Zobrazeno 1 - 10
of 95
pro vyhledávání: '"Cédric Fournet"'
Publikováno v:
Proceedings of the 12th ACM SIGPLAN International Conference on Certified Programs and Proofs.
Autor:
David Chisnall, Manuel Costa, Mark Russinovich, Antoine Delignat-Lavaud, Vikas Bhatia, Cédric Fournet, Sylvan Clebsch, Kapil Vaswani
Publikováno v:
Queue. 19:49-76
Although largely driven by economies of scale, the development of the modern cloud also enables increased security. Large data centers provide aggregate availability, reliability, and security assurances. The operational cost of ensuring that operati
Autor:
Chris Brzuska, Antoine Delignat-Lavaud, Christoph Egger, Cédric Fournet, Konrad Kohbrok, Markulf Kohlweiss
Publikováno v:
Advances in Cryptology – ASIACRYPT 2022 ISBN: 9783031229626
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::a7dd4fb6aa3347cc1e8f4796b849e9e7
https://doi.org/10.1007/978-3-031-22963-3_21
https://doi.org/10.1007/978-3-031-22963-3_21
Autor:
Anika Zaman, Alex Shamis, Sam Wenker, Andrew Jenks, Jack W. Stokes, Paul England, Sylvan Clebsch, Elissa M. Redmiles, Eric Horvitz, Matt Gaylor, Shabnam Erfani, John Deutscher, Kevin Kane, John C. Simmons, Manuel Costa, Amaury Chamayou, Henrique S. Malvar, Rebecca Burke-Aguero, Cédric Fournet, Isha Sharma
Publikováno v:
MMSys
MMSys '21
MMSys '21
Advances in graphics and machine learning have led to the general availability of easy-to-use tools for modifying and synthesizing media. The proliferation of these tools threatens to cast doubt on the veracity of all media. One approach to thwarting
Autor:
Jonathan Protzenko, Itsaka Rakotonirina, Jay Bosamiya, Yi Zhou, Joseph Lallemand, Antoine Delignat-Lavaud, Bryan Parno, Tahina Ramananandro, Cédric Fournet
Publikováno v:
IEEE Symposium on Security and Privacy
Drawing on earlier protocol-verification work, we investigate the security of the QUIC record layer, as standardized by the IETF in draft version 30. This version features major differences compared to Google’s original protocol and early IETF draf
Autor:
Nikhil Swamy, Antoine Delignat-Lavaud, Jonathan Protzenko, Joonwon Choi, Bryan Parno, Christoph M. Wintersteiger, Chris Hawblitzel, Aseem Rastogi, Natalia Kulatova, Aymeric Fromherz, Marina Polubelova, Santiago Zanella-Béguelin, Tahina Ramananandro, Karthikeyan Bhargavan, Benjamin Beurdouche, Cédric Fournet
Publikováno v:
SP 2020-IEEE Symposium on Security and Privacy
SP 2020-IEEE Symposium on Security and Privacy, May 2020, San Francisco / Virtual, United States. pp.983-1002, ⟨10.1109/SP40000.2020.00114⟩
IEEE Symposium on Security and Privacy
2020 IEEE Symposium on Security and Privacy (SP)
SP 2020-IEEE Symposium on Security and Privacy, May 2020, San Francisco / Virtual, United States. pp.983-1002, ⟨10.1109/SP40000.2020.00114⟩
IEEE Symposium on Security and Privacy
2020 IEEE Symposium on Security and Privacy (SP)
International audience; We present EverCrypt: a comprehensive collection of verified, high-performance cryptographic functionalities available via a carefully designed API. The API provably supports agility (choosing between multiple algorithms for t
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::b754b12d09129b9fb446c4bb80a284b0
https://inria.hal.science/hal-03154278
https://inria.hal.science/hal-03154278
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783030033316
ASIACRYPT (3)
ASIACRYPT (3)
The security analysis of real-world protocols involves reduction steps that are conceptually simple but still have to account for many protocol complications found in standards and implementations. Taking inspiration from universal composability, abs
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::4bb20366b1a8dfc4b3eaf111c6ac733c
https://doi.org/10.1007/978-3-030-03332-3_9
https://doi.org/10.1007/978-3-030-03332-3_9
Autor:
Aseem Rastogi, Cédric Fournet, Karthikeyan Bhargavan, Santiago Zanella-Béguelin, Tahina Ramananandro, Cătălin Hriţcu, Jean Karim Zinzindohoue, Antoine Delignat-Lavaud, Nikhil Swamy, Jonathan Protzenko, Peng Wang
Publikováno v:
Proceedings of the ACM on Programming Languages
Proceedings of the ACM on Programming Languages, ACM, 2017, 1 (ICFP), pp.17:1--17:29. ⟨10.1145/3110261⟩
Proceedings of the ACM on Programming Languages, 2017, 1 (ICFP), pp.17:1--17:29. ⟨10.1145/3110261⟩
22nd International Conference on Functional Programming
Proceedings of the ACM on Programming Languages, ACM, 2017, 1 (ICFP), pp.17:1--17:29. ⟨10.1145/3110261⟩
Proceedings of the ACM on Programming Languages, 2017, 1 (ICFP), pp.17:1--17:29. ⟨10.1145/3110261⟩
22nd International Conference on Functional Programming
We present Low*, a language for low-level programming and verification, and its application to high-assurance optimized cryptographic libraries. Low* is a shallow embedding of a small, sequential, well-behaved subset of C in F*, a dependently-typed v
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::08bf5be5baf6171ffa0a43f50c049e47
https://hal.archives-ouvertes.fr/hal-01672706
https://hal.archives-ouvertes.fr/hal-01672706
Publikováno v:
Proceedings of the ACM on Programming Languages
Proceedings of the ACM on Programming Languages, 2018, 2 (POPL), ⟨10.1145/3158153⟩
Proceedings of the ACM on Programming Languages, ACM, 2018, 2 (POPL), ⟨10.1145/3158153⟩
Proceedings of the ACM on Programming Languages, 2018, 2 (POPL), ⟨10.1145/3158153⟩
Proceedings of the ACM on Programming Languages, ACM, 2018, 2 (POPL), ⟨10.1145/3158153⟩
We provide a way to ease the verification of programs whose state evolves monotonically. The main idea is that a property witnessed in a prior state can be soundly recalled in the current state, provided (1) state evolves according to a given preorde
Publikováno v:
Communications of the ACM