Stéphanie Delaune

From MaRDI portal
Person:391120

Available identifiers

zbMath Open delaune.stephanieMaRDI QIDQ391120

List of research outcomes





PublicationDate of PublicationType
A simpler model for recovering superpoly on Trivium2024-10-14Paper
New algorithm for exhausting optimal permutations for generalized Feistel networks2023-08-14Paper
One vote is enough for analysing privacy2023-07-21Paper
Automatic Generation of Sources Lemmas in Tamarin: Towards Automatic Proofs of Security Protocols2022-12-22Paper
Efficiently deciding equivalence for standard primitives and phases2022-08-25Paper
POR for security protocol equivalences. Beyond action-determinism2022-08-25Paper
Checking trace equivalence: how to get rid of nonces?2022-08-19Paper
A Symbolic Framework to Analyse Physical Proximity in Security Protocols2022-07-21Paper
Analysing privacy-type properties in cryptographic protocols (invited talk)2021-06-15Paper
A decidable class of security protocols for both reachability and equivalence properties2021-06-09Paper
Typing messages for free in security protocols2019-11-22Paper
Partial order reduction for security protocols2017-09-12Paper
A procedure for deciding symbolic equivalence between sets of constraint systems2017-08-08Paper
From security protocols to pushdown automata2017-07-12Paper
A reduced semantics for deciding trace equivalence2017-06-22Paper
A survey of symbolic methods for establishing equivalence-based properties in cryptographic protocols2017-02-22Paper
YAPA: a generic tool for computing intruder knowledge2015-09-17Paper
Modeling and verifying ad hoc routing protocols2014-10-20Paper
Deducibility constraints and blind signatures2014-10-20Paper
Typing messages for free in security protocols: the case of equivalence properties2014-09-15Paper
Composition of password-based protocols2014-06-30Paper
Dynamic tags for security protocols2014-06-23Paper
Deciding equivalence-based properties using constraint solving2014-01-10Paper
From security protocols to pushdown automata2013-08-07Paper
Formal analysis of privacy for routing protocols in mobile ad hoc networks2013-08-06Paper
Simulation based security in the applied pi calculus2012-10-24Paper
Security Protocols, Constraint Systems, and Group Theories2012-09-05Paper
Transforming password protocols to compose2012-08-31Paper
Formal Analysis of Privacy for Anonymous Location Based Services2012-08-22Paper
Computing knowledge in security protocols under convergent equational theories2012-07-17Paper
Decidability and combination results for two notions of knowledge in security protocols2012-07-17Paper
Analysing routing protocols: four nodes topologies are sufficient2012-06-29Paper
Deciding security for protocols with recursive tests2011-07-29Paper
Automating security analysis: symbolic equivalence of constraint systems2010-09-14Paper
Verifying privacy-type properties of electronic voting protocols: a taster2010-06-17Paper
Deducibility constraints2010-01-14Paper
Easy intruder deduction problems with homomorphisms2009-12-18Paper
Computing Knowledge in Security Protocols under Convergent Equational Theories2009-07-28Paper
Safely composing security protocols2009-07-06Paper
YAPA: A Generic Tool for Computing Intruder Knowledge2009-06-30Paper
Deducibility Constraints, Equational Theory and Electronic Money2009-03-06Paper
From One Session to Many: Dynamic Tags for Security Protocols2009-01-27Paper
Combining Algorithms for Deciding Knowledge in Security Protocols2008-09-16Paper
Deciding Knowledge in Security Protocols for Monoidal Equational Theories2008-05-15Paper
Protocol Verification Via Rigid/Flexible Resolution2008-05-15Paper
Symbolic Bisimulation for the Applied Pi Calculus2008-04-24Paper
Safely Composing Security Protocols2008-04-24Paper
Symbolic protocol analysis for monoidal equational theories2008-04-16Paper
Symbolic Protocol Analysis in Presence of a Homomorphism Operator and Exclusive Or2007-09-11Paper
Associative-Commutative Deducibility Constraints2007-09-03Paper
Decision procedures for the security of protocols with probabilistic encryption against offline dictionary attacks2007-01-30Paper
An undecidability result for AGh2007-01-22Paper
Term Rewriting and Applications2005-11-11Paper

Research outcomes over time

This page was built for person: Stéphanie Delaune