-
1
-
-
84861598516
-
Certifying assembly with formal security proofs: The case of BBS
-
Reynald Affeldt, David Nowak, and Kiyoshi Yamada. Certifying assembly with formal security proofs: The case of BBS. Sci. Comput. Program., 77(10-11):1058-1074, 2012.
-
(2012)
Sci. Comput. Program.
, vol.77
, Issue.10-11
, pp. 1058-1074
-
-
Affeldt, R.1
Nowak, D.2
Yamada, K.3
-
2
-
-
0033702592
-
Transforming out timing leaks
-
Johan Agat. Transforming out timing leaks. In Proceedings of POPL'00, pages 40-53, 2000.
-
(2000)
Proceedings of POPL'00
, pp. 40-53
-
-
Agat, J.1
-
3
-
-
0034823291
-
On con dentiality and algorithms
-
IEEE Computer Society
-
Johan Agat and David Sands. On con dentiality and algorithms. In IEEE Symposium on Security and Privacy, pages 64-77. IEEE Computer Society, 2001.
-
(2001)
IEEE Symposium on Security and Privacy
, pp. 64-77
-
-
Agat, J.1
Sands, D.2
-
5
-
-
77956423308
-
Deductive verification of cryptographic software
-
José Bacelar Almeida, Manuel Barbosa, Jorge Sousa Pinto, and Bárbara Vieira. Deductive verification of cryptographic software. Innovations in Systems and Software Engineering, 6(3):203-218, 2010.
-
(2010)
Innovations in Systems and Software Engineering
, vol.6
, Issue.3
, pp. 203-218
-
-
Almeida, J.B.1
Barbosa, M.2
Pinto, J.S.3
Vieira, B.4
-
6
-
-
78149275873
-
Survey: Leakage resilience and the bounded retrieval model
-
Kaoru Kurosawa, editor, ICITS, Springer
-
Joël Alwen, Yevgeniy Dodis, and Daniel Wichs. Survey: Leakage resilience and the bounded retrieval model. In Kaoru Kurosawa, editor, ICITS, volume 5973 of Lecture Notes in Computer Science, pages 1-18. Springer, 2009.
-
(2009)
Lecture Notes in Computer Science
, vol.5973
, pp. 1-18
-
-
Alwen, J.1
Dodis, Y.2
Wichs, D.3
-
7
-
-
79953220810
-
Verified software toolchain - (Invited talk)
-
ESOP'11, Springer
-
Andrew W. Appel. Verified software toolchain - (invited talk). In ESOP'11, volume 6602 of Lecture Notes in Computer Science, pages 1-17. Springer, 2011.
-
(2011)
Lecture Notes in Computer Science
, vol.6602
, pp. 1-17
-
-
Appel, A.W.1
-
8
-
-
84889000914
-
Deliverable 5.4: Certified shared library core
-
Manuel Barbosa, editor. Deliverable 5.4: Certified shared library core. Computer Aided Cryptography Engineering (CACE FP7 EU Project), 2011. http://www.cace-project.eu.
-
(2011)
Computer Aided Cryptography Engineering
-
-
Barbosa, M.1
-
9
-
-
80051978821
-
Computer-aided security proofs for the working cryptographer
-
Advances in Cryptology - CRYPTO 2011, Heidelberg, Springer
-
Gilles Barthe, Benjamin Grégoire, Sylvain Heraud, and Santiago Zanella-Béguelin. Computer-aided security proofs for the working cryptographer. In Advances in Cryptology - CRYPTO 2011, volume 6841 of Lecture Notes in Computer Science, pages 71-90, Heidelberg, 2011. Springer.
-
(2011)
Lecture Notes in Computer Science
, vol.6841
, pp. 71-90
-
-
Barthe, G.1
Grégoire, B.2
Heraud, S.3
Zanella-Béguelin, S.4
-
10
-
-
79951804314
-
Beyond provable security. Verifiable IND-CCA security of OAEP
-
Topics in Cryptology - CT-RSA 2011, Heidelberg, Springer
-
Gilles Barthe, Benjamin Grégoire, Yassine Lakhnech, and Santiago Zanella-Béguelin. Beyond provable security. Verifiable IND-CCA security of OAEP. In Topics in Cryptology - CT-RSA 2011, volume 6558 of Lecture Notes in Computer Science, pages 180-196, Heidelberg, 2011. Springer.
-
(2011)
Lecture Notes in Computer Science
, vol.6558
, pp. 180-196
-
-
Barthe, G.1
Grégoire, B.2
Lakhnech, Y.3
Zanella-Béguelin, S.4
-
11
-
-
84866017720
-
The security impact of a new cryptographic library
-
Alejandro Hevia and Gregory Neven, editors, Progress in Cryptology - LATINCRYPT 2012, Springer Berlin Heidelberg
-
Daniel J. Bernstein, Tanja Lange, and Peter Schwabe. The security impact of a new cryptographic library. In Alejandro Hevia and Gregory Neven, editors, Progress in Cryptology - LATINCRYPT 2012, volume 7533 of Lecture Notes in Computer Science, pages 159-176. Springer Berlin Heidelberg, 2012.
-
(2012)
Lecture Notes in Computer Science
, vol.7533
, pp. 159-176
-
-
Bernstein, D.J.1
Lange, T.2
Schwabe, P.3
-
12
-
-
0036986312
-
A proof of GMP square root
-
Yves Bertot, Nicolas Magaud, and Paul Zimmermann. A proof of GMP square root. Journal of Automated Reasoning, 29(3-4):225-252, 2002.
-
(2002)
Journal of Automated Reasoning
, vol.29
, Issue.3-4
, pp. 225-252
-
-
Bertot, Y.1
Magaud, N.2
Zimmermann, P.3
-
13
-
-
84859357099
-
Security protocol verification: Symbolic and computational models. Pierpaolo Degano and Joshua D. Guttman, editors, Principles of Security and Trust - First International Conference, POST 2012
-
Springer
-
Bruno Blanchet. Security protocol verification: Symbolic and computational models. In Pierpaolo Degano and Joshua D. Guttman, editors, Principles of Security and Trust - First International Conference, POST 2012, volume 7215 of Lecture Notes in Computer Science, pages 3-29. Springer, 2012.
-
(2012)
Lecture Notes in Computer Science
, vol.7215
, pp. 3-29
-
-
Blanchet, B.1
-
14
-
-
84881261751
-
A formally-verified C compiler supporting floating-point arithmetic
-
IEEE
-
Sylvie Boldo, Jacques-Henri Jourdan, Xavier Leroy, and Guillaume Melquiond. A formally-verified C compiler supporting floating-point arithmetic. In Arith - 21st IEEE Symposium on Computer Arithmetic, pages 107-115. IEEE, 2013.
-
(2013)
Arith - 21st IEEE Symposium on Computer Arithmetic
, pp. 107-115
-
-
Boldo, S.1
Jourdan, J.-H.2
Leroy, X.3
Melquiond, G.4
-
15
-
-
84857727360
-
Practical realisation and elimination of an ECC-related software bug attack
-
Orr Dunkelman, editor, CT-RSA, Springer
-
Billy Bob Brumley, Manuel Barbosa, Dan Page, and Frederik Vercauteren. Practical realisation and elimination of an ECC-related software bug attack. In Orr Dunkelman, editor, CT-RSA, volume 7178 of Lecture Notes in Computer Science, pages 171-186. Springer, 2012.
-
(2012)
Lecture Notes in Computer Science
, vol.7178
, pp. 171-186
-
-
Brumley, B.B.1
Barbosa, M.2
Page, D.3
Vercauteren, F.4
-
16
-
-
84874422917
-
Proved generation of implementations from computationally secure protocol specifications
-
POST, Springer
-
David Cadé and Bruno Blanchet. Proved generation of implementations from computationally secure protocol specifications. In POST, volume 7796 of Lecture Notes in Computer Science, pages 63-82. Springer, 2013.
-
(2013)
Lecture Notes in Computer Science
, vol.7796
, pp. 63-82
-
-
Cadé, D.1
Blanchet, B.2
-
17
-
-
79957603702
-
Provable security in the real world
-
may-june
-
Jean Paul Degabriele, Kenneth Paterson, and Gaven Watson. Provable security in the real world. Security Privacy, IEEE, 9(3):33-41, may-june 2011.
-
(2011)
Security Privacy, IEEE
, vol.9
, Issue.3
, pp. 33-41
-
-
Degabriele, J.P.1
Paterson, K.2
Watson, G.3
-
21
-
-
84880853825
-
RSA-OAEP is secure under the RSA assumption
-
Advances in Cryptology - CRYPTO 2001, Springer
-
Eiichiro Fujisaki, Tatsuaki Okamoto, David Pointcheval, and Jacques Stern. RSA-OAEP is secure under the RSA assumption. In Advances in Cryptology - CRYPTO 2001, volume 2139 of Lecture Notes in Computer Science, pages 260-274. Springer, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2139
, pp. 260-274
-
-
Fujisaki, E.1
Okamoto, T.2
Pointcheval, D.3
Stern, J.4
-
24
-
-
84866939599
-
A framework for the cryptographic verification of Java-like programs
-
IEEE
-
Ralf Küsters, Tomasz Truderung, and Juergen Graf. A framework for the cryptographic verification of Java-like programs. In CSF, pages 198-212. IEEE, 2012.
-
(2012)
CSF
, pp. 198-212
-
-
Küsters, R.1
Truderung, T.2
Graf, J.3
-
25
-
-
33745802808
-
Formal certification of a compiler back-end, or: Programming a compiler with a proof assistant
-
New York, ACM
-
Xavier Leroy. Formal certification of a compiler back-end, or: programming a compiler with a proof assistant. In 33rd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2006, pages 42-54, New York, 2006. ACM.
-
(2006)
33rd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2006
, pp. 42-54
-
-
Leroy, X.1
-
27
-
-
33846862428
-
A chosen ciphertext attack on RSA optimal asymmetric encryption padding (OAEP) as standardized in PKCS#1 v2.0
-
Advances in Cryptology - CRYPTO 2001, Heidelberg, Springer
-
James Manger. A chosen ciphertext attack on RSA optimal asymmetric encryption padding (OAEP) as standardized in PKCS#1 v2.0. In Advances in Cryptology - CRYPTO 2001, volume 2139 of Lecture Notes in Computer Science, pages 230-238, Heidelberg, 2001. Springer.
-
(2001)
Lecture Notes in Computer Science
, vol.2139
, pp. 230-238
-
-
Manger, J.1
-
28
-
-
33745813464
-
The program counter security model: Automatic detection and removal of control-flow side channel attacks
-
ICISC, Springer
-
David Molnar, Matt Piotrowski, David Schultz, and David Wagner. The program counter security model: Automatic detection and removal of control-flow side channel attacks. In ICISC, volume 3935 of Lecture Notes in Computer Science, pages 156-168. Springer, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3935
, pp. 156-168
-
-
Molnar, D.1
Piotrowski, M.2
Schultz, D.3
Wagner, D.4
-
29
-
-
34748821192
-
A verifying core for a cryptographic language compiler
-
ACM
-
Lee Pike, Mark Shields, and John Matthews. A verifying core for a cryptographic language compiler. In ACL2, pages 1-10. ACM, 2006.
-
(2006)
ACL2
, pp. 1-10
-
-
Pike, L.1
Shields, M.2
Matthews, J.3
-
32
-
-
58049175910
-
Automatic formal verification of block cipher implementations
-
IEEE
-
Eric Whitman Smith and David L. Dill. Automatic formal verification of block cipher implementations. In FMCAD, pages 1-7. IEEE, 2008.
-
(2008)
FMCAD
, pp. 1-7
-
-
Smith, E.W.1
Dill, D.L.2
-
33
-
-
78650853288
-
Manger's attack revisited
-
Miguel Soriano, Sihan Qing, and Javier López, editors, Information and Communications Security, Springer Berlin Heidelberg
-
Falko Strenzke. Manger's attack revisited. In Miguel Soriano, Sihan Qing, and Javier López, editors, Information and Communications Security, volume 6476 of Lecture Notes in Computer Science, pages 31-45. Springer Berlin Heidelberg, 2010.
-
(2010)
Lecture Notes in Computer Science
, vol.6476
, pp. 31-45
-
-
Strenzke, F.1
|