We define a call-by-value variant of G\ua8odel\u2019s System T with references, and equip it with a linear dependent type and effect system, called dlT, that can estimate the complexity of programs, as a function of the size of their inputs. We prove that the type system is intentionally sound, in the sense that it over-approximates the complexity of executing the programs on a variant of the CEK abstract machine. Moreover, we define a sound and complete type inference algorithm which critically exploits the subrecursive nature of dlT. Finally, we demonstrate the usefulness of dlT for analyzing the complexity of cryptographic reductions by providing an upper bound for the constructed adversary of the Goldreich-Levin theorem
International audienceIn this paper we enhance the EasyCrypt proof assistant to reason about computa...
222 pagesIn this work, we examine the science of proving formal security of primitives in cryptograp...
We introduce new forms of attack on expander-based cryptography, and in particular on Goldreich's ps...
We define a call-by-value variant of G¨odel’s System T with references, and equip it with a linear d...
International audienceWe define a call-by-value variant of Gödel 's System T with references, and eq...
In cryptographic protocols, honest parties would prefer that their security is assured even in prese...
Which computational complexity assumptions are inherent to cryptography? We present a broad framewor...
Secure computation is one of the most fundamental cryptographic tasks. It is known that all function...
This paper gives an overview of subrecursive hierarchy theory as it relates to computational complex...
In the first part of the thesis we show black-box separations in public and private-key cryptography...
AbstractIt is notoriously hard to express computational complexity properties of programs in program...
Abstract. Previously, the author has developed a framework within which to quantify and compare the ...
The book introduces new ways of using analytic number theory in cryptography and related areas, such...
The book introduces new techniques which imply rigorous lower bounds on the complexity of some numbe...
Secure computation is one of the most fundamental cryptographic tasks. It is known that all function...
International audienceIn this paper we enhance the EasyCrypt proof assistant to reason about computa...
222 pagesIn this work, we examine the science of proving formal security of primitives in cryptograp...
We introduce new forms of attack on expander-based cryptography, and in particular on Goldreich's ps...
We define a call-by-value variant of G¨odel’s System T with references, and equip it with a linear d...
International audienceWe define a call-by-value variant of Gödel 's System T with references, and eq...
In cryptographic protocols, honest parties would prefer that their security is assured even in prese...
Which computational complexity assumptions are inherent to cryptography? We present a broad framewor...
Secure computation is one of the most fundamental cryptographic tasks. It is known that all function...
This paper gives an overview of subrecursive hierarchy theory as it relates to computational complex...
In the first part of the thesis we show black-box separations in public and private-key cryptography...
AbstractIt is notoriously hard to express computational complexity properties of programs in program...
Abstract. Previously, the author has developed a framework within which to quantify and compare the ...
The book introduces new ways of using analytic number theory in cryptography and related areas, such...
The book introduces new techniques which imply rigorous lower bounds on the complexity of some numbe...
Secure computation is one of the most fundamental cryptographic tasks. It is known that all function...
International audienceIn this paper we enhance the EasyCrypt proof assistant to reason about computa...
222 pagesIn this work, we examine the science of proving formal security of primitives in cryptograp...
We introduce new forms of attack on expander-based cryptography, and in particular on Goldreich's ps...