default search action
Yassine Lakhnech
Person information
- affiliation: IMAG, Grenoble, France
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2016
- [j16]Martin Gagné, Pascal Lafourcade, Yassine Lakhnech, Reihaneh Safavi-Naini:
Automated Proofs of Block Cipher Modes of Operation. J. Autom. Reason. 56(1): 49-94 (2016) - [j15]Jannik Dreier, Cristian Ene, Pascal Lafourcade, Yassine Lakhnech:
On the existence and decidability of unique decompositions of processes in the applied π-calculus. Theor. Comput. Sci. 612: 102-125 (2016) - 2015
- [c65]Gilles Barthe, Juan Manuel Crespo, Yassine Lakhnech, Benedikt Schmidt:
Mind the Gap: Modular Machine-Checked Proofs of One-Round Key Exchange Protocols. EUROCRYPT (2) 2015: 689-718 - [i6]Gilles Barthe, Juan Manuel Crespo, Yassine Lakhnech, Benedikt Schmidt:
Mind the Gap: Modular Machine-checked Proofs of One-Round Key Exchange Protocols. IACR Cryptol. ePrint Arch. 2015: 74 (2015) - 2014
- [c64]Ali Kassem, Pascal Lafourcade, Yassine Lakhnech:
Formal Verification of e-Reputation Protocols. FPS 2014: 247-261 - [e3]Saddek Bensalem, Yassine Lakhnech, Axel Legay:
From Programs to Systems. The Systems perspective in Computing - ETAPS Workshop, FPS 2014, in Honor of Joseph Sifakis, Grenoble, France, April 6, 2014. Proceedings. Lecture Notes in Computer Science 8415, Springer 2014, ISBN 978-3-642-54847-5 [contents] - 2013
- [j14]Lilia Sfaxi, Takoua Abdellatif, Riadh Robbana, Yassine Lakhnech:
Information flow control of component-based distributed systems. Concurr. Comput. Pract. Exp. 25(2): 161-179 (2013) - [c63]Gilles Barthe, Juan Manuel Crespo, Benjamin Grégoire, César Kunz, Yassine Lakhnech, Benedikt Schmidt, Santiago Zanella Béguelin:
Fully automated analysis of padding-based encryption in the computational model. CCS 2013: 1247-1260 - [c62]Martin Gagné, Pascal Lafourcade, Yassine Lakhnech:
Automated Security Proofs for Almost-Universal Hash for MAC Verification. ESORICS 2013: 291-308 - [c61]Jannik Dreier, Cristian Ene, Pascal Lafourcade, Yassine Lakhnech:
On Unique Decomposition of Processes in the Applied π-Calculus. FoSSaCS 2013: 50-64 - [c60]Ali Kassem, Pascal Lafourcade, Yassine Lakhnech:
A More Realistic Model for Verifying Route Validity in Ad-Hoc Networks. FPS 2013: 306-322 - [c59]Jannik Dreier, Pascal Lafourcade, Yassine Lakhnech:
Formal Verification of e-Auction Protocols. POST 2013: 247-266 - [c58]Cristian Ene, Clémentine Gritti, Yassine Lakhnech:
CIL Security Proof for a Password-Based Key Exchange. ProvSec 2013: 59-85 - [i5]Martin Gagné, Pascal Lafourcade, Yassine Lakhnech:
Automated Security Proofs for Almost-Universal Hash for MAC verification. IACR Cryptol. ePrint Arch. 2013: 407 (2013) - 2012
- [j13]Lilia Sfaxi, Takoua Abdellatif, Yassine Lakhnech, Riadh Robbana:
Sécuriser les systèmes distribués à base de composants par contrôle de flux d'information. Tech. Sci. Informatiques 31(2): 245-279 (2012) - [c57]Gilles Barthe, Benjamin Grégoire, César Kunz, Yassine Lakhnech, Santiago Zanella Béguelin:
Automation in Computer-Aided Cryptography: Proofs, Attacks and Designs. CPP 2012: 7-8 - [c56]Marion Daubignard, Pierre-Alain Fouque, Yassine Lakhnech:
Generic Indifferentiability Proofs of Hash Designs. CSF 2012: 340-353 - [c55]Jannik Dreier, Pascal Lafourcade, Yassine Lakhnech:
Defining Privacy for Weighted Votes, Single and Multi-voter Coercion. ESORICS 2012: 451-468 - [c54]Jannik Dreier, Pascal Lafourcade, Yassine Lakhnech:
A formal taxonomy of privacy in voting protocols. ICC 2012: 6710-6715 - [i4]Gilles Barthe, Juan Manuel Crespo, Benjamin Grégoire, César Kunz, Yassine Lakhnech, Santiago Zanella Béguelin:
Automated Analysis and Synthesis of Padding-Based Encryption Schemes. IACR Cryptol. ePrint Arch. 2012: 695 (2012) - 2011
- [j12]Judicaël Courant, Marion Daubignard, Cristian Ene, Pascal Lafourcade, Yassine Lakhnech:
Automated Proofs for Asymmetric Encryption. J. Autom. Reason. 46(3-4): 261-291 (2011) - [c53]Takoua Abdellatif, Lilia Sfaxi, Riadh Robbana, Yassine Lakhnech:
Automating information flow control in component-based distributed systems. CBSE 2011: 73-82 - [c52]Pierre Corbineau, Mathilde Duclos, Yassine Lakhnech:
Certified Security Proofs of Cryptographic Protocols in the Computational Model: An Application to Intrusion Resilience. CPP 2011: 378-393 - [c51]Gilles Barthe, Benjamin Grégoire, Yassine Lakhnech, Santiago Zanella Béguelin:
Beyond Provable Security Verifiable IND-CCA Security of OAEP. CT-RSA 2011: 180-196 - [c50]Martin Gagné, Pascal Lafourcade, Yassine Lakhnech, Reihaneh Safavi-Naini:
Automated Verification of Block Cipher Modes of Operation, an Improved Method. FPS 2011: 23-31 - [c49]Gilles Barthe, Mathilde Duclos, Yassine Lakhnech:
A Computational Indistinguishability Logic for the Bounded Storage Model. FPS 2011: 102-117 - [c48]Jannik Dreier, Pascal Lafourcade, Yassine Lakhnech:
Vote-Independence: A Powerful Privacy Notion for Voting Protocols. FPS 2011: 164-180 - [p1]Emmanuel Bresson, Yassine Lakhnech, Laurent Mazaré, Bogdan Warinschi:
Computational Soundness - The Case of Diffie-Hellman Keys. Formal Models and Techniques for Analyzing Security Protocols 2011: 277-302 - 2010
- [c47]Judicaël Courant, Marion Daubignard, Cristian Ene, Pascal Lafourcade, Yassine Lakhnech:
Automated Proofs for Asymmetric Encryption. Concurrency, Compositionality, and Correctness 2010: 300-321 - [c46]Gilles Barthe, Marion Daubignard, Bruce M. Kapron, Yassine Lakhnech:
Computational indistinguishability logic. CCS 2010: 375-386 - [c45]Gilles Barthe, Marion Daubignard, Bruce M. Kapron, Yassine Lakhnech, Vincent Laporte:
On the Equality of Probabilistic Terms. LPAR (Dakar) 2010: 46-63
2000 – 2009
- 2009
- [j11]Marius Bozga, Radu Iosif, Yassine Lakhnech:
Flat Parametric Counter Automata. Fundam. Informaticae 91(2): 275-303 (2009) - [c44]Martin Gagné, Pascal Lafourcade, Yassine Lakhnech, Reihaneh Safavi-Naini:
Automated Security Proof for Symmetric Encryption Modes. ASIAN 2009: 39-53 - [c43]Cristian Ene, Yassine Lakhnech, Van Chan Ngo:
Formal Indistinguishability Extended to the Random Oracle Model. ESORICS 2009: 555-570 - 2008
- [c42]Judicaël Courant, Marion Daubignard, Cristian Ene, Pascal Lafourcade, Yassine Lakhnech:
Towards automated proofs for asymmetric encryption schemes in the random oracle model. CCS 2008: 371-380 - 2007
- [c41]Emmanuel Bresson, Yassine Lakhnech, Laurent Mazaré, Bogdan Warinschi:
A Generalization of DDH with Applications to Protocol Analysis and Computational Soundness. CRYPTO 2007: 482-499 - [c40]Judicaël Courant, Cristian Ene, Yassine Lakhnech:
Computationally Sound Typing for Non-interference: The Case of Deterministic Encryption. FSTTCS 2007: 364-375 - 2006
- [j10]Romain Janvier, Yassine Lakhnech, Michaël Périn:
Certifying cryptographic protocols by abstract model-checking and proof concretization. SIGBED Rev. 3(4): 37-57 (2006) - [j9]Liana Bozga, Yassine Lakhnech, Michaël Périn:
Pattern-based abstraction for verifying secrecy in protocols. Int. J. Softw. Tools Technol. Transf. 8(1): 57-76 (2006) - [c39]Marius Bozga, Radu Iosif, Yassine Lakhnech:
Flat Parametric Counter Automata. ICALP (2) 2006: 577-588 - [c38]Marion Daubignard, Romain Janvier, Yassine Lakhnech, Laurent Mazaré:
Game-Based Criterion Partition Applied to Computational Soundness of Adaptive Security. Formal Aspects in Security and Trust 2006: 47-64 - [c37]Romain Janvier, Yassine Lakhnech, Laurent Mazaré:
Computational Soundness of Symbolic Analysis for Protocols Using Hash Functions. ICS@SYNASC 2006: 121-139 - 2005
- [j8]Liana Bozga, Cristian Ene, Yassine Lakhnech:
A symbolic decision procedure for cryptographic protocols with time stamps. J. Log. Algebraic Methods Program. 65(1): 1-35 (2005) - [j7]Paul Caspi, Alberto L. Sangiovanni-Vincentelli, Luís Almeida, Albert Benveniste, Bruno Bouyssounouse, Giorgio C. Buttazzo, Ivica Crnkovic, Werner Damm, Jakob Engblom, Gerhard Fohler, Marisol García-Valls, Hermann Kopetz, Yassine Lakhnech, François Laroussinie, Luciano Lavagno, Giuseppe Lipari, Florence Maraninchi, Philipp Peti, Juan Antonio de la Puente, Norman Scaife, Joseph Sifakis, Robert de Simone, Martin Törngren, Paulo Veríssimo, Andy J. Wellings, Reinhard Wilhelm, Tim A. C. Willemse, Wang Yi:
Guidelines for a graduate curriculum on embedded software and systems. ACM Trans. Embed. Comput. Syst. 4(3): 587-611 (2005) - [c36]Romain Janvier, Yassine Lakhnech, Laurent Mazaré:
Completing the Picture: Soundness of Formal Encryption in the Presence of Active Adversaries. ESOP 2005: 172-185 - [c35]Liana Bozga, Cristian Ene, Romain Janvier, Yassine Lakhnech, Laurent Mazaré, Michaël Périn:
Automatic Verification of Security Properties Based on Abstractions. VISSAS 2005: 23-53 - [i3]Romain Janvier, Yassine Lakhnech, Laurent Mazaré:
(De)Compositions of Cryptographic Schemes and their Applications to Protocols. IACR Cryptol. ePrint Arch. 2005: 20 (2005) - [i2]Yassine Lakhnech, Laurent Mazaré:
Computationally Sound Verification of Security Protocols Using Diffie-Hellman Exponentiation. IACR Cryptol. ePrint Arch. 2005: 97 (2005) - [i1]Yassine Lakhnech, Laurent Mazaré:
Probabilistic Opacity for a Passive Adversary and its Application to Chaum's Voting Scheme. IACR Cryptol. ePrint Arch. 2005: 98 (2005) - 2004
- [c34]Liana Bozga, Cristian Ene, Yassine Lakhnech:
A Symbolic Decision Procedure for Cryptographic Protocols with Time Stamps (Extended Abstract). CONCUR 2004: 177-192 - [c33]Liana Bozga, Cristian Ene, Yassine Lakhnech:
On the Existence of an Effective and Complete Inference System for Cryptographic Protocols. FoSSaCS 2004: 42-57 - [c32]Marius Bozga, Radu Iosif, Yassine Lakhnech:
On Logics of Aliasing. SAS 2004: 344-360 - [e2]Yassine Lakhnech, Sergio Yovine:
Formal Techniques, Modelling and Analysis of Timed and Fault-Tolerant Systems, Joint International Conferences on Formal Modelling and Analysis of Timed Systems, FORMATS 2004 and Formal Techniques in Real-Time and Fault-Tolerant Systems, FTRTFT 2004, Grenoble, France, September 22-24, 2004, Proceedings. Lecture Notes in Computer Science 3253, Springer 2004, ISBN 3-540-23167-6 [contents] - 2003
- [c31]Saddek Bensalem, Susanne Graf, Yassine Lakhnech:
Abstraction as the Key for Invariant Verification. Verification: Theory and Practice 2003: 67-99 - [c30]Liana Bozga, Yassine Lakhnech, Michaël Périn:
HERMES: An Automatic Tool for Verification of Secrecy in Security Protocols. CAV 2003: 219-222 - [c29]Marius Bozga, Radu Iosif, Yassine Lakhnech:
Storeless semantics and alias logic. PEPM 2003: 55-65 - [c28]Liana Bozga, Yassine Lakhnech, Michaël Périn:
Pattern-Based Abstraction for Verifying Secrecy in Protocols. TACAS 2003: 299-314 - 2002
- [j6]Dennis Dams, Yassine Lakhnech, Martin Steffen:
Iterating transducers. J. Log. Algebraic Methods Program. 52-53: 109-127 (2002) - [c27]Kai Baukus, Yassine Lakhnech, Karsten Stahl:
Parameterized Verification of a Cache Coherence Protocol: Safety and Liveness. VMCAI 2002: 317-330 - 2001
- [b2]Willem P. de Roever, Frank S. de Boer, Ulrich Hannemann, Jozef Hooman, Yassine Lakhnech, Mannes Poel, Job Zwiers:
Concurrency Verification: Introduction to Compositional and Noncompositional Methods. Cambridge Tracts in Theoretical Computer Science 54, Cambridge University Press 2001, ISBN 0-521-80608-9 - [j5]Ralf Huuck, Ben Lukoschus, Yassine Lakhnech:
Verifying Untimed and Timed Aspects of the Experimental Batch Plant. Eur. J. Control 7(4): 400-415 (2001) - [j4]Kai Baukus, Yassine Lakhnech, Karsten Stahl:
Verification of Parameterized Protocols. J. Univers. Comput. Sci. 7(2): 141-158 (2001) - [c26]Dennis Dams, Yassine Lakhnech, Martin Steffen:
Iterating Transducers. CAV 2001: 286-297 - [c25]Ahmed Bouajjani, Aurore Collomb-Annichini, Yassine Lakhnech, Mihaela Sighireanu:
Analyzing Fair Parametric Extended Automata. SAS 2001: 335-355 - [c24]Yassine Lakhnech, Saddek Bensalem, Sergey Berezin, Sam Owre:
Incremental Verification by Abstraction. TACAS 2001: 98-112 - [c23]Kai Baukus, Karsten Stahl, Saddek Bensalem, Yassine Lakhnech:
Networks of Processes with Parameterized State Space. VEPAS 2001: 386-400 - 2000
- [c22]Willem P. de Roever, Frank S. de Boer, Ulrich Hannemann, Jozef Hooman, Yassine Lakhnech, Mannes Poel, Job Zwiers:
Basic Principles of a textbook on the compositional and noncompositional verification of concurrent programs. FBT 2000: 3-5 - [c21]Kai Baukus, Yassine Lakhnech, Karsten Stahl:
Verifying Universal Properties of Parameterized Networks. FTRTFT 2000: 291-303 - [c20]Saddek Bensalem, Marius Bozga, Jean-Claude Fernandez, Lucian Ghirvu, Yassine Lakhnech:
A Transformational Approach for Generating Non-linear Invariants. SAS 2000: 58-74 - [c19]Kai Baukus, Saddek Bensalem, Yassine Lakhnech, Karsten Stahl:
Abstracting WS1S Systems to Verify Parameterized Networks. TACAS 2000: 188-203
1990 – 1999
- 1999
- [j3]Saddek Bensalem, Yassine Lakhnech:
Automatic Generation of Invariants. Formal Methods Syst. Des. 15(1): 75-92 (1999) - [c18]Parosh Aziz Abdulla, Aurore Annichini, Saddek Bensalem, Ahmed Bouajjani, Peter Habermehl, Yassine Lakhnech:
Verification of Infinite-State Systems by Combining Abstraction and Reachability Analysis. CAV 1999: 146-159 - [c17]Karsten Stahl, Kai Baukus, Yassine Lakhnech, Martin Steffen:
Divide, Abstract, and Model-Check. SPIN 1999: 57-76 - [e1]Rudolf Berghammer, Yassine Lakhnech:
Proceedings of the International Workshop Tool Support for System Specification, Development and Verification, Malente, Germany, June 1-4, 1998. Advances in computing science, Springer 1999, ISBN 978-3-211-83282-0 [contents] - 1998
- [j2]Ralf Huuck, Yassine Lakhnech, Luis Urbina, Sebastian Engell, Stefan Kowalewski, Jörg Preußig:
Integrating Timed Condition/Event Systems and Timed Automata for the Verification of Hybrid Systems. Parallel Distributed Comput. Pract. 1(2) (1998) - [c16]Saddek Bensalem, Yassine Lakhnech, Sam Owre:
Computing Abstractions of Infinite State Systems Compositionally and Automatically. CAV 1998: 319-331 - [c15]Saddek Bensalem, Yassine Lakhnech, Sam Owre:
InVeST: A Tool for the Verification of Invariants. CAV 1998: 505-510 - [c14]Rudolf Berghammer, Yassine Lakhnech, Wolfgang Reif:
Formal Methods and Tools: Introduction and Overview. Tool Support for System Specification, Development and Verification 1998: 1-17 - [c13]Erich Mikk, Yassine Lakhnech, Michael Siegel, Gerard J. Holzmann:
Implementing Statecharts in PROMELA/SPIN. WIFT 1998: 90-101 - 1997
- [c12]Erich Mikk, Yassine Lakhnech, Michael Siegel:
Hierarchical Automata as Model for Statecharts. ASIAN 1997: 181-196 - [c11]Ralf Huuck, Yassine Lakhnech, Luis Urbina, Sebastian Engell, Stefan Kowalewski, Jörg Preußig:
Comparing Timed C/E Systems with Timed Automata (Abstract). HART 1997: 81-86 - [c10]Yassine Lakhnech, Michael Siegel:
Deductive verification of stabilizing systems. WSS 1997: 201-216 - 1996
- [b1]Yassine Lakhnech:
Specification and verification of hybrid and real time systems. University of Kiel, Germany, 1996, pp. 1-187 - [c9]Saddek Bensalem, Yassine Lakhnech, Hassen Saïdi:
Powerful Techniques for the Automatic Generation of Invariants. CAV 1996: 323-335 - [c8]Job Zwiers, Ulrich Hannemann, Yassine Lakhnech, Willem P. de Roever, Frank A. Stomp:
Modular Completeness: Integrating the Reuse of Specified Software in Top-down Program Development. FME 1996: 595-608 - [c7]Ahmed Bouajjani, Yassine Lakhnech, Sergio Yovine:
Model-Checking for Extended Timed Temporal Logics. FTRTFT 1996: 306-326 - 1995
- [j1]Yassine Lakhnech, Jozef Hooman:
Metric Temporal Logic with Durations. Theor. Comput. Sci. 138(1): 169-199 (1995) - [c6]Ahmed Bouajjani, Yassine Lakhnech, Riadh Robbana:
From Duration Calculus To Linear Hybrid Automata. CAV 1995: 196-210 - [c5]Ahmed Bouajjani, Yassine Lakhnech:
Temporal Logic + Timed Automata: Expressiveness and Decidability. CONCUR 1995: 531-545 - [c4]Job Zwiers, Ulrich Hannemann, Yassine Lakhnech, Willem P. de Roever:
Synthesizing Different Development Paradigms: Combining Top-Down with Bottom-Up Reasoning About Distributed Systems. FSTTCS 1995: 80-95 - [c3]Ahmed Bouajjani, Yassine Lakhnech:
Logics vs. Automata: The Hybrid Case. Hybrid Systems 1995: 531-542 - 1994
- [c2]Yassine Lakhnech, Jozef Hooman:
Reasoning about Durations in Metric Temporal Logic. FTRTFT 1994: 488-510 - 1992
- [c1]Bettina Buth, Karl-Heinz Buth, Martin Fränzle, Burghard von Karger, Yassine Lakhnech, Hans Langmaack, Markus Müller-Olm:
Provably Correct Compiler Development and Implementation. CC 1992: 141-155
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-09 00:13 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint