SoK: Computer-aided cryptography
Computer-aided cryptography is an active area of research that develops and applies
formal, machine-checkable approaches to the design, analysis, and implementation of …
formal, machine-checkable approaches to the design, analysis, and implementation of …
High-assurance cryptography in the spectre era
G Barthe, S Cauligi, B Grégoire… - … IEEE Symposium on …, 2021 - ieeexplore.ieee.org
High-assurance cryptography leverages methods from program verification and
cryptography engineering to deliver efficient cryptographic software with machine-checked …
cryptography engineering to deliver efficient cryptographic software with machine-checked …
CryptOpt: Verified compilation with randomized program search for cryptographic primitives
Most software domains rely on compilers to translate high-level code to multiple different
machine languages, with performance not too much worse than what developers would …
machine languages, with performance not too much worse than what developers would …
Haclxn: Verified generic SIMD crypto (for all your favourite platforms)
We present a new methodology for building formally verified cryptographic libraries that are
optimized for multiple architectures. In particular, we show how to write and verify generic …
optimized for multiple architectures. In particular, we show how to write and verify generic …
[PDF][PDF] Mariposa: Measuring SMT Instability in Automated Program Verification
Program verification has been successfully applied to increasingly large and complex
systems. Much of this recent success can be attributed to the automation provided by …
systems. Much of this recent success can be attributed to the automation provided by …
Certified Verification for Algebraic Abstraction
We present a certified algebraic abstraction technique for verifying bit-accurate non-linear
integer computations. In algebraic abstraction, programs are lifted to polynomial equations …
integer computations. In algebraic abstraction, programs are lifted to polynomial equations …
Automatic certified verification of cryptographic programs with COQCRYPTOLINE
COQCRYPTOLINE is an automatic certified verification tool for cryptographic programs. It is
built on OCAML programs extracted from algorithms fully certified in COQ with SS …
built on OCAML programs extracted from algorithms fully certified in COQ with SS …
[PDF][PDF] ENG25519: Faster TLS 1.3 handshake using optimized X25519 and Ed25519
The IETF released RFC 8446 in 2018 as the new TLS 1.3 standard, which recommends
using X25519 for key exchange and Ed25519 for identity verification. These computations …
using X25519 for key exchange and Ed25519 for identity verification. These computations …
Automatic verification of cryptographic block function implementations with logical equivalence checking
Given a fixed-size block, cryptographic block functions generate outputs by a sequence of
bitwise operations. Block functions are widely used in the design of hash functions and …
bitwise operations. Block functions are widely used in the design of hash functions and …
Automated Verification of Correctness for Masked Arithmetic Programs
Masking is a widely-used effective countermeasure against power side-channel attacks for
implementing cryptographic algorithms. Surprisingly, few formal verification techniques have …
implementing cryptographic algorithms. Surprisingly, few formal verification techniques have …