Short paper: Formal verification of smart contracts K Bhargavan, A Delignat-Lavaud, C Fournet, A Gollamudi, G Gonthier, ... Proceedings of the 11th ACM Workshop on Programming Languages and Analysis …, 2016 | 788* | 2016 |
Imperfect forward secrecy: How Diffie-Hellman fails in practice D Adrian, K Bhargavan, Z Durumeric, P Gaudry, M Green, JA Halderman, ... Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 741 | 2015 |
Dependent types and multi-monadic effects in F* N Swamy, C Hriţcu, C Keller, A Rastogi, A Delignat-Lavaud, S Forest, ... 43rd annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming …, 2016 | 458 | 2016 |
Formal certification of code-based cryptographic proofs G Barthe, B Grégoire, S Zanella-Béguelin ACM SIGPLAN Notices 44 (1), 90-101, 2009 | 422 | 2009 |
Computer-aided security proofs for the working cryptographer G Barthe, B Grégoire, S Heraud, S Zanella-Béguelin Advances in Cryptology–CRYPTO 2011, 71-90, 2011 | 368 | 2011 |
Probabilistic relational reasoning for differential privacy G Barthe, B Köpf, F Olmedo, S Zanella-Béguelin ACM SIGPLAN Notices 47 (1), 97-110, 2012 | 280 | 2012 |
Verified low-level programming embedded in F* J Protzenko, JK Zinzindohoué, A Rastogi, T Ramananandro, P Wang, ... Proc. ACM program. lang. 1 (ICFP), 17:1-17:29, 2017 | 145 | 2017 |
Probabilistic relational verification for cryptographic implementations G Barthe, C Fournet, B Grégoire, PY Strub, N Swamy, S Zanella-Béguelin ACM SIGPLAN Notices 49 (1), 193-205, 2014 | 133 | 2014 |
Proving the TLS handshake secure (as it is) K Bhargavan, C Fournet, M Kohlweiss, A Pironti, PY Strub, ... Advances in Cryptology–CRYPTO 2014: 34th Annual Cryptology Conference, Santa …, 2014 | 122 | 2014 |
Analyzing information leakage of updates to natural language models S Zanella-Béguelin, L Wutschitz, S Tople, V Rühle, A Paverd, ... Proceedings of the 2020 ACM SIGSAC conference on computer and communications …, 2020 | 114 | 2020 |
Evercrypt: A fast, verified, cross-platform cryptographic provider J Protzenko, B Parno, A Fromherz, C Hawblitzel, M Polubelova, ... 2020 IEEE Symposium on Security and Privacy (SP), 983-1002, 2020 | 114 | 2020 |
Smart meter aggregation via secret-sharing G Danezis, C Fournet, M Kohlweiss, S Zanella-Béguelin Proceedings of the first ACM workshop on Smart energy grid security, 75-80, 2013 | 114 | 2013 |
Analyzing leakage of personally identifiable information in language models N Lukas, A Salem, R Sim, S Tople, L Wutschitz, S Zanella-Béguelin 2023 IEEE Symposium on Security and Privacy (SP), 346-363, 2023 | 111 | 2023 |
Implementing and proving the TLS 1.3 record layer A Delignat-Lavaud, C Fournet, M Kohlweiss, J Protzenko, A Rastogi, ... 2017 IEEE Symposium on Security and Privacy (SP), 463-482, 2017 | 103 | 2017 |
Verified computational differential privacy with applications to smart metering G Barthe, G Danezis, B Grégoire, C Kunz, S Zanella-Beguelin 2013 IEEE 26th Computer Security Foundations Symposium, 287-301, 2013 | 98 | 2013 |
Everest: Towards a verified, drop-in replacement of HTTPS K Bhargavan, B Bond, A Delignat-Lavaud, C Fournet, C Hawblitzel, ... 2nd Summit on Advances in Programming Languages, 2017 | 93 | 2017 |
Downgrade resilience in key-exchange protocols K Bhargavan, C Brzuska, C Fournet, M Green, M Kohlweiss, ... 2016 IEEE Symposium on Security and Privacy (SP), 506-525, 2016 | 67 | 2016 |
Beyond provable security verifiable IND-CCA security of OAEP G Barthe, B Grégoire, Y Lakhnech, S Zanella-Béguelin Topics in Cryptology–CT-RSA 2011, 180-196, 2011 | 63 | 2011 |
Full proof cryptography: verifiable compilation of efficient zero-knowledge protocols J Bacelar Almeida, M Barbosa, E Bangerter, G Barthe, S Krenn, ... Proceedings of the 2012 ACM conference on Computer and communications …, 2012 | 54 | 2012 |
Fully automated analysis of padding-based encryption in the computational model G Barthe, JM Crespo, B Grégoire, C Kunz, Y Lakhnech, B Schmidt, ... Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 53 | 2013 |