Bruno Blanchet

Orcid: 0009-0005-1072-0786

Affiliations:
  • ENS Paris, France


According to our database1, Bruno Blanchet authored at least 56 papers between 1998 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Post-Quantum Sound CryptoVerif and Verification of Hybrid TLS and SSH Key-Exchanges.
Proceedings of the 37th IEEE Computer Security Foundations Symposium, 2024

CV2EC: Getting the Best of Both Worlds.
Proceedings of the 37th IEEE Computer Security Foundations Symposium, 2024

Dealing with Dynamic Key Compromise in Crypto Verif.
Proceedings of the 37th IEEE Computer Security Foundations Symposium, 2024

2023
CryptoVerif: a Computationally-Sound Security Protocol Verifier (Initial Version with Communications on Channels).
CoRR, 2023

2022
Analysing the HPKE Standard - Supplementary Material.
Dataset, August, 2022

The Security Protocol Verifier ProVerif and its Horn Clause Resolution Algorithm.
Proceedings of the Proceedings 9th Workshop on Horn Clauses for Verification and Synthesis and 10th International Workshop on Verification and Program Transformation, 2022

ProVerif with Lemmas, Induction, Fast Subsumption, and Much More.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

2021
Analysing the HPKE Standard - Supplementary Material.
Dataset, September, 2021

2020
Analysing the HPKE Standard - Supplementary Material.
Dataset, November, 2020

Analysing the HPKE Standard.
IACR Cryptol. ePrint Arch., 2020

2019
SoK: Computer-Aided Cryptography.
IACR Cryptol. ePrint Arch., 2019

A Mechanised Cryptographic Proof of the WireGuard Virtual Private Network Protocol.
Proceedings of the IEEE European Symposium on Security and Privacy, 2019

2018
Automated reasoning for equivalences in the applied pi calculus with barriers.
J. Comput. Secur., 2018

The Applied Pi Calculus: Mobile Values, New Names, and Secure Communication.
J. ACM, 2018

Composition Theorems for CryptoVerif and Application to TLS 1.3.
Proceedings of the 31st IEEE Computer Security Foundations Symposium, 2018

2017
Verified Models and Reference Implementations for the TLS 1.3 Standard Candidate.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

Automated Verification for Secure Messaging Protocols and Their Implementations: A Symbolic and Computational Approach.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017

Symbolic and Computational Mechanized Verification of the ARINC823 Avionic Protocols.
Proceedings of the 30th IEEE Computer Security Foundations Symposium, 2017

2016
Modeling and Verifying Security Protocols with the Applied Pi Calculus and ProVerif.
Found. Trends Priv. Secur., 2016

2015
Proved generation of implementations from computationally secure protocol specifications.
J. Comput. Secur., 2015

2013
From Computationally-Proved Protocol Specifications to Implementations and Application to SSH.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2013

Verification of security protocols with lists: From length one to unbounded length.
J. Comput. Secur., 2013

Proving More Observational Equivalences with ProVerif.
Proceedings of the Principles of Security and Trust - Second International Conference, 2013

Automatic Verification of Security Protocols in the Symbolic Model: The Verifier ProVerif.
Proceedings of the Foundations of Security Analysis and Design VII, 2013

Automatic verification of protocols with lists of unbounded length.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Mechanizing Game-Based Proofs of Security Protocols.
Proceedings of the Software Safety and Security - Tools for Analysis and Verification, 2012

Automatically Verified Mechanized Proof of One-Encryption Key Exchange.
IACR Cryptol. ePrint Arch., 2012

Security Protocol Verification: Symbolic and Computational Models.
Proceedings of the Principles of Security and Trust - First International Conference, 2012

From Computationally-proved Protocol Specifications to Implementations.
Proceedings of the Seventh International Conference on Availability, 2012

2011
Using Horn Clauses for Analyzing Security Protocols.
Proceedings of the Formal Models and Techniques for Analyzing Security Protocols, 2011

2009
Automatic verification of correspondences for security protocols.
J. Comput. Secur., 2009

Models and Proofs of Protocol Security: A Progress Report.
Proceedings of the Computer Aided Verification, 21st International Conference, 2009

2008
A Computationally Sound Mechanized Prover for Security Protocols.
IEEE Trans. Dependable Secur. Comput., 2008

Automated verification of selected equivalences for security protocols.
J. Log. Algebraic Methods Program., 2008

Automated Formal Analysis of a Protocol for Secure File Sharing on Untrusted Storage.
Proceedings of the 2008 IEEE Symposium on Security and Privacy (SP 2008), 2008

Computationally sound mechanized proofs for basic and public-key Kerberos.
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008

2007
Just fast keying in the pi calculus.
ACM Trans. Inf. Syst. Secur., 2007

Computationally Sound Mechanized Proofs of Correspondence Assertions.
IACR Cryptol. ePrint Arch., 2007

2006
Automated Security Proofs with Sequences of Games.
IACR Cryptol. ePrint Arch., 2006

2005
Verification of cryptographic protocols: tagging enforces termination.
Theor. Comput. Sci., 2005

Computer-assisted verification of a protocol for certified email.
Sci. Comput. Program., 2005

Analyzing security protocols with secrecy types and logic programs.
J. ACM, 2005

Security protocols: from linear to classical logic by abstract interpretation.
Inf. Process. Lett., 2005

Reconstruction of Attacks against Cryptographic Protocols.
Proceedings of the 18th IEEE Computer Security Foundations Workshop, 2005

2004
Automatic Proof of Strong Secrecy for Security Protocols.
Proceedings of the 2004 IEEE Symposium on Security and Privacy (S&P 2004), 2004

2003
Escape analysis for Java<sup>TM</sup>: Theory and practice.
ACM Trans. Program. Lang. Syst., 2003

Secrecy types for asymmetric communication.
Theor. Comput. Sci., 2003

Automatic verification of cryptographic protocols: a logic programming approach.
Proceedings of the 5th International ACM SIGPLAN Conference on Principles and Practice of Declarative Programming, 2003

A static analyzer for large safety-critical software.
Proceedings of the ACM SIGPLAN 2003 Conference on Programming Language Design and Implementation 2003, 2003

A Calculus for Secure Mobility.
Proceedings of the Advances in Computing Science, 2003

2002
From Secrecy to Authenticity in Security Protocols.
Proceedings of the Static Analysis, 9th International Symposium, 2002

Design and Implementation of a Special-Purpose Static Program Analyzer for Safety-Critical Real-Time Embedded Software.
Proceedings of the Essence of Computation, Complexity, Analysis, 2002

2001
Abstracting Cryptographic Protocols by Prolog Rules.
Proceedings of the Static Analysis, 8th International Symposium, 2001

An Efficient Cryptographic Protocol Verifier Based on Prolog Rules.
Proceedings of the 14th IEEE Computer Security Foundations Workshop (CSFW-14 2001), 2001

1999
Escape Analysis for Object-Oriented Languages: Application to Java.
Proceedings of the 1999 ACM SIGPLAN Conference on Object-Oriented Programming Systems, 1999

1998
Escape Analysis: Correctness Proof, Implementation and Experimental Results.
Proceedings of the POPL '98, 1998


  Loading...