Lucky Thirteen: Breaking the TLS and DTLS Record Protocols, IEEE Symposium on Security and Privacy, SP 2013, pp.526-540, 2013. ,
Certified computer-aided cryptography: efficient provably secure machine code from high-level implementations, ACM CCS, pp.1217-1230, 2013. ,
Verifiable Side-Channel Security of Cryptographic Implementations: Constant-Time MEE-CBC, FSE 2016, pp.163-184978, 2016. ,
Verifying Constant-time Implementations, 25th USENIX Security Symposium (USENIX Security 16). USENIX Association, 2016. ,
Verification of a Cryptographic Primitive, ACM Transactions on Programming Languages and Systems, vol.37, issue.2, p.256, 2015. ,
DOI : 10.1145/2345156.1993532
Program logics for certified compilers, 2014. ,
Boogie: A Modular Reusable Verifier for Object-Oriented Programs, 4th International Symposium, pp.364-38711804192, 2005. ,
DOI : 10.1007/11804192_17
System-level Non-interference for Constant-time Cryptography, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS '14, pp.1267-1279, 2014. ,
DOI : 10.1007/s00145-009-9049-y
URL : https://hal.archives-ouvertes.fr/hal-01101950
A Formal Library for Elliptic Curves in the Coq Proof Assistant Held as Part of the Vienna Summer of Logic, Interactive Theorem Proving -5th International Conference Proceedings (Lecture Notes in Computer Science), pp.77-92, 2014. ,
Verified Correctness and Security of OpenSSL HMAC USENIX Association, 24th USENIX Security Symposium, USENIX Security 15, pp.207-221, 2015. ,
Writing high-speed software ,
Cache-timing attacks on AES, 2005. ,
Curve25519: New Diffie-Hellman Speed Records, PKC 2006, pp.207-228, 2006. ,
High-Speed High-Security Signatures, CHES 2011, pp.124-142, 2011. ,
DOI : 10.1007/978-3-642-23951-9_9
2015. gfverif: fast and easy verification of finite-field arithmetic, 2015. ,
Verified Low-Level Programming Embedded in F, p.53, 2017. ,
Vale: Verifying High-Performance Cryptographic Assembly Code, 26th USENIX Security Symposium (USENIX Security 17). USENIX Association, 2017. ,
Practical Realisation and Elimination of an ECC-Related Software Bug Attack, CT-RSA 2012, pp.171-186, 2012. ,
DOI : 10.1007/11761679_2
URL : https://eprint.iacr.org/2011/633.pdf
Verifying Curve25519 Software, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS '14, pp.299-309, 2014. ,
DOI : 10.1145/363235.363259
Z3: An Efficient SMT Solver In Tools and Algorithms for the Construction and Analysis of Systems Held as Part of the Joint European Conferences on Theory and Practice of Software, 14th International Conference Proceedings (Lecture Notes in Computer Science), pp.337-340, 2008. ,
The Correctness- Security Gap in Compiler Optimization, 2015 IEEE Symposium on Security and Privacy Workshops, pp.73-87, 2015. ,
Systematic Synthesis of Elliptic Curve Cryptography Implementations, 2017. ,
The Fragility of AES-GCM Authentication Algorithm, 2014 11th International Conference on Information Technology: New Generations, 2013. ,
DOI : 10.1109/ITNG.2014.31
Guide to elliptic curve cryptography, 2004. ,
Validating LR(1) Parsers, European Symposium on Programming, pp.397-416, 2012. ,
DOI : 10.1007/978-3-642-28869-2_20
URL : https://hal.archives-ouvertes.fr/hal-01077321
When Constant-Time Source Yields Variable-Time Binary: Exploiting Curve25519-donna Built with MSVC 2015, Cryptology and Network Security - 15th International Conference Proceedings (Lecture Notes in Computer Science), pp.573-582978, 2016. ,
DOI : 10.1007/3-540-68697-5_9
URL : https://infoscience.epfl.ch/record/223794/files/32_1.pdf
Dafny: An Automatic Program Verifier for Functional Correctness, Logic for Programming, Artificial Intelligence, and Reasoning - 16th International Conference, LPAR-16, pp.348-370978, 2010. ,
Formal certification of a compiler back-end, or: programming a compiler with a proof assistant, 33rd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pp.42-54, 2006. ,
URL : https://hal.archives-ouvertes.fr/inria-00000963
Translation validation for an optimizing compiler, ACM sigplan notices, pp.83-94, 2000. ,
Boolector 2.0 system description, Journal on Satisfiability Boolean Modeling and Computation, vol.9, pp.53-58, 2014. ,
The Foundational Cryptography Framework Held as Part of the European Joint Conferences on Theory and Practice of Software, Principles of Security and Trust -4th International Conference Proceedings (Lecture Notes in Computer Science), pp.53-72978, 2015. ,
Linear scan register allocation, ACM Transactions on Programming Languages and Systems, vol.21, issue.5, pp.895-913, 1999. ,
DOI : 10.1145/330249.330250
URL : http://www.research.ibm.com/jalapeno/papers/toplas99.pdf
Sparse representation of implicit flows with applications to side-channel detection, Proceedings of the 25th International Conference on Compiler Construction, CC 2016, pp.110-120, 2016. ,
DOI : 10.1145/2491956.2462164
Verified Correctness and Security of mbedTLS HMAC-DRBG, Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security , CCS '17, 2017. ,
DOI : 10.1145/358198.358210
A Verified Extensible Library of Elliptic Curves, 2016 IEEE 29th Computer Security Foundations Symposium (CSF), pp.296-309, 2016. ,
DOI : 10.1109/CSF.2016.28