Michel F. Abdalla, Ph.D.

Affiliations: 
2001 University of California, San Diego, La Jolla, CA 
Area:
Computer Science
Google:
"Michel Abdalla"

Parents

Sign in to add mentor
Mihir Bellare grad student 2001 UCSD (Computer Science Tree)
 (Design and analysis of secure encryption schemes.)
BETA: Related publications

Publications

You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect.

Abdalla M, Benhamouda F, Pointcheval D. (2020) Corrigendum: Public-key encryption indistinguishable under plaintext-checkable attacks Iet Information Security. 14: 365-366
Seo M, Abdalla M, Lee DH, et al. (2019) New technique for chosen-ciphertext security based on non-interactive zero-knowledge Information Sciences. 490: 18-35
Abdalla M, Benhamouda F, Pointcheval D. (2019) On the Tightness of Forward-Secure Signature Reductions Journal of Cryptology. 32: 84-150
Abdalla M, Benhamouda F, Passelègue A, et al. (2018) Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier Journal of Cryptology. 31: 917-964
Abdalla M, Benhamouda F, Pointcheval D. (2016) Public-key encryption indistinguishable under plaintext-checkable attacks Iet Information Security. 10: 288-303
Abdalla M, Fouque PA, Lyubashevsky V, et al. (2016) Tightly Secure Signatures From Lossy Identification Schemes Journal of Cryptology. 29: 597-631
Abdalla M, Catalano D, Fiore D. (2014) Verifiable random functions: Relations to identity-based key encapsulation and new constructions Journal of Cryptology. 27: 544-593
Abdalla M, De Caro A, Phan DH. (2012) Generalized key delegation for wildcarded identity-based and inner-product encryption Ieee Transactions On Information Forensics and Security. 7: 1695-1706
Abdalla M, Birkett J, Catalano D, et al. (2011) Wildcarded identity-based encryption Journal of Cryptology. 24: 42-82
Abdalla M, An JH, Bellare M, et al. (2008) From identification to signatures via the Fiat-Shamir transform: Necessary and sufficient conditions for security and forward-security Ieee Transactions On Information Theory. 54: 3631-3646
See more...