J. Nadhem, K. G. Alfardan, and . Paterson, Lucky Thirteen: Breaking the TLS and DTLS Record Protocols, IEEE Symposium on Security and Privacy, SP 2013, pp.526-540, 2013.

J. Bacelar-almeida, M. Barbosa, G. Barthe, and F. Dupressoir, Certified computer-aided cryptography: efficient provably secure machine code from high-level implementations, ACM CCS, pp.1217-1230, 2013.

J. Bacelar-almeida, M. Barbosa, G. Barthe, and F. Dupressoir, Verifiable Side-Channel Security of Cryptographic Implementations: Constant-Time MEE-CBC, FSE 2016, pp.163-184978, 2016.

J. C. , B. Almeida, M. Barbosa, G. Barthe, F. Dupressoir et al., Verifying Constant-time Implementations, 25th USENIX Security Symposium (USENIX Security 16). USENIX Association, 2016.

A. W. Appel, Verification of a Cryptographic Primitive, ACM Transactions on Programming Languages and Systems, vol.37, issue.2, p.256, 2015.
DOI : 10.1145/2345156.1993532

W. Andrew, R. Appel, A. Dockins, L. Hobor, J. Beringer et al., Program logics for certified compilers, 2014.

M. Barnett, R. Bor-yuh-evan-chang, B. Deline, K. Jacobs, M. Rustan et al., Boogie: A Modular Reusable Verifier for Object-Oriented Programs, 4th International Symposium, pp.364-38711804192, 2005.
DOI : 10.1007/11804192_17

G. Barthe, G. Betarte, J. D. Campo, C. D. Luna, and D. Pichardie, System-level Non-interference for Constant-time Cryptography, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS '14, pp.1267-1279, 2014.
DOI : 10.1007/s00145-009-9049-y

URL : https://hal.archives-ouvertes.fr/hal-01101950

E. Bartzia and P. Strub, A Formal Library for Elliptic Curves in the Coq Proof Assistant Held as Part of the Vienna Summer of Logic, Interactive Theorem Proving -5th International Conference Proceedings (Lecture Notes in Computer Science), pp.77-92, 2014.

L. Beringer, A. Petcher, K. Q. Ye, and A. W. Appel, Verified Correctness and Security of OpenSSL HMAC USENIX Association, 24th USENIX Security Symposium, USENIX Security 15, pp.207-221, 2015.

D. Bernstein, Writing high-speed software

J. Daniel and . Bernstein, Cache-timing attacks on AES, 2005.

J. Daniel and . Bernstein, Curve25519: New Diffie-Hellman Speed Records, PKC 2006, pp.207-228, 2006.

D. J. Bernstein, N. Duif, T. Lange, P. Schwabe, and B. Yang, High-Speed High-Security Signatures, CHES 2011, pp.124-142, 2011.
DOI : 10.1007/978-3-642-23951-9_9

D. Berstein and P. Schwabe, 2015. gfverif: fast and easy verification of finite-field arithmetic, 2015.

K. Bhargavan, A. Delignat-lavaud, C. Fournet, C. Hritcu, J. Protzenko et al., Verified Low-Level Programming Embedded in F, p.53, 2017.

B. Bond, C. Hawblitzel, M. Kapritsos, K. Rustan, M. Leino et al., Vale: Verifying High-Performance Cryptographic Assembly Code, 26th USENIX Security Symposium (USENIX Security 17). USENIX Association, 2017.

B. B. Brumley, M. Barbosa, D. Page, and F. Vercauteren, Practical Realisation and Elimination of an ECC-Related Software Bug Attack, CT-RSA 2012, pp.171-186, 2012.
DOI : 10.1007/11761679_2

URL : https://eprint.iacr.org/2011/633.pdf

Y. Chen, C. Hsu, H. Lin, P. Schwabe, M. Tsai et al., Verifying Curve25519 Software, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS '14, pp.299-309, 2014.
DOI : 10.1145/363235.363259

L. Mendonça-de-moura and N. Bjørner, Z3: An Efficient SMT Solver In Tools and Algorithms for the Construction and Analysis of Systems Held as Part of the Joint European Conferences on Theory and Practice of Software, 14th International Conference Proceedings (Lecture Notes in Computer Science), pp.337-340, 2008.

D. Vijay, M. Silva, D. X. Payer, and . Song, The Correctness- Security Gap in Compiler Optimization, 2015 IEEE Symposium on Security and Privacy Workshops, pp.73-87, 2015.

A. Erbsen, J. Philipoom, J. Gross, R. Sloan, and A. Chlipala, Systematic Synthesis of Elliptic Curve Cryptography Implementations, 2017.

S. Gueron and V. Krasnov, The Fragility of AES-GCM Authentication Algorithm, 2014 11th International Conference on Information Technology: New Generations, 2013.
DOI : 10.1109/ITNG.2014.31

D. Hankerson, A. Menezes, and S. Vanstone, Guide to elliptic curve cryptography, 2004.

J. Jourdan, F. Pottier, and X. Leroy, Validating LR(1) Parsers, European Symposium on Programming, pp.397-416, 2012.
DOI : 10.1007/978-3-642-28869-2_20

URL : https://hal.archives-ouvertes.fr/hal-01077321

T. Kaufmann, H. Pelletier, S. Vaudenay, and K. Villegas, When Constant-Time Source Yields Variable-Time Binary: Exploiting Curve25519-donna Built with MSVC 2015, Cryptology and Network Security - 15th International Conference Proceedings (Lecture Notes in Computer Science), pp.573-582978, 2016.
DOI : 10.1007/3-540-68697-5_9

URL : https://infoscience.epfl.ch/record/223794/files/32_1.pdf

K. Rustan and M. Leino, Dafny: An Automatic Program Verifier for Functional Correctness, Logic for Programming, Artificial Intelligence, and Reasoning - 16th International Conference, LPAR-16, pp.348-370978, 2010.

X. Leroy, Formal certification of a compiler back-end, or: programming a compiler with a proof assistant, 33rd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pp.42-54, 2006.
URL : https://hal.archives-ouvertes.fr/inria-00000963

C. George and . Necula, Translation validation for an optimizing compiler, ACM sigplan notices, pp.83-94, 2000.

A. Niemetz, M. Preiner, and A. Biere, Boolector 2.0 system description, Journal on Satisfiability Boolean Modeling and Computation, vol.9, pp.53-58, 2014.

A. Petcher and G. Morrisett, The Foundational Cryptography Framework Held as Part of the European Joint Conferences on Theory and Practice of Software, Principles of Security and Trust -4th International Conference Proceedings (Lecture Notes in Computer Science), pp.53-72978, 2015.

M. Poletto and V. Sarkar, Linear scan register allocation, ACM Transactions on Programming Languages and Systems, vol.21, issue.5, pp.895-913, 1999.
DOI : 10.1145/330249.330250

URL : http://www.research.ibm.com/jalapeno/papers/toplas99.pdf

B. Rodrigues, F. M. , Q. Pereira, and D. F. Aranha, Sparse representation of implicit flows with applications to side-channel detection, Proceedings of the 25th International Conference on Compiler Construction, CC 2016, pp.110-120, 2016.
DOI : 10.1145/2491956.2462164

K. Ye, M. Green, N. Sanguansin, L. Beringer, A. Petcher et al., Verified Correctness and Security of mbedTLS HMAC-DRBG, Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security , CCS '17, 2017.
DOI : 10.1145/358198.358210

J. Karim-zinzindohoué, E. Bartzia, and K. Bhargavan, A Verified Extensible Library of Elliptic Curves, 2016 IEEE 29th Computer Security Foundations Symposium (CSF), pp.296-309, 2016.
DOI : 10.1109/CSF.2016.28