International audienceWe define a call-by-value variant of Gödel 's System T with references, and equip it with a linear dependent type and effect system, called d that can estimate the complexity of programs, as a function of the size of their inputs. We prove that the type system is intentionally sound, in the sense that it over-approximates the complexity of executing the programs on a variant of the CEK abstract machine. Moreover, we define a sound and complete type inference algorithm which critically exploits the subrecursive nature of d Finally, we demonstrate the usefulness of d for analyzing the complexity of cryptographic reductions by providing an upper bound for the constructed adversary of the Goldreich-Levin theorem
This dissertation presents several results at the intersection ofcomplexity theory and algorithm des...
Secure computation is one of the most fundamental cryptographic tasks. It is known that all function...
We introduce new forms of attack on expander-based cryptography, and in particular on Goldreich's ps...
International audienceWe define a call-by-value variant of Gödel 's System T with references, and eq...
We define a call-by-value variant of G\ua8odel\u2019s System T with references, and equip it with a ...
Which computational complexity assumptions are inherent to cryptography? We present a broad framewor...
In cryptographic protocols, honest parties would prefer that their security is assured even in prese...
AbstractIt is notoriously hard to express computational complexity properties of programs in program...
This paper gives an overview of subrecursive hierarchy theory as it relates to computational complex...
International audienceWe show how implicit computational complexity can be used in order to increase...
Abstract. Previously, the author has developed a framework within which to quantify and compare the ...
Secure computation is one of the most fundamental cryptographic tasks. It is known that all function...
222 pagesIn this work, we examine the science of proving formal security of primitives in cryptograp...
International audienceIn this paper we enhance the EasyCrypt proof assistant to reason about computa...
In the first part of the thesis we show black-box separations in public and private-key cryptography...
This dissertation presents several results at the intersection ofcomplexity theory and algorithm des...
Secure computation is one of the most fundamental cryptographic tasks. It is known that all function...
We introduce new forms of attack on expander-based cryptography, and in particular on Goldreich's ps...
International audienceWe define a call-by-value variant of Gödel 's System T with references, and eq...
We define a call-by-value variant of G\ua8odel\u2019s System T with references, and equip it with a ...
Which computational complexity assumptions are inherent to cryptography? We present a broad framewor...
In cryptographic protocols, honest parties would prefer that their security is assured even in prese...
AbstractIt is notoriously hard to express computational complexity properties of programs in program...
This paper gives an overview of subrecursive hierarchy theory as it relates to computational complex...
International audienceWe show how implicit computational complexity can be used in order to increase...
Abstract. Previously, the author has developed a framework within which to quantify and compare the ...
Secure computation is one of the most fundamental cryptographic tasks. It is known that all function...
222 pagesIn this work, we examine the science of proving formal security of primitives in cryptograp...
International audienceIn this paper we enhance the EasyCrypt proof assistant to reason about computa...
In the first part of the thesis we show black-box separations in public and private-key cryptography...
This dissertation presents several results at the intersection ofcomplexity theory and algorithm des...
Secure computation is one of the most fundamental cryptographic tasks. It is known that all function...
We introduce new forms of attack on expander-based cryptography, and in particular on Goldreich's ps...