SoK: Computer-aided cryptography

M Barbosa, G Barthe, K Bhargavan… - … IEEE symposium on …, 2021 - ieeexplore.ieee.org
Computer-aided cryptography is an active area of research that develops and applies
formal, machine-checkable approaches to the design, analysis, and implementation of …

Verified models and reference implementations for the TLS 1.3 standard candidate

K Bhargavan, B Blanchet… - 2017 IEEE Symposium on …, 2017 - ieeexplore.ieee.org
TLS 1.3 is the next version of the Transport Layer Security (TLS) protocol. Its clean-slate
design is a reaction both to the increasing demand for low-latency HTTPS connections and …

HACL*: A verified modern cryptographic library

JK Zinzindohoué, K Bhargavan, J Protzenko… - Proceedings of the …, 2017 - dl.acm.org
HACL* is a verified portable C cryptographic library that implements modern cryptographic
primitives such as the ChaCha20 and Salsa20 encryption algorithms, Poly1305 and HMAC …

Jasmin: High-assurance and high-speed cryptography

JB Almeida, M Barbosa, G Barthe, A Blot… - Proceedings of the …, 2017 - dl.acm.org
Jasmin is a framework for developing high-speed and high-assurance cryptographic
software. The framework is structured around the Jasmin programming language and its …

Evercrypt: A fast, verified, cross-platform cryptographic provider

J Protzenko, B Parno, A Fromherz… - … IEEE Symposium on …, 2020 - ieeexplore.ieee.org
We present EverCrypt: a comprehensive collection of verified, high-performance
cryptographic functionalities available via a carefully designed API. The API provably …

Simple high-level code for cryptographic arithmetic: With proofs, without compromises

A Erbsen, J Philipoom, J Gross, R Sloan… - ACM SIGOPS Operating …, 2020 - dl.acm.org
We introduce an unusual approach for implementing cryptographic arithmetic in short high-
level code with machinechecked proofs of functional correctness. We further demonstrate …

Vale: Verifying {High-Performance} Cryptographic Assembly Code

B Bond, C Hawblitzel, M Kapritsos, KRM Leino… - 26th USENIX security …, 2017 - usenix.org
High-performance cryptographic code often relies on complex hand-tuned assembly
language that is customized for individual hardware platforms. Such code is difficult to …

Verified low-level programming embedded in F

J Protzenko, JK Zinzindohoué, A Rastogi… - Proceedings of the …, 2017 - dl.acm.org
We present Low*, a language for low-level programming and verification, and its application
to high-assurance optimized cryptographic libraries. Low* is a shallow embedding of a …

Everest: Towards a verified, drop-in replacement of HTTPS

K Bhargavan, B Bond, A Delignat-Lavaud… - 2nd Summit on …, 2017 - research.ed.ac.uk
The HTTPS ecosystem is the foundation on which Internet security is built. At the heart of this
ecosystem is the Transport Layer Security (TLS) protocol, which in turn uses the X. 509 …

Applications of elliptic curve cryptography: A light introduction to elliptic curves and a survey of their applications

R Harkanson, Y Kim - Proceedings of the 12th annual conference on …, 2017 - dl.acm.org
Elliptic curve cryptography (ECC) is a relatively newer form of public key cryptography that
provides more security per bit than other forms of cryptography still being used today. We …