276 results on '"Grégoire, Benjamin"'
Search Results
52. Corrosion behaviour of FE and NI-based alloys in solar salt and corrosion mitigation strategies via protective coatings
53. Enforcing Fine-grained Constant-time Policies
54. On Strong Normalization of the Calculus of Constructions with Type-Based Termination
55. Extending Coq with Imperative Features and Its Application to SAT Verification
56. Programming Language Techniques for Cryptographic Proofs
57. Implementing a Direct Method for Certificate Translation
58. A Tutorial on Type-Based Termination
59. A New Elimination Rule for the Calculus of Inductive Constructions
60. Formal Certification of ElGamal Encryption : A Gentle Introduction to CertiCrypt
61. Vectorizing Higher-Order Masking
62. Masking the GLP Lattice-Based Signature Scheme at Any Order
63. An Assertion-Based Program Logic for Probabilistic Programs
64. Preservation of Proof Obligations from Java to the Java Virtual Machine
65. The MOBIUS Proof Carrying Code Infrastructure : (An Overview)
66. Type-Based Termination with Sized Products
67. Combining a Verification Condition Generator for a Bytecode Language with Static Analyses
68. MOBIUS: Mobility, Ubiquity, Security : Objectives and Progress Report
69. JACK — A Tool for Validation of Security and Behaviour of Java Applications
70. CIC: Type-Based Termination of Recursive Definitions in the Calculus of Inductive Constructions
71. Certificate Translation for Optimizing Compilers : (Extended Abstract)
72. A Purely Functional Library for Modular Arithmetic and Its Application to Certifying Large Prime Numbers
73. A Computational Approach to Pocklington Certificates in Type Theory
74. A Structured Approach to Proving Compiler Optimizations Based on Dataflow Analysis
75. Practical and sound equality tests, automaticallyDeriving eqType instances for Jasmin's data types with Coq-Elpi
76. Practical Inference for Type-Based Termination in a Polymorphic Setting
77. On the Role of Type Decorations in the Calculus of Inductive Constructions
78. Proving Equalities in a Commutative Ring Done Right in Coq
79. Structured Leakage and Applications to Cryptographic Constant-Time and Cost
80. EasyPQC: Verifying Post-Quantum Cryptography
81. Mechanized Proofs of Adversarial Complexity and Application to Universal Composability
82. Verified Proofs of Higher-Order Masking
83. Relational Reasoning via Probabilistic Coupling
84. Automation in Computer-Aided Cryptography: Proofs, Attacks and Designs
85. Certifying compilers using higher-order theorem provers as certificate checkers
86. Masking in fine-grained leakage models: construction, implementation and verification
87. EasyCrypt: A Tutorial
88. Making RSA–PSS Provably Secure against Non-random Faults
89. Masking in Fine-Grained Leakage Models: Construction, Implementation and Verification
90. Automation in Computer-Aided Cryptography: Proofs, Attacks and Designs
91. Computer-Aided Cryptographic Proofs
92. Computer-Aided Security Proofs for the Working Cryptographer
93. Full Reduction at Full Throttle
94. A Modular Integration of SAT/SMT Solvers to Coq through Proof Witnesses
95. Beyond Provable Security Verifiable IND-CCA Security of OAEP
96. Proof Certificates for Algebra and Their Application to Automatic Geometry Theorem Proving
97. Extending Coq with Imperative Features and Its Application to SAT Verification
98. Programming Language Techniques for Cryptographic Proofs
99. On Strong Normalization of the Calculus of Constructions with Type-Based Termination
100. Formal Certification of ElGamal Encryption
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.