Michel F. Abdalla, Ph.D.
Affiliations: | 2001 | University of California, San Diego, La Jolla, CA |
Area:
Computer ScienceGoogle:
"Michel Abdalla"Parents
Sign in to add mentorMihir Bellare | grad student | 2001 | UCSD (Computer Science Tree) | |
(Design and analysis of secure encryption schemes.) |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Abdalla M, Benhamouda F, Pointcheval D. (2020) Corrigendum: Public-key encryption indistinguishable under plaintext-checkable attacks Iet Information Security. 14: 365-366 |
Seo M, Abdalla M, Lee DH, et al. (2019) New technique for chosen-ciphertext security based on non-interactive zero-knowledge Information Sciences. 490: 18-35 |
Abdalla M, Benhamouda F, Pointcheval D. (2019) On the Tightness of Forward-Secure Signature Reductions Journal of Cryptology. 32: 84-150 |
Abdalla M, Benhamouda F, Passelègue A, et al. (2018) Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier Journal of Cryptology. 31: 917-964 |
Abdalla M, Benhamouda F, Pointcheval D. (2016) Public-key encryption indistinguishable under plaintext-checkable attacks Iet Information Security. 10: 288-303 |
Abdalla M, Fouque PA, Lyubashevsky V, et al. (2016) Tightly Secure Signatures From Lossy Identification Schemes Journal of Cryptology. 29: 597-631 |
Abdalla M, Catalano D, Fiore D. (2014) Verifiable random functions: Relations to identity-based key encapsulation and new constructions Journal of Cryptology. 27: 544-593 |
Abdalla M, De Caro A, Phan DH. (2012) Generalized key delegation for wildcarded identity-based and inner-product encryption Ieee Transactions On Information Forensics and Security. 7: 1695-1706 |
Abdalla M, Birkett J, Catalano D, et al. (2011) Wildcarded identity-based encryption Journal of Cryptology. 24: 42-82 |
Abdalla M, An JH, Bellare M, et al. (2008) From identification to signatures via the Fiat-Shamir transform: Necessary and sufficient conditions for security and forward-security Ieee Transactions On Information Theory. 54: 3631-3646 |