default search action
BibTeX records: Pascal Lafourcade 0001
@inproceedings{DBLP:conf/africacrypt/LafourcadeMR24, author = {Pascal Lafourcade and Ga{\"{e}}l Marcadet and L{\'{e}}o Robert}, editor = {Serge Vaudenay and Christophe Petit}, title = {iUC-Secure Distributed File Transfer from Standard Attribute-Based Encryption}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2024 - 15th International Conference on Cryptology in Africa, Douala, Cameroon, July 10-12, 2024, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14861}, pages = {174--198}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-64381-1\_8}, doi = {10.1007/978-3-031-64381-1\_8}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/LafourcadeMR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiaccs/0001MMO24, author = {Pascal Lafourcade and Dhekra Mahmoud and Ga{\"{e}}l Marcadet and Charles Olivier{-}Anclin}, editor = {Jianying Zhou and Tony Q. S. Quek and Debin Gao and Alvaro A. C{\'{a}}rdenas}, title = {Transferable, Auditable and Anonymous Ticketing Protocol}, booktitle = {Proceedings of the 19th {ACM} Asia Conference on Computer and Communications Security, {ASIA} {CCS} 2024, Singapore, July 1-5, 2024}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3634737.3645008}, doi = {10.1145/3634737.3645008}, timestamp = {Fri, 16 Aug 2024 09:08:03 +0200}, biburl = {https://dblp.org/rec/conf/asiaccs/0001MMO24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/LafourcadeMOR24, author = {Pascal Lafourcade and Lola{-}Baie Mallordy and Charles Olivier{-}Anclin and L{\'{e}}o Robert}, editor = {Joaquin Garc{\'{\i}}a{-}Alfaro and Rafal Kozik and Michal Choras and Sokratis K. Katsikas}, title = {Secure Keyless Multi-party Storage Scheme}, booktitle = {Computer Security - {ESORICS} 2024 - 29th European Symposium on Research in Computer Security, Bydgoszcz, Poland, September 16-20, 2024, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14984}, pages = {279--298}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-70896-1\_14}, doi = {10.1007/978-3-031-70896-1\_14}, timestamp = {Fri, 13 Sep 2024 21:29:56 +0200}, biburl = {https://dblp.org/rec/conf/esorics/LafourcadeMOR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fun/Dailly0M24, author = {Antoine Dailly and Pascal Lafourcade and Ga{\"{e}}l Marcadet}, editor = {Andrei Z. Broder and Tami Tamir}, title = {How Did They Design This Game? Swish: Complexity and Unplayable Positions}, booktitle = {12th International Conference on Fun with Algorithms, {FUN} 2024, June 4-8, 2024, Island of La Maddalena, Sardinia, Italy}, series = {LIPIcs}, volume = {291}, pages = {10:1--10:19}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2024}, url = {https://doi.org/10.4230/LIPIcs.FUN.2024.10}, doi = {10.4230/LIPICS.FUN.2024.10}, timestamp = {Wed, 21 Aug 2024 22:46:00 +0200}, biburl = {https://dblp.org/rec/conf/fun/Dailly0M24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Msahli0M24, author = {Mounira Msahli and Pascal Lafourcade and Dhekra Mahmoud}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Formal Analysis of {C-ITS} {PKI} Protocols}, booktitle = {Proceedings of the 21st International Conference on Security and Cryptography, {SECRYPT} 2024, Dijon, France, July 8-10, 2024}, pages = {198--210}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012766100003767}, doi = {10.5220/0012766100003767}, timestamp = {Thu, 05 Sep 2024 14:21:37 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Msahli0M24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/Dreier0M24, author = {Jannik Dreier and Pascal Lafourcade and Dhekra Mahmoud}, editor = {Davide Balzarotti and Wenyuan Xu}, title = {Shaken, not Stirred - Automated Discovery of Subtle Attacks on Protocols using Mix-Nets}, booktitle = {33rd {USENIX} Security Symposium, {USENIX} Security 2024, Philadelphia, PA, USA, August 14-16, 2024}, publisher = {{USENIX} Association}, year = {2024}, url = {https://www.usenix.org/conference/usenixsecurity24/presentation/dreier}, timestamp = {Mon, 22 Jul 2024 17:10:49 +0200}, biburl = {https://dblp.org/rec/conf/uss/Dreier0M24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/CiucanuLLS23, author = {Radu Ciucanu and Pascal Lafourcade and Marius Lombard{-}Platet and Marta Soare}, title = {Secure protocols for cumulative reward maximization in stochastic multi-armed bandits}, journal = {J. Comput. Secur.}, volume = {31}, number = {1}, pages = {1--27}, year = {2023}, url = {https://doi.org/10.3233/JCS-210051}, doi = {10.3233/JCS-210051}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/CiucanuLLS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jea/CrombezFFGGLLMSZZ23, author = {Lo{\"{\i}}c Crombez and Guilherme Dias da Fonseca and Florian Fontan and Yan Gerard and Aldo Gonzalez{-}Lorenzo and Pascal Lafourcade and Luc Libralesso and Benjamin Mom{\`{e}}ge and Jack Spalding{-}Jamieson and Brandon Zhang and Da Wei Zheng}, title = {Conflict Optimization for Binary {CSP} Applied to Minimum Partition into Plane Subgraphs and Graph Coloring}, journal = {{ACM} J. Exp. Algorithmics}, volume = {28}, pages = {1.2:1--1.2:13}, year = {2023}, url = {https://doi.org/10.1145/3588869}, doi = {10.1145/3588869}, timestamp = {Wed, 24 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jea/CrombezFFGGLLMSZZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/RobertMLM23, author = {L{\'{e}}o Robert and Daiki Miyahara and Pascal Lafourcade and Takaaki Mizuki}, title = {Physical {ZKP} protocols for Nurimisaki and Kurodoko}, journal = {Theor. Comput. Sci.}, volume = {972}, pages = {114071}, year = {2023}, url = {https://doi.org/10.1016/j.tcs.2023.114071}, doi = {10.1016/J.TCS.2023.114071}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/RobertMLM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/DarwichUBLDL23, author = {Omar Darwich and Ahmet{-}Sefa Ulucan and Quentin Bramas and Anissa Lamani and Ana{\"{\i}}s Durand and Pascal Lafourcade}, title = {Perpetual torus exploration by myopic luminous robots}, journal = {Theor. Comput. Sci.}, volume = {976}, pages = {114143}, year = {2023}, url = {https://doi.org/10.1016/j.tcs.2023.114143}, doi = {10.1016/J.TCS.2023.114143}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/DarwichUBLDL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/BramasLD23, author = {Quentin Bramas and Pascal Lafourcade and St{\'{e}}phane Devismes}, title = {Optimal exclusive perpetual grid exploration by luminous myopic opaque robots with common chirality}, journal = {Theor. Comput. Sci.}, volume = {977}, pages = {114162}, year = {2023}, url = {https://doi.org/10.1016/j.tcs.2023.114162}, doi = {10.1016/J.TCS.2023.114162}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/BramasLD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/AkandSKGL23, author = {Mamunur Akand and Reihaneh Safavi{-}Naini and Marc Kneppers and Matthieu Giraud and Pascal Lafourcade}, title = {Privacy-Preserving Proof-of-Location With Security Against Geo-Tampering}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {20}, number = {1}, pages = {131--146}, year = {2023}, url = {https://doi.org/10.1109/TDSC.2021.3128073}, doi = {10.1109/TDSC.2021.3128073}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/AkandSKGL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/CiucanuDLS23, author = {Radu Ciucanu and Anatole Delabrouille and Pascal Lafourcade and Marta Soare}, title = {Secure Protocols for Best Arm Identification in Federated Stochastic Multi-Armed Bandits}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {20}, number = {2}, pages = {1378--1389}, year = {2023}, url = {https://doi.org/10.1109/TDSC.2022.3154585}, doi = {10.1109/TDSC.2022.3154585}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/CiucanuDLS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/brains/HayekLT23, author = {Fr{\'{e}}d{\'{e}}ric A. Hayek and Pascal Lafourcade and Ariane Tichit}, title = {Generic and Universal Local Cryptocurrency: LCoin}, booktitle = {5th Conference on Blockchain Research {\&} Applications for Innovative Networks and Services, {BRAINS} 2023, Paris, France, October 11-13, 2023}, pages = {1--4}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/BRAINS59668.2023.10317036}, doi = {10.1109/BRAINS59668.2023.10317036}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/brains/HayekLT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/BellaBCLO23, author = {Rohann Bella and Xavier Bultel and C{\'{e}}line Chevalier and Pascal Lafourcade and Charles Olivier{-}Anclin}, editor = {Foteini Baldimtsi and Christian Cachin}, title = {Practical Construction for Secure Trick-Taking Games Even with Cards Set Aside}, booktitle = {Financial Cryptography and Data Security - 27th International Conference, {FC} 2023, Bol, Bra{\v{c}}, Croatia, May 1-5, 2023, Revised Selected Papers, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13950}, pages = {166--181}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-47754-6\_10}, doi = {10.1007/978-3-031-47754-6\_10}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/BellaBCLO23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcai/Ciucanu0MS23, author = {Radu Ciucanu and Pascal Lafourcade and Ga{\"{e}}l Marcadet and Marta Soare}, title = {{SAMBA:} {A} Generic Framework for Secure Federated Multi-Armed Bandits (Extended Abstract)}, booktitle = {Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, {IJCAI} 2023, 19th-25th August 2023, Macao, SAR, China}, pages = {6863--6867}, publisher = {ijcai.org}, year = {2023}, url = {https://doi.org/10.24963/ijcai.2023/772}, doi = {10.24963/IJCAI.2023/772}, timestamp = {Thu, 30 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ijcai/Ciucanu0MS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/HandKLMR23, author = {Samuel D. Hand and Alexander Koch and Pascal Lafourcade and Daiki Miyahara and L{\'{e}}o Robert}, editor = {Junji Shikata and Hiroki Kuzuno}, title = {Check Alternating Patterns: {A} Physical Zero-Knowledge Proof for Moon-or-Sun}, booktitle = {Advances in Information and Computer Security - 18th International Workshop on Security, {IWSEC} 2023, Yokohama, Japan, August 29-31, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14128}, pages = {255--272}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-41326-1\_14}, doi = {10.1007/978-3-031-41326-1\_14}, timestamp = {Mon, 26 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/HandKLMR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/Marcadet0R23, author = {Ga{\"{e}}l Marcadet and Pascal Lafourcade and L{\'{e}}o Robert}, editor = {Jiman Hong and Maart Lanperne and Juw Won Park and Tom{\'{a}}s Cern{\'{y}} and Hossain Shahriar}, title = {{RMC-PVC:} {A} Multi-Client Reusable Verifiable Computation Protocol}, booktitle = {Proceedings of the 38th {ACM/SIGAPP} Symposium on Applied Computing, {SAC} 2023, Tallinn, Estonia, March 27-31, 2023}, pages = {1558--1565}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3555776.3577680}, doi = {10.1145/3555776.3577680}, timestamp = {Thu, 30 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sac/Marcadet0R23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/HayekK0O23, author = {Fr{\'{e}}d{\'{e}}ric A. Hayek and Mirko Koscina and Pascal Lafourcade and Charles Olivier{-}Anclin}, editor = {Jiman Hong and Maart Lanperne and Juw Won Park and Tom{\'{a}}s Cern{\'{y}} and Hossain Shahriar}, title = {Generic Privacy Preserving Private Permissioned Blockchains}, booktitle = {Proceedings of the 38th {ACM/SIGAPP} Symposium on Applied Computing, {SAC} 2023, Tallinn, Estonia, March 27-31, 2023}, pages = {1585--1592}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3555776.3577735}, doi = {10.1145/3555776.3577735}, timestamp = {Mon, 31 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sac/HayekK0O23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/GrittiH023, author = {Cl{\'{e}}mentine Gritti and Fr{\'{e}}d{\'{e}}ric A. Hayek and Pascal Lafourcade}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Generic Blockchain on Generic Human Behavior}, booktitle = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, pages = {206--217}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0012091700003555}, doi = {10.5220/0012091700003555}, timestamp = {Mon, 31 Jul 2023 15:34:21 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/GrittiH023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/BlazyB0OR23, author = {Olivier Blazy and Ioana Boureanu and Pascal Lafourcade and Cristina Onete and L{\'{e}}o Robert}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {How fast do you heal? {A} taxonomy for post-compromise security in secure-channel establishment}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {5917--5934}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/blazy}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/BlazyB0OR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/crc/23/Moran0PW23, author = {Murat Moran and Pascal Lafourcade and Maxime Puys and David Williams}, editor = {Sedat Akleylek and Besik Dundua}, title = {An Introduction to Tools for Formal Analysis of Cryptographic Protocols}, booktitle = {Handbook of Formal Analysis and Verification in Cryptography}, pages = {105--152}, publisher = {{CRC} Press}, year = {2023}, url = {https://doi.org/10.1201/9781003090052-3}, doi = {10.1201/9781003090052-3}, timestamp = {Mon, 25 Sep 2023 12:19:41 +0200}, biburl = {https://dblp.org/rec/books/crc/23/Moran0PW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2303-09632, author = {Lo{\"{\i}}c Crombez and Guilherme Dias da Fonseca and Florian Fontan and Yan Gerard and Aldo Gonzalez{-}Lorenzo and Pascal Lafourcade and Luc Libralesso and Benjamin Mom{\`{e}}ge and Jack Spalding{-}Jamieson and Brandon Zhang and Da Wei Zheng}, title = {Conflict Optimization for Binary {CSP} Applied to Minimum Partition into Plane Subgraphs and Graph Coloring}, journal = {CoRR}, volume = {abs/2303.09632}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2303.09632}, doi = {10.48550/ARXIV.2303.09632}, eprinttype = {arXiv}, eprint = {2303.09632}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2303-09632.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2307-02475, author = {Jean{-}Marie Favreau and Yan Gerard and Pascal Lafourcade and L{\'{e}}o Robert}, title = {The Calissons Puzzle}, journal = {CoRR}, volume = {abs/2307.02475}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2307.02475}, doi = {10.48550/ARXIV.2307.02475}, eprinttype = {arXiv}, eprint = {2307.02475}, timestamp = {Mon, 10 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2307-02475.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BellaBCLO23, author = {Rohann Bella and Xavier Bultel and C{\'{e}}line Chevalier and Pascal Lafourcade and Charles Olivier{-}Anclin}, title = {Practical Construction for Secure Trick-Taking Games Even With Cards Set Aside}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {309}, year = {2023}, url = {https://eprint.iacr.org/2023/309}, timestamp = {Fri, 31 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BellaBCLO23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HandKLMR23, author = {Samuel D. Hand and Alexander Koch and Pascal Lafourcade and Daiki Miyahara and L{\'{e}}o Robert}, title = {Check Alternating Patterns: {A} Physical Zero-Knowledge Proof for Moon-or-Sun}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1560}, year = {2023}, url = {https://eprint.iacr.org/2023/1560}, timestamp = {Mon, 26 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HandKLMR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iandc/RobertMLLM22, author = {L{\'{e}}o Robert and Daiki Miyahara and Pascal Lafourcade and Luc Libralesso and Takaaki Mizuki}, title = {Physical zero-knowledge proof and NP-completeness proof of Suguru puzzle}, journal = {Inf. Comput.}, volume = {285}, number = {Part}, pages = {104858}, year = {2022}, url = {https://doi.org/10.1016/j.ic.2021.104858}, doi = {10.1016/J.IC.2021.104858}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iandc/RobertMLLM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jair/Ciucanu0MS22, author = {Radu Ciucanu and Pascal Lafourcade and Ga{\"{e}}l Marcadet and Marta Soare}, title = {{SAMBA:} {A} Generic Framework for Secure Federated Multi-Armed Bandits}, journal = {J. Artif. Intell. Res.}, volume = {73}, pages = {737--765}, year = {2022}, url = {https://doi.org/10.1613/jair.1.13163}, doi = {10.1613/JAIR.1.13163}, timestamp = {Thu, 30 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jair/Ciucanu0MS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/DreierDLR22, author = {Jannik Dreier and Jean{-}Guillaume Dumas and Pascal Lafourcade and L{\'{e}}o Robert}, title = {Optimal threshold padlock systems}, journal = {J. Comput. Secur.}, volume = {30}, number = {5}, pages = {655--688}, year = {2022}, url = {https://doi.org/10.3233/JCS-210065}, doi = {10.3233/JCS-210065}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/DreierDLR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jea/CrombezFGGLL22, author = {Lo{\"{\i}}c Crombez and Guilherme Dias da Fonseca and Yan Gerard and Aldo Gonzalez{-}Lorenzo and Pascal Lafourcade and Luc Libralesso}, title = {Shadoks Approach to Low-Makespan Coordinated Motion Planning}, journal = {{ACM} J. Exp. Algorithmics}, volume = {27}, pages = {3.2:1--3.2:17}, year = {2022}, url = {https://doi.org/10.1145/3524133}, doi = {10.1145/3524133}, timestamp = {Thu, 25 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jea/CrombezFGGLL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ngc/RobertMLM22, author = {L{\'{e}}o Robert and Daiki Miyahara and Pascal Lafourcade and Takaaki Mizuki}, title = {Card-Based {ZKP} for Connectivity: Applications to Nurikabe, Hitori, and Heyawake}, journal = {New Gener. Comput.}, volume = {40}, number = {1}, pages = {149--171}, year = {2022}, url = {https://doi.org/10.1007/s00354-022-00155-5}, doi = {10.1007/S00354-022-00155-5}, timestamp = {Mon, 24 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ngc/RobertMLM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/ArfaouiFJLNOR22, author = {Ghada Arfaoui and Pierre{-}Alain Fouque and Thibaut Jacques and Pascal Lafourcade and Adina Nedelcu and Cristina Onete and L{\'{e}}o Robert}, editor = {Giuseppe Ateniese and Daniele Venturi}, title = {A Cryptographic View of Deep-Attestation, or How to Do Provably-Secure Layer-Linking}, booktitle = {Applied Cryptography and Network Security - 20th International Conference, {ACNS} 2022, Rome, Italy, June 20-23, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13269}, pages = {399--418}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-09234-3\_20}, doi = {10.1007/978-3-031-09234-3\_20}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/ArfaouiFJLNOR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compgeom/Fontan0LM22, author = {Florian Fontan and Pascal Lafourcade and Luc Libralesso and Benjamin Mom{\`{e}}ge}, editor = {Xavier Goaoc and Michael Kerber}, title = {Local Search with Weighting Schemes for the {CG:} {SHOP} 2022 Competition {(CG} Challenge)}, booktitle = {38th International Symposium on Computational Geometry, SoCG 2022, June 7-10, 2022, Berlin, Germany}, series = {LIPIcs}, volume = {224}, pages = {73:1--73:6}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2022}, url = {https://doi.org/10.4230/LIPIcs.SoCG.2022.73}, doi = {10.4230/LIPICS.SOCG.2022.73}, timestamp = {Wed, 21 Aug 2024 22:46:00 +0200}, biburl = {https://dblp.org/rec/conf/compgeom/Fontan0LM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fps/KoscinaLMOR22, author = {Mirko Koscina and Pascal Lafourcade and Ga{\"{e}}l Marcadet and Charles Olivier{-}Anclin and L{\'{e}}o Robert}, editor = {Guy{-}Vincent Jourdan and Laurent Mounier and Carlisle M. Adams and Florence S{\`{e}}des and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {A Survey on Identity-Based Blind Signature}, booktitle = {Foundations and Practice of Security - 15th International Symposium, {FPS} 2022, Ottawa, ON, Canada, December 12-14, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13877}, pages = {19--37}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-30122-3\_2}, doi = {10.1007/978-3-031-30122-3\_2}, timestamp = {Thu, 30 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fps/KoscinaLMOR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fun/BramasDD0L22, author = {Quentin Bramas and St{\'{e}}phane Devismes and Ana{\"{\i}}s Durand and Pascal Lafourcade and Anissa Lamani}, editor = {Pierre Fraigniaud and Yushi Uno}, title = {Beedroids: How Luminous Autonomous Swarms of UAVs Can Save the World?}, booktitle = {11th International Conference on Fun with Algorithms, {FUN} 2022, May 30 to June 3, 2022, Island of Favignana, Sicily, Italy}, series = {LIPIcs}, volume = {226}, pages = {7:1--7:21}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2022}, url = {https://doi.org/10.4230/LIPIcs.FUN.2022.7}, doi = {10.4230/LIPICS.FUN.2022.7}, timestamp = {Wed, 21 Aug 2024 22:46:00 +0200}, biburl = {https://dblp.org/rec/conf/fun/BramasDD0L22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icde/MarcadetCLSA22, author = {Ga{\"{e}}l Marcadet and Radu Ciucanu and Pascal Lafourcade and Marta Soare and Sihem Amer{-}Yahia}, title = {Samba: {A} System for Secure Federated Multi-Armed Bandits}, booktitle = {38th {IEEE} International Conference on Data Engineering, {ICDE} 2022, Kuala Lumpur, Malaysia, May 9-12, 2022}, pages = {3154--3157}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICDE53745.2022.00286}, doi = {10.1109/ICDE53745.2022.00286}, timestamp = {Thu, 30 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icde/MarcadetCLSA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/ConnollyDLP22, author = {Aisling Connolly and J{\'{e}}r{\^{o}}me Deschamps and Pascal Lafourcade and Octavio Perez{-}Kempner}, editor = {Takanori Isobe and Santanu Sarkar}, title = {Protego: Efficient, Revocable and Auditable Anonymous Credentials with Applications to Hyperledger Fabric}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2022 - 23rd International Conference on Cryptology in India, Kolkata, India, December 11-14, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13774}, pages = {249--271}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22912-1\_11}, doi = {10.1007/978-3-031-22912-1\_11}, timestamp = {Sun, 15 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/indocrypt/ConnollyDLP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/SivelleDPLF22, author = {Camille Sivelle and Lorys Debbah and Maxime Puys and Pascal Lafourcade and Thibault Franco{-}Rondisson}, editor = {Hans P. Reiser and Marcel Kyas}, title = {Automatic Implementations Synthesis of Secure Protocols and Attacks from Abstract Models}, booktitle = {Secure {IT} Systems - 27th Nordic Conference, NordSec 2022, Reykjavic, Iceland, November 30-December 2, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13700}, pages = {234--252}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22295-5\_13}, doi = {10.1007/978-3-031-22295-5\_13}, timestamp = {Sun, 15 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/SivelleDPLF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Connolly0P22, author = {Aisling Connolly and Pascal Lafourcade and Octavio Perez{-}Kempner}, editor = {Goichiro Hanaoka and Junji Shikata and Yohei Watanabe}, title = {Improved Constructions of Anonymous Credentials from Structure-Preserving Signatures on Equivalence Classes}, booktitle = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Virtual Event, March 8-11, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13177}, pages = {409--438}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-97121-2\_15}, doi = {10.1007/978-3-030-97121-2\_15}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Connolly0P22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/BlazyFJ0OR22, author = {Olivier Blazy and Pierre{-}Alain Fouque and Thibaut Jacques and Pascal Lafourcade and Cristina Onete and L{\'{e}}o Robert}, editor = {Jiman Hong and Miroslav Bures and Juw Won Park and Tom{\'{a}}s Cern{\'{y}}}, title = {{MARSHAL:} messaging with asynchronous ratchets and signatures for faster HeALing}, booktitle = {{SAC} '22: The 37th {ACM/SIGAPP} Symposium on Applied Computing, Virtual Event, April 25 - 29, 2022}, pages = {1666--1673}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3477314.3507044}, doi = {10.1145/3477314.3507044}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sac/BlazyFJ0OR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/DurbetG0T22, author = {Axel Durbet and Paul{-}Marie Grollemund and Pascal Lafourcade and Kevin Thiry{-}Atighehchi}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Near-collisions and Their Impact on Biometric Security}, booktitle = {Proceedings of the 19th International Conference on Security and Cryptography, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022}, pages = {382--389}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0011279200003283}, doi = {10.5220/0011279200003283}, timestamp = {Tue, 06 Jun 2023 14:58:01 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/DurbetG0T22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/DurbetG0MT22, author = {Axel Durbet and Paul{-}Marie Grollemund and Pascal Lafourcade and Denis Migdal and Kevin Thiry{-}Atighehchi}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Authentication Attacks on Projection-based Cancelable Biometric Schemes}, booktitle = {Proceedings of the 19th International Conference on Security and Cryptography, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022}, pages = {568--573}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0011277100003283}, doi = {10.5220/0011277100003283}, timestamp = {Thu, 04 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/DurbetG0MT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sss/DarwichUBLDL22, author = {Omar Darwich and Ahmet{-}Sefa Ulucan and Quentin Bramas and Anissa Lamani and Ana{\"{\i}}s Durand and Pascal Lafourcade}, editor = {St{\'{e}}phane Devismes and Franck Petit and Karine Altisen and Giuseppe Antonio Di Luna and Antonio Fern{\'{a}}ndez Anta}, title = {Perpetual Torus Exploration by Myopic Luminous Robots}, booktitle = {Stabilization, Safety, and Security of Distributed Systems - 24th International Symposium, {SSS} 2022, Clermont-Ferrand, France, November 15-17, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13751}, pages = {164--177}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-21017-4\_11}, doi = {10.1007/978-3-031-21017-4\_11}, timestamp = {Fri, 11 Nov 2022 16:53:16 +0100}, biburl = {https://dblp.org/rec/conf/sss/DarwichUBLDL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sss/RobertMLM22, author = {L{\'{e}}o Robert and Daiki Miyahara and Pascal Lafourcade and Takaaki Mizuki}, editor = {St{\'{e}}phane Devismes and Franck Petit and Karine Altisen and Giuseppe Antonio Di Luna and Antonio Fern{\'{a}}ndez Anta}, title = {Card-Based {ZKP} Protocol for Nurimisaki}, booktitle = {Stabilization, Safety, and Security of Distributed Systems - 24th International Symposium, {SSS} 2022, Clermont-Ferrand, France, November 15-17, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13751}, pages = {285--298}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-21017-4\_19}, doi = {10.1007/978-3-031-21017-4\_19}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sss/RobertMLM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tamc/RobertMLM22, author = {L{\'{e}}o Robert and Daiki Miyahara and Pascal Lafourcade and Takaaki Mizuki}, editor = {Ding{-}Zhu Du and Donglei Du and Chenchen Wu and Dachuan Xu}, title = {Hide a Liar: Card-Based {ZKP} Protocol for Usowan}, booktitle = {Theory and Applications of Models of Computation - 17th Annual Conference, {TAMC} 2022, Tianjin, China, September 16-18, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13571}, pages = {201--217}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-20350-3\_17}, doi = {10.1007/978-3-031-20350-3\_17}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tamc/RobertMLM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2205-04229, author = {Axel Durbet and Paul{-}Marie Grollemund and Pascal Lafourcade and Kevin Thiry{-}Atighehchi}, title = {Near-collisions and their Impact on Biometric Security (long)}, journal = {CoRR}, volume = {abs/2205.04229}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2205.04229}, doi = {10.48550/ARXIV.2205.04229}, eprinttype = {arXiv}, eprint = {2205.04229}, timestamp = {Wed, 11 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2205-04229.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlazyFJLOR22, author = {Olivier Blazy and Pierre{-}Alain Fouque and Thibaut Jacques and Pascal Lafourcade and Cristina Onete and L{\'{e}}o Robert}, title = {{MARSHAL:} Messaging with Asynchronous Ratchets and Signatures for faster HeALing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {486}, year = {2022}, url = {https://eprint.iacr.org/2022/486}, timestamp = {Mon, 16 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlazyFJLOR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ConnollyDLP22, author = {Aisling Connolly and J{\'{e}}r{\^{o}}me Deschamps and Pascal Lafourcade and Octavio Perez{-}Kempner}, title = {Protego: {A} Credential Scheme for Permissioned Blockchains (Extended Version)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {661}, year = {2022}, url = {https://eprint.iacr.org/2022/661}, timestamp = {Fri, 06 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/ConnollyDLP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlazyB0OR22, author = {Olivier Blazy and Ioana Boureanu and Pascal Lafourcade and Cristina Onete and L{\'{e}}o Robert}, title = {How fast do you heal? {A} taxonomy for post-compromise security in secure-channel establishment}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1090}, year = {2022}, url = {https://eprint.iacr.org/2022/1090}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlazyB0OR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LafourcadeMR22a, author = {Pascal Lafourcade and Ga{\"{e}}l Marcadet and L{\'{e}}o Robert}, title = {{RMC-PVC:} {A} Multi-Client Reusable Verifiable Computation Protocol (Long version)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1748}, year = {2022}, url = {https://eprint.iacr.org/2022/1748}, timestamp = {Thu, 30 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LafourcadeMR22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/ChaiebYLR21, author = {Marwa Chaieb and Souheib Yousfi and Pascal Lafourcade and Riadh Robbana}, title = {Design and practical implementation of verify-your-vote protocol}, journal = {Concurr. Comput. Pract. Exp.}, volume = {33}, number = {1}, year = {2021}, url = {https://doi.org/10.1002/cpe.5813}, doi = {10.1002/CPE.5813}, timestamp = {Sat, 09 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/concurrency/ChaiebYLR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/BellotCFGLCMR21, author = {V. Bellot and Maxime Cautr{\`{e}}s and Jean{-}Marie Favreau and M. Gonzalez{-}Thauvin and Pascal Lafourcade and Kergann Le Cornec and B. Mosnier and S. Rivi{\`{e}}re{-}Wekstein}, title = {How to generate perfect mazes?}, journal = {Inf. Sci.}, volume = {572}, pages = {444--459}, year = {2021}, url = {https://doi.org/10.1016/j.ins.2021.03.022}, doi = {10.1016/J.INS.2021.03.022}, timestamp = {Thu, 07 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/BellotCFGLCMR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/RibaltaLSL21, author = {Claudia Negri Ribalta and Marius Lombard{-}Platet and Camille Salinesi and Pascal Lafourcade}, title = {Blockchain Mirage or Silver Bullet? {A} Requirements-driven Comparative Analysis of Business and Developers' Perceptions in the Accountancy Domain}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {12}, number = {1}, pages = {85--110}, year = {2021}, url = {https://doi.org/10.22667/JOWUA.2021.03.31.085}, doi = {10.22667/JOWUA.2021.03.31.085}, timestamp = {Mon, 17 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/RibaltaLSL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/LafourcadeMMRSS21, author = {Pascal Lafourcade and Daiki Miyahara and Takaaki Mizuki and L{\'{e}}o Robert and Tatsuya Sasaki and Hideaki Sone}, title = {How to construct physical zero-knowledge proofs for puzzles with a "single loop" condition}, journal = {Theor. Comput. Sci.}, volume = {888}, pages = {41--55}, year = {2021}, url = {https://doi.org/10.1016/j.tcs.2021.07.019}, doi = {10.1016/J.TCS.2021.07.019}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/LafourcadeMMRSS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cie/RobertMLM21, author = {L{\'{e}}o Robert and Daiki Miyahara and Pascal Lafourcade and Takaaki Mizuki}, editor = {Liesbeth De Mol and Andreas Weiermann and Florin Manea and David Fern{\'{a}}ndez{-}Duque}, title = {Interactive Physical {ZKP} for Connectivity: Applications to Nurikabe and Hitori}, booktitle = {Connecting with Computability - 17th Conference on Computability in Europe, CiE 2021, Virtual Event, Ghent, July 5-9, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12813}, pages = {373--384}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-80049-9\_37}, doi = {10.1007/978-3-030-80049-9\_37}, timestamp = {Thu, 29 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cie/RobertMLM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compgeom/CrombezFGG0L21, author = {Lo{\"{\i}}c Crombez and Guilherme Dias da Fonseca and Yan Gerard and Aldo Gonzalez{-}Lorenzo and Pascal Lafourcade and Luc Libralesso}, editor = {Kevin Buchin and {\'{E}}ric Colin de Verdi{\`{e}}re}, title = {Shadoks Approach to Low-Makespan Coordinated Motion Planning {(CG} Challenge)}, booktitle = {37th International Symposium on Computational Geometry, SoCG 2021, June 7-11, 2021, Buffalo, NY, {USA} (Virtual Conference)}, series = {LIPIcs}, volume = {189}, pages = {63:1--63:9}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2021}, url = {https://doi.org/10.4230/LIPIcs.SoCG.2021.63}, doi = {10.4230/LIPICS.SOCG.2021.63}, timestamp = {Wed, 21 Aug 2024 22:46:00 +0200}, biburl = {https://dblp.org/rec/conf/compgeom/CrombezFGG0L21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cp/LibralessoDLS21, author = {Luc Libralesso and Fran{\c{c}}ois Delobel and Pascal Lafourcade and Christine Solnon}, editor = {Laurent D. Michel}, title = {Automatic Generation of Declarative Models For Differential Cryptanalysis}, booktitle = {27th International Conference on Principles and Practice of Constraint Programming, {CP} 2021, Montpellier, France (Virtual Conference), October 25-29, 2021}, series = {LIPIcs}, volume = {210}, pages = {40:1--40:18}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2021}, url = {https://doi.org/10.4230/LIPIcs.CP.2021.40}, doi = {10.4230/LIPICS.CP.2021.40}, timestamp = {Wed, 21 Aug 2024 22:46:00 +0200}, biburl = {https://dblp.org/rec/conf/cp/LibralessoDLS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/BoureanuDDG021, author = {Ioana Boureanu and Constantin Catalin Dragan and Fran{\c{c}}ois Dupressoir and David G{\'{e}}rault and Pascal Lafourcade}, title = {Mechanised Models and Proofs for Distance-Bounding}, booktitle = {34th {IEEE} Computer Security Foundations Symposium, {CSF} 2021, Dubrovnik, Croatia, June 21-25, 2021}, pages = {1--16}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/CSF51468.2021.00049}, doi = {10.1109/CSF51468.2021.00049}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/BoureanuDDG021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/BlazyBLP21, author = {Olivier Blazy and Xavier Bultel and Pascal Lafourcade and Octavio Perez{-}Kempner}, editor = {Nikita Borisov and Claudia D{\'{\i}}az}, title = {Generic Plaintext Equality and Inequality Proofs}, booktitle = {Financial Cryptography and Data Security - 25th International Conference, {FC} 2021, Virtual Event, March 1-5, 2021, Revised Selected Papers, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12674}, pages = {415--435}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-662-64322-8\_20}, doi = {10.1007/978-3-662-64322-8\_20}, timestamp = {Wed, 03 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/BlazyBLP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fps/BultelLOR21, author = {Xavier Bultel and Pascal Lafourcade and Charles Olivier{-}Anclin and L{\'{e}}o Robert}, editor = {Esma A{\"{\i}}meur and Maryline Laurent and Reda Yaich and Beno{\^{\i}}t Dupont and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {Generic Construction for Identity-Based Proxy Blind Signature}, booktitle = {Foundations and Practice of Security - 14th International Symposium, {FPS} 2021, Paris, France, December 7-10, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13291}, pages = {34--52}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-031-08147-7\_3}, doi = {10.1007/978-3-031-08147-7\_3}, timestamp = {Tue, 28 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fps/BultelLOR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fun/Bramas0D21, author = {Quentin Bramas and Pascal Lafourcade and St{\'{e}}phane Devismes}, editor = {Martin Farach{-}Colton and Giuseppe Prencipe and Ryuhei Uehara}, title = {Finding Water on Poleless Using Melomaniac Myopic Chameleon Robots}, booktitle = {10th International Conference on Fun with Algorithms, {FUN} 2021, May 30 to June 1, 2021, Favignana Island, Sicily, Italy}, series = {LIPIcs}, volume = {157}, pages = {6:1--6:19}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2021}, url = {https://doi.org/10.4230/LIPIcs.FUN.2021.6}, doi = {10.4230/LIPICS.FUN.2021.6}, timestamp = {Wed, 21 Aug 2024 22:46:00 +0200}, biburl = {https://dblp.org/rec/conf/fun/Bramas0D21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fun/MiyaharaR0TMSNS21, author = {Daiki Miyahara and L{\'{e}}o Robert and Pascal Lafourcade and So Takeshige and Takaaki Mizuki and Kazumasa Shinagawa and Atsuki Nagao and Hideaki Sone}, editor = {Martin Farach{-}Colton and Giuseppe Prencipe and Ryuhei Uehara}, title = {Card-Based {ZKP} Protocols for Takuzu and Juosan}, booktitle = {10th International Conference on Fun with Algorithms, {FUN} 2021, May 30 to June 1, 2021, Favignana Island, Sicily, Italy}, series = {LIPIcs}, volume = {157}, pages = {20:1--20:21}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2021}, url = {https://doi.org/10.4230/LIPIcs.FUN.2021.20}, doi = {10.4230/LIPICS.FUN.2021.20}, timestamp = {Sat, 19 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fun/MiyaharaR0TMSNS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcn/Bramas0D21, author = {Quentin Bramas and Pascal Lafourcade and St{\'{e}}phane Devismes}, title = {Optimal Exclusive Perpetual Grid Exploration by Luminous Myopic Opaque Robots with Common Chirality}, booktitle = {{ICDCN} '21: International Conference on Distributed Computing and Networking, Virtual Event, Nara, Japan, January 5-8, 2021}, pages = {76--85}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3427796.3427834}, doi = {10.1145/3427796.3427834}, timestamp = {Tue, 19 Jan 2021 17:08:16 +0100}, biburl = {https://dblp.org/rec/conf/icdcn/Bramas0D21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/netys/RauchBDLL21, author = {Arthur Rauch and Quentin Bramas and St{\'{e}}phane Devismes and Pascal Lafourcade and Anissa Lamani}, editor = {Karima Echihabi and Roland Meyer}, title = {Optimal Exclusive Perpetual Grid Exploration by Luminous Myopic Robots Without Common Chirality}, booktitle = {Networked Systems - 9th International Conference, {NETYS} 2021, Virtual Event, May 19-21, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12754}, pages = {95--110}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-91014-3\_7}, doi = {10.1007/978-3-030-91014-3\_7}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/netys/RauchBDLL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/0001RS21, author = {Pascal Lafourcade and L{\'{e}}o Robert and Demba Sow}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Fast Cramer-Shoup Cryptosystem}, booktitle = {Proceedings of the 18th International Conference on Security and Cryptography, {SECRYPT} 2021, July 6-8, 2021}, pages = {766--771}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010580607660771}, doi = {10.5220/0010580607660771}, timestamp = {Tue, 06 Jun 2023 14:58:01 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/0001RS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/21/AvoineBG00O21, author = {Gildas Avoine and Ioana Boureanu and David G{\'{e}}rault and Gerhard P. Hancke and Pascal Lafourcade and Cristina Onete}, editor = {Gildas Avoine and Julio Hernandez{-}Castro}, title = {From Relay Attacks to Distance-Bounding Protocols}, booktitle = {Security of Ubiquitous Computing Systems}, pages = {113--130}, publisher = {Springer International Publishing}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-10591-4\_7}, doi = {10.1007/978-3-030-10591-4\_7}, timestamp = {Wed, 01 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/sp/21/AvoineBG00O21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2103-13956, author = {Lo{\"{\i}}c Crombez and Guilherme Dias da Fonseca and Yan Gerard and Aldo Gonzalez{-}Lorenzo and Pascal Lafourcade and Luc Libralesso}, title = {Shadoks Approach to Low-Makespan Coordinated Motion Planning}, journal = {CoRR}, volume = {abs/2103.13956}, year = {2021}, url = {https://arxiv.org/abs/2103.13956}, eprinttype = {arXiv}, eprint = {2103.13956}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2103-13956.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2110-15163, author = {Axel Durbet and Pascal Lafourcade and Denis Migdal and Kevin Thiry{-}Atighehchi and Paul{-}Marie Grollemund}, title = {Authentication Attacks on Projection-based Cancelable Biometric Schemes}, journal = {CoRR}, volume = {abs/2110.15163}, year = {2021}, url = {https://arxiv.org/abs/2110.15163}, eprinttype = {arXiv}, eprint = {2110.15163}, timestamp = {Tue, 02 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2110-15163.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlazyBLP21, author = {Olivier Blazy and Xavier Bultel and Pascal Lafourcade and Octavio Perez{-}Kempner}, title = {Generic Plaintext Equality and Inequality Proofs (Extended Version)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {426}, year = {2021}, url = {https://eprint.iacr.org/2021/426}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlazyBLP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RobertMLM21, author = {L{\'{e}}o Robert and Daiki Miyahara and Pascal Lafourcade and Takaaki Mizuki}, title = {Interactive Physical {ZKP} for Connectivity: Applications to Nurikabe and Hitori}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {556}, year = {2021}, url = {https://eprint.iacr.org/2021/556}, timestamp = {Tue, 04 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RobertMLM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ArfaouiFJLNOR21, author = {Ghada Arfaoui and Pierre{-}Alain Fouque and Thibaut Jacques and Pascal Lafourcade and Adina Nedelcu and Cristina Onete and L{\'{e}}o Robert}, title = {A Cryptographic View of Deep-Attestation, or how to do Provably-Secure Layer-Linking}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1487}, year = {2021}, url = {https://eprint.iacr.org/2021/1487}, timestamp = {Fri, 10 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/ArfaouiFJLNOR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ConnollyLP21, author = {Aisling Connolly and Pascal Lafourcade and Octavio Perez{-}Kempner}, title = {Improved Constructions of Anonymous Credentials From Structure-Preserving Signatures on Equivalence Classes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1680}, year = {2021}, url = {https://eprint.iacr.org/2021/1680}, timestamp = {Thu, 13 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/ConnollyLP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ai/GeraultLMS20, author = {David G{\'{e}}rault and Pascal Lafourcade and Marine Minier and Christine Solnon}, title = {Computing {AES} related-key differential characteristics with constraint programming}, journal = {Artif. Intell.}, volume = {278}, year = {2020}, url = {https://doi.org/10.1016/j.artint.2019.103183}, doi = {10.1016/J.ARTINT.2019.103183}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ai/GeraultLMS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/LafourcadeL20, author = {Pascal Lafourcade and Marius Lombard{-}Platet}, title = {About blockchain interoperability}, journal = {Inf. Process. Lett.}, volume = {161}, pages = {105976}, year = {2020}, url = {https://doi.org/10.1016/j.ipl.2020.105976}, doi = {10.1016/J.IPL.2020.105976}, timestamp = {Tue, 05 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ipl/LafourcadeL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/BultelDDL20, author = {Xavier Bultel and Jannik Dreier and Jean{-}Guillaume Dumas and Pascal Lafourcade}, title = {A faster cryptographer's Conspiracy Santa}, journal = {Theor. Comput. Sci.}, volume = {839}, pages = {122--134}, year = {2020}, url = {https://doi.org/10.1016/j.tcs.2020.05.034}, doi = {10.1016/J.TCS.2020.05.034}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/BultelDDL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/Esmander0LR20, author = {Rose Esmander and Pascal Lafourcade and Marius Lombard{-}Platet and Claudia Negri Ribalta}, editor = {Melanie Volkamer and Christian Wressnegger}, title = {A silver bullet?: a comparison of accountants and developers mental models in the raise of blockchain}, booktitle = {{ARES} 2020: The 15th International Conference on Availability, Reliability and Security, Virtual Event, Ireland, August 25-28, 2020}, pages = {83:1--83:10}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3407023.3409193}, doi = {10.1145/3407023.3409193}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/Esmander0LR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/Ciucanu020, author = {Radu Ciucanu and Pascal Lafourcade}, editor = {Anoop Singhal and Jaideep Vaidya}, title = {{GOOSE:} {A} Secure Framework for Graph Outsourcing and {SPARQL} Evaluation}, booktitle = {Data and Applications Security and Privacy {XXXIV} - 34th Annual {IFIP} {WG} 11.3 Conference, DBSec 2020, Regensburg, Germany, June 25-26, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12122}, pages = {347--366}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-49669-2\_20}, doi = {10.1007/978-3-030-49669-2\_20}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/Ciucanu020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fps/LafourcadeRS20, author = {Pascal Lafourcade and L{\'{e}}o Robert and Demba Sow}, editor = {Gabriela Nicolescu and Assia Tria and Jos{\'{e}} M. Fernandez and Jean{-}Yves Marion and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {Fast Short and Fast Linear Cramer-Shoup}, booktitle = {Foundations and Practice of Security - 13th International Symposium, {FPS} 2020, Montreal, QC, Canada, December 1-3, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12637}, pages = {121--136}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-70881-8\_8}, doi = {10.1007/978-3-030-70881-8\_8}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fps/LafourcadeRS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icete/0001RS20, author = {Pascal Lafourcade and L{\'{e}}o Robert and Demba Sow}, editor = {Pierangela Samarati and Sabrina De Capitani di Vimercati and Mohammad S. Obaidat and Jalel Ben{-}Othman}, title = {Linear Generalized ElGamal Encryption Scheme}, booktitle = {Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, {ICETE} 2020 - Volume 2: SECRYPT, Lieusaint, Paris, France, July 8-10, 2020}, pages = {372--379}, publisher = {ScitePress}, year = {2020}, url = {https://doi.org/10.5220/0009828703720379}, doi = {10.5220/0009828703720379}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icete/0001RS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/netys/BramasDL20, author = {Quentin Bramas and St{\'{e}}phane Devismes and Pascal Lafourcade}, editor = {Chryssis Georgiou and Rupak Majumdar}, title = {Infinite Grid Exploration by Disoriented Robots}, booktitle = {Networked Systems - 8th International Conference, {NETYS} 2020, Marrakech, Morocco, June 3-5, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12129}, pages = {129--145}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-67087-0\_9}, doi = {10.1007/978-3-030-67087-0\_9}, timestamp = {Fri, 15 Jan 2021 14:54:16 +0100}, biburl = {https://dblp.org/rec/conf/netys/BramasDL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/CiucanuDLS20, author = {Radu Ciucanu and Anatole Delabrouille and Pascal Lafourcade and Marta Soare}, editor = {Khoa Nguyen and Wenling Wu and Kwok{-}Yan Lam and Huaxiong Wang}, title = {Secure Cumulative Reward Maximization in Linear Stochastic Bandits}, booktitle = {Provable and Practical Security - 14th International Conference, ProvSec 2020, Singapore, November 29 - December 1, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12505}, pages = {257--277}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-62576-4\_13}, doi = {10.1007/978-3-030-62576-4\_13}, timestamp = {Sat, 17 Dec 2022 21:30:21 +0100}, biburl = {https://dblp.org/rec/conf/provsec/CiucanuDLS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/semweb/CiucanuL20, author = {Radu Ciucanu and Pascal Lafourcade}, editor = {Kerry L. Taylor and Rafael S. Gon{\c{c}}alves and Freddy L{\'{e}}cu{\'{e}} and Jun Yan}, title = {Demonstration of {GOOSE:} {A} Secure Framework for Graph Outsourcing and {SPARQL} Evaluation}, booktitle = {Proceedings of the {ISWC} 2020 Demos and Industry Tracks: From Novel Ideas to Industrial Practice co-located with 19th International Semantic Web Conference {(ISWC} 2020), Globally online, November 1-6, 2020 {(UTC)}}, series = {{CEUR} Workshop Proceedings}, volume = {2721}, pages = {1--6}, publisher = {CEUR-WS.org}, year = {2020}, url = {https://ceur-ws.org/Vol-2721/paper476.pdf}, timestamp = {Fri, 10 Mar 2023 16:23:03 +0100}, biburl = {https://dblp.org/rec/conf/semweb/CiucanuL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sss/RobertM0M20, author = {L{\'{e}}o Robert and Daiki Miyahara and Pascal Lafourcade and Takaaki Mizuki}, editor = {St{\'{e}}phane Devismes and Neeraj Mittal}, title = {Physical Zero-Knowledge Proof for Suguru Puzzle}, booktitle = {Stabilization, Safety, and Security of Distributed Systems - 22nd International Symposium, {SSS} 2020, Austin, TX, USA, November 18-21, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12514}, pages = {235--247}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64348-5\_19}, doi = {10.1007/978-3-030-64348-5\_19}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sss/RobertM0M20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tokenomics/Grollemund0TT20, author = {Paul{-}Marie Grollemund and Pascal Lafourcade and Kevin Thiry{-}Atighehchi and Ariane Tichit}, editor = {Emmanuelle Anceaume and Christophe Bisi{\`{e}}re and Matthieu Bouvard and Quentin Bramas and Catherine Casamatta}, title = {Proof of Behavior (Short Paper)}, booktitle = {2nd International Conference on Blockchain Economics, Security and Protocols, Tokenomics 2020, October 26-27, 2020, Toulouse, France}, series = {OASIcs}, volume = {82}, pages = {11:1--11:6}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2020}, url = {https://doi.org/10.4230/OASIcs.Tokenomics.2020.11}, doi = {10.4230/OASICS.TOKENOMICS.2020.11}, timestamp = {Wed, 21 Aug 2024 22:46:00 +0200}, biburl = {https://dblp.org/rec/conf/tokenomics/Grollemund0TT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Ciucanu0LS20, author = {Radu Ciucanu and Pascal Lafourcade and Marius Lombard{-}Platet and Marta Soare}, editor = {Guojun Wang and Ryan K. L. Ko and Md. Zakirul Alam Bhuiyan and Yi Pan}, title = {Secure Outsourcing of Multi-Armed Bandits}, booktitle = {19th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020, Guangzhou, China, December 29, 2020 - January 1, 2021}, pages = {202--209}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00038}, doi = {10.1109/TRUSTCOM50675.2020.00038}, timestamp = {Fri, 30 Apr 2021 12:35:40 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/Ciucanu0LS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wise/Journault0MPR20, author = {Matthieu Journault and Pascal Lafourcade and Malika More and R{\'{e}}my Poulain and L{\'{e}}o Robert}, editor = {Lynette Drevin and Sun{\'{e}} von Solms and Marianthi Theocharidou}, title = {How to Teach the Undecidability of Malware Detection Problem and Halting Problem}, booktitle = {Information Security Education. Information Security in Action - 13th {IFIP} {WG} 11.8 World Conference, {WISE} 13, Maribor, Slovenia, September 21-23, 2020, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {579}, pages = {159--169}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-59291-2\_11}, doi = {10.1007/978-3-030-59291-2\_11}, timestamp = {Thu, 17 Sep 2020 15:00:52 +0200}, biburl = {https://dblp.org/rec/conf/wise/Journault0MPR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2004-11552, author = {Jannik Dreier and Jean{-}Guillaume Dumas and Pascal Lafourcade and L{\'{e}}o Robert}, title = {Optimal Threshold Padlock Systems}, journal = {CoRR}, volume = {abs/2004.11552}, year = {2020}, url = {https://arxiv.org/abs/2004.11552}, eprinttype = {arXiv}, eprint = {2004.11552}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2004-11552.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2005-09244, author = {Xavier Bultel and Jannik Dreier and Jean{-}Guillaume Dumas and Pascal Lafourcade}, title = {A Faster Cryptographer's Conspiracy Santa}, journal = {CoRR}, volume = {abs/2005.09244}, year = {2020}, url = {https://arxiv.org/abs/2005.09244}, eprinttype = {arXiv}, eprint = {2005.09244}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2005-09244.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SowRL20, author = {Demba Sow and L{\'{e}}o Robert and Pascal Lafourcade}, title = {Linear Generalized ElGamal Encryption Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {496}, year = {2020}, url = {https://eprint.iacr.org/2020/496}, timestamp = {Wed, 27 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SowRL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LafourcadeL20, author = {Pascal Lafourcade and Marius Lombard{-}Platet}, title = {About Blockchain Interoperability}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {643}, year = {2020}, url = {https://eprint.iacr.org/2020/643}, timestamp = {Tue, 30 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LafourcadeL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoureanuDDGL20, author = {Ioana Boureanu and Constantin Catalin Dragan and Fran{\c{c}}ois Dupressoir and David G{\'{e}}rault and Pascal Lafourcade}, title = {Precise and Mechanised Models and Proofs for Distance-Bounding and an Application to Contactless Payments}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1000}, year = {2020}, url = {https://eprint.iacr.org/2020/1000}, timestamp = {Mon, 05 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoureanuDDGL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/DreierPPLR19, author = {Jannik Dreier and Maxime Puys and Marie{-}Laure Potet and Pascal Lafourcade and Jean{-}Louis Roch}, title = {Formally and practically verifying flow properties in industrial systems}, journal = {Comput. Secur.}, volume = {86}, pages = {453--470}, year = {2019}, url = {https://doi.org/10.1016/j.cose.2018.09.018}, doi = {10.1016/J.COSE.2018.09.018}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/DreierPPLR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cocoon/Dumas0MMSS19, author = {Jean{-}Guillaume Dumas and Pascal Lafourcade and Daiki Miyahara and Takaaki Mizuki and Tatsuya Sasaki and Hideaki Sone}, editor = {Ding{-}Zhu Du and Zhenhua Duan and Cong Tian}, title = {Interactive Physical Zero-Knowledge Proof for Norinori}, booktitle = {Computing and Combinatorics - 25th International Conference, {COCOON} 2019, Xi'an, China, July 29-31, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11653}, pages = {166--177}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26176-4\_14}, doi = {10.1007/978-3-030-26176-4\_14}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cocoon/Dumas0MMSS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/Bultel019, author = {Xavier Bultel and Pascal Lafourcade}, editor = {Ian Goldberg and Tyler Moore}, title = {Secure Trick-Taking Game Protocols - How to Play Online Spades with Cheaters}, booktitle = {Financial Cryptography and Data Security - 23rd International Conference, {FC} 2019, Frigate Bay, St. Kitts and Nevis, February 18-22, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11598}, pages = {265--281}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-32101-7\_17}, doi = {10.1007/978-3-030-32101-7\_17}, timestamp = {Wed, 12 Aug 2020 17:59:02 +0200}, biburl = {https://dblp.org/rec/conf/fc/Bultel019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fps/0001NPPR19, author = {Pascal Lafourcade and Mike Nopere and J{\'{e}}r{\'{e}}my Picot and Daniela Pizzuti and Etienne Roudeix}, editor = {Abdelmalek Benzekri and Michel Barbeau and Guang Gong and Romain Laborde and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {Security Analysis of Auctionity: {A} Blockchain Based E-Auction}, booktitle = {Foundations and Practice of Security - 12th International Symposium, {FPS} 2019, Toulouse, France, November 5-7, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12056}, pages = {290--307}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-45371-8\_18}, doi = {10.1007/978-3-030-45371-8\_18}, timestamp = {Wed, 07 Dec 2022 23:10:28 +0100}, biburl = {https://dblp.org/rec/conf/fps/0001NPPR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fps/0001L19, author = {Pascal Lafourcade and Marius Lombard{-}Platet}, editor = {Abdelmalek Benzekri and Michel Barbeau and Guang Gong and Romain Laborde and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {Get-your-ID: Decentralized Proof of Identity}, booktitle = {Foundations and Practice of Security - 12th International Symposium, {FPS} 2019, Toulouse, France, November 5-7, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12056}, pages = {327--336}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-45371-8\_20}, doi = {10.1007/978-3-030-45371-8\_20}, timestamp = {Fri, 17 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fps/0001L19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fps/Gerault019, author = {David G{\'{e}}rault and Pascal Lafourcade}, editor = {Abdelmalek Benzekri and Michel Barbeau and Guang Gong and Romain Laborde and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {Towards Secure {TMIS} Protocols}, booktitle = {Foundations and Practice of Security - 12th International Symposium, {FPS} 2019, Toulouse, France, November 5-7, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12056}, pages = {337--344}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-45371-8\_21}, doi = {10.1007/978-3-030-45371-8\_21}, timestamp = {Mon, 05 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fps/Gerault019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icete/CiucanuG0Y19a, author = {Radu Ciucanu and Matthieu Giraud and Pascal Lafourcade and Lihua Ye}, editor = {Mohammad S. Obaidat}, title = {Secure and Efficient Matrix Multiplication with MapReduce}, booktitle = {E-Business and Telecommunications - 16th International Conference, {ICETE} 2019, Prague, Czech Republic, July 26-28, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1247}, pages = {132--156}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-52686-3\_6}, doi = {10.1007/978-3-030-52686-3\_6}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icete/CiucanuG0Y19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icete/CiucanuG0Y19, author = {Radu Ciucanu and Matthieu Giraud and Pascal Lafourcade and Lihua Ye}, editor = {Mohammad S. Obaidat and Pierangela Samarati}, title = {Secure Strassen-Winograd Matrix Multiplication with MapReduce}, booktitle = {Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, {ICETE} 2019 - Volume 2: SECRYPT, Prague, Czech Republic, July 26-28, 2019}, pages = {220--227}, publisher = {SciTePress}, year = {2019}, url = {https://doi.org/10.5220/0007916302200227}, doi = {10.5220/0007916302200227}, timestamp = {Tue, 06 Jun 2023 14:58:02 +0200}, biburl = {https://dblp.org/rec/conf/icete/CiucanuG0Y19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icete/ChaiebKY0R19, author = {Marwa Chaieb and Mirko Koscina and Souheib Yousfi and Pascal Lafourcade and Riadh Robbana}, editor = {Mohammad S. Obaidat and Pierangela Samarati}, title = {{DABSTERS:} Distributed Authorities using Blind Signature to Effect Robust Security in e-Voting}, booktitle = {Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, {ICETE} 2019 - Volume 2: SECRYPT, Prague, Czech Republic, July 26-28, 2019}, pages = {228--235}, publisher = {SciTePress}, year = {2019}, url = {https://doi.org/10.5220/0007917702280235}, doi = {10.5220/0007917702280235}, timestamp = {Wed, 18 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icete/ChaiebKY0R19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icete/CiucanuGLY19, author = {Radu Ciucanu and Matthieu Giraud and Pascal Lafourcade and Lihua Ye}, editor = {Mohammad S. Obaidat and Pierangela Samarati}, title = {Secure Intersection with MapReduce}, booktitle = {Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, {ICETE} 2019 - Volume 2: SECRYPT, Prague, Czech Republic, July 26-28, 2019}, pages = {236--243}, publisher = {SciTePress}, year = {2019}, url = {https://doi.org/10.5220/0007918902360243}, doi = {10.5220/0007918902360243}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icete/CiucanuGLY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ictac/ChaiebKY0R19, author = {Marwa Chaieb and Mirko Koscina and Souheib Yousfi and Pascal Lafourcade and Riadh Robbana}, editor = {Robert M. Hierons and Mohamed Mosbah}, title = {{DABSTERS:} {A} Privacy Preserving e-Voting Protocol for Permissioned Blockchain}, booktitle = {Theoretical Aspects of Computing - {ICTAC} 2019 - 16th International Colloquium, Hammamet, Tunisia, October 31 - November 4, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11884}, pages = {292--312}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-32505-3\_17}, doi = {10.1007/978-3-030-32505-3\_17}, timestamp = {Tue, 11 Oct 2022 14:59:07 +0200}, biburl = {https://dblp.org/rec/conf/ictac/ChaiebKY0R19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-8/0001MNS19, author = {Pascal Lafourcade and Takaaki Mizuki and Atsuki Nagao and Kazumasa Shinagawa}, editor = {Lynette Drevin and Marianthi Theocharidou}, title = {Light Cryptography}, booktitle = {Information Security Education. Education in Proactive Information Security - 12th {IFIP} {WG} 11.8 World Conference {WISE} 12, Lisbon, Portugal, June 25-27, 2019, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {557}, pages = {89--101}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-23451-5\_7}, doi = {10.1007/978-3-030-23451-5\_7}, timestamp = {Fri, 27 Mar 2020 08:53:43 +0100}, biburl = {https://dblp.org/rec/conf/ifip11-8/0001MNS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/0001MMSS19, author = {Pascal Lafourcade and Daiki Miyahara and Takaaki Mizuki and Tatsuya Sasaki and Hideaki Sone}, editor = {Swee{-}Huay Heng and Javier L{\'{o}}pez}, title = {A Physical {ZKP} for Slitherlink: How to Perform Physical Topology-Preserving Computation}, booktitle = {Information Security Practice and Experience - 15th International Conference, {ISPEC} 2019, Kuala Lumpur, Malaysia, November 26-28, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11879}, pages = {135--151}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34339-2\_8}, doi = {10.1007/978-3-030-34339-2\_8}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispec/0001MMSS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/Ciucanu0LS19, author = {Radu Ciucanu and Pascal Lafourcade and Marius Lombard{-}Platet and Marta Soare}, editor = {Swee{-}Huay Heng and Javier L{\'{o}}pez}, title = {Secure Best Arm Identification in Multi-armed Bandits}, booktitle = {Information Security Practice and Experience - 15th International Conference, {ISPEC} 2019, Kuala Lumpur, Malaysia, November 26-28, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11879}, pages = {152--171}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34339-2\_9}, doi = {10.1007/978-3-030-34339-2\_9}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/Ciucanu0LS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/Dumas0FLOPP19, author = {Jean{-}Guillaume Dumas and Pascal Lafourcade and Julio L{\'{o}}pez Fenner and David Lucas and Jean{-}Baptiste Orfila and Cl{\'{e}}ment Pernet and Maxime Puys}, editor = {Nuttapong Attrapadung and Takeshi Yagi}, title = {Secure Multiparty Matrix Multiplication Based on Strassen-Winograd Algorithm}, booktitle = {Advances in Information and Computer Security - 14th International Workshop on Security, {IWSEC} 2019, Tokyo, Japan, August 28-30, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11689}, pages = {67--88}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26834-3\_5}, doi = {10.1007/978-3-030-26834-3\_5}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwsec/Dumas0FLOPP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BultelLLMST19, author = {Xavier Bultel and Pascal Lafourcade and Russell W. F. Lai and Giulio Malavolta and Dominique Schr{\"{o}}der and Sri Aravinda Krishnan Thyagarajan}, editor = {Dongdai Lin and Kazue Sako}, title = {Efficient Invisible and Unlinkable Sanitizable Signatures}, booktitle = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11442}, pages = {159--189}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17253-4\_6}, doi = {10.1007/978-3-030-17253-4\_6}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/BultelLLMST19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sirocco/BramasD019, author = {Quentin Bramas and St{\'{e}}phane Devismes and Pascal Lafourcade}, editor = {Keren Censor{-}Hillel and Michele Flammini}, title = {Infinite Grid Exploration by Disoriented Robots}, booktitle = {Structural Information and Communication Complexity - 26th International Colloquium, {SIROCCO} 2019, L'Aquila, Italy, July 1-4, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11639}, pages = {340--344}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-24922-9\_25}, doi = {10.1007/978-3-030-24922-9\_25}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sirocco/BramasD019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/GajeraGGD019, author = {Hardik Gajera and Matthieu Giraud and David G{\'{e}}rault and Manik Lal Das and Pascal Lafourcade}, editor = {Maryline Laurent and Thanassis Giannetsos}, title = {Verifiable and Private Oblivious Polynomial Evaluation}, booktitle = {Information Security Theory and Practice - 13th {IFIP} {WG} 11.2 International Conference, {WISTP} 2019, Paris, France, December 11-12, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12024}, pages = {49--65}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-41702-4\_4}, doi = {10.1007/978-3-030-41702-4\_4}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/GajeraGGD019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1905-09271, author = {Quentin Bramas and St{\'{e}}phane Devismes and Pascal Lafourcade}, title = {Infinite Grid Exploration by Disoriented Robots}, journal = {CoRR}, volume = {abs/1905.09271}, year = {2019}, url = {http://arxiv.org/abs/1905.09271}, eprinttype = {arXiv}, eprint = {1905.09271}, timestamp = {Thu, 30 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1905-09271.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BultelL19, author = {Xavier Bultel and Pascal Lafourcade}, title = {Secure Trick-Taking Game Protocols: How to Play Online Spades with Cheaters}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {375}, year = {2019}, url = {https://eprint.iacr.org/2019/375}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BultelL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Bultel0LMST19, author = {Xavier Bultel and Pascal Lafourcade and Russell W. F. Lai and Giulio Malavolta and Dominique Schr{\"{o}}der and Sri Aravinda Krishnan Thyagarajan}, title = {Efficient Invisible and Unlinkable Sanitizable Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {648}, year = {2019}, url = {https://eprint.iacr.org/2019/648}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Bultel0LMST19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/GeraultLMS18, author = {David G{\'{e}}rault and Pascal Lafourcade and Marine Minier and Christine Solnon}, title = {Revisiting {AES} related-key differential attacks with constraint programming}, journal = {Inf. Process. Lett.}, volume = {139}, pages = {24--29}, year = {2018}, url = {https://doi.org/10.1016/j.ipl.2018.07.001}, doi = {10.1016/J.IPL.2018.07.001}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/GeraultLMS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/emcis/ChaiebYLR18, author = {Marwa Chaieb and Souheib Yousfi and Pascal Lafourcade and Riadh Robbana}, editor = {Marinos Themistocleous and Paulo Rupino da Cunha}, title = {Verify-Your-Vote: {A} Verifiable Blockchain-Based Online Voting Protocol}, booktitle = {Information Systems - 15th European, Mediterranean, and Middle Eastern Conference, {EMCIS} 2018, Limassol, Cyprus, October 4-5, 2018, Proceedings}, series = {Lecture Notes in Business Information Processing}, volume = {341}, pages = {16--30}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-11395-7\_2}, doi = {10.1007/978-3-030-11395-7\_2}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/emcis/ChaiebYLR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fps/BultelCG0Y18, author = {Xavier Bultel and Radu Ciucanu and Matthieu Giraud and Pascal Lafourcade and Lihua Ye}, editor = {Nur Zincir{-}Heywood and Guillaume Bonfante and Mourad Debbabi and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {Secure Joins with MapReduce}, booktitle = {Foundations and Practice of Security - 11th International Symposium, {FPS} 2018, Montreal, QC, Canada, November 13-15, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11358}, pages = {78--94}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-18419-3\_6}, doi = {10.1007/978-3-030-18419-3\_6}, timestamp = {Fri, 08 Dec 2023 07:53:07 +0100}, biburl = {https://dblp.org/rec/conf/fps/BultelCG0Y18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fun/BultelDD018, author = {Xavier Bultel and Jannik Dreier and Jean{-}Guillaume Dumas and Pascal Lafourcade}, editor = {Hiro Ito and Stefano Leonardi and Linda Pagli and Giuseppe Prencipe}, title = {A Cryptographer's Conspiracy Santa}, booktitle = {9th International Conference on Fun with Algorithms, {FUN} 2018, June 13-15, 2018, La Maddalena, Italy}, series = {LIPIcs}, volume = {100}, pages = {13:1--13:13}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2018}, url = {https://doi.org/10.4230/LIPIcs.FUN.2018.13}, doi = {10.4230/LIPICS.FUN.2018.13}, timestamp = {Tue, 27 Dec 2022 09:06:31 +0100}, biburl = {https://dblp.org/rec/conf/fun/BultelDD018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icete/CiucanuG0Y18, author = {Radu Ciucanu and Matthieu Giraud and Pascal Lafourcade and Lihua Ye}, editor = {Pierangela Samarati and Mohammad S. Obaidat}, title = {Secure Grouping and Aggregation with MapReduce}, booktitle = {Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, {ICETE} 2018 - Volume 2: SECRYPT, Porto, Portugal, July 26-28, 2018}, pages = {514--521}, publisher = {SciTePress}, year = {2018}, url = {https://doi.org/10.5220/0006843805140521}, doi = {10.5220/0006843805140521}, timestamp = {Wed, 29 Aug 2018 15:17:20 +0200}, biburl = {https://dblp.org/rec/conf/icete/CiucanuG0Y18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rcis/BultelDGIK0LMM18, author = {Xavier Bultel and Jannik Dreier and Matthieu Giraud and Marie Izaute and Timoth{\'{e}}e Kheyrkhah and Pascal Lafourcade and Dounia Lakhzoum and Vincent Marlin and Ladislav Mot{\'{a}}k}, title = {Security analysis and psychological study of authentication methods with {PIN} codes}, booktitle = {12th International Conference on Research Challenges in Information Science, {RCIS} 2018, Nantes, France, May 29-31, 2018}, pages = {1--11}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/RCIS.2018.8406648}, doi = {10.1109/RCIS.2018.8406648}, timestamp = {Wed, 16 Oct 2019 14:14:57 +0200}, biburl = {https://dblp.org/rec/conf/rcis/BultelDGIK0LMM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sss/BultelDD0MMNSSS18, author = {Xavier Bultel and Jannik Dreier and Jean{-}Guillaume Dumas and Pascal Lafourcade and Daiki Miyahara and Takaaki Mizuki and Atsuki Nagao and Tatsuya Sasaki and Kazumasa Shinagawa and Hideaki Sone}, editor = {Taisuke Izumi and Petr Kuznetsov}, title = {Physical Zero-Knowledge Proof for Makaro}, booktitle = {Stabilization, Safety, and Security of Distributed Systems - 20th International Symposium, {SSS} 2018, Tokyo, Japan, November 4-7, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11201}, pages = {111--125}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03232-6\_8}, doi = {10.1007/978-3-030-03232-6\_8}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sss/BultelDD0MMNSSS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/DumasLOP17, author = {Jean{-}Guillaume Dumas and Pascal Lafourcade and Jean{-}Baptiste Orfila and Maxime Puys}, title = {Dual protocols for private multi-party matrix multiplication and trust computations}, journal = {Comput. Secur.}, volume = {71}, pages = {51--70}, year = {2017}, url = {https://doi.org/10.1016/j.cose.2017.04.013}, doi = {10.1016/J.COSE.2017.04.013}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/DumasLOP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/BultelDLM17, author = {Xavier Bultel and Jannik Dreier and Pascal Lafourcade and Malika More}, title = {How to explain modern security concepts to your children}, journal = {Cryptologia}, volume = {41}, number = {5}, pages = {422--447}, year = {2017}, url = {https://doi.org/10.1080/01611194.2016.1238422}, doi = {10.1080/01611194.2016.1238422}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/BultelDLM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fmsd/KassemFL17, author = {Ali Kassem and Yli{\`{e}}s Falcone and Pascal Lafourcade}, title = {Formal analysis and offline monitoring of electronic exams}, journal = {Formal Methods Syst. Des.}, volume = {51}, number = {1}, pages = {117--153}, year = {2017}, url = {https://doi.org/10.1007/s10703-017-0280-0}, doi = {10.1007/S10703-017-0280-0}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fmsd/KassemFL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mca/AbyGLM17, author = {Affoua Therese Aby and Alexandre Guitton and Pascal Lafourcade and Michel Misson}, title = {History-based {MAC} Protocol for Low Duty-Cycle Wireless Sensor Networks: the {SLACK-MAC} Protocol}, journal = {{EAI} Endorsed Trans. Mob. Commun. Appl.}, volume = {3}, number = {11}, pages = {e5}, year = {2017}, url = {https://doi.org/10.4108/eai.13-9-2017.153340}, doi = {10.4108/EAI.13-9-2017.153340}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mca/AbyGLM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/SunGLYTQH17, author = {Siwei Sun and David G{\'{e}}rault and Pascal Lafourcade and Qianqian Yang and Yosuke Todo and Kexin Qiao and Lei Hu}, title = {Analysis of AES, SKINNY, and Others with Constraint Programming}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2017}, number = {1}, pages = {281--306}, year = {2017}, url = {https://doi.org/10.13154/tosc.v2017.i1.281-306}, doi = {10.13154/TOSC.V2017.I1.281-306}, timestamp = {Mon, 05 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/SunGLYTQH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/winet/AltisenDJL17, author = {Karine Altisen and St{\'{e}}phane Devismes and Rapha{\"{e}}l Jamet and Pascal Lafourcade}, title = {{SR3:} secure resilient reputation-based routing}, journal = {Wirel. Networks}, volume = {23}, number = {7}, pages = {2111--2133}, year = {2017}, url = {https://doi.org/10.1007/s11276-016-1273-4}, doi = {10.1007/S11276-016-1273-4}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/winet/AltisenDJL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/BultelCG017, author = {Xavier Bultel and Radu Ciucanu and Matthieu Giraud and Pascal Lafourcade}, title = {Secure Matrix Multiplication with MapReduce}, booktitle = {Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017}, pages = {11:1--11:10}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3098954.3098989}, doi = {10.1145/3098954.3098989}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/BultelCG017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/Bultel017, author = {Xavier Bultel and Pascal Lafourcade}, editor = {Srdjan Capkun and Sherman S. M. Chow}, title = {Unlinkable and Strongly Accountable Sanitizable Signatures from Verifiable Ring Signatures}, booktitle = {Cryptology and Network Security - 16th International Conference, {CANS} 2017, Hong Kong, China, November 30 - December 2, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11261}, pages = {203--226}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-030-02641-7\_10}, doi = {10.1007/978-3-030-02641-7\_10}, timestamp = {Wed, 25 Sep 2019 18:04:17 +0200}, biburl = {https://dblp.org/rec/conf/cans/Bultel017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AvoineBGG0OR17, author = {Gildas Avoine and Xavier Bultel and S{\'{e}}bastien Gambs and David G{\'{e}}rault and Pascal Lafourcade and Cristina Onete and Jean{-}Marc Robert}, editor = {Ramesh Karri and Ozgur Sinanoglu and Ahmad{-}Reza Sadeghi and Xun Yi}, title = {A Terrorist-fraud Resistant and Extractor-free Anonymous Distance-bounding Protocol}, booktitle = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6, 2017}, pages = {800--814}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3052973.3053000}, doi = {10.1145/3052973.3053000}, timestamp = {Sun, 12 Nov 2023 02:11:41 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AvoineBGG0OR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fps/BlotD017, author = {Elliott Blot and Jannik Dreier and Pascal Lafourcade}, editor = {Abdessamad Imine and Jos{\'{e}} M. Fernandez and Jean{-}Yves Marion and Luigi Logrippo and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {Formal Analysis of Combinations of Secure Protocols}, booktitle = {Foundations and Practice of Security - 10th International Symposium, {FPS} 2017, Nancy, France, October 23-25, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10723}, pages = {53--67}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-75650-9\_4}, doi = {10.1007/978-3-319-75650-9\_4}, timestamp = {Fri, 27 Dec 2019 21:23:06 +0100}, biburl = {https://dblp.org/rec/conf/fps/BlotD017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icete/Dumas0MOT17, author = {Jean{-}Guillaume Dumas and Pascal Lafourcade and Francis Melemedjian and Jean{-}Baptiste Orfila and Pascal Thoniel}, editor = {Mohammad S. Obaidat and Enrique Cabello}, title = {LocalPKI: An Interoperable and IoT Friendly {PKI}}, booktitle = {E-Business and Telecommunications - 14th International Joint Conference, {ICETE} 2017, Madrid, Spain, July 24-26, 2017, Revised Selected Paper}, series = {Communications in Computer and Information Science}, volume = {990}, pages = {224--252}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-030-11039-0\_11}, doi = {10.1007/978-3-030-11039-0\_11}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icete/Dumas0MOT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icete/Anzala-Yamajako17, author = {Alexandre Anzala{-}Yamajako and Olivier Bernard and Matthieu Giraud and Pascal Lafourcade}, editor = {Mohammad S. Obaidat and Enrique Cabello}, title = {No Such Thing as a Small Leak: Leakage-Abuse Attacks Against Symmetric Searchable Encryption}, booktitle = {E-Business and Telecommunications - 14th International Joint Conference, {ICETE} 2017, Madrid, Spain, July 24-26, 2017, Revised Selected Paper}, series = {Communications in Computer and Information Science}, volume = {990}, pages = {253--277}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-030-11039-0\_12}, doi = {10.1007/978-3-030-11039-0\_12}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icete/Anzala-Yamajako17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobiquitous/0001L017, author = {Amrit Kumar and C{\'{e}}dric Lauradoux and Pascal Lafourcade}, editor = {Tao Gu and Ramamohanarao Kotagiri and Huai Liu}, title = {Duck Attack on Accountable Distributed Systems}, booktitle = {Proceedings of the 14th {EAI} International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, Melbourne, Australia, November 7-10, 2017}, pages = {303--312}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3144457.3144480}, doi = {10.1145/3144457.3144480}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mobiquitous/0001L017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/BultelDGGG017, author = {Xavier Bultel and Manik Lal Das and Hardik Gajera and David G{\'{e}}rault and Matthieu Giraud and Pascal Lafourcade}, editor = {Tatsuaki Okamoto and Yong Yu and Man Ho Au and Yannan Li}, title = {Verifiable Private Polynomial Evaluation}, booktitle = {Provable Security - 11th International Conference, ProvSec 2017, Xi'an, China, October 23-25, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10592}, pages = {487--506}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68637-0\_29}, doi = {10.1007/978-3-319-68637-0\_29}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/BultelDGGG017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/DreierPP0R17, author = {Jannik Dreier and Maxime Puys and Marie{-}Laure Potet and Pascal Lafourcade and Jean{-}Louis Roch}, editor = {Pierangela Samarati and Mohammad S. Obaidat and Enrique Cabello}, title = {Formally Verifying Flow Properties in Industrial Systems}, booktitle = {Proceedings of the 14th International Joint Conference on e-Business and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid, Spain, July 24-26, 2017}, pages = {55--66}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006396500550066}, doi = {10.5220/0006396500550066}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/DreierPP0R17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Dumas0MOT17, author = {Jean{-}Guillaume Dumas and Pascal Lafourcade and Francis Melemedjian and Jean{-}Baptiste Orfila and Pascal Thoniel}, editor = {Pierangela Samarati and Mohammad S. Obaidat and Enrique Cabello}, title = {{LOCALPKI:} {A} User-Centric Formally Proven Alternative to {PKIX}}, booktitle = {Proceedings of the 14th International Joint Conference on e-Business and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid, Spain, July 24-26, 2017}, pages = {187--199}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006461101870199}, doi = {10.5220/0006461101870199}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Dumas0MOT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/GiraudAB017, author = {Matthieu Giraud and Alexandre Anzala{-}Yamajako and Olivier Bernard and Pascal Lafourcade}, editor = {Pierangela Samarati and Mohammad S. Obaidat and Enrique Cabello}, title = {Practical Passive Leakage-abuse Attacks Against Symmetric Searchable Encryption}, booktitle = {Proceedings of the 14th International Joint Conference on e-Business and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid, Spain, July 24-26, 2017}, pages = {200--211}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006461202000211}, doi = {10.5220/0006461202000211}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/GiraudAB017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Berrima0GR17, author = {Mouhebeddine Berrima and Pascal Lafourcade and Matthieu Giraud and Narjes Ben Rajeb}, editor = {Pierangela Samarati and Mohammad S. Obaidat and Enrique Cabello}, title = {Formal Analyze of a Private Access Control Protocol to a Cloud Storage}, booktitle = {Proceedings of the 14th International Joint Conference on e-Business and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid, Spain, July 24-26, 2017}, pages = {495--500}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006461604950500}, doi = {10.5220/0006461604950500}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Berrima0GR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/BoureanuG0O17, author = {Ioana Boureanu and David G{\'{e}}rault and Pascal Lafourcade and Cristina Onete}, editor = {Guevara Noubir and Mauro Conti and Sneha Kumar Kasera}, title = {Breaking and fixing the {HB+DB} protocol}, booktitle = {Proceedings of the 10th {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2017, Boston, MA, USA, July 18-20, 2017}, pages = {241--246}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3098243.3098263}, doi = {10.1145/3098243.3098263}, timestamp = {Mon, 05 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/BoureanuG0O17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GiraudABL17, author = {Matthieu Giraud and Alexandre Anzala{-}Yamajako and Olivier Bernard and Pascal Lafourcade}, title = {Practical Passive Leakage-Abuse Attacks Against Symmetric Searchable Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {46}, year = {2017}, url = {http://eprint.iacr.org/2017/046}, timestamp = {Wed, 30 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GiraudABL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BultelL17, author = {Xavier Bultel and Pascal Lafourcade}, title = {Zero-Knowledge Proxy Re-Identification Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {112}, year = {2017}, url = {http://eprint.iacr.org/2017/112}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BultelL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GeraultLMS17, author = {David G{\'{e}}rault and Pascal Lafourcade and Marine Minier and Christine Solnon}, title = {Revisiting {AES} Related-Key Differential Attacks with Constraint Programming}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {139}, year = {2017}, url = {http://eprint.iacr.org/2017/139}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GeraultLMS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SunGLYTQH17, author = {Siwei Sun and David G{\'{e}}rault and Pascal Lafourcade and Qianqian Yang and Yosuke Todo and Kexin Qiao and Lei Hu}, title = {Analysis of AES, SKINNY, and Others with Constraint Programming}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {162}, year = {2017}, url = {http://eprint.iacr.org/2017/162}, timestamp = {Mon, 05 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SunGLYTQH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AvoineBGGLOR17, author = {Gildas Avoine and Xavier Bultel and S{\'{e}}bastien Gambs and David G{\'{e}}rault and Pascal Lafourcade and Cristina Onete and Jean{-}Marc Robert}, title = {A Terrorist-fraud Resistant and Extractor-free Anonymous Distance-bounding Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {297}, year = {2017}, url = {http://eprint.iacr.org/2017/297}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AvoineBGGLOR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoureanuG0O17, author = {Ioana Boureanu and David G{\'{e}}rault and Pascal Lafourcade and Cristina Onete}, title = {Breaking and Fixing the {HB+DB} protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {416}, year = {2017}, url = {http://eprint.iacr.org/2017/416}, timestamp = {Mon, 05 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoureanuG0O17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BultelL17a, author = {Xavier Bultel and Pascal Lafourcade}, title = {Unlinkable and Strongly Accountable Sanitizable Signatures from Verifiable Ring Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {605}, year = {2017}, url = {http://eprint.iacr.org/2017/605}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BultelL17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BultelDGGGL17, author = {Xavier Bultel and Manik Lal Das and Hardik Gajera and David G{\'{e}}rault and Matthieu Giraud and Pascal Lafourcade}, title = {Verifiable Private Polynomial Evaluation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {756}, year = {2017}, url = {http://eprint.iacr.org/2017/756}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BultelDGGGL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dc/BerardLMPTT16, author = {B{\'{e}}atrice B{\'{e}}rard and Pascal Lafourcade and Laure Millet and Maria Potop{-}Butucaru and Yann Thierry{-}Mieg and S{\'{e}}bastien Tixeuil}, title = {Formal verification of mobile robot protocols}, journal = {Distributed Comput.}, volume = {29}, number = {6}, pages = {459--487}, year = {2016}, url = {https://doi.org/10.1007/s00446-016-0271-1}, doi = {10.1007/S00446-016-0271-1}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dc/BerardLMPTT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jar/GagneLLS16, author = {Martin Gagn{\'{e}} and Pascal Lafourcade and Yassine Lakhnech and Reihaneh Safavi{-}Naini}, title = {Automated Proofs of Block Cipher Modes of Operation}, journal = {J. Autom. Reason.}, volume = {56}, number = {1}, pages = {49--94}, year = {2016}, url = {https://doi.org/10.1007/s10817-015-9341-5}, doi = {10.1007/S10817-015-9341-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jar/GagneLLS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mca/AbyGLM16, author = {Affoua Th{\'{e}}r{\`{e}}se Aby and Alexandre Guitton and Pascal Lafourcade and Michel Misson}, title = {History-based {MAC} Protocol for Low Duty-Cycle Wireless Sensor Networks: the {SLACK-MAC} Protocol}, journal = {{EAI} Endorsed Trans. Mob. Commun. Appl.}, volume = {2}, number = {7}, pages = {e2}, year = {2016}, url = {https://doi.org/10.4108/eai.20-6-2016.151516}, doi = {10.4108/EAI.20-6-2016.151516}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mca/AbyGLM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/DreierELL16, author = {Jannik Dreier and Cristian Ene and Pascal Lafourcade and Yassine Lakhnech}, title = {On the existence and decidability of unique decompositions of processes in the applied {\(\pi\)}-calculus}, journal = {Theor. Comput. Sci.}, volume = {612}, pages = {102--125}, year = {2016}, url = {https://doi.org/10.1016/j.tcs.2015.11.033}, doi = {10.1016/J.TCS.2015.11.033}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/DreierELL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/Bultel016, author = {Xavier Bultel and Pascal Lafourcade}, title = {k-Times Full Traceable Ring Signature}, booktitle = {11th International Conference on Availability, Reliability and Security, {ARES} 2016, Salzburg, Austria, August 31 - September 2, 2016}, pages = {39--48}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/ARES.2016.37}, doi = {10.1109/ARES.2016.37}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/Bultel016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fps/BlazyB016, author = {Olivier Blazy and Xavier Bultel and Pascal Lafourcade}, editor = {Fr{\'{e}}d{\'{e}}ric Cuppens and Lingyu Wang and Nora Cuppens{-}Boulahia and Nadia Tawbi and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {Anonymizable Ring Signature Without Pairing}, booktitle = {Foundations and Practice of Security - 9th International Symposium, {FPS} 2016, Qu{\'{e}}bec City, QC, Canada, October 24-25, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10128}, pages = {214--222}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-51966-1\_14}, doi = {10.1007/978-3-319-51966-1\_14}, timestamp = {Sun, 02 Oct 2022 16:01:32 +0200}, biburl = {https://dblp.org/rec/conf/fps/BlazyB016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fun/BultelDDL16, author = {Xavier Bultel and Jannik Dreier and Jean{-}Guillaume Dumas and Pascal Lafourcade}, editor = {Erik D. Demaine and Fabrizio Grandoni}, title = {Physical Zero-Knowledge Proofs for Akari, Takuzu, Kakuro and KenKen}, booktitle = {8th International Conference on Fun with Algorithms, {FUN} 2016, June 8-10, 2016, La Maddalena, Italy}, series = {LIPIcs}, volume = {49}, pages = {8:1--8:20}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2016}, url = {https://doi.org/10.4230/LIPIcs.FUN.2016.8}, doi = {10.4230/LIPICS.FUN.2016.8}, timestamp = {Tue, 11 Feb 2020 15:52:14 +0100}, biburl = {https://dblp.org/rec/conf/fun/BultelDDL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/GeraultL16, author = {David G{\'{e}}rault and Pascal Lafourcade}, editor = {Orr Dunkelman and Somitra Kumar Sanadhya}, title = {Related-Key Cryptanalysis of Midori}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2016 - 17th International Conference on Cryptology in India, Kolkata, India, December 11-14, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10095}, pages = {287--304}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-49890-4\_16}, doi = {10.1007/978-3-319-49890-4\_16}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/GeraultL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/safecomp/PuysP016, author = {Maxime Puys and Marie{-}Laure Potet and Pascal Lafourcade}, editor = {Amund Skavhaug and J{\'{e}}r{\'{e}}mie Guiochet and Friedemann Bitsch}, title = {Formal Analysis of Security Properties on the {OPC-UA} {SCADA} Protocol}, booktitle = {Computer Safety, Reliability, and Security - 35th International Conference, {SAFECOMP} 2016, Trondheim, Norway, September 21-23, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9922}, pages = {67--75}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45477-1\_6}, doi = {10.1007/978-3-319-45477-1\_6}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/safecomp/PuysP016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/BultelL16, author = {Xavier Bultel and Pascal Lafourcade}, editor = {Jaap{-}Henk Hoepman and Stefan Katzenbeisser}, title = {A Posteriori Openable Public Key Encryption}, booktitle = {{ICT} Systems Security and Privacy Protection - 31st {IFIP} {TC} 11 International Conference, {SEC} 2016, Ghent, Belgium, May 30 - June 1, 2016, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {471}, pages = {17--31}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-33630-5\_2}, doi = {10.1007/978-3-319-33630-5\_2}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/BultelL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Dumas0OP16, author = {Jean{-}Guillaume Dumas and Pascal Lafourcade and Jean{-}Baptiste Orfila and Maxime Puys}, editor = {Christian Callegari and Marten van Sinderen and Panagiotis G. Sarigiannidis and Pierangela Samarati and Enrique Cabello and Pascal Lorenz and Mohammad S. Obaidat}, title = {Private Multi-party Matrix Multiplication and Trust Computations}, booktitle = {Proceedings of the 13th International Joint Conference on e-Business and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon, Portugal, July 26-28, 2016}, pages = {61--72}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005957200610072}, doi = {10.5220/0005957200610072}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/Dumas0OP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/BlazyB016, author = {Olivier Blazy and Xavier Bultel and Pascal Lafourcade}, editor = {Christian Callegari and Marten van Sinderen and Panagiotis G. Sarigiannidis and Pierangela Samarati and Enrique Cabello and Pascal Lorenz and Mohammad S. Obaidat}, title = {Two Secure Anonymous Proxy-based Data Storages}, booktitle = {Proceedings of the 13th International Joint Conference on e-Business and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon, Portugal, July 26-28, 2016}, pages = {251--258}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005962402510258}, doi = {10.5220/0005962402510258}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/BlazyB016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/BultelGGLOR16, author = {Xavier Bultel and S{\'{e}}bastien Gambs and David G{\'{e}}rault and Pascal Lafourcade and Cristina Onete and Jean{-}Marc Robert}, editor = {Matthias Hollick and Panos Papadimitratos and William Enck}, title = {A Prover-Anonymous and Terrorist-Fraud Resistant Distance-Bounding Protocol}, booktitle = {Proceedings of the 9th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, {WISEC} 2016, Darmstadt, Germany, July 18-22, 2016}, pages = {121--133}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2939918.2939919}, doi = {10.1145/2939918.2939919}, timestamp = {Mon, 05 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/BultelGGLOR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/BultelDDL16, author = {Xavier Bultel and Jannik Dreier and Jean{-}Guillaume Dumas and Pascal Lafourcade}, title = {Physical Zero-Knowledge Proofs for Akari, Takuzu, Kakuro and KenKen}, journal = {CoRR}, volume = {abs/1606.01045}, year = {2016}, url = {http://arxiv.org/abs/1606.01045}, eprinttype = {arXiv}, eprint = {1606.01045}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/BultelDDL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/DumasLOP16, author = {Jean{-}Guillaume Dumas and Pascal Lafourcade and Jean{-}Baptiste Orfila and Maxime Puys}, title = {Private Multi-party Matrix Multiplication and Trust Computations}, journal = {CoRR}, volume = {abs/1607.03629}, year = {2016}, url = {http://arxiv.org/abs/1607.03629}, eprinttype = {arXiv}, eprint = {1607.03629}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/DumasLOP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/DreierDL15, author = {Jannik Dreier and Jean{-}Guillaume Dumas and Pascal Lafourcade}, title = {Brandt's fully private auction protocol revisited}, journal = {J. Comput. Secur.}, volume = {23}, number = {5}, pages = {587--610}, year = {2015}, url = {https://doi.org/10.3233/JCS-150535}, doi = {10.3233/JCS-150535}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/DreierDL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsan/MansourCL15, author = {Ismail Mansour and G{\'{e}}rard Chalhoub and Pascal Lafourcade}, title = {Key Management inWireless Sensor Networks}, journal = {J. Sens. Actuator Networks}, volume = {4}, number = {3}, pages = {251--273}, year = {2015}, url = {https://doi.org/10.3390/jsan4030251}, doi = {10.3390/JSAN4030251}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsan/MansourCL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/adhocnets/AbyGLM15, author = {Affoua Th{\'{e}}r{\`{e}}se Aby and Alexandre Guitton and Pascal Lafourcade and Michel Misson}, editor = {Nathalie Mitton and Melike Erol{-}Kantarci and Antoine Gallais and Symeon Papavassiliou}, title = {{SLACK-MAC:} Adaptive {MAC} Protocol for Low Duty-Cycle Wireless Sensor Networks}, booktitle = {Ad Hoc Networks - 7th International Conference, AdHocHets 2015, San Remo, Italy, September 1-2, 2015, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {155}, pages = {69--81}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-25067-0\_6}, doi = {10.1007/978-3-319-25067-0\_6}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/adhocnets/AbyGLM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fps/BrelurutGL15, author = {Agn{\`{e}}s Brelurut and David G{\'{e}}rault and Pascal Lafourcade}, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Evangelos Kranakis and Guillaume Bonfante}, title = {Survey of Distance Bounding Protocols and Threats}, booktitle = {Foundations and Practice of Security - 8th International Symposium, {FPS} 2015, Clermont-Ferrand, France, October 26-28, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9482}, pages = {29--49}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-30303-1\_3}, doi = {10.1007/978-3-319-30303-1\_3}, timestamp = {Mon, 05 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fps/BrelurutGL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fps/LafourcadeP15, author = {Pascal Lafourcade and Maxime Puys}, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Evangelos Kranakis and Guillaume Bonfante}, title = {Performance Evaluations of Cryptographic Protocols Verification Tools Dealing with Algebraic Properties}, booktitle = {Foundations and Practice of Security - 8th International Symposium, {FPS} 2015, Clermont-Ferrand, France, October 26-28, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9482}, pages = {137--155}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-30303-1\_9}, doi = {10.1007/978-3-319-30303-1\_9}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fps/LafourcadeP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icete/Dreier0015, author = {Jannik Dreier and Ali Kassem and Pascal Lafourcade}, editor = {Mohammad S. Obaidat and Pascal Lorenz}, title = {Automated Verification of e-Cash Protocols}, booktitle = {E-Business and Telecommunications - 12th International Joint Conference, {ICETE} 2015, Colmar, France, July 20-22, 2015, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {585}, pages = {223--244}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-30222-5\_11}, doi = {10.1007/978-3-319-30222-5\_11}, timestamp = {Tue, 21 Mar 2023 21:02:06 +0100}, biburl = {https://dblp.org/rec/conf/icete/Dreier0015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/DreierGKLL15, author = {Jannik Dreier and Rosario Giustolisi and Ali Kassem and Pascal Lafourcade and Gabriele Lenzini}, editor = {Javier L{\'{o}}pez and Yongdong Wu}, title = {A Framework for Analyzing Verifiability in Traditional and Electronic Exams}, booktitle = {Information Security Practice and Experience - 11th International Conference, {ISPEC} 2015, Beijing, China, May 5-8, 2015. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9065}, pages = {514--529}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-17533-1\_35}, doi = {10.1007/978-3-319-17533-1\_35}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/DreierGKLL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rv/KassemFL15, author = {Ali Kassem and Yli{\`{e}}s Falcone and Pascal Lafourcade}, editor = {Ezio Bartocci and Rupak Majumdar}, title = {Monitoring Electronic Exams}, booktitle = {Runtime Verification - 6th International Conference, {RV} 2015 Vienna, Austria, September 22-25, 2015. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9333}, pages = {118--135}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-23820-3\_8}, doi = {10.1007/978-3-319-23820-3\_8}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/rv/KassemFL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/DreierKL15, author = {Jannik Dreier and Ali Kassem and Pascal Lafourcade}, editor = {Mohammad S. Obaidat and Pascal Lorenz and Pierangela Samarati}, title = {Formal Analysis of E-Cash Protocols}, booktitle = {{SECRYPT} 2015 - Proceedings of the 12th International Conference on Security and Cryptography, Colmar, Alsace, France, 20-22 July, 2015}, pages = {65--75}, publisher = {SciTePress}, year = {2015}, url = {https://doi.org/10.5220/0005544500650075}, doi = {10.5220/0005544500650075}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/DreierKL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dam/GerbaudADL14, author = {Antoine Gerbaud and Karine Altisen and St{\'{e}}phane Devismes and Pascal Lafourcade}, title = {Comparison of mean hitting times for a degree-biased random walk}, journal = {Discret. Appl. Math.}, volume = {170}, pages = {104--109}, year = {2014}, url = {https://doi.org/10.1016/j.dam.2014.01.021}, doi = {10.1016/J.DAM.2014.01.021}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dam/GerbaudADL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsan/MansourCL14, author = {Ismail Mansour and G{\'{e}}rard Chalhoub and Pascal Lafourcade}, title = {Evaluation of Secure Multi-Hop Node Authentication and Key Establishment Mechanisms for Wireless Sensor Networks}, journal = {J. Sens. Actuator Networks}, volume = {3}, number = {3}, pages = {224--244}, year = {2014}, url = {https://doi.org/10.3390/jsan3030224}, doi = {10.3390/JSAN3030224}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsan/MansourCL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/adhoc-now/MansourRCLK14, author = {Ismail Mansour and Damian Rusinek and G{\'{e}}rard Chalhoub and Pascal Lafourcade and Bogdan Ksiezopolski}, editor = {Song Guo and Jaime Lloret and Pietro Manzoni and Stefan Ruehrup}, title = {Multihop Node Authentication Mechanisms for Wireless Sensor Networks}, booktitle = {Ad-hoc, Mobile, and Wireless Networks - 13th International Conference, {ADHOC-NOW} 2014, Benidorm, Spain, June 22-27, 2014 Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8487}, pages = {402--418}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-07425-2\_30}, doi = {10.1007/978-3-319-07425-2\_30}, timestamp = {Tue, 25 Aug 2020 09:34:49 +0200}, biburl = {https://dblp.org/rec/conf/adhoc-now/MansourRCLK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crss/MansourCL14, author = {Ismail Mansour and G{\'{e}}rard Chalhoub and Pascal Lafourcade}, editor = {Zbigniew Kotulski and Bogdan Ksiezopolski and Katarzyna Mazur}, title = {Secure Multihop Key Establishment Protocols for Wireless Sensor Networks}, booktitle = {Cryptography and Security Systems - Third International Conference, {CSS} 2014, Lublin, Poland, September 22-24, 2014. Proceedings}, series = {Communications in Computer and Information Science}, volume = {448}, pages = {166--177}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44893-9\_15}, doi = {10.1007/978-3-662-44893-9\_15}, timestamp = {Mon, 16 Sep 2019 15:28:47 +0200}, biburl = {https://dblp.org/rec/conf/crss/MansourCL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fps/KassemLL14, author = {Ali Kassem and Pascal Lafourcade and Yassine Lakhnech}, editor = {Fr{\'{e}}d{\'{e}}ric Cuppens and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Nur Zincir{-}Heywood and Philip W. L. Fong}, title = {Formal Verification of e-Reputation Protocols}, booktitle = {Foundations and Practice of Security - 7th International Symposium, {FPS} 2014, Montreal, QC, Canada, November 3-5, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8930}, pages = {247--261}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-17040-4\_16}, doi = {10.1007/978-3-319-17040-4\_16}, timestamp = {Fri, 08 Dec 2023 07:53:07 +0100}, biburl = {https://dblp.org/rec/conf/fps/KassemLL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fps/JametL14, author = {Rapha{\"{e}}l Jamet and Pascal Lafourcade}, editor = {Fr{\'{e}}d{\'{e}}ric Cuppens and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Nur Zincir{-}Heywood and Philip W. L. Fong}, title = {(In)Corruptibility of Routing Protocols}, booktitle = {Foundations and Practice of Security - 7th International Symposium, {FPS} 2014, Montreal, QC, Canada, November 3-5, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8930}, pages = {262--276}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-17040-4\_17}, doi = {10.1007/978-3-319-17040-4\_17}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fps/JametL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fun/DreierJL14, author = {Jannik Dreier and Hugo Jonker and Pascal Lafourcade}, editor = {Alfredo Ferro and Fabrizio Luccio and Peter Widmayer}, title = {Secure Auctions without Cryptography}, booktitle = {Fun with Algorithms - 7th International Conference, {FUN} 2014, Lipari Island, Sicily, Italy, July 1-3, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8496}, pages = {158--170}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-07890-8\_14}, doi = {10.1007/978-3-319-07890-8\_14}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fun/DreierJL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icete/DreierG0LLR14, author = {Jannik Dreier and Rosario Giustolisi and Ali Kassem and Pascal Lafourcade and Gabriele Lenzini and Peter Y. A. Ryan}, editor = {Mohammad S. Obaidat and Andreas Holzinger and Joaquim Filipe}, title = {Formal Security Analysis of Traditional and Electronic Exams}, booktitle = {E-Business and Telecommunications - 11th International Joint Conference, {ICETE} 2014, Vienna, Austria, August 28-30, 2014, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {554}, pages = {294--318}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-25915-4\_16}, doi = {10.1007/978-3-319-25915-4\_16}, timestamp = {Tue, 16 Aug 2022 23:04:29 +0200}, biburl = {https://dblp.org/rec/conf/icete/DreierG0LLR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lcn/KumarLL14, author = {Amrit Kumar and Pascal Lafourcade and C{\'{e}}dric Lauradoux}, title = {Performances of cryptographic accumulators}, booktitle = {{IEEE} 39th Conference on Local Computer Networks, {LCN} 2014, Edmonton, AB, Canada, 8-11 September, 2014}, pages = {366--369}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/LCN.2014.6925793}, doi = {10.1109/LCN.2014.6925793}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/lcn/KumarLL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lcn/MansourCLD14, author = {Ismail Mansour and G{\'{e}}rard Chalhoub and Pascal Lafourcade and Fran{\c{c}}ois Delobel}, title = {Secure key renewal and revocation for Wireless Sensor Networks}, booktitle = {{IEEE} 39th Conference on Local Computer Networks, {LCN} 2014, Edmonton, AB, Canada, 8-11 September, 2014}, pages = {382--385}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/LCN.2014.6925797}, doi = {10.1109/LCN.2014.6925797}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/lcn/MansourCLD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/DreierGKLLR14, author = {Jannik Dreier and Rosario Giustolisi and Ali Kassem and Pascal Lafourcade and Gabriele Lenzini and Peter Y. A. Ryan}, editor = {Mohammad S. Obaidat and Andreas Holzinger and Pierangela Samarati}, title = {Formal Analysis of Electronic Exams}, booktitle = {{SECRYPT} 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28-30 August, 2014}, pages = {101--112}, publisher = {SciTePress}, year = {2014}, url = {https://doi.org/10.5220/0005050901010112}, doi = {10.5220/0005050901010112}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/DreierGKLLR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/DreierDL13, author = {Jannik Dreier and Jean{-}Guillaume Dumas and Pascal Lafourcade}, editor = {Amr M. Youssef and Abderrahmane Nitaj and Aboul Ella Hassanien}, title = {Brandt's Fully Private Auction Protocol Revisited}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2013, 6th International Conference on Cryptology in Africa, Cairo, Egypt, June 22-24, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7918}, pages = {88--106}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38553-7\_5}, doi = {10.1007/978-3-642-38553-7\_5}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/DreierDL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DreierJL13, author = {Jannik Dreier and Hugo Jonker and Pascal Lafourcade}, editor = {Kefei Chen and Qi Xie and Weidong Qiu and Ninghui Li and Wen{-}Guey Tzeng}, title = {Defining verifiability in e-auction protocols}, booktitle = {8th {ACM} Symposium on Information, Computer and Communications Security, {ASIA} {CCS} '13, Hangzhou, China - May 08 - 10, 2013}, pages = {547--552}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2484313.2484387}, doi = {10.1145/2484313.2484387}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DreierJL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dcoss/AltisenDJL13, author = {Karine Altisen and St{\'{e}}phane Devismes and Rapha{\"{e}}l Jamet and Pascal Lafourcade}, title = {{SR3:} Secure Resilient Reputation-based Routing}, booktitle = {{IEEE} International Conference on Distributed Computing in Sensor Systems, {DCOSS} 2013, Cambridge, MA, USA, May 20-23, 2013}, pages = {258--265}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/DCOSS.2013.33}, doi = {10.1109/DCOSS.2013.33}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dcoss/AltisenDJL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/GagneLL13, author = {Martin Gagn{\'{e}} and Pascal Lafourcade and Yassine Lakhnech}, editor = {Jason Crampton and Sushil Jajodia and Keith Mayes}, title = {Automated Security Proofs for Almost-Universal Hash for {MAC} Verification}, booktitle = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8134}, pages = {291--308}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40203-6\_17}, doi = {10.1007/978-3-642-40203-6\_17}, timestamp = {Wed, 25 Sep 2019 18:03:15 +0200}, biburl = {https://dblp.org/rec/conf/esorics/GagneLL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fossacs/DreierELL13, author = {Jannik Dreier and Cristian Ene and Pascal Lafourcade and Yassine Lakhnech}, editor = {Frank Pfenning}, title = {On Unique Decomposition of Processes in the Applied {\(\pi\)}-Calculus}, booktitle = {Foundations of Software Science and Computation Structures - 16th International Conference, {FOSSACS} 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2013, Rome, Italy, March 16-24, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7794}, pages = {50--64}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-37075-5\_4}, doi = {10.1007/978-3-642-37075-5\_4}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fossacs/DreierELL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fps/KassemLL13, author = {Ali Kassem and Pascal Lafourcade and Yassine Lakhnech}, editor = {Jean{-}Luc Danger and Mourad Debbabi and Jean{-}Yves Marion and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Nur Zincir{-}Heywood}, title = {A More Realistic Model for Verifying Route Validity in Ad-Hoc Networks}, booktitle = {Foundations and Practice of Security - 6th International Symposium, {FPS} 2013, La Rochelle, France, October 21-22, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8352}, pages = {306--322}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-05302-8\_19}, doi = {10.1007/978-3-319-05302-8\_19}, timestamp = {Fri, 08 Dec 2023 07:53:07 +0100}, biburl = {https://dblp.org/rec/conf/fps/KassemLL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fps/JametL13, author = {Rapha{\"{e}}l Jamet and Pascal Lafourcade}, editor = {Jean{-}Luc Danger and Mourad Debbabi and Jean{-}Yves Marion and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Nur Zincir{-}Heywood}, title = {Discovering Flaws in {IDS} Through Analysis of Their Inputs}, booktitle = {Foundations and Practice of Security - 6th International Symposium, {FPS} 2013, La Rochelle, France, October 21-22, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8352}, pages = {391--407}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-05302-8\_24}, doi = {10.1007/978-3-319-05302-8\_24}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fps/JametL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/post/DreierLL13, author = {Jannik Dreier and Pascal Lafourcade and Yassine Lakhnech}, editor = {David A. Basin and John C. Mitchell}, title = {Formal Verification of e-Auction Protocols}, booktitle = {Principles of Security and Trust - Second International Conference, {POST} 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2013, Rome, Italy, March 16-24, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7796}, pages = {247--266}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36830-1\_13}, doi = {10.1007/978-3-642-36830-1\_13}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/post/DreierLL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GagneLL13, author = {Martin Gagn{\'{e}} and Pascal Lafourcade and Yassine Lakhnech}, title = {Automated Security Proofs for Almost-Universal Hash for {MAC} verification}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {407}, year = {2013}, url = {http://eprint.iacr.org/2013/407}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GagneLL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/hal/Lafourcade12, author = {Pascal Lafourcade}, title = {Computer Aided Security for Cryptographic Primitives, Voting protocols, and Wireless Sensor Networks. (S{\'{e}}curit{\'{e}} assist{\'{e}}e par ordinateur pour les primitives cryptgraphiques, les protocoles de vote {\'{e}}lectronique et les r{\'{e}}seaux de capteurs sans fil)}, year = {2012}, url = {https://tel.archives-ouvertes.fr/tel-00807568}, timestamp = {Sat, 30 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/hal/Lafourcade12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/DreierLL12, author = {Jannik Dreier and Pascal Lafourcade and Yassine Lakhnech}, editor = {Sara Foresti and Moti Yung and Fabio Martinelli}, title = {Defining Privacy for Weighted Votes, Single and Multi-voter Coercion}, booktitle = {Computer Security - {ESORICS} 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7459}, pages = {451--468}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33167-1\_26}, doi = {10.1007/978-3-642-33167-1\_26}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/DreierLL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/DreierLL12, author = {Jannik Dreier and Pascal Lafourcade and Yassine Lakhnech}, title = {A formal taxonomy of privacy in voting protocols}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2012, Ottawa, ON, Canada, June 10-15, 2012}, pages = {6710--6715}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/ICC.2012.6364938}, doi = {10.1109/ICC.2012.6364938}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/icc/DreierLL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sirocco/AltisenDGL12, author = {Karine Altisen and St{\'{e}}phane Devismes and Antoine Gerbaud and Pascal Lafourcade}, editor = {Guy Even and Magn{\'{u}}s M. Halld{\'{o}}rsson}, title = {Analysis of Random Walks Using Tabu Lists}, booktitle = {Structural Information and Communication Complexity - 19th International Colloquium, {SIROCCO} 2012, Reykjavik, Iceland, June 30-July 2, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7355}, pages = {254--266}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31104-8\_22}, doi = {10.1007/978-3-642-31104-8\_22}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sirocco/AltisenDGL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fps/2011, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Pascal Lafourcade}, title = {Foundations and Practice of Security - 4th Canada-France {MITACS} Workshop, {FPS} 2011, Paris, France, May 12-13, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6888}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-27901-0}, doi = {10.1007/978-3-642-27901-0}, isbn = {978-3-642-27900-3}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fps/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1210-6780, author = {Jannik Dreier and Jean{-}Guillaume Dumas and Pascal Lafourcade}, title = {Attacking Privacy in a Fully Private Auction Protocol}, journal = {CoRR}, volume = {abs/1210.6780}, year = {2012}, url = {http://arxiv.org/abs/1210.6780}, eprinttype = {arXiv}, eprint = {1210.6780}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1210-6780.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jar/CourantDELL11, author = {Judica{\"{e}}l Courant and Marion Daubignard and Cristian Ene and Pascal Lafourcade and Yassine Lakhnech}, title = {Automated Proofs for Asymmetric Encryption}, journal = {J. Autom. Reason.}, volume = {46}, number = {3-4}, pages = {261--291}, year = {2011}, url = {https://doi.org/10.1007/s10817-010-9186-x}, doi = {10.1007/S10817-010-9186-X}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jar/CourantDELL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/FousseLA11, author = {Laurent Fousse and Pascal Lafourcade and Mohamed Alnuaimi}, editor = {Abderrahmane Nitaj and David Pointcheval}, title = {Benaloh's Dense Probabilistic Encryption Revisited}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2011 - 4th International Conference on Cryptology in Africa, Dakar, Senegal, July 5-7, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6737}, pages = {348--362}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21969-6\_22}, doi = {10.1007/978-3-642-21969-6\_22}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/FousseLA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fps/GagneLLS11, author = {Martin Gagn{\'{e}} and Pascal Lafourcade and Yassine Lakhnech and Reihaneh Safavi{-}Naini}, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Pascal Lafourcade}, title = {Automated Verification of Block Cipher Modes of Operation, an Improved Method}, booktitle = {Foundations and Practice of Security - 4th Canada-France {MITACS} Workshop, {FPS} 2011, Paris, France, May 12-13, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6888}, pages = {23--31}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-27901-0\_3}, doi = {10.1007/978-3-642-27901-0\_3}, timestamp = {Fri, 27 Dec 2019 21:23:06 +0100}, biburl = {https://dblp.org/rec/conf/fps/GagneLLS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fps/DreierLL11, author = {Jannik Dreier and Pascal Lafourcade and Yassine Lakhnech}, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Pascal Lafourcade}, title = {Vote-Independence: {A} Powerful Privacy Notion for Voting Protocols}, booktitle = {Foundations and Practice of Security - 4th Canada-France {MITACS} Workshop, {FPS} 2011, Paris, France, May 12-13, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6888}, pages = {164--180}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-27901-0\_13}, doi = {10.1007/978-3-642-27901-0\_13}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fps/DreierLL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/birthday/CourantDELL10, author = {Judica{\"{e}}l Courant and Marion Daubignard and Cristian Ene and Pascal Lafourcade and Yassine Lakhnech}, editor = {Dennis Dams and Ulrich Hannemann and Martin Steffen}, title = {Automated Proofs for Asymmetric Encryption}, booktitle = {Concurrency, Compositionality, and Correctness, Essays in Honor of Willem-Paul de Roever}, series = {Lecture Notes in Computer Science}, volume = {5930}, pages = {300--321}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-11512-7\_19}, doi = {10.1007/978-3-642-11512-7\_19}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/birthday/CourantDELL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iih-msp/TharaudWESML10, author = {J{\'{e}}r{\'{e}}mie Tharaud and Sven Wohlgemuth and Isao Echizen and Noboru Sonehara and G{\"{u}}nter M{\"{u}}ller and Pascal Lafourcade}, editor = {Isao Echizen and Jeng{-}Shyang Pan and Dieter W. Fellner and Alexander Nouak and Arjan Kuijper and Lakhmi C. Jain}, title = {Privacy by Data Provenance with Digital Watermarking - {A} Proof-of-Concept Implementation for Medical Services with Electronic Health Records}, booktitle = {Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing {(IIH-MSP} 2010), Darmstadt, Germany, 15-17 October, 2010, Proceedings}, pages = {510--513}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IIHMSP.2010.130}, doi = {10.1109/IIHMSP.2010.130}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iih-msp/TharaudWESML10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1003-5385, author = {Sreekanth Malladi and Pascal Lafourcade}, title = {How to prevent type-flaw attacks on security protocols under algebraic properties}, journal = {CoRR}, volume = {abs/1003.5385}, year = {2010}, url = {http://arxiv.org/abs/1003.5385}, eprinttype = {arXiv}, eprint = {1003.5385}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1003-5385.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1008-2991, author = {Laurent Fousse and Pascal Lafourcade and Mohamed Alnuaimi}, title = {Benaloh's Dense Probabilistic Encryption Revisited}, journal = {CoRR}, volume = {abs/1008.2991}, year = {2010}, url = {http://arxiv.org/abs/1008.2991}, eprinttype = {arXiv}, eprint = {1008.2991}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1008-2991.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asian/GagneLLS09, author = {Martin Gagn{\'{e}} and Pascal Lafourcade and Yassine Lakhnech and Reihaneh Safavi{-}Naini}, editor = {Anupam Datta}, title = {Automated Security Proof for Symmetric Encryption Modes}, booktitle = {Advances in Computer Science - {ASIAN} 2009. Information Security and Privacy, 13th Asian Computing Science Conference, Seoul, Korea, December 14-16, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5913}, pages = {39--53}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10622-4\_4}, doi = {10.1007/978-3-642-10622-4\_4}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asian/GagneLLS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/LafourcadeTV09, author = {Pascal Lafourcade and Vanessa Terrade and Sylvain Vigier}, editor = {Pierpaolo Degano and Joshua D. Guttman}, title = {Comparison of Cryptographic Verification Tools Dealing with Algebraic Properties}, booktitle = {Formal Aspects in Security and Trust, 6th International Workshop, {FAST} 2009, Eindhoven, The Netherlands, November 5-6, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5983}, pages = {173--185}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-12459-4\_13}, doi = {10.1007/978-3-642-12459-4\_13}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/LafourcadeTV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/psec/CremersLN09, author = {Cas J. F. Cremers and Pascal Lafourcade and Philippe Nadeau}, editor = {V{\'{e}}ronique Cortier and Claude Kirchner and Mitsuhiro Okada and Hideki Sakurada}, title = {Comparing State Spaces in Automatic Security Protocol Analysis}, booktitle = {Formal to Practical Security - Papers Issued from the 2005-2008 French-Japanese Collaboration}, series = {Lecture Notes in Computer Science}, volume = {5458}, pages = {70--94}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02002-5\_5}, doi = {10.1007/978-3-642-02002-5\_5}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/psec/CremersLN09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cm/PapadimitratosP08, author = {Panos Papadimitratos and Marcin Poturalski and Patrick Schaller and Pascal Lafourcade and David A. Basin and Srdjan Capkun and Jean{-}Pierre Hubaux}, title = {Secure neighborhood discovery: a fundamental element for mobile ad hoc networking}, journal = {{IEEE} Commun. Mag.}, volume = {46}, number = {2}, pages = {132--139}, year = {2008}, url = {https://doi.org/10.1109/MCOM.2008.4473095}, doi = {10.1109/MCOM.2008.4473095}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cm/PapadimitratosP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iandc/DelauneLLT08, author = {St{\'{e}}phanie Delaune and Pascal Lafourcade and Denis Lugiez and Ralf Treinen}, title = {Symbolic protocol analysis for monoidal equational theories}, journal = {Inf. Comput.}, volume = {206}, number = {2-4}, pages = {312--351}, year = {2008}, url = {https://doi.org/10.1016/j.ic.2007.07.005}, doi = {10.1016/J.IC.2007.07.005}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iandc/DelauneLLT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CourantDELL08, author = {Judica{\"{e}}l Courant and Marion Daubignard and Cristian Ene and Pascal Lafourcade and Yassine Lakhnech}, editor = {Peng Ning and Paul F. Syverson and Somesh Jha}, title = {Towards automated proofs for asymmetric encryption schemes in the random oracle model}, booktitle = {Proceedings of the 2008 {ACM} Conference on Computer and Communications Security, {CCS} 2008, Alexandria, Virginia, USA, October 27-31, 2008}, pages = {371--380}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1455770.1455817}, doi = {10.1145/1455770.1455817}, timestamp = {Tue, 10 Nov 2020 19:59:27 +0100}, biburl = {https://dblp.org/rec/conf/ccs/CourantDELL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iandc/LafourcadeLT07, author = {Pascal Lafourcade and Denis Lugiez and Ralf Treinen}, title = {Intruder deduction for the equational theory of Abelian groups with distributive encryption}, journal = {Inf. Comput.}, volume = {205}, number = {4}, pages = {581--623}, year = {2007}, url = {https://doi.org/10.1016/j.ic.2006.10.008}, doi = {10.1016/J.IC.2006.10.008}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iandc/LafourcadeLT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/umcs/KsiezopolskiL07, author = {Bogdan Ksiezopolski and Pascal Lafourcade}, title = {Attack and revison of an electronic auction protocol using {OFMC}}, journal = {Ann. {UMCS} Informatica}, volume = {6}, number = {1}, pages = {171--183}, year = {2007}, url = {https://journals.umcs.pl/ai/article/view/3176}, timestamp = {Wed, 03 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/umcs/KsiezopolskiL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/hal/Lafourcade06, author = {Pascal Lafourcade}, title = {V{\'{e}}rification de protocoles cryptographiques en pr{\'{e}}sence de th{\'{e}}ories {\'{e}}quationnelles. (Verification of cryptographic protocols in presence of equationnal theories)}, school = {{\'{E}}cole normale sup{\'{e}}rieure de Cachan, France}, year = {2006}, url = {https://tel.archives-ouvertes.fr/tel-00133494}, timestamp = {Tue, 21 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/hal/Lafourcade06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/CortierDL06, author = {V{\'{e}}ronique Cortier and St{\'{e}}phanie Delaune and Pascal Lafourcade}, title = {A survey of algebraic properties used in cryptographic protocols}, journal = {J. Comput. Secur.}, volume = {14}, number = {1}, pages = {1--43}, year = {2006}, url = {https://doi.org/10.3233/jcs-2006-14101}, doi = {10.3233/JCS-2006-14101}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/CortierDL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/DelauneLLT06, author = {St{\'{e}}phanie Delaune and Pascal Lafourcade and Denis Lugiez and Ralf Treinen}, editor = {Michele Bugliesi and Bart Preneel and Vladimiro Sassone and Ingo Wegener}, title = {Symbolic Protocol Analysis in Presence of a Homomorphism Operator and \emph{Exclusive Or}}, booktitle = {Automata, Languages and Programming, 33rd International Colloquium, {ICALP} 2006, Venice, Italy, July 10-14, 2006, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {4052}, pages = {132--143}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11787006\_12}, doi = {10.1007/11787006\_12}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icalp/DelauneLLT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/Lafourcade07, author = {Pascal Lafourcade}, editor = {Maribel Fern{\'{a}}ndez and Claude Kirchner}, title = {Intruder Deduction for the Equational Theory of Exclusive-or with Commutative and Distributive Encryption}, booktitle = {Proceedings of the First International Workshop on Security and Rewriting Techniques, SecReT@ICALP 2006, Venice, Italy, July 15, 2006}, series = {Electronic Notes in Theoretical Computer Science}, volume = {171}, number = {4}, pages = {37--57}, publisher = {Elsevier}, year = {2006}, url = {https://doi.org/10.1016/j.entcs.2007.02.054}, doi = {10.1016/J.ENTCS.2007.02.054}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/entcs/Lafourcade07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rta/LafourcadeLT05, author = {Pascal Lafourcade and Denis Lugiez and Ralf Treinen}, editor = {J{\"{u}}rgen Giesl}, title = {Intruder Deduction for \emph{AC}-Like Equational Theories with Homomorphisms}, booktitle = {Term Rewriting and Applications, 16th International Conference, {RTA} 2005, Nara, Japan, April 19-21, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3467}, pages = {308--322}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-32033-3\_23}, doi = {10.1007/978-3-540-32033-3\_23}, timestamp = {Wed, 25 Sep 2019 18:23:35 +0200}, biburl = {https://dblp.org/rec/conf/rta/LafourcadeLT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.