Pascal Lafourcade

From MaRDI portal
(Redirected from Person:287324)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Experiment artifacts for ASIACCS 2025 submission #1752025-01-10Dataset
Conflict optimization for binary CSP applied to minimum partition into plane subgraphs and graph coloring
ACM Journal of Experimental Algorithmics
2024-07-26Paper
Practical construction for secure trick-taking games even with cards set aside2024-07-17Paper
Beedroids: how luminous autonomous swarms of UAVs can save the world?2024-05-16Paper
Local search with weighting schemes for the CG:SHOP 2022 competition (CG challenge)2024-05-14Paper
Secure Multiparty Matrix Multiplication Based on Strassen-Winograd Algorithm2024-03-14Paper
Perpetual torus exploration by myopic luminous robots
Theoretical Computer Science
2023-10-17Paper
Optimal exclusive perpetual grid exploration by luminous myopic opaque robots with common chirality
Theoretical Computer Science
2023-10-17Paper
Physical ZKP protocols for Nurimisaki and Kurodoko
Theoretical Computer Science
2023-09-07Paper
Protego: efficient, revocable and auditable anonymous credentials with applications to hyperledger fabric
Lecture Notes in Computer Science
2023-08-14Paper
Hide a liar: card-based ZKP protocol for Usowan
Lecture Notes in Computer Science
2023-08-04Paper
Physical zero-knowledge proof for Makaro
Lecture Notes in Computer Science
2023-08-02Paper
Unlinkable and strongly accountable sanitizable signatures from verifiable ring signatures
Cryptology and Network Security
2023-08-02Paper
Shadoks Approach to Low-Makespan Coordinated Motion Planning
ACM Journal of Experimental Algorithmics
2023-06-26Paper
Perpetual torus exploration by myopic luminous robots
Lecture Notes in Computer Science
2023-06-12Paper
Card-based ZKP protocol for Nurimisaki
Lecture Notes in Computer Science
2023-06-12Paper
Physical Zero-Knowledge Proof for Suguru Puzzle2023-03-21Paper
Secure cumulative reward maximization in linear stochastic bandits2023-03-21Paper
Card-based ZKP protocols for Takuzu and Juosan2023-02-07Paper
Finding water on Poleless using melomaniac myopic chameleon robots2023-02-07Paper
A physical ZKP for Slitherlink: how to perform physical topology-preserving computation2022-08-30Paper
Secure best arm identification in multi-armed bandits2022-08-30Paper
Improved constructions of anonymous credentials from structure-preserving signatures on equivalence classes
Public-Key Cryptography – PKC 2022
2022-07-08Paper
Generic plaintext equality and inequality proofs2022-06-17Paper
Physical zero-knowledge proof and NP-completeness proof of Suguru puzzle
Information and Computation
2022-06-08Paper
SAMBA: A Generic Framework for Secure Federated Multi-Armed Bandits
Journal of Artificial Intelligence Research
2022-05-16Paper
Interactive physical ZKP for connectivity: applications to Nurikabe and Hitori2022-03-22Paper
How to construct physical zero-knowledge proofs for puzzles with a ``single loop condition
Theoretical Computer Science
2021-09-27Paper
A faster cryptographer's Conspiracy Santa
Theoretical Computer Science
2020-09-03Paper
A cryptographer's Conspiracy Santa2020-08-11Paper
About blockchain interoperability
Information Processing Letters
2020-08-04Paper
Optimal Threshold Padlock Systems2020-04-24Paper
Infinite grid exploration by disoriented robots
(available as arXiv preprint)
2020-03-03Paper
Interactive physical zero-knowledge proof for Norinori2020-02-24Paper
Efficient invisible and unlinkable sanitizable signatures2020-01-28Paper
Computing AES related-key differential characteristics with constraint programming
Artificial Intelligence
2020-01-20Paper
DABSTERS: a privacy preserving e-voting protocol for permissioned blockchain2019-12-12Paper
Anonymizable ring signature without pairing2018-12-07Paper
Verifiable private polynomial evaluation2018-11-07Paper
Revisiting AES related-key differential attacks with constraint programming
Information Processing Letters
2018-10-19Paper
Formal analysis and offline monitoring of electronic exams
Formal Methods in System Design
2017-09-08Paper
Physical zero-knowledge proofs for Akari, Takuzu, Kakuro and KenKen
(available as arXiv preprint)
2017-07-17Paper
Formal verification of mobile robot protocols
Distributed Computing
2017-06-22Paper
Related-Key Cryptanalysis of Midori
Progress in Cryptology – INDOCRYPT 2016
2016-12-21Paper
Automated proofs of block cipher modes of operation
Journal of Automated Reasoning
2016-05-26Paper
On the existence and decidability of unique decompositions of processes in the applied \(\pi\)-calculus
Theoretical Computer Science
2015-12-15Paper
Comparison of mean hitting times for a degree-biased random walk
Discrete Applied Mathematics
2014-05-06Paper
Formal verification of e-auction protocols
Lecture Notes in Computer Science
2013-08-06Paper
Brandt's fully private auction protocol revisited
Progress in Cryptology – AFRICACRYPT 2013
2013-06-07Paper
On unique decomposition of processes in the applied \(\pi\)-calculus
Lecture Notes in Computer Science
2013-03-18Paper
Analysis of random walks using tabu lists
Structural Information and Communication Complexity
2012-09-26Paper
Automated verification of block cipher modes of operation, an improved method
Foundations and Practice of Security
2012-06-08Paper
Vote-independence: a powerful privacy notion for voting protocols
Foundations and Practice of Security
2012-06-08Paper
Benaloh's dense probabilistic encryption revisited
Lecture Notes in Computer Science
2011-06-29Paper
Automated proofs for asymmetric encryption
Journal of Automated Reasoning
2011-06-03Paper
Automated proofs for asymmetric encryption
Concurrency, Compositionality, and Correctness
2010-03-09Paper
Automated security proof for symmetric encryption modes
Advances in Computer Science - ASIAN 2009. Information Security and Privacy
2010-01-14Paper
Comparing State Spaces in Automatic Security Protocol Analysis
Formal to Practical Security
2009-06-09Paper
Symbolic protocol analysis for monoidal equational theories
Information and Computation
2008-04-16Paper
Symbolic Protocol Analysis in Presence of a Homomorphism Operator and Exclusive Or
Automata, Languages and Programming
2007-09-11Paper
Intruder deduction for the equational theory of abelian groups with distributive encryption
Information and Computation
2007-04-16Paper
Term Rewriting and Applications
Lecture Notes in Computer Science
2005-11-11Paper


Research outcomes over time


This page was built for person: Pascal Lafourcade