Search

Your search keyword '"Grégoire, Benjamin"' showing total 276 results

Search Constraints

Start Over You searched for: Author "Grégoire, Benjamin" Remove constraint Author: "Grégoire, Benjamin"
276 results on '"Grégoire, Benjamin"'

Search Results

52. Corrosion behaviour of FE and NI-based alloys in solar salt and corrosion mitigation strategies via protective coatings

54. On Strong Normalization of the Calculus of Constructions with Type-Based Termination

55. Extending Coq with Imperative Features and Its Application to SAT Verification

56. Programming Language Techniques for Cryptographic Proofs

57. Implementing a Direct Method for Certificate Translation

58. A Tutorial on Type-Based Termination

59. A New Elimination Rule for the Calculus of Inductive Constructions

60. Formal Certification of ElGamal Encryption : A Gentle Introduction to CertiCrypt

65. The MOBIUS Proof Carrying Code Infrastructure : (An Overview)

66. Type-Based Termination with Sized Products

67. Combining a Verification Condition Generator for a Bytecode Language with Static Analyses

68. MOBIUS: Mobility, Ubiquity, Security : Objectives and Progress Report

69. JACK — A Tool for Validation of Security and Behaviour of Java Applications

70. CIC: Type-Based Termination of Recursive Definitions in the Calculus of Inductive Constructions

71. Certificate Translation for Optimizing Compilers : (Extended Abstract)

72. A Purely Functional Library for Modular Arithmetic and Its Application to Certifying Large Prime Numbers

73. A Computational Approach to Pocklington Certificates in Type Theory

74. A Structured Approach to Proving Compiler Optimizations Based on Dataflow Analysis

75. Practical and sound equality tests, automaticallyDeriving eqType instances for Jasmin's data types with Coq-Elpi

76. Practical Inference for Type-Based Termination in a Polymorphic Setting

77. On the Role of Type Decorations in the Calculus of Inductive Constructions

78. Proving Equalities in a Commutative Ring Done Right in Coq

80. EasyPQC: Verifying Post-Quantum Cryptography

82. Verified Proofs of Higher-Order Masking

84. Automation in Computer-Aided Cryptography: Proofs, Attacks and Designs

86. Masking in fine-grained leakage models: construction, implementation and verification

87. EasyCrypt: A Tutorial

Catalog

Books, media, physical & digital resources