Enforcing Fine-grained Constant-time Policies | 0 | 0.34 | 2022 |
Enforcing fine-grained constant-time policies. | 0 | 0.34 | 2022 |
Typing High-Speed Cryptography against Spectre v1. | 0 | 0.34 | 2022 |
EasyPQC: Verifying Post-Quantum Cryptography | 1 | 0.35 | 2021 |
High-Assurance Cryptography in the Spectre Era. | 0 | 0.34 | 2021 |
Mechanized Proofs of Adversarial Complexity and Application to Universal Composability | 0 | 0.34 | 2021 |
Structured Leakage and Applications to Cryptographic Constant-Time and Cost | 0 | 0.34 | 2021 |
Masking in Fine-Grained Leakage Models: Construction, Implementation and Verification. | 2 | 0.37 | 2021 |
Formal verification of a constant-time preserving C compiler | 1 | 0.37 | 2020 |
The Last Mile: High-Assurance and High-Speed Cryptographic Implementations | 1 | 0.35 | 2020 |
Hardware Private Circuits: From Trivial Composition to Full Verification | 2 | 0.39 | 2020 |
Maskverif: Automated Verification Of Higher-Order Masking In Presence Of Physical Defaults | 3 | 0.39 | 2019 |
FaCT: a DSL for timing-sensitive computation | 2 | 0.35 | 2019 |
Machine-Checked Proofs for Cryptographic Standards. | 0 | 0.34 | 2019 |
A Machine-Checked Proof of Security for AWS Key Management Service | 3 | 0.40 | 2019 |
Symbolic Methods in Computational Cryptography Proofs | 1 | 0.37 | 2019 |
The Last Mile: High-Assurance and High-Speed Cryptographic Implementations. | 0 | 0.34 | 2019 |
Machine-Checked Proofs for Cryptographic Standards: Indifferentiability of Sponge and Secure High-Assurance Implementations of SHA-3 | 0 | 0.34 | 2019 |
maskVerif: a formal tool for analyzing software and hardware masked implementations. | 1 | 0.36 | 2018 |
An Assertion-Based Program Logic for Probabilistic Programs. | 0 | 0.34 | 2018 |
Masking the GLP Lattice-Based Signature Scheme at Any Order. | 2 | 0.41 | 2018 |
Symbolic Proofs for Lattice-Based Cryptography. | 1 | 0.36 | 2018 |
Proving expected sensitivity of probabilistic programs | 7 | 0.47 | 2018 |
Secure Compilation of Side-Channel Countermeasures: The Case of Cryptographic “Constant-Time” | 9 | 0.46 | 2018 |
Formal Security Proof of CMAC and Its Variants | 0 | 0.34 | 2018 |
Improved Parallel Mask Refreshing Algorithms: Generic Solutions with Parametrized Non-Interference & Automated Optimizations. | 1 | 0.35 | 2018 |
Coupling proofs are probabilistic product programs. | 3 | 0.39 | 2017 |
Provably secure compilation of side-channel countermeasures. | 1 | 0.35 | 2017 |
Jasmin: High-Assurance and High-Speed Cryptography. | 14 | 0.58 | 2017 |
A Note on 'Further Improving Efficiency of Higher-Order Masking Scheme by Decreasing Randomness Complexity'. | 0 | 0.34 | 2017 |
A Fast and Verified Software Stack for Secure Function Evaluation. | 4 | 0.40 | 2017 |
Proving uniformity and independence by self-composition and coupling. | 6 | 0.44 | 2017 |
Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model. | 14 | 0.51 | 2017 |
Advanced Probabilistic Couplings for Differential Privacy. | 13 | 0.55 | 2016 |
Proving Differential Privacy via Probabilistic Couplings | 19 | 0.71 | 2016 |
A program logic for union bounds. | 4 | 0.37 | 2016 |
Strong Non-Interference and Type-Directed Higher-Order Masking. | 18 | 0.76 | 2016 |
Verified Proofs of Higher-Order Masking. | 30 | 0.86 | 2015 |
Compositional Verification of Higher-Order Masking: Application to a Verifying Masking Compiler. | 9 | 0.52 | 2015 |
Automated Proofs of Pairing-Based Cryptography | 7 | 0.46 | 2015 |
Relational reasoning via probabilistic coupling | 9 | 0.49 | 2015 |
Synthesis of Fault Attacks on Cryptographic Implementations | 8 | 0.56 | 2014 |
Making RSA---PSS Provably Secure against Non-random Faults | 4 | 0.40 | 2014 |
Probabilistic relational verification for cryptographic implementations | 24 | 1.57 | 2014 |
Verified Implementations for Secure and Verifiable Computation. | 0 | 0.34 | 2014 |
Fully automated analysis of padding-based encryption in the computational model | 21 | 0.86 | 2013 |
EasyCrypt: A Tutorial. | 11 | 0.48 | 2013 |
Verified Security of Merkle-Damgård | 9 | 0.57 | 2012 |
Computer-Aided cryptographic proofs | 2 | 0.41 | 2012 |
Automation in computer-aided cryptography: proofs, attacks and designs | 0 | 0.34 | 2012 |