Antoine Delignat-Lavaud

According to our database1, Antoine Delignat-Lavaud authored at least 28 papers between 2012 and 2020.

Collaborative distances:



In proceedings 
PhD thesis 




A Security Model and Fully Verified Implementation for the IETF QUIC Record Layer.
IACR Cryptol. ePrint Arch., 2020

EverCrypt: A Fast, Verified, Cross-Platform Cryptographic Provider.
IACR Cryptol. ePrint Arch., 2019

EverParse: Verified Secure Zero-Copy Parsers for Authenticated Message Formats.
Proceedings of the 28th USENIX Security Symposium, 2019

State-Separating Proofs: A Reduction Methodology for Real-World Protocols.
IACR Cryptol. ePrint Arch., 2018

A Formal Treatment of Accountable Proxying Over TLS.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

State Separation for Code-Based Game-Playing Proofs.
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018

Verified low-level programming embedded in F.
Proc. ACM Program. Lang., 2017

Verified Low-Level Programming Embedded in F<sup>*</sup>.
CoRR, 2017

A messy state of the union: taming the composite state machines of TLS.
Commun. ACM, 2017

Formal Modeling and Verification for Domain Validation and ACME.
Proceedings of the Financial Cryptography and Data Security, 2017

On the security of authentication protocols on the web. (La sécurité des protocoles d'authentification sur leWeb).
PhD thesis, 2016

Implementing and Proving the TLS 1.3 Record Layer.
IACR Cryptol. ePrint Arch., 2016

Cinderella: Turning Shabby X.509 Certificates into Elegant Anonymous Credentials with the Magic of Verifiable Computation.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

Dependent types and multi-monadic effects in F.
Proceedings of the 43rd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2016

Formal Verification of Smart Contracts: Short Paper.
Proceedings of the 2016 ACM Workshop on Programming Languages and Analysis for Security, 2016

Transport Layer Security (TLS) Session Hash and Extended Master Secret Extension.
RFC, September, 2015

Network-based Origin Confusion Attacks against HTTPS Virtual Hosting.
Proceedings of the 24th International Conference on World Wide Web, 2015

FLEXTLS: A Tool for Testing TLS Implementations.
Proceedings of the 9th USENIX Workshop on Offensive Technologies, 2015

Verified Contributive Channel Bindings for Compound Authentication.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

Discovering concrete attacks on website authorization by formal analysis.
J. Comput. Secur., 2014

Triple Handshakes and Cookie Cutters: Breaking and Fixing Authentication over TLS.
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014

Web PKI: Closing the Gap between Guidelines and Practices.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

Language-based Defenses Against Untrusted Browser Origins.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

Keys to the Cloud: Formal Analysis and Concrete Attacks on Encrypted Web Storage.
Proceedings of the Principles of Security and Trust - Second International Conference, 2013

Defensive JavaScript - Building and Verifying Secure Web Components.
Proceedings of the Foundations of Security Analysis and Design VII, 2013

Web-based Attacks on Host-Proof Encrypted Storage.
Proceedings of the 6th USENIX Workshop on Offensive Technologies, 2012