Dependent types and multi-monadic effects in F N Swamy, C Hriţcu, C Keller, A Rastogi, A Delignat-Lavaud, S Forest, ... Proceedings of the 43rd annual ACM SIGPLAN-SIGACT Symposium on Principles of …, 2016 | 478 | 2016 |
A messy state of the union: Taming the composite state machines of TLS B Beurdouche, K Bhargavan, A Delignat-Lavaud, C Fournet, M Kohlweiss, ... Communications of the ACM 60 (2), 99-107, 2017 | 408 | 2017 |
Strong non-interference and type-directed higher-order masking G Barthe, S Belaïd, F Dupressoir, PA Fouque, B Grégoire, PY Strub, ... Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 286 | 2016 |
Triple handshakes and cookie cutters: Breaking and fixing authentication over TLS K Bhargavan, AD Lavaud, C Fournet, A Pironti, PY Strub 2014 IEEE Symposium on Security and Privacy, 98-113, 2014 | 284 | 2014 |
Secure distributed programming with value-dependent types N Swamy, J Chen, C Fournet, PY Strub, K Bhargavan, J Yang ACM SIGPLAN Notices 46 (9), 266-278, 2011 | 283 | 2011 |
Implementing TLS with verified cryptographic security K Bhargavan, C Fournet, M Kohlweiss, A Pironti, PY Strub Proceedings of the 34th IEEE Symposium on Security and Privacy, SP 13, 2013 | 256 | 2013 |
Easycrypt: A tutorial G Barthe, F Dupressoir, B Grégoire, C Kunz, B Schmidt, PY Strub International School on Foundations of Security Analysis and Design, 146-166, 2012 | 225 | 2012 |
Verified proofs of higher-order masking G Barthe, S Belaïd, F Dupressoir, PA Fouque, B Grégoire, PY Strub Annual International Conference on the Theory and Applications of …, 2015 | 201 | 2015 |
Jasmin: High-assurance and high-speed cryptography JB Almeida, M Barbosa, G Barthe, A Blot, B Grégoire, V Laporte, ... Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 189 | 2017 |
Parallel implementations of masking schemes and the bounded moment leakage model G Barthe, F Dupressoir, S Faust, B Grégoire, FX Standaert, PY Strub Advances in Cryptology–EUROCRYPT 2017: 36th Annual International Conference …, 2017 | 167 | 2017 |
Probabilistic relational verification for cryptographic implementations G Barthe, C Fournet, B Grégoire, PY Strub, N Swamy, S Zanella-Béguelin ACM SIGPLAN Notices 49 (1), 193-205, 2014 | 134 | 2014 |
Fully abstract compilation to JavaScript C Fournet, N Swamy, J Chen, PE Dagand, PY Strub, B Livshits Proceedings of the 40th annual ACM SIGPLAN-SIGACT symposium on Principles of …, 2013 | 131 | 2013 |
Proving the TLS handshake secure (as it is) K Bhargavan, C Fournet, M Kohlweiss, A Pironti, PY Strub, ... Advances in Cryptology–CRYPTO 2014: 34th Annual Cryptology Conference, Santa …, 2014 | 123 | 2014 |
Proving differential privacy via probabilistic couplings G Barthe, M Gaboardi, B Grégoire, J Hsu, PY Strub Proceedings of the 31st Annual ACM/IEEE Symposium on Logic in Computer …, 2016 | 111 | 2016 |
Modular code-based cryptographic verification C Fournet, M Kohlweiss, PY Strub Proceedings of the 18th ACM conference on Computer and communications …, 2011 | 107 | 2011 |
Higher-order approximate relational refinement types for mechanism design and differential privacy G Barthe, M Gaboardi, EJ Gallego Arias, J Hsu, A Roth, PY Strub ACM SIGPLAN Notices 50 (1), 55-68, 2015 | 106 | 2015 |
The last mile: High-assurance and high-speed cryptographic implementations JB Almeida, M Barbosa, G Barthe, B Grégoire, A Koutsos, V Laporte, ... 2020 IEEE Symposium on Security and Privacy (SP), 965-982, 2020 | 94 | 2020 |
Gradual typing embedded securely in JavaScript N Swamy, C Fournet, A Rastogi, K Bhargavan, J Chen, PY Strub, ... ACM SIGPLAN Notices 49 (1), 425-437, 2014 | 92 | 2014 |
Color image segmentation based on automatic morphological clustering T Géraud, PY Strub, J Darbon Proceedings 2001 international conference on image processing (Cat. No …, 2001 | 80 | 2001 |
A relational logic for higher-order programs A Aguirre, G Barthe, M Gaboardi, D Garg, PY Strub Proceedings of the ACM on Programming Languages 1 (ICFP), 1-29, 2017 | 69 | 2017 |