• Publications
  • Influence
Towards automated proofs for asymmetric encryption schemes in the random oracle model
Chosen-ciphertext security is by now a standard security property for asymmetric encryption. Many generic constructions for building secure cryptosystems from primitives with lower level of securityExpand
  • 42
  • 3
  • Open Access
Computational indistinguishability logic
Computational Indistinguishability Logic (CIL) is a logic for reasoning about cryptographic primitives in computational models. It captures reasoning patterns that are common in provable security,Expand
  • 48
  • 2
  • Open Access
On the Equality of Probabilistic Terms
We consider a mild extension of universal algebra in which terms are built both from deterministic and probabilistic variables, and are interpreted as distributions. We formulate an equational proofExpand
  • 14
  • 1
  • Open Access
Generic Indifferentiability Proofs of Hash Designs
Hash functions are the swiss army knife of cryptographers. They are used to generate unique identifiers in hash-and-sign signatures, as one-way functions for one-time-password, to break the structureExpand
  • 8
  • 1
  • Open Access
CamlCrush: A PKCS\#11 Filtering Proxy
PKCS#11 is a very popular cryptographic API: it is the standard used by many Hardware Security Modules, smartcards and software cryptographic tokens. Several attacks have been uncovered againstExpand
  • 7
  • 1
  • Open Access
Automated Proofs for Asymmetric Encryption
Many generic constructions for building secure cryptosystems from primitives with lower level of security have been proposed. Providing security proofs has also become standard practice. There is,Expand
  • 10
  • Open Access
A Secure Key Management Interface with Asymmetric Cryptography
Cryptographic devices such as Hardware Security Modules are only as secure as their application programme interfaces (APIs) that offer cryptographic functionality to the outside world. Design flawsExpand
  • 9
  • Open Access
Game-Based Criterion Partition Applied to Computational Soundness of Adaptive Security
The composition of security definitions is a subtle issue. As most security protocols use a combination of security primitives, it is important to have general results that allow to combine suchExpand
  • 2
  • Open Access