Proceedings of the 2013 ACM SIGSAC Conference on Computer &Amp; Communications Security - CCS '13 2013
DOI: 10.1145/2508859.2516652
|View full text |Cite
|
Sign up to set email alerts
|

Certified computer-aided cryptography

Abstract: We present a computer-aided framework for proving concrete security bounds for cryptographic machine code implementations. The front-end of the framework is an interactive verification tool that extends the EasyCrypt framework to reason about relational properties of C-like programs extended with idealised probabilistic operations in the style of code-based security proofs. The framework also incorporates an extension of the CompCert certified compiler to support trusted libraries providing complex arithmetic … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
5
2

Relationship

3
4

Authors

Journals

citations
Cited by 30 publications
(4 citation statements)
references
References 29 publications
0
4
0
Order By: Relevance
“…Finally, several other works focus on secure refinement for a certain class of programs, e.g., stream processing functions [36], schedulers [11], cryptographic algorithms [37,38], or security protocols [39,40]. These approaches typically employ models tailored to their use case and the specific desired information flow properties.…”
Section: Morgan and Mcivermentioning
confidence: 99%
“…Finally, several other works focus on secure refinement for a certain class of programs, e.g., stream processing functions [36], schedulers [11], cryptographic algorithms [37,38], or security protocols [39,40]. These approaches typically employ models tailored to their use case and the specific desired information flow properties.…”
Section: Morgan and Mcivermentioning
confidence: 99%
“…In the following, we use Keccak-p as shorthand for this permutation. 2 In this section we first describe the Sponge construction and the SHA-3 functions. Then we explain how the Sponge construction offers very strong security properties, when the underlying permutation is modelled as a purely random object, and why this gives strong heuristic evidence for the security of the SHA-3 functions in real world use.…”
Section: Technical Overviewmentioning
confidence: 99%
“…the padding algorithm pad, and iii. the rate (or block size) r. We write c for the construction's 2 We note that the standard in fact defines a family of permutations, indexed by state size and number of rounds, but only approves Keccak-p[1600, 24] for use in SHA-3 and other standards. All discussions related to the permutation in this paper focus on Keccak-p[1600, 24] unless otherwise specified.…”
Section: The Sponge Constructionmentioning
confidence: 99%
See 1 more Smart Citation