Lucca Hirschi
Lucca Hirschi
Tenured Inria Researcher @ Loria
Verified email at - Homepage
Cited by
Cited by
Formal Analysis of 5G Authentication
D Basin, J Dreier, L Hirschi, S Radomirović, R Sasse, V Stettler
ACM Conference on Computer and Communications Security (CCS'18), 2018
New Privacy Threat on 3G, 4G, and Upcoming 5G AKA Protocols
R Borgaonkar, L Hirschi, S Park, A Shaik
Privacy Enhancing Technologies Symposium (PETS'19), 2019
Automated unbounded verification of stateful cryptographic protocols with exclusive OR
J Dreier, L Hirschi, S Radomirovic, R Sasse
2018 IEEE 31st Computer Security Foundations Symposium (CSF'18), 359-373, 2018
A Method for Verifying Privacy-Type Properties: The Unbounded Case
L Hirschi, D Baelde, S Delaune
37th IEEE Symposium on Security and Privacy (Oakland'16), 2016
Partial Order Reduction for Security Protocols
D Baelde, S Delaune, L Hirschi
26th International Conference on Concurrency Theory (CONCUR'15), 2015
A survey of symbolic methods for establishing equivalence-based properties in cryptographic protocols
S Delaune, L Hirschi
Journal of Logical and Algebraic Methods in Programming (JLAMP) 87, 127-144, 2017
Mobile subscriber WiFi privacy
P O’Hanlon, R Borgaonkar, L Hirschi
Proceedings of Mobile Security Technologies (MoST'17), held as part of the …, 2017
Fixing the Achilles Heel of E-Voting: The Bulletin Board
L Hirshi, L Schmid, D Basin
Computer Security Foundations Symposium (CSF21), 2021
A Spectral Analysis of Noise: A Comprehensive, Automated, Formal Analysis of Diffie-Hellman Protocols
G Girol, L Hirschi, R Sasse, D Jackson, C Cremers, D Basin
USENIX Security Symposium (USENIX Security'20), 2020
A method for unbounded verification of privacy-type properties
L Hirschi, D Baelde, S Delaune
Journal of Computer Security (JCS'19), 2019
Improving Automated Symbolic Analysis of Ballot Secrecy for E-voting Protocols: A Method Based on Sufficient Conditions
L Hirschi, C Cremers
IEEE Euro Security and Privacy (Euro S&P'19), 2019
Towards Completeness via Proof Search in the Linear Time μ-calculus: The case of Büchi inclusions
A Doumane, D Baelde, L Hirschi, A Saurin
31st Annual ACM/IEEE Symposium on Logic in Computer Science (LICS'16), 377-386, 2016
A reduced semantics for deciding trace equivalence using constraint systems
D Baelde, S Delaune, L Hirschi
International Conference on Principles of Security and Trust (POST'14), 2014
A Reduced Semantics for Deciding Trace Equivalence
L Hirschi, S Delaune, D Baelde
Logical Methods in Computer Science (LMCS'17) 13, 2017
Hash Gone Bad: Automated discovery of protocol attacks that exploit hash function weaknesses
V Cheval, C Cremers, A Dax, L Hirschi, C Jacomme, S Kremer
32nd USENIX Security Symposium (USENIX Security 23), 5899-5916, 2023
Verification of stateful cryptographic protocols with exclusive OR
J Dreier, L Hirschi, S Radomirović, R Sasse
Journal of Computer Security (JCS), 1-34, 2020
POR for Security Protocol Equivalences: Beyon Action-Determinism
D Baelde, S Delaune, L Hirschi
European Symposium on Research in Computer Security (ESORICS'18), 385-405, 2018
Dy fuzzing: formal Dolev-Yao models meet cryptographic protocol fuzz testing
M Ammann, L Hirschi, S Kremer
Cryptology ePrint Archive, 2023
Le traçage anonyme, dangereux oxymore
X Bonnetain, A Canteaut, V Cortier, P Gaudry, L Hirschi, S Kremer, ...
Le droit face au coronavirus, 468--480, 2021
Reversing, Breaking, and Fixing the French Legislative Election {E-Voting} Protocol
A Debant, L Hirschi
32nd USENIX Security Symposium (USENIX Security 23), 6737-6752, 2023
The system can't perform the operation now. Try again later.
Articles 1–20