Lucca Hirschi
Orcid: 0000-0003-4572-0581Affiliations:
- LORIA, Inria Nancy, France
According to our database1,
Lucca Hirschi
authored at least 26 papers
between 2014 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
A Spectral Analysis of Noise: A Comprehensive, Automated, Formal Analysis of Diffie-Hellman Protocols.
IACR Cryptol. ePrint Arch., 2024
Election Eligibility with OpenID: Turning Authentication into Transferable Proof of Eligibility.
IACR Cryptol. ePrint Arch., 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
2023
IACR Cryptol. ePrint Arch., 2023
2022
IACR Cryptol. ePrint Arch., 2022
Hash Gone Bad: Automated discovery of protocol attacks that exploit hash function weaknesses.
IACR Cryptol. ePrint Arch., 2022
2020
J. Comput. Secur., 2020
IACR Cryptol. ePrint Arch., 2020
2019
Proc. Priv. Enhancing Technol., 2019
J. Comput. Secur., 2019
ERCIM News, 2019
Improving Automated Symbolic Analysis of Ballot Secrecy for E-Voting Protocols: A Method Based on Sufficient Conditions.
Proceedings of the IEEE European Symposium on Security and Privacy, 2019
Proceedings of the Foundations of Security, Protocols, and Equational Reasoning, 2019
2018
Proceedings of the Computer Security, 2018
Automated Unbounded Verification of Stateful Cryptographic Protocols with Exclusive OR.
Proceedings of the 31st IEEE Computer Security Foundations Symposium, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
Automated Verification of Privacy in Security Protocols : Back and Forth Between Theory & Practice. (Vérification automatique de la protection de la vie privée : entre théorie et pratique).
PhD thesis, 2017
A survey of symbolic methods for establishing equivalence-based properties in cryptographic protocols.
J. Log. Algebraic Methods Program., 2017
Improving Automated Symbolic Analysis for E-voting Protocols: A Method Based on Sufficient Conditions for Ballot Secrecy.
CoRR, 2017
Proceedings of the 2017 IEEE Security and Privacy Workshops, 2017
2016
Proceedings of the IEEE Symposium on Security and Privacy, 2016
Towards Completeness via Proof Search in the Linear Time μ-calculus: The case of Büchi inclusions.
Proceedings of the 31st Annual ACM/IEEE Symposium on Logic in Computer Science, 2016
2015
Proceedings of the 26th International Conference on Concurrency Theory, 2015
2014
Proceedings of the Principles of Security and Trust - Third International Conference, 2014