Password-based authenticated key exchange in the three-party setting M Abdalla, PA Fouque, D Pointcheval Public-Key Cryptography — PKC 2005, 65-84, 2005 | 931 | 2005 |
Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions M Abdalla, M Bellare, D Catalano, E Kiltz, T Kohno, T Lange, ... Advances in Cryptology — CRYPTO 2005, 205-222, 2005 | 802 | 2005 |
The oracle Diffie-Hellman assumptions and an analysis of DHIES M Abdalla, M Bellare, P Rogaway Topics in Cryptology — CT-RSA 2001, 143-158, 2001 | 597 | 2001 |
Simple Password-Based Encrypted Key Exchange Protocols M Abdalla, D Pointcheval Topics in Cryptology — CT-RSA 2005 3376, 191-208, 2005 | 460 | 2005 |
Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions M Abdalla, M Bellare, D Catalano, E Kiltz, T Kohno, T Lange, ... Journal of Cryptology 21 (3), 350-391, 2008 | 456 | 2008 |
A new forward-secure digital signature scheme M Abdalla, L Reyzin Advances in Cryptology — ASIACRYPT 2000, 116-129, 2000 | 387 | 2000 |
Simple functional encryption schemes for inner products M Abdalla, F Bourse, A De Caro, D Pointcheval Public-Key Cryptography — PKC 2015, 733-751, 2015 | 386 | 2015 |
From identification to signatures via the Fiat-Shamir transform: Minimizing assumptions for security and forward-security M Abdalla, JH An, M Bellare, C Namprempre Advances in Cryptology — EUROCRYPT 2002, 418-433, 2002 | 271 | 2002 |
DHIES: An encryption scheme based on the Diffie-Hellman problem M Abdalla, M Bellare, P Rogaway Submission to IEEE P1363a 280, 1998 | 240* | 1998 |
Robust encryption M Abdalla, M Bellare, G Neven Theory of Cryptography Conference — TCC 2010, 480-497, 2010 | 200 | 2010 |
Identity-based encryption gone wild M Abdalla, D Catalano, AW Dent, J Malone-Lee, G Neven, NP Smart ICALP 2006, 300-311, 2006 | 172 | 2006 |
Increasing the lifetime of a key: a comparative analysis of the security of re-keying techniques M Abdalla, M Bellare Advances in Cryptology — ASIACRYPT 2000, 546-559, 2000 | 172 | 2000 |
Interactive Diffie-Hellman assumptions with applications to password-based authentication M Abdalla, D Pointcheval FC 2005, 341-356, 2005 | 161 | 2005 |
Multi-Input Inner-Product Functional Encryption from Pairings M Abdalla, R Gay, M Raykova, H Wee Advances in Cryptology — EUROCRYPT 2017 10210, 601-626, 2017 | 157 | 2017 |
Password-based group key exchange in a constant number of rounds M Abdalla, E Bresson, O Chevassut, D Pointcheval Public-Key Cryptography — PKC 2006, 427-442, 2006 | 144 | 2006 |
Forward-secure threshold signature schemes M Abdalla, S Miner, C Namprempre Topics in Cryptology — CT-RSA 2001, 441-456, 2001 | 139 | 2001 |
Multi-input functional encryption for inner products: function-hiding realizations and constructions without pairings M Abdalla, D Catalano, D Fiore, R Gay, B Ursu Advances in Cryptology — CRYPTO 2018, 597-627, 2018 | 138 | 2018 |
One-time verifier-based encrypted key exchange M Abdalla, O Chevassut, D Pointcheval Public-Key Cryptography — PKC 2005, 47-64, 2005 | 132 | 2005 |
Smooth Projective Hashing for Conditionally Extractable Commitments. M Abdalla, C Chevalier, D Pointcheval Advances in Cryptology — CRYPTO 2009, 671-689, 2009 | 121 | 2009 |
Password-based authenticated key exchange in the three-party setting M Abdalla, PA Fouque, D Pointcheval IEE Proceedings-Information Security 153 (1), 27-39, 2006 | 118 | 2006 |