Dijkstra Monads for Free, 44th ACM SIGPLAN Symposium on Principles of Programming Languages (POPL). ACM, pp.515-529, 2017. ,
DOI : 10.1145/3009837.3009878
URL : https://hal.archives-ouvertes.fr/hal-01424794
Verifiable side-channel security of cryptographic implementations: constant-time MEE-CBC, IACR Cryptology ePrint Archive, vol.2015, p.1241, 1241. ,
Verifying Constant-Time Implementations, USENIX Security Symposium, pp.53-70, 2016. ,
Verification of a cryptographic primitive: SHA-256, ACM Transactions on Programming Languages and Systems (TOPLAS), vol.37, issue.7, 2015. ,
System-level Non-interference for Constant-time Cryptography, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS '14, pp.1267-1279, 2014. ,
DOI : 10.1007/s00145-009-9049-y
URL : https://hal.archives-ouvertes.fr/hal-01101950
Computer-Aided Security Proofs for the Working Cryptographer, Annual Cryptology Conference, pp.71-90, 2011. ,
DOI : 10.1007/978-3-642-22792-9_5
URL : https://hal.archives-ouvertes.fr/hal-01112075
2016. poly1305-x86.pl produces incorrect output. https://mta. openssl.org/pipermail/openssl-dev, 2016. ,
Verified Correctness and Security of OpenSSL HMAC, USENIX Security Symposium, pp.207-221, 2015. ,
The Poly1305-AES Message-Authentication Code, Fast Software Encryption (FSE), pp.32-49, 2005. ,
Curve25519: new Diffie-Hellman speed records, Public Key Cryptography-PKC 2006, pp.207-228, 2006. ,
ChaCha, a variant of Salsa20, 2008. ,
High-speed high-security signatures, Journal of Cryptographic Engineering, pp.1-13 ,
The security impact of a new cryptographic library, International Conference on Cryptology and Information Security in Latin America (LATINCRYPT, pp.159-176, 2012. ,
NEON crypto, International Workshop on Cryptographic Hardware and Embedded Systems, pp.320-339, 2012. ,
TweetNaCl: A crypto library in 100 tweets, International Conference on Cryptology and Information Security in Latin America (LATINCRYPT, pp.64-83, 2014. ,
Verified Low-Level Programming Embedded in F*, ACM SIGPLAN International Conference on Functional Programming (ICFP), 2017. ,
Implementing TLS with Verified Cryptographic Security, 2013 IEEE Symposium on Security and Privacy, pp.445-462, 2013. ,
DOI : 10.1109/SP.2013.37
URL : https://hal.archives-ouvertes.fr/hal-00863373
Wrong results with Poly1305 functions. https://mta.openssl. org/pipermail/openssl-dev, 2016. ,
Vale: Verifying High-Performance Cryptographic Assembly Code, Proceedings of the USENIX Security Symposium, 2017. ,
Practical realisation and elimination of an ECC-related software bug attack, Topics in Cryptology?CT-RSA 2012, pp.171-186, 2012. ,
Verifying Curve25519 Software, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS '14, pp.299-309, 2014. ,
DOI : 10.1145/363235.363259
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.564.7481
The Keyed-Hash Message Authentication Code (HMAC). NIST FIPS-198-1, 2008. ,
Implementing and Proving the TLS 1.3 Record Layer, 2017 IEEE Symposium on Security and Privacy (SP), pp.463-482, 2017. ,
DOI : 10.1109/SP.2017.58
Vectorization on ChaCha Stream Cipher, 2014 11th International Conference on Information Technology: New Generations, pp.612-615, 2014. ,
DOI : 10.1109/ITNG.2014.33
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.434.7229
Ironclad apps: End-to-end security via automated full-system verification, 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI 14, pp.165-181, 2014. ,
seL4, Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principles, SOSP '09, pp.207-220, 2009. ,
DOI : 10.1145/1629575.1629596
Formal verification of a realistic compiler, Communications of the ACM, vol.52, issue.7, pp.107-115, 2009. ,
DOI : 10.1145/1538788.1538814
URL : https://hal.archives-ouvertes.fr/inria-00415861
Attacking embedded ECC implementations through cmov side channels, Selected Areas in Cryptology ? SAC 2016 (Lecture Notes in Computer Science), 2016. ,
Self- Certification: Bootstrapping Certified Typecheckers in F* with Coq, ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL, pp.571-584, 2012. ,
DOI : 10.1145/2103621.2103723
URL : https://hal.archives-ouvertes.fr/inria-00628775
Dependent Types and Multi-Monadic Effects in F*, ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL), pp.256-270 ,
DOI : 10.1145/2837614.2837655
URL : https://hal.archives-ouvertes.fr/hal-01265793
Automated Verification of Real-World Cryptographic Implementations, IEEE Security & Privacy, vol.14, issue.6, pp.26-33, 2016. ,
DOI : 10.1109/MSP.2016.125
A Verified Extensible Library of Elliptic Curves, 2016 IEEE 29th Computer Security Foundations Symposium (CSF), pp.296-309, 2016. ,
DOI : 10.1109/CSF.2016.28