61
TITLE: Synthesis of Fault Attacks on Cryptographic Implementations
AUTHORS: Gilles Barthe; François Dupressoir; Pierre Alain Fouque; Benjamin Grégoire; Jean Christophe Zapalowicz;
PUBLISHED: 2014, SOURCE: IACR Cryptol. ePrint Arch., VOLUME: 2014
INDEXED IN: DBLP
IN MY: DBLP
62
TITLE: Automated Analysis of Cryptographic Assumptions in Generic Group Models
AUTHORS: Gilles Barthe; Edvard Fagerholm; Dario Fiore; John C Mitchell; Andre Scedrov; Benedikt Schmidt;
PUBLISHED: 2014, SOURCE: IACR Cryptol. ePrint Arch., VOLUME: 2014
INDEXED IN: DBLP
IN MY: DBLP
63
TITLE: Formal Verification of an SSA-Based Middle-End for CompCert
AUTHORS: Gilles Barthe; Delphine Demange; David Pichardie;
PUBLISHED: 2014, SOURCE: ACM Trans. Program. Lang. Syst., VOLUME: 36, ISSUE: 1
INDEXED IN: DBLP
IN MY: DBLP
64
TITLE: Fully automated analysis of padding-based encryption in the computational model
AUTHORS: Gilles Barthe; Juan Manuel Crespo; Benjamin Grégoire; César Kunz; Yassine Lakhnech; Benedikt Schmidt; Santiago Zanella Béguelin;
PUBLISHED: 2013, SOURCE: 2013 ACM SIGSAC Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013
INDEXED IN: DBLP
IN MY: DBLP
65
TITLE: Verified Computational Differential Privacy with Applications to Smart Metering
AUTHORS: Gilles Barthe; George Danezis; Benjamin Grégoire; César Kunz; Santiago Zanella Béguelin;
PUBLISHED: 2013, SOURCE: 2013 IEEE 26th Computer Security Foundations Symposium, New Orleans, LA, USA, June 26-28, 2013
INDEXED IN: DBLP
IN MY: DBLP
66
TITLE: EasyCrypt: A Tutorial
AUTHORS: Gilles Barthe; François Dupressoir; Benjamin Grégoire; César Kunz; Benedikt Schmidt; Pierre Yves Strub;
PUBLISHED: 2013, SOURCE: Foundations of Security Analysis and Design VII - FOSAD 2012/2013 Tutorial Lectures, VOLUME: 8604
INDEXED IN: DBLP
IN MY: DBLP
67
TITLE: Beyond Differential Privacy: Composition Theorems and Relational Logic for f-divergences between Probabilistic Programs
AUTHORS: Gilles Barthe; Federico Olmedo;
PUBLISHED: 2013, SOURCE: Automata, Languages, and Programming - 40th International Colloquium, ICALP 2013, Riga, Latvia, July 8-12, 2013, Proceedings, Part II, VOLUME: 7966
INDEXED IN: DBLP
IN MY: DBLP
68
TITLE: Beyond 2-Safety: Asymmetric Product Programs for Relational Program Verification
AUTHORS: Gilles Barthe; Juan Manuel Crespo; César Kunz;
PUBLISHED: 2013, SOURCE: Logical Foundations of Computer Science, International Symposium, LFCS 2013, San Diego, CA, USA, January 6-8, 2013. Proceedings, VOLUME: 7734
INDEXED IN: DBLP
IN MY: DBLP
69
TITLE: From relational verification to SIMD loop synthesis
AUTHORS: Gilles Barthe; Juan Manuel Crespo; Sumit Gulwani; César Kunz; Mark Marron;
PUBLISHED: 2013, SOURCE: ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming, PPoPP '13, Shenzhen, China, February 23-27, 2013
INDEXED IN: DBLP
IN MY: DBLP
70
TITLE: Computer-Aided Security Proofs
AUTHORS: Gilles Barthe;
PUBLISHED: 2013, SOURCE: Quantitative Evaluation of Systems - 10th International Conference, QEST 2013, Buenos Aires, Argentina, August 27-30, 2013. Proceedings, VOLUME: 8054
INDEXED IN: DBLP
IN MY: DBLP
Page 7 of 20. Total results: 199.