Yassine Lakhnech

From MaRDI portal
(Redirected from Person:673879)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Synthesizing different development paradigms: combining top-down with bottom-up reasoning about distributed systems
Lecture Notes in Computer Science
2017-01-19Paper
Automated proofs of block cipher modes of operation
Journal of Automated Reasoning
2016-05-26Paper
On the existence and decidability of unique decompositions of processes in the applied \(\pi\)-calculus
Theoretical Computer Science
2015-12-15Paper
Mind the gap: modular machine-checked proofs of one-round key exchange protocols
Advances in Cryptology - EUROCRYPT 2015
2015-09-30Paper
Verifying untimed and timed aspects of the experimental batch plant
European Journal of Control
2014-08-07Paper
Computational soundness of symbolic analysis for protocols using hash functions
Electronic Notes in Theoretical Computer Science
2013-12-13Paper
CIL security proof for a password-based key exchange
Provable Security
2013-10-23Paper
Formal verification of e-auction protocols
Lecture Notes in Computer Science
2013-08-06Paper
Networks of processes with parameterized state space
Electronic Notes in Theoretical Computer Science
2013-05-10Paper
On unique decomposition of processes in the applied \(\pi\)-calculus
Lecture Notes in Computer Science
2013-03-18Paper
Automated verification of block cipher modes of operation, an improved method
Foundations and Practice of Security
2012-06-08Paper
Vote-independence: a powerful privacy notion for voting protocols
Foundations and Practice of Security
2012-06-08Paper
A computational indistinguishability logic for the bounded storage model
Foundations and Practice of Security
2012-06-08Paper
Certified security proofs of cryptographic protocols in the computational model: an application to intrusion resilience
Certified Programs and Proofs
2011-11-22Paper
Automated proofs for asymmetric encryption
Journal of Automated Reasoning
2011-06-03Paper
scientific article; zbMATH DE number 5898709 (Why is no real title available?)2011-05-20Paper
Beyond provable security verifiable IND-CCA security of OAEP
Topics in Cryptology – CT-RSA 2011
2011-02-11Paper
On the equality of probabilistic terms
Logic for Programming, Artificial Intelligence, and Reasoning
2011-01-07Paper
Abstraction as the key for invariant verification
Lecture Notes in Computer Science
2010-03-23Paper
Automated proofs for asymmetric encryption
Concurrency, Compositionality, and Correctness
2010-03-09Paper
Automated security proof for symmetric encryption modes
Advances in Computer Science - ASIAN 2009. Information Security and Privacy
2010-01-14Paper
Formal Indistinguishability Extended to the Random Oracle Model
Computer Security – ESORICS 2009
2009-10-16Paper
Flat Parametric Counter Automata
Fundamenta Informaticae
2009-06-23Paper
A Generalization of DDH with Applications to Protocol Analysis and Computational Soundness
Advances in Cryptology - CRYPTO 2007
2009-03-10Paper
Computationally Sound Typing for Non-interference: The Case of Deterministic Encryption
FSTTCS 2007: Foundations of Software Technology and Theoretical Computer Science
2008-04-24Paper
Foundations of Software Science and Computation Structures
Lecture Notes in Computer Science
2007-09-28Paper
Flat Parametric Counter Automata
Automata, Languages and Programming
2007-09-11Paper
A symbolic decision procedure for cryptographic protocols with time stamps
The Journal of Logic and Algebraic Programming
2005-10-07Paper
Programming Languages and Systems
Lecture Notes in Computer Science
2005-09-13Paper
Static Analysis
Lecture Notes in Computer Science
2005-08-24Paper
CONCUR 2004 - Concurrency Theory
Lecture Notes in Computer Science
2005-08-23Paper
scientific article; zbMATH DE number 2102702 (Why is no real title available?)2004-09-24Paper
scientific article; zbMATH DE number 2086524 (Why is no real title available?)2004-08-11Paper
scientific article; zbMATH DE number 1956589 (Why is no real title available?)2003-07-30Paper
scientific article; zbMATH DE number 1836375 (Why is no real title available?)2003-04-24Paper
scientific article; zbMATH DE number 1834575 (Why is no real title available?)2003-02-25Paper
Iterating transducers
The Journal of Logic and Algebraic Programming
2003-02-13Paper
scientific article; zbMATH DE number 1796140 (Why is no real title available?)2002-09-04Paper
scientific article; zbMATH DE number 1696515 (Why is no real title available?)2002-06-13Paper
scientific article; zbMATH DE number 1701753 (Why is no real title available?)2002-02-05Paper
Concurrency verification. Introduction to compositional and noncompositional methods
Cambridge Tracts in Theoretical Computer Science
2002-02-03Paper
Verification of parameterized protocols
Journal of Universal Computer Science
2001-08-13Paper
scientific article; zbMATH DE number 1617317 (Why is no real title available?)2001-07-11Paper
scientific article; zbMATH DE number 1538040 (Why is no real title available?)2001-02-05Paper
scientific article; zbMATH DE number 1444725 (Why is no real title available?)2000-05-09Paper
scientific article; zbMATH DE number 1023673 (Why is no real title available?)1997-06-17Paper
Metric temporal logic with durations
Theoretical Computer Science
1997-02-28Paper


Research outcomes over time


This page was built for person: Yassine Lakhnech