Signed cryptographic program verification with typed cryptoline YF Fu, J Liu, X Shi, MH Tsai, BY Wang, BY Yang Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 31 | 2019 |
Handcrafted inversions made operational on operational semantics JF Monin, X Shi International Conference on Interactive Theorem Proving, 338-353, 2013 | 20 | 2013 |
Verifying arithmetic in cryptographic C programs J Liu, X Shi, MH Tsai, BY Wang, BY Yang 2019 34th IEEE/ACM International Conference on Automated Software …, 2019 | 19 | 2019 |
Designing a CPU model: from a pseudo-formal document to fast code F Blanqui, C Helmstetter, V Joloboff, JF Monin, X Shi arXiv preprint arXiv:1109.4351, 2011 | 17 | 2011 |
Abstraction and refinement: Towards scalable and exact verification of neural networks J Liu, Y Xing, X Shi, F Song, Z Xu, Z Ming ACM Transactions on Software Engineering and Methodology 33 (5), 1-35, 2024 | 16 | 2024 |
Verified NTT multiplications for NISTPQC KEM lattice finalists: Kyber, SABER, and NTRU V Hwang, J Liu, G Seiler, X Shi, MH Tsai, BY Wang, BY Yang IACR Transactions on Cryptographic Hardware and Embedded Systems, 718-750, 2022 | 16 | 2022 |
First steps towards the certification of an ARM simulator using Compcert X Shi, JF Monin, F Tuong, F Blanqui International Conference on Certified Programs and Proofs, 346-361, 2011 | 14 | 2011 |
CoqQFBV: a scalable certified SMT quantifier-free bit-vector solver X Shi, YF Fu, J Liu, MH Tsai, BY Wang, BY Yang Computer Aided Verification: 33rd International Conference, CAV 2021 …, 2021 | 12 | 2021 |
Safety analysis and optimization for networked avionics system C Zhang, X Shi, D Chen 2014 IEEE/AIAA 33rd Digital Avionics Systems Conference (DASC), 4C1-1-4C1-12, 2014 | 7 | 2014 |
Certification of an instruction set simulator X Shi Université de Grenoble, 2013 | 6 | 2013 |
Automatic certified verification of cryptographic programs with COQCRYPTOLINE MH Tsai, YF Fu, X Shi, J Liu, BY Wang, BY Yang Cryptology ePrint Archive, 2022 | 4 | 2022 |
Towards verified faithful simulation V Joloboff, JF Monin, X Shi Dependable Software Engineering: Theories, Tools, and Applications: First …, 2015 | 3 | 2015 |
Analyse d'un modèle AADL à l'aide de Pola PE Hladik, F Peres, X Shi 10es journées Francophones sur les Approches Formelles dans l'Assistance au …, 2010 | 3 | 2010 |
Automatic verification of cryptographic block function implementations with logical equivalence checking LC Lai, J Liu, X Shi, MH Tsai, BY Wang, BY Yang European Symposium on Research in Computer Security, 377-395, 2024 | 2 | 2024 |
llvm2CryptoLine: Verifying Arithmetic in Cryptographic C Programs R Chen, J Liu, X Shi, MH Tsai, BY Wang, BY Yang Proceedings of the 31st ACM Joint European Software Engineering Conference …, 2023 | 1 | 2023 |
Certified Verification for Algebraic Abstraction MH Tsai, YF Fu, J Liu, X Shi, BY Wang, BY Yang International Conference on Computer Aided Verification, 329-349, 2023 | 1 | 2023 |
MpBP: verifying robustness of neural networks with multi-path bound propagation Y Zheng, J Liu, X Shi Proceedings of the 30th ACM Joint European Software Engineering Conference …, 2022 | 1 | 2022 |
Correction to: CoqCryptoLine: A Verified Model Checker with Certified Results MH Tsai, YF Fu, J Liu, X Shi, BY Wang, BY Yang International Conference on Computer Aided Verification, C1-C1, 2023 | | 2023 |
CoqCryptoLine: A Verified Model Checker with Certified Results MH Tsai, YF Fu, J Liu, X Shi, BY Wang, BY Yang International Conference on Computer Aided Verification, 227-240, 2023 | | 2023 |
Multi-path Back-propagation Method for Neural Network Verification. Y Zheng, X Shi, J Liu Int. J. Softw. Informatics 12 (4), 377-401, 2022 | | 2022 |