H-Index & Metrics Top Publications

H-Index & Metrics

Discipline name H-index Citations Publications World Ranking National Ranking
Computer Science H-index 34 Citations 7,986 94 World Ranking 6391 National Ranking 158

Overview

What is he best known for?

The fields of study he is best known for:

  • Cryptography
  • Public-key cryptography
  • Computer network

Theoretical computer science, Random oracle, Computer security, Encryption and Public-key cryptography are his primary areas of study. When carried out as part of a general Theoretical computer science research project, his work on Communication complexity is frequently linked to work in Signature, therefore connecting diverse disciplines of study. His studies deal with areas such as Key stretching, Key derivation function, One-time password, Password strength and Authenticated Key Exchange as well as Random oracle.

His Computer security and Cryptography, Password, Zero-knowledge password proof and Encrypted key exchange investigations all form part of his Computer security research activities. His biological study spans a wide range of topics, including Consistency and Anonymity. His Public-key cryptography research integrates issues from Digital signature and Access control.

His most cited work include:

  • Searchable encryption revisited: consistency properties, relation to anonymous IBE, and extensions (451 citations)
  • Password-Based authenticated key exchange in the three-party setting (419 citations)
  • The Oracle Diffie-Hellman Assumptions and an Analysis of DHIES (350 citations)

What are the main themes of his work throughout his whole career to date?

Michel Abdalla mainly focuses on Theoretical computer science, Computer security, Encryption, Random oracle and Cryptography. The Theoretical computer science study combines topics in areas such as Reduction, Hash function, Standard model and Forward secrecy. His Encryption study frequently links to related topics such as Identity.

His research integrates issues of Identification scheme and Blind signature, Digital signature in his study of Random oracle. His Cryptography research incorporates elements of Network security and Public-key cryptography. His work focuses on many connections between Password and other disciplines, such as Authenticated Key Exchange, that overlap with his field of interest in Adversary and Computer security model.

He most often published in these fields:

  • Theoretical computer science (52.70%)
  • Computer security (43.92%)
  • Encryption (41.89%)

What were the highlights of his more recent work (between 2018-2021)?

  • Theoretical computer science (52.70%)
  • Encryption (41.89%)
  • Ciphertext (18.24%)

In recent papers he was focusing on the following fields of study:

His primary scientific interests are in Theoretical computer science, Encryption, Ciphertext, Functional encryption and Random oracle. Michel Abdalla has included themes like Adversary, Key, Reduction and Forward secrecy in his Theoretical computer science study. His Forward secrecy study combines topics from a wide range of disciplines, such as Digital signature, Key exchange, Factoring and Identification.

His Encryption research entails a greater understanding of Computer security. His work deals with themes such as Construct and Access control, which intersect with Ciphertext. His studies in Functional encryption integrate themes in fields like Discrete mathematics and Standard model.

Between 2018 and 2021, his most popular works were:

  • Decentralizing Inner-Product Functional Encryption (13 citations)
  • Inner-Product Functional Encryption with Fine-Grained Access Control (5 citations)
  • Perfect Forward Security of SPAKE2 (4 citations)

In his most recent research, the most cited papers focused on:

  • Cryptography
  • Public-key cryptography
  • Computer network

The scientist’s investigation covers issues in Theoretical computer science, Functional encryption, Encryption, Random oracle and Ciphertext. His research in Functional encryption intersects with topics in Learning with errors, Standard model and Server. His Standard model research incorporates themes from Adversary and Pseudorandom number generator.

His Random oracle study incorporates themes from Forward secrecy, Key exchange, SPEKE and Protocol. His work carried out in the field of Ciphertext brings together such families of science as Construct and Access control.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Top Publications

Searchable encryption revisited: consistency properties, relation to anonymous IBE, and extensions

Michel Abdalla;Mihir Bellare;Dario Catalano;Eike Kiltz.
international cryptology conference (2005)

971 Citations

Password-Based authenticated key exchange in the three-party setting

Michel Abdalla;Pierre-Alain Fouque;David Pointcheval.
public key cryptography (2005)

658 Citations

The Oracle Diffie-Hellman Assumptions and an Analysis of DHIES

Michel Abdalla;Mihir Bellare;Phillip Rogaway.
the cryptographers track at the rsa conference (2001)

473 Citations

Simple password-based encrypted key exchange protocols

Michel Abdalla;David Pointcheval.
the cryptographers track at the rsa conference (2005)

381 Citations

A New Forward-Secure Digital Signature Scheme

Michel Abdalla;Leonid Reyzin.
international conference on the theory and application of cryptology and information security (2000)

366 Citations

Simple Functional Encryption Schemes for Inner Products

Michel Abdalla;Florian Bourse;Angelo De Caro;David Pointcheval.
public key cryptography (2015)

202 Citations

From Identification to Signatures via the Fiat-Shamir Transform: Minimizing Assumptions for Security and Forward-Security

Michel Abdalla;Jee Hea An;Mihir Bellare;Chanathip Namprempre.
international cryptology conference (2002)

186 Citations

DHIES: An encryption scheme based on the Diffie-Hellman Problem

Michel Abdalla;Mihir Bellare;Phillip Rogaway.
IACR Cryptology ePrint Archive (2001)

158 Citations

Interactive diffie-hellman assumptions with applications to password-based authentication

Michel Abdalla;David Pointcheval.
financial cryptography (2005)

158 Citations

Increasing the Lifetime of a Key: A Comparative Analysis of the Security of Re-keying Techniques

Michel Abdalla;Mihir Bellare.
international conference on the theory and application of cryptology and information security (2000)

151 Citations

Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking h-index is inferred from publications deemed to belong to the considered discipline.

If you think any of the details on this page are incorrect, let us know.

Contact us

Top Scientists Citing Michel Abdalla

Ashok Kumar Das

Ashok Kumar Das

International Institute of Information Technology, Hyderabad

Publications: 58

Willy Susilo

Willy Susilo

University of Wollongong

Publications: 50

Yi Mu

Yi Mu

Fujian Normal University

Publications: 47

David Pointcheval

David Pointcheval

École Normale Supérieure

Publications: 46

Eike Kiltz

Eike Kiltz

Ruhr University Bochum

Publications: 45

Benoît Libert

Benoît Libert

École Normale Supérieure de Lyon

Publications: 45

Mihir Bellare

Mihir Bellare

University of California, San Diego

Publications: 41

Brent Waters

Brent Waters

The University of Texas at Austin

Publications: 40

Dong Hoon Lee

Dong Hoon Lee

Korea University

Publications: 34

Kim-Kwang Raymond Choo

Kim-Kwang Raymond Choo

The University of Texas at San Antonio

Publications: 34

Zhenfu Cao

Zhenfu Cao

East China Normal University

Publications: 32

Moti Yung

Moti Yung

Columbia University

Publications: 27

Guomin Yang

Guomin Yang

University of Wollongong

Publications: 27

Dan Boneh

Dan Boneh

Stanford University

Publications: 25

Dongho Won

Dongho Won

Sungkyunkwan University

Publications: 25

Something went wrong. Please try again later.