Nombre de documents

113

Pascal Lafourcade


Article dans une revue22 documents

  • Béatrice Drot-Delange, Séverine Fleury, Pascal Lafourcade, Malika More. Un tour de magie pour introduire la représentation binaire des nombres. Bulletin de l'APMEP, Association des Professeurs de Mathématiques de l'Enseignement Public, 2018, Mathématiques et interdisciplinarité - II, pp.17-34. 〈hal-01852811〉
  • David Gérault, Pascal Lafourcade, Marine Minier, Christine Solnon. Revisiting AES Related-Key Differential Attacks with Constraint Programming. Information Processing Letters, Elsevier, In press, pp.1-9. 〈hal-01827727〉
  • Karine Altisen, Raphaël Jamet, Stéphane Devismes, Pascal Lafourcade. SR3: secure resilient reputation-based routing. Wireless Networks, Springer Verlag, 2017, 23 (7), pp.2111 - 2133. 〈10.1007/s11276-016-1273-4〉. 〈hal-01707698〉
  • Xavier Bultel, Jannik Dreier, Pascal Lafourcade, Malika More. How to Explain Modern Security Concepts to your Children. Cryptologia, Taylor & Francis, 2017, 41 (5), 〈http://www.tandfonline.com/doi/full/10.1080/01611194.2016.1238422〉. 〈10.1080/01611194.2016.1238422〉. 〈hal-01397035〉
  • Pascal Lafourcade. Vérifier la sécurité de nos communications. Interstices, INRIA, 2017, 〈https://interstices.info/jcms/p_93696/verifier-la-securite-de-nos-communications〉. 〈hal-01688780〉
  • Ali Kassem, Yliès Falcone, Pascal Lafourcade. Formal analysis and offline monitoring of electronic exams. Formal Methods in System Design, Springer Verlag, 2017, 51 (1), pp.117 - 153. 〈10.1007/s10703-017-0280-0〉. 〈hal-01653884〉
  • Siwei Sun, David Gerault, Pascal Lafourcade, Qianqian Yang, Yosuke Todo, et al.. Analysis of AES, SKINNY, and Others with Constraint Programming. IACR Transactions on Symmetric Cryptology, Ruhr Universität Bochum, 2017. 〈hal-01615487〉
  • Affoua Thérèse Aby, Alexandre Guitton, Pascal Lafourcade, Michel Misson. History-based MAC Protocol for Low Duty-Cycle Wireless Sensor Networks: the SLACK-MAC Protocol. EAI Endorsed Transactions on Mobile Communications and Applications, ICST, 2016, 2 (7). 〈hal-01471718〉
  • Martin Gagné, Pascal Lafourcade, Yassine Lakhnech, Reihaneh Safavi-Naini. Automated Proofs of Block Cipher Modes of Operation. Journal of Automated Reasoning, Springer Verlag, 2016. 〈hal-01707712〉
  • Beatrice Bérard, Pascal Lafourcade, Laure Millet, Maria Potop-Butucaru, Yann Thierry-Mieg, et al.. Formal verification of mobile robot protocols. Distributed Computing, Springer Verlag, 2016, 29 (6), pp.459-487. 〈http://link.springer.com/article/10.1007/s00446-016-0271-1〉. 〈10.1007/s00446-016-0271-1〉. 〈hal-01344903〉
  • Jannik Dreier, Jean-Guillaume Dumas, Pascal Lafourcade. Brandt's fully private auction protocol revisited. Journal of Computer Security, IOS Press, 2015, Special issue on security and high performance computing systems, 23 (5), pp.587-610. 〈10.3233/JCS-150535〉. 〈hal-01233555〉
  • Ismail Mansour, Gérard Chalhoub, Pascal Lafourcade. Key Management inWireless Sensor Networks. Journal of sensor and actuator networks, 2015, 4 (3), pp.251 - 273. 〈10.3390/jsan4030251〉. 〈hal-01593134〉
  • Jannik Dreier, Cristian Ene, Pascal Lafourcade, Yassine Lakhnech. On the existence and decidability of unique decompositions of processes in the applied π-calculus. Theoretical Computer Science, Elsevier, 2015, 〈10.1016/j.tcs.2015.11.033〉. 〈hal-01238097v2〉
  • Ismail Mansour, Gérard Chalhoub, Pascal Lafourcade. Evaluation of Secure Multi-Hop Node Authentication and Key Establishment Mechanisms for Wireless Sensor Networks. Journal of sensor and actuator networks, 2014, 3 (3), pp.224 - 244. 〈10.3390/jsan3030224〉. 〈hal-01593137〉
  • Antoine Gerbaud, Karine Altisen, Stéphane Devismes, Pascal Lafourcade. Comparison of Mean Hitting Times for a Degree-Biased Random Walk. Discrete Applied Mathematics, Elsevier, 2014, 170, pp.104 - 109. 〈10.1016/j.dam.2014.01.021〉. 〈hal-01759847〉
  • J. Courant, · Daubignard, C. Ene, Pascal Lafourcade, · Lakhnech. Automated Proofs for Asymmetric Encryption. Journal of Automated Reasoning, Springer Verlag, 2011, 46 (3-4), pp.261 - 291. 〈10.1007/s10817-010-9186-x〉. 〈hal-01759799〉
  • Panos Papadimitratos, Marcin Poturalski, Patrick Schaller, Pascal Lafourcade, David Basin, et al.. Secure Neighborhood Discovery: A Fundamental Element for Mobile Ad Hoc Networking. IEEE Communications Magazine, Institute of Electrical and Electronics Engineers, 2008, 46 (2), pp.132 - 139. 〈10.1109/MCOM.2008.4473095〉. 〈hal-01759941〉
  • Stéphanie Delaune, Pascal Lafourcade, Denis Lugiez, Ralf Treinen. Symbolic Protocol Analysis for Monoidal Equational Theories. Information and Computation, Elsevier, 2008, 206 (2-4), pp.312-351. 〈10.1016/j.ic.2007.07.005〉. 〈hal-00496352〉
  • Pascal Lafourcade, Bogdan Ksiezopolski. Attack and Revison of an Electronic Auction Protocol using OFMC. annales UMCS - Informatica, De Gruyter, 2007. 〈hal-01759950〉
  • Pascal Lafourcade, Denis Lugiez, Ralf Treinen. Intruder deduction for the equational theory of Abelian groups with distributive encryption. Information and Computation, Elsevier, 2007, 205 (4), pp.581-623. 〈10.1016/j.ic.2006.10.008〉. 〈hal-00496353〉
  • Pascal Lafourcade. Intruder Deduction for the Equational Theory of Exclusive-or with Commutative and Distributive Encryption. Electronic Notes in Theoretical Computer Science, Elsevier, 2007, 171 (4), pp.37 - 57. 〈10.1016/j.entcs.2007.02.054〉. 〈hal-01759944〉
  • Véronique Cortier, Stéphanie Delaune, Pascal Lafourcade. A Survey of Algebraic Properties Used in Cryptographic Protocols. Journal of Computer Security, IOS Press, 2006, 14 (1), pp.1-43. 〈inria-00000552〉

Communication dans un congrès68 documents

  • Marwa Chaieb, Souheib Yousfi, Pascal Lafourcade, Riadh Robbana. Verify-Your-Vote: A Verifiable Blockchain-based Online Voting Protocol. 15th European Mediterranean and Middle Eastern Conference on Information Systems, Oct 2018, Limassol, Cyprus. 〈hal-01874855〉
  • Radu Ciucanu, Matthieu Giraud, Pascal Lafourcade, Lihua Ye. Secure Grouping and Aggregation with MapReduce. 15th International Conference on Security and Cryptography, SECRYPT'18, Jul 2018, Porto, Portugal. 〈hal-01874859〉
  • Xavier Bultel, Radu Ciucanu, Matthieu Giraud, Pascal Lafourcade, Lihua Ye. Secure Joins with MapReduce. FPS 2018 : The 11th International Symposium on Foundations & Practice of Security, Nov 2018, Montreal, Canada. 〈hal-01903098〉
  • Xavier Bultel, Jannik Dreier, Matthieu Giraud, Marie Izaute, Timothée Kheyrkhah, et al.. Security Analysis and Psychological Study of Authentication Methods with PIN Codes. RCIS 2018 - IEEE 12th International Conference on Research Challenges in Information Science, May 2018, Nantes, France. 12th International Conference on Research Challenges in Information Science, RCIS 2018, Nantes, France, May 29-31, 2018. 〈hal-01777898〉
  • Xavier Bultel, Jannik Dreier, Jean-Guillaume Dumas, Pascal Lafourcade, Daiki Miyahara, et al.. Physical Zero-Knowledge Proof for Makaro. SSS 2018 - 20th International Symposium on Stabilization, Safety, and Security of Distributed Systems, Nov 2018, Tokyo, Japan. Stabilization, Safety, and Security of Distributed Systems - 20th International Symposium, SSS 2018, Tokyo, Japan, November 4-7, 2018, Proceedings. 〈hal-01898048〉
  • Xavier Bultel, Jannik Dreier, Jean-Guillaume Dumas, Pascal Lafourcade. A Cryptographer's Conspiracy Santa. FUN 2018 - 9th International Conference on Fun with Algorithms, Jun 2018, La Maddalena, Italy. 9th International Conference on Fun with Algorithms, FUN 2018, June 13-15, 2018, La Maddalena, Italy. 〈10.4230/LIPIcs.FUN.2018.13〉. 〈hal-01777997v2〉
  • Gildas Avoine, Xavier Bultel, Sébastien Gambs, David Gerault, Pascal Lafourcade, et al.. A Terrorist-fraud Resistant and Extractor-free Anonymous Distance-bounding Protocol. Asia Conference on Computer and Communications Security (ASIACCS 2017) , Apr 2017, Abu Dhabi, United Arab Emirates. ACM, pp.800-814, 2017, 〈10.1145/3052973.3053000〉. 〈hal-01588560〉
  • Ioana Boureanu, David Gerault, Pascal Lafourcade, Cristina Onete. Breaking and fixing the HB+DB protocol. Wisec 2017 - Conference on Security and Privacy in Wireless and Mobile Networks, Jul 2017, Boston, United States. WiSec '17 Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks Pages 241-246 pp.241 - 246, 2017, 〈10.1145/3098243.3098263 〉. 〈hal-01588562〉
  • Elliott Blot, Jannik Dreier, Pascal Lafourcade. Formal Analysis of Combinations of Secure Protocols. FPS 2017 - 10th International Symposium on Foundations & Practice of Security, Oct 2017, Nancy, France. pp.1-15. 〈hal-01596010v2〉
  • Jannik Dreier, Maxime Puys, Marie-Laure Potet, Pascal Lafourcade, Jean-Louis Roch. Formally Verifying Flow Integrity Properties in Industrial Systems. SECRYPT 2017 - 14th International Conference on Security and Cryptography, Jul 2017, Madrid, Spain. pp.12. 〈hal-01527913〉
  • Matthieu Giraud, Alexandre Anzala-Yamajako, Olivier Bernard, Pascal Lafourcade. Practical Passive Leakage-abuse Attacks Against Symmetric Searchable Encryption. 14th International Conference on Security and Cryptography SECRYPT 2017, Jul 2017, Madrid, France. SCITEPRESS - Science and Technology Publications, Proceedings of the 14th International Joint Conference on e-Business and Telecommunications,, 〈10.5220/0006461202000211〉. 〈hal-01689780〉
  • Xavier Bultel, Manik Das, Hardik Gajera, David Gérault, Matthieu Giraud, et al.. Verifiable Private Polynomial Evaluation. 11th International Conference on Provable Security (ProvSec 2017), Oct 2017, Xi'an, China. 〈hal-01689825〉
  • Narjes Ben Rajeb, Mouhebeddine Berrima, Matthieu Giraud, Pascal Lafourcade. Formal Analyze of a Private Access Control Protocol to a Cloud Storage. 14th International Conference on Security and Cryptography SECRYPT 2017, Jul 2017, Madrid, France. SCITEPRESS - Science and Technology Publications, 〈10.5220/0006461604950500〉. 〈hal-01689790〉
  • Jean-Guillaume Dumas, Pascal Lafourcade, Francis Melemedjian, Jean-Baptiste Orfila, Pascal Thoniel. LOCALPKI: A User-Centric Formally Proven Alternative to PKIX. 14th International Conference on Security and Cryptography, Jul 2017, Madrid, Spain. SCITEPRESS - Science and Technology Publications, Proceedings of the 14th International Joint Conference on e-Business and Telecommunications, 〈10.5220/0006461101870199〉. 〈hal-01689737〉
  • Xavier Bultel, Sébastien Gambs, David Gérault, Pascal Lafourcade, Cristina Onete, et al.. SPADE : un protocole délimiteur de distance anonyme et résistant à la fraude terroriste. ALGOTEL 2017 - 19èmes Rencontres Francophones sur les Aspects Algorithmiques des Télécommunications, May 2017, Quiberon, France. 2017. 〈hal-01524410〉
  • Xavier Bultel, Radu Ciucanu, Matthieu Giraud, Pascal Lafourcade. Secure Matrix Multiplication with MapReduce. 12th International Conference on Availability, Reliability and Security ARES, Aug 2017, Reggio Di Calabria, Italy. 〈hal-01927273〉
  • Amrit Kumar, Cédric Lauradoux, Pascal Lafourcade. Duck Attack on Accountable Distributed Systems. MobiQuitous 2017 - 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, Nov 2017, Melbourne, Australia. pp.1-8, 2017. 〈hal-01589196〉
  • Maxime Puys, Marie-Laure Potet, Pascal Lafourcade. Formal Analysis of Security Properties on the OPC-UA SCADA Protocol. 35th International Conference, SAFECOMP 2016, Sep 2016, Trondheim, Norway. 2016, 35th International Conference, SAFECOMP 2016. 〈https://www.ntnu.edu/safecomp2016〉. 〈10.1007/978-3-319-45477-1_6〉. 〈hal-01366059〉
  • Jean-Guillaume Dumas, Pascal Lafourcade, Jean-Baptiste Orfila, Maxime Puys. Private Multi-party Matrix Multiplication and Trust Computations. Pierangela Samarati. SECRYPT 2016 : 13th International Conference on Security and Cryptography, Jul 2016, Lisbon, Portugal. pp.61-72, 2016, Proceedings of the 13th International Joint Conference on e-Business and Telecommunications. 〈http://www.secrypt.icete.org/〉. 〈10.5220/0005957200610072〉. 〈hal-01344750v2〉
  • Xavier Bultel, Pascal Lafourcade. A Posteriori Openable Public Key Encryption. Jaap-Henk Hoepman; Stefan Katzenbeisser. 31st IFIP International Information Security and Privacy Conference (SEC), May 2016, Ghent, Belgium. IFIP Advances in Information and Communication Technology, AICT-471, pp.17-31, 2016, ICT Systems Security and Privacy Protection. 〈10.1007/978-3-319-33630-5_2〉. 〈hal-01369535〉
  • Olivier Blazy, Xavier Bultel, Pascal Lafourcade. Two Secure Anonymous Proxy-based Data Storages. 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016, Lisbon, Portugal. SCITEPRESS - Science and Technology Publications, Lda, pp.251--258, 2016. 〈hal-01382950〉
  • Xavier Bultel, Pascal Lafourcade. k-Times Full Traceable Ring Signature. 11th International Conference on Availability, Reliability and Security (ARES 2016) ), Aug 2016, Salzburg, France. IEEE, Availability, Reliability and Security (ARES), 2016 11th International Conference on. 〈10.1109/ARES.2016.37〉. 〈hal-01691940〉
  • Olivier Blazy, Xavier Bultel, Pascal Lafourcade. Anonymizable Ring Signature Without Pairing. 9th International Symposium on Foundations & Practice of Security, 2016, Québec, Canada. Springer, 2016. 〈hal-01382951〉
  • Xavier Bultel, Jannik Dreier, Jean-Guillaume Dumas, Pascal Lafourcade. Physical Zero-Knowledge Proofs for Akari, Takuzu, Kakuro and KenKen. Erik Demaine ; Fabrizio Grandoni FUN with algorithms 2016, Jun 2016, La Maddalena, Italy. Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik, 49, pp.8:1-8:20, 2016, Leibniz International Proceedings in Informatics (LIPIcs). 〈http://www2.idsia.ch/cms/fun16/〉. 〈10.4230/LIPIcs.FUN.2016.8〉. 〈hal-01326059〉
  • David Gerault, Pascal Lafourcade. Related-Key Cryptanalysis of Midori. International Conference on Cryptology in India, Dec 2016, Kolkata, India. 2016. 〈hal-01588566〉
  • Xavier Bultel, Sébastien Gambs, David Gérault, Pascal Lafourcade, Cristina Onete, et al.. A Prover-Anonymous and Terrorist-Fraud Resistant Distance-Bounding Protocol. 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks (WiSec), Jul 2016, Darmstadt, Germany. ACM, pp.121-133, Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks. 〈10.1145/2939918.2939919〉. 〈hal-01510800〉
  • Ali Kassem, Yliès Falcone, Pascal Lafourcade. Monitoring Electronic Exams. 6th International Conference, RV 2015, Vienna, Austria, September 22-25, 2015. Proceedings, Sep 2015, Vienne, Australia. Springer, 9333, pp.16, 2015, Runtime Verification. 〈10.1007/978-3-319-23820-3_8〉. 〈hal-01248349〉
  • Thérèse Aby, Alexandre Guitton, Pascal Lafourcade, Michel Misson. SLACK-MAC: Adaptive MAC Protocol for Low Duty-Cycle Wireless Sensor Networks. International Conference on Ad Hoc Networks (Adhocnets), 2015, San Remo Riviera, Italy. International Conference on Ad Hoc Networks (Adhocnets), 2015. 〈hal-01569756〉
  • Jannik Dreier, Ali Kassem, Pascal Lafourcade. Formal Analysis of E-Cash Protocols. 12th International Conference on Security and Cryptography (SECRYPT 2015), Jul 2015, Colmar, France. 2015, 〈10.5220/0005544500650075〉. 〈hal-01337410〉
  • Pascal Lafourcade, Maxime Puys. Performance Evaluations of Cryptographic Protocols Verification Tools Dealing with Algebraic Properties. 8th International Symposium on Foundations and Practice of Security 8th International Symposium, FPS 2015, Oct 2015, Clermont-Ferrand, France. Springer, 8th International Symposium, FPS 2015 pp.137-155, 2016, Foundations nd Practice of Security 8th International Symposium, FPS 2015, Clermont-Ferrand, France, October 26-28, 2015, Revised Selected Papers. 〈http://confiance-numerique.clermont-universite.fr/fps2015/〉. 〈10.1007/978-3-319-30303-1_9〉. 〈hal-01306395〉
  • Jannik Dreier, Rosario Giustolisi, Ali Kassem, Pascal Lafourcade, Gabriele Lenzini. A Framework for Analyzing Verifiability in Traditional and Electronic Exams. Information Security Practice and Experience, May 2015, beijin, China. 2015, 〈10.1007/978-3-319-17533-1_35〉. 〈hal-01218138〉
  • Agnès Brelurut, David Gerault, Pascal Lafourcade. Survey of Distance Bounding Protocols and Threats. Foundations and Practice of Security (FPS), Oct 2015, Clermont Ferrand, France. Foundations and Practice of Security (FPS), pp.29 - 49, 2016, 〈10.1007/978-3-319-30303-1_3〉. 〈hal-01588557〉
  • Jannik Dreier, Ali Kassem, Pascal Lafourcade. Automated Verification of E-Cash Protocols. ICETE 2015 - 12th International Joint Conference on e-Business and Telecommunications, Jul 2015, Colmar, France. 〈hal-01840596〉
  • Ismail Mansour, Pascal Lafourcade, Gérard Chalhoub. Mécanismes d'authentification pour des réseaux de capteurs sans fil multi-sauts. ALGOTEL 2014 -- 16èmes Rencontres Francophones sur les Aspects Algorithmiques des Télécommunications, Jun 2014, Le Bois-Plage-en-Ré, France. pp.1-4, 2014. 〈hal-00979732v2〉
  • Ismail Mansour, Gérard Chalhoub, Damian Rusinek, Pascal Lafourcade, Bogdan Ksiezopolski. Multihop Node Authentication Mechanisms for Wireless Sensor Networks. International Conference on Ad-Hoc Networks and Wireless, Jun 2014, Benidorm, Spain. 〈hal-01876278〉
  • Jannik Dreier, Rosario Giustolisi, Ali Kassem, Pascal Lafourcade, Gabriele Lenzini, et al.. Formal Security Analysis of Traditional and Electronic Exams. E-Business and Telecommunications - 11th International Joint Conference, ICETE 2014, Revised Selected Papers, Aug 2014, Vienne, Austria. 2015, 〈10.1007/978-3-319-25915-4_16〉. 〈hal-01337412〉
  • Jannik Dreier, Rosario Giustolisi, Ali Kassem, Pascal Lafourcade, Gabriele Lenzini, et al.. Formal Analysis of Electronic Exams. 11th International Conference on Security and Cryptography (SECRYPT 2014), Aug 2014, Vienne, Austria. 2014, 〈10.5220/0005050901010112〉. 〈hal-01337413〉
  • Jannik Dreier, Hugo Jonker, Pascal Lafourcade. Secure Auctions without Cryptography. Fun with Algorithms - 7th International Conference (FUN 2014), Jul 2014, Lipari, Italy. 2014, 〈10.1007/978-3-319-07890-8_14〉. 〈hal-01337414〉
  • Jannik Dreier, Rosario Giustolisi, Ali Kassem, Pascal Lafourcade, Gabriele Lenzini, et al.. Formal Analysis of Electronic Exams. First Symposium on Digital Trust in Auvergne (SDTA'14), Dec 2014, Clermont-Ferrand, France. 〈hal-01338054〉
  • Ali Kassem, Pascal Lafourcade, Yassine Lakhnech. Formal Verification of e-Reputation Protocols. Foundations and Practice of Security - 7th International Symposium, FPS 2014, , Nov 2014, Montréal, Canada. 〈hal-01759921〉
  • Ismail Mansour, Gerard Chalhoub, Pascal Lafourcade. Secure Multihop Key Establishment Protocols for Wireless Sensor Networks. Cryptography and Security Systems - Third International Conference, CSS 2014, Lublin, Poland, Sep 2014, Lublin, Poland. 〈hal-01759913〉
  • Ismail Mansour, Damian Rusinek, Gerard Chalhoub, Pascal Lafourcade, Bogdan Ksiezopolski. Multihop Node Authentication Mechanisms for Wireless Sensor Networks ⋆. Ad-hoc, Mobile, and Wireless Networks - 13th International Conference, ADHOC-NOW 2014, Jun 2014, Benidorm, Spain. 〈hal-01759853〉
  • Raphaël Jamet, Pascal Lafourcade. (In)Corruptibility of Routing Protocols. Foundations and Practice of Security - 7th International Symposium, FPS 2014, Nov 2014, Montréal, Canada. 〈hal-01759919〉
  • Ismail Mansour, Gerard Chalhoub, Pascal Lafourcade, François Delobel. Secure Key Renewal and Revocation for Wireless Sensor Networks. 39th IEEE Conference on Local Computer Networks (LCN), Sep 2014, Edmonton, Canada. IEEE, 2014 IEEE 39th Conference on Local Computer Networks (LCN), 〈10.1109/LCN.2014.6925797〉. 〈hal-01759923〉
  • Amrit Kumar, Pascal Lafourcade, Cédric Lauradoux. Performances of Cryptographic Accumulators. The 39th IEEE Conference on Local Computer Networks (LCN), Sep 2014, Edmonton, Canada. 2014. 〈hal-00999432〉
  • Jannik Dreier, Jean-Guillaume Dumas, Pascal Lafourcade. Brandt's Fully Private Auction Protocol Revisited. Amr Youssef and Abderrahmane Nitaj and Aboul Ella Hassanien. Africacrypt 2013, Jun 2013, Le Caire, Egypt. Springer, 7918, pp.88-106, 2013, Lecture Notes in Computer Science. 〈10.1007/978-3-642-38553-7_5〉. 〈hal-00745247v3〉
  • Jannik Dreier, Hugo Jonker, Pascal Lafourcade. Defining Verifiability in e-Auction Protocols. 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS '13), May 2013, Hangzhou, China. 〈10.1145/2484313.2484387〉. 〈hal-01337416〉
  • Ali Kassem, Pascal Lafourcade, Yassine Lakhnech. A More Realistic Model for Verifying Route Validity in Ad-Hoc Networks: Corrected Version. Foundations and Practice of Security - 6th International Symposium, , Oct 2013, La Rochelle,, France. 〈hal-01759222〉
  • Raphaël Jamet, Pascal Lafourcade. Discovering Flaws in IDS through Analysis of their Inputs. The Sixth International Symposium on Foundations and Practice of Security FPS’2013, 2013, La Rochelle, France. 〈hal-01707722〉
  • Jannik Dreier, Hugo Jonker, Pascal Lafourcade. Verifiability in e-Auction Protocols . 1st Workshop on Hot Issues in Security Principles and Trust (HotSpot'13), Mar 2013, Rome, Italy. 〈hal-01338057〉
  • Karine Altisen, Stéphane Devismes, Raphaël Jamet, Pascal Lafourcade. Routage sécurisé et résilient pour réseaux de capteurs sans fil. Nisse, Nicolas et Rousseau, Franck et Busnel, Yann. 15èmes Rencontres Francophones sur les Aspects Algorithmiques des Télécommunications (AlgoTel), May 2013, Pornic, France. pp.1-4, 2013. 〈hal-00813387v3〉
  • Martin Gagné, Pascal Lafourcade, Yassine Lakhnech. Automated Security Proofs for Message Authentication Codes. Computer Security - 2013 - 18th European Symposium on Research in Computer Security, , Sep 2013, Egham, United Kingdom. 〈hal-01759927〉
  • Karine Altisen, Stéphane Devismes, Raphaël Jamet, Pascal Lafourcade. SR3: Secure Resilient Reputation-based Routing. 2013 IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS), May 2013, Cambridge, France. IEEE, 2013 IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS), 〈10.1109/DCOSS.2013.33〉. 〈hal-01759925〉
  • Jannik Dreier, Cristian Ene, Pascal Lafourcade, Yassine Lakhnech. On Unique Decomposition of Processes in the Applied π-Calculus. 16th International Conference on Foundations of Software Science and Computational Structures (FOSSACS 2013), Held as Part of the European Joint Conferences on Theory and Practice of Software (ETAPS 2013), Mar 2013, Rome, Italy. 2013, 〈10.1007/978-3-642-37075-5_4〉. 〈hal-01338002〉
  • Jannik Dreier, Pascal Lafourcade, Yassine Lakhnech. Formal Verification of e-Auction Protocols. Principles of Security and Trust - Second International Conference (POST 2013), Held as Part of the European Joint Conferences on Theory and Practice of Software (ETAPS 2013), Mar 2013, Rome, Italy. 2013, 〈10.1007/978-3-642-36830-1_13〉. 〈hal-01338020〉
  • Karine Altisen, Stéphane Devismes, Antoine Gerbaud, Pascal Lafourcade. Analysis of Random Walks using Tabu Lists. Structural Information and Communication Complexity - 19th International SIROCCO'12, Jun 2012, Reykjavik, Iceland. 〈hal-01759228〉
  • Jannik Dreier, Pascal Lafourcade, Yassine Lakhnech. Defining Privacy for Weighted Votes, Single and Multi-voter Coercion. European Symposium on Research in Computer Security (ESORICS), Sep 2012, Pise, Italy. 2012, 〈10.1007/978-3-642-33167-1_26〉. 〈hal-01338037〉
  • Jannik Dreier, Pascal Lafourcade, Yassine Lakhnech. A Formal Taxonomy of Privacy in Voting Protocols. First IEEE International Workshop on Security and Forensics in Communication Systems (ICC'12 WS - SFCS), Jun 2012, Ottawa, Canada. 〈10.1109/ICC.2012.6364938〉. 〈hal-01338064〉
  • Karine Altisen, Stéphane Devismes, Pascal Lafourcade, Clément Ponsonnet. Routage par marche aléatoire à listes tabous. 13es Rencontres Francophones sur les Aspects Algorithmiques de Télécommunications (AlgoTel), May 2011, Cap Estérel, France. pp.14, 2011. 〈hal-00588086〉
  • Laurent Fousse, Pascal Lafourcade, Mohamed Alnuaimi. Benaloh's dense probabilistic encryption revisited. Abderrahmane Nitaj, David Pointchebal. AFRICACRYPT'11 - 4th international conference on Progress in cryptology in Africa, Jul 2011, Dakar, Senegal. Springer, pp.348-362, 2011, Progress In Cryptology Africacrypt 2011 4th International Conference On Cryptology In Africa Dakar Senegal July 5 7 2011 Proceedings. 〈hal-00769449〉
  • Martin Gagné, Pascal Lafourcade, Yassine Lakhnech, Reihaneh Safavi-Naini. Automated Verification of Block Cipher Modes of Operation, an Improved Method. Foundations and Practice of Security - 4th Canada-France FPS 2011, May 2011, Paris, France. 〈hal-01759831〉
  • Jannik Dreier, Pascal Lafourcade, Yassine Lakhnech. Vote-Independence: A Powerful Privacy Notion for Voting Protocols. 4th Canada-France MITACS Workshop on Foundations & Practice of Security (FPS'11), May 2011, Paris, France. 2012, 〈10.1007/978-3-642-27901-0_13〉. 〈hal-01338070〉
  • Jeremie Tharaud, Sven Wohlgemuth, Isao Echizen, Noboru Sonehara, Günter Müller, et al.. Privacy by Data Provenance with Digital Watermarking - A Proof-of-Concept Implementation for Medical Services with Electronic Health Records. 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), Oct 2010, Darmstadt, Germany. IEEE, 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), 〈10.1109/IIHMSP.2010.130〉. 〈hal-01759931〉
  • Pascal Lafourcade, Vanessa Terrade, Sylvain Vigier. Comparison of Cryptographic Verification Tools Dealing with Algebraic Properties. Formal Aspects in Security and Trust, 2009, Eindhoven, Netherlands. 〈hal-01701443〉
  • Martin Gagné, Pascal Lafourcade, Yassine Lakhnech, Reihaneh Safavi-Naini. Automated Security Proof for Symmetric Encryption Modes. Advances in Computer Science - ASIAN 2009. Information Security and Privacy, 13th Asian Computing Science Conference,, Dec 2009, Séoul, South Korea. 〈hal-01759935〉
  • Judicaël Courant, Marion Daubignard, Cristian Ene, Pascal Lafourcade, Yassine Lakhnech. Towards Automated Proofs for Asymmetric Encryption Schemes in the Random Oracle Model. the 15th ACM conference, Oct 2008, Alexandria, France. ACM Press, 〈10.1145/1455770.1455817〉. 〈hal-01759943〉
  • Stéphanie Delaune, Pascal Lafourcade, Denis Lugiez, Ralf Treinen. Symbolic Protocol Analysis in Presence of a Homomorphism Operator and Exclusive Or. Automata, Languages and Programming, 33rd International Colloquium, , Jul 2006, Venise, Italy. 〈hal-01759947〉
  • Pascal Lafourcade, Denis Lugiez, Ralf Treinen. Intruder Deduction for AC-like Equational Theories with Homomorphisms. Term Rewriting and Applications, 16th International Conference, RTA'05, Apr 2005, Nara, Japan. 0006. 〈hal-01759946〉

Ouvrage (y compris édition critique et traduction)5 documents

Chapitre d'ouvrage2 documents

  • J Courant, M Daubignard, C Ene, Pascal Lafourcade, Y Lakhnech. Automated Proofs for Asymmetric Encryption. Concurrency, Compositionality, and Correctness, Essays in Honor of Willem-Paul de Roever, 2010. 〈hal-01759951〉
  • Cas Cremers, Pascal Lafourcade, Philippe Nadeau. Comparing State Spaces in Automatic Security Protocol Analysis. Published by Véronique Cortier and Claude Kirchner and Mitsuhiro Okada and Hideki Sakurada. Formal to Practical Security - Papers Issued from the 2005-2008 French-Japanese Collaboration , 2009. 〈hal-01759940〉

Direction d'ouvrage, Proceedings, Dossier1 document

  • Joaquin Garcia Alfaro, Pascal Lafourcade. Foundations and practice of security : 4th Canada-France MITACS workshop, FPS 2011, (Paris, May 12-13 2011). 6888, Springer Science, Business Media, pp.253, 2012, Lecture Notes in Computer Science, 978-3-642-27901-0. 〈hal-00724727〉

Pré-publication, Document de travail6 documents

  • Jean-Guillaume Dumas, Pascal Lafourcade, Julio Fenner, David Lucas, Jean-Baptiste Orfila, et al.. Secure Multi-Party Matrix Multiplication Based on Strassen-Winograd Algorithm. 2018. 〈hal-01781554v2〉
  • Sreekanth Malladi, Pascal Lafourcade. How to prevent type-flaw attacks on security protocols under algebraic properties. 16 pages, Appeared in proceedings of Security with Rewriting Techniques (SecRet09), Affiliated to.. 2018. 〈hal-01707737〉
  • Ariane Tichit, Pascal Lafourcade, Vincent Mazenod. Les monnaies virtuelles décentralisées sont-elles des outils d’avenir ?. 2017.04. 2017. 〈halshs-01467329〉
  • Jean-Guillaume Dumas, Pascal Lafourcade, Francis Melemedjian, Jean-Baptiste Orfila, Pascal Thoniel. LOCALPKI: A User-Centric Formally Proven Alternative to PKIX. 2017. 〈hal-01564696〉
  • Elliott Blot, Jannik Dreier, Pascal Lafourcade. Formal Analysis of Combinations of Secure Protocols . 2017. 〈hal-01558552v5〉
  • Jean-Guillaume Dumas, Pascal Lafourcade, Jean-Baptiste Orfila, Maxime Puys. Dual Protocols for Private Multi-party Matrix Multiplication and Trust Computations *. 2017. 〈hal-01497866〉

Rapport7 documents

  • Jannik Dreier, Rosario Giustolisi, Ali Kassem, Pascal Lafourcade, Gabriele Lenzini. On the Verifiability of (Electronic) Exams. [Technical Report] VERIMAG UMR 5104, Université Grenoble Alpes, France. 2015. 〈hal-01337411〉
  • Jannik Dreier, Hugo Jonker, Pascal Lafourcade. Secure Auctions Without Cryptography (extended version). [Technical Report] ETH Zurich. 2014. 〈hal-01337415〉
  • Jannik Dreier, Cristian Ene, Pascal Lafourcade, Yassine Lakhnech. On Unique Decomposition of Processes in the Applied π-Calculus. [Technical Report] VERIMAG UMR 5104, Université Grenoble Alpes, France. 2012. 〈hal-01338012〉
  • Jannik Dreier, Pascal Lafourcade, Yassine Lakhnech. Formal Verification of e-Auction Protocols. [Technical Report] TR-2012-17, VERIMAG. 2012. 〈hal-01338031〉
  • Jannik Dreier, Pascal Lafourcade, Yassine Lakhnech. Defining Privacy for Weighted Votes, Single and Multi-voter Coercion. [Research Report] VERIMAG. 2012. 〈hal-01338039〉
  • Jannik Dreier, Pascal Lafourcade, Yassine Lakhnech. Vote-Independence: A Powerful Privacy Notion for Voting Protocols. [Technical Report] VERIMAG UMR 5104, Université Grenoble Alpes, France. 2011. 〈hal-01338071〉
  • Jannik Dreier, Pascal Lafourcade, Yassine Lakhnech. A formal taxonomy of privacy in voting protocols. [Technical Report] VERIMAG UMR 5104, Université Grenoble Alpes, France. 2011. 〈hal-01338067〉

Thèse1 document

  • Pascal Lafourcade. Vérification de protocoles cryptographiques en présence de théories équationnelles. Autre [cs.OH]. École normale supérieure de Cachan - ENS Cachan, 2006. Français. 〈tel-00133494〉

HDR1 document

  • Pascal Lafourcade. Computer Aided Security for Cryptographic Primitives, Voting protocols, and Wireless Sensor Networks. Cryptography and Security [cs.CR]. Université de Grenoble, 2012. 〈tel-00807568〉