210 results on '"Gilles Barthe"'
Search Results
2. OBRA: Oracle-Based, Relational, Algorithmic Type Verification.
3. Formally Verifying Kyber - Episode V: Machine-Checked IND-CCA Security and Correctness of ML-KEM in EasyCrypt.
4. 'These results must be false': A usability evaluation of constant-time analysis tools.
5. Ultimate SLH: Taking Speculative Load Hardening to the Next Level.
6. Typing High-Speed Cryptography against Spectre v1.
7. Spectre Declassified: Reading from the Right Place at the Wrong Time.
8. Fixing and Mechanizing the Security Proof of Fiat-Shamir with Aborts and Dilithium.
9. They're not that hard to mitigate: What Cryptographic Library Developers Think About Timing Attacks.
10. Semantic Foundations for Cost Analysis of Pipeline-Optimized Programs.
11. Quantum Weakest Preconditions for Reasoning about Expected Runtimes of Quantum Programs.
12. 'They're not that hard to mitigate': What Cryptographic Library Developers Think About Timing Attacks.
13. SoK: Practical Foundations for Software Spectre Defenses.
14. Enforcing Fine-grained Constant-time Policies.
15. Tidy: Symbolic Verification of Timed Cryptographic Protocols.
16. Symbolic Synthesis of Indifferentiability Attacks.
17. Scaling Guarantees for Nearest Counterfactual Explanations.
18. A Quantum Interpretation of Bunched Logic & Quantum Separation Logic.
19. SoK: Computer-Aided Cryptography.
20. High-Assurance Cryptography in the Spectre Era.
21. EasyPQC: Verifying Post-Quantum Cryptography.
22. Structured Leakage and Applications to Cryptographic Constant-Time and Cost.
23. Mechanized Proofs of Adversarial Complexity and Application to Universal Composability.
24. Secure Compilation of Constant-Resource Programs.
25. Model-Agnostic Counterfactual Explanations for Consequential Decisions.
26. Hypothesis Testing Interpretations and Renyi Differential Privacy.
27. Universal equivalence and majority of probabilistic programs over finite fields.
28. Deciding Differential Privacy for Programs with Finite Inputs and Outputs.
29. The Last Mile: High-Assurance and High-Speed Cryptographic Implementations.
30. Certified Compilation for Cryptography: Extended x86 Instructions and Constant-Time Verification.
31. Constant-time foundations for the new spectre era.
32. On the Versatility of Open Logical Relations - Continuity, Automatic Differentiation, and a Containment Theorem.
33. Privacy Amplification by Mixing and Diffusion Mechanisms.
34. Approximate Span Liftings: Compositional Semantics for Relaxations of Differential Privacy.
35. FaCT: a DSL for timing-sensitive computation.
36. Bidirectional type checking for relational properties.
37. GALACTICS: Gaussian Sampling for Lattice-Based Constant- Time Implementation of Cryptographic Signatures, Revisited.
38. A Machine-Checked Proof of Security for AWS Key Management Service.
39. Machine-Checked Proofs for Cryptographic Standards: Indifferentiability of Sponge and Secure High-Assurance Implementations of SHA-3.
40. Verifying Relational Properties using Trace Logic.
41. Symbolic Methods in Computational Cryptography Proofs.
42. maskVerif: Automated Verification of Higher-Order Masking in Presence of Physical Defaults.
43. Almost Sure Productivity.
44. Privacy Amplification by Subsampling: Tight Analyses via Couplings and Divergences.
45. Symbolic Proofs for Lattice-Based Cryptography.
46. Relational Reasoning for Markov Chains in a Probabilistic Guarded Lambda Calculus.
47. An Assertion-Based Program Logic for Probabilistic Programs.
48. Masking the GLP Lattice-Based Signature Scheme at Any Order.
49. Enforcing Ideal-World Leakage Bounds in Real-World Secret Sharing MPC Frameworks.
50. Secure Compilation of Side-Channel Countermeasures: The Case of Cryptographic 'Constant-Time'.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.