Zobrazeno 1 - 10
of 18
pro vyhledávání: '"Pierre-Évariste Dagand"'
Publikováno v:
J. Funct. Prog. 24 (2014) 316-383
Programming with dependent types is a blessing and a curse. It is a blessing to be able to bake invariants into the definition of data-types: we can finally write correct-by-construction software. However, this extreme accuracy is also a curse: a dat
Externí odkaz:
http://arxiv.org/abs/1201.4801
Publikováno v:
LCTES
LCTES '20: 21st ACM SIGPLAN/SIGBED Conference on Languages, Compilers, and Tools for Embedded Systems Proceedings
LCTES '20-21st ACM SIGPLAN/SIGBED Conference on Languages, Compilers, and Tools for Embedded Systems
LCTES '20-21st ACM SIGPLAN/SIGBED Conference on Languages, Compilers, and Tools for Embedded Systems, Jun 2020, London / Virtual, United Kingdom. pp.85-96, ⟨10.1145/3372799.3394365⟩
LCTES '20: 21st ACM SIGPLAN/SIGBED Conference on Languages, Compilers, and Tools for Embedded Systems Proceedings
LCTES '20-21st ACM SIGPLAN/SIGBED Conference on Languages, Compilers, and Tools for Embedded Systems
LCTES '20-21st ACM SIGPLAN/SIGBED Conference on Languages, Compilers, and Tools for Embedded Systems, Jun 2020, London / Virtual, United Kingdom. pp.85-96, ⟨10.1145/3372799.3394365⟩
International audience; Transiently-powered systems featuring non-volatile memory as well as external peripherals enable the development of new low-power sensor applications. However, as programmers, we are ill-equipped to reason about systems where
Autor:
Sonia Belaïd, Raphaël Wintersdorff, Pierre-Évariste Dagand, Darius Mercadier, Matthieu Rivain
Publikováno v:
EUROCRYPT
Eurocrypt 2020-39th Annual International Conference on the Theory and Applications of Cryptographic Techniques
Eurocrypt 2020-39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, May 2020, Zagreb / Virtual, Croatia. pp.311-341, ⟨10.1007/978-3-030-45727-3_11⟩
Advances in Cryptology – EUROCRYPT 2020 ISBN: 9783030457266
EUROCRYPT (3)
Eurocrypt 2020-39th Annual International Conference on the Theory and Applications of Cryptographic Techniques
Eurocrypt 2020-39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, May 2020, Zagreb / Virtual, Croatia. pp.311-341, ⟨10.1007/978-3-030-45727-3_11⟩
Advances in Cryptology – EUROCRYPT 2020 ISBN: 9783030457266
EUROCRYPT (3)
International audience; Cryptographic implementations deployed in real world devices often aim at (provable) security against the powerful class of side-channel attacks while keeping reasonable performances. Last year at Asiacrypt, a new formal verif
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::ae29a94fba1aea67cebee12f69599b02
https://hal.archives-ouvertes.fr/hal-02953167/file/2020-506.pdf
https://hal.archives-ouvertes.fr/hal-02953167/file/2020-506.pdf
Publikováno v:
International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2020
International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2020, Oct 2020, Lugano, Switzerland
Constructive Side-Channel Analysis and Secure Design ISBN: 9783030687724
COSADE
International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2020, Oct 2020, Lugano, Switzerland
Constructive Side-Channel Analysis and Secure Design ISBN: 9783030687724
COSADE
International audience; The design of software countermeasures against active and passive adversaries is a challenging problem that has been addressed by many authors in recent years. The proposed solutions adopt a theoretical foundation (such as a l
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::e4def7546ed1d97f09856dd5236ab6fe
https://hal.science/hal-03058888
https://hal.science/hal-03058888
Publikováno v:
PLDI 2019-40th ACM SIGPLAN Conference on Programming Language Design and Implementation
PLDI 2019-40th ACM SIGPLAN Conference on Programming Language Design and Implementation, Jun 2019, Phoenix, United States. pp.157-173, ⟨10.1145/3314221.3314636⟩
PLDI
PLDI 2019-40th ACM SIGPLAN Conference on Programming Language Design and Implementation, Jun 2019, Phoenix, United States. pp.157-173, ⟨10.1145/3314221.3314636⟩
PLDI
International audience; Cryptographic primitives are subject to diverging imperatives. Functional correctness and auditability pushes for the use of a high-level programming language. Performance and the threat of timing attacks push for using no mor
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::8ad31d8099069e1e08d24c846841772b
https://hal.inria.fr/hal-02176603
https://hal.inria.fr/hal-02176603
Publikováno v:
Journal of Functional Programming
Journal of Functional Programming, Cambridge University Press (CUP), 2018, 28, 〈10.1017/S0956796818000011〉
Journal of Functional Programming, Cambridge University Press (CUP), 2018, 28, ⟨10.1017/S0956796818000011⟩
Journal of Functional Programming, 2018, 28, ⟨10.1017/S0956796818000011⟩
Journal of Functional Programming, Cambridge University Press (CUP), 2018, 28, 〈10.1017/S0956796818000011〉
Journal of Functional Programming, Cambridge University Press (CUP), 2018, 28, ⟨10.1017/S0956796818000011⟩
Journal of Functional Programming, 2018, 28, ⟨10.1017/S0956796818000011⟩
Full-spectrum dependent types promise to enable the development of correct-by-construction software. However, even certified software needs to interact with simply-typed or untyped programs, be it to perform system calls, or to use legacy libraries.
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::a13b5a8c1460a449dbe581b92ead2410
https://hal.inria.fr/hal-01629909/file/main.pdf
https://hal.inria.fr/hal-01629909/file/main.pdf
Publikováno v:
WPMVP’18-Workshop on Programming Models for SIMD/Vector Processing
WPMVP’18-Workshop on Programming Models for SIMD/Vector Processing, Feb 2018, Vienna, Austria. ⟨10.1145/3178433.3178437⟩
WPMVP@PPoPP
WPMVP’18-Workshop on Programming Models for SIMD/Vector Processing, Feb 2018, Vienna, Austria. ⟨10.1145/3178433.3178437⟩
WPMVP@PPoPP
International audience; Bitslicing is a programming technique commonly used in cryptography that consists in (efficiently) implementing a combinatorial circuit in software. It results in a massively parallel program, immune to cache-timing attacks by
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::e9c366c935493c8316b904d00a82f20c
https://hal.archives-ouvertes.fr/hal-01657259
https://hal.archives-ouvertes.fr/hal-01657259
Publikováno v:
TyDe 2017-2nd ACM SIGPLAN International Workshop on Type-Driven Development
TyDe 2017-2nd ACM SIGPLAN International Workshop on Type-Driven Development, Sep 2017, Oxford, United Kingdom. pp.2-15, ⟨10.1145/3122975.3122976⟩
TyDe@ICFP
TyDe 2017-2nd ACM SIGPLAN International Workshop on Type-Driven Development, Sep 2017, Oxford, United Kingdom. pp.2-15, ⟨10.1145/3122975.3122976⟩
TyDe@ICFP
The Unix diff utility that compares lines of text is used pervasively by version control systems. Yet certain changes to a program may be difficult to describe accurately in terms of modifications to individual lines of code. As a result, observing c
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::553929e03e5d271961d1ea995d44ab09
https://hal.science/hal-01673541
https://hal.science/hal-01673541
Autor:
Pierre-Évariste Dagand
Publikováno v:
Journal of Functional Programming
Journal of Functional Programming, Cambridge University Press (CUP), 2017, 27, ⟨10.1017/S0956796816000356⟩
Journal of Functional Programming, 2017, 27, ⟨10.1017/S0956796816000356⟩
Journal of Functional Programming, Cambridge University Press (CUP), 2017, 27, ⟨10.1017/S0956796816000356⟩
Journal of Functional Programming, 2017, 27, ⟨10.1017/S0956796816000356⟩
Functional programmers from all horizons strive to use, and sometimes abuse, their favorite type system in order to capture the invariants of their programs. A widely used tool in that trade consists in defining finely indexed datatypes. Operationall
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::2f6b3309387cfadeda8fd711fa867e94
https://hal.archives-ouvertes.fr/hal-01461209
https://hal.archives-ouvertes.fr/hal-01461209
Publikováno v:
Functional and Logic Programming ISBN: 9783319296036
FLOPS
FLOPS 2016
FLOPS 2016, Mar 2016, Kochi, Japan
FLOPS
FLOPS 2016
FLOPS 2016, Mar 2016, Kochi, Japan
International audience; Computer Science abounds in folktales about how — in the early days of computer programming — bit vectors were ingeniously used to encode and manipulate finite sets. Algorithms have thus been developed to minimize memory f
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::2758801c63cec0d1570f6de18aee334c
https://doi.org/10.1007/978-3-319-29604-3_2
https://doi.org/10.1007/978-3-319-29604-3_2