My Erdos number is 4: (Paul Erdos -> Shmuel Zaks -> Nachum Dershowitz -> Ralf Treinen -> Pascal Lafourcade) or (Paul Erdos -> Gérald Tenenbaum -> Guillaume Hanrot -> Laurent Fousse -> Pascal Lafourcade) or (Paul Erdos -> Michael Makkai -> Matt Kaufmann -> David A. Basin -> Pascal Lafourcade) or (Paul Erdos -> Sylvie Corteel -> E. Rodney Canfield -> Philippe Nadeau-> Pascal Lafourcade) or (Paul Erdos -> Boris Aronov -> Xavier Goaoc -> Véronique Cortier-> Pascal Lafourcade)
Here you can find how to compute you Erdos number.

Publications List

Pascal Lafourcade DBLP entry.

Books

Architectures PKI et communications sécurisées
par Jean-Guillaume DUMAS, Pascal LAFOURCADE et Patrick REDON (2015).
Comment s'exercer à apprendre ?
par Pascal LAFOURCADE et Isabelle LE BRUN (2015).
Exercices de programmation fonctionnelle en OCaml une approche pédagogique par l'algorithmique, la preuve et la complexité
par Fabienne CARRIER, Pascal LAFOURCADE et Laurent MOUNIER (Mai 2014).
Informatique théorique : logique et démonstration automatique
par Michel Lévy, Stéphane Devismes et Pascal Lafourcade (2012). Extrait du livre.

Pedagogy Articles

[HDB+12] Christian Hoffmann, Julien Douady, Martial Billon, Marceline Bonvalot, Florence Courtois, Pascal Lafourcade, Isabelle Le Brun, Estelle Moraux, Claire Rist, and Marie-Francoise Soulage. Deux approches pour une formation opérante des étudiants de l'Université Joseph Fourier (grenoble, france) aux méthodes de travail universitaire. In 27e Congrès International de Pédagogie Universitaire (Association Internationale de Pé- dagogie Univeersitaire AIPU), Trois-Rivières, Québec, may 2012. PDF

[Laf11a] Pascal Lafourcade. La génération Y. Colloque Pédagogique National GEII, june 2011. Angouleme, publié dans le journal des IUTs GEII. PDF

[Laf11b] Pascal Lafourcade. Techniques d'apprentissage en liaison avec l'analyse cognitive. Colloque Pédagogique National GEII, june 2011. Angouleme, publié dans le journal des IUTs GEII. PDF

[DGL07] Dariusz Dobrowolski, Anna Grabowska, and Pascal Lafourcade. The concept of developing e-learning repository metadata and group work. In ICETA 2007, 5 th International Conference on Emerging e-Learning Technologies and Applications, pages 217-220, The High Tatra, Slovakia, sept 2007. PDF

Popular Articles

[DL16] Jean-Guillaume Dumas et Pascal Lafourcade, Les crypto-monnaies, une réalité virtuelle ?, Les Big Data à l'échelle de la société, édition CNRS 2016. PDF

[DP10] Marion Daubignard and Lafourcade Pascal. Je veux te dire un secret mais tout le monde m'écoute. Visions Croisées, numéro 7 : Coder et décoder, magazine de vulgarisation scientifique édité par les moniteurs du CIES de l'Académie de Grenoble, march 2010.

[Laf10] Pascal Lafourcade. Sécurité et cryptographie par l'image, mai 2010. Conférence dans le cadre du programme "Invitez les sciences et la technologie dans votre classe" organisé par la DAAC de Grenoble (Délégation Académique aux arts et à la culture de l'Académie).

Chapter in Books

[JL12] Raphël Jamet, Pascal Lafourcade: Formal Model for (k)-Neighborhood Discovery Protocols. Chapter in Advances in Network Analysis and its Applications. PDF

Edited Books and Proceedings

[GAL12] Joaquín García-Alfaro, Pascal Lafourcade: Foundations and Practice of Security - 4th Canada-France MITACS Workshop, FPS 2011, Paris, France, May 12-13, 2011, Revised Selected Papers Springer 2012.

Magazine

[PPS08+] Panos Papadimitratos, Marcin Poturalski, Patrick Schaller, Pascal Lafourcade, David Basin, Srdjan Capkun, Jean-Pierre Hubaux. Secure Neighborhood Discovery: A Fundamental Element for Mobile Ad Hoc Networking accepted for publication in IEEE Communications Magazine, 2008. PDF

Journals

2016

[BDLM16] Xavier Bultel, Jannik Dreier, Pascal Lafourcade, and Malika More. How to Explain Modern Security Concepts to your Children, Journal Cryptologia. PDF

[ADJL16] Karine Altisen, Stéphane Devismes, Raphael Jamet, and Pascal Lafourcade. SR3: Secure resilient reputation-based routing. Wirelesss Networks, 2016. PDF

[AGLM16] Affoua Thérese Aby, Alexandre Guitton, Pascal Lafourcade, and Michel Missson. History-based mac protocol for low duty-cycle wireless sensor networks: the slack-mac protocol. Journal of Mobile Communications and Applications, 2016. PDF

[BLM+16] Béatrice Bérard, Pascal Lafourcade, Laure Millet, Maria Potop-Butucaru, Yann Thierry-Mieg, and Sébastien Tixeuil. Formal verification of mobile robot protocols. Theoretical Computer Science (TCS), Elsevier, 2016. PDF

[DELL16] Jannik Dreier, Cristian Ene, Pascal Lafourcade, and Yassine Lakhnech. On the existence and decidability of unique decompositions of processes in the applied pi-calculus. Theoretical Computer Science, 612:102 - 125, 2016. PDF

[GLLSN16] Martin Gagné, Pascal Lafourcade, Yassine Lakhnech, and Reihaneh Safavi-Naini. Automated proofs of block cipher modes of operation. Journal of Automatic Reasoning, 56(1):49 - 94, 2016. PDF

2015

[DDL15] Jannik Dreier, Jean-Guillaume Dumas, and Pascal Lafourcade. Brandt's fully private auction protocol revisited. Journal of Computer Security Special Issue on Security and High Performance Computing Systems, 2015. PDF

[DGK+15a] Jannik Dreier, Rosario Giustolisi, Ali Kassem, Pascal Lafourcade, Gabriele Lenzin, and Peter Y.A. Ryan. Formal security analysis of traditional and electronic exams. In Communications in Computer and Information Science, volume Springer-Verlag, LNCS of CCIS, 2015.PDF

[MCL15] Ismail Mansour, Gérard Chalhoub, and Pascal Lafourcade. Key management in wireless sensor networks. Journal of Sensor and Actuator Networks, 4(3):251-273, 2015. PDF

2014

[ADGL14] Karine Altisen, Stéphane Devismes, Antoine Gerbaud, and Pascal Lafourcade. Comparison of mean hitting times for a degree-biased random walk. Discrete Applied Mathematics, 170 :104 - 109, 2014. PDF

[MCL14b] Ismail Mansour, Gérard Chalhoub, and Pascal Lafourcade. Evaluation of secure multi-hop node authentication and key establishment mechanisms for wireless sensor net- works. Journal of Sensor Actuator Networks, 3(3): 224-244, 2014. PDF

2011

[CDELL11] Judicael Courant, Marion Daubignard, Cristian Ene, Pascal Lafourcade, Yassine Lakhnech: Automated Proofs for Asymmetric Encryption. J. Autom. Reasoning 46(3-4): 261-291 (2011). PDF

2008

[DLLT08] Stéphanie Delaune, Pascal Lafourcade, Denis Lugiez and Ralf Treinen. Symbolic protocol analysis for monoidal equational theories. Information and Computation, 2008. PDF

2007

[LLT07] Pascal Lafourcade, Denis Lugiez and Ralf Treinen. Intruder Deduction for the Equational Theory of Abelian Groups with Distributive Encryption. Information and Computation 205(4), pages 581-623, 2007. PDF | PS | PS.GZ

[KL07] Bogdan Ksiezopolski and Pascal Lafourcade. Attack and revision of an electronic auction protocol using OFMC. Annales UMCS, Informatica, 6(1) :171-183, 2007. Technical Report

[Laf07a] Pascal Lafourcade. Intruder deduction for the equational theory of exclusive-or with commutative and distributive encryption. Electr. Notes Theor. Comput. Sci., 171(4) :37 - 57, 2007.

2006

[CDL06] Véronique Cortier, Stéphanie Delaune and Pascal Lafourcade. A Survey of Algebraic Properties Used in Cryptographic Protocols. Journal of Computer Security 14(1), pages 1-43, 2006. PDF | PS| PS.GZ

Conferences

2016

[GL16] David Gérault and Pascal Lafourcade. Related-key cryptanalysis of midori. In 17th International Conference on Cryptology in India, Indocrypt'16, December 11-14, Kolkata, 2016.PDF

[KGLR'16] Noudjoud Kahya, Nacira Ghoualmi, Pascal Lafourcade, Khelf Roumaissa, Formal Analysis of Key Management in mobile Wimax. The 2nd International Conference on Pattern Analysis and Intelligent Systems (IEEE) PAIS'16, November 16-17, 2016 Khenchela, Algeria. PDF

[DLOP16] Jean-Guillaume Dumas, Pascal Lafourcade, Jean-Baptiste Orfila, Maxime Puys, Private Multi-party Matrix Multiplication and Trust Computations, SECRYPT'16, Lisbon Portugal, Best Paper Award, PDF

[BBL16] Olivier Blazy, Xavier Bultel, and Pascal Lafourcade. Anonymizable ring signature without pairing. In 9th International Symposium on Foundations & Practice of Security (FPS 2016), Qubec city, QC, Canada, 24-25-26 October, 2016. PDF

[BBL16] Olivier Blazy, Xavier Bultel, Pascal Lafourcade, Two Secure Anonymous Proxy-based Data Storages, SECRYPT'16, Lisbon Portugal, PDF, Slides.

[BL16a] Xavier Bultel, Pascal Lafourcade, K-time Full Traceable Ring Signature. ARES 2016, Salzbourg, Austria. PDF Slides.

[BDDL16] Xavier Bultel, Jannik Dreir, Jean-Guillaume Dumas, and Pascal Lafourcade. Physical zeroknowledge proofs for Akari, Kakuro, Kenken and Takuzu. In FUN 2016: 8:1-8:20. PDF Slides

[BGG+16] Xavier Bultel, Sébastien Gambs, David Gérault, Pascal Lafourcade, Cristina Onete, and Jean-Marc Robert. Spade: A prover-anonymous and terrorist-fraud resistant distance bounding protocol. In Matthias Hollick, Panos Papadimitratos, William Enck, editors, Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, WISEC 2016, Darmstadt, Germany, July 18-22, 2016, pages 121-133. PDF

[PLL16] Maxime Puys, Marie-Laure Potet, and Pascal Lafourcade. Formal analysis of security properties on the opcua scada protocol. In SafeComp'16, 2016. PDF

[BL16b] Xavier Bultel and Pascal Lafourcade. A posteriori openable public key encryption. In IFIP Sec 2016, 2016. PDF Slides

2015

[PL15] Maxime Puys and Pascal Lafourcade. Performance Evaluations of Cryptographic Protocols. Verification Tools Dealing with Algebraic Properties. 8th International Symposium on Foundations & Practice of Security 26-28 October 2015 Clermont-Ferrand, France. PDF

[BGP15] Agnes Brelurut, David Géarault and Pascal Lafourcade. Survey of Distance Bounding Protocols and threats. 8th International Symposium on Foundations & Practice of Security 26-28 October 2015 Clermont-Ferrand, France. PDF Slides

[DGKLL15] Jannik Dreier, Rosario Giustolisi, Ali Kassem, Pascal Lafourcade, and Gabriele Lenzini: A Framework for Analyzing Verifiability in Traditional and Electronic Exams. ISPEC 2015, pages 514-529. PDF Slides

[KFL15] Ali Kassem, Yliès Falcone, and Pascal Lafourcade: Monitoring Electronic Exams. The 15th International Conference on Runtime Verification, September, 2015 Vienna, Austria. PDF Slides

[DKL'15] Jannik Dreier, Ali Kassem, and Pascal Lafourcade: Formal Analysis of E-Cash Protocols. In 11th International Joint Conference on e-Business and Telecommunications (SECRYPT 2015). PDF Slides.

[AGLM'15] Affoua Théràse Aby, Alexandre Guitton, Pascal Lafourcade, and Michel Misson. SLACK_MAC: Adaptive MAC Protocol for Low Duty-Cycle Wireless Sensor Networks. ADHOCNETS 2015. PDF

2014

[DGK+14] Jannik Dreier, Rosario Giustolisi, Ali Kassem, Pascal Lafourcade, Gabriele Lenzin,and Peter Y.A. Ryan. Formal analysis of electronic exams. In 11th International Joint Conference on e-Business and Telecommunications (SECRYPT 2014), 2014. Best Paper Award. PDF Slides

[DJL14] Jannik Dreier, Hugo Jonker, and Pascal Lafourcade. Secure auctions without cryptography. In Alfredo Ferro, Fabrizio Luccio, and Peter Widmayer, editors, Fun with Algorithms - 7th International Conference, FUN 2014, Lipari Island, Sicily, Italy, July 1-3, 2014. Proceedings, volume 8496 of Lecture Notes in Computer Science, pages 158-170. Springer, 2014. PDF

[JL14b] Raphël Jamet and Pascal Lafourcade. (In)corruptibility of routing protocols. In Foundations and Practice of Security - 7th International Symposium, FPS 2014, Montréal, Canada, 2014, Lecture Notes in Computer Science. Springer, 2014. Best Paper Award. PDF

[KLL14a] Ali Kassem, Pascal Lafourcade, and Yassine Lakhnech. Formal verification of e-reputation protocols. In Foundations and Practice of Security - 7th International Symposium, FPS 2014, Montréal, Canada, Lecture Notes in Computer Science. Springer, 2014. PDF

[KLL14c] Amrit Kumar, Pascal Lafourcade, and Cédric Lauradoux. Performances of cryptographic accumulators. In The 39th IEEE Conference on Local Computer Networks (LCN), 2014. PDF

[MCL+14a] Ismail Mansour, Gérard Chalhoub, Pascal Lafourcade, and Francois Delobel. Secure key renewal and revocation for wireless sensor networks. In The 39th IEEE Conference on Local Computer Networks (LCN), Edmonton, Canada, 2014. PDF

[MRC+14] Ismail Mansour, Damian Rusinek, Gérard Chalhoub, Pascal Lafourcade, and Bogdan Ksiezopolski. Multihop node authentication mechanisms for wireless sensor networks. In Song Guo, Jaime Lloret, Pietro Manzoni, and Stefan Ruehrup, editors, Ad-hoc, Mo- bile, and Wireless Networks - 13th International Conference, ADHOC-NOW 2014, Benidorm, Spain, June 22-27, 2014 Proceedings, volume 8487 of Lecture Notes in Computer Science, pages 402 - 418. Springer, 2014. PDF

2013
[DLL13] Jannik Dreier, Pascal Lafourcade, Yassine Lakhnech: Formal verification of e-auction protocols. In David A. Basin and John C. Mitchell, editors, POST, volume 7796 of Lecture Notes in Computer Science, pages 247 266. Springer, 2013. PDF Slides

[DJL13] Jannik Dreier, Hugo Jonker, and Pascal Lafourcade. Verifiability in e-auction protocols. In 8th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2013, Hangzhou, China, 2013. to appear. PDF

[ADJL13] Karine Altisen, Stéphane Devismes, Raphël Jamet, and Pascal Lafourcade. SR3: Secure resilient reputation-based routing. In The annual IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS 2013), Cambridge, Massachusetts, USA, may 2013. to appear. PDF

[DELL13] Jannik Dreier, Cristian Ene, Pascal Lafourcade, and Yassine Lakhnech. On unique decomposition of processes in the applied-calculus. In Frank Pfenning, editor, FoSSaCS, volume 7794 of Lecture Notes in Computer Science, pages 50-64. Springer, 2013. PDF Slides

[DDL13] Jannik Dreier, Jean-Guillaume Dumas, and Pascal Lafourcade. Brandt's fully private auction protocol revisited. In 6th International Conference on Cryptology in Africa Africacrypt 2013, Egypt, june 2013. to appear. PDF Slides

[GLL13] Martin Gagné, Pascal Lafourcade and Yassine Lakhnech. Automated security proofs for almost-universal hash for mac verification. In Jason Crampton, Sushil Jajodia, and Keith Mayes, editors, Computer Security - ESORICS 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings, volume 8134 of Lecture Notes in Computer Science, pages 291- 308. Springer, 2013. PDF Slides

[JL13] Raphël Jamet and Pascal Lafourcade. Discovering flaws in IDS through analysis of their inputs. In Jean Luc Danger, Mourad Debbabi, Jean-Yves Marion, Joaquin Garcia-Alfaro, and A. Nur Zincir-Heywood, editors, Foundations and Practice of Security - 6th International Symposium, FPS 2013, La Rochelle, France, October 21-22, 2013, Revised Selected Papers, volume 8352 of Lecture Notes in Computer Science. Springer, 2014. PDF

[KLL13] Ali Kassem, Pascal Lafourcade, and Yassine Lakhnech. A More Realistic Model for Verifying Route Validity in Ad-Hoc Networks. In Jean Luc Danger, Mourad Debbabi, Jean-Yves Marion, Joaquin Garcia-Alfaro, and A. Nur Zincir-Heywood, editors, Foun- dations and Practice of Security - 6th International Symposium, FPS 2013, La Rochelle, France, October 21-22, 2013, Revised Selected Papers, volume 8352 of Lecture Notes in Computer Science. Springer, 2014. PDF

2012

[DLL12] Jannik Dreier, Pascal Lafourcade, Yassine Lakhnech: Defining Privacy for Weighted Votes, Single and Multi-Voter Coercion. European Symposium on Research in Computer Security (ESORICS), 2012. PDF Slides

[AGDL12] Karine Altisen, Stéphane Devismes, Antoine Gerbaud, Pascal Lafourcade: Analysis of Random Walks Using Tabu Lists.. In Structural Information and Communication Complexity - 19th International Colloquium, SIROCCO 2012, Reykjavik, Iceland, June 30-July 2,2012.PDF

[DLL12b] Jannik Dreier, Pascal Lafourcade, Yassine Lakhnech. A Formal Taxonomy of Privacy in Voting Protocols. First IEEE International Workshop on Security and Forensics in Communication Systems (ICC'12 WS - SFCS), 2012. Technical Report Slides

[GKL12] Ghoualmi, Nacira and Kahya, Noudjoud and Lafourcade, Pascal Key Management Protocol in WIMAX revisited. In The Third International Conference on Communications Security and Information Assurance (CSIA 2012), 2012. PDF

2011

[FLA11] Fousse, Laurent and Lafourcade, Pascal and Alnuaimi, Mohamed: Benaloh's Dense Probabilistic Encryption Revisited. In Progress in Cryptology - AFRICACRYPT 2011 - 4th International Conference on Cryptology in Africa, Dakar, Senegal, July 5-7, 2011. Proceedings, 2011. PDF Slides

[DLL11] Jannik Dreier, Pascal Lafourcade, Yassine Lakhnech. Vote-Independence: A Powerful Privacy Notion for Voting Protocols. 4th Canada-France MITACS Workshop on Foundations & Practice of Security (FPS'11), 2011. PDF | Technical Report Slides

[GLLSN11] Martin Gagné,Pascal Lafourcade,Yassine Lakhnech,and Reihaneh Safavi-Naini. Automated verification of block cipher modes of operation, an improved method. In Joaquin Garcia-Alfaro and Pascal Lafourcade, editors, Foundations and Practice of Security - 4th Canada-France MITACS Workshop, FPS 2011, Paris, France, May 12-13, 2011, Revised Selected Papers, volume 6888 of Lecture Notes in Computer Science, pages 23 - 31. Springer, 2012. PDF Slides

[CDE+11]Judicael Courant, Marion Daubignard, Cristian Ene, Pascal Lafourcade, and Yassine Lakhnech. Automated proofs for asymmetric encryption. In Dennis Dams, Ulrich Han- nemann, and Martin Steffen, editors, Concurrency, Compositionality, and Correctness, Essays in Honor of Willem-Paul de Roever, volume 5930 of Lecture Notes in Computer Science, pages 300 - 321. Springer, 2011.PDF

2010

[JWESML10] Jérémie Tharaud, Sven Wohlgemuth, Isao Echizen, Noboru Sonehara, Gunter Muller, Pascal Lafourcade: Privacy by Data Provenance with Digital Watermarking - A Proof-of-Concept Implementation for Medical Services with Electronic Health Records. IIH-MSP 2010: 510-513 PDF

2009

[LTV09] Pascal Lafourcade, Vanessa Terrade and Sylvain Vigier Comparison of Cryptographic Verification Tools Dealing with Algebraic Properties . In Proceedings of the sixth International Workshop on Formal Aspects in Security and Trust (FAST2009), November 2009, Eindhoven, the Netherlands. PDF | PS| Slides

[CLN09] Cas J.F. Cremers, Pascal Lafourcade, and Philippe Nadeau. Comparing state spaces in automatic protocol analysis. Formal to Practical Security, 5458/2009: 70 - 94, 2009. PDF

[GLLS09] Martin Gagné, Pascal Lafourcade, Yassine Lakhnech, and Reihaneh Safavi-Naini Automated Proofs for Encryption Modes. In Proceedings of the 13th Annual Asian Computing Science Conference Focusing on Information Security and Privacy: Theory and Practice (ASIAN'09), October 2009. PDF | PS Slides

2008

[CDELL08a] Judicael Courant, Marion Daubignard, Cristian Ene, Pascal Lafourcade. and Yassine Lakhnech Towards Automated Proofs for Asymmetric Encryption Schemes in the Random Oracle Model. In Proceedings of the 15th ACM Conference on Computer and Communications Security, (CCS'08), October 2008, Alexandria USA. PDF | PS

2007

[Laf07] Pascal Lafourcade. Intruder Deduction for the Equational Theory of Exclusive-or with Commutative and Distributive Encryption. In Maribel Fernández and Claude Kirchner (eds.), Proceedings of the 1st International Workshop on Security and Rewriting Techniques (SecReT'06), Venice, Italy, July 2006, Electronic Notes in Theoretical Computer Science 171(4), pages 37-57. Elsevier Science Publishers, 2007. PDF | PS| PS.GZ | Slides

2006

[DLLT06] Stéphanie Delaune, Pascal Lafourcade, Denis Lugiez and Ralf Treinen. Symbolic Protocol Analysis in Presence of a Homomorphism Operator and Exclusive Or. In Michele Buglesi, Bart Preneel, Vladimiro Sassone and Ingo Wegener (eds.), Proceedings of the 33rd International Colloquium on Automata, Languages and Programming (ICALP'06) - Part II, Venice, Italy, July 2006, Lecture Notes in Computer Science 4052, pages 132-143. Springer. PDF | PS| PS.GZ | PDF (long version) | PS(long version) | PS.GZ (long version) | Slides

2005
[LLT05a] Pascal Lafourcade, Denis Lugiez and Ralf Treinen. Intruder Deduction for AC-like Equational Theories with Homomorphisms. In Juergen Giesl (ed.), Proceedings of the 16th International Conference on Rewriting Techniques and Applications (RTA'05), Nara, Japan, April 2005, Lecture Notes in Computer Science 3467, pages 308-322. Springer. PDF | PS| PS.GZ | PS(long version) | PS.GZ (long version) | Slides

Thesis

[Laf12] Pascal Lafourcade, Computer-Aider Security for : Cryptographic Primitives, Voting Protocols and Wireless Sensor Networks. Habilitation à diriger des recherches, Verimag, Grenoble, France, 11 2012. 192 pages. PDF

[Laf06] Pascal Lafourcade. Vérification des protocoles cryptographiques en présence de théories équationnelles. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France, September 2006. 209 pages. PDF | PS| PS.GZ | Slides

[Laf03] Pascal Lafourcade. Application de la résolution de conflits "logiques", à l'aide à la décision pour la résolution de aux conflits des problèmes d'ordonnancement. Rapport de DEA, DEA Représentation de la Connaissance et Fomalisation du Raisonnement, Toulouse, France, June 2003. 66 pages. PS| PS.GZ

Others

[ADLP11] Routage par marche aléatoire à listes tabous. Altisen, Karine and Devismes, Stéphane and Lafourcade, Pascal and Ponsonnet, Clément (in Algotel, 2011). PDF

[GLLS09] Martin Gagné, Pascal Lafourcade, Yassine Lakhnech, and Reihaneh Safavi-Naini Automated Proofs for Encryption Modes. In Proceedings of the Workshop on Formal and Computational Cryptography, (FCC'09), July 2009, PortJefferson NY, USA. PDF | PS Slides

[ML09] Sreekanth Malladi, Pascal Lafourcade, Prudent engineering practices to prevent type-flaw attacks under algebraic properties . In Proceedings of the Workshop on Security and Rewriting Techniques, (Secret'09) July 2009, PortJefferson NY, USA. PDF | PS

[Laf08] Pascal Lafourcade. Relation between Unification Problem and Intruder Deduction Problem. In Proceedings of the 3rd International Workshop on Security and Rewriting Techniques (SecReT'08), Pittsburgh, PA USA, June , 2008. PDF | PS

[CDELL08b] Judicael Courant, Marion Daubignard, Cristian Ene, Pascal Lafourcade. and Yassine Lakhnech Automated Proofs for Asymmetric Encryption. In Proceedings of the Workshop on Formal and Computational Cryptography, (FCC'08), June 2008, Pittsburgh PA, USA. PDF | PS

[CDELL08c] Judicael Courant, Marion Daubignard, Cristian Ene, Pascal Lafourcade. and Yassine Lakhnech Automated Proofs for Asymmetric Encryption. In Proceedings of the Workshop on Foundations of Computer Security, Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, (FCS-ARSPA-WITS'08), June 2008, Pittsburgh PA, USA. PDF | PS

[CL07] Cas Cremers and Pascal Lafourcade. Comparing State Spaces in Automatic Security Protocol Verification. In Michael Goldsmith and Bill Roscoe (eds.), Proceedings of the 7th International Workshop on Automated Verification of Critical Systems (AVoCS'07), Oxford, UK, September 2007, Electronic Notes in Theoretical Computer Science, pages 49-63. Elsevier Science Publishers. PDF PDF

[KL07] Bogdan Ksiezopolski and Pascal Lafourcade. Attack and Revison of an Electronic Auction Protocol using OFMC. Technical Report 549, Department of Computer Science, ETH Zurich, Switzerland, February 2007. 13 pages. PDF

[LLT06] Pascal Lafourcade, Denis Lugiez and Ralf Treinen. ACUNh: Unification and Disunification Using Automata Theory. In Jordi Levy (ed.), Proceedings of the 20th International Workshop on Unification (UNIF'06), Seattle, Washington, USA, August 2006, pages 6-20. PDF | PS| PS.GZ

[LLT05b] Pascal Lafourcade, Denis Lugiez and Ralf Treinen. Intruder Deduction for the Equational Theory of Exclusive-or with Distributive Encryption. Research Report LSV-05-19, Laboratoire Spécification et Vérification, ENS Cachan, France, October 2005. 39 pages. PDF | PS| PS.GZ

[BCC+04] Vincent Bernat, Hubert Comon-Lundh, Véronique Cortier, Stéphanie Delaune, Florent Jacquemard, Pascal Lafourcade, Yassine Lakhnech and Laurent Mazaré. Sufficient conditions on properties for an automated verification: theoretical report on the verification of protocols for an extended model of the intruder. Technical Report 4, projet RNTL PROUVé, December 2004. 33 pages. PS| PS.GZ

[Laf03] Pascal Lafourcade. Application de la résolution de conflits 'logiques', à l'aide à la décision pour la résolution de aux conflits des problèmes d'ordonnancement. Rapport de DEA, DEA Représentation de la Connaissance et Fomalisation du Raisonnement, Toulouse, France, June 2003. 66 pages. PS| PS.GZ