List of research outcomes
This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!
| Publication | Date of Publication | Type |
|---|---|---|
| Key-schedule security for the TLS 1.3 standard Advances in Cryptology – ASIACRYPT 2022 | 2023-08-25 | Paper |
| A calculus of mobile agents CONCUR '96: Concurrency Theory | 2023-06-28 | Paper |
| Implicit typing à la ML for the join-calculus CONCUR '97: Concurrency Theory | 2023-05-17 | Paper |
| State separation for code-based game-playing proofs | 2019-01-23 | Paper |
| The Applied Pi Calculus Journal of the ACM | 2018-08-02 | Paper |
| Dependent types and multi-monadic effects in \(\mathrm{F}^*\) Proceedings of the 43rd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages | 2016-10-24 | Paper |
| Safe \& efficient gradual typing for TypeScript Proceedings of the 42nd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages | 2016-09-29 | Paper |
| A semantics for web services authentication Proceedings of the 31st ACM SIGPLAN-SIGACT symposium on Principles of programming languages | 2015-11-11 | Paper |
| Self-certification: bootstrapping certified typecheckers in F\(^\ast\) with Coq Proceedings of the 39th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages | 2015-09-11 | Paper |
| Modular verification of security protocol code by typing Proceedings of the 37th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages | 2015-06-11 | Paper |
| Mobile values, new names, and secure communication Proceedings of the 28th ACM SIGPLAN-SIGACT symposium on Principles of programming languages | 2015-03-17 | Paper |
| Authentication primitives and their compilation Proceedings of the 27th ACM SIGPLAN-SIGACT symposium on Principles of programming languages | 2015-03-17 | Paper |
| Stack inspection Proceedings of the 29th ACM SIGPLAN-SIGACT symposium on Principles of programming languages | 2015-03-17 | Paper |
| Secure distributed programming with value-dependent types Proceedings of the 16th ACM SIGPLAN international conference on Functional programming | 2015-03-05 | Paper |
| Square span programs with applications to succinct NIZK arguments Lecture Notes in Computer Science | 2015-01-16 | Paper |
| Fully abstract compilation to JavaScript Proceedings of the 40th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages | 2014-11-27 | Paper |
| Cryptographically sound implementations for typed information-flow security Proceedings of the 35th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages | 2014-09-12 | Paper |
| Proving the TLS handshake secure (as it is) Advances in Cryptology – CRYPTO 2014 | 2014-08-07 | Paper |
| Gradual typing embedded securely in JavaScript Proceedings of the 41st ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages | 2014-04-10 | Paper |
| Probabilistic relational verification for cryptographic implementations Proceedings of the 41st ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages | 2014-04-10 | Paper |
| Secure distributed programming with value-dependent types Journal of Functional Programming | 2014-02-27 | Paper |
| Cryptographic Verification by Typing for a Sample Protocol Implementation Foundations of Security Analysis and Design VI | 2011-09-16 | Paper |
| Compiling Information-Flow Security to Minimal Trusted Computing Bases Programming Languages and Systems | 2011-05-19 | Paper |
| Principles and applications of refinement types | 2010-12-13 | Paper |
| Secure Enforcement for Global Process Specifications CONCUR 2009 - Concurrency Theory | 2009-10-22 | Paper |
| Computational Secrecy by Typing for the Pi Calculus Programming Languages and Systems | 2008-05-06 | Paper |
| A Formal Implementation of Value Commitment Programming Languages and Systems | 2008-04-11 | Paper |
| Verified interoperable implementations of security protocols | 2008-03-06 | Paper |
| Automated verification of selected equivalences for security protocols The Journal of Logic and Algebraic Programming | 2008-03-05 | Paper |
| Programming Languages and Systems Lecture Notes in Computer Science | 2007-09-28 | Paper |
| Cryptographically Sound Implementations for Communicating Processes Automata, Languages and Programming | 2007-09-11 | Paper |
| Programming Languages and Systems Lecture Notes in Computer Science | 2005-09-13 | Paper |
| Computer Aided Verification Lecture Notes in Computer Science | 2005-08-25 | Paper |
| Formal Methods for Components and Objects Lecture Notes in Computer Science | 2005-08-22 | Paper |
| A semantics for web services authentication Theoretical Computer Science | 2005-06-30 | Paper |
| A hierarchy of equivalences for asynchronous calculi The Journal of Logic and Algebraic Programming | 2005-04-18 | Paper |
| Private authentication Theoretical Computer Science | 2004-10-04 | Paper |
| scientific article; zbMATH DE number 2090726 (Why is no real title available?) | 2004-08-13 | Paper |
| scientific article; zbMATH DE number 2089394 (Why is no real title available?) | 2004-08-12 | Paper |
| scientific article; zbMATH DE number 2080219 (Why is no real title available?) | 2004-08-04 | Paper |
| Inheritance in the join calculus. The Journal of Logic and Algebraic Programming | 2004-03-14 | Paper |
| scientific article; zbMATH DE number 1962756 (Why is no real title available?) | 2003-08-11 | Paper |
| Secure implementation of channel abstractions Information and Computation | 2003-01-14 | Paper |
| scientific article; zbMATH DE number 1759482 (Why is no real title available?) | 2002-06-25 | Paper |
| Bisimulations in the join-calculus Theoretical Computer Science | 2002-03-03 | Paper |
| scientific article; zbMATH DE number 1500645 (Why is no real title available?) | 2000-09-04 | Paper |
| scientific article; zbMATH DE number 1223738 (Why is no real title available?) | 1999-02-14 | Paper |
| scientific article; zbMATH DE number 1231619 (Why is no real title available?) | 1999-01-06 | Paper |
Research outcomes over time
This page was built for person: Cédric Fournet