Gilles Barthe
Orcid: 0000-0002-3853-1777Affiliations:
- Max Planck Institute for Security and Privacy, Bochum, Germany
- IMDEA Software Institute, Spain (2008 - 2018)
- INRIA, Sophia-Antipolis, France (1999 - 2008)
- University of Minho, Braga, Portugal (1998 - 1999)
- Chalmers University, Gothenburg, Sweden (1997 - 1998)
- Centrum Wiskunde & Informatica, Amsterdam, The Netherlands (1995 - 1997)
- University of Nijmegen, The Netherlands (1993 - 1995)
- University of Manchester, UK (PhD 1993)
According to our database1,
Gilles Barthe
authored at least 273 papers
between 1995 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
-
on id.loc.gov
-
on d-nb.info
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
J. Cryptol., March, 2024
Proc. ACM Program. Lang., January, 2024
Proc. ACM Program. Lang., 2024
Hopping Proofs of Expectation-Based Properties: Applications to Skiplists and Security Proofs.
Proc. ACM Program. Lang., 2024
IACR Cryptol. ePrint Arch., 2024
Formally verifying Kyber Episode V: Machine-checked IND-CCA security and correctness of ML-KEM in EasyCrypt.
IACR Cryptol. ePrint Arch., 2024
"These results must be false": A usability evaluation of constant-time analysis tools.
Proceedings of the 33rd USENIX Security Symposium, 2024
They're not that hard to mitigate: What Cryptographic Library Developers Think About Timing Attacks.
Proceedings of the Software Engineering 2024, Fachtagung des GI-Fachbereichs Softwaretechnik, Linz, Austria, February 26, 2024
Testing Side-channel Security of Cryptographic Implementations against Future Microarchitectures.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Proceedings of the Programming Languages and Systems - 22nd Asian Symposium, 2024
2023
Mechanized Proofs of Adversarial Complexity and Application to Universal Composability.
ACM Trans. Priv. Secur., August, 2023
Proc. ACM Program. Lang., January, 2023
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
A Survey of Algorithmic Recourse: Contrastive Explanations and Consequential Recommendations.
ACM Comput. Surv., 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
2022
ACM Trans. Comput. Log., 2022
J. Log. Algebraic Methods Program., 2022
IACR Cryptol. ePrint Arch., 2022
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Proceedings of the Static Analysis - 29th International Symposium, 2022
Quantum Weakest Preconditions for Reasoning about Expected Runtimes of Quantum Programs.
Proceedings of the LICS '22: 37th Annual ACM/IEEE Symposium on Logic in Computer Science, Haifa, Israel, August 2, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
2021
Masking in Fine-Grained Leakage Models: Construction, Implementation and Verification.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021
Proc. ACM Program. Lang., 2021
Higher-order probabilistic adversarial computations: categorical semantics and program logics.
Proc. ACM Program. Lang., 2021
Proc. ACM Program. Lang., 2021
âTheyâre not that hard to mitigateâ: What Cryptographic Library Developers Think About Timing Attacks.
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021
Proceedings of the 36th Annual ACM/IEEE Symposium on Logic in Computer Science, 2021
Proceedings of the 34th IEEE Computer Security Foundations Symposium, 2021
Proceedings of the AIES '21: AAAI/ACM Conference on AI, 2021
2020
Proc. ACM Program. Lang., 2020
Improved parallel mask refreshing algorithms: generic solutions with parametrized non-interference and automated optimizations.
J. Cryptogr. Eng., 2020
System-Level Non-interference of Constant-Time Cryptography. Part II: Verified Static Analysis and Stealth Memory.
J. Autom. Reason., 2020
IACR Cryptol. ePrint Arch., 2020
A survey of algorithmic recourse: definitions, formulations, solutions, and prospects.
CoRR, 2020
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
Proceedings of the 41st ACM SIGPLAN International Conference on Programming Language Design and Implementation, 2020
Proceedings of the LICS '20: 35th Annual ACM/IEEE Symposium on Logic in Computer Science, 2020
Certified Compilation for Cryptography: Extended x86 Instructions and Constant-Time Verification.
Proceedings of the Progress in Cryptology - INDOCRYPT 2020, 2020
On the Versatility of Open Logical Relations - Continuity, Automatic Differentiation, and a Containment Theorem.
Proceedings of the Programming Languages and Systems, 2020
Proceedings of the 23rd International Conference on Artificial Intelligence and Statistics, 2020
Proceedings of the 23rd International Conference on Artificial Intelligence and Statistics, 2020
2019
Formal verification of higher-order probabilistic programs: reasoning about approximation, convergence, Bayesian inference, and optimization.
Proc. ACM Program. Lang., 2019
Log. Methods Comput. Sci., 2019
J. Cryptol., 2019
J. Autom. Reason., 2019
Implicit Computational Complexity of Subrecursive Definitions and Applications to Cryptographic Proofs.
J. Autom. Reason., 2019
GALACTICS: Gaussian Sampling for Lattice-Based Constant-Time Implementation of Cryptographic Signatures, Revisited.
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
Proceedings of the 40th ACM SIGPLAN Conference on Programming Language Design and Implementation, 2019
Proceedings of the 40th ACM SIGPLAN Conference on Programming Language Design and Implementation, 2019
Proceedings of the Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems 2019, 2019
Approximate Span Liftings: Compositional Semantics for Relaxations of Differential Privacy.
Proceedings of the 34th Annual ACM/IEEE Symposium on Logic in Computer Science, 2019
Proceedings of the 2019 Formal Methods in Computer Aided Design, 2019
maskVerif: Automated Verification of Higher-Order Masking in Presence of Physical Defaults.
Proceedings of the Computer Security - ESORICS 2019, 2019
Proceedings of the 32nd IEEE Computer Security Foundations Symposium, 2019
Machine-Checked Proofs for Cryptographic Standards: Indifferentiability of Sponge and Secure High-Assurance Implementations of SHA-3.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
Proc. ACM Program. Lang., 2018
IACR Cryptol. ePrint Arch., 2018
Improved Parallel Mask Refreshing Algorithms: Generic Solutions with Parametrized Non-Interference & Automated Optimizations.
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
Proceedings of the Advances in Neural Information Processing Systems 31: Annual Conference on Neural Information Processing Systems 2018, 2018
Proceedings of the 45th International Colloquium on Automata, Languages, and Programming, 2018
Proceedings of the Programming Languages and Systems, 2018
Proceedings of the Programming Languages and Systems, 2018
Secure Compilation of Side-Channel Countermeasures: The Case of Cryptographic "Constant-Time".
Proceedings of the 31st IEEE Computer Security Foundations Symposium, 2018
2017
IACR Cryptol. ePrint Arch., 2017
A Note on 'Further Improving Efficiency of Higher-Order Masking Scheme by Decreasing Randomness Complexity'.
IACR Cryptol. ePrint Arch., 2017
Attribute-Based Encryption in the Generic Group Model: Automated Proofs and New Constructions.
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the 44th ACM SIGPLAN Symposium on Principles of Programming Languages, 2017
Proceedings of the 44th ACM SIGPLAN Symposium on Principles of Programming Languages, 2017
Proceedings of the LPAR-21, 2017
Proceedings of the 44th International Colloquium on Automata, Languages, and Programming, 2017
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017
Proceedings of the Programming Languages and Systems, 2017
Proceedings of the 30th IEEE Computer Security Foundations Symposium, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2016
J. Log. Algebraic Methods Program., 2016
Strongly-optimal structure preserving signatures from Type II pairings: synthesis and lower bounds.
IET Inf. Secur., 2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
Automated Unbounded Analysis of Cryptographic Constructions in the Generic Group Model.
IACR Cryptol. ePrint Arch., 2016
Proceedings of the Web and Internet Economics - 12th International Conference, 2016
Proceedings of the 25th USENIX Security Symposium, 2016
Proceedings of the 31st Annual ACM/IEEE Symposium on Logic in Computer Science, 2016
Proceedings of the Leveraging Applications of Formal Methods, Verification and Validation: Discussion, Dissemination, Applications, 2016
Proceedings of the 43rd International Colloquium on Automata, Languages, and Programming, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Proceedings of the Computer Aided Verification - 28th International Conference, 2016
2015
IEEE Secur. Priv., 2015
IACR Cryptol. ePrint Arch., 2015
Compositional Verification of Higher-Order Masking: Application to a Verifying Masking Compiler.
IACR Cryptol. ePrint Arch., 2015
Verifiable side-channel security of cryptographic implementations: constant-time MEE-CBC.
IACR Cryptol. ePrint Arch., 2015
Dagstuhl Reports, 2015
Higher-Order Approximate Relational Refinement Types for Mechanism Design and Differential Privacy.
Proceedings of the 42nd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2015
Proceedings of the Logic for Programming, Artificial Intelligence, and Reasoning, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
ACM Trans. Program. Lang. Syst., 2014
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
Dagstuhl Reports, 2014
Proceedings of the Principles of Security and Trust - Third International Conference, 2014
Proceedings of the 41st Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2014
Proceedings of the IEEE 27th Computer Security Foundations Symposium, 2014
Proceedings of the IEEE 27th Computer Security Foundations Symposium, 2014
2013
ACM Trans. Program. Lang. Syst., 2013
Math. Struct. Comput. Sci., 2013
Certified computer-aided cryptography: efficient provably secure machine code from high-level implementations.
IACR Cryptol. ePrint Arch., 2013
Proceedings of the 19th International Conference on Types for Proofs and Programs, 2013
Proceedings of the Quantitative Evaluation of Systems - 10th International Conference, 2013
Proceedings of the ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming, 2013
Proceedings of the Logical Foundations of Computer Science, International Symposium, 2013
Beyond Differential Privacy: Composition Theorems and Relational Logic for f-divergences between Probabilistic Programs.
Proceedings of the Automata, Languages, and Programming - 40th International Colloquium, 2013
Proceedings of the Foundations of Security Analysis and Design VII, 2013
Proceedings of the 2013 IEEE 26th Computer Security Foundations Symposium, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
2012
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
Full Proof Cryptography: Verifiable Compilation of Efficient Zero-Knowledge Protocols.
IACR Cryptol. ePrint Arch., 2012
Proceedings of the Static Analysis - 19th International Symposium, 2012
Proceedings of the Mathematics of Program Construction - 11th International Conference, 2012
Proceedings of the Interactive Theorem Proving - Third International Conference, 2012
Proceedings of the Formal Techniques for Distributed Systems, 2012
Proceedings of the Programming Languages and Systems, 2012
Proceedings of the 25th IEEE Computer Security Foundations Symposium, 2012
Proceedings of the 25th IEEE Computer Security Foundations Symposium, 2012
Proceedings of the Certified Programs and Proofs - Second International Conference, 2012
2011
IACR Cryptol. ePrint Arch., 2011
Proceedings of the Trustworthy Global Computing - 6th International Symposium, 2011
Proceedings of the Provable Security - 5th International Conference, 2011
Proceedings of the Foundations and Practice of Security, 2011
Proceedings of the FM 2011: Formal Methods, 2011
Formally Verifying Isolation and Availability in an Idealized Model of Virtualization.
Proceedings of the FM 2011: Formal Methods, 2011
Proceedings of the Topics in Cryptology - CT-RSA 2011, 2011
Proceedings of the Advances in Cryptology - CRYPTO 2011, 2011
2010
ACM Trans. Inf. Syst. Secur., 2010
Proceedings of the Trustworthly Global Computing - 5th International Symposium, 2010
Proceedings of the Logic for Programming, Artificial Intelligence, and Reasoning, 2010
Proceedings of the Interactive Theorem Proving, First International Conference, 2010
Proceedings of the Functional and Logic Programming, 10th International Symposium, 2010
Proceedings of the 23rd IEEE Computer Security Foundations Symposium, 2010
Proceedings of the 23rd IEEE Computer Security Foundations Symposium, 2010
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
2009
ACM Trans. Program. Lang. Syst., 2009
Proceedings of the 30th IEEE Symposium on Security and Privacy (SP 2009), 2009
Proceedings of the 36th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2009
Proceedings of the Formal Methods and Software Engineering, 2009
2008
Proceedings of the Sixth IEEE International Conference on Software Engineering and Formal Methods, 2008
Proceedings of the Language Engineering and Rigorous Software Development, International LerNet ALFA Summer School 2008, Piriapolis, Uruguay, February 24, 2008
Proceedings of the Formal Aspects in Security and Trust, 5th International Workshop, 2008
Proceedings of the Foundations of Security Analysis and Design V, 2008
Proceedings of the 7th Workshop on Foundations of Aspect-Oriented Languages, 2008
Proceedings of the Programming Languages and Systems, 2008
Proceedings of the Computer Science Logic, 22nd International Workshop, 2008
Proceedings of the 21st IEEE Computer Security Foundations Symposium, 2008
Proceedings of the Automated Reasoning, 4th International Joint Conference, 2008
Proceedings of the 5th International Verification Workshop in connection with IJCAR 2008, 2008
Proceedings of the Programming Languages and Systems, 6th Asian Symposium, 2008
2007
J. Comput. Secur., 2007
Proceedings of the Formal Methods for Components and Objects, 6th International Symposium, 2007
Proceedings of the Mobility, Ubiquity and Security, 25.02. - 02.03.2007, 2007
Proceedings of the Mobility, Ubiquity and Security, 25.02. - 02.03.2007, 2007
2006
J. Funct. Program., 2006
Proceedings of the Trustworthy Global Computing, Second Symposium, 2006
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006
CIC[^( )]: Type-Based Termination of Recursive Definitions in the Calculus of Inductive Constructions.
Proceedings of the Logic for Programming, 2006
Proceedings of the Formal Methods for Components and Objects, 5th International Symposium, 2006
Defining and Reasoning About Recursive Functions: A Practical Tool for the Coq Proof Assistant.
Proceedings of the Functional and Logic Programming, 8th International Symposium, 2006
2005
Math. Struct. Comput. Sci., 2005
J. Autom. Reason., 2005
Proceedings of the Third Workshop on Quantitative Aspects of Programming Languages, 2005
Proceedings of TLDI'05: 2005 ACM SIGPLAN International Workshop on Types in Languages Design and Implementation, 2005
Proceedings of the Typed Lambda Calculi and Applications, 7th International Conference, 2005
Proceedings of the Third IEEE International Conference on Software Engineering and Formal Methods (SEFM 2005), 2005
Proceedings of the Formal Aspects in Security and Trust, Third International Workshop, 2005
Proceedings of the Foundations of Security Analysis and Design III, 2005
2004
Introduction to the Special Issue on Dependent Type Theory Meets Practical Programming.
J. Funct. Program., 2004
Proceedings of the Verification, 2004
Proceedings of the Types for Proofs and Programs, International Workshop, 2004
Proceedings of the Fundamental Approaches to Software Engineering, 2004
Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering, 2004
Proceedings of the Smart Card Research and Advanced Applications VI, 2004
Proceedings of the Automated Reasoning - Second International Joint Conference, 2004
2003
Proceedings of the Rewriting Techniques and Applications, 14th International Conference, 2003
Proceedings of the Conference Record of POPL 2003: The 30th SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2003
2002
Proceedings of the Verification, 2002
Proceedings of the Theorem Proving in Higher Order Logics, 15th International Conference, 2002
Proceedings of the 2002 ACM SIGPLAN Workshop on Partial Evaluation and Semantics-Based Program Manipulation (PEPM '02), 2002
Proceedings of the Fundamental Approaches to Software Engineering, 2002
Proceedings of the Algebraic Methodology and Software Technology, 2002
2001
Weak normalization implies strong normalization in a class of non-dependent pure type systems.
Theor. Comput. Sci., 2001
Proceedings of the Foundations of Software Science and Computation Structures, 2001
Proceedings of the Programming Languages and Systems, 2001
Proceedings of the Smart Card Programming and Security, 2001
Tipos principales y cierre semi-completo para sistemas de tipos puros extendidos (trabajo en desarrollo).
Proceedings of the APPIA-GULP-PRODE 2001: Joint Conference on Declarative Programming, 2001
2000
Proceedings of the Logic for Programming and Automated Reasoning, 2000
Proceedings of the Foundations of Software Science and Computation Structures, 2000
Proceedings of the Applied Semantics, International Summer School, 2000
1999
High. Order Symb. Comput., 1999
Proceedings of the Foundations of Software Science and Computation Structure, 1999
Proceedings of the Functional and Logic Programming, 4th Fuji International Symposium, 1999
1998
Proceedings of the Mathematical Foundations of Computer Science 1998, 1998
Proceedings of the Automata, Languages and Programming, 25th International Colloquium, 1998
Existence and Uniqueness of Normal Forms in Pure Type Systems with betaeta-Conversion.
Proceedings of the Computer Science Logic, 12th International Workshop, 1998
1997
Proceedings of the Second Workshop on Higher-Order Operational Techniques in Semantics, 1997
Proceedings of the Thirteenth Annual Conference on Mathematical Foundations of Progamming Semantics, 1997
Proceedings of the Programming Languages: Implementations, 1997
Proceedings of the Algebraic and Logic Programming, 6th International Joint Conference, 1997
Proceedings of the Algebraic and Logic Programming, 6th International Joint Conference, 1997
1996
Proceedings of the Design and Implementation of Symbolic Computation Systems, 1996
Proceedings of the Computer Science Logic, 10th International Workshop, 1996
1995
Proceedings of the Types for Proofs and Programs, 1995
Proceedings of the Types for Proofs and Programs, 1995
Proceedings of the Typed Lambda Calculi and Applications, 1995
Proceedings of the Higher-Order Algebra, 1995
Proceedings of the Fundamentals of Computation Theory, 10th International Symposium, 1995
Proceedings of the Computer Science Logic, 9th International Workshop, 1995