Zobrazeno 1 - 10
of 19
pro vyhledávání: '"Adam Petcher"'
Autor:
Mike Dodds, Brett Boston, Brian Huffman, Andrei Stefanescu, Josiah Dodds, Samuel Breese, Adam Petcher
Publikováno v:
Computer Aided Verification ISBN: 9783030816841
CAV (1)
CAV (1)
We have completed machine-assisted proofs of two highly-optimized cryptographic primitives, AES-256-GCM and SHA-384. We have verified that the implementations of these primitives, written in a mix of C and x86 assembly, are memory safe and functional
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::d80c573a2ad4a37d32eed49d97d55950
https://doi.org/10.1007/978-3-030-81685-8_31
https://doi.org/10.1007/978-3-030-81685-8_31
Autor:
Matthew Green, Naphat Sanguansin, Katherine Ye, Lennart Beringer, Adam Petcher, Andrew W. Appel
We have formalized the functional specification of HMAC-DRBG (NIST 800-90A), and we have proved its cryptographic security--that its output is pseudorandom--using a hybrid game-based proof. We have also proved that the mbedTLS implementation (C progr
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::41ce98e9a8e4356bdef04a8298191fd6
http://arxiv.org/abs/1708.08542
http://arxiv.org/abs/1708.08542
Autor:
Adam Petcher, Greg Morrisett
Publikováno v:
CSF
We present a mechanized proof of security for an efficient Searchable Symmetric Encryption (SSE) scheme completed in the Foundational Cryptography Framework (FCF). FCF is a Coq library for reasoning about cryptographic schemes in the computational mo
Autor:
Adam Petcher, Greg Morrisett
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783662466650
POST
POST
We present the Foundational Cryptography Framework FCF for developing and checking complete proofs of security for cryptographic schemes within a proof assistant. This is a general-purpose framework that is capable of modeling and reasoning about a w
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::61619e0e1619031c8703114d92bdd694
https://doi.org/10.1007/978-3-662-46666-7_4
https://doi.org/10.1007/978-3-662-46666-7_4
Publikováno v:
MILCOM
This paper presents a usable graphical interface for specifying and automatically enacting access control rules for applications that involve dissemination of data among mobile tactical devices. A specific motivating example is unmanned aerial vehicl
Publikováno v:
PLPV
Operational Type Theory (OpTT) is a type theory allowing possibly diverging programs while retaining decidability of type checking and a consistent logic. This is done by distinguishing proofs and (program) terms, as well as formulas and types. The t
Autor:
HASELWARTER, PHILIPP G.1 philipp@haselwarter.org, RIVAS, EXEQUIEL2 erivas@dcc.fceia.unr.edu.ar, VAN MUYLDER, ANTOINE3 antoine.vanmuylder@kuleuven.be, WINTERHALTER, THÉO4 theo.winterhalter@mpi-sp.org, ABATE, CARMINE4 carmine.abate@mpi-sp.org, SIDORENCO, NIKOLAJ1 sidorenco@cs.au.dk, HRIŢCU, CĂTĂLIN4 catalin.hritcu@mpi-sp.org, MAILLARD, KENJI5 kenji.maillard@inria.fr, SPITTERS, BAS1 spitters@cs.au.dk
Publikováno v:
ACM Transactions on Programming Languages & Systems. Sep2023, Vol. 45 Issue 3, p1-61. 61p.
Publikováno v:
ACM Transactions on Privacy & Security; Aug2023, Vol. 26 Issue 3, p1-34, 34p
Autor:
Petcher, Adam, Morrisett, Greg
Publikováno v:
2015 IEEE 28th Computer Security Foundations Symposium; 2015, p481-494, 14p
Publikováno v:
2015 IEEE 28th Computer Security Foundations Symposium; 2015, pv-viii, 4p