Alexandre Debant
YOU?
Author Swipe
View article: A Practical and Fully Distributed E-Voting Protocol for the Swiss Context
A Practical and Fully Distributed E-Voting Protocol for the Swiss Context Open
Internet voting in Switzerland for political elections is strongly regulated by the Federal Chancellery (FCh). It puts a great emphasis on the individual verifiability: security against a corrupted voting device is ensured via return codes…
View article: Vote&Check: Secure Postal Voting with Reduced Trust Assumptions
Vote&Check: Secure Postal Voting with Reduced Trust Assumptions Open
Postal voting is a frequently used alternative to on-site voting.Traditionally, its security relies on organizational measures, andvoters have to trust many entities.In the recent years, several schemes have been proposed to addverifiabili…
View article: Election Eligibility with OpenID: Turning Authentication into Transferable Proof of Eligibility
Election Eligibility with OpenID: Turning Authentication into Transferable Proof of Eligibility Open
International audience
View article: Vote&Check: Secure Postal Voting with Reduced Trust Assumptions
Vote&Check: Secure Postal Voting with Reduced Trust Assumptions Open
Postal voting is a frequently used alternative to on-site voting. Traditionally, its security relies on organizational measures, and voters have to trust many entities. In the recent years, several schemes have been proposed to add verifia…
View article: Election Verifiability with ProVerif
Election Verifiability with ProVerif Open
International audience
View article: Reversing, Breaking, and Fixing the French Legislative Election E-Voting Protocol
Reversing, Breaking, and Fixing the French Legislative Election E-Voting Protocol Open
International audience
View article: Themis
Themis Open
International audience
View article: So Near and Yet So Far – Symbolic Verification of Distance-Bounding Protocols
So Near and Yet So Far – Symbolic Verification of Distance-Bounding Protocols Open
The continuous adoption of Near Field Communication (NFC) tags offers many new applications whose security is essential (e.g., contactless payments). In order to prevent flaws and attacks, we develop in this article a framework allowing us…
View article: Proving Unlinkability using ProVerif through Desynchronized Bi-Processes
Proving Unlinkability using ProVerif through Desynchronized Bi-Processes Open
International audience
View article: Symbolic verification of distance-bounding protocols : application to payment protocols
Symbolic verification of distance-bounding protocols : application to payment protocols Open
L’essor des nouvelles technologies, et en particulier la Communication en Champ Proche (NFC), a permis l’apparition de nouvelles applications. A ce titre, nous pouvons mentionner le paiement sans contact, les clefs mains libres ou encore l…
View article: Security Analysis and Implementation of Relay-Resistant Contactless Payments
Security Analysis and Implementation of Relay-Resistant Contactless Payments Open
International audience
View article: Symbolic analysis of terrorist fraud resistance
Symbolic analysis of terrorist fraud resistance Open
International audience
View article: Symbolic verification of distance bounding protocols
Symbolic verification of distance bounding protocols Open
International audience
View article: Proving physical proximity using symbolic models
Proving physical proximity using symbolic models Open
For many modern applications like e.g. contactless payment, and keyless systems, ensuring physical proximity is a security goal of paramount importance. Formal methods have proved their usefulness when analysing standard security protocols…
View article: A Symbolic Framework to Analyse Physical Proximity in Security Protocols
A Symbolic Framework to Analyse Physical Proximity in Security Protocols Open
For many modern applications like e.g., contactless payment, and keyless systems, ensuring physical proximity is a security goal of paramount importance. Formal methods have proved their usefulness when analysing standard security protocol…