Imperfect forward secrecy: How Diffie-Hellman fails in practice D Adrian, K Bhargavan, Z Durumeric, P Gaudry, M Green, JA Halderman, ... Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 668 | 2015 |
Formal verification of smart contracts: Short paper K Bhargavan, A Delignat-Lavaud, C Fournet, A Gollamudi, G Gonthier, ... Proceedings of the 2016 ACM workshop on programming languages and analysis …, 2016 | 656 | 2016 |
Dependent types and multi-monadic effects in F N Swamy, C Hriţcu, C Keller, A Rastogi, A Delignat-Lavaud, S Forest, ... Proceedings of the 43rd annual ACM SIGPLAN-SIGACT Symposium on Principles of …, 2016 | 386 | 2016 |
A messy state of the union: Taming the composite state machines of TLS B Beurdouche, K Bhargavan, A Delignat-Lavaud, C Fournet, M Kohlweiss, ... Communications of the ACM 60 (2), 99-107, 2017 | 374 | 2017 |
Refinement types for secure implementations J Bengtson, K Bhargavan, C Fournet, AD Gordon, S Maffeis ACM Transactions on Programming Languages and Systems (TOPLAS) 33 (2), 1-45, 2011 | 311 | 2011 |
Triple handshakes and cookie cutters: Breaking and fixing authentication over TLS K Bhargavan, AD Lavaud, C Fournet, A Pironti, PY Strub 2014 IEEE Symposium on Security and Privacy, 98-113, 2014 | 263 | 2014 |
Secure distributed programming with value-dependent types N Swamy, J Chen, C Fournet, PY Strub, K Bhargavan, J Yang ACM SIGPLAN Notices 46 (9), 266-278, 2011 | 262 | 2011 |
Formal verification of standards for distance vector routing protocols K Bhargavan, D Obradovic, CA Gunter Journal of the ACM (JACM) 49 (4), 538-576, 2002 | 244 | 2002 |
Implementing TLS with verified cryptographic security K Bhargavan, C Fournet, M Kohlweiss, A Pironti, PY Strub 2013 IEEE Symposium on Security and Privacy, 445-459, 2013 | 235 | 2013 |
HACL*: A verified modern cryptographic library JK Zinzindohoué, K Bhargavan, J Protzenko, B Beurdouche Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 233 | 2017 |
On the practical (in-) security of 64-bit block ciphers: Collision attacks on HTTP over TLS and OpenVPN K Bhargavan, G Leurent Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 231 | 2016 |
Verified models and reference implementations for the TLS 1.3 standard candidate K Bhargavan, B Blanchet, N Kobeissi 2017 IEEE Symposium on Security and Privacy (SP), 483-502, 2017 | 219 | 2017 |
Verified interoperable implementations of security protocols K Bhargavan, C Fournet, AD Gordon, S Tse ACM Transactions on Programming Languages and Systems (TOPLAS) 31 (1), 1-61, 2008 | 213 | 2008 |
Discovering concrete attacks on website authorization by formal analysis C Bansal, K Bhargavan, A Delignat-Lavaud, S Maffeis Journal of Computer Security 22 (4), 601-657, 2014 | 191 | 2014 |
Automated verification for secure messaging protocols and their implementations: A symbolic and computational approach N Kobeissi, K Bhargavan, B Blanchet 2017 IEEE European symposium on security and privacy (EuroS&P), 435-450, 2017 | 161 | 2017 |
Modular verification of security protocol code by typing K Bhargavan, C Fournet, AD Gordon ACM Sigplan Notices 45 (1), 445-456, 2010 | 160 | 2010 |
Cryptographically verified implementations for TLS K Bhargavan, C Fournet, R Corin, E Zalinescu Proceedings of the 15th ACM conference on computer and Communications …, 2008 | 147 | 2008 |
Transcript collision attacks: Breaking authentication in TLS, IKE, and SSH K Bhargavan, G Leurent Network and Distributed System Security Symposium--NDSS 2016, 2016 | 143 | 2016 |
Cryptographic protocol synthesis and verification for multiparty sessions K Bhargavan, R Corin, PM Deniélou, C Fournet, JJ Leifer 2009 22nd IEEE Computer Security Foundations Symposium, 124-140, 2009 | 126 | 2009 |
Verisim: Formal analysis of network simulations K Bhargavan, CA Gunter, M Kim, I Lee, D Obradovic, O Sokolsky, ... IEEE Transactions on Software Engineering 28 (2), 129-145, 2002 | 126 | 2002 |