Bruno Blanchet
Bruno Blanchet
Senior researcher, INRIA Paris
Verified email at inria.fr - Homepage
TitleCited byYear
An efficient cryptographic protocol verifier based on prolog rules.
B Blanchet
csfw 1, 82-96, 2001
11962001
A static analyzer for large safety-critical software
B Blanchet, P Cousot, R Cousot, J Feret, L Mauborgne, A Miné, ...
ACM SIGPLAN Notices 38 (5), 196-207, 2003
7772003
Automated verification of selected equivalences for security protocols
B Blanchet, M Abadi, C Fournet
The Journal of Logic and Algebraic Programming 75 (1), 3-51, 2008
4192008
A computationally sound mechanized prover for security protocols
B Blanchet
Dependable and Secure Computing, IEEE Transactions on 5 (4), 193-207, 2008
3772008
Escape analysis for object-oriented languages: application to Java
B Blanchet
Acm Sigplan Notices 34 (10), 20-34, 1999
3681999
Design and implementation of a special-purpose static program analyzer for safety-critical real-time embedded software
B Blanchet, P Cousot, R Cousot, J Feret, L Mauborgne, A Miné, ...
The essence of computation, 85-108, 2002
2542002
Automatic verification of correspondences for security protocols
B Blanchet
Journal of Computer Security 17 (4), 363-434, 2009
2422009
Automatic proof of strong secrecy for security protocols
B Blanchet
IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004, 86-100, 2004
2212004
Analyzing security protocols with secrecy types and logic programs
M Abadi, B Blanchet
Journal of the ACM (JACM) 52 (1), 102-146, 2005
2082005
From secrecy to authenticity in security protocols
B Blanchet
International Static Analysis Symposium, 342-359, 2002
1952002
ProVerif 2.00: Automatic Cryptographic Protocol Verifier, User Manual and Tutorial
B Blanchet, B Smyth, V Cheval, M Sylvestre
Version from, 05-16, 2018
150*2018
Secrecy types for asymmetric communication
M Abadi, B Blanchet
International Conference on Foundations of Software Science and Computation …, 2001
1502001
Analyzing security protocols with secrecy types and logic programs
M Abadi, B Blanchet
ACM SIGPLAN Notices 37 (1), 33-44, 2002
1402002
Automated security proofs with sequences of games
B Blanchet, D Pointcheval
Annual International Cryptology Conference, 537-554, 2006
1312006
Escape analysis for Java TM: Theory and practice
B Blanchet
ACM Transactions on Programming Languages and Systems (TOPLAS) 25 (6), 713-775, 2003
1282003
Verification of cryptographic protocols: Tagging enforces termination
B Blanchet, A Podelski
International Conference on Foundations of Software Science and Computation …, 2003
1182003
Just fast keying in the pi calculus
M Abadi, B Blanchet, C Fournet
ACM Transactions on Information and System Security (TISSEC) 10 (3), 9, 2007
1122007
Escape analysis: correctness proof, implementation and experimental results
B Blanchet
Proceedings of the 25th ACM SIGPLAN-SIGACT symposium on Principles of …, 1998
1041998
ProVerif: Cryptographic protocol verifier in the formal model
B Blanchet, V Cheval, X Allamigeon, B Smyth
URL http://prosecco. gforge. inria. fr/personal/bblanche/proverif 17, 2010
1012010
Modeling and verifying security protocols with the applied pi calculus and ProVerif
B Blanchet
Foundations and Trends® in Privacy and Security 1 (1-2), 1-135, 2016
972016
The system can't perform the operation now. Try again later.
Articles 1–20