Abstract is missing.
- Secure Compilation of Constant-Resource ProgramsGilles Barthe, Sandrine Blazy, Rémi Hutin, David Pichardie. 1-12 [doi]
- Towards Language-Based Mitigation of Traffic Analysis AttacksJeppe Fredsgaard Blaabjerg, Aslan Askarov. 1-15 [doi]
- Heuristic Approach for Countermeasure Selection Using Attack GraphsOrly Stan, Ron Bitton, Michal Ezrets, Moran Dadon, Masaki Inokuchi, Yoshinobu Ohta, Tomohiko Yagyu, Yuval Elovici, Asaf Shabtai. 1-16 [doi]
- Gradual Security Types and Gradual GuaranteesAbhishek Bichhawat, McKenna McCall, Limin Jia 0001. 1-16 [doi]
- Machine-Checking Unforgeability Proofs for Signature Schemes with Tight Reductions to the Computational Diffie-Hellman ProblemFrançois Dupressoir, Sara Zain. 1-15 [doi]
- A Formal Information-Theoretic Leakage Analysis of Order-Revealing EncryptionMireya Jurado, Catuscia Palamidessi, Geoffrey Smith 0001. 1-16 [doi]
- Relational Analysis of Sensor Attacks on Cyber-Physical SystemsJian Xiang, Nathan Fulton, Stephen Chong. 1-16 [doi]
- Vertical Composition and Sound Payload Abstraction for Stateful ProtocolsSébastien Gondron, Sebastian Mödersheim. 1-16 [doi]
- Dynamic IFC Theorems for Free!Maximilian Algehed, Jean-Philippe Bernardy, Catalin Hritcu. 1-14 [doi]
- A Coq proof of the correctness of X25519 in TweetNaClPeter Schwabe, Benoît Viguier, Timmy Weerwag, Freek Wiedijk. 1-16 [doi]
- Efficient Algorithms for Quantitative Attack Tree AnalysisCarlos E. Budde, Mariëlle Stoelinga. 1-15 [doi]
- Mechanised Models and Proofs for Distance-BoundingIoana Boureanu, Constantin Catalin Dragan, François Dupressoir, David Gérault, Pascal Lafourcade 0001. 1-16 [doi]
- CapablePtrs: Securely Compiling Partial Programs Using the Pointers-as-Capabilities PrincipleAkram El-Korashy, Stelios Tsampas 0001, Marco Patrignani, Dominique Devriese, Deepak Garg 0001, Frank Piessens. 1-16 [doi]
- Language Support for Secure Software Development with EnclavesAditya Oak, Amir M. Ahmadian, Musard Balliu, Guido Salvaneschi. 1-16 [doi]
- Cooking Cryptographers: Secure Multiparty Computation Based on Balls and BagsDaiki Miyahara, Yuichi Komano, Takaaki Mizuki, Hideaki Sone. 1-16 [doi]
- Verifying Hyperproperties With TLALeslie Lamport, Fred B. Schneider. 1-16 [doi]
- Fixing the Achilles Heel of E-Voting: The Bulletin BoardLucca Hirschi, Lara Schmid, David A. Basin. 1-17 [doi]
- Concise UC Zero-Knowledge Proofs for Oblivious Updatable DatabasesJan Camenisch, Maria Dubovitskaya, Alfredo Rial. 1-16 [doi]
- Verifying Accountability for Unbounded Sets of ParticipantsKevin Morio, Robert Künnemann. 1-16 [doi]
- DDUO: General-Purpose Dynamic Analysis for Differential PrivacyChike Abuah, Alex Silence, David Darais, Joseph P. Near. 1-15 [doi]
- Consistency for Functional EncryptionChristian Badertscher, Aggelos Kiayias, Markulf Kohlweiss, Hendrik Waldner. 1-16 [doi]
- Statistical Model Checking for HyperpropertiesYu Wang 0044, Siddhartha Nalluri, Borzoo Bonakdarpour, Miroslav Pajic. 1-16 [doi]
- Yes We can: Watermarking Machine Learning Models beyond ClassificationSofiane Lounici, Mohamed Njeh, Orhan Ermis, Melek Önen, Slim Trabelsi. 1-14 [doi]
- SSProve: A Foundational Framework for Modular Cryptographic Proofs in CoqCarmine Abate, Philipp G. Haselwarter, Exequiel Rivas, Antoine Van Muylder, Théo Winterhalter, Catalin Hritcu, Kenji Maillard, Bas Spitters. 1-15 [doi]
- Verified Multiple-Time Signature Scheme from One-Time Signatures and TimestampingDenis Firsov, Henri Lakk, Ahto Truu. 1-13 [doi]
- Efficient Constructions of Pairing Based AccumulatorsIoanna Karantaidou, Foteini Baldimtsi. 1-16 [doi]
- Automating Audit with Policy InferenceAbhishek Bichhawat, Matt Fredrikson, Jean Yang. 1-16 [doi]
- On Compositional Information Flow Aware RefinementChristoph Baumann, Mads Dam, Roberto Guanciale, Hamed Nemati. 1-16 [doi]
- Formalizing Nakamoto-Style Proof of StakeSøren Eller Thomsen, Bas Spitters. 1-15 [doi]
- Accountability in the Decentralised-Adversary SettingRobert Künnemann, Deepak Garg 0001, Michael Backes 0001. 1-16 [doi]
- Formal Verification of Secure Forwarding ProtocolsTobias Klenze, Christoph Sprenger 0001, David A. Basin. 1-16 [doi]
- A Quantale of InformationSebastian Hunt, David Sands 0001. 1-15 [doi]
- Formal security analysis of MPC-in-the-head zero-knowledge protocolsNikolaj Sidorenco, Sabine Oechsner, Bas Spitters. 1-14 [doi]
- Concavity, Core-concavity, Quasiconcavity: A Generalizing Framework for Entropy MeasuresArthur Américo, Pasquale Malacaria. 1-14 [doi]
- Resource-Aware Session Types for Digital ContractsAnkush Das, Stephanie Balzer, Jan Hoffmann 0002, Frank Pfenning, Ishani Santurkar. 1-16 [doi]
- Performing Security Proofs of Stateful ProtocolsAndreas Viktor Hess, Sebastian Mödersheim, Achim D. Brucker, Anders Schlichtkrull. 1-16 [doi]
- Computationally sound Bitcoin tokensMassimo Bartoletti, Stefano Lande, Roberto Zunino. 1-15 [doi]
- Abstract Modeling of System Communication in Constructive Cryptography using CryptHOLDavid A. Basin, Andreas Lochbihler, Ueli Maurer, S. Reza Sefidgar. 1-16 [doi]
- On the Soundness of Infrastructure AdversariesAlexander Dax, Robert Künnemann. 1-16 [doi]
- Backwards-directed information flow analysis for concurrent programsKirsten Winter, Nicholas Coughlin, Graeme Smith. 1-16 [doi]
- Election Verifiability Revisited: Automated Security Proofs and Attacks on Helios and BeleniosSevdenur Baloglu, Sergiu Bursuc, Sjouke Mauw, Jun Pang 0001. 1-15 [doi]
- Formal Impact Metrics for Cyber-physical AttacksRuggero Lanotte, Massimo Merro, Andrei Munteanu, Simone Tini. 1-16 [doi]
- KACHINA - Foundations of Private Smart ContractsThomas Kerber, Aggelos Kiayias, Markulf Kohlweiss. 1-16 [doi]