Search

Your search keyword '"Zanella-Béguelin, Santiago"' showing total 94 results

Search Constraints

Start Over You searched for: Author "Zanella-Béguelin, Santiago" Remove constraint Author: "Zanella-Béguelin, Santiago"
94 results on '"Zanella-Béguelin, Santiago"'

Search Results

1. Permissive Information-Flow Analysis for Large Language Models

2. Dataset and Lessons Learned from the 2024 SaTML LLM Capture-the-Flag Competition

3. Closed-Form Bounds for DP-SGD against Record-level Inference

4. On the Efficacy of Differentially Private Few-shot Image Classification

5. Analyzing Leakage of Personally Identifiable Information in Language Models

6. SoK: Let the Privacy Games Begin! A Unified Treatment of Data Inference Privacy in Machine Learning

7. Bayesian Estimation of Differential Privacy

8. Analyzing Information Leakage of Updates to Natural Language Models

9. A Monadic Framework for Relational Verification: Applied to Information Security, Program Equivalence, and Optimizations

10. Verified Low-Level Programming Embedded in F*

11. Rethinking Privacy in Machine Learning Pipelines from an Information Flow Control Perspective

12. Proving the TLS Handshake Secure (As It Is)

13. Computer-Aided Cryptographic Proofs

14. Probabilistic Relational Hoare Logics for Computer-Aided Security Proofs

15. Verified Indifferentiable Hashing into Elliptic Curves

16. Beyond Provable Security Verifiable IND-CCA Security of OAEP

17. Programming Language Techniques for Cryptographic Proofs

18. Formal Certification of ElGamal Encryption : A Gentle Introduction to CertiCrypt

19. A Formal Specification of the MIDP 2.0 Security Model

20. Automation in Computer-Aided Cryptography: Proofs, Attacks and Designs

21. Proving the TLS Handshake Secure (As It Is)

25. Imperfect forward secrecy.

30. A Monadic Framework for Relational Verification

31. Everest: Towards a Verified, Drop‐in Replacement of HTTPS

32. Imperfect forward secrecy

34. Verified low-level programming embedded in F*

35. Everest: Towards a Verified, Drop-in Replacement of HTTPS

36. Formal Verification of Smart Contracts

37. Verified Security of Merkle-Damgaard

38. Dependent types and multi-monadic effects in F*

39. Certification formelle de preuves cryptographiques basées sur les séquences de jeux

40. Imperfect Forward Secrecy

41. A formal specification of the MIDP 2.0 security model

48. Full proof cryptography

Catalog

Books, media, physical & digital resources