Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Certified Synthesis of Efficient Batch Verifiers., , , , and . CSF, page 153-165. IEEE Computer Society, (2014)Proving Expected Sensitivity of Probabilistic Programs., , , , and . CoRR, (2017)Formal Verification of a Constant-Time Preserving C Compiler., , , , , , and . IACR Cryptology ePrint Archive, (2019)Probabilistic Relational Hoare Logics for Computer-Aided Security Proofs., , and . MPC, volume 7342 of Lecture Notes in Computer Science, page 1-6. Springer, (2012)Verified Indifferentiable Hashing into Elliptic Curves., , , , and . POST, volume 7215 of Lecture Notes in Computer Science, page 209-228. Springer, (2012)Formal verification of a constant-time preserving C compiler., , , , , , and . Proc. ACM Program. Lang., 4 (POPL): 7:1-7:30 (2020)Coupling proofs are probabilistic product programs., , , and . POPL, page 161-174. ACM, (2017)Verified Proofs of Higher-Order Masking., , , , , and . EUROCRYPT (1), volume 9056 of Lecture Notes in Computer Science, page 457-485. Springer, (2015)Masking the GLP Lattice-Based Signature Scheme at Any Order., , , , , , and . EUROCRYPT (2), volume 10821 of Lecture Notes in Computer Science, page 354-384. Springer, (2018)Programming Language Techniques for Cryptographic Proofs., , and . ITP, volume 6172 of Lecture Notes in Computer Science, page 115-130. Springer, (2010)