|
||
---|---|---|
hal-01410216v1
Conference papers
Strong Non-Interference and Type-Directed Higher-Order Masking CCS 2016 - 23rd ACM Conference on Computer and Communications Security, Oct 2016, Vienne, Austria. pp.116 - 129, ⟨10.1145/2976749.2978427⟩ |
||
hal-01959322v1
Journal articles
Proving expected sensitivity of probabilistic programs Proceedings of the ACM on Programming Languages, ACM, 2017, 2 (POPL), pp.1-29. ⟨10.1145/3158145⟩ |
||
hal-02552287v2
Reports
Universal equivalence and majority of probabilistic programs over finite fields [Research Report] MPI SP; LSV, ENS Cachan, CNRS, INRIA, Université Paris-Saclay, Cachan (France); LORIA, UMR 7503, Université de Lorraine, CNRS, Vandoeuvre-lès-Nancy. 2020 |
||
inria-00071523v1
Reports
Enforcing High-Level Security Properties For Applets [Research Report] RR-5061, INRIA. 2003 |
||
hal-01599851v1
Conference papers
Attribute-Based Encryption in the Generic Group Model: Automated Proofs and New Constructions ACM Conference on Computer and Communications Security (CCS) 2017, Oct 2017, Dallas, United States |
||
hal-00764871v1
Conference papers
Verified security of redundancy-free encryption from Rabin and RSA CCS '12 - ACM conference on Computer and communications security, Oct 2012, Raleigh, NC, United States. pp.724-735, ⟨10.1145/2382196.2382272⟩ ![]() |
||
hal-01101950v1
Conference papers
System-level Non-interference for Constant-time Cryptography ACM SIGSAC Conference on Computer and Communications Security, CCS'14, Nov 2014, Scottsdale, United States. pp.1267 - 1279, ⟨10.1145/2660267.2660283⟩ |
||
inria-00106182v2
Other publications
A Certified Lightweight Non-Interference Java Bytecode Verifier 2007 |
||
hal-01197456v3
Journal articles
Implicit Computational Complexity of Subrecursive Definitions and Applications to Cryptographic Proofs Journal of Automated Reasoning, Springer Verlag, 2019, 63 (4), pp.813-855. ⟨10.1007/978-3-662-48899-7_15⟩ |
||
hal-01948334v1
Conference papers
Implicit Computational Complexity of Subrecursive Definitions and Applications to Cryptographic Proofs. Logic for Programming, Artificial Intelligence, and Reasoning - 20thInternational Conference, LPAR-20, Nov 2015, Suva, Fiji. pp.203-218 |
||
hal-02470965v1
Conference papers
MaskVerif: Automated Verification of Higher-Order Masking in Presence of Physical Defaults. ESORICS 2019 The European Symposium on Research in Computer Security, Sep 2019, Luxembourg, Luxembourg. pp.300-318 |
||
hal-02975012v1
Journal articles
Formal verification of a constant-time preserving C compiler Proceedings of the ACM on Programming Languages, ACM, 2020, 4 (POPL), pp.1-30. ⟨10.1145/3371075⟩ ![]() |
||
hal-01110783v1
Conference papers
A Formally Verified SSA-based Middle-end 21th European Symposium on Programming, ESOP 2012, Mar 2012, Tallin, Estonia. pp.47-66, ⟨10.1007/978-3-642-28869-2_3⟩ ![]() |
||
hal-01097677v1
Journal articles
Formal Verification of an SSA-based Middle-end for CompCert ACM Transactions on Programming Languages and Systems (TOPLAS), ACM, 2014, 36 (1), pp.35. ⟨10.1145/2579080⟩ ![]() |
||
inria-00634702v3
Reports
Formal Verification of an SSA-based Middle-end for CompCert [University works] 2011 |
||
hal-02404581v1
Conference papers
Machine-Checked Proofs for Cryptographic Standards: Indifferentiability of Sponge and Secure High-Assurance Implementations of SHA-3 CCS 2019 - 26th ACM Conference on Computer and Communications Security, Nov 2019, London, United Kingdom. pp.1607-1622, ⟨10.1145/3319535.3363211⟩ |
||
hal-01112084v1
Conference papers
Beyond Provable Security Verifiable IND-CCA Security of OAEP Topics in Cryptology - 2011 - The Cryptographers' Track at the Conference 2011, San Francisco, CA, USA, February 14-18, 2011. Proceedings, 2011, San Francisco, United States. ⟨10.1007/978-3-642-19074-2_13⟩ ![]() |
||
hal-00765883v1
Conference papers
Verified Security of Merkle-Damgaard 25th IEEE Computer Security Foundations Symposium, CSF 2012, Jun 2012, Cambridge, MA, United States. pp.354-368, ⟨10.1109/CSF.2012.14⟩ |
||
inria-00552886v1
Conference papers
A Machine-Checked Formalization of Sigma-Protocols CSF'10, Jul 2010, Edinburgh, Sweden. pp.246-260, ⟨10.1109/CSF.2010.24⟩ |
||
hal-00765874v1
Conference papers
Verified Indifferentiable Hashing into Elliptic Curves Principles of Security and Trust - First International Conference, POST 2012, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2012, Mar 2012, Tallinn, Estonia. pp.209-228, ⟨10.1007/978-3-642-28641-4_12⟩ |
||
hal-01112075v1
Conference papers
Computer-Aided Security Proofs for the Working Cryptographer Advances in Cryptology - 2011 - 31st Annual Cryptology Conference, 2011, Santa Barbara, United States. ⟨10.1007/978-3-642-22792-9_5⟩ ![]() |
||
hal-01246713v1
Conference papers
Automated Proofs of Pairing-Based Cryptography Proceedings of the 22nd Conference on Computer and Communications Security, Oct 2015, Denver, United States. ⟨10.1145/2810103.2813697⟩ |
||
hal-00765864v1
Conference papers
Probabilistic relational Hoare logics for computer-aided security proofs Mathematics of Program Construction - 11th International Conference, MPC 2012, Jun 2012, Madrid, Spain. pp.1-6, ⟨10.1007/978-3-642-31113-0_1⟩ |
||
hal-00765869v1
Conference papers
Computer-Aided Cryptographic Proofs Static Analysis - 19th International Symposium, SAS 2012, Sep 2012, Deauville, France. ⟨10.1007/978-3-642-33125-1_1⟩ |
||
hal-01410196v1
Conference papers
Advanced Probabilistic Couplings for Differential Privacy 23rd ACM Conference on Computer and Communications Security , Oct 2016, Vienne, Austria. pp.55 - 67, ⟨10.1145/2976749.2978391⟩ |
||
hal-01649104v1
Conference papers
A Fast and Verified Software Stack for Secure Function Evaluation CCS 2017 - ACM SIGSAC Conference on Computer and Communications Security, Oct 2017, Dallas, United States. pp.1-18 |
||
hal-00935736v1
Conference papers
Verified Computational Differential Privacy with Applications to Smart Metering 2013 IEEE 26th Computer Security Foundations Symposium, Jun 2013, New Orleans, United States. pp.287-301, ⟨10.1109/CSF.2013.26⟩ |
||
hal-00765842v1
Conference papers
Computer-Aided Cryptographic Proofs ITP 2012 - Third International Conference on Interactive Theorem Proving, Aug 2012, Princeton N.J., United States. ⟨10.1007/978-3-642-32347-8_2⟩ |
||
hal-01411097v1
Conference papers
Proving Differential Privacy via Probabilistic Couplings Thirty-First Annual ACM/IEEE Symposium on Logic in Computer Science (LICS), Jul 2016, New York, United States. pp.749 - 758, ⟨10.1145/2933575.2934554⟩ |
||
hal-01114366v1
Conference papers
EasyCrypt: A Tutorial FOSAD 2013, 2013, Bertinoro, Italy. ⟨10.1007/978-3-319-10082-1_6⟩ |
||
|