Follow
Pascal Lafourcade
Pascal Lafourcade
Université Clermont Auvergne
Verified email at uca.fr - Homepage
Title
Cited by
Cited by
Year
A survey of algebraic properties used in cryptographic protocols
V Cortier, S Delaune, P Lafourcade
Journal of Computer Security 14 (1), 1-43, 2006
2402006
Secure neighborhood discovery: a fundamental element for mobile ad hoc networking
P Papadimitratos, M Poturalski, P Schaller, P Lafourcade, D Basin, ...
IEEE Communications Magazine 46 (2), 132-139, 2008
1652008
About blockchain interoperability
P Lafourcade, M Lombard-Platet
Information Processing Letters 161, 105976, 2020
1252020
Comparing state spaces in automatic security protocol analysis
CJF Cremers, P Lafourcade, P Nadeau
Formal to Practical Security: Papers Issued from the 2005-2008 French …, 2009
1212009
Analysis of AES, SKINNY, and others with constraint programming
S Sun, D Gerault, P Lafourcade, Q Yang, Y Todo, K Qiao, L Hu
IACR transactions on symmetric cryptology 2017 (1), 281--306, 2017
1002017
Intruder Deduction for AC-Like Equational Theories with Homomorphisms
P Lafourcade, D Lugiez, R Treinen
Term Rewriting and Applications: 16th International Conference, RTA 2005 …, 2005
902005
Verify-your-vote: A verifiable blockchain-based online voting protocol
M Chaieb, S Yousfi, P Lafourcade, R Robbana
Information Systems: 15th European, Mediterranean, and Middle Eastern …, 2019
682019
Physical zero-knowledge proof for Makaro
X Bultel, J Dreier, JG Dumas, P Lafourcade, D Miyahara, T Mizuki, ...
Stabilization, Safety, and Security of Distributed Systems: 20th …, 2018
652018
Physical zero-knowledge proofs for Akari, Takuzu, Kakuro and KenKen
X Bultel, J Dreier, JG Dumas, P Lafourcade
arXiv preprint arXiv:1606.01045, 2016
602016
Towards automated proofs for asymmetric encryption schemes in the random oracle model
J Courant, M Daubignard, C Ene, P Lafourcade, Y Lakhnech
Proceedings of the 15th ACM conference on Computer and Communications …, 2008
582008
Revisiting AES related-key differential attacks with constraint programming
D Gérault, P Lafourcade, M Minier, C Solnon
Information Processing Letters 139, 24-29, 2018
572018
Card-based ZKP protocols for Takuzu and Juosan
D Miyahara, L Robert, P Lafourcade, S Takeshige, T Mizuki, K Shinagawa, ...
10th International Conference on Fun with Algorithms (FUN 2021), 2020
522020
Benaloh’s dense probabilistic encryption revisited
L Fousse, P Lafourcade, M Alnuaimi
International Conference on Cryptology in Africa, 348-362, 2011
512011
Interactive physical zero-knowledge proof for Norinori
JG Dumas, P Lafourcade, D Miyahara, T Mizuki, T Sasaki, H Sone
Computing and Combinatorics: 25th International Conference, COCOON 2019, Xi …, 2019
502019
Survey on electronic voting schemes
L Fouard, M Duclos, P Lafourcade
supported by the ANR project AVOTÉ, 2007
492007
A terrorist-fraud resistant and extractor-free anonymous distance-bounding protocol
G Avoine, X Bultel, S Gambs, D Gérault, P Lafourcade, C Onete, ...
Proceedings of the 2017 ACM on Asia conference on computer and …, 2017
482017
Comparison of cryptographic verification tools dealing with algebraic properties
P Lafourcade, V Terrade, S Vigier
International Workshop on Formal Aspects in Security and Trust, 173-185, 2009
452009
Improved constructions of anonymous credentials from structure-preserving signatures on equivalence classes
A Connolly, P Lafourcade, O Perez Kempner
IACR International Conference on Public-Key Cryptography, 409-438, 2022
442022
How to construct physical zero-knowledge proofs for puzzles with a “single loop” condition
P Lafourcade, D Miyahara, T Mizuki, L Robert, T Sasaki, H Sone
Theoretical Computer Science 888, 41-55, 2021
442021
Formal verification of e-auction protocols
J Dreier, P Lafourcade, Y Lakhnech
International Conference on Principles of Security and Trust, 247-266, 2013
442013
The system can't perform the operation now. Try again later.
Articles 1–20