Pascal Lafourcade

From MaRDI portal


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Experiment artifacts for ASIACCS 2025 submission #175
 
2025-01-10Dataset
Conflict optimization for binary CSP applied to minimum partition into plane subgraphs and graph coloring
ACM Journal of Experimental Algorithmics
2024-07-26Paper
Practical construction for secure trick-taking games even with cards set aside
 
2024-07-17Paper
Beedroids: how luminous autonomous swarms of UAVs can save the world?
 
2024-05-16Paper
Local search with weighting schemes for the CG:SHOP 2022 competition (CG challenge)
 
2024-05-14Paper
Secure Multiparty Matrix Multiplication Based on Strassen-Winograd Algorithm
 
2024-03-14Paper
Perpetual torus exploration by myopic luminous robots
Theoretical Computer Science
2023-10-17Paper
Optimal exclusive perpetual grid exploration by luminous myopic opaque robots with common chirality
Theoretical Computer Science
2023-10-17Paper
Physical ZKP protocols for Nurimisaki and Kurodoko
Theoretical Computer Science
2023-09-07Paper
Protego: efficient, revocable and auditable anonymous credentials with applications to hyperledger fabric
Lecture Notes in Computer Science
2023-08-14Paper
Hide a liar: card-based ZKP protocol for Usowan
Lecture Notes in Computer Science
2023-08-04Paper
Physical zero-knowledge proof for Makaro
Lecture Notes in Computer Science
2023-08-02Paper
Unlinkable and strongly accountable sanitizable signatures from verifiable ring signatures
Cryptology and Network Security
2023-08-02Paper
Shadoks Approach to Low-Makespan Coordinated Motion Planning
ACM Journal of Experimental Algorithmics
2023-06-26Paper
Perpetual torus exploration by myopic luminous robots
Lecture Notes in Computer Science
2023-06-12Paper
Card-based ZKP protocol for Nurimisaki
Lecture Notes in Computer Science
2023-06-12Paper
Physical Zero-Knowledge Proof for Suguru Puzzle
 
2023-03-21Paper
Secure cumulative reward maximization in linear stochastic bandits
 
2023-03-21Paper
Card-based ZKP protocols for Takuzu and Juosan
 
2023-02-07Paper
Finding water on Poleless using melomaniac myopic chameleon robots
 
2023-02-07Paper
A physical ZKP for Slitherlink: how to perform physical topology-preserving computation
 
2022-08-30Paper
Secure best arm identification in multi-armed bandits
 
2022-08-30Paper
Improved constructions of anonymous credentials from structure-preserving signatures on equivalence classes
Public-Key Cryptography – PKC 2022
2022-07-08Paper
Generic plaintext equality and inequality proofs
 
2022-06-17Paper
Physical zero-knowledge proof and NP-completeness proof of Suguru puzzle
Information and Computation
2022-06-08Paper
SAMBA: A Generic Framework for Secure Federated Multi-Armed Bandits
Journal of Artificial Intelligence Research
2022-05-16Paper
Interactive physical ZKP for connectivity: applications to Nurikabe and Hitori
 
2022-03-22Paper
How to construct physical zero-knowledge proofs for puzzles with a ``single loop condition
Theoretical Computer Science
2021-09-27Paper
A faster cryptographer's Conspiracy Santa
Theoretical Computer Science
2020-09-03Paper
A cryptographer's Conspiracy Santa
 
2020-08-11Paper
About blockchain interoperability
Information Processing Letters
2020-08-04Paper
Optimal Threshold Padlock Systems
 
2020-04-24Paper
Infinite grid exploration by disoriented robots
 
2020-03-03Paper
Interactive physical zero-knowledge proof for Norinori
 
2020-02-24Paper
Efficient invisible and unlinkable sanitizable signatures
 
2020-01-28Paper
Computing AES related-key differential characteristics with constraint programming
Artificial Intelligence
2020-01-20Paper
DABSTERS: a privacy preserving e-voting protocol for permissioned blockchain
 
2019-12-12Paper
Anonymizable ring signature without pairing
 
2018-12-07Paper
Verifiable private polynomial evaluation
 
2018-11-07Paper
Revisiting AES related-key differential attacks with constraint programming
Information Processing Letters
2018-10-19Paper
Formal analysis and offline monitoring of electronic exams
Formal Methods in System Design
2017-09-08Paper
Physical zero-knowledge proofs for Akari, Takuzu, Kakuro and KenKen
 
2017-07-17Paper
Formal verification of mobile robot protocols
Distributed Computing
2017-06-22Paper
Related-Key Cryptanalysis of Midori
Progress in Cryptology – INDOCRYPT 2016
2016-12-21Paper
Automated proofs of block cipher modes of operation
Journal of Automated Reasoning
2016-05-26Paper
On the existence and decidability of unique decompositions of processes in the applied \(\pi\)-calculus
Theoretical Computer Science
2015-12-15Paper
Comparison of mean hitting times for a degree-biased random walk
Discrete Applied Mathematics
2014-05-06Paper
Formal verification of e-auction protocols
Lecture Notes in Computer Science
2013-08-06Paper
Brandt's fully private auction protocol revisited
Progress in Cryptology – AFRICACRYPT 2013
2013-06-07Paper
On unique decomposition of processes in the applied \(\pi\)-calculus
Lecture Notes in Computer Science
2013-03-18Paper
Analysis of random walks using tabu lists
Structural Information and Communication Complexity
2012-09-26Paper
Automated verification of block cipher modes of operation, an improved method
Foundations and Practice of Security
2012-06-08Paper
Vote-independence: a powerful privacy notion for voting protocols
Foundations and Practice of Security
2012-06-08Paper
Benaloh's dense probabilistic encryption revisited
Lecture Notes in Computer Science
2011-06-29Paper
Automated proofs for asymmetric encryption
Journal of Automated Reasoning
2011-06-03Paper
Automated proofs for asymmetric encryption
Concurrency, Compositionality, and Correctness
2010-03-09Paper
Automated security proof for symmetric encryption modes
Advances in Computer Science - ASIAN 2009. Information Security and Privacy
2010-01-14Paper
Comparing State Spaces in Automatic Security Protocol Analysis
Formal to Practical Security
2009-06-09Paper
Symbolic protocol analysis for monoidal equational theories
Information and Computation
2008-04-16Paper
Symbolic Protocol Analysis in Presence of a Homomorphism Operator and Exclusive Or
Automata, Languages and Programming
2007-09-11Paper
Intruder deduction for the equational theory of abelian groups with distributive encryption
Information and Computation
2007-04-16Paper
Term Rewriting and Applications
Lecture Notes in Computer Science
2005-11-11Paper


Research outcomes over time


This page was built for person: Pascal Lafourcade