Pascal Lafourcade

From MaRDI portal
Person:287324

Available identifiers

zbMath Open lafourcade.pascalDBLPl/PascalLafourcadeWikidataQ76281399 ScholiaQ76281399MaRDI QIDQ287324

List of research outcomes

PublicationDate of PublicationType
Secure Multiparty Matrix Multiplication Based on Strassen-Winograd Algorithm2024-03-14Paper
Optimal exclusive perpetual grid exploration by luminous myopic opaque robots with common chirality2023-10-17Paper
Perpetual torus exploration by myopic luminous robots2023-10-17Paper
Physical ZKP protocols for Nurimisaki and Kurodoko2023-09-07Paper
Protego: efficient, revocable and auditable anonymous credentials with applications to hyperledger fabric2023-08-14Paper
Hide a liar: card-based ZKP protocol for Usowan2023-08-04Paper
Physical zero-knowledge proof for Makaro2023-08-02Paper
Unlinkable and strongly accountable sanitizable signatures from verifiable ring signatures2023-08-02Paper
Shadoks Approach to Low-Makespan Coordinated Motion Planning2023-06-26Paper
Perpetual torus exploration by myopic luminous robots2023-06-12Paper
Card-based ZKP protocol for Nurimisaki2023-06-12Paper
Secure cumulative reward maximization in linear stochastic bandits2023-03-21Paper
Physical Zero-Knowledge Proof for Suguru Puzzle2023-03-21Paper
Finding water on Poleless using melomaniac myopic chameleon robots2023-02-07Paper
Card-based ZKP protocols for Takuzu and Juosan2023-02-07Paper
A physical ZKP for Slitherlink: how to perform physical topology-preserving computation2022-08-30Paper
Secure best arm identification in multi-armed bandits2022-08-30Paper
Improved Constructions of Anonymous Credentials from Structure-Preserving Signatures on Equivalence Classes2022-07-08Paper
Generic plaintext equality and inequality proofs2022-06-17Paper
Physical zero-knowledge proof and NP-completeness proof of Suguru puzzle2022-06-08Paper
SAMBA: A Generic Framework for Secure Federated Multi-Armed Bandits2022-05-16Paper
Interactive physical ZKP for connectivity: applications to Nurikabe and Hitori2022-03-22Paper
How to construct physical zero-knowledge proofs for puzzles with a ``single loop condition2021-09-27Paper
A faster cryptographer's Conspiracy Santa2020-09-03Paper
https://portal.mardi4nfdi.de/entity/Q33057312020-08-11Paper
About blockchain interoperability2020-08-04Paper
Optimal Threshold Padlock Systems2020-04-24Paper
Infinite grid exploration by disoriented robots2020-03-03Paper
Interactive physical zero-knowledge proof for Norinori2020-02-24Paper
Efficient invisible and unlinkable sanitizable signatures2020-01-28Paper
Computing AES related-key differential characteristics with constraint programming2020-01-20Paper
DABSTERS: a privacy preserving e-voting protocol for permissioned blockchain2019-12-12Paper
Anonymizable ring signature without pairing2018-12-07Paper
Verifiable private polynomial evaluation2018-11-07Paper
Revisiting AES related-key differential attacks with constraint programming2018-10-19Paper
Formal analysis and offline monitoring of electronic exams2017-09-08Paper
https://portal.mardi4nfdi.de/entity/Q52828062017-07-17Paper
Formal verification of mobile robot protocols2017-06-22Paper
Related-Key Cryptanalysis of Midori2016-12-21Paper
Automated proofs of block cipher modes of operation2016-05-26Paper
On the existence and decidability of unique decompositions of processes in the applied \(\pi\)-calculus2015-12-15Paper
Comparison of mean hitting times for a degree-biased random walk2014-05-06Paper
Formal Verification of e-Auction Protocols2013-08-06Paper
Brandt’s Fully Private Auction Protocol Revisited2013-06-07Paper
On Unique Decomposition of Processes in the Applied π-Calculus2013-03-18Paper
Analysis of Random Walks Using Tabu Lists2012-09-26Paper
Automated Verification of Block Cipher Modes of Operation, an Improved Method2012-06-08Paper
Vote-Independence: A Powerful Privacy Notion for Voting Protocols2012-06-08Paper
Benaloh’s Dense Probabilistic Encryption Revisited2011-06-29Paper
Automated proofs for asymmetric encryption2011-06-03Paper
Automated Proofs for Asymmetric Encryption2010-03-09Paper
Automated Security Proof for Symmetric Encryption Modes2010-01-14Paper
Comparing State Spaces in Automatic Security Protocol Analysis2009-06-09Paper
Symbolic protocol analysis for monoidal equational theories2008-04-16Paper
Symbolic Protocol Analysis in Presence of a Homomorphism Operator and Exclusive Or2007-09-11Paper
Intruder deduction for the equational theory of abelian groups with distributive encryption2007-04-16Paper
Term Rewriting and Applications2005-11-11Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Pascal Lafourcade