José Bacelar Almeida

Orcid: 0000-0003-0011-7455

According to our database1, José Bacelar Almeida authored at least 43 papers between 2004 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
CCS25 - Artifact for "Jazzline: Composable CryptoLine functional correctness proofs for Jasmin programs".
Dataset, July, 2025

Faster Verification of Faster Implementations: Combining Deductive and Circuit-Based Reasoning in EasyCrypt.
Proceedings of the IEEE Symposium on Security and Privacy, 2025

Leakage-Free Probabilistic Jasmin Programs.
Proceedings of the 14th ACM SIGPLAN International Conference on Certified Programs and Proofs, 2025

Jazzline: Composable CryptoLine Functional Correctness Proofs for Jasmin Programs.
Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, 2025

2024
Formally Verifying Kyber - Episode V: Machine-Checked IND-CCA Security and Correctness of ML-KEM in EasyCrypt.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024

2023
Formally verifying Kyber Episode IV: Implementation correctness.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023

Formally verifying Kyber Part I: Implementation Correctness.
IACR Cryptol. ePrint Arch., 2023

2022
A formal treatment of the role of verified compilers in secure computation.
J. Log. Algebraic Methods Program., 2022

Verified Password Generation from Password Composition Policies.
Proceedings of the Integrated Formal Methods - 17th International Conference, 2022

2021
Towards Formal Verification of Password Generation Algorithms used in Password Managers.
CoRR, 2021

Machine-checked ZKP for NP-relations: Formally Verified Security Proofs and Implementations of MPC-in-the-Head.
CoRR, 2021

Machine-checked ZKP for NP relations: Formally Verified Security Proofs and Implementations of MPC-in-the-Head.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
The Last Mile: High-Assurance and High-Speed Cryptographic Implementations.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

Certified Compilation for Cryptography: Extended x86 Instructions and Constant-Time Verification.
Proceedings of the Progress in Cryptology - INDOCRYPT 2020, 2020

2019
Machine-Checked Proofs for Cryptographic Standards.
IACR Cryptol. ePrint Arch., 2019

A Machine-Checked Proof of Security for AWS Key Management Service.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

Machine-Checked Proofs for Cryptographic Standards: Indifferentiability of Sponge and Secure High-Assurance Implementations of SHA-3.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Teaching how to program using automated assessment and functional glossy games (experience report).
Proc. ACM Program. Lang., 2018

Some Applications of the Formalization of the Pumping Lemma for Context-Free Languages.
Proceedings of the 13th Workshop on Logical and Semantic Frameworks with Applications, 2018

Enforcing Ideal-World Leakage Bounds in Real-World Secret Sharing MPC Frameworks.
Proceedings of the 31st IEEE Computer Security Foundations Symposium, 2018

2017
A Fast and Verified Software Stack for Secure Function Evaluation.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

Jasmin: High-Assurance and High-Speed Cryptography.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Formalization of the pumping lemma for context-free languages.
J. Formaliz. Reason., 2016

A Tool-Chain for High-Assurance Cryptographic Software.
ERCIM News, 2016

On the Formalization of Some Results of Context-Free Language Theory.
Proceedings of the Logic, Language, Information, and Computation, 2016

Verifying Constant-Time Implementations.
Proceedings of the 25th USENIX Security Symposium, 2016

Verifiable Side-Channel Security of Cryptographic Implementations: Constant-Time MEE-CBC.
Proceedings of the Fast Software Encryption - 23rd International Conference, 2016

2015
Formalization of context-free language theory.
CoRR, 2015

2014
CAOVerif: An open-source deductive verification platform for cryptographic software implementations.
Sci. Comput. Program., 2014

Verified Implementations for Secure and Verifiable Computation.
IACR Cryptol. ePrint Arch., 2014

2013
Formal verification of side-channel countermeasures using self-composition.
Sci. Comput. Program., 2013

Certified computer-aided cryptography: efficient provably secure machine code from high-level implementations.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Full proof cryptography: verifiable compilation of efficient zero-knowledge protocols.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
Rigorous Software Development - An Introduction to Program Verification.
Undergraduate Topics in Computer Science, Springer, ISBN: 978-0-85729-018-2, 2011

2010
Partial Derivative Automata Formalized in Coq.
Proceedings of the Implementation and Application of Automata, 2010

A Certifying Compiler for Zero-Knowledge Proofs of Knowledge Based on Sigma-Protocols.
Proceedings of the Computer Security, 2010

2009
Deductive Verification of Cryptographic Software.
Proceedings of the First NASA Formal Methods Symposium, 2009

Verifying Cryptographic Software Correctness with Respect to Reference Implementations.
Proceedings of the Formal Methods for Industrial Critical Systems, 2009

2008
Deriving Sorting Algorithms
CoRR, 2008

2007
A Tool for Programming with Interaction Nets.
Proceedings of the Eighth International Workshop on Rule Based Programming, 2007

Token-passing Nets for Functional Languages.
Proceedings of the 7th International Workshop on Reduction Strategies in Rewriting and Programming, 2007

2006
A Local Graph-rewriting System for Deciding Equality in Sum-product Theories.
Proceedings of the Third International Workshop on Term Graph Rewriting, 2006

2004
Bounded Version Vectors.
Proceedings of the Distributed Computing, 18th International Conference, 2004


  Loading...