Adrien Koutsos

Orcid: 0000-0002-5891-154X

According to our database1, Adrien Koutsos authored at least 17 papers between 2017 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
The Squirrel Prover and its Logic.
ACM SIGLOG News, April, 2024

A Probabilistic Logic for Concrete Security.
Proceedings of the 37th IEEE Computer Security Foundations Symposium, 2024

2023
Mechanized Proofs of Adversarial Complexity and Application to Universal Composability.
ACM Trans. Priv. Secur., August, 2023

A Higher-Order Indistinguishability Logic for Cryptographic Reasoning.
Proceedings of the 38th Annual ACM/IEEE Symposium on Logic in Computer Science, 2023

2022
Semantic Foundations for Cost Analysis of Pipeline-Optimized Programs.
Proceedings of the Static Analysis - 29th International Symposium, 2022

Cracking the Stateful Nut: Computational Proofs of Stateful Security Protocols using the Squirrel Proof Assistant.
Proceedings of the 35th IEEE Computer Security Foundations Symposium, 2022

2021
Decidability of a Sound Set of Inference Rules for Computational Indistinguishability.
ACM Trans. Comput. Log., 2021

High-Assurance Cryptography in the Spectre Era.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

An Interactive Prover for Protocol Verification in the Computational Model.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

2020
High-Assurance Cryptography Software in the Spectre Era.
IACR Cryptol. ePrint Arch., 2020

The Last Mile: High-Assurance and High-Speed Cryptographic Implementations.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

2019
Preuves symboliques de propriétés d'indistinguabilité calculatoire. (Symbolic Proofs of Computational Indistinguishability).
PhD thesis, 2019

The 5G-AKA Authentication Protocol Privacy.
Proceedings of the IEEE European Symposium on Security and Privacy, 2019

2018
Deciding Indistinguishability.
CoRR, 2018

2017
Process-centric views of data-driven business artifacts.
J. Comput. Syst. Sci., 2017

Formal Computational Unlinkability Proofs of RFID Protocols.
Proceedings of the 30th IEEE Computer Security Foundations Symposium, 2017

A Sound Flow-Sensitive Heap Abstraction for the Static Analysis of Android Applications.
Proceedings of the 30th IEEE Computer Security Foundations Symposium, 2017


  Loading...