Shift-coupling, Stochastic Proc. Appl, pp.1-14, 1993. ,
DOI : 10.1016/0304-4149(93)90034-2
URL : https://doi.org/10.1016/0304-4149(93)90034-2
A logic for information flow in object-oriented programs ,
Random walks (lecture notes) ,
Secure Information Flow by Self-Composition, IEEE Computer Security Foundations Workshop (CSFW), pp.100-114, 2004. ,
DOI : 10.1109/csfw.2004.1310735
Formal certification of code-based cryptographic proofs, ACM SIGPLAN?SIGACT Symposium on Principles of Programming Languages (POPL), pp.90-101, 2009. ,
DOI : 10.1145/1480881.1480894
URL : http://www-sop.inria.fr/everest/personnel/Benjamin.Gregoire/Publi/popl09.pdf
Relational Verification Using Product Programs, International Symposium on Formal Methods (FM), pp.200-214, 2011. ,
DOI : 10.1007/978-3-540-68237-0_5
URL : http://software.imdea.org/~jmcrespo/docs/FM2011.pdf
Probabilistic relational reasoning for differential privacy, ACM SIGPLAN?SIGACT Symposium on Principles of Programming Languages (POPL), pp.97-110, 2012. ,
DOI : 10.1145/2103656.2103670
Beyond 2-Safety: Asymmetric Product Programs for Relational Program Verification, Symposium on the Logical Foundations of Computer Science (LFCS), pp.29-43, 2013. ,
DOI : 10.1007/978-3-642-35722-0_3
URL : http://software.imdea.org/~jmcrespo/docs/LFCS2013.pdf
EasyCrypt: A Tutorial, Foundations of Security Analysis and Design VII (FOSAD), pp.146-166, 2013. ,
DOI : 10.1145/1594834.1480894
URL : https://hal.archives-ouvertes.fr/hal-01114366
Probabilistic relational verification for cryptographic implementations, Proceedings of the 41st ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL '14, pp.193-206, 2014. ,
DOI : 10.1145/2535838.2535847
URL : https://hal.archives-ouvertes.fr/hal-00935743
Proving Differential Privacy in Hoare Logic, 2014 IEEE 27th Computer Security Foundations Symposium, pp.411-424, 2014. ,
DOI : 10.1109/CSF.2014.36
URL : http://doi.org/10.1109/csf.2014.36
Relational reasoning via probabilistic coupling, International Conference on Logic for Programming, Artificial Intelligence and Reasoning (LPAR), pp.387-401, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-01246719
Higher-order approximate relational refinement types for mechanism design and differential privacy, ACM SIGPLAN?SIGACT Symposium on Principles of Programming Languages (POPL), pp.55-68, 2015. ,
DOI : 10.1145/2775051.2677000
URL : http://arxiv.org/pdf/1407.6845
Product programs and relational program logics, Journal of Logical and Algebraic Methods in Programming, vol.85, issue.5, 2016. ,
DOI : 10.1016/j.jlamp.2016.05.004
Proving Differential Privacy via Probabilistic Couplings, Proceedings of the 31st Annual ACM/IEEE Symposium on Logic in Computer Science, LICS '16, 2016. ,
DOI : 10.1007/978-3-662-43613-4_13
URL : https://hal.archives-ouvertes.fr/hal-01411097
A program logic for union bounds, International Colloquium on Automata, Languages and Programming (ICALP), 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01411095
Simple relational correctness proofs for static analyses and program transformations, ACM SIGPLAN?SIGACT Symposium on Principles of Programming Languages (POPL), pp.14-25, 2004. ,
DOI : 10.1145/964001.964003
Proof-Relevant Logical Relations for Name Generation, International Conference on Typed Lambda Calculi and Applications (TLCA), pp.48-60, 2013. ,
DOI : 10.1007/978-3-642-38946-7_6
URL : http://arxiv.org/pdf/1708.05193
Relational Decomposition, Interactive Theorem Proving (ITP), pp.39-54, 2011. ,
DOI : 10.1016/j.tcs.2006.12.036
URL : http://www.cs.princeton.edu/~eberinge/itp.pdf
Secure information flow and program logics, 20th IEEE Computer Security Foundations Symposium (CSF'07), pp.233-248, 2007. ,
DOI : 10.1109/CSF.2007.30
URL : http://www.cs.princeton.edu/~eberinge/CSF.pdf
Step-Indexed Logical Relations for Probability, International Confernece on Foundations of Software Science and Computation Structures (FoSSaCS), pp.279-294, 2015. ,
DOI : 10.1007/978-3-662-46678-0_18
Handbook of Markov Chain Monte Carlo, 2011. ,
DOI : 10.1201/b10905
Path coupling: A technique for proving rapid mixing in Markov chains, Proceedings 38th Annual Symposium on Foundations of Computer Science, pp.223-231, 1997. ,
DOI : 10.1109/SFCS.1997.646111
URL : http://www.stanford.edu/~montanar/TEACHING/Stat375/papers/path_coupling.pdf
A unified indifferentiability proof for permutation-or block cipher-based hash functions, IACR Cryptology ePrint Archive, p.363, 2012. ,
Proving acceptability properties of relaxed nondeterministic approximate programs ,
DOI : 10.1145/2254064.2254086
URL : http://people.csail.mit.edu/rinard/paper/pldi12.relaxed.pdf
Continuity analysis of programs, ACM SIGPLAN?SIGACT Symposium on Principles of Programming Languages (POPL), pp.57-70, 2010. ,
DOI : 10.1145/1706299.1706308
URL : http://research.microsoft.com/en-us/people/sumitg/pubs/popl10_continuity.pdf
A Theorem Proving Approach to Analysis of Secure Information Flow, Security in Pervasive Computing, pp.193-209, 2003. ,
DOI : 10.1007/978-3-540-32004-3_20
Probabilistic extensions of semantical models, 2002. ,
Geometric Bounds for Eigenvalues of Markov Chains, The Annals of Applied Probability, vol.1, issue.1, pp.36-61, 1991. ,
DOI : 10.1214/aoap/1177005980
A Finite Population Model of Molecular Evolution: Theory and Computation, Journal of Computational Biology, vol.19, issue.10, pp.1176-1202, 2012. ,
DOI : 10.1089/cmb.2012.0064
Comprehensive Parametric Polymorphism: Categorical Models and Type Theory, International Confernece on Foundations of Software Science and Computation Structures (FoSSaCS), pp.3-19, 2016. ,
DOI : 10.1145/99370.99404
URL : https://link.springer.com/content/pdf/10.1007%2F978-3-662-49630-5_1.pdf
Rapid Mixing and Security of Chaum???s Visual Electronic Voting, European Symposium on Programming on Research in Computer Security (ESORICS), pp.132-145 ,
DOI : 10.1007/978-3-540-39650-5_8
A very simple algorithm for estimating the number of k-colorings of a low-degree graph. Random Struct, Algorithms, vol.7, issue.2, pp.157-166, 1995. ,
Approximating the Permanent, SIAM Journal on Computing, vol.18, issue.6, pp.1149-1178, 1989. ,
DOI : 10.1137/0218077
URL : http://www.cs.berkeley.edu/~sinclair/perm.pdf
Relational abstract interpretation for the verification of 2-hypersafety properties, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, CCS '13, pp.211-222, 2013. ,
DOI : 10.1145/2508859.2516721
Semantics of probabilistic programs, IEEE Symposium on Foundations of Computer Science (FOCS), pp.101-114, 1979. ,
DOI : 10.1016/0022-0000(81)90036-2
URL : https://doi.org/10.1016/0022-0000(81)90036-2
A probabilistic PDL, Journal of Computer and System Sciences, vol.30, issue.2, pp.162-178, 1985. ,
DOI : 10.1016/0022-0000(85)90012-1
URL : https://doi.org/10.1016/0022-0000(85)90012-1
Kolmogorov Extension, Martingale Convergence, and Compositionality of Processes, Proceedings of the 31st Annual ACM/IEEE Symposium on Logic in Computer Science, LICS '16 ,
DOI : 10.1016/0047-259X(71)90028-5
URL : http://dl.acm.org/ft_gateway.cfm?id=2933610&type=pdf
Coupling vs. conductance for the Jerrum-Sinclair chain. Random Struct, Algorithms, vol.18, issue.1, pp.1-17, 2001. ,
On coinductive equivalences for higher-order probabilistic functional programs, ACM SIGPLAN?SIGACT Symposium on Principles of Programming Languages (POPL), pp.297-308, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-01091573
Markov chains and mixing times, 2009. ,
DOI : 10.1090/mbk/058
Equation of State Calculations by Fast Computing Machines, The Journal of Chemical Physics, vol.21, issue.6, pp.1087-1092, 1953. ,
DOI : 10.1063/1.1700747
Probabilistically Accurate Program Transformations, International Symposium on Static Analysis (SAS), pp.316-333, 2011. ,
DOI : 10.1145/1322263.1322279
URL : http://people.csail.mit.edu/rinard/paper/sas11.pdf
Probabilistic predicate transformers, ACM Transactions on Programming Languages and Systems, vol.18, issue.3, pp.325-353, 1996. ,
DOI : 10.1145/229542.229547
An Analysis of Universal Information Flow Based on Self-Composition, 2015 IEEE 28th Computer Security Foundations Symposium, pp.380-393, 2015. ,
DOI : 10.1109/CSF.2015.33
Verification of information flow and access control policies with dependent types, IEEE Symposium on Security and Privacy (S&P), pp.165-179, 2011. ,
Formalizing the Analysis of Algorithms, 1979. ,
Environmental bisimulations for probabilistic higher-order languages, ACM SIGPLAN?SIGACT Symposium on Principles of Programming Languages (POPL), pp.595-607, 2016. ,
DOI : 10.1145/2914770.2837651
URL : https://hal.archives-ouvertes.fr/hal-01337665
Approximate Relational Hoare Logic for Continuous Random Samplings, Workshop on the Mathematical Foundations of Programming Semantics (MFPS), 2016. ,
DOI : 10.1016/j.entcs.2016.09.043
URL : https://doi.org/10.1016/j.entcs.2016.09.043
Managing performance vs. accuracy trade-offs with loop perforation, Proceedings of the 19th ACM SIGSOFT symposium and the 13th European conference on Foundations of software engineering, SIGSOFT/FSE '11, pp.124-134, 2011. ,
DOI : 10.1145/2025113.2025133
Cartesian Hoare logic for verifying k-safety properties, ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI), pp.57-69, 2016. ,
DOI : 10.1145/2908080.2908092
URL : http://dl.acm.org/ft_gateway.cfm?id=2908092&type=pdf
Secure Information Flow as a Safety Problem, International Symposium on Static Analysis (SAS) Thorisson. Coupling, Stationarity, and Regeneration, pp.352-367, 2000. ,
DOI : 10.1007/11547662_24
URL : http://www.kb.ecei.tohoku.ac.jp/~terauchi/papers/tr05-infoflow.pdf
Optimal transport: old and new, 2008. ,
DOI : 10.1007/978-3-540-71050-9
Relational separation logic, Theoretical Computer Science, vol.375, issue.1-3, pp.308-334, 2007. ,
DOI : 10.1016/j.tcs.2006.12.036
URL : https://doi.org/10.1016/j.tcs.2006.12.036
CoVaC: Compiler Validation by Program Analysis of the Cross-Product, International Symposium on Formal Methods (FM), pp.35-51, 2008. ,
DOI : 10.1007/978-3-540-68237-0_5