{"id":13,"date":"2015-06-15T10:26:53","date_gmt":"2015-06-15T08:26:53","guid":{"rendered":"http:\/\/members.loria.fr\/thierrygartiser\/?page_id=13"},"modified":"2016-06-25T00:03:55","modified_gmt":"2016-06-24T22:03:55","slug":"publications","status":"publish","type":"page","link":"https:\/\/members.loria.fr\/JDreier\/publications\/","title":{"rendered":"Publications"},"content":{"rendered":"<p>   <!DOCTYPE html PUBLIC \"-\/\/W3C\/\/DTD XHTML 1.0 Transitional\/\/EN\" \"http:\/\/www.w3.org\/TR\/xhtml1\/DTD\/xhtml1-transitional.dtd\"> <html xmlns='http:\/\/www.w3.org\/1999\/xhtml' xml:lang='fr' lang='fr'> <head> <meta name=\"robots\" content=\"noindex, nofollow\" \/> <meta http-equiv=\"content-type\" content= \"text\/html;charset=UTF-8\" \/> <meta http-equiv=\"Content-Language\" content=\"fr\" \/> <link rel=\"stylesheet\" type=\"text\/css\" href=\"..\/css\/VisuGen.css\" \/> <link rel=\"stylesheet\" type=\"text\/css\" href=\"https:\/\/haltools.inria.fr\/\/css\/VisuRubriqueEncadre.css\" \/> <!-- Piwik haltools.inria.fr--> <script type=\"text\/javascript\">   var _paq = _paq || [];   _paq.push(['trackPageView']);   _paq.push(['enableLinkTracking']);   (function() {     var u=\"\/\/piwik.inria.fr\/\";     _paq.push(['setTrackerUrl', u+'piwik.php']);     _paq.push(['setSiteId', 25]);     var d=document, g=d.createElement('script'), s=d.getElementsByTagName('script')[0];     g.type='text\/javascript'; g.async=true; g.defer=true; g.src=u+'piwik.js'; s.parentNode.insertBefore(g,s);   })(); <\/script> <noscript><\/p>\n<p><img decoding=\"async\" src=\"\/\/piwik.inria.fr\/piwik.php?idsite=25\" style=\"border:0;\" alt=\"\" \/><\/p>\n<p><\/noscript> <!-- End Piwik Code -->  <title>Publications HAL<\/title> <\/head> <body> <\/p>\n<div id=\"res_script\">\n<p class='Rubrique'>2026<\/p>\n<p class='SousRubrique'>Preprints, Working Papers, &#8230;<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-05196126v4\" target=\"_blank\" >Tamarin Unchained: Handling User-Defined AC Operators<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Jannik Dreier, Elise Klein, Steve Kremer<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\">2026<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/hal.science\/hal-05196126\/file\/mainTR.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-05196126\/file\/mainTR.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-05196126\/file\/mainTR.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-05196126v4\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='Rubrique'>2025<\/p>\n<p class='SousRubrique'>Other publications<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-04971713v2\" target=\"_blank\" >R\u00e9ponse au projet de mise \u00e0 jour de la recommandation de la CNIL sur le vote \u00e9lectronique<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">V\u00e9ronique Cortier, Alexandre Debant, Jannik Dreier, Pierrick Gaudry, Lucca Hirschi, Steve Kremer<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\">2025<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-04971713\/file\/main.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-04971713\/file\/main.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-04971713\/file\/main.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-04971713v2\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>Books<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-05093938v1\" target=\"_blank\" >Modeling and Analyzing Security Protocols with Tamarin<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">David Basin, Cas Cremers, Jannik Dreier, Ralf Sasse<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><a target=\"_blank\" href=\"https:\/\/link.springer.com\/book\/9783031909351\">Springer; Springer Nature Switzerland<\/a>, 2025, Information Security and Cryptography, 978-3-031-90935-1. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-031-90936-8\">&#x27E8;10.1007\/978-3-031-90936-8&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/hal.science\/hal-05093938v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<p class='Rubrique'>2024<\/p>\n<p class='SousRubrique'>Conference papers<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/uca.hal.science\/hal-04615474v2\" target=\"_blank\" >Shaken, not Stirred -Automated Discovery of Subtle Attacks on Protocols using Mix-Nets<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Jannik Dreier, Pascal Lafourcade, Dhekra Mahmoud<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>USENIX-Security 2024 &#8211; USENIX Security Symposium<\/i>, USENIX Association, Aug 2024, Philadelphia, United States<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/uca.hal.science\/hal-04615474\/file\/main.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/uca.hal.science\/hal-04615474\/file\/main.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/uca.hal.science\/hal-04615474\/file\/main.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/uca.hal.science\/hal-04615474v2\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='Rubrique'>2022<\/p>\n<p class='SousRubrique'>Journal articles<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-03497369v3\" target=\"_blank\" >Optimal Threshold Padlock Systems<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Jannik Dreier, Jean-Guillaume Dumas, Pascal Lafourcade, L\u00e9o Robert<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Journal of Computer Security<\/i>, 2022, 30 (5), pp.655-688. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.3233\/JCS-210065\">&#x27E8;10.3233\/JCS-210065&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/hal.science\/hal-03497369\/file\/main.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-03497369\/file\/main.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-03497369\/file\/main.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-03497369v3\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-03767104v1\" target=\"_blank\" >Automatic generation of sources lemmas in TAMARIN: towards automatic proofs of security protocols<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">V\u00e9ronique Cortier, St\u00e9phanie Delaune, Jannik Dreier, Elise Klein<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Journal of Computer Security<\/i>, 2022, 30 (4), pp.573-598. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.3233\/JCS-210053\">&#x27E8;10.3233\/JCS-210053&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/hal.science\/hal-03767104\/file\/Tamarin-JCS2022.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-03767104\/file\/Tamarin-JCS2022.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-03767104\/file\/Tamarin-JCS2022.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-03767104v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-03586826v1\" target=\"_blank\" >Tamarin: Verification of Large-Scale, Real World, Cryptographic Protocols<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">David Basin, Cas Cremers, Jannik Dreier, Ralf Sasse<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>IEEE Security and Privacy Magazine<\/i>, In press, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/msec.2022.3154689\">&#x27E8;10.1109\/msec.2022.3154689&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/hal.science\/hal-03586826\/file\/technical-report.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-03586826\/file\/technical-report.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-03586826\/file\/technical-report.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-03586826v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>Conference papers<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-03763294v2\" target=\"_blank\" >Themis: an On-Site Voting System with Systematic Cast-as-intended Verification and Partial Accountability<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Mika\u00ebl Bougon, Herv\u00e9 Chabanne, V\u00e9ronique Cortier, Alexandre Debant, Emmanuelle Dottax, Jannik Dreier, Pierrick Gaudry, Mathieu Turuani<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>CCS 2022 &#8211; The ACM Conference on Computer and Communications Security<\/i>, Nov 2022, Los Angeles, United States. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1145\/3548606.3560563\">&#x27E8;10.1145\/3548606.3560563&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-03763294\/file\/main%20%282%29.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-03763294\/file\/main%20%282%29.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-03763294\/file\/main%20%282%29.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-03763294v2\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='Rubrique'>2021<\/p>\n<p class='SousRubrique'>Conference papers<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-03455459v1\" target=\"_blank\" >Verifying Table-Based Elections<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">David Basin, Jannik Dreier, Sofia Giampietro, Sa\u0161a Radomirovi\u0107<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>CCS 2021 &#8211; ACM SIGSAC Conference on Computer and Communications Security<\/i>, Nov 2021, Virtual Event, South Korea. pp.2632-2652, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1145\/3460120.3484555\">&#x27E8;10.1145\/3460120.3484555&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/hal.science\/hal-03455459\/file\/main.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-03455459\/file\/main.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-03455459\/file\/main.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-03455459v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='Rubrique'>2020<\/p>\n<p class='SousRubrique'>Journal articles<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-02611751v1\" target=\"_blank\" >A Faster Cryptographer&rsquo;s Conspiracy Santa<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Xavier Bultel, Jannik Dreier, Jean-Guillaume Dumas, Pascal Lafourcade<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Theoretical Computer Science<\/i>, 2020, 839, pp.122-134. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1016\/j.tcs.2020.05.034\">&#x27E8;10.1016\/j.tcs.2020.05.034&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/hal.science\/hal-02611751\/file\/main.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-02611751\/file\/main.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-02611751\/file\/main.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-02611751v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-02358878v1\" target=\"_blank\" >Verification of Stateful Cryptographic Protocols with Exclusive OR<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Jannik Dreier, Lucca Hirschi, Sa\u0161a Radomirovi\u0107, Ralf Sasse<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Journal of Computer Security<\/i>, 2020, 28 (1), pp.1&#8211;34. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.3233\/JCS-191358\">&#x27E8;10.3233\/JCS-191358&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/hal.science\/hal-02358878\/file\/paper.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-02358878\/file\/paper.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-02358878\/file\/paper.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-02358878v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>Conference papers<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-02903620v1\" target=\"_blank\" >Automatic generation of sources lemmas in Tamarin: towards automatic proofs of security protocols<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">V\u00e9ronique Cortier, St\u00e9phanie Delaune, Jannik Dreier<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>ESORICS 2020 &#8211; 25th European Symposium on Research in Computer Security<\/i>, Sep 2020, Guilford, United Kingdom. pp.3&#8211;22, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-030-59013-0_1\">&#x27E8;10.1007\/978-3-030-59013-0_1&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/hal.science\/hal-02903620\/file\/main.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-02903620\/file\/main.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-02903620\/file\/main.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-02903620v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='Rubrique'>2019<\/p>\n<p class='SousRubrique'>Journal articles<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-02268822v1\" target=\"_blank\" >Security Issues in the 5G Standard and How Formal Methods Come to the Rescue<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Lucca Hirschi, Ralf Sasse, Jannik Dreier<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>ERCIM News<\/i>, 2019<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/hal.science\/hal-02268822\/file\/article.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-02268822\/file\/article.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-02268822\/file\/article.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-02268822v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-01959766v2\" target=\"_blank\" >Formally and Practically Verifying Flow Integrity Properties in Industrial Systems<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Jannik Dreier, Maxime Puys, Marie-Laure Potet, Pascal Lafourcade, Jean-Louis Roch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Computers &#038; Security<\/i>, 2019, 86, pp.453-470. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1016\/j.cose.2018.09.018\">&#x27E8;10.1016\/j.cose.2018.09.018&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/hal.science\/hal-01959766\/file\/cose18.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01959766\/file\/cose18.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01959766\/file\/cose18.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01959766v2\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>Preprints, Working Papers, &#8230;<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-02346420v1\" target=\"_blank\" >A simple alternative to Benaloh challenge for the cast-as-intended property in Helios\/Belenios<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">V\u00e9ronique Cortier, Jannik Dreier, Pierrick Gaudry, Mathieu Turuani<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\">2019<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-02346420\/file\/oilben.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-02346420\/file\/oilben.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-02346420\/file\/oilben.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-02346420v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='Rubrique'>2018<\/p>\n<p class='SousRubrique'>Conference papers<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-01898048v1\" target=\"_blank\" >Physical Zero-Knowledge Proof for Makaro<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Xavier Bultel, Jannik Dreier, Jean-Guillaume Dumas, Pascal Lafourcade, Daiki Miyahara, Takaaki Mizuki, Atsuki Nagao, Tatsuya Sasaki, Kazumasa Shinagawa, Hideaki Sone<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>SSS 2018 &#8211; 20th International Symposium on Stabilization, Safety, and Security of Distributed Systems<\/i>, Nov 2018, Tokyo, Japan. pp.111-125, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-030-03232-6_8\">&#x27E8;10.1007\/978-3-030-03232-6_8&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/hal.science\/hal-01898048\/file\/main.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01898048\/file\/main.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01898048\/file\/main.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01898048v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-01898050v1\" target=\"_blank\" >A Formal Analysis of 5G Authentication<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">David Basin, Jannik Dreier, Lucca Hirschi, Sa\u0161a Radomirovic, Ralf Sasse, Vincent Stettler<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>ACM CCS 2018 &#8211; 25th ACM Conference on Computer and Communications Security<\/i>, Oct 2018, Toronto, Canada. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1145\/3243734.3243846\">&#x27E8;10.1145\/3243734.3243846&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/hal.science\/hal-01898050\/file\/CCS18_finalcrc2_Fixed-Typo.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01898050\/file\/CCS18_finalcrc2_Fixed-Typo.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01898050\/file\/CCS18_finalcrc2_Fixed-Typo.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01898050v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-01780603v1\" target=\"_blank\" >Automated Unbounded Verification of Stateful Cryptographic Protocols with Exclusive OR<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Jannik Dreier, Lucca Hirschi, Sasa Radomirovic, Ralf Sasse<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>CSF&rsquo;2018 &#8211; 31st IEEE Computer Security Foundations Symposium<\/i>, Jul 2018, Oxford, United Kingdom. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/CSF.2018.00033\">&#x27E8;10.1109\/CSF.2018.00033&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/hal.science\/hal-01780603\/file\/paper-final.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01780603\/file\/paper-final.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01780603\/file\/paper-final.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01780603v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-01777997v2\" target=\"_blank\" >A Cryptographer&rsquo;s Conspiracy Santa<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Xavier Bultel, Jannik Dreier, Jean-Guillaume Dumas, Pascal Lafourcade<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>FUN 2018 &#8211; 9th International Conference on Fun with Algorithms<\/i>, Jun 2018, La Maddalena, Italy. pp.13:1&#8211;13:13, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.4230\/LIPIcs.FUN.2018.13\">&#x27E8;10.4230\/LIPIcs.FUN.2018.13&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/hal.science\/hal-01777997\/file\/main.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01777997\/file\/main.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01777997\/file\/main.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01777997v2\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-01777898v1\" target=\"_blank\" >Security Analysis and Psychological Study of Authentication Methods with PIN Codes<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Xavier Bultel, Jannik Dreier, Matthieu Giraud, Marie Izaute, Timoth\u00e9e Kheyrkhah, Pascal Lafourcade, Dounia Lakhzoum, Vincent Marlin, Ladislav Mot\u00e1<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>RCIS 2018 &#8211; IEEE 12th International Conference on Research Challenges in Information Science<\/i>, May 2018, Nantes, France. pp.1&#8211;11, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/RCIS.2018.8406648\">&#x27E8;10.1109\/RCIS.2018.8406648&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/hal.science\/hal-01777898\/file\/main.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01777898\/file\/main.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01777898\/file\/main.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01777898v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>Reports<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-01780544v1\" target=\"_blank\" >Automated Unbounded Verification of Stateful Cryptographic Protocols with Exclusive OR (Extended Version)<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Jannik Dreier, Lucca Hirschi, Sasa Radomirovic, Ralf Sasse<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\">[Research Report] LORIA, UMR 7503, Universit\u00e9 de Lorraine, CNRS, Vandoeuvre-l\u00e8s-Nancy; ETH Zurich, Switzerland; University of Dundee. 2018<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/hal.science\/hal-01780544\/file\/technical-report.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01780544\/file\/technical-report.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01780544\/file\/technical-report.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01780544v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='Rubrique'>2017<\/p>\n<p class='SousRubrique'>Journal articles<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-01622110v1\" target=\"_blank\" >Symbolically Analyzing Security Protocols using Tamarin<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">David Basin, Cas Cremers, Jannik Dreier, Ralf Sasse<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>ACM SIGLOG News<\/i>, 2017, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1145\/3157831.3157835\">&#x27E8;10.1145\/3157831.3157835&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/hal.science\/hal-01622110\/file\/tamarin-tool.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01622110\/file\/tamarin-tool.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01622110\/file\/tamarin-tool.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01622110v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-01397035v1\" target=\"_blank\" >How to Explain Modern Security Concepts to your Children<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Xavier Bultel, Jannik Dreier, Pascal Lafourcade, Malika More<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Cryptologia<\/i>, 2017, 41 (5), <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1080\/01611194.2016.1238422\">&#x27E8;10.1080\/01611194.2016.1238422&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/hal.science\/hal-01397035\/file\/main_fun.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01397035\/file\/main_fun.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01397035\/file\/main_fun.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01397035v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>Conference papers<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-01596010v2\" target=\"_blank\" >Formal Analysis of Combinations of Secure Protocols<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Elliott Blot, Jannik Dreier, Pascal Lafourcade<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>FPS 2017 &#8211; 10th International Symposium on Foundations &#038; Practice of Security<\/i>, Oct 2017, Nancy, France. pp.53-67, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-319-75650-9_4\">&#x27E8;10.1007\/978-3-319-75650-9_4&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/hal.science\/hal-01596010\/file\/article.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01596010\/file\/article.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01596010\/file\/article.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01596010v2\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.univ-grenoble-alpes.fr\/hal-01527913v1\" target=\"_blank\" >Formally Verifying Flow Properties in Industrial Systems<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Jannik Dreier, Maxime Puys, Marie-Laure Potet, Pascal Lafourcade, Jean-Louis Roch<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>SECRYPT 2017 &#8211; 14th International Conference on Security and Cryptography<\/i>, Jul 2017, Madrid, Spain. pp.55-66, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.5220\/0006396500550066\">&#x27E8;10.5220\/0006396500550066&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/hal.univ-grenoble-alpes.fr\/hal-01527913\/file\/secrypt17.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/hal.univ-grenoble-alpes.fr\/hal-01527913\/file\/secrypt17.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.univ-grenoble-alpes.fr\/hal-01527913\/file\/secrypt17.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.univ-grenoble-alpes.fr\/hal-01527913v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-01396282v1\" target=\"_blank\" >A Novel Approach for Reasoning about Liveness in Cryptographic Protocols and its Application to Fair Exchange<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Michael Backes, Jannik Dreier, Steve Kremer, Robert K\u00fcnnemann<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>2nd IEEE European Symposium on Security and Privacy (EuroS&#038;P&rsquo;17)<\/i>, Apr 2017, Paris, France. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/EuroSP.2017.12\">&#x27E8;10.1109\/EuroSP.2017.12&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-01396282\/file\/fairexchange-long.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-01396282\/file\/fairexchange-long.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-01396282\/file\/fairexchange-long.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-01396282v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-01430490v2\" target=\"_blank\" >Beyond Subterm-Convergent Equational Theories in Automated Verification of Stateful Protocols (extended version)<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Jannik Dreier, Charles Dum\u00e9nil, Steve Kremer, Ralf Sasse<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>POST 2017 &#8211; 6th International Conference on Principles of Security and Trust<\/i>, Apr 2017, Uppsala, Sweden. pp.117-140, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-662-54455-6_6\">&#x27E8;10.1007\/978-3-662-54455-6_6&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-01430490\/file\/techreport.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-01430490\/file\/techreport.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-01430490\/file\/techreport.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-01430490v2\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>Preprints, Working Papers, &#8230;<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-01558552v5\" target=\"_blank\" >Formal Analysis of Combinations of Secure Protocols<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Elliott Blot, Jannik Dreier, Pascal Lafourcade<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\">2017<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/hal.science\/hal-01558552\/file\/article.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01558552\/file\/article.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01558552\/file\/article.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01558552v5\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='Rubrique'>2016<\/p>\n<p class='SousRubrique'>Journal articles<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-01238097v2\" target=\"_blank\" >On the existence and decidability of unique decompositions of processes in the applied \u03c0-calculus<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Jannik Dreier, Cristian Ene, Pascal Lafourcade, Yassine Lakhnech<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Theoretical Computer Science<\/i>, 2016, 612, pp.102&#8211;125. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1016\/j.tcs.2015.11.033\">&#x27E8;10.1016\/j.tcs.2015.11.033&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/hal.science\/hal-01238097\/file\/main.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01238097\/file\/main.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01238097\/file\/main.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01238097v2\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>Conference papers<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-01326059v1\" target=\"_blank\" >Physical Zero-Knowledge Proofs for Akari, Takuzu, Kakuro and KenKen<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Xavier Bultel, Jannik Dreier, Jean-Guillaume Dumas, Pascal Lafourcade<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>8th International Conference on Fun with Algorithms<\/i>, Jun 2016, La Maddalena, Italy. pp.8:1-8:20, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.4230\/LIPIcs.FUN.2016.8\">&#x27E8;10.4230\/LIPIcs.FUN.2016.8&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/hal.science\/hal-01326059\/file\/zkpfungame.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01326059\/file\/zkpfungame.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01326059\/file\/zkpfungame.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01326059v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='Rubrique'>2015<\/p>\n<p class='SousRubrique'>Journal articles<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-01233555v1\" target=\"_blank\" >Brandt&rsquo;s fully private auction protocol revisited<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Jannik Dreier, Jean-Guillaume Dumas, Pascal Lafourcade<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Journal of Computer Security<\/i>, 2015, Special issue on security and high performance computing systems, 23 (5), pp.587-610. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.3233\/JCS-150535\">&#x27E8;10.3233\/JCS-150535&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-01233555\/file\/main.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-01233555\/file\/main.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-01233555\/file\/main.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-01233555v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-01337412v1\" target=\"_blank\" >Formal Security Analysis of Traditional and Electronic Exams<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Jannik Dreier, Rosario Giustolisi, Ali Kassem, Pascal Lafourcade, Gabriele Lenzini, Peter Y. A. Ryan<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Communications in Computer and Information Science<\/i>, 2015, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-319-25915-4_16\">&#x27E8;10.1007\/978-3-319-25915-4_16&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/hal.science\/hal-01337412\/file\/icete2014.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01337412\/file\/icete2014.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01337412\/file\/icete2014.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01337412v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>Conference papers<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-01337409v2\" target=\"_blank\" >Automated Symbolic Proofs of Observational Equivalence<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">David Basin, Jannik Dreier, Ralf Sasse<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>22nd ACM SIGSAC Conference on Computer and Communications Security (ACM CCS 2015)<\/i>, ACM, Oct 2015, Denver, United States. pp.1144&#8211;1155, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1145\/2810103.2813662\">&#x27E8;10.1145\/2810103.2813662&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/hal.science\/hal-01337409\/file\/main.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01337409\/file\/main.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01337409\/file\/main.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01337409v2\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-01337410v1\" target=\"_blank\" >Formal Analysis of E-Cash Protocols<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Jannik Dreier, Ali Kassem, Pascal Lafourcade<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>12th International Conference on Security and Cryptography (SECRYPT 2015)<\/i>, Jul 2015, Colmar, France. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.5220\/0005544500650075\">&#x27E8;10.5220\/0005544500650075&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/hal.science\/hal-01337410\/file\/secrypt2015.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01337410\/file\/secrypt2015.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01337410\/file\/secrypt2015.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01337410v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-01840596v1\" target=\"_blank\" >Automated Verification of E-Cash Protocols<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Jannik Dreier, Ali Kassem, Pascal Lafourcade<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>ICETE 2015 &#8211; 12th International Joint Conference on e-Business and Telecommunications<\/i>, Jul 2015, Colmar, France. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-319-30222-5_11\">&#x27E8;10.1007\/978-3-319-30222-5_11&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/hal.science\/hal-01840596\/file\/main.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01840596\/file\/main.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01840596\/file\/main.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01840596v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-01218138v1\" target=\"_blank\" >A Framework for Analyzing Verifiability in Traditional and Electronic Exams<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Jannik Dreier, Rosario Giustolisi, Ali Kassem, Pascal Lafourcade, Gabriele Lenzini<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Information Security Practice and Experience Conference<\/i>, May 2015, beijin, China. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-319-17533-1_35\">&#x27E8;10.1007\/978-3-319-17533-1_35&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/hal.science\/hal-01218138\/file\/ispec2015.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01218138\/file\/ispec2015.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01218138\/file\/ispec2015.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01218138v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>Reports<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-01337411v1\" target=\"_blank\" >On the Verifiability of (Electronic) Exams<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Jannik Dreier, Rosario Giustolisi, Ali Kassem, Pascal Lafourcade, Gabriele Lenzini<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\">[Technical Report] VERIMAG UMR 5104, Universit\u00e9 Grenoble Alpes, France. 2015<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/hal.science\/hal-01337411\/file\/TR-2014-2.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01337411\/file\/TR-2014-2.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01337411\/file\/TR-2014-2.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01337411v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='Rubrique'>2014<\/p>\n<p class='SousRubrique'>Conference papers<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-01338054v1\" target=\"_blank\" >Formal Analysis of Electronic Exams<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Jannik Dreier, Rosario Giustolisi, Ali Kassem, Pascal Lafourcade, Gabriele Lenzini, Peter Y. A. Ryan<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>First Symposium on Digital Trust in Auvergne (SDTA&rsquo;14)<\/i>, Dec 2014, Clermont-Ferrand, France<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au bibtex<\/dt>\n<dd class=\"ValeurRes LienBibtex\"> <a href=\"https:\/\/hal.science\/hal-01338054v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-01337413v1\" target=\"_blank\" >Formal Analysis of Electronic Exams<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Jannik Dreier, Rosario Giustolisi, Ali Kassem, Pascal Lafourcade, Gabriele Lenzini, Peter Y. A. Ryan<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>11th International Conference on Security and Cryptography (SECRYPT 2014)<\/i>, Aug 2014, Vienne, Austria. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.5220\/0005050901010112\">&#x27E8;10.5220\/0005050901010112&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/hal.science\/hal-01337413\/file\/secrypt2014.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01337413\/file\/secrypt2014.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01337413\/file\/secrypt2014.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01337413v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-01337414v1\" target=\"_blank\" >Secure Auctions without Cryptography<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Jannik Dreier, Hugo Jonker, Pascal Lafourcade<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>7th International Conference on Fun with Algorithms &#8211; FUN 2014<\/i>, Jul 2014, Lipari, Italy. pp.158-170, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-319-07890-8_14\">&#x27E8;10.1007\/978-3-319-07890-8_14&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/hal.science\/hal-01337414\/file\/fun2014.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01337414\/file\/fun2014.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01337414\/file\/fun2014.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01337414v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>Reports<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-01337415v1\" target=\"_blank\" >Secure Auctions Without Cryptography (extended version)<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Jannik Dreier, Hugo Jonker, Pascal Lafourcade<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\">[Technical Report] ETH Zurich. 2014<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/hal.science\/hal-01337415\/file\/eth-8490-01.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01337415\/file\/eth-8490-01.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01337415\/file\/eth-8490-01.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01337415v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='Rubrique'>2013<\/p>\n<p class='SousRubrique'>Conference papers<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-00745247v3\" target=\"_blank\" >Brandt&rsquo;s Fully Private Auction Protocol Revisited<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Jannik Dreier, Jean-Guillaume Dumas, Pascal Lafourcade<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Africacrypt 2013<\/i>, Jun 2013, Le Caire, Egypt. pp.88-106, <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-642-38553-7_5\">&#x27E8;10.1007\/978-3-642-38553-7_5&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/hal.science\/hal-00745247\/file\/brandtrev.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-00745247\/file\/brandtrev.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-00745247\/file\/brandtrev.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-00745247v3\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-01337416v1\" target=\"_blank\" >Defining Verifiability in e-Auction Protocols<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Jannik Dreier, Hugo Jonker, Pascal Lafourcade<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Asia Conference on Information, Computer and Communications Security<\/i>, ACM, May 2013, Hangzhou, China. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1145\/2484313.2484387\">&#x27E8;10.1145\/2484313.2484387&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/hal.science\/hal-01337416\/file\/asiaccs2013.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01337416\/file\/asiaccs2013.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01337416\/file\/asiaccs2013.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01337416v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-01338057v1\" target=\"_blank\" >Verifiability in e-Auction Protocols<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Jannik Dreier, Hugo Jonker, Pascal Lafourcade<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>1st Workshop on Hot Issues in Security Principles and Trust (HotSpot&rsquo;13)<\/i>, Mar 2013, Rome, Italy<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/hal.science\/hal-01338057\/file\/main.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01338057\/file\/main.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01338057\/file\/main.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01338057v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-01338020v1\" target=\"_blank\" >Formal Verification of e-Auction Protocols<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Jannik Dreier, Pascal Lafourcade, Yassine Lakhnech<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>International Conference on Principles of Security and Trust<\/i>, Mar 2013, Rome, Italy. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-642-36830-1_13\">&#x27E8;10.1007\/978-3-642-36830-1_13&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/hal.science\/hal-01338020\/file\/post2013.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01338020\/file\/post2013.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01338020\/file\/post2013.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01338020v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/inria.hal.science\/hal-01338002v1\" target=\"_blank\" >On Unique Decomposition of Processes in the Applied \u03c0-Calculus<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Jannik Dreier, Cristian Ene, Pascal Lafourcade, Yassine Lakhnech<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>16th International Conference on Foundations of Software Science and Computational Structures (FOSSACS 2013), Held as Part of the European Joint Conferences on Theory and Practice of Software (ETAPS 2013)<\/i>, Mar 2013, Rome, Italy. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-642-37075-5_4\">&#x27E8;10.1007\/978-3-642-37075-5_4&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/inria.hal.science\/hal-01338002\/file\/fossacs2013.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/inria.hal.science\/hal-01338002\/file\/fossacs2013.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/inria.hal.science\/hal-01338002\/file\/fossacs2013.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/inria.hal.science\/hal-01338002v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>Theses<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/theses.hal.science\/tel-01134932v1\" target=\"_blank\" >Formal Verification of Voting and Auction Protocols : From Privacy to Fairness and Verifiability<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Jannik Dreier<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\">General Mathematics [math.GM]. Universit\u00e9 de Grenoble, 2013. English. <a target=\"_blank\" href=\"https:\/\/www.theses.fr\/2013GRENM051\">&#x27E8;NNT : 2013GRENM051&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/theses.hal.science\/tel-01134932\/file\/38358_DREIER_2013_archivage.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/theses.hal.science\/tel-01134932\/file\/38358_DREIER_2013_archivage.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/theses.hal.science\/tel-01134932\/file\/38358_DREIER_2013_archivage.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/theses.hal.science\/tel-01134932v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='Rubrique'>2012<\/p>\n<p class='SousRubrique'>Conference papers<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-01338037v1\" target=\"_blank\" >Defining Privacy for Weighted Votes, Single and Multi-voter Coercion<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Jannik Dreier, Pascal Lafourcade, Yassine Lakhnech<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>European Symposium on Research in Computer Security (ESORICS)<\/i>, Sep 2012, Pise, Italy. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-642-33167-1_26\">&#x27E8;10.1007\/978-3-642-33167-1_26&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/hal.science\/hal-01338037\/file\/esorics2012.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01338037\/file\/esorics2012.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01338037\/file\/esorics2012.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01338037v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-01338064v1\" target=\"_blank\" >A Formal Taxonomy of Privacy in Voting Protocols<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Jannik Dreier, Pascal Lafourcade, Yassine Lakhnech<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>First IEEE International Workshop on Security and Forensics in Communication Systems (ICC&rsquo;12 WS &#8211; SFCS)<\/i>, Jun 2012, Ottawa, Canada. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/ICC.2012.6364938\">&#x27E8;10.1109\/ICC.2012.6364938&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/hal.science\/hal-01338064\/file\/sfcs2012.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01338064\/file\/sfcs2012.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01338064\/file\/sfcs2012.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01338064v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>Reports<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-01338039v1\" target=\"_blank\" >Defining Privacy for Weighted Votes, Single and Multi-voter Coercion<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Jannik Dreier, Pascal Lafourcade, Yassine Lakhnech<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\">[Research Report] VERIMAG. 2012<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/hal.science\/hal-01338039\/file\/TR-2012-2.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01338039\/file\/TR-2012-2.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01338039\/file\/TR-2012-2.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01338039v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-01338031v1\" target=\"_blank\" >Formal Verification of e-Auction Protocols<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Jannik Dreier, Pascal Lafourcade, Yassine Lakhnech<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\">[Technical Report] TR-2012-17, VERIMAG. 2012<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/hal.science\/hal-01338031\/file\/TR-2012-17.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01338031\/file\/TR-2012-17.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01338031\/file\/TR-2012-17.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01338031v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-01338012v1\" target=\"_blank\" >On Unique Decomposition of Processes in the Applied \u03c0-Calculus<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Jannik Dreier, Cristian Ene, Pascal Lafourcade, Yassine Lakhnech<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\">[Technical Report] VERIMAG UMR 5104, Universit\u00e9 Grenoble Alpes, France. 2012<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/hal.science\/hal-01338012\/file\/TR-2012-3.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01338012\/file\/TR-2012-3.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01338012\/file\/TR-2012-3.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01338012v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='Rubrique'>2011<\/p>\n<p class='SousRubrique'>Conference papers<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-01338043v1\" target=\"_blank\" >Practical Privacy-Preserving Multiparty Linear Programming Based on Problem Transformation<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Jannik Dreier, Florian Kerschbaum<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>Third IEEE International Conference on Information Privacy, Security, Risk and Trust (PASSAT&rsquo;11)<\/i>, IEEE, Oct 2011, Boston, United States. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1109\/PASSAT\/SocialCom.2011.19\">&#x27E8;10.1109\/PASSAT\/SocialCom.2011.19&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/hal.science\/hal-01338043\/file\/passat2011.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01338043\/file\/passat2011.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01338043\/file\/passat2011.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01338043v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-01338070v1\" target=\"_blank\" >Vote-Independence: A Powerful Privacy Notion for Voting Protocols<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Jannik Dreier, Pascal Lafourcade, Yassine Lakhnech<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\"><i>4th Canada-France MITACS Workshop on Foundations &#038; Practice of Security (FPS&rsquo;11)<\/i>, May 2011, Paris, France. <a target=\"_blank\" href=\"https:\/\/dx.doi.org\/10.1007\/978-3-642-27901-0_13\">&#x27E8;10.1007\/978-3-642-27901-0_13&#x27E9;<\/a><\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/hal.science\/hal-01338070\/file\/fps2011.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01338070\/file\/fps2011.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01338070\/file\/fps2011.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01338070v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<p class='SousRubrique'>Reports<\/p>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-01338046v1\" target=\"_blank\" >Practical Secure and Efficient Multiparty Linear Programming Based on Problem Transformation<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Jannik Dreier, Florian Kerschbaum<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\">[Technical Report] IACR Cryptology ePrint Archive. 2011<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/hal.science\/hal-01338046\/file\/108.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01338046\/file\/108.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01338046\/file\/108.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01338046v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-01338067v1\" target=\"_blank\" >A formal taxonomy of privacy in voting protocols<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Jannik Dreier, Pascal Lafourcade, Yassine Lakhnech<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\">[Technical Report] VERIMAG UMR 5104, Universit\u00e9 Grenoble Alpes, France. 2011<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/hal.science\/hal-01338067\/file\/TR-2011-10.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01338067\/file\/TR-2011-10.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01338067\/file\/TR-2011-10.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01338067v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl>\n<dl class='NoticeRes'>\n<dt class=\"ChampRes\">titre<\/dt>\n<dd class=\"ValeurRes Titre\"><a href=\"https:\/\/hal.science\/hal-01338071v1\" target=\"_blank\" >Vote-Independence: A Powerful Privacy Notion for Voting Protocols<\/a><\/dd>\n<dt class=\"ChampRes\">auteur<\/dt>\n<dd class=\"ValeurRes Auteurs\">Jannik Dreier, Pascal Lafourcade, Yassine Lakhnech<\/dd>\n<dt class=\"ChampRes\">article<\/dt>\n<dd class=\"ValeurRes article\">[Technical Report] VERIMAG UMR 5104, Universit\u00e9 Grenoble Alpes, France. 2011<\/dd>\n<dt class=\"ChampRes\">Acc\u00e8s au texte int\u00e9gral et bibtex<\/dt>\n<dd class=\"ValeurRes Fichier_joint\"> <a href=\"https:\/\/hal.science\/hal-01338071\/file\/TR-2011-8.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-01338071\/file\/TR-2011-8.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-01338071\/file\/TR-2011-8.pdf\" \/><\/a> <span class=\"LienBibtexACoteFulltext\"><a href=\"https:\/\/hal.science\/hal-01338071v1\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/span><\/dd>\n<\/dl><\/div>\n<p> <\/body> <\/html> <\/p>\n","protected":false},"excerpt":{"rendered":"<p>               var _paq = _paq || [];   _paq.push([&lsquo;trackPageView&rsquo;]);   _paq.push([&lsquo;enableLinkTracking&rsquo;]);   (function() {     var u=\u00a0\u00bb\/\/piwik.inria.fr\/\u00a0\u00bb;     _paq.push([&lsquo;setTrackerUrl&rsquo;, u+&rsquo;piwik.php&rsquo;]);     _paq.push([&lsquo;setSiteId&rsquo;, 25]);     var d=document, g=d.createElement(&lsquo;script&rsquo;), s=d.getElementsByTagName(&lsquo;script&rsquo;)[0];     g.type=&rsquo;text\/javascript&rsquo;; g.async=true; g.defer=true; g.src=u+&rsquo;piwik.js&rsquo;; s.parentNode.insertBefore(g,s);   })();  <\/p>\n<p><img decoding=\"async\" src=\"\/\/piwik.inria.fr\/piwik.php?idsite=25\" style=\"border:0;\" alt=\"\" \/><\/p>\n<p>   Publications HAL   <\/p>\n<p class='Rubrique'>2026<\/p>\n<p class='SousRubrique'>Preprints, Working Papers, &#8230;<\/p>\n<p>titre<br \/>\n<a href=\"https:\/\/hal.science\/hal-05196126v4\" target=\"_blank\">Tamarin Unchained: Handling User-Defined AC Operators<\/a><br \/>\nauteur<br \/>\nJannik Dreier, Elise Klein, Steve Kremer<br \/>\narticle<br \/>\n2026<br \/>\nAcc\u00e8s au texte int\u00e9gral et bibtex<br \/>\n <a href=\"https:\/\/hal.science\/hal-05196126\/file\/mainTR.pdf\"  target=\"_blank\"> <img decoding=\"async\" alt=\"https:\/\/hal.science\/hal-05196126\/file\/mainTR.pdf\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_pdf.png\" border=\"0\" title=\"https:\/\/hal.science\/hal-05196126\/file\/mainTR.pdf\" \/><\/a> <a href=\"https:\/\/hal.science\/hal-05196126v4\/bibtex\" target=\"_self\"> <img decoding=\"async\" alt=\"BibTex\" src=\"https:\/\/haltools.inria.fr\/images\/Haltools_bibtex3.png\" border=\"0\"  title=\"BibTex\" \/><\/a> <\/p>\n<p class='Rubrique'>2025<\/p>\n<p class='SousRubrique'>Other publications<\/p>\n<p>titre<br \/>\n<a href=\"https:\/\/inria.hal.science\/hal-04971713v2\" target=\"_blank\">R\u00e9ponse au projet de mise \u00e0 jour de la recommandation de la CNIL sur le vote \u00e9lectronique<\/a><br \/>\nauteur<br \/>\nV\u00e9ronique Cortier, <\/p>\n","protected":false},"author":5,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-fullwidth.php","meta":{"footnotes":""},"class_list":["post-13","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/members.loria.fr\/JDreier\/wp-json\/wp\/v2\/pages\/13","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/members.loria.fr\/JDreier\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/members.loria.fr\/JDreier\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/members.loria.fr\/JDreier\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/members.loria.fr\/JDreier\/wp-json\/wp\/v2\/comments?post=13"}],"version-history":[{"count":24,"href":"https:\/\/members.loria.fr\/JDreier\/wp-json\/wp\/v2\/pages\/13\/revisions"}],"predecessor-version":[{"id":285,"href":"https:\/\/members.loria.fr\/JDreier\/wp-json\/wp\/v2\/pages\/13\/revisions\/285"}],"wp:attachment":[{"href":"https:\/\/members.loria.fr\/JDreier\/wp-json\/wp\/v2\/media?parent=13"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}