José Bacelar Almeida
Orcid: 0000-0003-0011-7455
According to our database1,
José Bacelar Almeida
authored at least 43 papers
between 2004 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
CCS25 - Artifact for "Jazzline: Composable CryptoLine functional correctness proofs for Jasmin programs".
Dataset, July, 2025
Faster Verification of Faster Implementations: Combining Deductive and Circuit-Based Reasoning in EasyCrypt.
Proceedings of the IEEE Symposium on Security and Privacy, 2025
Proceedings of the 14th ACM SIGPLAN International Conference on Certified Programs and Proofs, 2025
Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, 2025
2024
Formally Verifying Kyber - Episode V: Machine-Checked IND-CCA Security and Correctness of ML-KEM in EasyCrypt.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024
2023
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023
IACR Cryptol. ePrint Arch., 2023
2022
J. Log. Algebraic Methods Program., 2022
Proceedings of the Integrated Formal Methods - 17th International Conference, 2022
2021
Towards Formal Verification of Password Generation Algorithms used in Password Managers.
CoRR, 2021
Machine-checked ZKP for NP-relations: Formally Verified Security Proofs and Implementations of MPC-in-the-Head.
CoRR, 2021
Machine-checked ZKP for NP relations: Formally Verified Security Proofs and Implementations of MPC-in-the-Head.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
2020
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
Certified Compilation for Cryptography: Extended x86 Instructions and Constant-Time Verification.
Proceedings of the Progress in Cryptology - INDOCRYPT 2020, 2020
2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
Machine-Checked Proofs for Cryptographic Standards: Indifferentiability of Sponge and Secure High-Assurance Implementations of SHA-3.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
Teaching how to program using automated assessment and functional glossy games (experience report).
Proc. ACM Program. Lang., 2018
Some Applications of the Formalization of the Pumping Lemma for Context-Free Languages.
Proceedings of the 13th Workshop on Logical and Semantic Frameworks with Applications, 2018
Proceedings of the 31st IEEE Computer Security Foundations Symposium, 2018
2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2016
J. Formaliz. Reason., 2016
Proceedings of the Logic, Language, Information, and Computation, 2016
Proceedings of the 25th USENIX Security Symposium, 2016
Verifiable Side-Channel Security of Cryptographic Implementations: Constant-Time MEE-CBC.
Proceedings of the Fast Software Encryption - 23rd International Conference, 2016
2015
2014
CAOVerif: An open-source deductive verification platform for cryptographic software implementations.
Sci. Comput. Program., 2014
IACR Cryptol. ePrint Arch., 2014
2013
Sci. Comput. Program., 2013
Certified computer-aided cryptography: efficient provably secure machine code from high-level implementations.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
2012
Full proof cryptography: verifiable compilation of efficient zero-knowledge protocols.
Proceedings of the ACM Conference on Computer and Communications Security, 2012
2011
Undergraduate Topics in Computer Science, Springer, ISBN: 978-0-85729-018-2, 2011
2010
Proceedings of the Implementation and Application of Automata, 2010
A Certifying Compiler for Zero-Knowledge Proofs of Knowledge Based on Sigma-Protocols.
Proceedings of the Computer Security, 2010
2009
Deductive Verification of Cryptographic Software.
Proceedings of the First NASA Formal Methods Symposium, 2009
Verifying Cryptographic Software Correctness with Respect to Reference Implementations.
Proceedings of the Formal Methods for Industrial Critical Systems, 2009
2008
2007
Proceedings of the Eighth International Workshop on Rule Based Programming, 2007
Proceedings of the 7th International Workshop on Reduction Strategies in Rewriting and Programming, 2007
2006
Proceedings of the Third International Workshop on Term Graph Rewriting, 2006
2004
Proceedings of the Distributed Computing, 18th International Conference, 2004