Itsaka Rakotonirina

Orcid: 0000-0002-6587-971X

According to our database1, Itsaka Rakotonirina authored at least 13 papers between 2018 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Decision and Complexity of Dolev-Yao Hyperproperties.
Proc. ACM Program. Lang., January, 2024

DeepSec: Deciding Equivalence Properties for Security Protocols - Improved theory and practice.
TheoretiCS, 2024

2023
Indistinguishability Beyond Diff-Equivalence in ProVerif.
Proceedings of the 36th IEEE Computer Security Foundations Symposium, 2023

2022
Tidy: Symbolic Verification of Timed Cryptographic Protocols.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Symbolic Synthesis of Indifferentiability Attacks.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
Efficient verification of observational equivalences of cryptographic processes : theory and practice. (Vérification efficace d'équivalences observationnelles de processus cryptographiques : théorie et pratique).
PhD thesis, 2021

How to Explain Security Protocols to Your Children.
Proceedings of the Protocols, Strands, and Logic, 2021

2020
A Security Model and Fully Verified Implementation for the IETF QUIC Record Layer.
IACR Cryptol. ePrint Arch., 2020

The Hitchhiker's Guide to Decidability and Complexity of Equivalence Properties in Security Protocols.
Proceedings of the Logic, 2020

2019
On Aggregation of Information in Timing Attacks.
Proceedings of the IEEE European Symposium on Security and Privacy, 2019

Exploiting Symmetries When Proving Equivalence Properties for Security Protocols.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
DEEPSEC: Deciding Equivalence Properties in Security Protocols Theory and Practice.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

The DEEPSEC Prover.
Proceedings of the Computer Aided Verification - 30th International Conference, 2018


  Loading...