Dependent types and multi-monadic effects in F N Swamy, C Hriţcu, C Keller, A Rastogi, A Delignat-Lavaud, S Forest, ... Proceedings of the 43rd annual ACM SIGPLAN-SIGACT Symposium on Principles of …, 2016 | 457 | 2016 |
A messy state of the union: Taming the composite state machines of TLS B Beurdouche, K Bhargavan, A Delignat-Lavaud, C Fournet, M Kohlweiss, ... Communications of the ACM 60 (2), 99-107, 2017 | 402 | 2017 |
HACL*: A verified modern cryptographic library JK Zinzindohoué, K Bhargavan, J Protzenko, B Beurdouche Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 279 | 2017 |
Verified low-level programming embedded in F J Protzenko, JK Zinzindohoué, A Rastogi, T Ramananandro, P Wang, ... Proceedings of the ACM on Programming Languages 1 (ICFP), 1-29, 2017 | 145 | 2017 |
Implementing and proving the TLS 1.3 record layer A Delignat-Lavaud, C Fournet, M Kohlweiss, J Protzenko, A Rastogi, ... 2017 IEEE Symposium on Security and Privacy (SP), 463-482, 2017 | 102 | 2017 |
Everest: Towards a verified, drop-in replacement of HTTPS K Bhargavan, B Bond, A Delignat-Lavaud, C Fournet, C Hawblitzel, ... 2nd Summit on Advances in Programming Languages, 2017 | 93 | 2017 |
Implementing and proving the TLS 1.3 record layer K Bhargavan, A Delignat-Lavaud, C Fournet, M Kohlweiss, J Pan, ... SP 2017-38th IEEE Symposium on Security and Privacy, 463-482, 2017 | 41 | 2017 |
A verified extensible library of elliptic curves JK Zinzindohoue, EI Bartzia, K Bhargavan 2016 IEEE 29th Computer Security Foundations Symposium (CSF), 296-309, 2016 | 39 | 2016 |
Verified low-level programming embedded in F* K Bhargavan, A Delignat-Lavaud, C Fournet, C Hritcu, J Protzenko, ... arXiv preprint arXiv:1703.00053, 2017 | 12 | 2017 |
Secure, fast and verified cryptographic applications: a scalable approach JK Zinzindohoué-Marsaudon Université Paris sciences et lettres, 2018 | 2 | 2018 |
A messy state of the union: taming the composite state machines of TLS K Bhargavan, B Beurdouche, A Delignat-Lavaud, C Fournet, M Kohlweiss, ... Communications of the ACM 60 (2), 99-107, 2017 | | 2017 |
HACL, une bibliothèque cryptographique formellement vérifiée dans Firefox B Beurdouche, JK Zinzindohoué | | |
Extracting from F* to C: a progress report P Wang, K Bhargavan, JK Zinzindohoué, A Anand, C Fournet, B Parno, ... | | |
A messy state of the union B Beurdouche, A Delignat-Lavaud, C Fournet, M Kohlweiss, A Pironti, ... | | |
FlexTLS: des prototypes à l’exploitation de vulnérabilités dans TLS B Beurdouche, JK Zinzindohoué | | |