The security of Internet applications relies crucially on the secure design and robust implementations of cryptographic algorithms and protocols. This thesis presents a new, scalable and extensible approach for verifying state-of-the-art bignum algorithms, found in popular cryptographic implementations. Our code and proofs are written in F∗, a proof-oriented language which offers a very rich and expressive type system. The natural way of writing and verifying higher-order functional code in F∗ prioritizes code sharing and proof composition, but this results in low performance for cryptographic code. We propose a new language, Low∗, a fragment of F∗ which can be seen as a shallow embedding of C in F∗ and safely compiled to C code. Nonetheles...
International audienceWe develop a new approach for building cryptographic implementations. Our appr...
Information security relies on the correct interaction of several abstraction layers: hardware, oper...
Most software domains rely on compilers to translate high-level code to multiple different machine l...
The security of Internet applications relies crucially on the secure design and robust implementatio...
International audienceCryptographic algorithms, protocols, and applications are difficult to impleme...
We introduce an unusual approach for implementing cryptographic arithmetic in short high-level code ...
HACL* is a verified portable C cryptographic library that implements modern cryptographic primitives...
We develop a new approach for building cryptographic implementations. Our approach goes the last mil...
Cryptographic algorithms, protocols, and applications are difficult to implement correctly, and erro...
International audienceHACL* is a verified portable C cryptographic library that implements modern cr...
Writing code is hard; proving it correct is even harder. As the scale of verified software projects ...
In this technical report we describe an approach for verifying cryptographic protocol implementation...
This thesis addresses various topics in cryptology, namely protocol design, algorithmic improvements...
International audienceType systems are effective tools for verifying the security of cryptographic p...
The goal of this work is to obtain implementations of security protocols proved in the computational...
International audienceWe develop a new approach for building cryptographic implementations. Our appr...
Information security relies on the correct interaction of several abstraction layers: hardware, oper...
Most software domains rely on compilers to translate high-level code to multiple different machine l...
The security of Internet applications relies crucially on the secure design and robust implementatio...
International audienceCryptographic algorithms, protocols, and applications are difficult to impleme...
We introduce an unusual approach for implementing cryptographic arithmetic in short high-level code ...
HACL* is a verified portable C cryptographic library that implements modern cryptographic primitives...
We develop a new approach for building cryptographic implementations. Our approach goes the last mil...
Cryptographic algorithms, protocols, and applications are difficult to implement correctly, and erro...
International audienceHACL* is a verified portable C cryptographic library that implements modern cr...
Writing code is hard; proving it correct is even harder. As the scale of verified software projects ...
In this technical report we describe an approach for verifying cryptographic protocol implementation...
This thesis addresses various topics in cryptology, namely protocol design, algorithmic improvements...
International audienceType systems are effective tools for verifying the security of cryptographic p...
The goal of this work is to obtain implementations of security protocols proved in the computational...
International audienceWe develop a new approach for building cryptographic implementations. Our appr...
Information security relies on the correct interaction of several abstraction layers: hardware, oper...
Most software domains rely on compilers to translate high-level code to multiple different machine l...