Follow
Pierre-Yves Strub
Pierre-Yves Strub
Research Scientist, PQShield
Verified email at strub.nu - Homepage
Title
Cited by
Cited by
Year
Dependent types and multi-monadic effects in F
N Swamy, C Hriţcu, C Keller, A Rastogi, A Delignat-Lavaud, S Forest, ...
Proceedings of the 43rd annual ACM SIGPLAN-SIGACT Symposium on Principles of …, 2016
4862016
A messy state of the union: Taming the composite state machines of TLS
B Beurdouche, K Bhargavan, A Delignat-Lavaud, C Fournet, M Kohlweiss, ...
Communications of the ACM 60 (2), 99-107, 2017
4132017
Strong non-interference and type-directed higher-order masking
G Barthe, S Belaïd, F Dupressoir, PA Fouque, B Grégoire, PY Strub, ...
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
2972016
Secure distributed programming with value-dependent types
N Swamy, J Chen, C Fournet, PY Strub, K Bhargavan, J Yang
ACM SIGPLAN Notices 46 (9), 266-278, 2011
2852011
Triple handshakes and cookie cutters: Breaking and fixing authentication over TLS
K Bhargavan, AD Lavaud, C Fournet, A Pironti, PY Strub
2014 IEEE Symposium on Security and Privacy, 98-113, 2014
2832014
Implementing TLS with verified cryptographic security
K Bhargavan, C Fournet, M Kohlweiss, A Pironti, PY Strub
Proceedings of the 34th IEEE Symposium on Security and Privacy, SP 13, 2013
2582013
Easycrypt: A tutorial
G Barthe, F Dupressoir, B Grégoire, C Kunz, B Schmidt, PY Strub
International School on Foundations of Security Analysis and Design, 146-166, 2012
2292012
Verified proofs of higher-order masking
G Barthe, S Belaïd, F Dupressoir, PA Fouque, B Grégoire, PY Strub
Annual International Conference on the Theory and Applications of …, 2015
2062015
Jasmin: High-assurance and high-speed cryptography
JB Almeida, M Barbosa, G Barthe, A Blot, B Grégoire, V Laporte, ...
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
1932017
Parallel implementations of masking schemes and the bounded moment leakage model
G Barthe, F Dupressoir, S Faust, B Grégoire, FX Standaert, PY Strub
Advances in Cryptology–EUROCRYPT 2017: 36th Annual International Conference …, 2017
1722017
Probabilistic relational verification for cryptographic implementations
G Barthe, C Fournet, B Grégoire, PY Strub, N Swamy, S Zanella-Béguelin
ACM SIGPLAN Notices 49 (1), 193-205, 2014
1362014
Fully abstract compilation to JavaScript
C Fournet, N Swamy, J Chen, PE Dagand, PY Strub, B Livshits
Proceedings of the 40th annual ACM SIGPLAN-SIGACT symposium on Principles of …, 2013
1312013
Proving the TLS handshake secure (as it is)
K Bhargavan, C Fournet, M Kohlweiss, A Pironti, PY Strub, ...
Advances in Cryptology–CRYPTO 2014: 34th Annual Cryptology Conference, Santa …, 2014
1242014
Proving differential privacy via probabilistic couplings
G Barthe, M Gaboardi, B Grégoire, J Hsu, PY Strub
Proceedings of the 31st Annual ACM/IEEE Symposium on Logic in Computer …, 2016
1142016
Higher-order approximate relational refinement types for mechanism design and differential privacy
G Barthe, M Gaboardi, EJ Gallego Arias, J Hsu, A Roth, PY Strub
ACM SIGPLAN Notices 50 (1), 55-68, 2015
1092015
Modular code-based cryptographic verification
C Fournet, M Kohlweiss, PY Strub
Proceedings of the 18th ACM conference on Computer and communications …, 2011
1072011
The last mile: High-assurance and high-speed cryptographic implementations
JB Almeida, M Barbosa, G Barthe, B Grégoire, A Koutsos, V Laporte, ...
2020 IEEE Symposium on Security and Privacy (SP), 965-982, 2020
962020
Gradual typing embedded securely in JavaScript
N Swamy, C Fournet, A Rastogi, K Bhargavan, J Chen, PY Strub, ...
ACM SIGPLAN Notices 49 (1), 425-437, 2014
922014
Color image segmentation based on automatic morphological clustering
T Géraud, PY Strub, J Darbon
Proceedings 2001 international conference on image processing (Cat. No …, 2001
802001
A relational logic for higher-order programs
A Aguirre, G Barthe, M Gaboardi, D Garg, PY Strub
Proceedings of the ACM on Programming Languages 1 (ICFP), 1-29, 2017
702017
The system can't perform the operation now. Try again later.
Articles 1–20