International audienceCode-based game-playing is a popular methodology for proving security of cryptographic constructions and side-channel countermeasures. This methodology relies on treating cryptographic proofs as an instance of relational program verification (between probabilistic programs), and decomposing the latter into a series of elementary relational program verification steps. In this paper, we develop principled methods for proving such elementary steps for probabilistic programs that operate over finite fields and related algebraic structures. We focus on three essential properties: program equivalence, information flow, and uniformity. We give characterizations of these properties based on deducibility and other notions from ...
AbstractIn [R.J. Corin, J.I. den Hartog, A probabilistic hoare-style logic for game-based cryptograp...
Security protocols are short programs aiming at securing communications over a network. They are wid...
AbstractThis paper provides one more step towards bridging the gap between the formal and computatio...
International audienceCode-based game-playing is a popular methodology for proving security of crypt...
The game-based approach is a popular methodology for structuring cryptographic proofs as sequences o...
International audienceCerticrypt is a general framework to certify the security of cryptographic pri...
International audienceWe show how implicit computational complexity can be used in order to increase...
Verifying cryptographic security proofs manually is inherently tedious and error-prone. The game-pla...
We present a new mechanized prover for secrecy properties of cryptographic protocols. In contrast to...
We extend a Probabilistic Hoare-style logic to formalize game-based cryptographic proofs. Our approa...
The game-based approach to security proofs in cryptography is a widely-used methodology for writing ...
This paper presents the first automatic technique for proving not only protocols but also primitives...
Cryptography is a small but crucial part of information security. The design of secure cryptographic...
International audienceProvable security [6] is at the heart of modern cryptography. It advocates a m...
Computer-aided cryptography improves the rigor of security proofs by mechanizing their verification....
AbstractIn [R.J. Corin, J.I. den Hartog, A probabilistic hoare-style logic for game-based cryptograp...
Security protocols are short programs aiming at securing communications over a network. They are wid...
AbstractThis paper provides one more step towards bridging the gap between the formal and computatio...
International audienceCode-based game-playing is a popular methodology for proving security of crypt...
The game-based approach is a popular methodology for structuring cryptographic proofs as sequences o...
International audienceCerticrypt is a general framework to certify the security of cryptographic pri...
International audienceWe show how implicit computational complexity can be used in order to increase...
Verifying cryptographic security proofs manually is inherently tedious and error-prone. The game-pla...
We present a new mechanized prover for secrecy properties of cryptographic protocols. In contrast to...
We extend a Probabilistic Hoare-style logic to formalize game-based cryptographic proofs. Our approa...
The game-based approach to security proofs in cryptography is a widely-used methodology for writing ...
This paper presents the first automatic technique for proving not only protocols but also primitives...
Cryptography is a small but crucial part of information security. The design of secure cryptographic...
International audienceProvable security [6] is at the heart of modern cryptography. It advocates a m...
Computer-aided cryptography improves the rigor of security proofs by mechanizing their verification....
AbstractIn [R.J. Corin, J.I. den Hartog, A probabilistic hoare-style logic for game-based cryptograp...
Security protocols are short programs aiming at securing communications over a network. They are wid...
AbstractThis paper provides one more step towards bridging the gap between the formal and computatio...