Writing code is hard; proving it correct is even harder. As the scale of verified software projects reaches new heights, the problem of efficiently verifying large amounts of software becomes more and more salient. Nowhere is this issue more evident than in the context of verified cryptographic libraries. To achieve feature-parity and be competitive with unverified cryptographic libraries, a very large number of algorithms and APIs need to be verified. However, the task is oftentimes repetitive, and factoring out commonality between algorithms is fraught with difficulties, requiring until now a significant amount of manual effort. This paper shows how a judicious combination of known functional programming techniques leads to an order-of-...
Verifiable computation (VC) protocols enable clients to outsource computations to untrusted servers ...
This is the artifact for the ICFP 2023 submission: Modularity, Code Specialization, and Zero-Cost Ab...
Developers building cryptography into security-sensitive applications face a daunting task. Not only...
International audienceCryptographic algorithms, protocols, and applications are difficult to impleme...
International audienceFor all the successes in verifying low-level, efficient, security-critical cod...
Cryptographic algorithms, protocols, and applications are difficult to implement correctly, and erro...
The security of Internet applications relies crucially on the secure design and robust implementatio...
We develop a new approach for building cryptographic implementations. Our approach goes the last mil...
Performance critical software is almost always developed in C, as programmers do not trust high-leve...
HACL* is a verified portable C cryptographic library that implements modern cryptographic primitives...
We introduce an unusual approach for implementing cryptographic arithmetic in short high-level code ...
International audienceType systems are effective tools for verifying the security of cryptographic p...
Performance critical software is almost always developed in C, as programmers do not trust high-leve...
Developers building cryptography into security-sensitive applications face a daunting task. Not only...
In this technical report we describe an approach for verifying cryptographic protocol implementation...
Verifiable computation (VC) protocols enable clients to outsource computations to untrusted servers ...
This is the artifact for the ICFP 2023 submission: Modularity, Code Specialization, and Zero-Cost Ab...
Developers building cryptography into security-sensitive applications face a daunting task. Not only...
International audienceCryptographic algorithms, protocols, and applications are difficult to impleme...
International audienceFor all the successes in verifying low-level, efficient, security-critical cod...
Cryptographic algorithms, protocols, and applications are difficult to implement correctly, and erro...
The security of Internet applications relies crucially on the secure design and robust implementatio...
We develop a new approach for building cryptographic implementations. Our approach goes the last mil...
Performance critical software is almost always developed in C, as programmers do not trust high-leve...
HACL* is a verified portable C cryptographic library that implements modern cryptographic primitives...
We introduce an unusual approach for implementing cryptographic arithmetic in short high-level code ...
International audienceType systems are effective tools for verifying the security of cryptographic p...
Performance critical software is almost always developed in C, as programmers do not trust high-leve...
Developers building cryptography into security-sensitive applications face a daunting task. Not only...
In this technical report we describe an approach for verifying cryptographic protocol implementation...
Verifiable computation (VC) protocols enable clients to outsource computations to untrusted servers ...
This is the artifact for the ICFP 2023 submission: Modularity, Code Specialization, and Zero-Cost Ab...
Developers building cryptography into security-sensitive applications face a daunting task. Not only...