Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Formal verification of side-channel countermeasures using self-composition., , , and . Sci. Comput. Program., 78 (7): 796-812 (2013)Teaching how to program using automated assessment and functional glossy games (experience report)., , , , and . Proc. ACM Program. Lang., 2 (ICFP): 82:1-82:17 (2018)Enforcing Ideal-World Leakage Bounds in Real-World Secret Sharing MPC Frameworks., , , , , and . CSF, page 132-146. IEEE Computer Society, (2018)The Last Mile: High-Assurance and High-Speed Cryptographic Implementations., , , , , , , and . CoRR, (2019)A Machine-Checked Proof of Security for AWS Key Management Service., , , , , , , , , and . CCS, page 63-78. ACM, (2019)Bounded Version Vectors., , and . DISC, volume 3274 of Lecture Notes in Computer Science, page 102-116. Springer, (2004)Verifying Cryptographic Software Correctness with Respect to Reference Implementations., , , and . FMICS, volume 5825 of Lecture Notes in Computer Science, page 37-52. Springer, (2009)A Tool for Programming with Interaction Nets., , and . Electron. Notes Theor. Comput. Sci., (2008)CAOVerif: An open-source deductive verification platform for cryptographic software implementations., , , , and . Sci. Comput. Program., (2014)Deductive verification of cryptographic software., , , and . ISSE, 6 (3): 203-218 (2010)