Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions M Abdalla, M Bellare, D Catalano, E Kiltz, T Kohno, T Lange, ... Advances in Cryptology — CRYPTO 2005, 205-222, 2005 | 656 | 2005 |
Password-based authenticated key exchange in the three-party setting M Abdalla, PA Fouque, D Pointcheval Public-Key Cryptography — PKC 2005, 65-84, 2005 | 567 | 2005 |
The oracle Diffie-Hellman assumptions and an analysis of DHIES M Abdalla, M Bellare, P Rogaway Topics in Cryptology — CT-RSA 2001, 143-158, 2001 | 481 | 2001 |
Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions M Abdalla, M Bellare, D Catalano, E Kiltz, T Kohno, T Lange, ... Journal of Cryptology 21 (3), 350-391, 2008 | 391 | 2008 |
Simple Password-Based Encrypted Key Exchange Protocols M Abdalla, D Pointcheval Topics in Cryptology — CT-RSA 2005 3376, 191-208, 2005 | 371 | 2005 |
A new forward-secure digital signature scheme M Abdalla, L Reyzin Advances in Cryptology — ASIACRYPT 2000, 116-129, 2000 | 357 | 2000 |
DHIES: An encryption scheme based on the Diffie-Hellman problem M Abdalla, M Bellare, P Rogaway Submission to IEEE P1363a 280, 1998 | 206* | 1998 |
Simple functional encryption schemes for inner products M Abdalla, F Bourse, A De Caro, D Pointcheval Public-Key Cryptography — PKC 2015, 733-751, 2015 | 187 | 2015 |
From identification to signatures via the Fiat-Shamir transform: Minimizing assumptions for security and forward-security M Abdalla, JH An, M Bellare, C Namprempre Advances in Cryptology — EUROCRYPT 2002, 418-433, 2002 | 178 | 2002 |
Interactive Diffie-Hellman assumptions with applications to password-based authentication M Abdalla, D Pointcheval FC 2005, 341-356, 2005 | 152 | 2005 |
Increasing the lifetime of a key: a comparative analysis of the security of re-keying techniques M Abdalla, M Bellare Advances in Cryptology — ASIACRYPT 2000, 546-559, 2000 | 147 | 2000 |
Identity-based encryption gone wild M Abdalla, D Catalano, AW Dent, J Malone-Lee, G Neven, NP Smart ICALP 2006, 300-311, 2006 | 143 | 2006 |
Password-based group key exchange in a constant number of rounds M Abdalla, E Bresson, O Chevassut, D Pointcheval Public-Key Cryptography — PKC 2006, 427-442, 2006 | 137 | 2006 |
Robust encryption M Abdalla, M Bellare, G Neven Theory of Cryptography Conference — TCC 2010, 480-497, 2010 | 136 | 2010 |
Forward-secure threshold signature schemes M Abdalla, S Miner, C Namprempre Topics in Cryptology — CT-RSA 2001, 441-456, 2001 | 131 | 2001 |
One-time verifier-based encrypted key exchange M Abdalla, O Chevassut, D Pointcheval Public-Key Cryptography — PKC 2005, 47-64, 2005 | 128 | 2005 |
Key management for restricted multicast using broadcast encryption M Abdalla, Y Shavitt, A Wool IEEE/ACM Transactions on Networking 8 (4), 443-454, 2000 | 105 | 2000 |
Smooth Projective Hashing for Conditionally Extractable Commitments. M Abdalla, C Chevalier, D Pointcheval Advances in Cryptology — CRYPTO 2009, 671-689, 2009 | 104 | 2009 |
Generalized key delegation for hierarchical identity-based encryption M Abdalla, E Kiltz, G Neven Computer Security — ESORICS 2007, 139-154, 2007 | 90 | 2007 |
Password-based authenticated key exchange in the three-party setting M Abdalla, PA Fouque, D Pointcheval IEE Proceedings-Information Security 153 (1), 27-39, 2006 | 87 | 2006 |