We present a computer-aided framework for proving concrete security bounds for cryptographic machine code implementations. The front-end of the framework is an interactive verification tool that extends the EasyCrypt framework to reason about relational properties of C-like programs extended with idealised probabilistic operations in the style of code-based security proofs. The framework also incorporates an extension of the CompCert certified compiler to support trusted libraries providing complex arithmetic calculations or instantiating idealized components such as sampling operations. This certified compiler allows us to carry to executable code the security guarantees established at the high-level, and is also instrumented to detect whe...
Developers building cryptography into security-sensitive applications face a daunting task. Not only...
International audienceCryptographic algorithms, protocols, and applications are difficult to impleme...
We present a high-assurance software stack for secure function evaluation (SFE). Our stack consists ...
We present a new tool for the generation and verification of high-assurance high-speed machine-level...
International audienceProvable security [6] is at the heart of modern cryptography. It advocates a m...
International audienceCerticrypt is a general framework to certify the security of cryptographic pri...
Jasmin is a framework for developing high-speed and high-assurance cryptographic software. The frame...
International audienceEasyCrypt is an automated tool that supports the machine-checked construction ...
We present a high-assurance software stack for secure function evaluation (SFE). Our stack consists ...
International audienceWe present a new tool for the generation and verification of high-assurance hi...
International audienceWe present a high-assurance software stack for secure function evaluation (SFE...
Cryptography is a small but crucial part of information security. The design of secure cryptographic...
The goal of modern cryptography is to design efficient constructions that simultaneously achieve som...
Cryptography is a small but crucial part of information security. The design of secure cryptographic...
Security protocols, such as TLS or Kerberos, and security devices such as the Trusted Platform Modul...
Developers building cryptography into security-sensitive applications face a daunting task. Not only...
International audienceCryptographic algorithms, protocols, and applications are difficult to impleme...
We present a high-assurance software stack for secure function evaluation (SFE). Our stack consists ...
We present a new tool for the generation and verification of high-assurance high-speed machine-level...
International audienceProvable security [6] is at the heart of modern cryptography. It advocates a m...
International audienceCerticrypt is a general framework to certify the security of cryptographic pri...
Jasmin is a framework for developing high-speed and high-assurance cryptographic software. The frame...
International audienceEasyCrypt is an automated tool that supports the machine-checked construction ...
We present a high-assurance software stack for secure function evaluation (SFE). Our stack consists ...
International audienceWe present a new tool for the generation and verification of high-assurance hi...
International audienceWe present a high-assurance software stack for secure function evaluation (SFE...
Cryptography is a small but crucial part of information security. The design of secure cryptographic...
The goal of modern cryptography is to design efficient constructions that simultaneously achieve som...
Cryptography is a small but crucial part of information security. The design of secure cryptographic...
Security protocols, such as TLS or Kerberos, and security devices such as the Trusted Platform Modul...
Developers building cryptography into security-sensitive applications face a daunting task. Not only...
International audienceCryptographic algorithms, protocols, and applications are difficult to impleme...
We present a high-assurance software stack for secure function evaluation (SFE). Our stack consists ...