From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The Last Mile: High-Assurance and High-Speed Cryptographic Implementations., , , , , , , и . CoRR, (2019)Verified Abstract Interpretation Techniques for Disassembling Low-level Self-modifying Code., , и . ITP, том 8558 из Lecture Notes in Computer Science, стр. 128-143. Springer, (2014)High-assurance zeroization., , , , , , , и . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024 (1): 375-397 (2024)Protecting cryptographic code against Spectre-RSB., , , , , , , , и . IACR Cryptol. ePrint Arch., (2024)Structured Leakage and Applications to Cryptographic Constant-Time and Cost., , , и . CCS, стр. 462-476. ACM, (2021)Enforcing Fine-grained Constant-time Policies., , , , и . CCS, стр. 83-96. ACM, (2022)An abstract memory functor for verified C static analyzers., , и . ICFP, стр. 325-337. ACM, (2016)The Last Mile: High-Assurance and High-Speed Cryptographic Implementations., , , , , , , и . SP, стр. 965-982. IEEE, (2020)Formal Verification of a C Value Analysis Based on Abstract Interpretation., , , и . SAS, том 7935 из Lecture Notes in Computer Science, стр. 324-344. Springer, (2013)Machine-Checked Proofs for Cryptographic Standards: Indifferentiability of Sponge and Secure High-Assurance Implementations of SHA-3., , , , , , , , , и . CCS, стр. 1607-1622. ACM, (2019)