Hubert Comon-Lundh

Affiliations:
  • ENS Cachan, Paris, France


According to our database1, Hubert Comon-Lundh authored at least 85 papers between 1986 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2020
Oracle Simulation: A Technique for Protocol Composition with Long Term Shared Secrets.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2017
A procedure for deciding symbolic equivalence between sets of constraint systems.
Inf. Comput., 2017

Formal Computational Unlinkability Proofs of RFID Protocols.
Proceedings of the 30th IEEE Computer Security Foundations Symposium, 2017

2014
Deducibility constraints and blind signatures.
Inf. Comput., 2014

A Computationally Complete Symbolic Attacker for Equivalence Properties.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
LICS: Logic in Computer Security - Some Attacker's Models and Related Decision Problems.
Proceedings of the 28th Annual ACM/IEEE Symposium on Logic in Computer Science, 2013

Tractable Inference Systems: An Extension with a Deducibility Predicate.
Proceedings of the Automated Deduction - CADE-24, 2013

2012
Formal Security Proofs.
Proceedings of the Software Safety and Security - Tools for Analysis and Verification, 2012

Special Issue on Security and Rewriting Foreword.
J. Autom. Reason., 2012

Security proof with dishonest keys.
IACR Cryptol. ePrint Arch., 2012

Towards Unconditional Soundness: Computationally Complete Symbolic Attacker.
IACR Cryptol. ePrint Arch., 2012

Computational Soundness of Indistinguishability Properties without Computable Parsing.
Proceedings of the Information Security Practice and Experience, 2012

2011
Security and Rewriting (Dagstuhl Seminar 11332).
Dagstuhl Reports, 2011

How to prove security of communication protocols? A discussion on the soundness of formal models w.r.t. computational ones.
Proceedings of the 28th International Symposium on Theoretical Aspects of Computer Science, 2011

Trace equivalence decision: negative tests and non-determinism.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

Constraint solving techniques and enriching the model with equational theories.
Proceedings of the Formal Models and Techniques for Analyzing Security Protocols, 2011

2010
Deciding security properties for cryptographic protocols. application to key cycles.
ACM Trans. Comput. Log., 2010

Automating Security Analysis: Symbolic Equivalence of Constraint Systems.
Proceedings of the Automated Reasoning, 5th International Joint Conference, 2010

2009
Computational and Symbolic Anonymity in an Unbounded Network.
JSIAM Lett., 2009

Protocol Security and Algebraic Properties: Decision Results for a Bounded Number of Sessions.
Proceedings of the Rewriting Techniques and Applications, 20th International Conference, 2009

Verification of Security Protocols with a Bounded Number of Sessions Based on Resolution for Rigid Variables.
Proceedings of the Formal to Practical Security, 2009

Models and Proofs of Protocol Security: A Progress Report.
Proceedings of the Computer Aided Verification, 21st International Conference, 2009

Deducibility Constraints.
Proceedings of the Advances in Computer Science, 2009

2008
Visibly Tree Automata with Memory and Constraints.
Log. Methods Comput. Sci., 2008

About models of security protocols.
Proceedings of the IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science, 2008

Computational soundness of observational equivalence.
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008

Challenges in the Automated Verification of Security Protocols.
Proceedings of the Automated Reasoning, 4th International Joint Conference, 2008

2007
Associative-Commutative Deducibility Constraints.
Proceedings of the STACS 2007, 2007

Tree Automata with Memory, Visibility and Structural Constraints.
Proceedings of the Foundations of Software Science and Computational Structures, 2007

Deducibility Constraints, Equational Theory and Electronic Money.
Proceedings of the Rewriting, 2007

2006
Normal Proofs in Intruder Theories.
Proceedings of the Advances in Computer Science, 2006

2005
Tree automata with one memory set constraints and cryptographic protocols.
Theor. Comput. Sci., 2005

The Finite Variant Property: How to Get Rid of Some Algebraic Properties.
Proceedings of the Term Rewriting and Applications, 16th International Conference, 2005

Normal Attacks on Security Protocols.
Proceedings of the 12th International Workshop on Abstract State Machines, 2005

2004
Security properties: two agents are sufficient.
Sci. Comput. Program., 2004

Intruder Theories (Ongoing Work).
Proceedings of the Foundations of Software Science and Computation Structures, 2004

2003
Deciding the confluence of ordered term rewrite systems.
ACM Trans. Comput. Log., 2003

Ground reducibility is EXPTIME-complete.
Inf. Comput., 2003

New Decidability Results for Fragments of First-Order Logic and Application to Cryptographic Protocols.
Proceedings of the Rewriting Techniques and Applications, 14th International Conference, 2003

Intruder Deductions, Constraint Solving and Insecurity Decision in Presence of Exclusive or.
Proceedings of the 18th IEEE Symposium on Logic in Computer Science (LICS 2003), 2003

Easy Intruder Deductions.
Proceedings of the Verification: Theory and Practice, 2003

2001
Tree Automata with One Memory, Set Constraints, and Ping-Pong Protocols.
Proceedings of the Automata, Languages and Programming, 28th International Colloquium, 2001

The Confluence of Ground Term Rewrite Systems is Decidable in Polynomial Time.
Proceedings of the 42nd Annual Symposium on Foundations of Computer Science, 2001

Inductionless Induction.
Proceedings of the Handbook of Automated Reasoning (in 2 volumes), 2001

2000
Induction=I-Axiomatization+First-Order Consistency.
Inf. Comput., 2000

Sequentiality, Monadic Second-Order Logic and Tree Automata.
Inf. Comput., 2000

Flatness Is Not a Weakness.
Proceedings of the Computer Science Logic, 2000

1999
A Methodological View of Constraint Solving.
Constraints An Int. J., 1999

Timed Automata and the Theory of Real Numbers.
Proceedings of the CONCUR '99: Concurrency Theory, 1999

Constraint Solving on Terms.
Proceedings of the Constraints in Computational Logics: Theory and Applications, 1999

1998
Completion of Rewrite Systems with Membership Constraints. Part II: Constraint Solving.
J. Symb. Comput., 1998

Completion of Rewrite Systems with Membership Constraints. Part I: Deduction Rules.
J. Symb. Comput., 1998

About Proofs by Consistency (Abstract).
Proceedings of the Rewriting Techniques and Applications, 9th International Conference, 1998

Decision Problems in Ordered Rewriting.
Proceedings of the Thirteenth Annual IEEE Symposium on Logic in Computer Science, 1998

Multiple Counters Automata, Safety Analysis and Presburger Arithmetic.
Proceedings of the Computer Aided Verification, 10th International Conference, 1998

1997
The First-Order Theory of Lexicographic Path Orderings is Undecidable.
Theor. Comput. Sci., 1997

Higher-Order Matching and Tree Automata.
Proceedings of the Computer Science Logic, 11th International Workshop, 1997

1996
Diophantine Equations, Presburger Arithmetic and Finite Automata.
Proceedings of the Trees in Algebra and Programming, 1996

1995
On Unification of Terms with Integer Exponents.
Math. Syst. Theory, 1995

Linear diophantine equations, Presburger arithmetic and finite automata.
Proceedings of the 9th International Workshop on Unification, 1995

Orderings, AC-Theories and Symbolic Constraint Solving (Extended Abstract)
Proceedings of the Proceedings, 1995

Sequentiality, Second Order Monadic Logic and Tree Automata
Proceedings of the Proceedings, 1995

1994
Equational Formulae with Membership Constraints
Inf. Comput., August, 1994

Syntacticness, Cycle-Syntacticness, and Shallow Theories
Inf. Comput., May, 1994

Constraints in Term Algebras: An Overview of Constraint Solving Techniques
Proceedings of the Constraint Programming: Basics and Trends, Châtillon Spring School, 1994

Ground Reducibility and Automata with Disequality Constraints.
Proceedings of the STACS 94, 1994

Pumping, Cleaning and Symbolic Constraints Solving.
Proceedings of the Automata, Languages and Programming, 21st International Colloquium, 1994

Ordering Constraints on Trees.
Proceedings of the Trees in Algebra and Programming, 1994

1993
Complete Axiomatizations of Some Quotient Term Algebras.
Theor. Comput. Sci., 1993

About the Theory of Tree Embedding.
Proceedings of the TAPSOFT'93: Theory and Practice of Software Development, 1993

Constraints in Term Algebras (Short Survey).
Proceedings of the Algebraic Methodology and Software Technology (AMAST '93), 1993

1992
Negation Elimination in Equational Formulae.
Proceedings of the Mathematical Foundations of Computer Science 1992, 1992

Decidable Problems in Shallow Equational Theories (Extended Abstract)
Proceedings of the Seventh Annual Symposium on Logic in Computer Science (LICS '92), 1992

Completion of Rewrite Systems with Membership Constraints.
Proceedings of the Automata, Languages and Programming, 19th International Colloquium, 1992

1991
A Rewrite-Based Type Discipline for a Subset of Computer Algebra.
J. Symb. Comput., 1991

Disunification: A Survey.
Proceedings of the Computational Logic - Essays in Honor of Alan Robinson, 1991

1990
Solving Symbolic Ordering Constraints.
Int. J. Found. Comput. Sci., 1990

Solving Inequations in Term Algebras (Extended Abstract)
Proceedings of the Fifth Annual Symposium on Logic in Computer Science (LICS '90), 1990

Equational Formulas in Order-Sorted Algebras.
Proceedings of the Automata, Languages and Programming, 17th International Colloquium, 1990

1989
Equational Problems and Disunification.
J. Symb. Comput., 1989

Inductive Proofs by Specification Transformation.
Proceedings of the Rewriting Techniques and Applications, 3rd International Conference, 1989

1988
Unification et disunification : théorie et applications. (Unification and disunification in free algebras and in initial algebras : theory and applications).
PhD thesis, 1988

An Effective Method for Handling Initial Algebras.
Proceedings of the Algebraic and Logic Programming, 1988

1986
Sufficient Completness, Term Rewriting Systems and "Anti-Unification".
Proceedings of the 8th International Conference on Automated Deduction, Oxford, England, July 27, 1986

Type Inference Using Unification in Computer Algebra.
Proceedings of the Applied Algebra, 1986


  Loading...