Modeling and verifying security protocols with the applied pi calculus and ProVerif

B Blanchet - Foundations and Trends® in Privacy and …, 2016 - nowpublishers.com
ProVerif is an automatic symbolic protocol verifier. It supports a wide range of cryptographic
primitives, defined by rewrite rules or by equations. It can prove various security properties …

Verified models and reference implementations for the TLS 1.3 standard candidate

K Bhargavan, B Blanchet… - 2017 IEEE Symposium on …, 2017 - ieeexplore.ieee.org
TLS 1.3 is the next version of the Transport Layer Security (TLS) protocol. Its clean-slate
design is a reaction both to the increasing demand for low-latency HTTPS connections and …

Strong non-interference and type-directed higher-order masking

G Barthe, S Belaïd, F Dupressoir, PA Fouque… - Proceedings of the …, 2016 - dl.acm.org
Differential power analysis (DPA) is a side-channel attack in which an adversary retrieves
cryptographic material by measuring and analyzing the power consumption of the device on …

[图书][B] Protocols for authentication and key establishment

C Boyd, A Mathuria, D Stebila - 2003 - Springer
The first edition of this book was published in 2003. Inevitably, certain parts of the book
became outdated quickly. At the same time new developments have continued apace …

Verified proofs of higher-order masking

G Barthe, S Belaïd, F Dupressoir, PA Fouque… - … Conference on the …, 2015 - Springer
In this paper, we study the problem of automatically verifying higher-order masking
countermeasures. This problem is important in practice, since weaknesses have been …

Automated detection of under-constrained circuits in zero-knowledge proofs

S Pailoor, Y Chen, F Wang, C Rodríguez… - Proceedings of the …, 2023 - dl.acm.org
As zero-knowledge proofs gain increasing adoption, the cryptography community has
designed domain-specific languages (DSLs) that facilitate the construction of zero …

The last mile: High-assurance and high-speed cryptographic implementations

JB Almeida, M Barbosa, G Barthe… - … IEEE Symposium on …, 2020 - ieeexplore.ieee.org
We develop a new approach for building cryptographic implementations. Our approach
goes the last mile and delivers assembly code that is provably functionally correct, protected …

Verified correctness and security of {OpenSSL}{HMAC}

L Beringer, A Petcher, QY Katherine… - 24th USENIX Security …, 2015 - usenix.org
We have proved, with machine-checked proofs in Coq, that an OpenSSL implementation of
HMAC with SHA-256 correctly implements its FIPS functional specification and that its …

Formal verification of quantum algorithms using quantum Hoare logic

J Liu, B Zhan, S Wang, S Ying, T Liu, Y Li… - … Aided Verification: 31st …, 2019 - Springer
We formalize the theory of quantum Hoare logic (QHL)[TOPLAS 33 (6), 19], an extension of
Hoare logic for reasoning about quantum programs. In particular, we formalize the syntax …

Verified Textbook Algorithms: a Biased Survey

T Nipkow, M Eberl, MPL Haslbeck - International Symposium on …, 2020 - Springer
Verified Textbook Algorithms | SpringerLink Skip to main content Advertisement SpringerLink
Account Menu Find a journal Publish with us Track your research Search Cart Book cover …