Filtrer vos résultats
- 53
- 19
- 1
- 46
- 14
- 8
- 3
- 1
- 1
- 11
- 2
- 73
- 3
- 4
- 5
- 2
- 7
- 4
- 9
- 8
- 4
- 7
- 7
- 4
- 3
- 2
- 4
- 73
- 44
- 30
- 24
- 8
- 8
- 7
- 4
- 3
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 73
- 16
- 10
- 10
- 9
- 7
- 7
- 7
- 6
- 6
- 6
- 6
- 5
- 5
- 5
- 5
- 5
- 5
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
73 résultats
|
Secure Distributed Programming with Value-dependent Types16th ACM SIGPLAN International Conference on Functional Programming, Sep 2011, Tokyo, Japan
Communication dans un congrès
inria-00596715v1
|
||
|
Verified Low‐Level Programming Embedded in F*Proceedings of the ACM on Programming Languages, 2017, 1 (ICFP), pp.17:1--17:29. ⟨10.1145/3110261⟩
Article dans une revue
hal-01672706v1
|
||
Proving the TLS Handshake Secure (as it is)[Research Report] 2014/182, Cryptology ePrint Archive. 2014, pp.48
Rapport
hal-01102231v1
|
|||
|
A Messy State of the Union: Taming the Composite State Machines of TLSIEEE Symposium on Security & Privacy 2015, May 2015, San Jose, United States
Communication dans un congrès
hal-01114250v1
|
||
|
Verified Models and Reference Implementations for the TLS 1.3 Standard Candidate[Research Report] RR-9040, Inria Paris. 2017, pp.51
Rapport
hal-01528752v3
|
||
On the Practical (In-)Security of 64-bit Block CiphersESC 2017 - Early Symmetric Crypto, Jan 2017, Canach, Luxembourg
Communication dans un congrès
hal-01105128v1
|
|||
Downgrade Resilience in Key-Exchange ProtocolsIEEE Symposium on Security and Privacy (SP), 2016 , May 2016, San Jose, United States. ⟨10.1109/SP.2016.37⟩
Communication dans un congrès
hal-01425962v1
|
|||
An In-Depth Symbolic Security Analysis of the ACME StandardCCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Nov 2021, Virtual Event, South Korea. pp.2601-2617, ⟨10.1145/3460120.3484588⟩
Communication dans un congrès
hal-03540403v1
|
|||
|
Refinement types for secure implementationsACM Transactions on Programming Languages and Systems (TOPLAS), 2011, 33 (2), ⟨10.1145/1890028.1890031⟩
Article dans une revue
hal-01294973v1
|
||
|
Discovering Concrete Attacks on Website Authorization by Formal Analysis25th IEEE Computer Security Foundations Symposium (CSF'12), 2012, Cambridge, MA, United States. pp.247--262
Communication dans un congrès
hal-00863385v1
|
||
|
Identifying Website Users by TLS Traffic Analysis: New Attacks and Effective Countermeasures[Research Report] RR-8067, INRIA. 2012
Rapport
hal-00732449v1
|
||
Noise*: A Library of Verified High-Performance Secure Channel Protocol Implementations[Research Report] Inria. 2021
Rapport
hal-03474303v1
|
|||
|
Automated Verification for Secure Messaging Protocols and Their Implementations: A Symbolic and Computational Approach2nd IEEE European Symposium on Security and Privacy , Apr 2017, Paris, France. pp.435 - 450, ⟨10.1109/EuroSP.2017.38⟩
Communication dans un congrès
hal-01575923v1
|
||
Network-based Origin Confusion Attacks against HTTPS Virtual Hosting24th International Conference on World Wide Web, May 2015, Florence, Italy
Communication dans un congrès
hal-01114246v1
|
|||
|
Web-based Attacks on Host-Proof Encrypted Storage6th USENIX Workshop on Offensive Technologies (WOOT'12), Aug 2012, Bellevue, WA, United States. pp.97--104
Communication dans un congrès
hal-00863383v1
|
||
TreeSync: Authenticated Group Management for Messaging Layer SecurityUSENIX Security '23, Aug 2023, Anaheim, United States
Communication dans un congrès
hal-04255953v1
|
|||
|
Towards Unified Authorization for Android5th International Symposium on Engineering Secure Software and Systems (ESSoS 2013), Feb 2013, Rocquencourt, France. pp.42-57
Communication dans un congrès
hal-00863384v1
|
||
|
A Formal Treatment of Accountable Proxying over TLSSP 2018 - IEEE Symposium on Security and Privacy, May 2018, San Francisco, United States
Communication dans un congrès
hal-01948722v1
|
||
A Tutorial-Style Introduction to $\textsf {DY}^\star $Daniel Dougherty; José Meseguer; Sebastian Alexander Mödersheim; Paul Rowe. Protocols, Strands, and Logic, 13066, Springer International Publishing, pp.77-97, 2021, Lecture Notes in Computer Science, ⟨10.1007/978-3-030-91631-2_4⟩
Chapitre d'ouvrage
hal-03540824v1
|
|||
|
Hacspec: succinct, executable, verifiable specifications for high-assurance cryptography embedded in Rust[Technical Report] Inria. 2021
Rapport
hal-03176482v1
|
||
|
A Symbolic Analysis of Privacy for TLS 1.3 with Encrypted Client HelloCCS '22: 2022 ACM SIGSAC Conference on Computer and Communications Security, Nov 2022, Los Angeles CA, United States. pp.365-379, ⟨10.1145/3548606.3559360⟩
Communication dans un congrès
hal-03922516v1
|
||
|
miTLS: Verifying Protocol Implementations against Real-World AttacksIEEE Security and Privacy Magazine, 2016, 14 (6), pp.18-25. ⟨10.1109/MSP.2016.123⟩
Article dans une revue
hal-01425964v1
|
||
|
A Verified Extensible Library of Elliptic Curves29th IEEE Computer Security Foundations Symposium (CSF), Jun 2016, Lisboa, Portugal. ⟨10.1109/CSF.2016.28⟩
Communication dans un congrès
hal-01425957v1
|
||
|
Imperfect Forward Secrecy: How Diffie-Hellman Fails in PracticeCCS '15: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Oct 2015, Denver, Colorado, United States. pp.5-17, ⟨10.1145/2810103.2813707⟩
Communication dans un congrès
hal-01184171v2
|
||
IRTF RFC 9180: Hybrid Public Key Encryption2022
Autre publication scientifique
hal-03946590v1
|
|||
|
A formalism for consistency and partial replication[Technical Report] Microsoft Research. 2004
Rapport
inria-00444800v1
|
||
|
FLEXTLS A Tool for Testing TLS Implementations9th USENIX Workshop on Offensive Technologies, WOOT '15, Usenix, Aug 2014, Washington DC, United States
Communication dans un congrès
hal-01295035v1
|
||
|
Exploring the consistency problem space2005
Pré-publication, Document de travail
hal-01248207v1
|
||
The Actions-Constraints approach to replication: Definitions and proofs[Research Report] MSR-TR-2004-14, Microsoft Research. 2004
Rapport
hal-01248210v1
|
|||
|
Formal Models and Verified Protocols for Group Messaging: Attacks and Proofs for IETF MLS[Research Report] Inria Paris. 2019
Rapport
hal-02425229v1
|