D-Index & Metrics Best Publications

D-Index & Metrics D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines.

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 36 Citations 8,209 135 World Ranking 7052 National Ranking 175

Overview

What is he best known for?

The fields of study he is best known for:

  • Cryptography
  • Public-key cryptography
  • Computer network

Theoretical computer science, Random oracle, Computer security, Encryption and Public-key cryptography are his primary areas of study. When carried out as part of a general Theoretical computer science research project, his work on Communication complexity is frequently linked to work in Signature, therefore connecting diverse disciplines of study. His studies deal with areas such as Key stretching, Key derivation function, One-time password, Password strength and Authenticated Key Exchange as well as Random oracle.

His Computer security and Cryptography, Password, Zero-knowledge password proof and Encrypted key exchange investigations all form part of his Computer security research activities. His biological study spans a wide range of topics, including Consistency and Anonymity. His Public-key cryptography research integrates issues from Digital signature and Access control.

His most cited work include:

  • Searchable encryption revisited: consistency properties, relation to anonymous IBE, and extensions (451 citations)
  • Password-Based authenticated key exchange in the three-party setting (419 citations)
  • The Oracle Diffie-Hellman Assumptions and an Analysis of DHIES (350 citations)

What are the main themes of his work throughout his whole career to date?

Michel Abdalla mainly focuses on Theoretical computer science, Computer security, Encryption, Random oracle and Cryptography. The Theoretical computer science study combines topics in areas such as Reduction, Hash function, Standard model and Forward secrecy. His Encryption study frequently links to related topics such as Identity.

His research integrates issues of Identification scheme and Blind signature, Digital signature in his study of Random oracle. His Cryptography research incorporates elements of Network security and Public-key cryptography. His work focuses on many connections between Password and other disciplines, such as Authenticated Key Exchange, that overlap with his field of interest in Adversary and Computer security model.

He most often published in these fields:

  • Theoretical computer science (52.70%)
  • Computer security (43.92%)
  • Encryption (41.89%)

What were the highlights of his more recent work (between 2018-2021)?

  • Theoretical computer science (52.70%)
  • Encryption (41.89%)
  • Ciphertext (18.24%)

In recent papers he was focusing on the following fields of study:

His primary scientific interests are in Theoretical computer science, Encryption, Ciphertext, Functional encryption and Random oracle. Michel Abdalla has included themes like Adversary, Key, Reduction and Forward secrecy in his Theoretical computer science study. His Forward secrecy study combines topics from a wide range of disciplines, such as Digital signature, Key exchange, Factoring and Identification.

His Encryption research entails a greater understanding of Computer security. His work deals with themes such as Construct and Access control, which intersect with Ciphertext. His studies in Functional encryption integrate themes in fields like Discrete mathematics and Standard model.

Between 2018 and 2021, his most popular works were:

  • Decentralizing Inner-Product Functional Encryption (13 citations)
  • Inner-Product Functional Encryption with Fine-Grained Access Control (5 citations)
  • Perfect Forward Security of SPAKE2 (4 citations)

In his most recent research, the most cited papers focused on:

  • Cryptography
  • Public-key cryptography
  • Computer network

The scientist’s investigation covers issues in Theoretical computer science, Functional encryption, Encryption, Random oracle and Ciphertext. His research in Functional encryption intersects with topics in Learning with errors, Standard model and Server. His Standard model research incorporates themes from Adversary and Pseudorandom number generator.

His Random oracle study incorporates themes from Forward secrecy, Key exchange, SPEKE and Protocol. His work carried out in the field of Ciphertext brings together such families of science as Construct and Access control.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

Searchable encryption revisited: consistency properties, relation to anonymous IBE, and extensions

Michel Abdalla;Mihir Bellare;Dario Catalano;Eike Kiltz.
international cryptology conference (2005)

1100 Citations

Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions

Michel Abdalla;Mihir Bellare;Dario Catalano;Eike Kiltz.
Journal of Cryptology (2008)

1088 Citations

Password-Based authenticated key exchange in the three-party setting

Michel Abdalla;Pierre-Alain Fouque;David Pointcheval.
public key cryptography (2005)

748 Citations

The Oracle Diffie-Hellman Assumptions and an Analysis of DHIES

Michel Abdalla;Mihir Bellare;Phillip Rogaway.
the cryptographers track at the rsa conference (2001)

516 Citations

Simple password-based encrypted key exchange protocols

Michel Abdalla;David Pointcheval.
the cryptographers track at the rsa conference (2005)

405 Citations

A New Forward-Secure Digital Signature Scheme

Michel Abdalla;Leonid Reyzin.
international conference on the theory and application of cryptology and information security (2000)

372 Citations

Simple Functional Encryption Schemes for Inner Products

Michel Abdalla;Florian Bourse;Angelo De Caro;David Pointcheval.
public key cryptography (2015)

237 Citations

From Identification to Signatures via the Fiat-Shamir Transform: Minimizing Assumptions for Security and Forward-Security.

Michel Abdalla;Jee Hea An;Mihir Bellare;Chanathip Namprempre.
IACR Cryptology ePrint Archive (2002)

202 Citations

DHIES: An encryption scheme based on the Diffie-Hellman Problem

Michel Abdalla;Mihir Bellare;Phillip Rogaway.
IACR Cryptology ePrint Archive (2001)

187 Citations

Identity-Based Encryption Gone Wild

Michel Abdalla;Dario Catalano;Alexander Dent;John Malone-Lee.
Lecture Notes in Computer Science (2006)

159 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Michel Abdalla

Ashok Kumar Das

Ashok Kumar Das

International Institute of Information Technology, Hyderabad

Publications: 58

Willy Susilo

Willy Susilo

University of Wollongong

Publications: 50

Yi Mu

Yi Mu

Fujian Normal University

Publications: 47

David Pointcheval

David Pointcheval

École Normale Supérieure

Publications: 46

Benoît Libert

Benoît Libert

École Normale Supérieure de Lyon

Publications: 45

Eike Kiltz

Eike Kiltz

Ruhr University Bochum

Publications: 45

Mihir Bellare

Mihir Bellare

University of California, San Diego

Publications: 41

Brent Waters

Brent Waters

The University of Texas at Austin

Publications: 40

Kim-Kwang Raymond Choo

Kim-Kwang Raymond Choo

The University of Texas at San Antonio

Publications: 34

Dong Hoon Lee

Dong Hoon Lee

Korea University

Publications: 34

Zhenfu Cao

Zhenfu Cao

East China Normal University

Publications: 32

Moti Yung

Moti Yung

Columbia University

Publications: 27

Guomin Yang

Guomin Yang

Singapore Management University

Publications: 27

Dan Boneh

Dan Boneh

Stanford University

Publications: 25

Dongho Won

Dongho Won

Sungkyunkwan University

Publications: 25

Neeraj Kumar

Neeraj Kumar

Thapar University

Publications: 24

Trending Scientists

Holly A. Yanco

Holly A. Yanco

University of Massachusetts Lowell

Alicia Haydock Munnell

Alicia Haydock Munnell

Boston College

Michael C. Ferris

Michael C. Ferris

University of Wisconsin–Madison

Xuanhui Qu

Xuanhui Qu

University of Science and Technology Beijing

Jan Ilavsky

Jan Ilavsky

Argonne National Laboratory

Richard B. Vallee

Richard B. Vallee

Columbia University

Markus Bischoff

Markus Bischoff

Saarland University

Wei Guo

Wei Guo

University of Pennsylvania

Shimon Gatt

Shimon Gatt

Hebrew University of Jerusalem

Andreas Zurbriggen

Andreas Zurbriggen

University of Bern

Matthias Schneider

Matthias Schneider

Karlsruhe Institute of Technology

Eran Friedler

Eran Friedler

Technion – Israel Institute of Technology

Joseph C. Arezzo

Joseph C. Arezzo

Albert Einstein College of Medicine

Andrew T. Gewirtz

Andrew T. Gewirtz

Georgia State University

Daniel R. Weisz

Daniel R. Weisz

University of California, Berkeley

P. Padley

P. Padley

Rice University

Something went wrong. Please try again later.