Follow
Lucca Hirschi
Lucca Hirschi
Tenured Inria Researcher @ Loria
Verified email at inria.fr - Homepage
Title
Cited by
Cited by
Year
Formal Analysis of 5G Authentication
D Basin, J Dreier, L Hirschi, S Radomirović, R Sasse, V Stettler
ACM Conference on Computer and Communications Security (CCS'18), 2018
2872018
New Privacy Threat on 3G, 4G, and Upcoming 5G AKA Protocols
R Borgaonkar, L Hirschi, S Park, A Shaik
Privacy Enhancing Technologies Symposium (PETS'19), 2019
932019
Partial Order Reduction for Security Protocols
D Baelde, S Delaune, L Hirschi
26th International Conference on Concurrency Theory (CONCUR'15), 2015
482015
A Method for Verifying Privacy-Type Properties: The Unbounded Case
L Hirschi, D Baelde, S Delaune
37th IEEE Symposium on Security and Privacy (Oakland'16), 2016
452016
Automated unbounded verification of stateful cryptographic protocols with exclusive OR
J Dreier, L Hirschi, S Radomirovic, R Sasse
2018 IEEE 31st Computer Security Foundations Symposium (CSF'18), 359-373, 2018
432018
A survey of symbolic methods for establishing equivalence-based properties in cryptographic protocols
S Delaune, L Hirschi
Journal of Logical and Algebraic Methods in Programming (JLAMP) 87, 127-144, 2017
322017
Mobile subscriber WiFi privacy
P O’Hanlon, R Borgaonkar, L Hirschi
Proceedings of Mobile Security Technologies (MoST'17), held as part of the …, 2017
272017
A method for unbounded verification of privacy-type properties
L Hirschi, D Baelde, S Delaune
Journal of Computer Security (JCS'19), 2019
192019
A reduced semantics for deciding trace equivalence using constraint systems
D Baelde, S Delaune, L Hirschi
International Conference on Principles of Security and Trust (POST'14), 2014
182014
Towards Completeness via Proof Search in the Linear Time μ-calculus: The case of Büchi inclusions
A Doumane, D Baelde, L Hirschi, A Saurin
31st Annual ACM/IEEE Symposium on Logic in Computer Science (LICS'16), 377-386, 2016
152016
A Spectral Analysis of Noise: A Comprehensive, Automated, Formal Analysis of Diffie-Hellman Protocols
G Girol, L Hirschi, R Sasse, D Jackson, C Cremers, D Basin
USENIX Security Symposium (USENIX Security'20), 2020
142020
Improving Automated Symbolic Analysis of Ballot Secrecy for E-voting Protocols: A Method Based on Sufficient Conditions
L Hirschi, C Cremers
IEEE Euro Security and Privacy (Euro S&P'19), 2019
14*2019
Fixing the Achilles Heel of E-Voting: The Bulletin Board
L Hirshi, L Schmid, D Basin
Computer Security Foundations Symposium (CSF21), 2021
132021
A Reduced Semantics for Deciding Trace Equivalence
L Hirschi, S Delaune, D Baelde
Logical Methods in Computer Science (LMCS'17) 13, 2017
10*2017
POR for Security Protocol Equivalences: Beyon Action-Determinism
D Baelde, S Delaune, L Hirschi
European Symposium on Research in Computer Security (ESORICS'18), 385-405, 2018
5*2018
Le traçage anonyme, dangereux oxymore
X Bonnetain, A Canteaut, V Cortier, P Gaudry, L Hirschi, S Kremer, ...
42020
Verification of stateful cryptographic protocols with exclusive OR
J Dreier, L Hirschi, S Radomirović, R Sasse
Journal of Computer Security (JCS), 1-34, 2020
42020
Improving automated symbolic analysis of ballot secrecy for E-voting protocols: a method based on sufficient conditions
C Cremers, L Hirschi
42019
Security issues in the 5G standard and how formal methods come to the rescue
L Hirschi, R Sasse, J Dreier
ERCIM News, 2019
42019
Automated Verification of Privacy in Security Protocols: Back and Forth Between Theory & Practice
L Hirschi
Université Paris-Saclay, 2017
4*2017
The system can't perform the operation now. Try again later.
Articles 1–20