Pascal Lafourcade

Orcid: 0000-0002-4459-511X

Affiliations:
  • University Clermont Auvergne, Clermont-Ferrand, France
  • CNRS, UMR, Aubière, France
  • University Joseph Fourier (UFR IMA), Grenoble, France


According to our database1, Pascal Lafourcade authored at least 189 papers between 2005 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Efficient Card-Based ZKP for Single Loop Condition and Its Application to Moon-or-Sun.
New Gener. Comput., September, 2024

Shaken, not Stirred - Automated Discovery of Subtle Attacks on Protocols using Mix-Nets.
Proceedings of the 33rd USENIX Security Symposium, 2024

Optimal Asynchronous Perpetual Grid Exploration.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2024

Formal Analysis of C-ITS PKI Protocols.
Proceedings of the 21st International Conference on Security and Cryptography, 2024

A Unified Symbolic Analysis of WireGuard.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

Balance-Based ZKP Protocols for Pencil-and-Paper Puzzles.
Proceedings of the Information Security - 27th International Conference, 2024

How Did They Design This Game? Swish: Complexity and Unplayable Positions.
Proceedings of the 12th International Conference on Fun with Algorithms, 2024

Secure Keyless Multi-party Storage Scheme.
Proceedings of the Computer Security - ESORICS 2024, 2024

Cryptographic Cryptid Protocols - How to Play Cryptid with Cheaters.
Proceedings of the Cryptology and Network Security - 23rd International Conference, 2024

Transferable, Auditable and Anonymous Ticketing Protocol.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024

iUC-Secure Distributed File Transfer from Standard Attribute-Based Encryption.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2024, 2024

2023
Conflict Optimization for Binary CSP Applied to Minimum Partition into Plane Subgraphs and Graph Coloring.
ACM J. Exp. Algorithmics, December, 2023

Perpetual torus exploration by myopic luminous robots.
Theor. Comput. Sci., October, 2023

Optimal exclusive perpetual grid exploration by luminous myopic opaque robots with common chirality.
Theor. Comput. Sci., October, 2023

Physical ZKP protocols for Nurimisaki and Kurodoko.
Theor. Comput. Sci., September, 2023

Secure Protocols for Best Arm Identification in Federated Stochastic Multi-Armed Bandits.
IEEE Trans. Dependable Secur. Comput., 2023

Privacy-Preserving Proof-of-Location With Security Against Geo-Tampering.
IEEE Trans. Dependable Secur. Comput., 2023

Secure protocols for cumulative reward maximization in stochastic multi-armed bandits.
J. Comput. Secur., 2023

Check Alternating Patterns: A Physical Zero-Knowledge Proof for Moon-or-Sun.
IACR Cryptol. ePrint Arch., 2023

Practical Construction for Secure Trick-Taking Games Even With Cards Set Aside.
IACR Cryptol. ePrint Arch., 2023

The Calissons Puzzle.
CoRR, 2023

Generic Blockchain on Generic Human Behavior.
Proceedings of the 20th International Conference on Security and Cryptography, 2023

RMC-PVC: A Multi-Client Reusable Verifiable Computation Protocol.
Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing, 2023

Generic Privacy Preserving Private Permissioned Blockchains.
Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing, 2023

SAMBA: A Generic Framework for Secure Federated Multi-Armed Bandits (Extended Abstract).
Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, 2023

Generic and Universal Local Cryptocurrency: LCoin.
Proceedings of the 5th Conference on Blockchain Research & Applications for Innovative Networks and Services, 2023

An Introduction to Tools for Formal Analysis of Cryptographic Protocols.
Proceedings of the Handbook of Formal Analysis and Verification in Cryptography, 2023

2022
Perpetual Torus Exploration by Myopic Luminous Robots: The Animations.
Dataset, April, 2022

Perpetual Torus Exploration by Myopic Luminous Robots: The Animations.
Dataset, April, 2022

Perpetual Torus Exploration by Myopic Luminous Robots: The Animations.
Dataset, April, 2022

Card-Based ZKP for Connectivity: Applications to Nurikabe, Hitori, and Heyawake.
New Gener. Comput., 2022

Shadoks Approach to Low-Makespan Coordinated Motion Planning.
ACM J. Exp. Algorithmics, 2022

Optimal threshold padlock systems.
J. Comput. Secur., 2022

SAMBA: A Generic Framework for Secure Federated Multi-Armed Bandits.
J. Artif. Intell. Res., 2022

Physical zero-knowledge proof and NP-completeness proof of Suguru puzzle.
Inf. Comput., 2022

RMC-PVC: A Multi-Client Reusable Verifiable Computation Protocol (Long version).
IACR Cryptol. ePrint Arch., 2022

Protego: A Credential Scheme for Permissioned Blockchains (Extended Version).
IACR Cryptol. ePrint Arch., 2022

MARSHAL: Messaging with Asynchronous Ratchets and Signatures for faster HeALing.
IACR Cryptol. ePrint Arch., 2022

How fast do you heal? A taxonomy for post-compromise security in secure-channel establishment.
IACR Cryptol. ePrint Arch., 2022

Near-collisions and their Impact on Biometric Security (long).
CoRR, 2022

Hide a Liar: Card-Based ZKP Protocol for Usowan.
Proceedings of the Theory and Applications of Models of Computation, 2022

Card-Based ZKP Protocol for Nurimisaki.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2022

Near-collisions and Their Impact on Biometric Security.
Proceedings of the 19th International Conference on Security and Cryptography, 2022

Authentication Attacks on Projection-based Cancelable Biometric Schemes.
Proceedings of the 19th International Conference on Security and Cryptography, 2022

Automatic Implementations Synthesis of Secure Protocols and Attacks from Abstract Models.
Proceedings of the Secure IT Systems, 2022

Protego: Efficient, Revocable and Auditable Anonymous Credentials with Applications to Hyperledger Fabric.
Proceedings of the Progress in Cryptology - INDOCRYPT 2022, 2022

Samba: A System for Secure Federated Multi-Armed Bandits.
Proceedings of the 38th IEEE International Conference on Data Engineering, 2022

Beedroids: How Luminous Autonomous Swarms of UAVs Can Save the World?
Proceedings of the 11th International Conference on Fun with Algorithms, 2022

A Survey on Identity-Based Blind Signature.
Proceedings of the Foundations and Practice of Security - 15th International Symposium, 2022

Local Search with Weighting Schemes for the CG: SHOP 2022 Competition (CG Challenge).
Proceedings of the 38th International Symposium on Computational Geometry, 2022

2021
How to construct physical zero-knowledge proofs for puzzles with a "single loop" condition.
Theor. Comput. Sci., 2021

Blockchain Mirage or Silver Bullet? A Requirements-driven Comparative Analysis of Business and Developers' Perceptions in the Accountancy Domain.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2021

How to generate perfect mazes?
Inf. Sci., 2021

Interactive Physical ZKP for Connectivity: Applications to Nurikabe and Hitori.
IACR Cryptol. ePrint Arch., 2021

Improved Constructions of Anonymous Credentials From Structure-Preserving Signatures on Equivalence Classes.
IACR Cryptol. ePrint Arch., 2021

Generic Plaintext Equality and Inequality Proofs (Extended Version).
IACR Cryptol. ePrint Arch., 2021

A Cryptographic View of Deep-Attestation, or how to do Provably-Secure Layer-Linking.
IACR Cryptol. ePrint Arch., 2021

Design and practical implementation of verify-your-vote protocol.
Concurr. Comput. Pract. Exp., 2021

Fast Cramer-Shoup Cryptosystem.
Proceedings of the 18th International Conference on Security and Cryptography, 2021

Optimal Exclusive Perpetual Grid Exploration by Luminous Myopic Robots Without Common Chirality.
Proceedings of the Networked Systems - 9th International Conference, 2021

Card-Based ZKP Protocols for Takuzu and Juosan.
Proceedings of the 10th International Conference on Fun with Algorithms, 2021

Finding Water on Poleless Using Melomaniac Myopic Chameleon Robots.
Proceedings of the 10th International Conference on Fun with Algorithms, 2021

Generic Construction for Identity-Based Proxy Blind Signature.
Proceedings of the Foundations and Practice of Security - 14th International Symposium, 2021

Generic Plaintext Equality and Inequality Proofs.
Proceedings of the Financial Cryptography and Data Security, 2021

Mechanised Models and Proofs for Distance-Bounding.
Proceedings of the 34th IEEE Computer Security Foundations Symposium, 2021

Automatic Generation of Declarative Models For Differential Cryptanalysis.
Proceedings of the 27th International Conference on Principles and Practice of Constraint Programming, 2021

Shadoks Approach to Low-Makespan Coordinated Motion Planning (CG Challenge).
Proceedings of the 37th International Symposium on Computational Geometry, 2021

From Relay Attacks to Distance-Bounding Protocols.
Proceedings of the Security of Ubiquitous Computing Systems, 2021

2020
A faster cryptographer's Conspiracy Santa.
Theor. Comput. Sci., 2020

About blockchain interoperability.
Inf. Process. Lett., 2020

Linear Generalized ElGamal Encryption Scheme.
IACR Cryptol. ePrint Arch., 2020

Precise and Mechanised Models and Proofs for Distance-Bounding and an Application to Contactless Payments.
IACR Cryptol. ePrint Arch., 2020

Computing AES related-key differential characteristics with constraint programming.
Artif. Intell., 2020

How to Teach the Undecidability of Malware Detection Problem and Halting Problem.
Proceedings of the Information Security Education. Information Security in Action, 2020

Secure Outsourcing of Multi-Armed Bandits.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Proof of Behavior (Short Paper).
Proceedings of the 2nd International Conference on Blockchain Economics, 2020

Physical Zero-Knowledge Proof for Suguru Puzzle.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2020

Demonstration of GOOSE: A Secure Framework for Graph Outsourcing and SPARQL Evaluation.
Proceedings of the ISWC 2020 Demos and Industry Tracks: From Novel Ideas to Industrial Practice co-located with 19th International Semantic Web Conference (ISWC 2020), 2020

Secure Cumulative Reward Maximization in Linear Stochastic Bandits.
Proceedings of the Provable and Practical Security - 14th International Conference, ProvSec 2020, Singapore, November 29, 2020

Fast Short and Fast Linear Cramer-Shoup.
Proceedings of the Foundations and Practice of Security - 13th International Symposium, 2020

GOOSE: A Secure Framework for Graph Outsourcing and SPARQL Evaluation.
Proceedings of the Data and Applications Security and Privacy XXXIV, 2020

A silver bullet?: a comparison of accountants and developers mental models in the raise of blockchain.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

2019
Secure Trick-Taking Game Protocols: How to Play Online Spades with Cheaters.
IACR Cryptol. ePrint Arch., 2019

Efficient Invisible and Unlinkable Sanitizable Signatures.
IACR Cryptol. ePrint Arch., 2019

Formally and practically verifying flow properties in industrial systems.
Comput. Secur., 2019

Verifiable and Private Oblivious Polynomial Evaluation.
Proceedings of the Information Security Theory and Practice, 2019

Infinite Grid Exploration by Disoriented Robots.
Proceedings of the Structural Information and Communication Complexity, 2019

Secure Multiparty Matrix Multiplication Based on Strassen-Winograd Algorithm.
Proceedings of the Advances in Information and Computer Security, 2019

Secure Best Arm Identification in Multi-armed Bandits.
Proceedings of the Information Security Practice and Experience, 2019

A Physical ZKP for Slitherlink: How to Perform Physical Topology-Preserving Computation.
Proceedings of the Information Security Practice and Experience, 2019

Light Cryptography.
Proceedings of the Information Security Education. Education in Proactive Information Security, 2019

DABSTERS: A Privacy Preserving e-Voting Protocol for Permissioned Blockchain.
Proceedings of the Theoretical Aspects of Computing - ICTAC 2019 - 16th International Colloquium, Hammamet, Tunisia, October 31, 2019

Secure Intersection with MapReduce.
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019

Secure and Efficient Matrix Multiplication with MapReduce.
Proceedings of the E-Business and Telecommunications - 16th International Conference, 2019

Secure Strassen-Winograd Matrix Multiplication with MapReduce.
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019

DABSTERS: Distributed Authorities using Blind Signature to Effect Robust Security in e-Voting.
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019

Towards Secure TMIS Protocols.
Proceedings of the Foundations and Practice of Security - 12th International Symposium, 2019

Security Analysis of Auctionity: A Blockchain Based E-Auction.
Proceedings of the Foundations and Practice of Security - 12th International Symposium, 2019

Get-your-ID: Decentralized Proof of Identity.
Proceedings of the Foundations and Practice of Security - 12th International Symposium, 2019

Interactive Physical Zero-Knowledge Proof for Norinori.
Proceedings of the Computing and Combinatorics - 25th International Conference, 2019

2018
Revisiting AES related-key differential attacks with constraint programming.
Inf. Process. Lett., 2018

Physical Zero-Knowledge Proof for Makaro.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2018

Security analysis and psychological study of authentication methods with PIN codes.
Proceedings of the 12th International Conference on Research Challenges in Information Science, 2018

Secure Grouping and Aggregation with MapReduce.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

A Cryptographer's Conspiracy Santa.
Proceedings of the 9th International Conference on Fun with Algorithms, 2018

Secure Joins with MapReduce.
Proceedings of the Foundations and Practice of Security - 11th International Symposium, 2018

Verify-Your-Vote: A Verifiable Blockchain-Based Online Voting Protocol.
Proceedings of the Information Systems, 2018

2017
SR3: secure resilient reputation-based routing.
Wirel. Networks, 2017

Analysis of AES, SKINNY, and Others with Constraint Programming.
IACR Trans. Symmetric Cryptol., 2017

Practical Passive Leakage-Abuse Attacks Against Symmetric Searchable Encryption.
IACR Cryptol. ePrint Arch., 2017

Unlinkable and Strongly Accountable Sanitizable Signatures from Verifiable Ring Signatures.
IACR Cryptol. ePrint Arch., 2017

Zero-Knowledge Proxy Re-Identification Revisited.
IACR Cryptol. ePrint Arch., 2017

Verifiable Private Polynomial Evaluation.
IACR Cryptol. ePrint Arch., 2017

Breaking and Fixing the HB+DB protocol.
IACR Cryptol. ePrint Arch., 2017

A Terrorist-fraud Resistant and Extractor-free Anonymous Distance-bounding Protocol.
IACR Cryptol. ePrint Arch., 2017

Formal analysis and offline monitoring of electronic exams.
Formal Methods Syst. Des., 2017

How to explain modern security concepts to your children.
Cryptologia, 2017

Dual protocols for private multi-party matrix multiplication and trust computations.
Comput. Secur., 2017

LOCALPKI: A User-Centric Formally Proven Alternative to PKIX.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017

Formally Verifying Flow Properties in Industrial Systems.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017

Formal Analyze of a Private Access Control Protocol to a Cloud Storage.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017

Duck Attack on Accountable Distributed Systems.
Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, 2017

LocalPKI: An Interoperable and IoT Friendly PKI.
Proceedings of the E-Business and Telecommunications - 14th International Joint Conference, 2017

No Such Thing as a Small Leak: Leakage-Abuse Attacks Against Symmetric Searchable Encryption.
Proceedings of the E-Business and Telecommunications - 14th International Joint Conference, 2017

Formal Analysis of Combinations of Secure Protocols.
Proceedings of the Foundations and Practice of Security - 10th International Symposium, 2017

Secure Matrix Multiplication with MapReduce.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
On the existence and decidability of unique decompositions of processes in the applied π-calculus.
Theor. Comput. Sci., 2016

History-based MAC Protocol for Low Duty-Cycle Wireless Sensor Networks: the SLACK-MAC Protocol.
EAI Endorsed Trans. Mob. Commun. Appl., 2016

Automated Proofs of Block Cipher Modes of Operation.
J. Autom. Reason., 2016

Formal verification of mobile robot protocols.
Distributed Comput., 2016

A Prover-Anonymous and Terrorist-Fraud Resistant Distance-Bounding Protocol.
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016

Private Multi-party Matrix Multiplication and Trust Computations.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016

Two Secure Anonymous Proxy-based Data Storages.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016

A Posteriori Openable Public Key Encryption.
Proceedings of the ICT Systems Security and Privacy Protection, 2016

Formal Analysis of Security Properties on the OPC-UA SCADA Protocol.
Proceedings of the Computer Safety, Reliability, and Security, 2016

Related-Key Cryptanalysis of Midori.
Proceedings of the Progress in Cryptology - INDOCRYPT 2016, 2016

Physical Zero-Knowledge Proofs for Akari, Takuzu, Kakuro and KenKen.
Proceedings of the 8th International Conference on Fun with Algorithms, 2016

Anonymizable Ring Signature Without Pairing.
Proceedings of the Foundations and Practice of Security - 9th International Symposium, 2016

k-Times Full Traceable Ring Signature.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

2015
Key Management inWireless Sensor Networks.
J. Sens. Actuator Networks, 2015

Brandt's fully private auction protocol revisited.
J. Comput. Secur., 2015

Formal Analysis of E-Cash Protocols.
Proceedings of the SECRYPT 2015, 2015

Monitoring Electronic Exams.
Proceedings of the Runtime Verification - 6th International Conference, 2015

A Framework for Analyzing Verifiability in Traditional and Electronic Exams.
Proceedings of the Information Security Practice and Experience, 2015

Automated Verification of e-Cash Protocols.
Proceedings of the E-Business and Telecommunications - 12th International Joint Conference, 2015

Performance Evaluations of Cryptographic Protocols Verification Tools Dealing with Algebraic Properties.
Proceedings of the Foundations and Practice of Security - 8th International Symposium, 2015

Survey of Distance Bounding Protocols and Threats.
Proceedings of the Foundations and Practice of Security - 8th International Symposium, 2015

SLACK-MAC: Adaptive MAC Protocol for Low Duty-Cycle Wireless Sensor Networks.
Proceedings of the Ad Hoc Networks, 2015

2014
Evaluation of Secure Multi-Hop Node Authentication and Key Establishment Mechanisms for Wireless Sensor Networks.
J. Sens. Actuator Networks, 2014

Comparison of mean hitting times for a degree-biased random walk.
Discret. Appl. Math., 2014

Formal Analysis of Electronic Exams.
Proceedings of the SECRYPT 2014, 2014

Secure key renewal and revocation for Wireless Sensor Networks.
Proceedings of the IEEE 39th Conference on Local Computer Networks, 2014

Performances of cryptographic accumulators.
Proceedings of the IEEE 39th Conference on Local Computer Networks, 2014

Formal Security Analysis of Traditional and Electronic Exams.
Proceedings of the E-Business and Telecommunications - 11th International Joint Conference, 2014

Secure Auctions without Cryptography.
Proceedings of the Fun with Algorithms - 7th International Conference, 2014

Formal Verification of e-Reputation Protocols.
Proceedings of the Foundations and Practice of Security - 7th International Symposium, 2014

(In)Corruptibility of Routing Protocols.
Proceedings of the Foundations and Practice of Security - 7th International Symposium, 2014

Secure Multihop Key Establishment Protocols for Wireless Sensor Networks.
Proceedings of the Cryptography and Security Systems - Third International Conference, 2014

Multihop Node Authentication Mechanisms for Wireless Sensor Networks.
Proceedings of the Ad-hoc, Mobile, and Wireless Networks - 13th International Conference, 2014

2013
Automated Security Proofs for Almost-Universal Hash for MAC verification.
IACR Cryptol. ePrint Arch., 2013

Formal Verification of e-Auction Protocols.
Proceedings of the Principles of Security and Trust - Second International Conference, 2013

A More Realistic Model for Verifying Route Validity in Ad-Hoc Networks.
Proceedings of the Foundations and Practice of Security - 6th International Symposium, 2013

Discovering Flaws in IDS Through Analysis of Their Inputs.
Proceedings of the Foundations and Practice of Security - 6th International Symposium, 2013

On Unique Decomposition of Processes in the Applied π-Calculus.
Proceedings of the Foundations of Software Science and Computation Structures, 2013

Defining verifiability in e-auction protocols.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

2012
Attacking Privacy in a Fully Private Auction Protocol
CoRR, 2012

Analysis of Random Walks Using Tabu Lists.
Proceedings of the Structural Information and Communication Complexity, 2012

A formal taxonomy of privacy in voting protocols.
Proceedings of IEEE International Conference on Communications, 2012

Defining Privacy for Weighted Votes, Single and Multi-voter Coercion.
Proceedings of the Computer Security - ESORICS 2012, 2012

Computer Aided Security for Cryptographic Primitives, Voting protocols, and Wireless Sensor Networks. (Sécurité assistée par ordinateur pour les primitives cryptgraphiques, les protocoles de vote électronique et les réseaux de capteurs sans fil).
, 2012

2011
Automated Proofs for Asymmetric Encryption.
J. Autom. Reason., 2011

Automated Verification of Block Cipher Modes of Operation, an Improved Method.
Proceedings of the Foundations and Practice of Security, 2011

Vote-Independence: A Powerful Privacy Notion for Voting Protocols.
Proceedings of the Foundations and Practice of Security, 2011

Benaloh's Dense Probabilistic Encryption Revisited.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2011, 2011

2010
How to prevent type-flaw attacks on security protocols under algebraic properties
CoRR, 2010

Privacy by Data Provenance with Digital Watermarking - A Proof-of-Concept Implementation for Medical Services with Electronic Health Records.
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010

2009
Comparing State Spaces in Automatic Security Protocol Analysis.
Proceedings of the Formal to Practical Security, 2009

Comparison of Cryptographic Verification Tools Dealing with Algebraic Properties.
Proceedings of the Formal Aspects in Security and Trust, 6th International Workshop, 2009

Automated Security Proof for Symmetric Encryption Modes.
Proceedings of the Advances in Computer Science, 2009

2008
Symbolic protocol analysis for monoidal equational theories.
Inf. Comput., 2008

Secure neighborhood discovery: a fundamental element for mobile ad hoc networking.
IEEE Commun. Mag., 2008

Towards automated proofs for asymmetric encryption schemes in the random oracle model.
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008

2007
Attack and revison of an electronic auction protocol using OFMC.
Ann. UMCS Informatica, 2007

Intruder deduction for the equational theory of Abelian groups with distributive encryption.
Inf. Comput., 2007

2006
Vérification de protocoles cryptographiques en présence de théories équationnelles. (Verification of cryptographic protocols in presence of equationnal theories).
PhD thesis, 2006

A survey of algebraic properties used in cryptographic protocols.
J. Comput. Secur., 2006

Intruder Deduction for the Equational Theory of Exclusive-or with Commutative and Distributive Encryption.
Proceedings of the First International Workshop on Security and Rewriting Techniques, 2006

Symbolic Protocol Analysis in Presence of a Homomorphism Operator and <i>Exclusive Or</i>.
Proceedings of the Automata, Languages and Programming, 33rd International Colloquium, 2006

2005
Intruder Deduction for <i>AC</i>-Like Equational Theories with Homomorphisms.
Proceedings of the Term Rewriting and Applications, 16th International Conference, 2005


  Loading...