Probabilistic encryption, J. Comput. Syst. Sci, vol.28, issue.2, pp.270-299, 1984. ,
Sequences of games: a tool for taming complexity in security proofs, Cryptology ePrint Archive, 2004. ,
The security of triple encryption and a framework for code-based game-playing proofs, Advances in Cryptology -EUROCRYPT 2006, ser, vol.4004, pp.409-426, 2006. ,
A plausible approach to computer-aided cryptographic proofs, Cryptology ePrint Archive, 2005. ,
A computationally sound mechanized prover for security protocols, 27th IEEE Symposium on Security and Privacy, pp.140-154, 2006. ,
Formal certification of code-based cryptographic proofs, 36th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pp.90-101, 2009. ,
Computer-aided security proofs for the working cryptographer, Advances in Cryptology -CRYPTO 2011, vol.6841, pp.71-90, 2011. ,
URL : https://hal.archives-ouvertes.fr/hal-01112075
Fully automated analysis of padding-based encryption in the computational model, 2013 ACM SIGSAC Conference on Computer and Communications Security, CCS'13, pp.1247-1260, 2013. ,
URL : https://hal.archives-ouvertes.fr/hal-00935737
,
Automated proofs of pairing-based cryptography, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp.1156-1168, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-01246713
Symbolic proofs for lattice-based cryptography, Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pp.538-555, 2018. ,
URL : https://hal.archives-ouvertes.fr/hal-01959391
Verified proofs of higher-order masking, Advances in Cryptology -EUROCRYPT 2015 -34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, vol.9056, pp.457-485, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-01216699
Unification in primal algebras, their powers and their varieties, J. ACM, vol.37, issue.4, pp.742-776, 1990. ,
,
, Solveq github repository
, Easycyrpt github repository
, Maskverif source files
Constraint solving for boundedprocess cryptographic protocol analysis, CCS 2001, Proc. 8th ACM Conference on Computer and Communications Security (CCS'01), pp.166-175, 2001. ,
Unification: A multidisciplinary survey, ACM Comput. Surv, vol.21, issue.1, pp.93-124, 1989. ,
Mobile values, new names, and secure communication, 28th ACM SIGPLAN-SIGACT symposium on Principles of Programming Languages, pp.104-115, 2001. ,
URL : https://hal.archives-ouvertes.fr/hal-01423924
Deciding knowledge in security protocols under equational theories, Theor. Comput. Sci, vol.367, issue.1-2, pp.2-32, 2006. ,
URL : https://hal.archives-ouvertes.fr/inria-00071420
On the Equality of Probabilistic Terms," in Logic for Programming, Artificial Intelligence, and Reasoning, ser. Lecture Notes in Computer, pp.46-63, 2010. ,
Complexity of nilpotent unification and matching problems, Information and Computation, vol.162, issue.1, pp.3-23, 2000. ,
Security protocols, constraint systems, and group theories, Proceedings of the 6th International Joint Conference on Automated Reasoning (IJCAR'12), ser. Lecture Notes in Artificial Intelligence, vol.7364, pp.164-178, 2012. ,
URL : https://hal.archives-ouvertes.fr/hal-00729091
Symbolic proofs for lattice-based cryptography, Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pp.538-555, 2018. ,
URL : https://hal.archives-ouvertes.fr/hal-01959391
Combining algorithms for deciding knowledge in security protocols, Proceedings of the 6th International Symposium on Frontiers of Combining Systems (FroCoS'07), ser. Lecture Notes in Artificial Intelligence, F. Wolter, vol.4720, pp.103-117, 2007. ,
URL : https://hal.archives-ouvertes.fr/inria-00181609
Easy intruder deduction problems with homomorphisms, Information Processing Letters, vol.97, issue.6, pp.213-218, 2006. ,
Easycrypt: A tutorial, Foundations of Security Analysis and Design VII -FOSAD 2012/2013 Tutorial Lectures, ser. Lecture Notes in Computer Science, vol.8604, pp.146-166, 2013. ,
URL : https://hal.archives-ouvertes.fr/hal-01114366
Improved bitslice masking: from optimized non-interference to probe isolation, IACR Cryptology ePrint Archive, vol.2018, p.438, 2018. ,
An efficient side-channel protected AES implementation with arbitrary protection order, Topics in Cryptology -CT-RSA 2017 -The Cryptographers' Track at the RSA Conference, vol.10159, pp.95-112, 2017. ,
Reconciling two views of cryptography (The computational soundness of formal encryption), J. Cryptology, vol.15, issue.2, pp.103-127, 2002. ,
A survey of symbolic methods in computational analysis of cryptographic systems, J. Autom. Reasoning, pp.1-35, 2010. ,
URL : https://hal.archives-ouvertes.fr/inria-00379776
Revised Selected Papers, ser. Lecture Notes in Computer Science, Logic for Programming, Artificial Intelligence, and Reasoning -16th International Conference, LPAR-16, vol.6355, pp.46-63, 2010. ,
A completeness theorem for pseudo-linear functions with applications to uc security, Electronic Colloquium on Computational Complexity (ECCC), vol.17, p.92, 2010. ,
Strong non-interference and type-directed higherorder masking, Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp.116-129, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01410216
,
Handbook of finite fields, 2013. ,
Satisfiability of general intruder constraints with and without a set constructor, Journal of Symbolic Computation, vol.80, pp.27-61, 2017. ,
URL : https://hal.archives-ouvertes.fr/inria-00480632
On unique satisfiability and the threshold behavior of randomized reductions, Journal of Computer and System Sciences, vol.50, issue.3, pp.359-373, 1995. ,
Determining acceptance possibility for a quantum computation is hard for the polynomial hierarchy, Proceedings of The Royal Society A Mathematical Physical and Engineering Sciences, vol.455, p.1999 ,
Counting classes are at least as hard as the polynomial-time hierarchy, Proceedings of the Sixth Annual Structure in Complexity Theory Conference, pp.2-12, 1991. ,
, ECC-CTR: Electronic Colloquium on Computational Complexity, technical reports, 2003.
Combining symbolic constraint solvers on algebraic domains, J. Symb. Comput, vol.18, issue.2, pp.113-155, 1994. ,
Symbolic protocol analysis in the union of disjoint intruder theories: Combining decision procedures, Theoretical Computer Science, vol.411, issue.10, pp.1261-1282, 2010. ,
URL : https://hal.archives-ouvertes.fr/inria-00455290
Recognizing permutation functions in polynomial time, ECCC, TR05-008, vol.173, pp.185-311, 2005. ,
Orthogonal systems of polynomials in finite fields, Proceedings of the American Mathematical Society, vol.28, issue.2, pp.415-422, 1971. ,
Highperformance secure multi-party computation for data mining applications, International Journal of Information Security, vol.11, issue.6, pp.403-418, 2012. ,