Pascal Lafourcade
Orcid: 0000-0002-4459-511XAffiliations:
- University Clermont Auvergne, Clermont-Ferrand, France
- CNRS, UMR, Aubière, France
- University Joseph Fourier (UFR IMA), Grenoble, France
According to our database1,
Pascal Lafourcade
authored at least 189 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
On csauthors.net:
Bibliography
2024
Efficient Card-Based ZKP for Single Loop Condition and Its Application to Moon-or-Sun.
New Gener. Comput., September, 2024
Shaken, not Stirred - Automated Discovery of Subtle Attacks on Protocols using Mix-Nets.
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2024
Proceedings of the 21st International Conference on Security and Cryptography, 2024
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
Proceedings of the Information Security - 27th International Conference, 2024
Proceedings of the 12th International Conference on Fun with Algorithms, 2024
Proceedings of the Computer Security - ESORICS 2024, 2024
Proceedings of the Cryptology and Network Security - 23rd International Conference, 2024
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
Proceedings of the Progress in Cryptology - AFRICACRYPT 2024, 2024
2023
Conflict Optimization for Binary CSP Applied to Minimum Partition into Plane Subgraphs and Graph Coloring.
ACM J. Exp. Algorithmics, December, 2023
Theor. Comput. Sci., October, 2023
Optimal exclusive perpetual grid exploration by luminous myopic opaque robots with common chirality.
Theor. Comput. Sci., October, 2023
Theor. Comput. Sci., September, 2023
Secure Protocols for Best Arm Identification in Federated Stochastic Multi-Armed Bandits.
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
Secure protocols for cumulative reward maximization in stochastic multi-armed bandits.
J. Comput. Secur., 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
Proceedings of the 20th International Conference on Security and Cryptography, 2023
Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing, 2023
Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing, 2023
SAMBA: A Generic Framework for Secure Federated Multi-Armed Bandits (Extended Abstract).
Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, 2023
Proceedings of the 5th Conference on Blockchain Research & Applications for Innovative Networks and Services, 2023
Proceedings of the Handbook of Formal Analysis and Verification in Cryptography, 2023
2022
Dataset, April, 2022
Dataset, April, 2022
Dataset, April, 2022
New Gener. Comput., 2022
ACM J. Exp. Algorithmics, 2022
J. Artif. Intell. Res., 2022
Inf. Comput., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
How fast do you heal? A taxonomy for post-compromise security in secure-channel establishment.
IACR Cryptol. ePrint Arch., 2022
Proceedings of the Theory and Applications of Models of Computation, 2022
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2022
Proceedings of the 19th International Conference on Security and Cryptography, 2022
Proceedings of the 19th International Conference on Security and Cryptography, 2022
Automatic Implementations Synthesis of Secure Protocols and Attacks from Abstract Models.
Proceedings of the Secure IT Systems, 2022
Protego: Efficient, Revocable and Auditable Anonymous Credentials with Applications to Hyperledger Fabric.
Proceedings of the Progress in Cryptology - INDOCRYPT 2022, 2022
Proceedings of the 38th IEEE International Conference on Data Engineering, 2022
Proceedings of the 11th International Conference on Fun with Algorithms, 2022
Proceedings of the Foundations and Practice of Security - 15th International Symposium, 2022
Local Search with Weighting Schemes for the CG: SHOP 2022 Competition (CG Challenge).
Proceedings of the 38th International Symposium on Computational Geometry, 2022
2021
How to construct physical zero-knowledge proofs for puzzles with a "single loop" condition.
Theor. Comput. Sci., 2021
Blockchain Mirage or Silver Bullet? A Requirements-driven Comparative Analysis of Business and Developers' Perceptions in the Accountancy Domain.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2021
IACR Cryptol. ePrint Arch., 2021
Improved Constructions of Anonymous Credentials From Structure-Preserving Signatures on Equivalence Classes.
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
A Cryptographic View of Deep-Attestation, or how to do Provably-Secure Layer-Linking.
IACR Cryptol. ePrint Arch., 2021
Concurr. Comput. Pract. Exp., 2021
Proceedings of the 18th International Conference on Security and Cryptography, 2021
Optimal Exclusive Perpetual Grid Exploration by Luminous Myopic Robots Without Common Chirality.
Proceedings of the Networked Systems - 9th International Conference, 2021
Proceedings of the 10th International Conference on Fun with Algorithms, 2021
Proceedings of the 10th International Conference on Fun with Algorithms, 2021
Proceedings of the Foundations and Practice of Security - 14th International Symposium, 2021
Proceedings of the Financial Cryptography and Data Security, 2021
Proceedings of the 34th IEEE Computer Security Foundations Symposium, 2021
Proceedings of the 27th International Conference on Principles and Practice of Constraint Programming, 2021
Proceedings of the 37th International Symposium on Computational Geometry, 2021
Proceedings of the Security of Ubiquitous Computing Systems, 2021
2020
Precise and Mechanised Models and Proofs for Distance-Bounding and an Application to Contactless Payments.
IACR Cryptol. ePrint Arch., 2020
Artif. Intell., 2020
Proceedings of the Information Security Education. Information Security in Action, 2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
Proceedings of the 2nd International Conference on Blockchain Economics, 2020
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2020
Demonstration of GOOSE: A Secure Framework for Graph Outsourcing and SPARQL Evaluation.
Proceedings of the ISWC 2020 Demos and Industry Tracks: From Novel Ideas to Industrial Practice co-located with 19th International Semantic Web Conference (ISWC 2020), 2020
Proceedings of the Provable and Practical Security - 14th International Conference, ProvSec 2020, Singapore, November 29, 2020
Proceedings of the Foundations and Practice of Security - 13th International Symposium, 2020
Proceedings of the Data and Applications Security and Privacy XXXIV, 2020
A silver bullet?: a comparison of accountants and developers mental models in the raise of blockchain.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020
2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
Comput. Secur., 2019
Proceedings of the Information Security Theory and Practice, 2019
Proceedings of the Structural Information and Communication Complexity, 2019
Proceedings of the Advances in Information and Computer Security, 2019
Proceedings of the Information Security Practice and Experience, 2019
A Physical ZKP for Slitherlink: How to Perform Physical Topology-Preserving Computation.
Proceedings of the Information Security Practice and Experience, 2019
Proceedings of the Information Security Education. Education in Proactive Information Security, 2019
Proceedings of the Theoretical Aspects of Computing - ICTAC 2019 - 16th International Colloquium, Hammamet, Tunisia, October 31, 2019
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019
Proceedings of the E-Business and Telecommunications - 16th International Conference, 2019
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019
DABSTERS: Distributed Authorities using Blind Signature to Effect Robust Security in e-Voting.
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019
Proceedings of the Foundations and Practice of Security - 12th International Symposium, 2019
Proceedings of the Foundations and Practice of Security - 12th International Symposium, 2019
Proceedings of the Foundations and Practice of Security - 12th International Symposium, 2019
Proceedings of the Computing and Combinatorics - 25th International Conference, 2019
2018
Inf. Process. Lett., 2018
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2018
Proceedings of the 12th International Conference on Research Challenges in Information Science, 2018
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018
Proceedings of the 9th International Conference on Fun with Algorithms, 2018
Proceedings of the Foundations and Practice of Security - 11th International Symposium, 2018
Proceedings of the Information Systems, 2018
2017
IACR Trans. Symmetric Cryptol., 2017
IACR Cryptol. ePrint Arch., 2017
Unlinkable and Strongly Accountable Sanitizable Signatures from Verifiable Ring Signatures.
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
Formal Methods Syst. Des., 2017
Comput. Secur., 2017
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017
Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, 2017
Proceedings of the E-Business and Telecommunications - 14th International Joint Conference, 2017
No Such Thing as a Small Leak: Leakage-Abuse Attacks Against Symmetric Searchable Encryption.
Proceedings of the E-Business and Telecommunications - 14th International Joint Conference, 2017
Proceedings of the Foundations and Practice of Security - 10th International Symposium, 2017
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017
2016
On the existence and decidability of unique decompositions of processes in the applied π-calculus.
Theor. Comput. Sci., 2016
History-based MAC Protocol for Low Duty-Cycle Wireless Sensor Networks: the SLACK-MAC Protocol.
EAI Endorsed Trans. Mob. Commun. Appl., 2016
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016
Proceedings of the ICT Systems Security and Privacy Protection, 2016
Proceedings of the Computer Safety, Reliability, and Security, 2016
Proceedings of the Progress in Cryptology - INDOCRYPT 2016, 2016
Proceedings of the 8th International Conference on Fun with Algorithms, 2016
Proceedings of the Foundations and Practice of Security - 9th International Symposium, 2016
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016
2015
Proceedings of the Runtime Verification - 6th International Conference, 2015
Proceedings of the Information Security Practice and Experience, 2015
Proceedings of the E-Business and Telecommunications - 12th International Joint Conference, 2015
Performance Evaluations of Cryptographic Protocols Verification Tools Dealing with Algebraic Properties.
Proceedings of the Foundations and Practice of Security - 8th International Symposium, 2015
Proceedings of the Foundations and Practice of Security - 8th International Symposium, 2015
Proceedings of the Ad Hoc Networks, 2015
2014
Evaluation of Secure Multi-Hop Node Authentication and Key Establishment Mechanisms for Wireless Sensor Networks.
J. Sens. Actuator Networks, 2014
Discret. Appl. Math., 2014
Proceedings of the IEEE 39th Conference on Local Computer Networks, 2014
Proceedings of the IEEE 39th Conference on Local Computer Networks, 2014
Proceedings of the E-Business and Telecommunications - 11th International Joint Conference, 2014
Proceedings of the Fun with Algorithms - 7th International Conference, 2014
Proceedings of the Foundations and Practice of Security - 7th International Symposium, 2014
Proceedings of the Foundations and Practice of Security - 7th International Symposium, 2014
Proceedings of the Cryptography and Security Systems - Third International Conference, 2014
Proceedings of the Ad-hoc, Mobile, and Wireless Networks - 13th International Conference, 2014
2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the Principles of Security and Trust - Second International Conference, 2013
Proceedings of the Foundations and Practice of Security - 6th International Symposium, 2013
Proceedings of the Foundations and Practice of Security - 6th International Symposium, 2013
Proceedings of the Foundations of Software Science and Computation Structures, 2013
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
2012
Proceedings of the Structural Information and Communication Complexity, 2012
Proceedings of IEEE International Conference on Communications, 2012
Proceedings of the Computer Security - ESORICS 2012, 2012
Computer Aided Security for Cryptographic Primitives, Voting protocols, and Wireless Sensor Networks. (Sécurité assistée par ordinateur pour les primitives cryptgraphiques, les protocoles de vote électronique et les réseaux de capteurs sans fil).
, 2012
2011
Proceedings of the Foundations and Practice of Security, 2011
Proceedings of the Foundations and Practice of Security, 2011
Proceedings of the Progress in Cryptology - AFRICACRYPT 2011, 2011
2010
CoRR, 2010
Privacy by Data Provenance with Digital Watermarking - A Proof-of-Concept Implementation for Medical Services with Electronic Health Records.
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010
2009
Proceedings of the Formal to Practical Security, 2009
Proceedings of the Formal Aspects in Security and Trust, 6th International Workshop, 2009
Proceedings of the Advances in Computer Science, 2009
2008
IEEE Commun. Mag., 2008
Towards automated proofs for asymmetric encryption schemes in the random oracle model.
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008
2007
Ann. UMCS Informatica, 2007
Intruder deduction for the equational theory of Abelian groups with distributive encryption.
Inf. Comput., 2007
2006
Vérification de protocoles cryptographiques en présence de théories équationnelles. (Verification of cryptographic protocols in presence of equationnal theories).
PhD thesis, 2006
J. Comput. Secur., 2006
Intruder Deduction for the Equational Theory of Exclusive-or with Commutative and Distributive Encryption.
Proceedings of the First International Workshop on Security and Rewriting Techniques, 2006
Symbolic Protocol Analysis in Presence of a Homomorphism Operator and <i>Exclusive Or</i>.
Proceedings of the Automata, Languages and Programming, 33rd International Colloquium, 2006
2005
Proceedings of the Term Rewriting and Applications, 16th International Conference, 2005