What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Pascal Lafourcade
Google Scholar
ORCID:
0000-0002-4459-511X
36
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/asiaccs
Formal Analysis of SDNsec: Attacks and Corrections for Payload, Route Integrity and Accountability.
Ayoub Ben Hassen
Pascal Lafourcade
Dhekra Mahmoud
Maxime Puys
2025
conf/asiaccs
Post-Compromise Security with Application-Level Key-Controls - with a comprehensive study of the 5G AKMA protocol.
Ioana Boureanu
Cristina Onete
Stephan Wesemeyer
Léo Robert
Rhys Miller
Pascal Lafourcade
Fortunat Rajaona
2025
conf/esorics
Fine-Grained, Privacy-Augmenting LI-Compliance in the LAKE Standard.
Pascal Lafourcade
Elsa López Pérez
Charles Olivier-Anclin
Cristina Onete
Clément Papon
Malisa Vucinic
2025
conf/uss
A Tale of Two Worlds, a Formal Story of WireGuard Hybridization.
Pascal Lafourcade
Dhekra Mahmoud
Sylvain Ruhault
Abdul Rahman Taleb
2025
conf/uss
Who Pays Whom? Anonymous EMV-Compliant Contactless Payments.
Charles Olivier-Anclin
Ioana Boureanu
Liqun Chen
Christopher J. P. Newton
Tom Chothia
Anna Clee
Andreas Kokkinis
Pascal Lafourcade
2024
conf/uss
Shaken, not Stirred - Automated Discovery of Subtle Attacks on Protocols using Mix-Nets.
Jannik Dreier
Pascal Lafourcade
Dhekra Mahmoud
2024
conf/esorics
Secure Keyless Multi-party Storage Scheme.
Pascal Lafourcade
Lola-Baie Mallordy
Charles Olivier-Anclin
Léo Robert
2024
conf/asiaccs
Transferable, Auditable and Anonymous Ticketing Protocol.
Pascal Lafourcade
Dhekra Mahmoud
Gaël Marcadet
Charles Olivier-Anclin
2024
conf/ndss
A Unified Symbolic Analysis of WireGuard.
Pascal Lafourcade
Dhekra Mahmoud
Sylvain Ruhault
2024
conf/africacrypt
iUC-Secure Distributed File Transfer from Standard Attribute-Based Encryption.
Pascal Lafourcade
Gaël Marcadet
Léo Robert
2024
conf/cans
Cryptographic Cryptid Protocols - How to Play Cryptid with Cheaters.
Xavier Bultel
Charlène Jojon
Pascal Lafourcade
2023
conf/uss
How fast do you heal? A taxonomy for post-compromise security in secure-channel establishment.
Olivier Blazy
Ioana Boureanu
Pascal Lafourcade
Cristina Onete
Léo Robert
2023
conf/fc
Practical Construction for Secure Trick-Taking Games Even with Cards Set Aside.
Rohann Bella
Xavier Bultel
Céline Chevalier
Pascal Lafourcade
Charles Olivier-Anclin
2023
conf/iwsec
Check Alternating Patterns: A Physical Zero-Knowledge Proof for Moon-or-Sun.
Samuel D. Hand
Alexander Koch
Pascal Lafourcade
Daiki Miyahara
Léo Robert
2022
conf/acns
A Cryptographic View of Deep-Attestation, or How to Do Provably-Secure Layer-Linking.
Ghada Arfaoui
Pierre-Alain Fouque
Thibaut Jacques
Pascal Lafourcade
Adina Nedelcu
Cristina Onete
Léo Robert
2022
conf/pkc
Improved Constructions of Anonymous Credentials from Structure-Preserving Signatures on Equivalence Classes.
Aisling Connolly
Pascal Lafourcade
Octavio Perez-Kempner
2021
conf/fc
Generic Plaintext Equality and Inequality Proofs.
Olivier Blazy
Xavier Bultel
Pascal Lafourcade
Octavio Perez-Kempner
2020
conf/provsec
Secure Cumulative Reward Maximization in Linear Stochastic Bandits.
Radu Ciucanu
Anatole Delabrouille
Pascal Lafourcade
Marta Soare
2019
journals/compsec
Formally and practically verifying flow properties in industrial systems.
Jannik Dreier
Maxime Puys
Marie-Laure Potet
Pascal Lafourcade
Jean-Louis Roch
2019
conf/fc
Secure Trick-Taking Game Protocols - How to Play Online Spades with Cheaters.
Xavier Bultel
Pascal Lafourcade
2019
conf/pkc
Efficient Invisible and Unlinkable Sanitizable Signatures.
Xavier Bultel
Pascal Lafourcade
Russell W. F. Lai
Giulio Malavolta
Dominique Schröder
Sri Aravinda Krishnan Thyagarajan
2019
conf/iwsec
Secure Multiparty Matrix Multiplication Based on Strassen-Winograd Algorithm.
Jean-Guillaume Dumas
Pascal Lafourcade
Julio López Fenner
David Lucas
Jean-Baptiste Orfila
Clément Pernet
Maxime Puys
2017
journals/compsec
Dual protocols for private multi-party matrix multiplication and trust computations.
Jean-Guillaume Dumas
Pascal Lafourcade
Jean-Baptiste Orfila
Maxime Puys
2017
journals/tosc
Analysis of AES, SKINNY, and Others with Constraint Programming.
Siwei Sun
David Gérault
Pascal Lafourcade
Qianqian Yang
Yosuke Todo
Kexin Qiao
Lei Hu
2017
conf/ccs
A Terrorist-fraud Resistant and Extractor-free Anonymous Distance-bounding Protocol.
Gildas Avoine
Xavier Bultel
Sébastien Gambs
David Gérault
Pascal Lafourcade
Cristina Onete
Jean-Marc Robert
2017
conf/provsec
Verifiable Private Polynomial Evaluation.
Xavier Bultel
Manik Lal Das
Hardik Gajera
David Gérault
Matthieu Giraud
Pascal Lafourcade
2017
conf/wisec
Breaking and fixing the HB+DB protocol.
Ioana Boureanu
David Gérault
Pascal Lafourcade
Cristina Onete
2017
conf/cans
Unlinkable and Strongly Accountable Sanitizable Signatures from Verifiable Ring Signatures.
Xavier Bultel
Pascal Lafourcade
2016
conf/sec
A Posteriori Openable Public Key Encryption.
Xavier Bultel
Pascal Lafourcade
2016
conf/wisec
A Prover-Anonymous and Terrorist-Fraud Resistant Distance-Bounding Protocol.
Xavier Bultel
Sébastien Gambs
David Gérault
Pascal Lafourcade
Cristina Onete
Jean-Marc Robert
2013
conf/ccs
Defining verifiability in e-auction protocols.
Jannik Dreier
Hugo Jonker
Pascal Lafourcade
2013
conf/esorics
Automated Security Proofs for Almost-Universal Hash for MAC Verification.
Martin Gagné
Pascal Lafourcade
Yassine Lakhnech
2013
conf/africacrypt
Brandt's Fully Private Auction Protocol Revisited.
Jannik Dreier
Jean-Guillaume Dumas
Pascal Lafourcade
2012
conf/esorics
Defining Privacy for Weighted Votes, Single and Multi-voter Coercion.
Jannik Dreier
Pascal Lafourcade
Yassine Lakhnech
2011
conf/africacrypt
Benaloh's Dense Probabilistic Encryption Revisited.
Laurent Fousse
Pascal Lafourcade
Mohamed Alnuaimi
2008
conf/ccs
Towards automated proofs for asymmetric encryption schemes in the random oracle model.
Judicaël Courant
Marion Daubignard
Cristian Ene
Pascal Lafourcade
Yassine Lakhnech
Coauthors
Abdul Rahman Taleb
(1)
Adina Nedelcu
(1)
Aisling Connolly
(1)
Alexander Koch
(1)
Anatole Delabrouille
(1)
Andreas Kokkinis
(1)
Anna Clee
(1)
Ayoub Ben Hassen
(1)
Céline Chevalier
(1)
Charlène Jojon
(1)
Charles Olivier-Anclin
(5)
Christopher J. P. Newton
(1)
Clément Papon
(1)
Clément Pernet
(1)
Cristian Ene
(1)
Cristina Onete
(7)
Daiki Miyahara
(1)
David Gérault
(5)
David Lucas
(1)
Dhekra Mahmoud
(5)
Dominique Schröder
(1)
Elsa López Pérez
(1)
Fortunat Rajaona
(1)
Gaël Marcadet
(2)
Ghada Arfaoui
(1)
Gildas Avoine
(1)
Giulio Malavolta
(1)
Hardik Gajera
(1)
Hugo Jonker
(1)
Ioana Boureanu
(4)
Jannik Dreier
(5)
Jean-Baptiste Orfila
(2)
Jean-Guillaume Dumas
(3)
Jean-Louis Roch
(1)
Jean-Marc Robert
(2)
Judicaël Courant
(1)
Julio López Fenner
(1)
Kexin Qiao
(1)
Laurent Fousse
(1)
Lei Hu
(1)
Léo Robert
(6)
Liqun Chen
(1)
Lola-Baie Mallordy
(1)
Malisa Vucinic
(1)
Manik Lal Das
(1)
Marie-Laure Potet
(1)
Marion Daubignard
(1)
Marta Soare
(1)
Martin Gagné
(1)
Matthieu Giraud
(1)
Maxime Puys
(4)
Mohamed Alnuaimi
(1)
Octavio Perez-Kempner
(2)
Olivier Blazy
(2)
Pascal Lafourcade
(36)
Pierre-Alain Fouque
(1)
Qianqian Yang
(1)
Radu Ciucanu
(1)
Rhys Miller
(1)
Rohann Bella
(1)
Russell W. F. Lai
(1)
Samuel D. Hand
(1)
Sébastien Gambs
(2)
Siwei Sun
(1)
Sri Aravinda Krishnan Thyagarajan
(1)
Stephan Wesemeyer
(1)
Sylvain Ruhault
(2)
Thibaut Jacques
(1)
Tom Chothia
(1)
Xavier Bultel
(10)
Yassine Lakhnech
(3)
Yosuke Todo
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to