An E cient Cryptographic Protocol Verifier Based on Prolog Rules B Blanchet 14th IEEE Computer Security Foundations Workshop (CSFW-14), 82-96, 2001 | 1517 | 2001 |
A static analyzer for large safety-critical software B Blanchet, P Cousot, R Cousot, J Feret, L Mauborgne, A Miné, ... Proceedings of the ACM SIGPLAN 2003 conference on Programming language …, 2003 | 945 | 2003 |
Automated verification of selected equivalences for security protocols B Blanchet, M Abadi, C Fournet The Journal of Logic and Algebraic Programming 75 (1), 3-51, 2008 | 514 | 2008 |
A computationally sound mechanized prover for security protocols B Blanchet Dependable and Secure Computing, IEEE Transactions on 5 (4), 193-207, 2008 | 487 | 2008 |
Escape analysis for object-oriented languages: application to Java B Blanchet Acm Sigplan Notices 34 (10), 20-34, 1999 | 398 | 1999 |
Modeling and verifying security protocols with the applied pi calculus and ProVerif B Blanchet Foundations and Trends® in Privacy and Security 1 (1-2), 1-135, 2016 | 384 | 2016 |
ProVerif 2.00: automatic cryptographic protocol verifier, user manual and tutorial B Blanchet, B Smyth, V Cheval, M Sylvestre Version from 16, 05-16, 2018 | 329* | 2018 |
Automatic verification of correspondences for security protocols B Blanchet Journal of Computer Security 17 (4), 363-434, 2009 | 314 | 2009 |
Design and implementation of a special-purpose static program analyzer for safety-critical real-time embedded software B Blanchet, P Cousot, R Cousot, J Feret, L Mauborgne, A Miné, ... The essence of computation: complexity, analysis, transformation, 85-108, 2002 | 307 | 2002 |
Verified models and reference implementations for the TLS 1.3 standard candidate K Bhargavan, B Blanchet, N Kobeissi 2017 IEEE Symposium on Security and Privacy (SP), 483-502, 2017 | 284 | 2017 |
Automatic proof of strong secrecy for security protocols B Blanchet IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004, 86-100, 2004 | 258 | 2004 |
Analyzing security protocols with secrecy types and logic programs M Abadi, B Blanchet Journal of the ACM (JACM) 52 (1), 102-146, 2005 | 219 | 2005 |
From secrecy to authenticity in security protocols B Blanchet International Static Analysis Symposium, 342-359, 2002 | 214 | 2002 |
Automated verification for secure messaging protocols and their implementations: A symbolic and computational approach N Kobeissi, K Bhargavan, B Blanchet 2017 IEEE European symposium on security and privacy (EuroS&P), 435-450, 2017 | 190 | 2017 |
Automatic verification of security protocols in the symbolic model: The verifier proverif B Blanchet International School on Foundations of Security Analysis and Design, 54-87, 2012 | 189 | 2012 |
The applied pi calculus: Mobile values, new names, and secure communication M Abadi, B Blanchet, C Fournet Journal of the ACM (JACM) 65 (1), 1-41, 2017 | 181 | 2017 |
SoK: Computer-aided cryptography M Barbosa, G Barthe, K Bhargavan, B Blanchet, C Cremers, K Liao, ... 2021 IEEE symposium on security and privacy (SP), 777-795, 2021 | 179 | 2021 |
Security Protocol Verification: Symbolic and Computational Models B Blanchet First Conference on Principles of Security and Trust (POST'12), 3-29, 2012 | 165 | 2012 |
ProVerif: Cryptographic protocol verifier in the formal model B Blanchet, V Cheval, X Allamigeon, B Smyth | 163 | 2010 |
Secrecy types for asymmetric communication M Abadi, B Blanchet International Conference on Foundations of Software Science and Computation …, 2001 | 156 | 2001 |