My papers are mainly on Computer
Science Security, Cryptography and
formal verification.
My list of publications are
available on:
Books
Publications
Revues
- 2020
-
[GLMS20] David Gerault, Pascal Lafourcade, Marine Minier, Christine Solnon, Computing AES related-key differential characteristics with constraint programming. Artificial Intelligence, 278, 2020, (Core Rank A, Q1)
- 2019
-
[NELPL19] Claudia Negri Ribalta, Rose Esmander, Marius Lombard-Platet, Manuel Parra Yagnam and Pascal Lafourcarde, A silver bullet? Trust and Transparency in Blockchain Applications for Accounting, Accounting, organizations and society, 16th December 2019, London.
[DPPLR19] Jannik Dreier, Maxime Puys, Marie-Laure Potet, Pascal Lafourcade, Jean-Louis Roch, Formally and practically verifying flow properties in industrial systems. Computers & Security 86: 453-470, 2019, (Core Rank B)
- 2018
-
[BLGR18] Mouhebeddine Berrima, Pascal Lafourcade, Matthieu Giraud, and Narjes Ben Rajeb. Formal Analysis of a Private Acccess Control Protocol to a Cloud Storage. International of Innovative Computing and Applications, 2018.
[DPPLR18] Jannik Dreier, Maxime Puys, Marie-Laure Potet, Pascal Lafourcade, Jean-Louis Roch, Formally and Practically Verifying Flow Properties in Industrial Systems, Computers and Security, Elsevier, 2018 (Core Rank B, Q1)
[GLMS18] David Gérault, Pascal Lafourcade, Marine Minier, Christine Solnon. Revisiting AES Related-Key Differential Attacks with Constraint Programming. Information Processing Letters, Elsevier, In press, volume 139, pp.24--29. (Rank Core B)
- 2017
-
[ADJL17] Karine Altisen, Stéphane Devismes, Raphaël Jamet, Pascal Lafourcade: SR3: Secure resilient reputation-based routing. Wireless Networks, 23(7): 2111-2133, 2017. PDF (Rank Core B)
[AGLM17] Affoua Thérese Aby, Alexandre Guitton, Pascal Lafourcade, and Michel Missson. History-based mac protocol for low duty-cycle wireless sensor networks: the slack-mac protocol. ICST Trans. Mobile Communications Applications, volume 3, numero 11, 2017. PDF
[BDLM17] Xavier Bultel, Jannik Dreier, Pascal Lafourcade, and Malika More. How to Explain Modern Security Concepts to your Children, Journal Cryptologia, volume 41, numero 5, pages 422--447. PDF, (Rank Core C)
[DLOP17] Jean-Guillaume Dumas, Pascal Lafourcade, Jean-Baptiste Orfila, Maxime Puys: Dual protocols for private multi-party matrix multiplication and trust computations. Computers & Security 71: 51-70, 2017, (Rank Q1)
[KFL17] Ali Kassem, Yliès Falcone, Pascal Lafourcade: Formal analysis and offline monitoring of electronic exams. Formal Methods in System Design 51(1): 117-153, 2017, (Rank Core A).
[SGLYTQH17] Siwei Sun, David Gérault, Pascal Lafourcade, Qianqian Yang, Yosuke Todo, Kexin Qiao, Lei Hu: Analysis of AES, SKINNY, and Others with Constraint Programming. International Workshop on Fast Software Encryption , IACR Transactions of Symmetric Cryptology 2017(1): 281-306 (Rank Core B).
[TLM17] Ariane Tichit, Pascal Lafourcade et Vincent Mazenod: Les monnaies virtuelles décentralisées sont-elles des dispositifs d'avenir ?, revue Interventions Economiques, 2017.
- 2016
-
[BLM+16] Béatrice Bérard, Pascal Lafourcade, Laure Millet, Maria Potop-Butucaru, Yann Thierry-Mieg, and Sébastien Tixeuil. Formal verification of mobile robot protocols. Theoretical Computer Science (TCS), Elsevier, 2016. PDF (Rank Core A).
[DELL16] Jannik Dreier, Cristian Ene, Pascal Lafourcade, and Yassine Lakhnech. On the existence and decidability of unique decompositions of processes in the applied pi-calculus. Theoretical Computer Science, 612:102 - 125, 2016. PDF (Rank Core A).
[GLLSN16] Martin Gagné, Pascal Lafourcade, Yassine Lakhnech, and Reihaneh Safavi-Naini. Automated proofs of block cipher modes of operation. Journal of Automated Reasoning, 56(1):49 - 94, 2016. PDF (Rank Core A)
- 2015
-
[DDL15] Jannik Dreier, Jean-Guillaume Dumas, and Pascal Lafourcade. Brandt's fully private auction protocol revisited. Journal of Computer Security Special Issue on Security and High Performance Computing Systems, 23(5), pages 587--610, 2015. PDF (Rank core B)
[DGK+15a] Jannik Dreier, Rosario Giustolisi, Ali Kassem, Pascal Lafourcade, Gabriele Lenzin, and Peter Y.A. Ryan. Formal security analysis of traditional and electronic exams. In Communications in Computer and Information Science, volume Springer-Verlag, LNCS of CCIS, 2015.PDF, (Rank Q4)
[MCL15] Ismail Mansour, Gérard Chalhoub, and Pascal Lafourcade. Key management in wireless sensor networks. Journal of Sensor and Actuator Networks, 4(3):251-273, 2015. PDF
- 2014
-
[GADL14] Karine Altisen, Stéphane Devismes, Antoine Gerbaud, and Pascal Lafourcade. Comparison of mean hitting times for a degree-biased random walk. Discrete Applied Mathematics, 170 :104 - 109, 2014. PDF (Rank Q2)
[MCL14b] Ismail Mansour, Gérard Chalhoub, and Pascal Lafourcade. Evaluation of secure multi-hop node authentication and key establishment mechanisms for wireless sensor net- works. Journal of Sensor Actuator Networks, 3(3): 224-244, 2014. PDF
- 2011
-
[CDELL11] Judicael Courant, Marion Daubignard, Cristian Ene, Pascal Lafourcade, Yassine Lakhnech: Automated Proofs for Asymmetric Encryption. Journal of Automated Reasoning 46(3-4): 261-291 (2011). PDF (Rank Core A)
- 2008
-
[PPS08+] Panos Papadimitratos, Marcin Poturalski, Patrick Schaller, Pascal Lafourcade, David Basin, Srdjan Capkun, Jean-Pierre Hubaux. Secure Neighborhood Discovery: A Fundamental Element for Mobile Ad Hoc Networking accepted for publication in IEEE Communications Magazine, 2008. PDF
[DLLT08] Stéphanie Delaune, Pascal Lafourcade, Denis Lugiez and Ralf Treinen. Symbolic protocol analysis for monoidal equational theories. Information and Computation, 206 (2-4), pp.312-351, 2008. PDF (Rank Q1)
- 2007
-
[KL07] Bogdan Ksiezopolski and Pascal Lafourcade. Attack and revision of an electronic auction protocol using OFMC. Annales UMCS, Informatica, 6(1) :171-183, 2007. Technical Report
[Laf07a] Pascal Lafourcade. Intruder deduction for the equational theory of exclusive-or with commutative and distributive encryption. Electronic Notes in Theoretical Computer Science, 171(4) :37 - 57, 2007. (Rank Q3)
[LLT07] Pascal Lafourcade, Denis Lugiez and Ralf Treinen. Intruder Deduction for the Equational Theory of Abelian Groups with Distributive Encryption. Information and Computation 205(4), pages 581-623, 2007. PDF | PS | PS.GZ (Rank Q1)
- 2006
-
[CDL06] Véronique Cortier, Stéphanie Delaune and Pascal Lafourcade. A Survey of Algebraic Properties Used in Cryptographic Protocols. Journal of Computer Security 14(1), pages 1-43, 2006. PDF | PS| PS.GZ (Rank Q1, Core B)
Conferences
- 2019
-
[GGGLL19] Hardik Gajera, Matthieu Giraud, David Gérault, Manik Lal Das, Pascal Lafourcade, Verifiable and Private Oblivious Polynomial Evaluation, 13th WISTP International Conference on Information Security Theory and Practice (WISTP'2019). Slides
[GL19] David Gérault, Pascal Lafourcade, Towards Secure TMIS Protocols, the 12th International Symposium on Foundations & Practice of Security, Toulouse, France,5-6-7 November 2019.
[LL19] Pascal Lafourcade, Marius Lombard-Platet, Get-your-ID: Decentralized Proof of Identity, the 12th International Symposium on Foundations & Practice of Security, Toulouse, France,5-6-7 November 2019.
[LNPPR19] Pascal Lafourcade, Mike Nopere, Jeremy Picot, Daniela Pizzuti, and Etienne Roudeix, Security Analysis of Auctionity: a blockchain based e-auction, the 12th International Symposium on Foundations & Practice of Security, Toulouse, France,5-6-7 November 2019.
[DLLLPPP19] Jean-Guillaume Dumas, Pascal Lafourcade, Julio Lopez Fenner, David Lucas, Jean-Baptiste Orfila, Clément Pernet, and Maxime Puys, , Secure Multiparty Matrix Multiplication Based on Strassen-Winograd Algorithm. The 14th International Workshop on Security, August 28 (Wed) - 30 (Fri), 2019 Multi-Purpose Digital Hall, Ookayama Campus, Tokyo Institute of Technology, Tokyo, Japan. (Rank Core B)
[CLLS19] Radu Ciucanu, Pascal Lafourcade, Marius Lombard-Platet and Marta Soare, Secure Best Arm Identification in Multi-Armed Bandits, in the 15th International Conference on Information Secu- rity Practice and Experience, ISPEC 2019. (Rank Core B)
[LMMSS19] Pascal Lafourcade, Daiki Miyahara, Takaaki Mizuki,Tatsuya Sasakiand, Hideaki Sone, A Physical ZKP for Slitherlink : How to Perform Physical Topology-Preserving Computation, in the 15th International Conference on Information Security Practice and Experience, ISPEC 2019. (Rank Core B)
[LMNS19] Pascal Lafourcade, Takaaki Mizuki, Atsuki Nagao, and Kazumasa Shinagawa, Light Cryptography, 12th World Conference on Information Security Education 2019, IFIP Working Group 11.8, Lisbon, Portugal 2019.
[CKYLRL19] Marwa Chaieb, Mirko Koscina, Souheib Yousfi, Pascal Lafourcade and Riadh Robbana, DABSTERS: a Privacy Preserving e-Voting Protocol for Permissioned Blockchain, 16th International Colloquium on Theoretical Aspects of Computing, ICTAC'19. Hammamet, Tunisia, 2019 (Rank Core B)
[BDL19] Quentin Bramas, Stéphane Devismes, Pascal Lafourcade, Infinite Grid Exploration by Disoriented Robots, SIROCCO 2019 26th International Colloquium on Structural Information and Communication Complexity L'Aquila, Italy during July 1-4, 2019. (Rank Core B)
[CGLY19a] Radu Ciucanu, Matthieu Giraud, Pascal Lafourcade, Lihua Ye, Secure Strassen-Winograd Matrix Multiplication with MapReduce, International Conference on Security and Cryptography (SECRYPT) - 2019. (Rank Core B) Slides
[CGLY19b] Radu Ciucanu, Matthieu Giraud, Pascal Lafourcade, Lihua Ye, Secure Secure Intersection with MapReduce International Conference on Security and Cryptography (SECRYPT) - 2019. (Rank Core B) Slides
[CKYLR19] Marwa Chaieb, Mirko Koscina, Souheib Yousfi, Pascal Lafourcade and Riadh Robbana, DABSTERS: Distributed Authorities using Blind Signature To Effect Robust Security in e-voting, International Conference on Security and Cryptography (SECRYPT) - 2019. (Rank Core B)
[DLMSS19] Jean-Guillaume Dumas, Pascal Lafourcade, Daiki Miyahara, Takaaki Mizuki, Tatsuya Sasaki, and Hideaki Sone, Interactive Physical Zero-Knowledge Proof for Norinori. The 25th International Computing and Combinatorics Conference COCOON 19, Xian, China, 29-31th July 2019. (Rank Core A)
[BL19] Xavier Bultel, Pascal Lafourcade, Secure Trick-Taking Game Protocols How to Play Online Spades with Cheaters, Twenty-Third International Conference Financial Crypptography and Data Security 2019, February 18 - 22, 2019 St. Kitts (Rank Core B)
[BLLMSK19] Xavier Bultel, Pascal Lafourcade, Russell W. F. Lai, Giulio Malavolta, Dominique Schroeder, and Sri Aravinda Krishnan Thyagarajan, Efficient Invisible and Unlinkable Sanitizable Signatures, International Conference on Practice and Theory of Public Key Cryptography, PKC'19, Beijing China. (Rank Core B)
- 2018
-
[BCGLY18] Xavier Bultel, Radu Ciucanu, Matthieu Giraud, Pascal Lafourcade, Lihua Ye, Secure Joins with MapReduce, FPS 2018 : The 11th International Symposium on Foundations and Practice of Security, Montreal, Canada, 2018 Best Paper Award Slides.
[BDDLMMNSSS18] Xavier Bultel, Jannik Dreier, Jean-Guillaume Dumas, Pascal Lafourcade, Daiki Miyahara, Takaaki Mizuki, Atsuki Nagao, Tatsuya Sasaki, Kazumasa Shinagawa, Hideaki Sone, Physical Zero-Knowledge Proof for Makaro. SSS 2018: 111-125, Tokyo Japan. (Rank Core C)
[BDDL18] Xavier Bultel, Jannik Dreier, Jean-Guillaume Dumas, Pascal Lafourcade: A Cryptographer's Conspiracy Santa. FUN 2018: 13:1-13:13. (Rank Core B)
[BDG+18] Xavier Bultel, Jannik Dreier, Matthieu Giraud, Marie Izaute, Timothee Kheyrkhah, et al. Security Analysis and Psychological Study of Authentication Methods with PIN Codes. RCIS 2018 - IEEE 12th International Conference on Research Challenges in Information Science, May 2018, Nantes, France, pages 1--11. (Rank Core B)
[CGLY18] Radu Ciucanu, Matthieu Giraud, Pascal Lafourcade, Lihua Ye: Secure Grouping and Aggregation with MapReduce. 15th International Conference on Information Security and Cryptography SECRYPT'18, pages 514--521 Porto. Slides (Rank Core B)
[CYLR18] Marwa Chaieb, Souheib Yousfi, Pascal Lafourcade, and Riadh Robbana, Verify-Your-Vote: A Verifiable Blockchain-based Online Voting Protocol. 15th European Mediterranean and Middle Eastern Conference on Information Systems 2018, Cyprus. (Rank Core B)
- 2017
-
[ABGGLOR17] Gildas Avoine, Xavier Bultel, Sébastien Gambs, David Gérault, Pascal Lafourcade, Cristina Onete, Jean-Marc Robert: A Terrorist-fraud Resistant and Extractor-free Anonymous Distance-bounding Protocol. AsiaCCS 2017: 800-814. (Rank Core B)
[BCGL17] Xavier Bultel, Radu Ciucanu, Matthieu Giraud, Pascal Lafourcade: Secure Matrix Multiplication with MapReduce. ARES 2017: 11:1-11:10. (Rank Core B)
[BDGGGL17] Xavier Bultel, Manik Lal Das, Hardik Gajera, David Gérault, Matthieu Giraud, Pascal Lafourcade: Verifiable Private Polynomial Evaluation. ProvSec 2017: 487-506. (Rank Core B)
[BDL17] Elliott Blot, Jannik Dreier, Pascal Lafourcade: Formal Analysis of Combinations of Secure Protocols. FPS 2017: 53-67
[BGLO17] Ioana Boureanu, David Gérault, Pascal Lafourcade, Cristina Onete: Breaking and fixing the HB+DB protocol. WISEC 2017: 241-246. (Rank Core B) Slides
[BL17] Xavier Bultel, Pascal Lafourcade, Unlinkable and Strongly Accountable Sanitizable Signatures from Verifiable Ring Signatures Editor Srdjan Capkun and Sherman S. M. Chow, in Cryptology and Network Security - 16th International Conference, CANS 2017, Hong Kong, China, November 30 - December 2, 2017, Revised Selected Papers, Springer, Lecture Notes in Computer Science, volume 11261, pages 203--226, 2017. (Rank Core B)
[BLGR17] Mouhebeddine Berrima, Pascal Lafourcade, Matthieu Giraud, Narjes Ben Rajeb: Formal Analyze of a Private Access Control Protocol to a Cloud Storage. International Conference on Security and Cryptography SECRYPT 2017: 495-500. (Rank Core B)
[DLMOT17] Jean-Guillaume Dumas, Pascal Lafourcade, Francis Melemedjian, Jean-Baptiste Orfila, Pascal Thoniel: LOCALPKI: A User-Centric Formally Proven Alternative to PKIX. International Conference on Security and Cryptography SECRYPT 2017: 187-199. (Rank Core B)
[DPPLR17] Jannik Dreier, Maxime Puys, Marie-Laure Potet, Pascal Lafourcade, Jean-Louis Roch: Formally Verifying Flow Properties in Industrial Systems. International Conference on Security and Cryptography SECRYPT 2017: 55-66. Best Paper Award. (Rank Core B)
[GABL17] Matthieu Giraud, Alexandre Anzala-Yamajako, Olivier Bernard, Pascal Lafourcade: Practical Passive Leakage-abuse Attacks Against Symmetric Searchable Encryption. International Conference on Security and Cryptography SECRYPT 2017: 200-211. (Rank Core B)
[KLL17] Amrit Kumar, Cédric Lauradoux, Pascal Lafourcade: Duck Attack on Accountable Distributed Systems. MobiQuitous 2017: 303-312. (Rank Core A)
- 2016
-
[BBL16a] Olivier Blazy, Xavier Bultel, and Pascal Lafourcade. Anonymizable ring signature without pairing. In 9th International Symposium on Foundations & Practice of Security (FPS 2016), Qubec city, QC, Canada, 24-25-26 October, 2016. PDF
[BBL16] Olivier Blazy, Xavier Bultel, Pascal Lafourcade, Two Secure Anonymous Proxy-based Data Storages, International Conference on Security and Cryptography SECRYPT'16, Lisbon Portugal, PDF, Slides. (Rank Core B)
[BDDL16] Xavier Bultel, Jannik Dreir, Jean-Guillaume Dumas, and Pascal Lafourcade. Physical zeroknowledge proofs for Akari, Kakuro, Kenken and Takuzu. In FUN 2016: 8:1-8:20. PDF Slides (Rank Core B)
[BGG+16] Xavier Bultel, Sébastien Gambs, David Gérault, Pascal Lafourcade, Cristina Onete, and Jean-Marc Robert. Spade: A prover-anonymous and terrorist-fraud resistant distance bounding protocol. In Matthias Hollick, Panos Papadimitratos, William Enck, editors, Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, WISEC 2016, Darmstadt, Germany, July 18-22, 2016, pages 121-133. PDF. (Rank Core B)
[BL16a] Xavier Bultel, Pascal Lafourcade, K-time Full Traceable Ring Signature. 11th International Conference on Availability, Reliability and Security, {ARES} 2016, Salzburg, Austria, August 31 - September 2, 2016, pages 39--48, PDF Slides. (Rank Core B)
[BL16b] Xavier Bultel and Pascal Lafourcade. A posteriori openable public key encryption. In IFIP Sec 2016, 2016. PDF Slides (Rank Core B)
[DLOP16] Jean-Guillaume Dumas, Pascal Lafourcade, Jean-Baptiste Orfila, Maxime Puys, Private Multi-party Matrix Multiplication and Trust Computations, International Conference on Security and Cryptography SECRYPT'16, Lisbon Portugal, Best Paper Award, PDF. (Rank Core B)
[GL16] David Gérault and Pascal Lafourcade. Related-key cryptanalysis of midori. In 17th International Conference on Cryptology in India, Indocrypt'16, December 11-14, Kolkata, 2016.PDF. (Rank Core B)
[KGLR'16] Noudjoud Kahya, Nacira Ghoualmi, Pascal Lafourcade, Khelf Roumaissa, Formal Analysis of Key Management in mobile Wimax. The 2nd International Conference on Pattern Analysis and Intelligent Systems (IEEE) PAIS'16, November 16-17, 2016 Khenchela, Algeria. PDF.
[PLL16] Maxime Puys, Marie-Laure Potet, and Pascal Lafourcade. Formal analysis of security properties on the opcua scada protocol. In SafeComp'16, 2016. PDF (Rank Core B)
- 2015
-
[AGLM'15] Affoua Théràse Aby, Alexandre Guitton, Pascal Lafourcade, and Michel Misson. SLACK_MAC: Adaptive MAC Protocol for Low Duty-Cycle Wireless Sensor Networks. ADHOCNETS 2015. PDF. (Rank Core B)
[BGP15] Agnes Brelurut, David Géarault and Pascal Lafourcade. Survey of Distance Bounding Protocols and threats. 8th International Symposium on Foundations & Practice of Security 26-28 October 2015 Clermont-Ferrand, France. PDF Slides
[DGKLL15] Jannik Dreier, Rosario Giustolisi, Ali Kassem, Pascal Lafourcade, and Gabriele Lenzini: A Framework for Analyzing Verifiability in Traditional and Electronic Exams. ISPEC 2015, pages 514-529. PDF Slides (Rank Core B)
[DKL'15] Jannik Dreier, Ali Kassem, and Pascal Lafourcade: Formal Analysis of E-Cash Protocols. In 11th International Conference on Security and Cryptography (SECRYPT 2015). PDF Slides. (Rank Core B)
[KFL15] Ali Kassem, Yliès Falcone, and Pascal Lafourcade: Monitoring Electronic Exams. The 15th International Conference on Runtime Verification, September, 2015 Vienna, Austria. PDF Slides (Rank Core C)
[PL15] Maxime Puys and Pascal Lafourcade. Performance Evaluations of Cryptographic Protocols. Verification Tools Dealing with Algebraic Properties. 8th International Symposium on Foundations & Practice of Security 26-28 October 2015 Clermont-Ferrand, France. PDF
- 2014
-
[DGK+14] Jannik Dreier, Rosario Giustolisi, Ali Kassem, Pascal Lafourcade, Gabriele Lenzin,and Peter Y.A. Ryan. Formal analysis of electronic exams. In 11th International Conference on Information Security and Cryptography (SECRYPT 2014), 2014. Best Paper Award. PDF Slides. (Rank Core B)
[DJL14] Jannik Dreier, Hugo Jonker, and Pascal Lafourcade. Secure auctions without cryptography. In Alfredo Ferro, Fabrizio Luccio, and Peter Widmayer, editors, Fun with Algorithms - 7th International Conference, FUN 2014, Lipari Island, Sicily, Italy, July 1-3, 2014. Proceedings, volume 8496 of Lecture Notes in Computer Science, pages 158-170. Springer, 2014. PDF (Rank Core B)
[JL14b] Raphël Jamet and Pascal Lafourcade. (In)corruptibility of routing protocols. In Foundations and Practice of Security - 7th International Symposium, FPS 2014, Montréal, Canada, 2014, Lecture Notes in Computer Science. Springer, 2014. Best Paper Award. PDF
[KLL14b] Ali Kassem, Pascal Lafourcade, and Yassine Lakhnech. Formal verification of e-reputation protocols. In Foundations and Practice of Security - 7th International Symposium, FPS 2014, Montréal, Canada, Lecture Notes in Computer Science. Springer, 2014. PDF
[KLL14c] Amrit Kumar, Pascal Lafourcade, and Cédric Lauradoux. Performances of cryptographic accumulators. In The 39th IEEE Conference on Local Computer Networks (LCN), 2014. PDF (Rank Core A)
[MCL+14a] Ismail Mansour, Gérard Chalhoub, Pascal Lafourcade, and Francois Delobel. Secure key renewal and revocation for wireless sensor networks. In The 39th IEEE Conference on Local Computer Networks (LCN), Edmonton, Canada, 2014. PDF (Rank Core A)
[MCL14] Ismail Mansour, Gérard Chalhoub, Pascal Lafourcade: Secure Multihop Key Establishment Protocols for Wireless Sensor Networks. CSS 2014: 166-177.
[MRC+14] Ismail Mansour, Damian Rusinek, Gérard Chalhoub, Pascal Lafourcade, and Bogdan Ksiezopolski. Multihop node authentication mechanisms for wireless sensor networks. In Song Guo, Jaime Lloret, Pietro Manzoni, and Stefan Ruehrup, editors, Ad-hoc, Mo- bile, and Wireless Networks - 13th International Conference, ADHOC-NOW 2014, Benidorm, Spain, June 22-27, 2014 Proceedings, volume 8487 of Lecture Notes in Computer Science, pages 402 - 418. Springer, 2014. PDF (Rank Core B)
- 2013
-
[ADJL13] Karine Altisen, Stéphane Devismes, Raphël Jamet, and Pascal Lafourcade. SR3: Secure resilient reputation-based routing. In The annual IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS 2013), Cambridge, Massachusetts, USA, may 2013. to appear. PDF (Rank Core B)
[DDL13] Jannik Dreier, Jean-Guillaume Dumas, and Pascal Lafourcade. Brandt's fully private auction protocol revisited. In 6th International Conference on Cryptology in Africa Africacrypt 2013, Egypt, june 2013. to appear. PDF Slides
[DELL13] Jannik Dreier, Cristian Ene, Pascal Lafourcade, and Yassine Lakhnech. On unique decomposition of processes in the applied-calculus. In Frank Pfenning, editor, FoSSaCS, volume 7794 of Lecture Notes in Computer Science, pages 50-64. Springer, 2013. PDF Slides
[DJL13] Jannik Dreier, Hugo Jonker, and Pascal Lafourcade. Verifiability in e-auction protocols. In 8th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2013, Hangzhou, China, 2013. PDF (Rank Core B)
[DLL13] Jannik Dreier, Pascal Lafourcade, Yassine Lakhnech: Formal verification of e-auction protocols. In David A. Basin and John C. Mitchell, editors, POST, volume 7796 of Lecture Notes in Computer Science, pages 247 266. Springer, 2013. PDF Slides
[GLL13] Martin Gagné, Pascal Lafourcade and Yassine Lakhnech. Automated security proofs for almost-universal hash for mac verification. In Jason Crampton, Sushil Jajodia, and Keith Mayes, editors, Computer Security - ESORICS 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings, volume 8134 of Lecture Notes in Computer Science, pages 291- 308. Springer, 2013. PDF Slides
[JL13] Raphël Jamet and Pascal Lafourcade. Discovering flaws in IDS through analysis of their inputs. In Jean Luc Danger, Mourad Debbabi, Jean-Yves Marion, Joaquin Garcia-Alfaro, and A. Nur Zincir-Heywood, editors, Foundations and Practice of Security - 6th International Symposium, FPS 2013, La Rochelle, France, October 21-22, 2013, Revised Selected Papers, volume 8352 of Lecture Notes in Computer Science. Springer, 2014. PDF
[KLL13] Ali Kassem, Pascal Lafourcade, and Yassine Lakhnech. A More Realistic Model for Verifying Route Validity in Ad-Hoc Networks. In Jean Luc Danger, Mourad Debbabi, Jean-Yves Marion, Joaquin Garcia-Alfaro, and A. Nur Zincir-Heywood, editors, Foun- dations and Practice of Security - 6th International Symposium, FPS 2013, La Rochelle, France, October 21-22, 2013, Revised Selected Papers, volume 8352 of Lecture Notes in Computer Science. Springer, 2014. PDF
- 2012
-
[AGDL12] Karine Altisen, Stéphane Devismes, Antoine Gerbaud, Pascal Lafourcade: Analysis of Random Walks Using Tabu Lists.. In Structural Information and Communication Complexity - 19th International Colloquium, SIROCCO 2012, Reykjavik, Iceland, June 30-July 2,2012.PDF
[DLL12a] Jannik Dreier, Pascal Lafourcade, Yassine Lakhnech: Defining Privacy for Weighted Votes, Single and Multi-Voter Coercion. European Symposium on Research in Computer Security (ESORICS), 2012. PDF Slides
[DLL12b] Jannik Dreier, Pascal Lafourcade, Yassine Lakhnech. A Formal Taxonomy of Privacy in Voting Protocols. First IEEE International Workshop on Security and Forensics in Communication Systems (ICC'12 WS - SFCS), 2012. Technical Report Slides
[GKL12] Ghoualmi, Nacira and Kahya, Noudjoud and Lafourcade, Pascal Key Management Protocol in WIMAX revisited. In The Third International Conference on Communications Security and Information Assurance (CSIA 2012), 2012. PDF
- 2011
-
[CDE+11]Judicael Courant, Marion Daubignard, Cristian Ene, Pascal Lafourcade, and Yassine Lakhnech. Automated proofs for asymmetric encryption. In Dennis Dams, Ulrich Han- nemann, and Martin Steffen, editors, Concurrency, Compositionality, and Correctness, Essays in Honor of Willem-Paul de Roever, volume 5930 of Lecture Notes in Computer Science, pages 300 - 321. Springer, 2011.PDF
[DLL11] Jannik Dreier, Pascal Lafourcade, Yassine Lakhnech. Vote-Independence: A Powerful Privacy Notion for Voting Protocols. 4th Canada-France MITACS Workshop on Foundations & Practice of Security (FPS'11), 2011. PDF | Technical Report Slides
[FLA11] Fousse, Laurent and Lafourcade, Pascal and Alnuaimi, Mohamed: Benaloh's Dense Probabilistic Encryption Revisited. In Progress in Cryptology - AFRICACRYPT 2011 - 4th International Conference on Cryptology in Africa, Dakar, Senegal, July 5-7, 2011. Proceedings, 2011. PDF Slides
[GLLSN11] Martin Gagné,Pascal Lafourcade,Yassine Lakhnech,and Reihaneh Safavi-Naini. Automated verification of block cipher modes of operation, an improved method. In Joaquin Garcia-Alfaro and Pascal Lafourcade, editors, Foundations and Practice of Security - 4th Canada-France MITACS Workshop, FPS 2011, Paris, France, May 12-13, 2011, Revised Selected Papers, volume 6888 of Lecture Notes in Computer Science, pages 23 - 31. Springer, 2012. PDF Slides
- 2010
-
[JWESML10] Jérémie Tharaud, Sven Wohlgemuth, Isao Echizen, Noboru Sonehara, Gunter Muller, Pascal Lafourcade: Privacy by Data Provenance with Digital Watermarking - A Proof-of-Concept Implementation for Medical Services with Electronic Health Records. IIH-MSP 2010: 510-513 PDF
- 2009
-
[CLN09] Cas J.F. Cremers, Pascal Lafourcade, and Philippe Nadeau. Comparing state spaces in automatic protocol analysis. Formal to Practical Security, 5458/2009: 70 - 94, 2009. PDF
[GLLS09] Martin Gagné, Pascal Lafourcade, Yassine Lakhnech, and Reihaneh Safavi-Naini Automated Proofs for Encryption Modes. In Proceedings of the 13th Annual Asian Computing Science Conference Focusing on Information Security and Privacy: Theory and Practice (ASIAN'09), October 2009. PDF | PS Slides
[LTV09] Pascal Lafourcade, Vanessa Terrade and Sylvain Vigier Comparison of Cryptographic Verification Tools Dealing with Algebraic Properties . In Proceedings of the sixth International Workshop on Formal Aspects in Security and Trust (FAST2009), November 2009, Eindhoven, the Netherlands. PDF | PS| Slides
- 2008
-
[CDELL08a] Judicael Courant, Marion Daubignard, Cristian Ene, Pascal Lafourcade. and Yassine Lakhnech Towards Automated Proofs for Asymmetric Encryption Schemes in the Random Oracle Model. In Proceedings of the 15th ACM Conference on Computer and Communications Security, (CCS'08), October 2008, Alexandria USA. PDF | PS
- 2007
-
[Laf07] Pascal Lafourcade. Intruder Deduction for the Equational Theory of Exclusive-or with Commutative and Distributive Encryption. In Maribel Fernández and Claude Kirchner (eds.), Proceedings of the 1st International Workshop on Security and Rewriting Techniques (SecReT'06), Venice, Italy, July 2006, Electronic Notes in Theoretical Computer Science 171(4), pages 37-57. Elsevier Science Publishers, 2007. PDF | PS| PS.GZ | Slides
- 2006
-
[DLLT06] Stéphanie Delaune, Pascal Lafourcade, Denis Lugiez and Ralf Treinen. Symbolic Protocol Analysis in Presence of a Homomorphism Operator and Exclusive Or. In Michele Buglesi, Bart Preneel, Vladimiro Sassone and Ingo Wegener (eds.), Proceedings of the 33rd International Colloquium on Automata, Languages and Programming (ICALP'06) - Part II, Venice, Italy, July 2006, Lecture Notes in Computer Science 4052, pages 132-143. Springer. PDF | PS| PS.GZ | PDF (long version) | PS(long version) | PS.GZ (long version) | Slides
- 2005
-
[LLT05a] Pascal Lafourcade, Denis Lugiez and Ralf Treinen. Intruder Deduction for AC-like Equational Theories with Homomorphisms. In Juergen Giesl (ed.), Proceedings of the 16th International Conference on Rewriting Techniques and Applications (RTA'05), Nara, Japan, April 2005, Lecture Notes in Computer Science 3467, pages 308-322. Springer. PDF | PS| PS.GZ | PS(long version) | PS.GZ (long version) | Slides
Articles de vulgarisation
[JLMP20] Matthieu Journault, Pascal Lafourcade, Malika More, et Remy Poulain, Une preuve pour le lycée de l'indécidabilité du problème de l'arrêt, DidaPro 8, L’informatique, objets d’enseignements – enjeux épistémologiques, didactiques et de formation, Lille, Février 2020.
[GL19] Giraud Matthieu, Pascal Lafourcade, MISSION CRYPTOGRAPHIE, Repères-IREM, Rubrique « Clé en main », 2019.
[FLMM19] Séverine Fleury, Pascal Lafourcade, Marianne Mognos, Malika More, Trier pour mieux comparer Repère IREM, n 117, Octobre 2019.
[LM18] Pascal LAFOURCADE, Malika MORE Je suis un ordinateur, numéro double de Tangente Éducation 42-43, L'informatique débranchée, 2018.
[DFLM18] Béatrice DROT-DELANGE, Séverine FLEURY, Pascal LAFOURCADE, Malika MORE Un tour de magie pour introduire la représentation binaire des nombres, APMEP Association des Professeurs de Mathématiques de l'Enseignement Public, 2018, Mathématiques et interdisciplinarité, numéro 525-526, pp. 17-34. Cartes.pdf, Rapport technique
[L17] Pascal Lafourcade Vérifier la sécurité de nos communications, Interstices, 06 Octobre 2017 PDF.
[DL16] Jean-Guillaume Dumas et Pascal Lafourcade, Les crypto-monnaies, une réalité virtuelle ?, Les Big Data à l'échelle de la société, édition CNRS 2016. PDF
[DP10] Marion Daubignard and Lafourcade Pascal. Je veux te dire un secret mais tout le monde m'écoute. Visions Croisées, numéro 7 : Coder et décoder, magazine de vulgarisation scientifique édité par les moniteurs du CIES de l'Académie de Grenoble, march 2010.
[Laf10] Pascal Lafourcade. Sécurité et cryptographie par l'image, mai 2010. Conférence dans le cadre du programme "Invitez les sciences et la technologie dans votre classe" organisé par la DAAC de Grenoble (Délégation Académique aux arts et à la culture de l'Académie).
Chapitres de livre
[JL12] Raphël Jamet, Pascal Lafourcade: Formal Model for (k)-Neighborhood Discovery Protocols. Chapter in Advances in Network Analysis and its Applications. PDF
Edition d'actes
[GAL12] Joaquín García-Alfaro, Pascal Lafourcade: Foundations and Practice of Security - 4th Canada-France MITACS Workshop, FPS 2011, Paris, France, May 12-13, 2011, Revised Selected Papers Springer 2012.
Thèse
[Laf12] Pascal Lafourcade, Computer-Aider Security for : Cryptographic Primitives, Voting Protocols and Wireless Sensor Networks. Habilitation à diriger des recherches, Verimag, Grenoble, France, 11 2012. 192 pages. PDF, Slides
[Laf06] Pascal Lafourcade. Vérification des protocoles cryptographiques en présence de théories équationnelles. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, September 2006. 209 pages. PDF | PS| PS.GZ | Slides
[Laf03] Pascal Lafourcade. Application de la résolution de conflits "logiques", à l'aide à la décision pour la résolution de aux conflits des problèmes d'ordonnancement. Rapport de DEA, DEA Représentation de la Connaissance et Fomalisation du Raisonnement, Toulouse, France, June 2003. 66 pages. PS| PS.GZ
Articles de pédagogie
[HDB+12] Christian Hoffmann, Julien Douady, Martial Billon, Marceline Bonvalot, Florence Courtois, Pascal Lafourcade, Isabelle Le Brun, Estelle Moraux, Claire Rist, and Marie-Francoise Soulage. Deux approches pour une formation opérante des étudiants de l'Université Joseph Fourier (grenoble, france) aux méthodes de travail universitaire. In 27e Congrès International de Pédagogie Universitaire (Association Internationale de Pé- dagogie Univeersitaire AIPU), Trois-Rivières, Québec, may 2012. PDF
[Laf11a] Pascal Lafourcade. La génération Y. Colloque Pédagogique National GEII, june 2011. Angouleme, publié dans le journal des IUTs GEII. PDF
[Laf11b] Pascal Lafourcade. Techniques d'apprentissage en liaison avec l'analyse cognitive. Colloque Pédagogique National GEII, june 2011. Angouleme, publié dans le journal des IUTs GEII. PDF
[DGL07] Dariusz Dobrowolski, Anna Grabowska, and Pascal Lafourcade. The concept of developing e-learning repository metadata and group work. In ICETA 2007, 5 th International Conference on Emerging e-Learning Technologies and Applications, pages 217-220, The High Tatra, Slovakia, sept 2007. PDF
Autres
[ADLP11] Routage par marche aléatoire à listes tabous. Altisen, Karine and Devismes, Stéphane and Lafourcade, Pascal and Ponsonnet, Clément (in Algotel, 2011). PDF
[GLLS09] Martin Gagné, Pascal Lafourcade, Yassine Lakhnech, and Reihaneh Safavi-Naini Automated Proofs for Encryption Modes. In Proceedings of the Workshop on Formal and Computational Cryptography, (FCC'09), July 2009, PortJefferson NY, USA. PDF | PS Slides
[ML09] Sreekanth Malladi, Pascal Lafourcade, Prudent engineering practices to prevent type-flaw attacks under algebraic properties . In Proceedings of the Workshop on Security and Rewriting Techniques, (Secret'09) July 2009, PortJefferson NY, USA. PDF | PS
[Laf08] Pascal Lafourcade. Relation between Unification Problem and Intruder Deduction Problem. In Proceedings of the 3rd International Workshop on Security and Rewriting Techniques (SecReT'08), Pittsburgh, PA USA, June , 2008. PDF | PS
[CDELL08b] Judicael Courant, Marion Daubignard, Cristian Ene, Pascal Lafourcade. and Yassine Lakhnech Automated Proofs for Asymmetric Encryption. In Proceedings of the Workshop on Formal and Computational Cryptography, (FCC'08), June 2008, Pittsburgh PA, USA. PDF | PS
[CDELL08c] Judicael Courant, Marion Daubignard, Cristian Ene, Pascal Lafourcade. and Yassine Lakhnech Automated Proofs for Asymmetric Encryption. In Proceedings of the Workshop on Foundations of Computer Security, Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, (FCS-ARSPA-WITS'08), June 2008, Pittsburgh PA, USA. PDF | PS
[CL07] Cas Cremers and Pascal Lafourcade. Comparing State Spaces in Automatic Security Protocol Verification. In Michael Goldsmith and Bill Roscoe (eds.), Proceedings of the 7th International Workshop on Automated Verification of Critical Systems (AVoCS'07), Oxford, UK, September 2007, Electronic Notes in Theoretical Computer Science, pages 49-63. Elsevier Science Publishers. PDF PDF
[KL07] Bogdan Ksiezopolski and Pascal Lafourcade. Attack and Revison of an Electronic Auction Protocol using OFMC. Technical Report 549, Department of Computer Science, ETH Zurich, Switzerland, February 2007. 13 pages. PDF
[LLT06] Pascal Lafourcade, Denis Lugiez and Ralf Treinen. ACUNh: Unification and Disunification Using Automata Theory. In Jordi Levy (ed.), Proceedings of the 20th International Workshop on Unification (UNIF'06), Seattle, Washington, USA, August 2006, pages 6-20. PDF | PS| PS.GZ
[LLT05b] Pascal Lafourcade, Denis Lugiez and Ralf Treinen. Intruder Deduction for the Equational Theory of Exclusive-or with Distributive Encryption. Research Report LSV-05-19, Laboratoire Spécification et Vérification, ENS Cachan, France, October 2005. 39 pages. PDF | PS| PS.GZ
[BCC+04] Vincent Bernat, Hubert Comon-Lundh, Véronique Cortier, Stéphanie Delaune, Florent Jacquemard, Pascal Lafourcade, Yassine Lakhnech and Laurent Mazaré. Sufficient conditions on properties for an automated verification: theoretical report on the verification of protocols for an extended model of the intruder. Technical Report 4, projet RNTL PROUVé, December 2004. 33 pages. PS| PS.GZ
[Laf03] Pascal Lafourcade. Application de la résolution de conflits 'logiques', à l'aide à la décision pour la résolution de aux conflits des problèmes d'ordonnancement. Rapport de DEA, DEA Représentation de la Connaissance et Fomalisation du Raisonnement, Toulouse, France, June 2003. 66 pages. PS| PS.GZ