Author of the publication

Automated Unbounded Analysis of Cryptographic Constructions in the Generic Group Model.

, , and . EUROCRYPT (2), volume 9666 of Lecture Notes in Computer Science, page 822-851. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Certificate Translation in Abstract Interpretation., and . ESOP, volume 4960 of Lecture Notes in Computer Science, page 368-382. Springer, (2008)Synthesizing Probabilistic Invariants via Doob's Decomposition., , , and . CAV (1), volume 9779 of Lecture Notes in Computer Science, page 43-61. Springer, (2016)Product programs and relational program logics., , and . J. Log. Algebraic Methods Program., 85 (5): 847-859 (2016)SoK: Practical Foundations for Spectre Defenses., , , , and . CoRR, (2021)Formal verification of a constant-time preserving C compiler., , , , , , and . Proc. ACM Program. Lang., 4 (POPL): 7:1-7:30 (2020)Safe couplings: coupled refinement types., , and . Proc. ACM Program. Lang., 6 (ICFP): 596-624 (2022)Formally verifying Kyber Part I: Implementation Correctness., , , , , , , , , and 2 other author(s). IACR Cryptol. ePrint Arch., (2023)Deriving an Information Flow Checker and Certifying Compiler for Java., , and . S&P, page 230-242. IEEE Computer Society, (2006)Certificate Translation.. VERIFY, volume 372 of CEUR Workshop Proceedings, CEUR-WS.org, (2008)Fixing and Mechanizing the Security Proof of Fiat-Shamir with Aborts and Dilithium., , , , , , , , , and . CRYPTO (5), volume 14085 of Lecture Notes in Computer Science, page 358-389. Springer, (2023)