Author of the publication

Verified Cryptographic Code for Everybody.

, , , , , , and . CAV (1), volume 12759 of Lecture Notes in Computer Science, page 645-668. Springer, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Research Report: An Optim (l) Approach to Parsing Random-Access Formats., , , and . SP (Workshops), page 192-199. IEEE, (2024)Macaw: A Machine Code Toolbox for the Busy Binary Analyst., , , , , , , , , and 4 other author(s). CoRR, (2024)Extending C for Checking Shape Safety., and . GT-VC@CONCUR, volume 154 of Electronic Notes in Theoretical Computer Science, page 95-112. Elsevier, (2005)On the Formal Verification of the Stellar Consensus Protocol., and . FMBC@CAV, volume 84 of OASIcs, page 9:1-9:9. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2020)Formally Verifying Industry Cryptography.. IEEE Secur. Priv., 20 (3): 65-70 (2022)Symbolic Testing for C and Rust., , and . SecDev, page 33. IEEE, (2020)Verified Cryptographic Code for Everybody., , , , , , and . CAV (1), volume 12759 of Lecture Notes in Computer Science, page 645-668. Springer, (2021)Daedalus: Safer Document Parsing., , , , , , , and . Proc. ACM Program. Lang., 8 (PLDI): 816-840 (2024)