Pinocchio, IEEE Symposium on Security and Privacy, SP 2013, pp.238-252, 2013. ,
DOI : 10.1145/2856449
Geppetto: Versatile Verifiable Computation, 2015 IEEE Symposium on Security and Privacy, 2015. ,
DOI : 10.1109/SP.2015.23
Quadratic Span Programs and Succinct NIZKs without PCPs, EUROCRYPT, 2013. ,
DOI : 10.1007/978-3-642-38348-9_37
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.231.912
Formal certification of a compiler back-end or: Programming a compiler with a proof assistant, 2006. ,
URL : https://hal.archives-ouvertes.fr/inria-00000963
A formally-verified C static analyzer, Proceedings of the 42 nd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, ser. POPL'15, pp.247-259, 2015. ,
DOI : 10.1145/2775051.2676966
URL : https://hal.archives-ouvertes.fr/hal-01078386
A Formally Verified Compiler Back-end, Journal of Automated Reasoning, vol.27, issue.1, pp.363-446, 2009. ,
DOI : 10.1007/s10817-009-9155-4
URL : https://hal.archives-ouvertes.fr/inria-00360768
A Computational Approach to Pocklington Certificates in Type Theory, Functional and Logic Programming, 8th International Symposium Proceedings, ser. Lecture Notes in Computer Science, M. Hagiya and P. Wadler, pp.97-113, 2006. ,
DOI : 10.1007/11737414_8
EasyCrypt: A Tutorial, Lecture Notes in Computer Science, vol.8604, pp.146-166, 2013. ,
DOI : 10.1007/978-3-642-22792-9_5
URL : https://hal.archives-ouvertes.fr/hal-01114366
A small scale reflection extension for the Coq system, Inria, Tech. Rep, 2008. ,
URL : https://hal.archives-ouvertes.fr/inria-00258384
A Machine-Checked Proof of the Odd Order Theorem, Interactive Theorem Proving -4th International Conference, pp.163-179, 2013. ,
DOI : 10.1007/978-3-642-39634-2_14
URL : https://hal.archives-ouvertes.fr/hal-00816699
Square Span Programs with Applications to Succinct NIZK Arguments, Cryptology ePrint Archive, vol.718, issue.11, 2014. ,
DOI : 10.1007/978-3-662-45611-8_28
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.646.5072
Verifying computations with state, Proceedings of the Twenty-Fourth ACM Symposium on Operating Systems Principles, SOSP '13, 2013. ,
DOI : 10.1145/2517349.2522733
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.310.7329
Efficient RAM and Control Flow in Verifiable Outsourced Computation, Proceedings 2015 Network and Distributed System Security Symposium, 2015. ,
DOI : 10.14722/ndss.2015.23097
Fast reductions from RAMs to delegatable succinct constraint satisfaction problems, Proceedings of the 4th conference on Innovations in Theoretical Computer Science, ITCS '13, 2013. ,
DOI : 10.1145/2422436.2422481
Scalable zero knowledge via cycles of elliptic curves, Proc. of CRYPTO, 2014. ,
SNARKs for C: Verifying Program Executions Succinctly and in Zero Knowledge, Proc. of CRYPTO, 2013. ,
DOI : 10.1007/978-3-642-40084-1_6
Circuit Structures for Improving Efficiency of Security and Privacy Tools, 2013 IEEE Symposium on Security and Privacy, 2013. ,
DOI : 10.1109/SP.2013.40
Practical Covertly Secure MPC for Dishonest Majority ??? Or: Breaking the SPDZ Limits, Cryptology ePrint Archive, vol.642, 2012. ,
DOI : 10.1007/978-3-642-40203-6_1
Certified computer-aided cryptography, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, CCS '13, pp.1217-1230, 2013. ,
DOI : 10.1145/2508859.2516652
Full proof cryptography: verifiable compilation of efficient zero-knowledge protocols, the ACM Conference on Computer and Communications Security, CCS'12, pp.488-500, 2012. ,
Translation validation, Proceedings of the 4 th International Conference on Tools and Algorithms for Construction and Analysis of Systems, ser. TACAS '98, pp.151-166, 1998. ,
DOI : 10.1007/BFb0054170
Verifying Curve25519 Software, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS '14, pp.299-309, 2014. ,
DOI : 10.1145/2660267.2660370
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.564.7481
A Formal Library for Elliptic Curves in the Coq Proof Assistant, Interactive Theorem Proving -5th International Conference, pp.77-92, 2014. ,
DOI : 10.1007/978-3-319-08970-6_6
URL : https://hal.archives-ouvertes.fr/hal-01102288
Verification of a Cryptographic Primitive, ACM Transactions on Programming Languages and Systems, vol.37, issue.2, p.7, 2015. ,
DOI : 10.1145/2701415