A messy state of the union: Taming the composite state machines of TLS B Beurdouche, K Bhargavan, A Delignat-Lavaud, C Fournet, M Kohlweiss, ... 2015 IEEE Symposium on Security and Privacy, 535-552, 2015 | 280 | 2015 |
Dependent types and multi-monadic effects in F N Swamy, C Hriţcu, C Keller, A Rastogi, A Delignat-Lavaud, S Forest, ... Proceedings of the 43rd annual ACM SIGPLAN-SIGACT Symposium on Principles of …, 2016 | 241 | 2016 |
Secure distributed programming with value-dependent types N Swamy, J Chen, C Fournet, PY Strub, K Bhargavan, J Yang ACM SIGPLAN Notices 46 (9), 266-278, 2011 | 239 | 2011 |
Triple handshakes and cookie cutters: Breaking and fixing authentication over TLS K Bhargavan, AD Lavaud, C Fournet, A Pironti, PY Strub 2014 IEEE Symposium on Security and Privacy, 98-113, 2014 | 220 | 2014 |
Triple handshakes and cookie cutters: Breaking and fixing authentication over TLS K Bhargavan, AD Lavaud, C Fournet, A Pironti, PY Strub 2014 IEEE Symposium on Security and Privacy, 98-113, 2014 | 220 | 2014 |
Implementing TLS with verified cryptographic security K Bhargavan, C Fournet, M Kohlweiss, A Pironti, PY Strub Proceedings of the 34th IEEE Symposium on Security and Privacy, SP 13, 2013 | 201 | 2013 |
EasyCrypt: A Tutorial G Barthe, F Dupressoir, B Grégoire, C Kunz, B Schmidt, PY Strub Foundations of security analysis and design vii, 146-166, 2013 | 123 | 2013 |
Verified proofs of higher-order masking G Barthe, S Belaïd, F Dupressoir, PA Fouque, B Grégoire, PY Strub Annual International Conference on the Theory and Applications of …, 2015 | 121 | 2015 |
Strong non-interference and type-directed higher-order masking G Barthe, S Belaïd, F Dupressoir, PA Fouque, B Grégoire, PY Strub, ... Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 118 | 2016 |
Fully abstract compilation to JavaScript C Fournet, N Swamy, J Chen, PE Dagand, PY Strub, B Livshits Proceedings of the 40th annual ACM SIGPLAN-SIGACT symposium on Principles of …, 2013 | 116 | 2013 |
Transcript collision attacks: Breaking authentication in TLS, IKE, and SSH K Bhargavan, G Leurent Network and Distributed System Security Symposium--NDSS 2016, 2016 | 104 | 2016 |
Probabilistic relational verification for cryptographic implementations G Barthe, C Fournet, B Grégoire, PY Strub, N Swamy, S Zanella-Béguelin ACM SIGPLAN Notices 49 (1), 193-205, 2014 | 99 | 2014 |
Proving the TLS handshake secure (as it is) K Bhargavan, C Fournet, M Kohlweiss, A Pironti, PY Strub, ... Annual Cryptology Conference, 235-255, 2014 | 91 | 2014 |
Parallel implementations of masking schemes and the bounded moment leakage model G Barthe, F Dupressoir, S Faust, B Grégoire, FX Standaert, PY Strub Annual International Conference on the Theory and Applications of …, 2017 | 84 | 2017 |
Modular code-based cryptographic verification C Fournet, M Kohlweiss, PY Strub Proceedings of the 18th ACM conference on Computer and communications …, 2011 | 81 | 2011 |
Jasmin: High-assurance and high-speed cryptography JB Almeida, M Barbosa, G Barthe, A Blot, B Grégoire, V Laporte, ... Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 71 | 2017 |
Higher-order approximate relational refinement types for mechanism design and differential privacy G Barthe, M Gaboardi, EJ Gallego Arias, J Hsu, A Roth, PY Strub ACM SIGPLAN Notices 50 (1), 55-68, 2015 | 70 | 2015 |
Color image segmentation based on automatic morphological clustering T Géraud, PY Strub, J Darbon Proceedings 2001 International Conference on Image Processing (Cat. No …, 2001 | 70 | 2001 |
Gradual typing embedded securely in javascript N Swamy, C Fournet, A Rastogi, K Bhargavan, J Chen, PY Strub, ... ACM SIGPLAN Notices 49 (1), 425-437, 2014 | 67 | 2014 |
Proving differential privacy via probabilistic couplings G Barthe, M Gaboardi, B Grégoire, J Hsu, PY Strub 2016 31st Annual ACM/IEEE Symposium on Logic in Computer Science (LICS), 1-10, 2016 | 59 | 2016 |