scispace - formally typeset
H

Hubert Comon-Lundh

Researcher at École normale supérieure de Cachan

Publications -  27
Citations -  839

Hubert Comon-Lundh is an academic researcher from École normale supérieure de Cachan. The author has contributed to research in topics: Cryptographic protocol & Decidability. The author has an hindex of 14, co-authored 27 publications receiving 805 citations. Previous affiliations of Hubert Comon-Lundh include French Institute for Research in Computer Science and Automation & École Normale Supérieure.

Papers
More filters
Proceedings ArticleDOI

Computational soundness of observational equivalence

TL;DR: This paper shows a soundness theorem, following the line of research launched by Abadi and Rogaway in 2000: computational indistinguishability in presence of an active attacker is implied by the observational equivalence of the corresponding symbolic processes.
Book ChapterDOI

Models and Proofs of Protocol Security: A Progress Report

TL;DR: This paper discusses progress in the verification of security protocols with a focus on the use of program-like representations of protocols, and their automatic analysis in symbolic and computational models.
Book ChapterDOI

New decidability results for fragments of first-order logic and application to cryptographic protocols

TL;DR: A new extension of the Skolem class for first-order logic is considered, including the built-in equational theory of exclusive or, and the decidability of this class is proved by resolution techniques.
Journal ArticleDOI

Security properties: two agents are sufficient

TL;DR: It is shown that it is always sufficient to consider a bounded number of agents b (b = 2 for secrecy properties for example): if there is an attack involving n agents, then there is a attack involving at most b agents.
Proceedings ArticleDOI

Trace equivalence decision: negative tests and non-determinism

TL;DR: A calculus that is close to the applied pi calculus and that allows one to capture most existing protocols that rely on classical cryptographic primitives is given, and a symbolic semantics for this calculus relying on constraint systems to represent infinite sets of possible traces is proposed.