Filtrer vos résultats
- 53
- 19
- 1
- 46
- 14
- 8
- 3
- 1
- 1
- 11
- 2
- 73
- 3
- 4
- 5
- 2
- 7
- 4
- 9
- 8
- 4
- 7
- 7
- 4
- 3
- 2
- 4
- 73
- 44
- 30
- 24
- 8
- 8
- 7
- 4
- 3
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 73
- 16
- 10
- 10
- 9
- 7
- 7
- 7
- 6
- 6
- 6
- 6
- 5
- 5
- 5
- 5
- 5
- 5
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
73 résultats
|
Secure Distributed Programming with Value-dependent Types16th ACM SIGPLAN International Conference on Functional Programming, Sep 2011, Tokyo, Japan
Communication dans un congrès
inria-00596715v1
|
||
|
Verified Low‐Level Programming Embedded in F*Proceedings of the ACM on Programming Languages, 2017, 1 (ICFP), pp.17:1--17:29. ⟨10.1145/3110261⟩
Article dans une revue
hal-01672706v1
|
||
Proving the TLS Handshake Secure (as it is)[Research Report] 2014/182, Cryptology ePrint Archive. 2014, pp.48
Rapport
hal-01102231v1
|
|||
|
A Messy State of the Union: Taming the Composite State Machines of TLSIEEE Symposium on Security & Privacy 2015, May 2015, San Jose, United States
Communication dans un congrès
hal-01114250v1
|
||
|
Verified Models and Reference Implementations for the TLS 1.3 Standard Candidate[Research Report] RR-9040, Inria Paris. 2017, pp.51
Rapport
hal-01528752v3
|
||
On the Practical (In-)Security of 64-bit Block CiphersESC 2017 - Early Symmetric Crypto, Jan 2017, Canach, Luxembourg
Communication dans un congrès
hal-01105128v1
|
|||
Downgrade Resilience in Key-Exchange ProtocolsIEEE Symposium on Security and Privacy (SP), 2016 , May 2016, San Jose, United States. ⟨10.1109/SP.2016.37⟩
Communication dans un congrès
hal-01425962v1
|
|||
TreeSync: Authenticated Group Management for Messaging Layer SecurityUSENIX Security '23, Aug 2023, Anaheim, United States
Communication dans un congrès
hal-04255953v1
|
|||
|
Towards Unified Authorization for Android5th International Symposium on Engineering Secure Software and Systems (ESSoS 2013), Feb 2013, Rocquencourt, France. pp.42-57
Communication dans un congrès
hal-00863384v1
|
||
|
A Formal Treatment of Accountable Proxying over TLSSP 2018 - IEEE Symposium on Security and Privacy, May 2018, San Francisco, United States
Communication dans un congrès
hal-01948722v1
|
||
A Tutorial-Style Introduction to $\textsf {DY}^\star $Daniel Dougherty; José Meseguer; Sebastian Alexander Mödersheim; Paul Rowe. Protocols, Strands, and Logic, 13066, Springer International Publishing, pp.77-97, 2021, Lecture Notes in Computer Science, ⟨10.1007/978-3-030-91631-2_4⟩
Chapitre d'ouvrage
hal-03540824v1
|
|||
|
Hacspec: succinct, executable, verifiable specifications for high-assurance cryptography embedded in Rust[Technical Report] Inria. 2021
Rapport
hal-03176482v1
|
||
|
A Symbolic Analysis of Privacy for TLS 1.3 with Encrypted Client HelloCCS '22: 2022 ACM SIGSAC Conference on Computer and Communications Security, Nov 2022, Los Angeles CA, United States. pp.365-379, ⟨10.1145/3548606.3559360⟩
Communication dans un congrès
hal-03922516v1
|
||
An In-Depth Symbolic Security Analysis of the ACME StandardCCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Nov 2021, Virtual Event, South Korea. pp.2601-2617, ⟨10.1145/3460120.3484588⟩
Communication dans un congrès
hal-03540403v1
|
|||
|
Refinement types for secure implementationsACM Transactions on Programming Languages and Systems (TOPLAS), 2011, 33 (2), ⟨10.1145/1890028.1890031⟩
Article dans une revue
hal-01294973v1
|
||
|
Discovering Concrete Attacks on Website Authorization by Formal Analysis25th IEEE Computer Security Foundations Symposium (CSF'12), 2012, Cambridge, MA, United States. pp.247--262
Communication dans un congrès
hal-00863385v1
|
||
|
Identifying Website Users by TLS Traffic Analysis: New Attacks and Effective Countermeasures[Research Report] RR-8067, INRIA. 2012
Rapport
hal-00732449v1
|
||
Noise*: A Library of Verified High-Performance Secure Channel Protocol Implementations[Research Report] Inria. 2021
Rapport
hal-03474303v1
|
|||
|
Automated Verification for Secure Messaging Protocols and Their Implementations: A Symbolic and Computational Approach2nd IEEE European Symposium on Security and Privacy , Apr 2017, Paris, France. pp.435 - 450, ⟨10.1109/EuroSP.2017.38⟩
Communication dans un congrès
hal-01575923v1
|
||
Network-based Origin Confusion Attacks against HTTPS Virtual Hosting24th International Conference on World Wide Web, May 2015, Florence, Italy
Communication dans un congrès
hal-01114246v1
|
|||
|
Web-based Attacks on Host-Proof Encrypted Storage6th USENIX Workshop on Offensive Technologies (WOOT'12), Aug 2012, Bellevue, WA, United States. pp.97--104
Communication dans un congrès
hal-00863383v1
|
||
|
Implementing TLS with Verified Cryptographic SecurityIEEE Symposium on Security & Privacy, 2013, San Francisco, United States. pp.445-462
Communication dans un congrès
hal-00863373v1
|
||
|
Keys to the Cloud: Formal Analysis and Concrete Attacks on Encrypted Web Storage2nd Conference on Principles of Security and Trust (POST 2013), 2013, Rome, Italy. pp.126--146
Communication dans un congrès
hal-00863375v1
|
||
|
Secure Distributed Programming with Value-Dependent TypesJournal of Functional Programming, 2013, 23 (4), pp.402-451
Article dans une revue
hal-00939188v1
|
||
|
Embedding of Security Components in Untrusted Third-Party Websites[Research Report] RR-8285, INRIA. 2013, pp.32
Rapport
hal-00815800v1
|
||
|
Cryptographic Verification by Typing for a Sample Protocol ImplementationAlessandro Aldini; Roberto Gorrieri Cryptographic Verification by Typing for a Sample Protocol Implementation, 6858, Springer, 2011, LNCS - Lecture Notes in Computer Science, 978-3-642-23081-3. ⟨10.1007/978-3-642-23082-0_3⟩
Chapitre d'ouvrage
hal-01295013v1
|
||
|
EverCrypt: A Fast, Verified, Cross-Platform Cryptographic ProviderSP 2020 - IEEE Symposium on Security and Privacy, May 2020, San Francisco / Virtual, United States. pp.983-1002, ⟨10.1109/SP40000.2020.00114⟩
Communication dans un congrès
hal-03154278v1
|
||
Comparse: Provably Secure Formats for Cryptographic ProtocolsCCS '23: ACM SIGSAC Conference on Computer and Communications Security, Nov 2023, Copenhagen, Denmark. pp.564-578, ⟨10.1145/3576915.3623201⟩
Communication dans un congrès
hal-04310972v1
|
|||
|
DY* : A Modular Symbolic Verification Framework for Executable Cryptographic Protocol CodeEuroS&P 2021 - 6th IEEE European Symposium on Security and Privacy, Sep 2021, Virtual, Austria
Communication dans un congrès
hal-03178425v1
|
||
TreeKEM: Asynchronous Decentralized Key Management for Large Dynamic Groups A protocol proposal for Messaging Layer Security (MLS)[Research Report] Inria Paris. 2018
Rapport
hal-02425247v1
|