default search action
Pascal Lafourcade 0001
Person information
- affiliation: University Clermont Auvergne, Clermont-Ferrand, France
- affiliation: CNRS, UMR, Aubière, France
- affiliation: University Joseph Fourier (UFR IMA), Grenoble, France
Other persons with the same name
- Pascal Lafourcade 0002 — Aldebaran-Robotics, Paris, France
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j42]Samuel D. Hand, Alexander Koch, Pascal Lafourcade, Daiki Miyahara, Léo Robert:
Efficient Card-Based ZKP for Single Loop Condition and Its Application to Moon-or-Sun. New Gener. Comput. 42(3): 449-477 (2024) - [c138]Pascal Lafourcade, Gaël Marcadet, Léo Robert:
iUC-Secure Distributed File Transfer from Standard Attribute-Based Encryption. AFRICACRYPT 2024: 174-198 - [c137]Pascal Lafourcade, Dhekra Mahmoud, Gaël Marcadet, Charles Olivier-Anclin:
Transferable, Auditable and Anonymous Ticketing Protocol. AsiaCCS 2024 - [c136]Xavier Bultel, Charlène Jojon, Pascal Lafourcade:
Cryptographic Cryptid Protocols - How to Play Cryptid with Cheaters. CANS (1) 2024: 26-48 - [c135]Pascal Lafourcade, Lola-Baie Mallordy, Charles Olivier-Anclin, Léo Robert:
Secure Keyless Multi-party Storage Scheme. ESORICS (3) 2024: 279-298 - [c134]Antoine Dailly, Pascal Lafourcade, Gaël Marcadet:
How Did They Design This Game? Swish: Complexity and Unplayable Positions. FUN 2024: 10:1-10:19 - [c133]Shohei Kaneko, Pascal Lafourcade, Lola-Baie Mallordy, Daiki Miyahara, Maxime Puys, Kazuo Sakiyama:
Balance-Based ZKP Protocols for Pencil-and-Paper Puzzles. ISC (1) 2024: 211-231 - [c132]Pascal Lafourcade, Dhekra Mahmoud, Sylvain Ruhault:
A Unified Symbolic Analysis of WireGuard. NDSS 2024 - [c131]Mounira Msahli, Pascal Lafourcade, Dhekra Mahmoud:
Formal Analysis of C-ITS PKI Protocols. SECRYPT 2024: 198-210 - [c130]Quentin Bramas, Stéphane Devismes, Anaïs Durand, Pascal Lafourcade, Anissa Lamani:
Optimal Asynchronous Perpetual Grid Exploration. SSS 2024: 89-105 - [c129]Jannik Dreier, Pascal Lafourcade, Dhekra Mahmoud:
Shaken, not Stirred - Automated Discovery of Subtle Attacks on Protocols using Mix-Nets. USENIX Security Symposium 2024 - 2023
- [j41]Radu Ciucanu, Pascal Lafourcade, Marius Lombard-Platet, Marta Soare:
Secure protocols for cumulative reward maximization in stochastic multi-armed bandits. J. Comput. Secur. 31(1): 1-27 (2023) - [j40]Loïc Crombez, Guilherme Dias da Fonseca, Florian Fontan, Yan Gerard, Aldo Gonzalez-Lorenzo, Pascal Lafourcade, Luc Libralesso, Benjamin Momège, Jack Spalding-Jamieson, Brandon Zhang, Da Wei Zheng:
Conflict Optimization for Binary CSP Applied to Minimum Partition into Plane Subgraphs and Graph Coloring. ACM J. Exp. Algorithmics 28: 1.2:1-1.2:13 (2023) - [j39]Léo Robert, Daiki Miyahara, Pascal Lafourcade, Takaaki Mizuki:
Physical ZKP protocols for Nurimisaki and Kurodoko. Theor. Comput. Sci. 972: 114071 (2023) - [j38]Omar Darwich, Ahmet-Sefa Ulucan, Quentin Bramas, Anissa Lamani, Anaïs Durand, Pascal Lafourcade:
Perpetual torus exploration by myopic luminous robots. Theor. Comput. Sci. 976: 114143 (2023) - [j37]Quentin Bramas, Pascal Lafourcade, Stéphane Devismes:
Optimal exclusive perpetual grid exploration by luminous myopic opaque robots with common chirality. Theor. Comput. Sci. 977: 114162 (2023) - [j36]Md. Mamunur Rashid Akand, Reihaneh Safavi-Naini, Marc Kneppers, Matthieu Giraud, Pascal Lafourcade:
Privacy-Preserving Proof-of-Location With Security Against Geo-Tampering. IEEE Trans. Dependable Secur. Comput. 20(1): 131-146 (2023) - [j35]Radu Ciucanu, Anatole Delabrouille, Pascal Lafourcade, Marta Soare:
Secure Protocols for Best Arm Identification in Federated Stochastic Multi-Armed Bandits. IEEE Trans. Dependable Secur. Comput. 20(2): 1378-1389 (2023) - [c128]Frédéric A. Hayek, Pascal Lafourcade, Ariane Tichit:
Generic and Universal Local Cryptocurrency: LCoin. BRAINS 2023: 1-4 - [c127]Rohann Bella, Xavier Bultel, Céline Chevalier, Pascal Lafourcade, Charles Olivier-Anclin:
Practical Construction for Secure Trick-Taking Games Even with Cards Set Aside. FC (1) 2023: 166-181 - [c126]Radu Ciucanu, Pascal Lafourcade, Gaël Marcadet, Marta Soare:
SAMBA: A Generic Framework for Secure Federated Multi-Armed Bandits (Extended Abstract). IJCAI 2023: 6863-6867 - [c125]Samuel D. Hand, Alexander Koch, Pascal Lafourcade, Daiki Miyahara, Léo Robert:
Check Alternating Patterns: A Physical Zero-Knowledge Proof for Moon-or-Sun. IWSEC 2023: 255-272 - [c124]Gaël Marcadet, Pascal Lafourcade, Léo Robert:
RMC-PVC: A Multi-Client Reusable Verifiable Computation Protocol. SAC 2023: 1558-1565 - [c123]Frédéric A. Hayek, Mirko Koscina, Pascal Lafourcade, Charles Olivier-Anclin:
Generic Privacy Preserving Private Permissioned Blockchains. SAC 2023: 1585-1592 - [c122]Clémentine Gritti, Frédéric A. Hayek, Pascal Lafourcade:
Generic Blockchain on Generic Human Behavior. SECRYPT 2023: 206-217 - [c121]Olivier Blazy, Ioana Boureanu, Pascal Lafourcade, Cristina Onete, Léo Robert:
How fast do you heal? A taxonomy for post-compromise security in secure-channel establishment. USENIX Security Symposium 2023: 5917-5934 - [p2]Murat Moran, Pascal Lafourcade, Maxime Puys, David Williams:
An Introduction to Tools for Formal Analysis of Cryptographic Protocols. Handb. Formal Anal. Verification Cryptogr. 2023: 105-152 - [i37]Loïc Crombez, Guilherme Dias da Fonseca, Florian Fontan, Yan Gerard, Aldo Gonzalez-Lorenzo, Pascal Lafourcade, Luc Libralesso, Benjamin Momège, Jack Spalding-Jamieson, Brandon Zhang, Da Wei Zheng:
Conflict Optimization for Binary CSP Applied to Minimum Partition into Plane Subgraphs and Graph Coloring. CoRR abs/2303.09632 (2023) - [i36]Jean-Marie Favreau, Yan Gerard, Pascal Lafourcade, Léo Robert:
The Calissons Puzzle. CoRR abs/2307.02475 (2023) - [i35]Rohann Bella, Xavier Bultel, Céline Chevalier, Pascal Lafourcade, Charles Olivier-Anclin:
Practical Construction for Secure Trick-Taking Games Even With Cards Set Aside. IACR Cryptol. ePrint Arch. 2023: 309 (2023) - [i34]Samuel D. Hand, Alexander Koch, Pascal Lafourcade, Daiki Miyahara, Léo Robert:
Check Alternating Patterns: A Physical Zero-Knowledge Proof for Moon-or-Sun. IACR Cryptol. ePrint Arch. 2023: 1560 (2023) - 2022
- [j34]Léo Robert, Daiki Miyahara, Pascal Lafourcade, Luc Libralesso, Takaaki Mizuki:
Physical zero-knowledge proof and NP-completeness proof of Suguru puzzle. Inf. Comput. 285(Part): 104858 (2022) - [j33]Radu Ciucanu, Pascal Lafourcade, Gaël Marcadet, Marta Soare:
SAMBA: A Generic Framework for Secure Federated Multi-Armed Bandits. J. Artif. Intell. Res. 73: 737-765 (2022) - [j32]Jannik Dreier, Jean-Guillaume Dumas, Pascal Lafourcade, Léo Robert:
Optimal threshold padlock systems. J. Comput. Secur. 30(5): 655-688 (2022) - [j31]Loïc Crombez, Guilherme Dias da Fonseca, Yan Gerard, Aldo Gonzalez-Lorenzo, Pascal Lafourcade, Luc Libralesso:
Shadoks Approach to Low-Makespan Coordinated Motion Planning. ACM J. Exp. Algorithmics 27: 3.2:1-3.2:17 (2022) - [j30]Léo Robert, Daiki Miyahara, Pascal Lafourcade, Takaaki Mizuki:
Card-Based ZKP for Connectivity: Applications to Nurikabe, Hitori, and Heyawake. New Gener. Comput. 40(1): 149-171 (2022) - [c120]Ghada Arfaoui, Pierre-Alain Fouque, Thibaut Jacques, Pascal Lafourcade, Adina Nedelcu, Cristina Onete, Léo Robert:
A Cryptographic View of Deep-Attestation, or How to Do Provably-Secure Layer-Linking. ACNS 2022: 399-418 - [c119]Florian Fontan, Pascal Lafourcade, Luc Libralesso, Benjamin Momège:
Local Search with Weighting Schemes for the CG: SHOP 2022 Competition (CG Challenge). SoCG 2022: 73:1-73:6 - [c118]Mirko Koscina, Pascal Lafourcade, Gaël Marcadet, Charles Olivier-Anclin, Léo Robert:
A Survey on Identity-Based Blind Signature. FPS 2022: 19-37 - [c117]Quentin Bramas, Stéphane Devismes, Anaïs Durand, Pascal Lafourcade, Anissa Lamani:
Beedroids: How Luminous Autonomous Swarms of UAVs Can Save the World? FUN 2022: 7:1-7:21 - [c116]Gaël Marcadet, Radu Ciucanu, Pascal Lafourcade, Marta Soare, Sihem Amer-Yahia:
Samba: A System for Secure Federated Multi-Armed Bandits. ICDE 2022: 3154-3157 - [c115]Aisling Connolly, Jérôme Deschamps, Pascal Lafourcade, Octavio Perez-Kempner:
Protego: Efficient, Revocable and Auditable Anonymous Credentials with Applications to Hyperledger Fabric. INDOCRYPT 2022: 249-271 - [c114]Camille Sivelle, Lorys Debbah, Maxime Puys, Pascal Lafourcade, Thibault Franco-Rondisson:
Automatic Implementations Synthesis of Secure Protocols and Attacks from Abstract Models. NordSec 2022: 234-252 - [c113]Aisling Connolly, Pascal Lafourcade, Octavio Perez-Kempner:
Improved Constructions of Anonymous Credentials from Structure-Preserving Signatures on Equivalence Classes. Public Key Cryptography (1) 2022: 409-438 - [c112]Olivier Blazy, Pierre-Alain Fouque, Thibaut Jacques, Pascal Lafourcade, Cristina Onete, Léo Robert:
MARSHAL: messaging with asynchronous ratchets and signatures for faster HeALing. SAC 2022: 1666-1673 - [c111]Axel Durbet, Paul-Marie Grollemund, Pascal Lafourcade, Kevin Thiry-Atighehchi:
Near-collisions and Their Impact on Biometric Security. SECRYPT 2022: 382-389 - [c110]Axel Durbet, Paul-Marie Grollemund, Pascal Lafourcade, Denis Migdal, Kevin Thiry-Atighehchi:
Authentication Attacks on Projection-based Cancelable Biometric Schemes. SECRYPT 2022: 568-573 - [c109]Omar Darwich, Ahmet-Sefa Ulucan, Quentin Bramas, Anissa Lamani, Anaïs Durand, Pascal Lafourcade:
Perpetual Torus Exploration by Myopic Luminous Robots. SSS 2022: 164-177 - [c108]Léo Robert, Daiki Miyahara, Pascal Lafourcade, Takaaki Mizuki:
Card-Based ZKP Protocol for Nurimisaki. SSS 2022: 285-298 - [c107]Léo Robert, Daiki Miyahara, Pascal Lafourcade, Takaaki Mizuki:
Hide a Liar: Card-Based ZKP Protocol for Usowan. TAMC 2022: 201-217 - [d3]Omar Darwich, Ahmet-Sefa Ulucan, Quentin Bramas, Anissa Lamani, Anaïs Durand, Pascal Lafourcade:
Perpetual Torus Exploration by Myopic Luminous Robots: The Animations. Version 1. Zenodo, 2022 [all versions] - [d2]Omar Darwich, Ahmet-Sefa Ulucan, Quentin Bramas, Anissa Lamani, Anaïs Durand, Pascal Lafourcade:
Perpetual Torus Exploration by Myopic Luminous Robots: The Animations. Version 2. Zenodo, 2022 [all versions] - [d1]Omar Darwich, Ahmet-Sefa Ulucan, Quentin Bramas, Anissa Lamani, Anaïs Durand, Pascal Lafourcade:
Perpetual Torus Exploration by Myopic Luminous Robots: The Animations. Version 3. Zenodo, 2022 [all versions] - [i33]Axel Durbet, Paul-Marie Grollemund, Pascal Lafourcade, Kevin Thiry-Atighehchi:
Near-collisions and their Impact on Biometric Security (long). CoRR abs/2205.04229 (2022) - [i32]Olivier Blazy, Pierre-Alain Fouque, Thibaut Jacques, Pascal Lafourcade, Cristina Onete, Léo Robert:
MARSHAL: Messaging with Asynchronous Ratchets and Signatures for faster HeALing. IACR Cryptol. ePrint Arch. 2022: 486 (2022) - [i31]Aisling Connolly, Jérôme Deschamps, Pascal Lafourcade, Octavio Perez-Kempner:
Protego: A Credential Scheme for Permissioned Blockchains (Extended Version). IACR Cryptol. ePrint Arch. 2022: 661 (2022) - [i30]Olivier Blazy, Ioana Boureanu, Pascal Lafourcade, Cristina Onete, Léo Robert:
How fast do you heal? A taxonomy for post-compromise security in secure-channel establishment. IACR Cryptol. ePrint Arch. 2022: 1090 (2022) - [i29]Pascal Lafourcade, Gaël Marcadet, Léo Robert:
RMC-PVC: A Multi-Client Reusable Verifiable Computation Protocol (Long version). IACR Cryptol. ePrint Arch. 2022: 1748 (2022) - 2021
- [j29]Marwa Chaieb, Souheib Yousfi, Pascal Lafourcade, Riadh Robbana:
Design and practical implementation of verify-your-vote protocol. Concurr. Comput. Pract. Exp. 33(1) (2021) - [j28]V. Bellot, Maxime Cautrès, Jean-Marie Favreau, M. Gonzalez-Thauvin, Pascal Lafourcade, Kergann Le Cornec, B. Mosnier, S. Rivière-Wekstein:
How to generate perfect mazes? Inf. Sci. 572: 444-459 (2021) - [j27]Claudia Negri-Ribalta, Marius Lombard-Platet, Camille Salinesi, Pascal Lafourcade:
Blockchain Mirage or Silver Bullet? A Requirements-driven Comparative Analysis of Business and Developers' Perceptions in the Accountancy Domain. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 12(1): 85-110 (2021) - [j26]Pascal Lafourcade, Daiki Miyahara, Takaaki Mizuki, Léo Robert, Tatsuya Sasaki, Hideaki Sone:
How to construct physical zero-knowledge proofs for puzzles with a "single loop" condition. Theor. Comput. Sci. 888: 41-55 (2021) - [c106]Léo Robert, Daiki Miyahara, Pascal Lafourcade, Takaaki Mizuki:
Interactive Physical ZKP for Connectivity: Applications to Nurikabe and Hitori. CiE 2021: 373-384 - [c105]Loïc Crombez, Guilherme Dias da Fonseca, Yan Gerard, Aldo Gonzalez-Lorenzo, Pascal Lafourcade, Luc Libralesso:
Shadoks Approach to Low-Makespan Coordinated Motion Planning (CG Challenge). SoCG 2021: 63:1-63:9 - [c104]Luc Libralesso, François Delobel, Pascal Lafourcade, Christine Solnon:
Automatic Generation of Declarative Models For Differential Cryptanalysis. CP 2021: 40:1-40:18 - [c103]Ioana Boureanu, Constantin Catalin Dragan, François Dupressoir, David Gérault, Pascal Lafourcade:
Mechanised Models and Proofs for Distance-Bounding. CSF 2021: 1-16 - [c102]Olivier Blazy, Xavier Bultel, Pascal Lafourcade, Octavio Perez-Kempner:
Generic Plaintext Equality and Inequality Proofs. Financial Cryptography (1) 2021: 415-435 - [c101]Xavier Bultel, Pascal Lafourcade, Charles Olivier-Anclin, Léo Robert:
Generic Construction for Identity-Based Proxy Blind Signature. FPS 2021: 34-52 - [c100]Quentin Bramas, Pascal Lafourcade, Stéphane Devismes:
Finding Water on Poleless Using Melomaniac Myopic Chameleon Robots. FUN 2021: 6:1-6:19 - [c99]Daiki Miyahara, Léo Robert, Pascal Lafourcade, So Takeshige, Takaaki Mizuki, Kazumasa Shinagawa, Atsuki Nagao, Hideaki Sone:
Card-Based ZKP Protocols for Takuzu and Juosan. FUN 2021: 20:1-20:21 - [c98]Quentin Bramas, Pascal Lafourcade, Stéphane Devismes:
Optimal Exclusive Perpetual Grid Exploration by Luminous Myopic Opaque Robots with Common Chirality. ICDCN 2021: 76-85 - [c97]Arthur Rauch, Quentin Bramas, Stéphane Devismes, Pascal Lafourcade, Anissa Lamani:
Optimal Exclusive Perpetual Grid Exploration by Luminous Myopic Robots Without Common Chirality. NETYS 2021: 95-110 - [c96]Pascal Lafourcade, Léo Robert, Demba Sow:
Fast Cramer-Shoup Cryptosystem. SECRYPT 2021: 766-771 - [p1]Gildas Avoine, Ioana Boureanu, David Gérault, Gerhard P. Hancke, Pascal Lafourcade, Cristina Onete:
From Relay Attacks to Distance-Bounding Protocols. Security of Ubiquitous Computing Systems 2021: 113-130 - [i28]Loïc Crombez, Guilherme Dias da Fonseca, Yan Gerard, Aldo Gonzalez-Lorenzo, Pascal Lafourcade, Luc Libralesso:
Shadoks Approach to Low-Makespan Coordinated Motion Planning. CoRR abs/2103.13956 (2021) - [i27]Axel Durbet, Pascal Lafourcade, Denis Migdal, Kevin Thiry-Atighehchi, Paul-Marie Grollemund:
Authentication Attacks on Projection-based Cancelable Biometric Schemes. CoRR abs/2110.15163 (2021) - [i26]Olivier Blazy, Xavier Bultel, Pascal Lafourcade, Octavio Perez-Kempner:
Generic Plaintext Equality and Inequality Proofs (Extended Version). IACR Cryptol. ePrint Arch. 2021: 426 (2021) - [i25]Léo Robert, Daiki Miyahara, Pascal Lafourcade, Takaaki Mizuki:
Interactive Physical ZKP for Connectivity: Applications to Nurikabe and Hitori. IACR Cryptol. ePrint Arch. 2021: 556 (2021) - [i24]Ghada Arfaoui, Pierre-Alain Fouque, Thibaut Jacques, Pascal Lafourcade, Adina Nedelcu, Cristina Onete, Léo Robert:
A Cryptographic View of Deep-Attestation, or how to do Provably-Secure Layer-Linking. IACR Cryptol. ePrint Arch. 2021: 1487 (2021) - [i23]Aisling Connolly, Pascal Lafourcade, Octavio Perez-Kempner:
Improved Constructions of Anonymous Credentials From Structure-Preserving Signatures on Equivalence Classes. IACR Cryptol. ePrint Arch. 2021: 1680 (2021) - 2020
- [j25]David Gérault, Pascal Lafourcade, Marine Minier, Christine Solnon:
Computing AES related-key differential characteristics with constraint programming. Artif. Intell. 278 (2020) - [j24]Pascal Lafourcade, Marius Lombard-Platet:
About blockchain interoperability. Inf. Process. Lett. 161: 105976 (2020) - [j23]Xavier Bultel, Jannik Dreier, Jean-Guillaume Dumas, Pascal Lafourcade:
A faster cryptographer's Conspiracy Santa. Theor. Comput. Sci. 839: 122-134 (2020) - [c95]Rose Esmander, Pascal Lafourcade, Marius Lombard-Platet, Claudia Negri-Ribalta:
A silver bullet?: a comparison of accountants and developers mental models in the raise of blockchain. ARES 2020: 83:1-83:10 - [c94]Radu Ciucanu, Pascal Lafourcade:
GOOSE: A Secure Framework for Graph Outsourcing and SPARQL Evaluation. DBSec 2020: 347-366 - [c93]Pascal Lafourcade, Léo Robert, Demba Sow:
Fast Short and Fast Linear Cramer-Shoup. FPS 2020: 121-136 - [c92]Pascal Lafourcade, Léo Robert, Demba Sow:
Linear Generalized ElGamal Encryption Scheme. ICETE (2) 2020: 372-379 - [c91]Quentin Bramas, Stéphane Devismes, Pascal Lafourcade:
Infinite Grid Exploration by Disoriented Robots. NETYS 2020: 129-145 - [c90]Radu Ciucanu, Anatole Delabrouille, Pascal Lafourcade, Marta Soare:
Secure Cumulative Reward Maximization in Linear Stochastic Bandits. ProvSec 2020: 257-277 - [c89]Radu Ciucanu, Pascal Lafourcade:
Demonstration of GOOSE: A Secure Framework for Graph Outsourcing and SPARQL Evaluation. ISWC (Demos/Industry) 2020: 1-6 - [c88]Léo Robert, Daiki Miyahara, Pascal Lafourcade, Takaaki Mizuki:
Physical Zero-Knowledge Proof for Suguru Puzzle. SSS 2020: 235-247 - [c87]Paul-Marie Grollemund, Pascal Lafourcade, Kevin Thiry-Atighehchi, Ariane Tichit:
Proof of Behavior (Short Paper). Tokenomics 2020: 11:1-11:6 - [c86]Radu Ciucanu, Pascal Lafourcade, Marius Lombard-Platet, Marta Soare:
Secure Outsourcing of Multi-Armed Bandits. TrustCom 2020: 202-209 - [c85]Matthieu Journault, Pascal Lafourcade, Malika More, Rémy Poulain, Léo Robert:
How to Teach the Undecidability of Malware Detection Problem and Halting Problem. WISE 2020: 159-169 - [i22]Jannik Dreier, Jean-Guillaume Dumas, Pascal Lafourcade, Léo Robert:
Optimal Threshold Padlock Systems. CoRR abs/2004.11552 (2020) - [i21]Xavier Bultel, Jannik Dreier, Jean-Guillaume Dumas, Pascal Lafourcade:
A Faster Cryptographer's Conspiracy Santa. CoRR abs/2005.09244 (2020) - [i20]Demba Sow, Léo Robert, Pascal Lafourcade:
Linear Generalized ElGamal Encryption Scheme. IACR Cryptol. ePrint Arch. 2020: 496 (2020) - [i19]Pascal Lafourcade, Marius Lombard-Platet:
About Blockchain Interoperability. IACR Cryptol. ePrint Arch. 2020: 643 (2020) - [i18]Ioana Boureanu, Constantin Catalin Dragan, François Dupressoir, David Gérault, Pascal Lafourcade:
Precise and Mechanised Models and Proofs for Distance-Bounding and an Application to Contactless Payments. IACR Cryptol. ePrint Arch. 2020: 1000 (2020)
2010 – 2019
- 2019
- [j22]Jannik Dreier, Maxime Puys, Marie-Laure Potet, Pascal Lafourcade, Jean-Louis Roch:
Formally and practically verifying flow properties in industrial systems. Comput. Secur. 86: 453-470 (2019) - [c84]Jean-Guillaume Dumas, Pascal Lafourcade, Daiki Miyahara, Takaaki Mizuki, Tatsuya Sasaki, Hideaki Sone:
Interactive Physical Zero-Knowledge Proof for Norinori. COCOON 2019: 166-177 - [c83]Xavier Bultel, Pascal Lafourcade:
Secure Trick-Taking Game Protocols - How to Play Online Spades with Cheaters. Financial Cryptography 2019: 265-281 - [c82]Pascal Lafourcade, Mike Nopere, Jérémy Picot, Daniela Pizzuti, Etienne Roudeix:
Security Analysis of Auctionity: A Blockchain Based E-Auction. FPS 2019: 290-307 - [c81]Pascal Lafourcade, Marius Lombard-Platet:
Get-your-ID: Decentralized Proof of Identity. FPS 2019: 327-336 - [c80]David Gérault, Pascal Lafourcade:
Towards Secure TMIS Protocols. FPS 2019: 337-344 - [c79]Radu Ciucanu, Matthieu Giraud, Pascal Lafourcade, Lihua Ye:
Secure and Efficient Matrix Multiplication with MapReduce. ICETE (Selected Papers) 2019: 132-156 - [c78]Radu Ciucanu, Matthieu Giraud, Pascal Lafourcade, Lihua Ye:
Secure Strassen-Winograd Matrix Multiplication with MapReduce. ICETE (2) 2019: 220-227 - [c77]Marwa Chaieb, Mirko Koscina, Souheib Yousfi, Pascal Lafourcade, Riadh Robbana:
DABSTERS: Distributed Authorities using Blind Signature to Effect Robust Security in e-Voting. ICETE (2) 2019: 228-235 - [c76]Radu Ciucanu, Matthieu Giraud, Pascal Lafourcade, Lihua Ye:
Secure Intersection with MapReduce. ICETE (2) 2019: 236-243 - [c75]Marwa Chaieb, Mirko Koscina, Souheib Yousfi, Pascal Lafourcade, Riadh Robbana:
DABSTERS: A Privacy Preserving e-Voting Protocol for Permissioned Blockchain. ICTAC 2019: 292-312 - [c74]Pascal Lafourcade, Takaaki Mizuki, Atsuki Nagao, Kazumasa Shinagawa:
Light Cryptography. World Conference on Information Security Education 2019: 89-101 - [c73]Pascal Lafourcade, Daiki Miyahara, Takaaki Mizuki, Tatsuya Sasaki, Hideaki Sone:
A Physical ZKP for Slitherlink: How to Perform Physical Topology-Preserving Computation. ISPEC 2019: 135-151 - [c72]Radu Ciucanu, Pascal Lafourcade, Marius Lombard-Platet, Marta Soare:
Secure Best Arm Identification in Multi-armed Bandits. ISPEC 2019: 152-171 - [c71]Jean-Guillaume Dumas, Pascal Lafourcade, Julio López Fenner, David Lucas, Jean-Baptiste Orfila, Clément Pernet, Maxime Puys:
Secure Multiparty Matrix Multiplication Based on Strassen-Winograd Algorithm. IWSEC 2019: 67-88 - [c70]Xavier Bultel, Pascal Lafourcade, Russell W. F. Lai, Giulio Malavolta, Dominique Schröder, Sri Aravinda Krishnan Thyagarajan:
Efficient Invisible and Unlinkable Sanitizable Signatures. Public Key Cryptography (1) 2019: 159-189 - [c69]Quentin Bramas, Stéphane Devismes, Pascal Lafourcade:
Infinite Grid Exploration by Disoriented Robots. SIROCCO 2019: 340-344 - [c68]Hardik Gajera, Matthieu Giraud, David Gérault, Manik Lal Das, Pascal Lafourcade:
Verifiable and Private Oblivious Polynomial Evaluation. WISTP 2019: 49-65 - [i17]Quentin Bramas, Stéphane Devismes, Pascal Lafourcade:
Infinite Grid Exploration by Disoriented Robots. CoRR abs/1905.09271 (2019) - [i16]Xavier Bultel, Pascal Lafourcade:
Secure Trick-Taking Game Protocols: How to Play Online Spades with Cheaters. IACR Cryptol. ePrint Arch. 2019: 375 (2019) - [i15]Xavier Bultel, Pascal Lafourcade, Russell W. F. Lai, Giulio Malavolta, Dominique Schröder, Sri Aravinda Krishnan Thyagarajan:
Efficient Invisible and Unlinkable Sanitizable Signatures. IACR Cryptol. ePrint Arch. 2019: 648 (2019) - 2018
- [j21]David Gérault, Pascal Lafourcade, Marine Minier, Christine Solnon:
Revisiting AES related-key differential attacks with constraint programming. Inf. Process. Lett. 139: 24-29 (2018) - [c67]Marwa Chaieb, Souheib Yousfi, Pascal Lafourcade, Riadh Robbana:
Verify-Your-Vote: A Verifiable Blockchain-Based Online Voting Protocol. EMCIS 2018: 16-30 - [c66]Xavier Bultel, Radu Ciucanu, Matthieu Giraud, Pascal Lafourcade, Lihua Ye:
Secure Joins with MapReduce. FPS 2018: 78-94 - [c65]Xavier Bultel, Jannik Dreier, Jean-Guillaume Dumas, Pascal Lafourcade:
A Cryptographer's Conspiracy Santa. FUN 2018: 13:1-13:13 - [c64]Radu Ciucanu, Matthieu Giraud, Pascal Lafourcade, Lihua Ye:
Secure Grouping and Aggregation with MapReduce. ICETE (2) 2018: 514-521 - [c63]Xavier Bultel, Jannik Dreier, Matthieu Giraud, Marie Izaute, Timothée Kheyrkhah, Pascal Lafourcade, Dounia Lakhzoum, Vincent Marlin, Ladislav Moták:
Security analysis and psychological study of authentication methods with PIN codes. RCIS 2018: 1-11 - [c62]Xavier Bultel, Jannik Dreier, Jean-Guillaume Dumas, Pascal Lafourcade, Daiki Miyahara, Takaaki Mizuki, Atsuki Nagao, Tatsuya Sasaki, Kazumasa Shinagawa, Hideaki Sone:
Physical Zero-Knowledge Proof for Makaro. SSS 2018: 111-125 - 2017
- [j20]Jean-Guillaume Dumas, Pascal Lafourcade, Jean-Baptiste Orfila, Maxime Puys:
Dual protocols for private multi-party matrix multiplication and trust computations. Comput. Secur. 71: 51-70 (2017) - [j19]Xavier Bultel, Jannik Dreier, Pascal Lafourcade, Malika More:
How to explain modern security concepts to your children. Cryptologia 41(5): 422-447 (2017) - [j18]Ali Kassem, Yliès Falcone, Pascal Lafourcade:
Formal analysis and offline monitoring of electronic exams. Formal Methods Syst. Des. 51(1): 117-153 (2017) - [j17]Affoua Therese Aby, Alexandre Guitton, Pascal Lafourcade, Michel Misson:
History-based MAC Protocol for Low Duty-Cycle Wireless Sensor Networks: the SLACK-MAC Protocol. EAI Endorsed Trans. Mob. Commun. Appl. 3(11): e5 (2017) - [j16]Siwei Sun, David Gérault, Pascal Lafourcade, Qianqian Yang, Yosuke Todo, Kexin Qiao, Lei Hu:
Analysis of AES, SKINNY, and Others with Constraint Programming. IACR Trans. Symmetric Cryptol. 2017(1): 281-306 (2017) - [j15]Karine Altisen, Stéphane Devismes, Raphaël Jamet, Pascal Lafourcade:
SR3: secure resilient reputation-based routing. Wirel. Networks 23(7): 2111-2133 (2017) - [c61]Xavier Bultel, Radu Ciucanu, Matthieu Giraud, Pascal Lafourcade:
Secure Matrix Multiplication with MapReduce. ARES 2017: 11:1-11:10 - [c60]Xavier Bultel, Pascal Lafourcade:
Unlinkable and Strongly Accountable Sanitizable Signatures from Verifiable Ring Signatures. CANS 2017: 203-226 - [c59]Gildas Avoine, Xavier Bultel, Sébastien Gambs, David Gérault, Pascal Lafourcade, Cristina Onete, Jean-Marc Robert:
A Terrorist-fraud Resistant and Extractor-free Anonymous Distance-bounding Protocol. AsiaCCS 2017: 800-814 - [c58]Elliott Blot, Jannik Dreier, Pascal Lafourcade:
Formal Analysis of Combinations of Secure Protocols. FPS 2017: 53-67 - [c57]Jean-Guillaume Dumas, Pascal Lafourcade, Francis Melemedjian, Jean-Baptiste Orfila, Pascal Thoniel:
LocalPKI: An Interoperable and IoT Friendly PKI. ICETE (Selected Papers) 2017: 224-252 - [c56]Alexandre Anzala-Yamajako, Olivier Bernard, Matthieu Giraud, Pascal Lafourcade:
No Such Thing as a Small Leak: Leakage-Abuse Attacks Against Symmetric Searchable Encryption. ICETE (Selected Papers) 2017: 253-277 - [c55]Amrit Kumar, Cédric Lauradoux, Pascal Lafourcade:
Duck Attack on Accountable Distributed Systems. MobiQuitous 2017: 303-312 - [c54]Xavier Bultel, Manik Lal Das, Hardik Gajera, David Gérault, Matthieu Giraud, Pascal Lafourcade:
Verifiable Private Polynomial Evaluation. ProvSec 2017: 487-506 - [c53]Jannik Dreier, Maxime Puys, Marie-Laure Potet, Pascal Lafourcade, Jean-Louis Roch:
Formally Verifying Flow Properties in Industrial Systems. SECRYPT 2017: 55-66 - [c52]Jean-Guillaume Dumas, Pascal Lafourcade, Francis Melemedjian, Jean-Baptiste Orfila, Pascal Thoniel:
LOCALPKI: A User-Centric Formally Proven Alternative to PKIX. SECRYPT 2017: 187-199 - [c51]Matthieu Giraud, Alexandre Anzala-Yamajako, Olivier Bernard, Pascal Lafourcade:
Practical Passive Leakage-abuse Attacks Against Symmetric Searchable Encryption. SECRYPT 2017: 200-211 - [c50]Mouhebeddine Berrima, Pascal Lafourcade, Matthieu Giraud, Narjes Ben Rajeb:
Formal Analyze of a Private Access Control Protocol to a Cloud Storage. SECRYPT 2017: 495-500 - [c49]Ioana Boureanu, David Gérault, Pascal Lafourcade, Cristina Onete:
Breaking and fixing the HB+DB protocol. WISEC 2017: 241-246 - [i14]Matthieu Giraud, Alexandre Anzala-Yamajako, Olivier Bernard, Pascal Lafourcade:
Practical Passive Leakage-Abuse Attacks Against Symmetric Searchable Encryption. IACR Cryptol. ePrint Arch. 2017: 46 (2017) - [i13]Xavier Bultel, Pascal Lafourcade:
Zero-Knowledge Proxy Re-Identification Revisited. IACR Cryptol. ePrint Arch. 2017: 112 (2017) - [i12]David Gérault, Pascal Lafourcade, Marine Minier, Christine Solnon:
Revisiting AES Related-Key Differential Attacks with Constraint Programming. IACR Cryptol. ePrint Arch. 2017: 139 (2017) - [i11]Siwei Sun, David Gérault, Pascal Lafourcade, Qianqian Yang, Yosuke Todo, Kexin Qiao, Lei Hu:
Analysis of AES, SKINNY, and Others with Constraint Programming. IACR Cryptol. ePrint Arch. 2017: 162 (2017) - [i10]Gildas Avoine, Xavier Bultel, Sébastien Gambs, David Gérault, Pascal Lafourcade, Cristina Onete, Jean-Marc Robert:
A Terrorist-fraud Resistant and Extractor-free Anonymous Distance-bounding Protocol. IACR Cryptol. ePrint Arch. 2017: 297 (2017) - [i9]Ioana Boureanu, David Gérault, Pascal Lafourcade, Cristina Onete:
Breaking and Fixing the HB+DB protocol. IACR Cryptol. ePrint Arch. 2017: 416 (2017) - [i8]Xavier Bultel, Pascal Lafourcade:
Unlinkable and Strongly Accountable Sanitizable Signatures from Verifiable Ring Signatures. IACR Cryptol. ePrint Arch. 2017: 605 (2017) - [i7]Xavier Bultel, Manik Lal Das, Hardik Gajera, David Gérault, Matthieu Giraud, Pascal Lafourcade:
Verifiable Private Polynomial Evaluation. IACR Cryptol. ePrint Arch. 2017: 756 (2017) - 2016
- [j14]Béatrice Bérard, Pascal Lafourcade, Laure Millet, Maria Potop-Butucaru, Yann Thierry-Mieg, Sébastien Tixeuil:
Formal verification of mobile robot protocols. Distributed Comput. 29(6): 459-487 (2016) - [j13]Martin Gagné, Pascal Lafourcade, Yassine Lakhnech, Reihaneh Safavi-Naini:
Automated Proofs of Block Cipher Modes of Operation. J. Autom. Reason. 56(1): 49-94 (2016) - [j12]Affoua Thérèse Aby, Alexandre Guitton, Pascal Lafourcade, Michel Misson:
History-based MAC Protocol for Low Duty-Cycle Wireless Sensor Networks: the SLACK-MAC Protocol. EAI Endorsed Trans. Mob. Commun. Appl. 2(7): e2 (2016) - [j11]Jannik Dreier, Cristian Ene, Pascal Lafourcade, Yassine Lakhnech:
On the existence and decidability of unique decompositions of processes in the applied π-calculus. Theor. Comput. Sci. 612: 102-125 (2016) - [c48]Xavier Bultel, Pascal Lafourcade:
k-Times Full Traceable Ring Signature. ARES 2016: 39-48 - [c47]Olivier Blazy, Xavier Bultel, Pascal Lafourcade:
Anonymizable Ring Signature Without Pairing. FPS 2016: 214-222 - [c46]Xavier Bultel, Jannik Dreier, Jean-Guillaume Dumas, Pascal Lafourcade:
Physical Zero-Knowledge Proofs for Akari, Takuzu, Kakuro and KenKen. FUN 2016: 8:1-8:20 - [c45]David Gérault, Pascal Lafourcade:
Related-Key Cryptanalysis of Midori. INDOCRYPT 2016: 287-304 - [c44]Maxime Puys, Marie-Laure Potet, Pascal Lafourcade:
Formal Analysis of Security Properties on the OPC-UA SCADA Protocol. SAFECOMP 2016: 67-75 - [c43]Xavier Bultel, Pascal Lafourcade:
A Posteriori Openable Public Key Encryption. SEC 2016: 17-31 - [c42]Jean-Guillaume Dumas, Pascal Lafourcade, Jean-Baptiste Orfila, Maxime Puys:
Private Multi-party Matrix Multiplication and Trust Computations. SECRYPT 2016: 61-72 - [c41]Olivier Blazy, Xavier Bultel, Pascal Lafourcade:
Two Secure Anonymous Proxy-based Data Storages. SECRYPT 2016: 251-258 - [c40]Xavier Bultel, Sébastien Gambs, David Gérault, Pascal Lafourcade, Cristina Onete, Jean-Marc Robert:
A Prover-Anonymous and Terrorist-Fraud Resistant Distance-Bounding Protocol. WISEC 2016: 121-133 - [i6]Xavier Bultel, Jannik Dreier, Jean-Guillaume Dumas, Pascal Lafourcade:
Physical Zero-Knowledge Proofs for Akari, Takuzu, Kakuro and KenKen. CoRR abs/1606.01045 (2016) - [i5]Jean-Guillaume Dumas, Pascal Lafourcade, Jean-Baptiste Orfila, Maxime Puys:
Private Multi-party Matrix Multiplication and Trust Computations. CoRR abs/1607.03629 (2016) - 2015
- [j10]Jannik Dreier, Jean-Guillaume Dumas, Pascal Lafourcade:
Brandt's fully private auction protocol revisited. J. Comput. Secur. 23(5): 587-610 (2015) - [j9]Ismail Mansour, Gérard Chalhoub, Pascal Lafourcade:
Key Management inWireless Sensor Networks. J. Sens. Actuator Networks 4(3): 251-273 (2015) - [c39]Affoua Thérèse Aby, Alexandre Guitton, Pascal Lafourcade, Michel Misson:
SLACK-MAC: Adaptive MAC Protocol for Low Duty-Cycle Wireless Sensor Networks. ADHOCNETS 2015: 69-81 - [c38]Agnès Brelurut, David Gérault, Pascal Lafourcade:
Survey of Distance Bounding Protocols and Threats. FPS 2015: 29-49 - [c37]Pascal Lafourcade, Maxime Puys:
Performance Evaluations of Cryptographic Protocols Verification Tools Dealing with Algebraic Properties. FPS 2015: 137-155 - [c36]Jannik Dreier, Ali Kassem, Pascal Lafourcade:
Automated Verification of e-Cash Protocols. ICETE (Selected Papers) 2015: 223-244 - [c35]Jannik Dreier, Rosario Giustolisi, Ali Kassem, Pascal Lafourcade, Gabriele Lenzini:
A Framework for Analyzing Verifiability in Traditional and Electronic Exams. ISPEC 2015: 514-529 - [c34]Ali Kassem, Yliès Falcone, Pascal Lafourcade:
Monitoring Electronic Exams. RV 2015: 118-135 - [c33]Jannik Dreier, Ali Kassem, Pascal Lafourcade:
Formal Analysis of E-Cash Protocols. SECRYPT 2015: 65-75 - 2014
- [j8]Antoine Gerbaud, Karine Altisen, Stéphane Devismes, Pascal Lafourcade:
Comparison of mean hitting times for a degree-biased random walk. Discret. Appl. Math. 170: 104-109 (2014) - [j7]Ismail Mansour, Gérard Chalhoub, Pascal Lafourcade:
Evaluation of Secure Multi-Hop Node Authentication and Key Establishment Mechanisms for Wireless Sensor Networks. J. Sens. Actuator Networks 3(3): 224-244 (2014) - [c32]Ismail Mansour, Damian Rusinek, Gérard Chalhoub, Pascal Lafourcade, Bogdan Ksiezopolski:
Multihop Node Authentication Mechanisms for Wireless Sensor Networks. ADHOC-NOW 2014: 402-418 - [c31]Ismail Mansour, Gérard Chalhoub, Pascal Lafourcade:
Secure Multihop Key Establishment Protocols for Wireless Sensor Networks. CSS 2014: 166-177 - [c30]Ali Kassem, Pascal Lafourcade, Yassine Lakhnech:
Formal Verification of e-Reputation Protocols. FPS 2014: 247-261 - [c29]Raphaël Jamet, Pascal Lafourcade:
(In)Corruptibility of Routing Protocols. FPS 2014: 262-276 - [c28]Jannik Dreier, Hugo Jonker, Pascal Lafourcade:
Secure Auctions without Cryptography. FUN 2014: 158-170 - [c27]Jannik Dreier, Rosario Giustolisi, Ali Kassem, Pascal Lafourcade, Gabriele Lenzini, Peter Y. A. Ryan:
Formal Security Analysis of Traditional and Electronic Exams. ICETE (Selected Papers) 2014: 294-318 - [c26]Amrit Kumar, Pascal Lafourcade, Cédric Lauradoux:
Performances of cryptographic accumulators. LCN 2014: 366-369 - [c25]Ismail Mansour, Gérard Chalhoub, Pascal Lafourcade, François Delobel:
Secure key renewal and revocation for Wireless Sensor Networks. LCN 2014: 382-385 - [c24]Jannik Dreier, Rosario Giustolisi, Ali Kassem, Pascal Lafourcade, Gabriele Lenzini, Peter Y. A. Ryan:
Formal Analysis of Electronic Exams. SECRYPT 2014: 101-112 - 2013
- [c23]Jannik Dreier, Jean-Guillaume Dumas, Pascal Lafourcade:
Brandt's Fully Private Auction Protocol Revisited. AFRICACRYPT 2013: 88-106 - [c22]Jannik Dreier, Hugo Jonker, Pascal Lafourcade:
Defining verifiability in e-auction protocols. AsiaCCS 2013: 547-552 - [c21]Karine Altisen, Stéphane Devismes, Raphaël Jamet, Pascal Lafourcade:
SR3: Secure Resilient Reputation-based Routing. DCOSS 2013: 258-265 - [c20]Martin Gagné, Pascal Lafourcade, Yassine Lakhnech:
Automated Security Proofs for Almost-Universal Hash for MAC Verification. ESORICS 2013: 291-308 - [c19]Jannik Dreier, Cristian Ene, Pascal Lafourcade, Yassine Lakhnech:
On Unique Decomposition of Processes in the Applied π-Calculus. FoSSaCS 2013: 50-64 - [c18]Ali Kassem, Pascal Lafourcade, Yassine Lakhnech:
A More Realistic Model for Verifying Route Validity in Ad-Hoc Networks. FPS 2013: 306-322 - [c17]Raphaël Jamet, Pascal Lafourcade:
Discovering Flaws in IDS Through Analysis of Their Inputs. FPS 2013: 391-407 - [c16]Jannik Dreier, Pascal Lafourcade, Yassine Lakhnech:
Formal Verification of e-Auction Protocols. POST 2013: 247-266 - [i4]Martin Gagné, Pascal Lafourcade, Yassine Lakhnech:
Automated Security Proofs for Almost-Universal Hash for MAC verification. IACR Cryptol. ePrint Arch. 2013: 407 (2013) - 2012
- [b2]Pascal Lafourcade:
Computer Aided Security for Cryptographic Primitives, Voting protocols, and Wireless Sensor Networks. (Sécurité assistée par ordinateur pour les primitives cryptgraphiques, les protocoles de vote électronique et les réseaux de capteurs sans fil). Grenoble Alpes University, France, 2012 - [c15]Jannik Dreier, Pascal Lafourcade, Yassine Lakhnech:
Defining Privacy for Weighted Votes, Single and Multi-voter Coercion. ESORICS 2012: 451-468 - [c14]Jannik Dreier, Pascal Lafourcade, Yassine Lakhnech:
A formal taxonomy of privacy in voting protocols. ICC 2012: 6710-6715 - [c13]Karine Altisen, Stéphane Devismes, Antoine Gerbaud, Pascal Lafourcade:
Analysis of Random Walks Using Tabu Lists. SIROCCO 2012: 254-266 - [e1]Joaquín García-Alfaro, Pascal Lafourcade:
Foundations and Practice of Security - 4th Canada-France MITACS Workshop, FPS 2011, Paris, France, May 12-13, 2011, Revised Selected Papers. Lecture Notes in Computer Science 6888, Springer 2012, ISBN 978-3-642-27900-3 [contents] - [i3]Jannik Dreier, Jean-Guillaume Dumas, Pascal Lafourcade:
Attacking Privacy in a Fully Private Auction Protocol. CoRR abs/1210.6780 (2012) - 2011
- [j6]Judicaël Courant, Marion Daubignard, Cristian Ene, Pascal Lafourcade, Yassine Lakhnech:
Automated Proofs for Asymmetric Encryption. J. Autom. Reason. 46(3-4): 261-291 (2011) - [c12]Laurent Fousse, Pascal Lafourcade, Mohamed Alnuaimi:
Benaloh's Dense Probabilistic Encryption Revisited. AFRICACRYPT 2011: 348-362 - [c11]Martin Gagné, Pascal Lafourcade, Yassine Lakhnech, Reihaneh Safavi-Naini:
Automated Verification of Block Cipher Modes of Operation, an Improved Method. FPS 2011: 23-31 - [c10]Jannik Dreier, Pascal Lafourcade, Yassine Lakhnech:
Vote-Independence: A Powerful Privacy Notion for Voting Protocols. FPS 2011: 164-180 - 2010
- [c9]Judicaël Courant, Marion Daubignard, Cristian Ene, Pascal Lafourcade, Yassine Lakhnech:
Automated Proofs for Asymmetric Encryption. Concurrency, Compositionality, and Correctness 2010: 300-321 - [c8]Jérémie Tharaud, Sven Wohlgemuth, Isao Echizen, Noboru Sonehara, Günter Müller, Pascal Lafourcade:
Privacy by Data Provenance with Digital Watermarking - A Proof-of-Concept Implementation for Medical Services with Electronic Health Records. IIH-MSP 2010: 510-513 - [i2]Sreekanth Malladi, Pascal Lafourcade:
How to prevent type-flaw attacks on security protocols under algebraic properties. CoRR abs/1003.5385 (2010) - [i1]Laurent Fousse, Pascal Lafourcade, Mohamed Alnuaimi:
Benaloh's Dense Probabilistic Encryption Revisited. CoRR abs/1008.2991 (2010)
2000 – 2009
- 2009
- [c7]Martin Gagné, Pascal Lafourcade, Yassine Lakhnech, Reihaneh Safavi-Naini:
Automated Security Proof for Symmetric Encryption Modes. ASIAN 2009: 39-53 - [c6]Pascal Lafourcade, Vanessa Terrade, Sylvain Vigier:
Comparison of Cryptographic Verification Tools Dealing with Algebraic Properties. Formal Aspects in Security and Trust 2009: 173-185 - [c5]Cas J. F. Cremers, Pascal Lafourcade, Philippe Nadeau:
Comparing State Spaces in Automatic Security Protocol Analysis. Formal to Practical Security 2009: 70-94 - 2008
- [j5]Panos Papadimitratos, Marcin Poturalski, Patrick Schaller, Pascal Lafourcade, David A. Basin, Srdjan Capkun, Jean-Pierre Hubaux:
Secure neighborhood discovery: a fundamental element for mobile ad hoc networking. IEEE Commun. Mag. 46(2): 132-139 (2008) - [j4]Stéphanie Delaune, Pascal Lafourcade, Denis Lugiez, Ralf Treinen:
Symbolic protocol analysis for monoidal equational theories. Inf. Comput. 206(2-4): 312-351 (2008) - [c4]Judicaël Courant, Marion Daubignard, Cristian Ene, Pascal Lafourcade, Yassine Lakhnech:
Towards automated proofs for asymmetric encryption schemes in the random oracle model. CCS 2008: 371-380 - 2007
- [j3]Pascal Lafourcade, Denis Lugiez, Ralf Treinen:
Intruder deduction for the equational theory of Abelian groups with distributive encryption. Inf. Comput. 205(4): 581-623 (2007) - [j2]Bogdan Ksiezopolski, Pascal Lafourcade:
Attack and revison of an electronic auction protocol using OFMC. Ann. UMCS Informatica 6(1): 171-183 (2007) - 2006
- [b1]Pascal Lafourcade:
Vérification de protocoles cryptographiques en présence de théories équationnelles. (Verification of cryptographic protocols in presence of equationnal theories). École normale supérieure de Cachan, France, 2006 - [j1]Véronique Cortier, Stéphanie Delaune, Pascal Lafourcade:
A survey of algebraic properties used in cryptographic protocols. J. Comput. Secur. 14(1): 1-43 (2006) - [c3]Stéphanie Delaune, Pascal Lafourcade, Denis Lugiez, Ralf Treinen:
Symbolic Protocol Analysis in Presence of a Homomorphism Operator and Exclusive Or. ICALP (2) 2006: 132-143 - [c2]Pascal Lafourcade:
Intruder Deduction for the Equational Theory of Exclusive-or with Commutative and Distributive Encryption. SecReT@ICALP 2006: 37-57 - 2005
- [c1]Pascal Lafourcade, Denis Lugiez, Ralf Treinen:
Intruder Deduction for AC-Like Equational Theories with Homomorphisms. RTA 2005: 308-322
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 12:50 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint