Formal verification of security protocol implementations: a survey, Formal Aspects of Computing, vol.155, issue.1, pp.1-25, 2012. ,
DOI : 10.1007/s00165-012-0269-9
URL : https://hal.archives-ouvertes.fr/hal-00863392
Fast Point Multiplication on Elliptic Curves through Isogenies, AAECC, pp.43-50, 2003. ,
DOI : 10.1007/3-540-44828-4_6
Practical Realisation and Elimination of an ECC-Related Software Bug Attack, Cryptology ePrint Archive Report, vol.48, issue.177, 2011. ,
DOI : 10.1007/11761679_2
Crd expository report 31 an elementary introduction to elliptic curves, 1988. ,
Pragmatic Quotient Types in Coq, ITP, pp.213-228, 2013. ,
DOI : 10.1007/978-3-642-39634-2_17
A refinement-based approach to computational algebra in coq, ITP, pp.83-98, 2012. ,
Efficient Scalar Multiplication by Isogeny Decompositions, Public Key Cryptography, pp.191-206, 2006. ,
DOI : 10.1007/11745853_13
Algebraic curves -an introduction to algebraic geometry (reprint vrom 1969) Advanced book classics, 1989. ,
Faster Point Multiplication on Elliptic Curves with Efficient Endomorphisms, CRYPTO, pp.190-200, 2001. ,
DOI : 10.1007/3-540-44647-8_11
A Small Scale Reflection Extension for the Coq system, 2008. ,
URL : https://hal.archives-ouvertes.fr/inria-00258384
Courbes Elliptiques, une présentationprésentationélémentaire pour la cryptographie, 2010. ,
Formalized elliptic curve cryptography, High Confidence Software and Systems, 2006. ,
Elliptic curve cryptosystems, Mathematics of Computation, vol.48, issue.177, pp.203-209, 1987. ,
DOI : 10.1090/S0025-5718-1987-0866109-5
Use of elliptic curves in cryptography, CRYPTO, pp.417-426, 1985. ,
Short programs for functions on curves, IBM, 1986. ,
Identity-Based Cryptosystems and Signature Schemes, CRYPTO, pp.47-53, 1984. ,
DOI : 10.1007/3-540-39568-7_5
Automatic formal verification of block cipher implementations, In FMCAD, pp.1-7, 2008. ,
Proving the group law for elliptic curves formally, 2007. ,