BASALISC: Programmable asynchronous hardware accelerator for BGV fully homomorphic encryption

R Geelen, M Van Beirendonck, HVL Pereira… - arXiv preprint arXiv …, 2022 - arxiv.org
Fully Homomorphic Encryption (FHE) allows for secure computation on encrypted data. We
present BASALISC, an architecture family of hardware accelerators that aims to substantially …

The HACMS program: using formal methods to eliminate exploitable bugs

K Fisher, J Launchbury… - … Transactions of the …, 2017 - royalsocietypublishing.org
For decades, formal methods have offered the promise of verified software that does not
have exploitable bugs. Until recently, however, it has not been possible to verify software of …

Constructing semantic models of programs with the software analysis workbench

R Dockins, A Foltzer, J Hendrix, B Huffman… - … . Theories, Tools, and …, 2016 - Springer
Abstract The Software Analysis Workbench (SAW) is a system for translating programs into
logical expressions, transforming these expressions, and using external reasoning tools …

Translation of algorithmic descriptions of discrete functions to SAT with applications to cryptanalysis problems

A Semenov, I Otpuschennikov… - Logical Methods in …, 2020 - lmcs.episciences.org
In the present paper, we propose a technology for translating algorithmic descriptions of
discrete functions to SAT. The proposed technology is aimed at applications in algebraic …

Finding Specification Blind Spots via Fuzz Testing

R Ji, M Xu - 2023 IEEE Symposium on Security and Privacy (SP …, 2023 - ieeexplore.ieee.org
A formally verified program is only as correct as its specifications (SPEC). But how to assure
that the SPEC is complete and free of loopholes? This paper presents Fast, short for Fuzzing …

EasyBC: A Cryptography-Specific Language for Security Analysis of Block Ciphers against Differential Cryptanalysis

P Sun, F Song, Y Chen, T Chen - Proceedings of the ACM on …, 2024 - dl.acm.org
Differential cryptanalysis is a powerful algorithmic-level attack, playing a central role in
evaluating the security of symmetric cryptographic primitives. In general, the resistance …

Automatic equivalence checking for assembly implementations of cryptography libraries

JP Lim, S Nagarakatte - 2019 IEEE/ACM International …, 2019 - ieeexplore.ieee.org
This paper presents an approach and a tool, CASM-VERIFY, to automatically check the
equivalence of highly optimized assembly implementations of cryptographic algorithms. The …

Not All Move Specifications Are Created Equal: A Case Study on the Formally Verified Diem Payment Network

M Xu - 2024 IEEE Security and Privacy Workshops (SPW), 2024 - ieeexplore.ieee.org
Software developers who are newly introduced to formal verification often have subtle but
distinct interpretations on the roles of specifications (specs). Unsurprisingly, these different …

Finding effective SAT Partitionings via black-box optimization

A Semenov, O Zaikin, S Kochemazov - Black Box Optimization, Machine …, 2021 - Springer
In the present chapter we study one method for partitioning hard instances of the Boolean
satisfiability problem (SAT). It uses a subset of a set of variables of an original formula to …

Verifying Classic McEliece: examining the role of formal methods in post-quantum cryptography standardisation

M Brain, C Cid, R Player, W Robson - Code-Based Cryptography …, 2022 - Springer
Developers of computer-aided cryptographic tools are optimistic that formal methods will
become a vital part of developing new cryptographic systems. We study the use of such tools …