Lucca Hirschi
Lucca Hirschi
Permanent Inria Researcher @ Loria
Verified email at inria.fr - Homepage
Title
Cited by
Cited by
Year
Formal Analysis of 5G Authentication
D Basin, J Dreier, L Hirschi, S Radomirović, R Sasse, V Stettler
ACM Conference on Computer and Communications Security (CCS'18), 2018
1082018
Partial Order Reduction for Security Protocols
D Baelde, S Delaune, L Hirschi
26th International Conference on Concurrency Theory (CONCUR'15), 2015
492015
A Method for Verifying Privacy-Type Properties: The Unbounded Case
L Hirschi, D Baelde, S Delaune
37th IEEE Symposium on Security and Privacy (Oakland'16), 2016
402016
New Privacy Threat on 3G, 4G, and Upcoming 5G AKA Protocols
R Borgaonkar, L Hirschi, S Park, A Shaik
Privacy Enhancing Technologies Symposium (PETS'19), 2019
272019
A survey of symbolic methods for establishing equivalence-based properties in cryptographic protocols
S Delaune, L Hirschi
Journal of Logical and Algebraic Methods in Programming (JLAMP) 87, 127-144, 2017
242017
Automated unbounded verification of stateful cryptographic protocols with exclusive OR
J Dreier, L Hirschi, S Radomirovic, R Sasse
2018 IEEE 31st Computer Security Foundations Symposium (CSF'18), 359-373, 2018
232018
Mobile subscriber WiFi privacy
P O’Hanlon, R Borgaonkar, L Hirschi
Proceedings of Mobile Security Technologies (MoST'17), held as part of the …, 2017
172017
A reduced semantics for deciding trace equivalence using constraint systems
D Baelde, S Delaune, L Hirschi
International Conference on Principles of Security and Trust (POST'14), 2014
162014
A Reduced Semantics for Deciding Trace Equivalence
L Hirschi, S Delaune, D Baelde
Logical Methods in Computer Science (LMCS'17) 13, 2017
11*2017
Towards Completeness via Proof Search in the Linear Time μ-calculus: The case of Büchi inclusions
A Doumane, D Baelde, L Hirschi, A Saurin
31st Annual ACM/IEEE Symposium on Logic in Computer Science (LICS'16), 377-386, 2016
92016
Improving Automated Symbolic Analysis of Ballot Secrecy for E-voting Protocols: A Method Based on Sufficient Conditions
L Hirschi, C Cremers
IEEE Euro Security and Privacy (Euro S&P'19), 2019
8*2019
A method for unbounded verification of privacy-type properties
L Hirschi, D Baelde, S Delaune
Journal of Computer Security (JCS'19), 2019
72019
POR for Security Protocol Equivalences: Beyon Action-Determinism
D Baelde, S Delaune, L Hirschi
European Symposium on Research in Computer Security (ESORICS'18), 385-405, 2018
4*2018
Automated Verification of Privacy in Security Protocols: Back and Forth Between Theory & Practice
L Hirschi
Université Paris-Saclay, 2017
3*2017
A Spectral Analysis of Noise: A Comprehensive, Automated, Formal Analysis of Diffie-Hellman Protocols
G Girol, L Hirschi, R Sasse, D Jackson, C Cremers, D Basin
USENIX Security Symposium (USENIX Security'20), 2020
22020
Security issues in the 5G standard and how formal methods come to the rescue
L Hirschi, R Sasse, J Dreier
ERCIM News, 2019
22019
Fixing the Achilles Heel of E-Voting: The Bulletin Board.
L Hirschi, L Schmid, DA Basin
IACR Cryptol. ePrint Arch. 2020, 109, 2020
12020
Symbolic Analysis of Identity-Based Protocols
D Basin, L Hirschi, R Sasse
Festschrift Symposium in Honor of Catherine Meadows (LNCS) 11565, 2019
12019
Verification of stateful cryptographic protocols with exclusive OR
J Dreier, L Hirschi, S Radomirović, R Sasse
Journal of Computer Security (JCS), 1-34, 2020
2020
Symbolic Abstractions for Quantum Protocol Verification
L Hirschi
arXiv preprint arXiv:1904.04186, 2019
2019
The system can't perform the operation now. Try again later.
Articles 1–20