Theoretical computer science, Random oracle, Computer security, Encryption and Public-key cryptography are his primary areas of study. When carried out as part of a general Theoretical computer science research project, his work on Communication complexity is frequently linked to work in Signature, therefore connecting diverse disciplines of study. His studies deal with areas such as Key stretching, Key derivation function, One-time password, Password strength and Authenticated Key Exchange as well as Random oracle.
His Computer security and Cryptography, Password, Zero-knowledge password proof and Encrypted key exchange investigations all form part of his Computer security research activities. His biological study spans a wide range of topics, including Consistency and Anonymity. His Public-key cryptography research integrates issues from Digital signature and Access control.
Michel Abdalla mainly focuses on Theoretical computer science, Computer security, Encryption, Random oracle and Cryptography. The Theoretical computer science study combines topics in areas such as Reduction, Hash function, Standard model and Forward secrecy. His Encryption study frequently links to related topics such as Identity.
His research integrates issues of Identification scheme and Blind signature, Digital signature in his study of Random oracle. His Cryptography research incorporates elements of Network security and Public-key cryptography. His work focuses on many connections between Password and other disciplines, such as Authenticated Key Exchange, that overlap with his field of interest in Adversary and Computer security model.
His primary scientific interests are in Theoretical computer science, Encryption, Ciphertext, Functional encryption and Random oracle. Michel Abdalla has included themes like Adversary, Key, Reduction and Forward secrecy in his Theoretical computer science study. His Forward secrecy study combines topics from a wide range of disciplines, such as Digital signature, Key exchange, Factoring and Identification.
His Encryption research entails a greater understanding of Computer security. His work deals with themes such as Construct and Access control, which intersect with Ciphertext. His studies in Functional encryption integrate themes in fields like Discrete mathematics and Standard model.
The scientist’s investigation covers issues in Theoretical computer science, Functional encryption, Encryption, Random oracle and Ciphertext. His research in Functional encryption intersects with topics in Learning with errors, Standard model and Server. His Standard model research incorporates themes from Adversary and Pseudorandom number generator.
His Random oracle study incorporates themes from Forward secrecy, Key exchange, SPEKE and Protocol. His work carried out in the field of Ciphertext brings together such families of science as Construct and Access control.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Searchable encryption revisited: consistency properties, relation to anonymous IBE, and extensions
Michel Abdalla;Mihir Bellare;Dario Catalano;Eike Kiltz.
international cryptology conference (2005)
Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions
Michel Abdalla;Mihir Bellare;Dario Catalano;Eike Kiltz.
Journal of Cryptology (2008)
Password-Based authenticated key exchange in the three-party setting
Michel Abdalla;Pierre-Alain Fouque;David Pointcheval.
public key cryptography (2005)
The Oracle Diffie-Hellman Assumptions and an Analysis of DHIES
Michel Abdalla;Mihir Bellare;Phillip Rogaway.
the cryptographers track at the rsa conference (2001)
Simple password-based encrypted key exchange protocols
Michel Abdalla;David Pointcheval.
the cryptographers track at the rsa conference (2005)
A New Forward-Secure Digital Signature Scheme
Michel Abdalla;Leonid Reyzin.
international conference on the theory and application of cryptology and information security (2000)
Simple Functional Encryption Schemes for Inner Products
Michel Abdalla;Florian Bourse;Angelo De Caro;David Pointcheval.
public key cryptography (2015)
From Identification to Signatures via the Fiat-Shamir Transform: Minimizing Assumptions for Security and Forward-Security.
Michel Abdalla;Jee Hea An;Mihir Bellare;Chanathip Namprempre.
IACR Cryptology ePrint Archive (2002)
DHIES: An encryption scheme based on the Diffie-Hellman Problem
Michel Abdalla;Mihir Bellare;Phillip Rogaway.
IACR Cryptology ePrint Archive (2001)
Identity-Based Encryption Gone Wild
Michel Abdalla;Dario Catalano;Alexander Dent;John Malone-Lee.
Lecture Notes in Computer Science (2006)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below:
École Normale Supérieure
DFINITY
University of Catania
University of California, San Diego
University of Rennes
Ruhr University Bochum
KU Leuven
Eindhoven University of Technology
École Normale Supérieure
University of Washington
University of Massachusetts Lowell
Boston College
University of Wisconsin–Madison
University of Science and Technology Beijing
Argonne National Laboratory
Columbia University
Saarland University
University of Pennsylvania
Hebrew University of Jerusalem
University of Bern
Karlsruhe Institute of Technology
Technion – Israel Institute of Technology
Albert Einstein College of Medicine
Georgia State University
University of California, Berkeley
Rice University