Formal verification of smart contracts: Short paper K Bhargavan, A Delignat-Lavaud, C Fournet, A Gollamudi, G Gonthier, ... Proceedings of the 2016 ACM workshop on programming languages and analysis …, 2016 | 787 | 2016 |
Imperfect forward secrecy: How Diffie-Hellman fails in practice D Adrian, K Bhargavan, Z Durumeric, P Gaudry, M Green, JA Halderman, ... Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 763 | 2015 |
Dependent types and multi-monadic effects in F N Swamy, C Hriţcu, C Keller, A Rastogi, A Delignat-Lavaud, S Forest, ... Proceedings of the 43rd annual ACM SIGPLAN-SIGACT Symposium on Principles of …, 2016 | 478 | 2016 |
A messy state of the union: Taming the composite state machines of TLS B Beurdouche, K Bhargavan, A Delignat-Lavaud, C Fournet, M Kohlweiss, ... Communications of the ACM 60 (2), 99-107, 2017 | 408 | 2017 |
Refinement types for secure implementations J Bengtson, K Bhargavan, C Fournet, AD Gordon, S Maffeis ACM Transactions on Programming Languages and Systems (TOPLAS) 33 (2), 1-45, 2011 | 325 | 2011 |
HACL*: A verified modern cryptographic library JK Zinzindohoué, K Bhargavan, J Protzenko, B Beurdouche Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 302 | 2017 |
Verified models and reference implementations for the TLS 1.3 standard candidate K Bhargavan, B Blanchet, N Kobeissi 2017 IEEE Symposium on Security and Privacy (SP), 483-502, 2017 | 295 | 2017 |
Triple handshakes and cookie cutters: Breaking and fixing authentication over TLS K Bhargavan, AD Lavaud, C Fournet, A Pironti, PY Strub 2014 IEEE Symposium on Security and Privacy, 98-113, 2014 | 284 | 2014 |
Secure distributed programming with value-dependent types N Swamy, J Chen, C Fournet, PY Strub, K Bhargavan, J Yang ACM SIGPLAN Notices 46 (9), 266-278, 2011 | 283 | 2011 |
On the practical (in-) security of 64-bit block ciphers: Collision attacks on HTTP over TLS and OpenVPN K Bhargavan, G Leurent Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 268 | 2016 |
Implementing TLS with verified cryptographic security K Bhargavan, C Fournet, M Kohlweiss, A Pironti, PY Strub 2013 IEEE Symposium on Security and Privacy, 445-459, 2013 | 256 | 2013 |
Formal verification of standards for distance vector routing protocols K Bhargavan, D Obradovic, CA Gunter Journal of the ACM (JACM) 49 (4), 538-576, 2002 | 254 | 2002 |
Verified interoperable implementations of security protocols K Bhargavan, C Fournet, AD Gordon, S Tse ACM Transactions on Programming Languages and Systems (TOPLAS) 31 (1), 1-61, 2008 | 218 | 2008 |
Discovering concrete attacks on website authorization by formal analysis C Bansal, K Bhargavan, A Delignat-Lavaud, S Maffeis Journal of Computer Security 22 (4), 601-657, 2014 | 216 | 2014 |
SoK: Computer-aided cryptography M Barbosa, G Barthe, K Bhargavan, B Blanchet, C Cremers, K Liao, ... 2021 IEEE symposium on security and privacy (SP), 777-795, 2021 | 200 | 2021 |
Automated verification for secure messaging protocols and their implementations: A symbolic and computational approach N Kobeissi, K Bhargavan, B Blanchet 2017 IEEE European symposium on security and privacy (EuroS&P), 435-450, 2017 | 197 | 2017 |
Modular verification of security protocol code by typing K Bhargavan, C Fournet, AD Gordon ACM Sigplan Notices 45 (1), 445-456, 2010 | 172 | 2010 |
Transcript collision attacks: Breaking authentication in TLS, IKE, and SSH K Bhargavan, G Leurent Network and Distributed System Security Symposium--NDSS 2016, 2016 | 163 | 2016 |
Verified low-level programming embedded in F J Protzenko, JK Zinzindohoué, A Rastogi, T Ramananandro, P Wang, ... Proceedings of the ACM on Programming Languages 1 (ICFP), 1-29, 2017 | 157 | 2017 |
Cryptographically verified implementations for TLS K Bhargavan, C Fournet, R Corin, E Zalinescu Proceedings of the 15th ACM conference on Computer and communications …, 2008 | 157 | 2008 |