Author of the publication

Verified Cryptographic Code for Everybody.

, , , , , , and . CAV (1), volume 12759 of Lecture Notes in Computer Science, page 645-668. Springer, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Constructor-Based Reachability Logic for Rewrite Theories., , and . Fundam. Informaticae, 173 (4): 315-382 (2020)Toward language-independent program verification. University of Illinois Urbana-Champaign, USA, (2016)Recursive proofs for inductive tree data-structures., , and . POPL, page 123-136. ACM, (2012)From Hoare Logic to Matching Logic Reachability., and . FM, volume 7436 of Lecture Notes in Computer Science, page 387-402. Springer, (2012)Matching logic: a new program verification approach., and . ICSE, page 868-871. ACM, (2011)Natural proofs for structure, data, and separation., , , and . PLDI, page 231-242. ACM, (2013)MatchC: A Matching Logic Reachability Verifier Using the K Framework.. K, volume 304 of Electronic Notes in Theoretical Computer Science, page 183-198. Elsevier, (2011)KJS: a complete formal semantics of JavaScript., , and . PLDI, page 346-356. ACM, (2015)Verified Cryptographic Code for Everybody., , , , , , and . CAV (1), volume 12759 of Lecture Notes in Computer Science, page 645-668. Springer, (2021)KEVM: A Complete Formal Semantics of the Ethereum Virtual Machine., , , , , , , , , and 1 other author(s). CSF, page 204-217. IEEE Computer Society, (2018)