Publications

Filter by type:

A Fast and Verified Software Stack for Secure Function Evaluation

Details old eprint

Machine-Checked Proofs of Privacy for Electronic Voting Protocols

Details PDF

Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model

Details PDF eprint

Strong Non-Interference and Type-Directed Higher-Order Masking

Details eprint

Verifying Constant-Time Implementations

Details PDF

Verifiable Side-Channel Security of Cryptographic Implementations: Constant-Time MEE-CBC

Details PDF eprint

Verified Proofs of Higher-Order Masking

Details PDF eprint

Synthesis of Fault Attacks on Cryptographic Implementations

Details PDF eprint

Making RSA-PSS Secure Against Random Faults

Details Code eprint

Guiding a General-Purpose C Verifier to Prove Cryptographic Protocols

Details PDF

Computer-Aided Proofs in Cryptography: An Overview

Details

Certified Computer-Aided Cryptography: Efficient Provably Secure Machine Code from High-Level Implementations

Details PDF eprint

EasyCrypt: A Tutorial

Details

Guiding a General-Purpose C Verifier to Prove Cryptographic Protocols

Details PDF Slides Code Short Slide Deck Journal Version Technical Report