A survey of algebraic properties used in cryptographic protocols V Cortier, S Delaune, P Lafourcade Journal of Computer Security 14 (1), 1-43, 2006 | 239 | 2006 |
Secure neighborhood discovery: a fundamental element for mobile ad hoc networking P Papadimitratos, M Poturalski, P Schaller, P Lafourcade, D Basin, ... IEEE Communications Magazine 46 (2), 132-139, 2008 | 164 | 2008 |
Comparing state spaces in automatic security protocol analysis CJF Cremers, P Lafourcade, P Nadeau Formal to Practical Security: Papers Issued from the 2005-2008 French …, 2009 | 118 | 2009 |
About blockchain interoperability P Lafourcade, M Lombard-Platet Information Processing Letters 161, 105976, 2020 | 108 | 2020 |
Analysis of AES, SKINNY, and others with constraint programming S Sun, D Gerault, P Lafourcade, Q Yang, Y Todo, K Qiao, L Hu IACR transactions on symmetric cryptology 2017 (1), 281--306, 2017 | 95 | 2017 |
Intruder Deduction for AC-Like Equational Theories with Homomorphisms P Lafourcade, D Lugiez, R Treinen Term Rewriting and Applications: 16th International Conference, RTA 2005 …, 2005 | 89 | 2005 |
Verify-your-vote: A verifiable blockchain-based online voting protocol M Chaieb, S Yousfi, P Lafourcade, R Robbana Information Systems: 15th European, Mediterranean, and Middle Eastern …, 2019 | 64 | 2019 |
Physical zero-knowledge proof for Makaro X Bultel, J Dreier, JG Dumas, P Lafourcade, D Miyahara, T Mizuki, ... Stabilization, Safety, and Security of Distributed Systems: 20th …, 2018 | 59 | 2018 |
Towards automated proofs for asymmetric encryption schemes in the random oracle model J Courant, M Daubignard, C Ene, P Lafourcade, Y Lakhnech Proceedings of the 15th ACM conference on Computer and Communications …, 2008 | 57 | 2008 |
Revisiting AES related-key differential attacks with constraint programming D Gérault, P Lafourcade, M Minier, C Solnon Information Processing Letters 139, 24-29, 2018 | 55 | 2018 |
Physical zero-knowledge proofs for Akari, Takuzu, Kakuro and KenKen X Bultel, J Dreier, JG Dumas, P Lafourcade arXiv preprint arXiv:1606.01045, 2016 | 55 | 2016 |
Benaloh’s dense probabilistic encryption revisited L Fousse, P Lafourcade, M Alnuaimi International Conference on Cryptology in Africa, 348-362, 2011 | 50 | 2011 |
Card-based ZKP protocols for Takuzu and Juosan D Miyahara, L Robert, P Lafourcade, S Takeshige, T Mizuki, K Shinagawa, ... 10th International Conference on Fun with Algorithms (FUN 2021), 2020 | 48 | 2020 |
Survey on electronic voting schemes L Fouard, M Duclos, P Lafourcade supported by the ANR project AVOTÉ, 2007 | 48 | 2007 |
Interactive physical zero-knowledge proof for Norinori JG Dumas, P Lafourcade, D Miyahara, T Mizuki, T Sasaki, H Sone Computing and Combinatorics: 25th International Conference, COCOON 2019, Xi …, 2019 | 47 | 2019 |
A terrorist-fraud resistant and extractor-free anonymous distance-bounding protocol G Avoine, X Bultel, S Gambs, D Gérault, P Lafourcade, C Onete, ... Proceedings of the 2017 ACM on Asia conference on computer and …, 2017 | 46 | 2017 |
Comparison of cryptographic verification tools dealing with algebraic properties P Lafourcade, V Terrade, S Vigier International Workshop on Formal Aspects in Security and Trust, 173-185, 2009 | 44 | 2009 |
Formal verification of mobile robot protocols B Bérard, P Lafourcade, L Millet, M Potop-Butucaru, Y Thierry-Mieg, ... Distributed Computing 29, 459-487, 2016 | 41 | 2016 |
Formal verification of e-auction protocols J Dreier, P Lafourcade, Y Lakhnech International Conference on Principles of Security and Trust, 247-266, 2013 | 41 | 2013 |
A formal taxonomy of privacy in voting protocols J Dreier, P Lafourcade, Y Lakhnech 2012 IEEE International Conference on Communications (ICC), 6710-6715, 2012 | 41 | 2012 |