Publications


How to explain security protocols to your children?

Véronique Cortier, Itsaka Rakotonirina.

conference paper In Protocols, Logic, and Strands: Essays Dedicated to Joshua Guttman on the Occasion of His 66.66 Birthday (GuttmanFest), 2021

Symbolic verification of cryptographic protocols: theory and practice

Itsaka Rakotonirina.

PhD thesis Université de Lorraine (France), 2021

A Security Model and Fully Verified Implementation for the IETF QUIC Record Layer

Antoine Delignat-Lavaud, Cédric Fournet, Bryan Parno, Jonathan Protzenko, Tahina Ramananandro, Jay Bosamiya, Joseph Lallemand, Itsaka Rakotonirina, Yi Zhou.

conference paper In the IEEE Symposium on Security and Privacy (S&P), 2021

The hitchhiker's guide to decidability and complexity of equivalence properties in security protocols

Vincent Cheval, Steve Kremer, Itsaka Rakotonirina.

conference paper In Logic, Language, and Security. Essays Dedicated to Andre Scedrov on the Occasion of His 65th Birthday (ScedrovFest65), 2020

Exploiting symmetries when proving equivalence properties for security protocols

Vincent Cheval, Steve Kremer, Itsaka Rakotonirina.

conference paper In the ACM Conference on Computer and Communications Security (CCS), 2019

On Aggregation of Information in Timing Attacks

Itsaka Rakotonirina, Boris Köpf.

conference paper In the IEEE European Symposium on Security and Privacy (EuroS&P), 2019

The DEEPSEC prover

Vincent Cheval, Steve Kremer, Itsaka Rakotonirina.

conference paper In the International Conference on Computer Aided Verification (CAV), 2018

DEEPSEC: Deciding Equivalence Properties in Security Protocols - Theory and Practice

Vincent Cheval, Steve Kremer, Itsaka Rakotonirina.

conference paper In the IEEE Symposium on Security and Privacy (S&P) 2018. Distinguished paper award