Formal certification of code-based cryptographic proofs

From MaRDI portal
Publication:5261508

DOI10.1145/1480881.1480894zbMath1315.68081OpenAlexW2011086847MaRDI QIDQ5261508

Gilles Barthe, Benjamin Grégoire, Santiago Zanella Béguelin

Publication date: 3 July 2015

Published in: Proceedings of the 36th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1145/1480881.1480894



Lua error in Module:PublicationMSCList at line 37: attempt to index local 'msc_result' (a nil value).


Related Items (37)

A denotational semantics for low-level probabilistic programs with nondeterminismProduct programs and relational program logicsANF preserves dependent types up to extensional equalityThe expectation monad in quantum foundationsCoSMed: a confidentiality-verified social media platformFormalizing Probabilistic NoninterferenceCryptHOL: game-based proofs in higher-order logicA Formalized Hierarchy of Probabilistic System TypesDijkstra and Hoare monads in monadic computationHow to simulate it in Isabelle: towards formal proof for secure multi-party computationRHLE: modular deductive verification of relational \(\forall \exists\) propertiesPost-quantum verification of Fujisaki-OkamotoCertifying assembly with formal security proofs: the case of BBSVPHL: a verified partial-correctness logic for probabilistic programsProbabilistic Termination by Monadic Affine Sized TypingAutomated proofs for asymmetric encryptionStrassen's theorem for quantum couplingsA Calculus for Game-Based Security ProofsFifty years of Hoare's logicFormalising \(\varSigma\)-protocols and commitment schemes using cryptholVerified analysis of random binary tree structuresProbabilistic Functions and Cryptographic Oracles in Higher Order LogicMeasure Transformer Semantics for Bayesian Machine LearningBeyond Provable Security Verifiable IND-CCA Security of OAEPLogical Formalisation and Analysis of the Mifare Classic Card in PVSA Formalization of Polytime FunctionsThe Computational SLR: A Logic for Reasoning about Computational IndistinguishabilityCertiCryptVerifiable Security of Boneh-Franklin Identity-Based EncryptionA Machine-Checked Framework for Relational Separation LogicCertified Security Proofs of Cryptographic Protocols in the Computational Model: An Application to Intrusion ResilienceImplicit computational complexity of subrecursive definitions and applications to cryptographic proofsUnnamed ItemFormalization in PVS of Balancing Properties Necessary for Proving Security of the Dolev-Yao Cascade Protocol ModelEasyCrypt: A TutorialFormal security proofs with minimal fuss: implicit computational complexity at workA mechanized proof of the max-flow min-cut theorem for countable networks with applications to probability theory


Uses Software



This page was built for publication: Formal certification of code-based cryptographic proofs