Bruno Blanchet

Orcid: 0009-0005-1072-0786

Affiliations:
  • ENS Paris, France


According to our database1, Bruno Blanchet authored at least 56 papers between 1998 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Post-Quantum Sound CryptoVerif and Verification of Hybrid TLS and SSH Key-Exchanges.
Proceedings of the 37th IEEE Computer Security Foundations Symposium, 2024

CV2EC: Getting the Best of Both Worlds.
Proceedings of the 37th IEEE Computer Security Foundations Symposium, 2024

Dealing with Dynamic Key Compromise in Crypto Verif.
Proceedings of the 37th IEEE Computer Security Foundations Symposium, 2024

2023
CryptoVerif: a Computationally-Sound Security Protocol Verifier (Initial Version with Communications on Channels).
CoRR, 2023

2022
Analysing the HPKE Standard - Supplementary Material.
Dataset, August, 2022

The Security Protocol Verifier ProVerif and its Horn Clause Resolution Algorithm.
Proceedings of the Proceedings 9th Workshop on Horn Clauses for Verification and Synthesis and 10th International Workshop on Verification and Program Transformation, 2022

ProVerif with Lemmas, Induction, Fast Subsumption, and Much More.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

2021
Analysing the HPKE Standard - Supplementary Material.
Dataset, September, 2021

SoK: Computer-Aided Cryptography.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

Analysing the HPKE Standard.
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021

2020
Analysing the HPKE Standard - Supplementary Material.
Dataset, November, 2020

2019
A Mechanised Cryptographic Proof of the WireGuard Virtual Private Network Protocol.
Proceedings of the IEEE European Symposium on Security and Privacy, 2019

2018
The Applied Pi Calculus: Mobile Values, New Names, and Secure Communication.
J. ACM, 2018

Composition Theorems for CryptoVerif and Application to TLS 1.3.
Proceedings of the 31st IEEE Computer Security Foundations Symposium, 2018

2017
Verified Models and Reference Implementations for the TLS 1.3 Standard Candidate.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

Automated Verification for Secure Messaging Protocols and Their Implementations: A Symbolic and Computational Approach.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017

Symbolic and Computational Mechanized Verification of the ARINC823 Avionic Protocols.
Proceedings of the 30th IEEE Computer Security Foundations Symposium, 2017

2016
Modeling and Verifying Security Protocols with the Applied Pi Calculus and ProVerif.
Found. Trends Priv. Secur., 2016

Automated Reasoning for Equivalences in the Applied Pi Calculus with Barriers.
Proceedings of the IEEE 29th Computer Security Foundations Symposium, 2016

2013
From Computationally-Proved Protocol Specifications to Implementations and Application to SSH.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2013

Proving More Observational Equivalences with ProVerif.
Proceedings of the Principles of Security and Trust - Second International Conference, 2013

Proved Generation of Implementations from Computationally Secure Protocol Specifications.
Proceedings of the Principles of Security and Trust - Second International Conference, 2013

Automatic Verification of Security Protocols in the Symbolic Model: The Verifier ProVerif.
Proceedings of the Foundations of Security Analysis and Design VII, 2013

Automatic verification of protocols with lists of unbounded length.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Mechanizing Game-Based Proofs of Security Protocols.
Proceedings of the Software Safety and Security - Tools for Analysis and Verification, 2012

Verification of Security Protocols with Lists: From Length One to Unbounded Length.
Proceedings of the Principles of Security and Trust - First International Conference, 2012

Security Protocol Verification: Symbolic and Computational Models.
Proceedings of the Principles of Security and Trust - First International Conference, 2012

Automatically Verified Mechanized Proof of One-Encryption Key Exchange.
Proceedings of the 25th IEEE Computer Security Foundations Symposium, 2012

From Computationally-proved Protocol Specifications to Implementations.
Proceedings of the Seventh International Conference on Availability, 2012

2011
Using Horn Clauses for Analyzing Security Protocols.
Proceedings of the Formal Models and Techniques for Analyzing Security Protocols, 2011

2009
Automatic verification of correspondences for security protocols.
J. Comput. Secur., 2009

Models and Proofs of Protocol Security: A Progress Report.
Proceedings of the Computer Aided Verification, 21st International Conference, 2009

2008
Automated Formal Analysis of a Protocol for Secure File Sharing on Untrusted Storage.
Proceedings of the 2008 IEEE Symposium on Security and Privacy (SP 2008), 2008

Computationally sound mechanized proofs for basic and public-key Kerberos.
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008

2007
Computationally Sound Mechanized Proofs of Correspondence Assertions.
Proceedings of the 20th IEEE Computer Security Foundations Symposium, 2007

2006
A Computationally Sound Mechanized Prover for Security Protocols.
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006

Automated Security Proofs with Sequences of Games.
Proceedings of the Advances in Cryptology, 2006

2005
Security protocols: from linear to classical logic by abstract interpretation.
Inf. Process. Lett., 2005

Automated Verification of Selected Equivalences for Security Protocols.
Proceedings of the 20th IEEE Symposium on Logic in Computer Science (LICS 2005), 2005

Reconstruction of Attacks against Cryptographic Protocols.
Proceedings of the 18th IEEE Computer Security Foundations Workshop, 2005

2004
Automatic Proof of Strong Secrecy for Security Protocols.
Proceedings of the 2004 IEEE Symposium on Security and Privacy (S&P 2004), 2004

Just Fast Keying in the Pi Calculus.
Proceedings of the Programming Languages and Systems, 2004

2003
Escape analysis for Java<sup>TM</sup>: Theory and practice.
ACM Trans. Program. Lang. Syst., 2003

Computer-Assisted Verification of a Protocol for Certified Email.
Proceedings of the Static Analysis, 10th International Symposium, 2003

Automatic verification of cryptographic protocols: a logic programming approach.
Proceedings of the 5th International ACM SIGPLAN Conference on Principles and Practice of Declarative Programming, 2003

A static analyzer for large safety-critical software.
Proceedings of the ACM SIGPLAN 2003 Conference on Programming Language Design and Implementation 2003, 2003

Verification of Cryptographic Protocols: Tagging Enforces Termination.
Proceedings of the Foundations of Software Science and Computational Structures, 2003

A Calculus for Secure Mobility.
Proceedings of the Advances in Computing Science, 2003

2002
From Secrecy to Authenticity in Security Protocols.
Proceedings of the Static Analysis, 9th International Symposium, 2002

Analyzing security protocols with secrecy types and logic programs.
Proceedings of the Conference Record of POPL 2002: The 29th SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2002

Design and Implementation of a Special-Purpose Static Program Analyzer for Safety-Critical Real-Time Embedded Software.
Proceedings of the Essence of Computation, Complexity, Analysis, 2002

2001
Abstracting Cryptographic Protocols by Prolog Rules.
Proceedings of the Static Analysis, 8th International Symposium, 2001

Secrecy Types for Asymmetric Communication.
Proceedings of the Foundations of Software Science and Computation Structures, 2001

An Efficient Cryptographic Protocol Verifier Based on Prolog Rules.
Proceedings of the 14th IEEE Computer Security Foundations Workshop (CSFW-14 2001), 2001

1999
Escape Analysis for Object-Oriented Languages: Application to Java.
Proceedings of the 1999 ACM SIGPLAN Conference on Object-Oriented Programming Systems, 1999

1998
Escape Analysis: Correctness Proof, Implementation and Experimental Results.
Proceedings of the POPL '98, 1998


  Loading...