hal-00915816>
  • Michel Abdalla, Angelo De Caro, Karina Mochetti. Lattice-Based Hierarchical Inner Product Encryption. Alejandro Hevia and Gregory Neven. LATINCRYPT 2012, Oct 2012, Santiago, Chile. Springer, 7533, pp.121-138, 2012, Lecture Notes in Computer Science; Progress in Cryptology - LATINCRYPT 2012. <10.1007/978-3-642-33481-8_7>. <hal-00915812>
  • Michel Abdalla, Mihir Bellare, Gregory Neven. Robust Encryption. Daniele Micciancio. TCC 2010, Feb 2010, Zurich, Switzerland. Springer, 5978, pp.480-497, 2010, Lecture Notes in Computer Science; Theory of Cryptography. <10.1007/978-3-642-11799-2_28>. <hal-00915836>
  • Michel Abdalla, Céline Chevalier, Mark Manulis, David Pointcheval. Flexible Group Key Exchange with On-Demand Computation of Subgroup Keys. Third African International Conference on Cryptology (AfricaCrypt '10), 2010, Stellenbosch, South Africa. Springer, 6055, pp.351--368, 2010, LNCS. <inria-00539541>
  • Michel Abdalla, Dario Catalano, Céline Chevalier, David Pointcheval. Password-Authenticated Group Key Agreement with Adaptive Security and Contributiveness. B. Preneel. Second African International Conference on Cryptology (AfricaCrypt '09), 2009, Gammarth - Tunisie, Tunisia. Springer-Verlag, Berlin, 5580, pp.254--271, 2009, Lecture notes in computer science. <inria-00419147>
  • Michel Abdalla, Céline Chevalier, David Pointcheval. Smooth Projective Hashing for Conditionally Extractable Commitments. S. Halevi. Advances in Cryptology -- Proceedings of CRYPTO '09, 2009, Santa-Barbara, Californie, United States. Springer-Verlag, Berlin, 5677, pp.671--689, 2009, Lecture notes in computer science. <inria-00419145>
  • Michel Abdalla, Xavier Boyen, Céline Chevalier, David Pointcheval. Distributed Public-Key Cryptography from Weak Secrets. S. Jarecki and G. Tsudik. Conference on Practice and Theory in Public-Key Cryptography (PKC '09), 2009, Irvine, California, USA, United States. Springer-Verlag, Berlin, 5443, pp.139--159, 2009, Lecture notes in computer science. <inria-00419149>
  • Michel Abdalla, Dario Catalano, Dario Fiore. Verifiable Random Functions from Identity based Key Encapsulation. Antoine Joux. EUROCRYPT 2009, Apr 2009, Cologne, Germany. 5479, pp.554-571, 2009, Lecture Notes in Computer Science; Advances in Cryptology - EUROCRYPT 2009. <10.1007/978-3-642-01001-9_32>. <hal-00915859>
  • Michel Abdalla, Dario Catalano, Céline Chevalier, David Pointcheval. Efficient Two-Party Password-Based Key Exchange Protocols in the UC Framework. T. Malkin. The Cryptographers' Track at RSA Conference '08 (CT-RSA '08), 2008, San Francisco, Californie, Germany. Springer-Verlag, Berlin, 4964, pp.335--351, 2008, Lecture notes in computer science. <inria-00419157>
  • Michel Abdalla, Malika Izabachène, David Pointcheval. Anonymous and Transparent Gateway-based Password-Authenticated Key Exchange. M. Franklin and L. Hui and D. Wong. The 7th International Workshop on Cryptology and Network Security (CANS '08), 2008, Hong-Kong, China. Springer-Verlag, Berlin, 5339, pp.133--148, 2008, Lecture notes in computer science. <inria-00419150>
  • Michel Abdalla, Eike Kiltz, Gregory Neven. Generalized Key Delegation for Hierarchical Identity-Based Encryption. Joachim Biskup and Javier López. ESORICS 2007, Sep 2007, Dresden, Germany. Springer, 4734, pp.139-154, 2007, Lecture Notes in Computer Science; ESORICS 2007. <10.1007/978-3-540-74835-9_10>. <hal-00918551>
  • Michel Abdalla, Alex Dent, John Malone-Lee, Gregory Neven, Duong Hieu Phan, et al.. Identity-based Traitor Tracing. Tatsuaki Okamoto and Xiaoyun Wang. PKC 2007, Apr 2007, Beijing, China. Springer, 4450, pp.361-376, 2007, Lecture Notes in Computer Science; Public Key Cryptography - PKC 2007. <10.1007/978-3-540-71677-8_24>. <hal-00918560>
  • Thomas Claveirole, Marcelo Dias de Amorim, Michel Abdalla, Yannis Viniotis. Résistance contre les attaques par capture dans les réseaux de capteurs. Huitièmes Journées Doctorales en Informatique et Réseaux (JDIR'07), Jan 2007, Marne-la-Vallée, France. pp.19-28, 2007. <hal-01091860>

Direction d'ouvrage, Proceedings5 documents

  • Michel Abdalla, Roberto De Prisco. Security and Cryptography for Networks - SCN 2014. Michel Abdalla; Roberto De Prisco. Security and Cryptography for Networks - SCN 2014, Sep 2014, Amalfi, Italy. 8642, Springer, pp.609, 2014, Lecture Notes in Computer Science, 978-3-319-10878-0. <10.1007/978-3-319-10879-7>. <hal-01068374>
  • Michel Abdalla, Tanja Lange. Pairing-Based Cryptography - PAIRING 2012. Michel Abdalla and Tanja Lange. 7708, Springer, pp.333, 2013, Lecture Notes in Computer Science, 978-3-642-36334-4. <10.1007/978-3-642-36334-4>. <hal-00915796>
  • Michel Abdalla, Cristina Nita-Rotaru, Ricardo Dahab. CANS 2013. Michel Abdalla and Cristina Nita-Rotaru and Ricardo Dahab. 8257, Springer, pp.349, 2013, Lecture Notes in Computer Science, 978-3-319-02936-8. <10.1007/978-3-319-02937-5>. <hal-00915711>
  • Michel Abdalla, Paulo S. L. M. Barreto. Progress in Cryptology - LATINCRYPT 2010. Michel Abdalla and Paulo Barreto. 6212, Springer, pp.323, 2010, Lecture Notes in Computer Science, 978-3-642-14711-1. <10.1007/978-3-642-14712-8>. <hal-00915803>
  • Michel Abdalla, David Pointcheval, Pierre-Alain Fouque, Damien Vergnaud. Proceedings of the 7th International Conference on Applied Cryptography and Network Security (ACNS '09). Abdalla, Michel and Pointcheval, David and Fouque, Pierre-Alain and Vergnaud, Damien. 5536, Springer, pp.534, 2009, LNCS, 978-3-642-01957-9. <10.1007/978-3-642-01957-9>. <inria-00539538>

Rapport12 documents

  • Michel Abdalla, Florian Bourse, Angelo De Caro, David Pointcheval. Better Security for Functional Encryption for Inner Product Evaluations. [Technical Report] Cryptology ePrint Archive: Report 2016/011, IACR. 2016. <hal-01380726>
  • Michel Abdalla, Mariana Raykova, Hoeteck Wee. Multi-Input Inner-Product Functional Encryption from Pairings. [Technical Report] Cryptology ePrint Archive: Report 2016/425, IACR. 2016. <hal-01380735>
  • Michel Abdalla, Mario Cornejo, Anca Nitulescu, David Pointcheval. Robust Password-Protected Secret Sharing. [Technical Report] Cryptology ePrint Archive: Report 2016/123, IACR. 2016. <hal-01380730>
  • Michel Abdalla, Fabrice Benhamouda, Alain Passelègue. An Algebraic Framework for Pseudorandom Functions and Applications to Related-Key Security. [Technical Report] Cryptology ePrint Archive: Report 2015/554, IACR. 2015. <hal-01175788>
  • Michel Abdalla, Fabrice Benhamouda, David Pointcheval. Tighter Reductions for Forward-Secure Signature Schemes. [Technical Report] Cryptology ePrint Archive: Report 2015/196, IACR. 2015. <hal-01132190>
  • Michel Abdalla, Sonia Belaïd, Pierre-Alain Fouque. Leakage-Resilient Symmetric Encryption via Re-keying. [Technical Report] Cryptology ePrint Archive: Report 2015/204, IACR. 2015. <hal-01132195>
  • Michel Abdalla, Florian Bourse, Angelo De Caro, David Pointcheval. Simple Functional Encryption Schemes for Inner Products. [Technical Report] Cryptology ePrint Archive: Report 2015/017, IACR. 2015. <hal-01108287>
  • Michel Abdalla, Fabrice Benhamouda, Alain Passelègue. Multilinear and Aggregate Pseudorandom Functions: New Constructions and Improved Security. [Technical Report] Cryptology ePrint Archive: Report 2015/867, IACR. 2015. <hal-01233749>
  • Michel Abdalla, Fabrice Benhamouda, Alain Passelègue, Kenneth G. Paterson. Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier. [Technical Report] Cryptology ePrint Archive: Report 2014/488, IACR. 2014. <hal-01068465>
  • Michel Abdalla, Fabrice Benhamouda, David Pointcheval. Public-Key Encryption Indistinguishable Under Plaintext-Checkable Attacks. [Technical Report] Cryptology ePrint Archive: Report 2014/609, IACR. 2014. <hal-01068416>
  • Michel Abdalla, Fabrice Benhamouda, David Pointcheval. Removing Erasures with Explainable Hash Proof Systems. [Technical Report] Cryptology ePrint Archive: Report 2014/125, IACR. 2014. <hal-01068442>
  • Michel Abdalla, Fabrice Benhamouda, David Pointcheval. Disjunctions for Hash Proof Systems: New Constructions and Applications. [Technical Report] Cryptology ePrint Archive: Report 2014/483, IACR. 2014. <hal-01068420>

HDR1 document

  • Michel Abdalla. Reducing The Need For Trusted Parties In Cryptography. Cryptography and Security [cs.CR]. Ecole Normale Supérieure de Paris - ENS Paris, 2011. <tel-00917187>