Cachan

Results: 458



#Item
181

A method for proving observational equivalence V´eronique Cortier LORIA, CNRS & INRIA Nancy Grand Est France Email:

Add to Reading List

Source URL: www.lsv.ens-cachan.fr

Language: English - Date: 2009-07-06 12:39:09
    182

    An Experimental Ambiguity Detection Tool∗ Sylvain Schmitz LSV, ENS Cachan & CNRS, France Abstract

    Add to Reading List

    Source URL: www.lsv.ens-cachan.fr

    Language: English - Date: 2009-11-26 09:45:27
      183

      How to prevent type-flaw attacks on security protocols under algebraic properties Sreekanth Malladi1? and Pascal Lafourcade2?? 1 Dakota State University

      Add to Reading List

      Source URL: www.lsv.ens-cachan.fr

      Language: English - Date: 2009-07-21 03:17:17
        184

        A Tight Lower Bound for the BB84-states Quantum-Position-Verication Protocol Jérémy Ribeiro and Frédéric Grosshans∗ Laboratoire Aimé Cotton, CNRS, Université Paris-Sud and ENS Cachan, FOrsay, France

        Add to Reading List

        Source URL: 2015.qcrypt.net

        Language: English - Date: 2015-09-22 01:50:11
          185

          Adapting Helios for provable ballot privacy David Bernhard1 , V´eronique Cortier2 , Olivier Pereira3 , Ben Smyth2 , Bogdan Warinschi1 1 3

          Add to Reading List

          Source URL: www.lsv.ens-cachan.fr

          Language: English - Date: 2012-12-05 06:09:36
            186

            LIPIcs Leibniz International Proceedings in Informatics Simulation based security in the applied pi calculus∗

            Add to Reading List

            Source URL: www.lsv.ens-cachan.fr

            Language: English - Date: 2009-12-03 11:37:36
              187

              D4.3 Results on a real life case study: Helios 2.0 Véronique Cortier and Steve Kremer January 16, 2012 The results presented in this report have been obtained by David Bernhard, Véronique Cortier, Steve Kremer, Olivier

              Add to Reading List

              Source URL: www.lsv.ens-cachan.fr

              Language: English - Date: 2012-12-05 06:09:39
                188

                ENS Cachan - Antenne de Bretagne Universit´e Bordeaux I - Master cryptographie et S´ecurit´e Informatique Rapport de stage de fin d’´etudes Effectu´e chez Thales

                Add to Reading List

                Source URL: www.di.ens.fr

                Language: French - Date: 2014-10-13 08:32:03
                  189

                  Simple Priced Timed Games Are Not That Simple∗ Thomas Brihaye1 , Gilles Geeraerts2 , Axel Haddad1 , Engel Lefaucheux3 , and Benjamin Monmege4 1 2

                  Add to Reading List

                  Source URL: www.lsv.ens-cachan.fr

                  Language: English - Date: 2015-10-02 14:25:07
                    190

                    Automated Proofs for Encryption Modes. ⋆ Martin Gagn´e2 , Pascal Lafourcade1 , Yassine Lakhnech1 , and Rei Safavi-Naini2 1

                    Add to Reading List

                    Source URL: www.lsv.ens-cachan.fr

                    Language: English - Date: 2009-07-21 03:17:32
                      UPDATE