Publications
This list may be slightly out of date. For an up-to-date list and bibliometric information, please visit the links in the side menu.
2024
-
Formally verifying Kyber Episode V: Machine-checked IND-CCA security and correctness of ML-KEM in EasyCryptIACR Cryptol. ePrint Arch. 2024
-
2023
2022
-
Machine-Checked Proofs of Privacy Against Malicious Boards for Selene & CoIACR Cryptol. ePrint Arch. 2022
2021
-
Bringing State-Separating Proofs to EasyCrypt - A Security Proof for CryptoboxIACR Cryptol. ePrint Arch. 2021
2020
-
Precise and Mechanised Models and Proofs for Distance-Bounding and an Application to Contactless PaymentsIACR Cryptol. ePrint Arch. 2020
2019
2018
-
Improved Parallel Mask Refreshing Algorithms: Generic Solutions with Parametrized Non-Interference & Automated OptimizationsIACR Cryptol. ePrint Arch. 2018
2017
-
A Fast and Verified Software Stack for Secure Function EvaluationIACR Cryptol. ePrint Arch. 2017
-
A Note on ’Further Improving Efficiency of Higher-Order Masking Scheme by Decreasing Randomness Complexity’IACR Cryptol. ePrint Arch. 2017
-
Parallel Implementations of Masking Schemes and the Bounded Moment Leakage ModelIn Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part I 2017
2016
-
Parallel Implementations of Masking Schemes and the Bounded Moment Leakage ModelIACR Cryptol. ePrint Arch. 2016
2015
-
-
Compositional Verification of Higher-Order Masking: Application to a Verifying Masking CompilerIACR Cryptol. ePrint Arch. 2015
-
Verifiable side-channel security of cryptographic implementations: constant-time MEE-CBCIACR Cryptol. ePrint Arch. 2015
2014
2013
-
-
Certified computer-aided cryptography: efficient provably secure machine code from high-level implementationsIACR Cryptol. ePrint Arch. 2013