La seguridad verificada es una metodología para demostrar propiedades de seguridad de los sistemas informáticos que se destaca por las altas garantías de corrección que provee. Los sistemas informáticos se modelan como programas probabilísticos y para probar que verifican una determinada propiedad de seguridad se utilizan técnicas rigurosas basadas en modelos matemáticos de los programas. En particular, la seguridad verificada promueve el uso de demostradores de teoremas interactivos o automáticos para construir demostraciones completamente formales cuya corrección es certificada mecánicamente (por ordenador). La seguridad verificada demostró ser una técnica muy efectiva para razonar sobre diversas nociones de seguridad en el área de cripto...
This thesis deals with Statistical Relational Learning (SRL), a research area combining principles a...
Differential privacy is a notion of confidentiality that allows useful computations on sensible data...
The game-based approach is a popular methodology for structuring cryptographic proofs as sequences o...
La verificación y el análisis de programas con características probabilistas es una tarea necesaria ...
International audienceProbabilistic coupling is a powerful tool for analyzing prob-abilistic process...
Relational program logics have been used for mechanizing for-mal proofs of various cryptographic con...
A combinação de lógica e probabilidade (lógicas probabilísticas) tem sido um tópico bastante estudad...
This thesis explores proofs by coupling from the perspective of formal verification. Long employed i...
This book provides an overview of the theoretical underpinnings of modern probabilistic programming ...
We extend a Probabilistic Hoare-style logic to formalize game-based cryptographic proofs. Our approa...
We define a mathematical measure for the quantitative comparison of probabilistic computational trus...
International audienceWe propose a probabilistic Hoare logic aHL based on the union bound, a tool fr...
This thesis explores proofs by coupling from the perspective of formal verification. Long employed i...
International audienceCerticrypt is a general framework to certify the security of cryptographic pri...
Los lenguajes basados en máquinas de estados finitos (también llamados automátas finitos) son usados...
This thesis deals with Statistical Relational Learning (SRL), a research area combining principles a...
Differential privacy is a notion of confidentiality that allows useful computations on sensible data...
The game-based approach is a popular methodology for structuring cryptographic proofs as sequences o...
La verificación y el análisis de programas con características probabilistas es una tarea necesaria ...
International audienceProbabilistic coupling is a powerful tool for analyzing prob-abilistic process...
Relational program logics have been used for mechanizing for-mal proofs of various cryptographic con...
A combinação de lógica e probabilidade (lógicas probabilísticas) tem sido um tópico bastante estudad...
This thesis explores proofs by coupling from the perspective of formal verification. Long employed i...
This book provides an overview of the theoretical underpinnings of modern probabilistic programming ...
We extend a Probabilistic Hoare-style logic to formalize game-based cryptographic proofs. Our approa...
We define a mathematical measure for the quantitative comparison of probabilistic computational trus...
International audienceWe propose a probabilistic Hoare logic aHL based on the union bound, a tool fr...
This thesis explores proofs by coupling from the perspective of formal verification. Long employed i...
International audienceCerticrypt is a general framework to certify the security of cryptographic pri...
Los lenguajes basados en máquinas de estados finitos (también llamados automátas finitos) son usados...
This thesis deals with Statistical Relational Learning (SRL), a research area combining principles a...
Differential privacy is a notion of confidentiality that allows useful computations on sensible data...
The game-based approach is a popular methodology for structuring cryptographic proofs as sequences o...