Most software domains rely on compilers to translate high-level code to multiple different machine languages, with performance not too much worse than what developers would have the patience to write directly in assembly language. However, cryptography has been an exception, where many performance-critical routines have been written directly in assembly (sometimes through metaprogramming layers). Some past work has shown how to do formal verification of that assembly, and other work has shown how to generate C code automatically along with formal proof, but with consequent performance penalties vs.The best-known assembly. We present CryptOpt, the first compilation pipeline that specializes high-level cryptographic functional programs into a...
AbstractWith today’s dissemination of embedded systems manipulating sensitive data, it has become im...
We present a high-assurance software stack for secure function evaluation (SFE). Our stack consists ...
We present a computer-aided framework for proving concrete security bounds for cryptographic machine...
Most software domains rely on compilers to translate high-level code to multiple different machine l...
This is the artifact for the artifact evaluation for this paper to be published to PLDI 2023. To ev...
We introduce an unusual approach for implementing cryptographic arithmetic in short high-level code ...
International audienceWe develop a new approach for building cryptographic implementations. Our appr...
This paper presents results on formal verification of high-speed cryptographic software. We consider...
International audienceWe present a new tool for the generation and verification of high-assurance hi...
International audienceIn cryptology, verifiable computing aims at verifying the remote execution of ...
With today's dissemination of embedded systems manipulating sensitive data, it has become important ...
Arithmetic over large finite fields is indispensable in modern cryptography. For efficienty, these o...
Thesis: M. Eng., Massachusetts Institute of Technology, Department of Electrical Engineering and Com...
We present a new tool for the generation and verification of high-assurance high-speed machine-level...
We develop a new approach for building cryptographic implementations. Our approach goes the last mil...
AbstractWith today’s dissemination of embedded systems manipulating sensitive data, it has become im...
We present a high-assurance software stack for secure function evaluation (SFE). Our stack consists ...
We present a computer-aided framework for proving concrete security bounds for cryptographic machine...
Most software domains rely on compilers to translate high-level code to multiple different machine l...
This is the artifact for the artifact evaluation for this paper to be published to PLDI 2023. To ev...
We introduce an unusual approach for implementing cryptographic arithmetic in short high-level code ...
International audienceWe develop a new approach for building cryptographic implementations. Our appr...
This paper presents results on formal verification of high-speed cryptographic software. We consider...
International audienceWe present a new tool for the generation and verification of high-assurance hi...
International audienceIn cryptology, verifiable computing aims at verifying the remote execution of ...
With today's dissemination of embedded systems manipulating sensitive data, it has become important ...
Arithmetic over large finite fields is indispensable in modern cryptography. For efficienty, these o...
Thesis: M. Eng., Massachusetts Institute of Technology, Department of Electrical Engineering and Com...
We present a new tool for the generation and verification of high-assurance high-speed machine-level...
We develop a new approach for building cryptographic implementations. Our approach goes the last mil...
AbstractWith today’s dissemination of embedded systems manipulating sensitive data, it has become im...
We present a high-assurance software stack for secure function evaluation (SFE). Our stack consists ...
We present a computer-aided framework for proving concrete security bounds for cryptographic machine...