关注
Pascal Lafourcade
Pascal Lafourcade
Université Clermont Auvergne
在 uca.fr 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
A survey of algebraic properties used in cryptographic protocols
V Cortier, S Delaune, P Lafourcade
Journal of Computer Security 14 (1), 1-43, 2006
2392006
Secure neighborhood discovery: a fundamental element for mobile ad hoc networking
P Papadimitratos, M Poturalski, P Schaller, P Lafourcade, D Basin, ...
IEEE Communications Magazine 46 (2), 132-139, 2008
1642008
Comparing state spaces in automatic security protocol analysis
CJF Cremers, P Lafourcade, P Nadeau
Formal to Practical Security: Papers Issued from the 2005-2008 French …, 2009
1182009
About blockchain interoperability
P Lafourcade, M Lombard-Platet
Information Processing Letters 161, 105976, 2020
1082020
Analysis of AES, SKINNY, and others with constraint programming
S Sun, D Gerault, P Lafourcade, Q Yang, Y Todo, K Qiao, L Hu
IACR transactions on symmetric cryptology 2017 (1), 281--306, 2017
952017
Intruder Deduction for AC-Like Equational Theories with Homomorphisms
P Lafourcade, D Lugiez, R Treinen
Term Rewriting and Applications: 16th International Conference, RTA 2005 …, 2005
892005
Verify-your-vote: A verifiable blockchain-based online voting protocol
M Chaieb, S Yousfi, P Lafourcade, R Robbana
Information Systems: 15th European, Mediterranean, and Middle Eastern …, 2019
642019
Physical zero-knowledge proof for Makaro
X Bultel, J Dreier, JG Dumas, P Lafourcade, D Miyahara, T Mizuki, ...
Stabilization, Safety, and Security of Distributed Systems: 20th …, 2018
592018
Towards automated proofs for asymmetric encryption schemes in the random oracle model
J Courant, M Daubignard, C Ene, P Lafourcade, Y Lakhnech
Proceedings of the 15th ACM conference on Computer and Communications …, 2008
572008
Revisiting AES related-key differential attacks with constraint programming
D Gérault, P Lafourcade, M Minier, C Solnon
Information Processing Letters 139, 24-29, 2018
552018
Physical zero-knowledge proofs for Akari, Takuzu, Kakuro and KenKen
X Bultel, J Dreier, JG Dumas, P Lafourcade
arXiv preprint arXiv:1606.01045, 2016
552016
Benaloh’s dense probabilistic encryption revisited
L Fousse, P Lafourcade, M Alnuaimi
International Conference on Cryptology in Africa, 348-362, 2011
502011
Card-based ZKP protocols for Takuzu and Juosan
D Miyahara, L Robert, P Lafourcade, S Takeshige, T Mizuki, K Shinagawa, ...
10th International Conference on Fun with Algorithms (FUN 2021), 2020
482020
Survey on electronic voting schemes
L Fouard, M Duclos, P Lafourcade
supported by the ANR project AVOTÉ, 2007
482007
Interactive physical zero-knowledge proof for Norinori
JG Dumas, P Lafourcade, D Miyahara, T Mizuki, T Sasaki, H Sone
Computing and Combinatorics: 25th International Conference, COCOON 2019, Xi …, 2019
472019
A terrorist-fraud resistant and extractor-free anonymous distance-bounding protocol
G Avoine, X Bultel, S Gambs, D Gérault, P Lafourcade, C Onete, ...
Proceedings of the 2017 ACM on Asia conference on computer and …, 2017
462017
Comparison of cryptographic verification tools dealing with algebraic properties
P Lafourcade, V Terrade, S Vigier
International Workshop on Formal Aspects in Security and Trust, 173-185, 2009
442009
Formal verification of mobile robot protocols
B Bérard, P Lafourcade, L Millet, M Potop-Butucaru, Y Thierry-Mieg, ...
Distributed Computing 29, 459-487, 2016
412016
Formal verification of e-auction protocols
J Dreier, P Lafourcade, Y Lakhnech
International Conference on Principles of Security and Trust, 247-266, 2013
412013
A formal taxonomy of privacy in voting protocols
J Dreier, P Lafourcade, Y Lakhnech
2012 IEEE International Conference on Communications (ICC), 6710-6715, 2012
412012
系统目前无法执行此操作,请稍后再试。
文章 1–20