Pascal Lafourcade

From MaRDI portal
Person:287324

Available identifiers

zbMath Open lafourcade.pascalDBLPl/PascalLafourcadeWikidataQ76281399 ScholiaQ76281399MaRDI QIDQ287324

List of research outcomes





PublicationDate of PublicationType
Experiment artifacts for ASIACCS 2025 submission #1752025-01-10Dataset
Conflict optimization for binary CSP applied to minimum partition into plane subgraphs and graph coloring2024-07-26Paper
Practical construction for secure trick-taking games even with cards set aside2024-07-17Paper
Beedroids: how luminous autonomous swarms of UAVs can save the world?2024-05-16Paper
Local search with weighting schemes for the CG:SHOP 2022 competition (CG challenge)2024-05-14Paper
Secure Multiparty Matrix Multiplication Based on Strassen-Winograd Algorithm2024-03-14Paper
Perpetual torus exploration by myopic luminous robots2023-10-17Paper
Optimal exclusive perpetual grid exploration by luminous myopic opaque robots with common chirality2023-10-17Paper
Physical ZKP protocols for Nurimisaki and Kurodoko2023-09-07Paper
Protego: efficient, revocable and auditable anonymous credentials with applications to hyperledger fabric2023-08-14Paper
Hide a liar: card-based ZKP protocol for Usowan2023-08-04Paper
Physical zero-knowledge proof for Makaro2023-08-02Paper
Unlinkable and strongly accountable sanitizable signatures from verifiable ring signatures2023-08-02Paper
Shadoks Approach to Low-Makespan Coordinated Motion Planning2023-06-26Paper
Perpetual torus exploration by myopic luminous robots2023-06-12Paper
Card-based ZKP protocol for Nurimisaki2023-06-12Paper
Physical Zero-Knowledge Proof for Suguru Puzzle2023-03-21Paper
Secure cumulative reward maximization in linear stochastic bandits2023-03-21Paper
Card-based ZKP protocols for Takuzu and Juosan2023-02-07Paper
Finding water on Poleless using melomaniac myopic chameleon robots2023-02-07Paper
A physical ZKP for Slitherlink: how to perform physical topology-preserving computation2022-08-30Paper
Secure best arm identification in multi-armed bandits2022-08-30Paper
Improved Constructions of Anonymous Credentials from Structure-Preserving Signatures on Equivalence Classes2022-07-08Paper
Generic plaintext equality and inequality proofs2022-06-17Paper
Physical zero-knowledge proof and NP-completeness proof of Suguru puzzle2022-06-08Paper
SAMBA: A Generic Framework for Secure Federated Multi-Armed Bandits2022-05-16Paper
Interactive physical ZKP for connectivity: applications to Nurikabe and Hitori2022-03-22Paper
How to construct physical zero-knowledge proofs for puzzles with a ``single loop condition2021-09-27Paper
A faster cryptographer's Conspiracy Santa2020-09-03Paper
https://portal.mardi4nfdi.de/entity/Q33057312020-08-11Paper
About blockchain interoperability2020-08-04Paper
Optimal Threshold Padlock Systems2020-04-24Paper
Infinite grid exploration by disoriented robots2020-03-03Paper
Interactive physical zero-knowledge proof for Norinori2020-02-24Paper
Efficient invisible and unlinkable sanitizable signatures2020-01-28Paper
Computing AES related-key differential characteristics with constraint programming2020-01-20Paper
DABSTERS: a privacy preserving e-voting protocol for permissioned blockchain2019-12-12Paper
Anonymizable ring signature without pairing2018-12-07Paper
Verifiable private polynomial evaluation2018-11-07Paper
Revisiting AES related-key differential attacks with constraint programming2018-10-19Paper
Formal analysis and offline monitoring of electronic exams2017-09-08Paper
https://portal.mardi4nfdi.de/entity/Q52828062017-07-17Paper
Formal verification of mobile robot protocols2017-06-22Paper
Related-Key Cryptanalysis of Midori2016-12-21Paper
Automated proofs of block cipher modes of operation2016-05-26Paper
On the existence and decidability of unique decompositions of processes in the applied \(\pi\)-calculus2015-12-15Paper
Comparison of mean hitting times for a degree-biased random walk2014-05-06Paper
Formal Verification of e-Auction Protocols2013-08-06Paper
Brandt’s Fully Private Auction Protocol Revisited2013-06-07Paper
On Unique Decomposition of Processes in the Applied π-Calculus2013-03-18Paper
Analysis of Random Walks Using Tabu Lists2012-09-26Paper
Automated Verification of Block Cipher Modes of Operation, an Improved Method2012-06-08Paper
Vote-Independence: A Powerful Privacy Notion for Voting Protocols2012-06-08Paper
Benaloh's dense probabilistic encryption revisited2011-06-29Paper
Automated proofs for asymmetric encryption2011-06-03Paper
Automated proofs for asymmetric encryption2010-03-09Paper
Automated security proof for symmetric encryption modes2010-01-14Paper
Comparing State Spaces in Automatic Security Protocol Analysis2009-06-09Paper
Symbolic protocol analysis for monoidal equational theories2008-04-16Paper
Symbolic Protocol Analysis in Presence of a Homomorphism Operator and Exclusive Or2007-09-11Paper
Intruder deduction for the equational theory of abelian groups with distributive encryption2007-04-16Paper
Term Rewriting and Applications2005-11-11Paper

Research outcomes over time

This page was built for person: Pascal Lafourcade