Theoretical computer science, Random oracle, Computer security, Encryption and Public-key cryptography are his primary areas of study. When carried out as part of a general Theoretical computer science research project, his work on Communication complexity is frequently linked to work in Signature, therefore connecting diverse disciplines of study. His studies deal with areas such as Key stretching, Key derivation function, One-time password, Password strength and Authenticated Key Exchange as well as Random oracle.
His Computer security and Cryptography, Password, Zero-knowledge password proof and Encrypted key exchange investigations all form part of his Computer security research activities. His biological study spans a wide range of topics, including Consistency and Anonymity. His Public-key cryptography research integrates issues from Digital signature and Access control.
Michel Abdalla mainly focuses on Theoretical computer science, Computer security, Encryption, Random oracle and Cryptography. The Theoretical computer science study combines topics in areas such as Reduction, Hash function, Standard model and Forward secrecy. His Encryption study frequently links to related topics such as Identity.
His research integrates issues of Identification scheme and Blind signature, Digital signature in his study of Random oracle. His Cryptography research incorporates elements of Network security and Public-key cryptography. His work focuses on many connections between Password and other disciplines, such as Authenticated Key Exchange, that overlap with his field of interest in Adversary and Computer security model.
His primary scientific interests are in Theoretical computer science, Encryption, Ciphertext, Functional encryption and Random oracle. Michel Abdalla has included themes like Adversary, Key, Reduction and Forward secrecy in his Theoretical computer science study. His Forward secrecy study combines topics from a wide range of disciplines, such as Digital signature, Key exchange, Factoring and Identification.
His Encryption research entails a greater understanding of Computer security. His work deals with themes such as Construct and Access control, which intersect with Ciphertext. His studies in Functional encryption integrate themes in fields like Discrete mathematics and Standard model.
The scientist’s investigation covers issues in Theoretical computer science, Functional encryption, Encryption, Random oracle and Ciphertext. His research in Functional encryption intersects with topics in Learning with errors, Standard model and Server. His Standard model research incorporates themes from Adversary and Pseudorandom number generator.
His Random oracle study incorporates themes from Forward secrecy, Key exchange, SPEKE and Protocol. His work carried out in the field of Ciphertext brings together such families of science as Construct and Access control.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Searchable encryption revisited: consistency properties, relation to anonymous IBE, and extensions
Michel Abdalla;Mihir Bellare;Dario Catalano;Eike Kiltz.
international cryptology conference (2005)
Password-Based authenticated key exchange in the three-party setting
Michel Abdalla;Pierre-Alain Fouque;David Pointcheval.
public key cryptography (2005)
The Oracle Diffie-Hellman Assumptions and an Analysis of DHIES
Michel Abdalla;Mihir Bellare;Phillip Rogaway.
the cryptographers track at the rsa conference (2001)
Simple password-based encrypted key exchange protocols
Michel Abdalla;David Pointcheval.
the cryptographers track at the rsa conference (2005)
A New Forward-Secure Digital Signature Scheme
Michel Abdalla;Leonid Reyzin.
international conference on the theory and application of cryptology and information security (2000)
Simple Functional Encryption Schemes for Inner Products
Michel Abdalla;Florian Bourse;Angelo De Caro;David Pointcheval.
public key cryptography (2015)
From Identification to Signatures via the Fiat-Shamir Transform: Minimizing Assumptions for Security and Forward-Security
Michel Abdalla;Jee Hea An;Mihir Bellare;Chanathip Namprempre.
international cryptology conference (2002)
DHIES: An encryption scheme based on the Diffie-Hellman Problem
Michel Abdalla;Mihir Bellare;Phillip Rogaway.
IACR Cryptology ePrint Archive (2001)
Interactive diffie-hellman assumptions with applications to password-based authentication
Michel Abdalla;David Pointcheval.
financial cryptography (2005)
Increasing the Lifetime of a Key: A Comparative Analysis of the Security of Re-keying Techniques
Michel Abdalla;Mihir Bellare.
international conference on the theory and application of cryptology and information security (2000)
Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking h-index is inferred from publications deemed to belong to the considered discipline.
If you think any of the details on this page are incorrect, let us know.
École Normale Supérieure
DFINITY
University of Catania
University of California, San Diego
University of Rennes 1
Ruhr University Bochum
KU Leuven
Eindhoven University of Technology
École Normale Supérieure
University of Washington
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below: