International audienceProof by coupling is a classical proof technique for establishing probabilistic properties of two probabilistic processes, like stochastic dominance and rapid mixing of Markov chains. More recently, couplings have been investigated as a useful abstraction for formal reasoning about relational properties of probabilistic programs, in particular for modeling reduction-based cryptographic proofs and for verifying differential privacy. In this paper, we demonstrate that probabilistic couplings can be used for verifying non-relational probabilistic properties. Specifically, we show that the program logic pRHL— whose proofs are formal versions of proofs by coupling—can be used for formalizing uniformity and probabilistic ind...
International audienceCode-based game-playing is a popular methodology for proving security of crypt...
We propose a method for verification of probabilistic distributed systems in which a variation of Ko...
This paper studies the question of how to define, construct, and use obfuscators for probabilistic p...
International audienceProof by coupling is a classical proof technique for establishing probabilisti...
This thesis explores proofs by coupling from the perspective of formal verification. Long employed i...
This thesis explores proofs by coupling from the perspective of formal verification. Long employed i...
International audienceProbabilistic coupling is a powerful tool for analyzing prob-abilistic process...
International audienceCouplings are a powerful mathematical tool for reasoning about pairs of probab...
International audienceWe propose a probabilistic Hoare logic aHL based on the union bound, a tool fr...
We propose a probabilistic Hoare logic aHL based on the union bound, a tool from basic probability t...
International audienceDifferential privacy is a promising formal approach to data privacy, which pro...
Contains fulltext : 27561.pdf (publisher's version ) (Open Access)This thesis is w...
International audienceProgram sensitivity, also known as Lipschitz continuity, describes how small c...
We describe pKA, a probabilistic Kleene-style algebra, based on a well known model of probabilistic/...
AbstractThis paper investigates probabilistic logics endowed with independence relations. We review ...
International audienceCode-based game-playing is a popular methodology for proving security of crypt...
We propose a method for verification of probabilistic distributed systems in which a variation of Ko...
This paper studies the question of how to define, construct, and use obfuscators for probabilistic p...
International audienceProof by coupling is a classical proof technique for establishing probabilisti...
This thesis explores proofs by coupling from the perspective of formal verification. Long employed i...
This thesis explores proofs by coupling from the perspective of formal verification. Long employed i...
International audienceProbabilistic coupling is a powerful tool for analyzing prob-abilistic process...
International audienceCouplings are a powerful mathematical tool for reasoning about pairs of probab...
International audienceWe propose a probabilistic Hoare logic aHL based on the union bound, a tool fr...
We propose a probabilistic Hoare logic aHL based on the union bound, a tool from basic probability t...
International audienceDifferential privacy is a promising formal approach to data privacy, which pro...
Contains fulltext : 27561.pdf (publisher's version ) (Open Access)This thesis is w...
International audienceProgram sensitivity, also known as Lipschitz continuity, describes how small c...
We describe pKA, a probabilistic Kleene-style algebra, based on a well known model of probabilistic/...
AbstractThis paper investigates probabilistic logics endowed with independence relations. We review ...
International audienceCode-based game-playing is a popular methodology for proving security of crypt...
We propose a method for verification of probabilistic distributed systems in which a variation of Ko...
This paper studies the question of how to define, construct, and use obfuscators for probabilistic p...