Laurent Mazaré

According to our database1, Laurent Mazaré authored at least 22 papers between 2003 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Streaming Sequence-to-Sequence Learning with Delayed Streams Modeling.
CoRR, September, 2025

Aligning Spoken Dialogue Models from User Interactions.
CoRR, June, 2025

Vision-Speech Models: Teaching Speech Models to Converse about Images.
CoRR, March, 2025

High-Fidelity Simultaneous Speech-To-Speech Translation.
CoRR, February, 2025

2024
Moshi: a speech-text foundation model for real-time dialogue.
CoRR, 2024

2018
Massively Parallel Video Networks.
Proceedings of the Computer Vision - ECCV 2018, 2018

2011
Computational Soundness - The Case of Diffie-Hellman Keys.
Proceedings of the Formal Models and Techniques for Analyzing Security Protocols, 2011

2010
Computationally sound analysis of protocols using bilinear pairings.
J. Comput. Secur., 2010

2009
Separating Trace Mapping and Reactive Simulatability Soundness: The Case of Adaptive Corruption.
Proceedings of the Foundations and Applications of Security Analysis, 2009

2007
Adaptive Soundness of Static Equivalence.
Proceedings of the Computer Security, 2007

A Generalization of DDH with Applications to Protocol Analysis and Computational Soundness.
Proceedings of the Advances in Cryptology, 2007

2006
Computational Soundness of Symbolic Analysis for Protocols Using Hash Functions.
Proceedings of the First Workshop in Information and Computer Security, 2006

Game-Based Criterion Partition Applied to Computational Soundness of Adaptive Security.
Proceedings of the Formal Aspects in Security and Trust, Fourth International Workshop, 2006

2005
Probabilistic Opacity for a Passive Adversary and its Application to Chaum's Voting Scheme.
IACR Cryptol. ePrint Arch., 2005

Computationally Sound Verification of Security Protocols Using Diffie-Hellman Exponentiation.
IACR Cryptol. ePrint Arch., 2005

(De)Compositions of Cryptographic Schemes and their Applications to Protocols.
IACR Cryptol. ePrint Arch., 2005

Automatic Verification of Security Properties Based on Abstractions.
Proceedings of the Verification of Infinite-State Systems with Applications to Security, 2005

Opacity Generalised to Transition Systems.
Proceedings of the Formal Aspects in Security and Trust, Third International Workshop, 2005

Completing the Picture: Soundness of Formal Encryption in the Presence of Active Adversaries.
Proceedings of the Programming Languages and Systems, 2005

2004
Satisfiability of Dolev-Yao Constraints.
Proceedings of the Workshop on Automated Reasoning for Security Protocol Analysis, 2004

Decidability of Opacity with Non-Atomic Keys.
Proceedings of the Formal Aspects in Security and Trust: Second IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), 2004

2003
Concurrent Construction of Proof-Nets.
Proceedings of the Computer Science Logic, 17th International Workshop, 2003


  Loading...