François Dupressoir

According to our database1, François Dupressoir authored at least 23 papers between 2011 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2019
Machine-Checked Proofs for Cryptographic Standards.
IACR Cryptology ePrint Archive, 2019

VMV: Augmenting an Internet Voting System with Selene Verifiability.
CoRR, 2019

Machine-Checked Proofs for Cryptographic Standards: Indifferentiability of Sponge and Secure High-Assurance Implementations of SHA-3.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Improved Parallel Mask Refreshing Algorithms: Generic Solutions with Parametrized Non-Interference & Automated Optimizations.
IACR Cryptology ePrint Archive, 2018

Machine-Checked Proofs for Electronic Voting: Privacy and Verifiability for Belenios.
Proceedings of the 31st IEEE Computer Security Foundations Symposium, 2018

Formal Security Proof of CMAC and Its Variants.
Proceedings of the 31st IEEE Computer Security Foundations Symposium, 2018

2017
A Note on 'Further Improving Efficiency of Higher-Order Masking Scheme by Decreasing Randomness Complexity'.
IACR Cryptology ePrint Archive, 2017

A Fast and Verified Software Stack for Secure Function Evaluation.
IACR Cryptology ePrint Archive, 2017

Machine-Checked Proofs of Privacy for Electronic Voting Protocols.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

2016
Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model.
IACR Cryptology ePrint Archive, 2016

Verifying Constant-Time Implementations.
Proceedings of the 25th USENIX Security Symposium, 2016

Strong Non-Interference and Type-Directed Higher-Order Masking.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Verified Proofs of Higher-Order Masking.
IACR Cryptology ePrint Archive, 2015

Compositional Verification of Higher-Order Masking: Application to a Verifying Masking Compiler.
IACR Cryptology ePrint Archive, 2015

Verifiable side-channel security of cryptographic implementations: constant-time MEE-CBC.
IACR Cryptology ePrint Archive, 2015

2014
Guiding a general-purpose C verifier to prove cryptographic protocols.
Journal of Computer Security, 2014

Synthesis of Fault Attacks on Cryptographic Implementations.
IACR Cryptology ePrint Archive, 2014

Making RSA-PSS Provably Secure Against Non-Random Faults.
IACR Cryptology ePrint Archive, 2014

Verified Implementations for Secure and Verifiable Computation.
IACR Cryptology ePrint Archive, 2014

2013
Proving cryptographic C programs secure with general-purpose verification tools.
PhD thesis, 2013

Certified computer-aided cryptography: efficient provably secure machine code from high-level implementations.
IACR Cryptology ePrint Archive, 2013

EasyCrypt: A Tutorial.
Proceedings of the Foundations of Security Analysis and Design VII, 2013

2011
Verifying Cryptographic Code in C: Some Experience and the Csec Challenge.
Proceedings of the Formal Aspects of Security and Trust - 8th International Workshop, 2011


  Loading...