Follow
Gilles Barthe
Gilles Barthe
MPI-SP and IMDEA Software Institute
Verified email at mpi-sp.org - Homepage
Title
Cited by
Cited by
Year
Secure information flow by self-composition
G Barthe, P D'Argenio, T Rezk
17th IEEE Computer Security Foundations Workshop, 2004, 100-114, 2004
633*2004
Formal certification of code-based cryptographic proofs
G Barthe, B Grégoire, S Zanella Béguelin
Proceedings of the 36th annual ACM SIGPLAN-SIGACT symposium on Principles of …, 2009
4322009
Privacy profiles and amplification by subsampling
B Balle, G Barthe, M Gaboardi
Journal of Privacy and Confidentiality 10 (1), 2020
426*2020
Computer-aided security proofs for the working cryptographer
G Barthe, B Grégoire, S Heraud, SZ Béguelin
Annual Cryptology Conference, 71-90, 2011
3742011
Model-agnostic counterfactual explanations for consequential decisions
AH Karimi, G Barthe, B Balle, I Valera
International conference on artificial intelligence and statistics, 895-905, 2020
3552020
Verifying Constant-Time Implementations
JB Almeida, M Barbosa, G Barthe, F Dupressoir, M Emmi
25th USENIX Security Symposium (USENIX Security 16), 53-70, 2016
3422016
A survey of algorithmic recourse: contrastive explanations and consequential recommendations
AH Karimi, G Barthe, B Schölkopf, I Valera
ACM Computing Surveys 55 (5), 1-29, 2022
317*2022
Strong non-interference and type-directed higher-order masking
G Barthe, S Belaïd, F Dupressoir, PA Fouque, B Grégoire, PY Strub, ...
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
307*2016
Probabilistic relational reasoning for differential privacy
G Barthe, B Köpf, F Olmedo, S Zanella Beguelin
Proceedings of the 39th annual ACM SIGPLAN-SIGACT symposium on Principles of …, 2012
2872012
Relational verification using product programs
G Barthe, JM Crespo, C Kunz
International Symposium on Formal Methods, 200-214, 2011
2832011
Easycrypt: A tutorial
G Barthe, F Dupressoir, B Grégoire, C Kunz, B Schmidt, PY Strub
International School on Foundations of Security Analysis and Design, 146-166, 2012
2252012
Verified proofs of higher-order masking
G Barthe, S Belaïd, F Dupressoir, PA Fouque, B Grégoire, PY Strub
Annual International Conference on the Theory and Applications of …, 2015
2012015
SoK: Computer-aided cryptography
M Barbosa, G Barthe, K Bhargavan, B Blanchet, C Cremers, K Liao, ...
2021 IEEE symposium on security and privacy (SP), 777-795, 2021
2002021
Jasmin: High-assurance and high-speed cryptography
JB Almeida, M Barbosa, G Barthe, A Blot, B Grégoire, V Laporte, ...
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
1892017
System-level non-interference for constant-time cryptography
G Barthe, G Betarte, J Campo, C Luna, D Pichardie
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
1822014
Parallel implementations of masking schemes and the bounded moment leakage model
G Barthe, F Dupressoir, S Faust, B Grégoire, FX Standaert, PY Strub
Advances in Cryptology–EUROCRYPT 2017: 36th Annual International Conference …, 2017
1672017
A certified lightweight non-interference Java bytecode verifier
G Barthe, D Pichardie, T Rezk
Mathematical Structures in Computer Science 23 (5), 1032-1081, 2013
155*2013
Type-based termination of recursive definitions
G Barthe, MJ Frade, E Giménez, L Pinto, T Uustalu
Mathematical structures in computer science 14 (1), 97-141, 2004
1462004
Constant-time foundations for the new spectre era
S Cauligi, C Disselkoen, K Gleissenthall, D Tullsen, D Stefan, T Rezk, ...
Proceedings of the 41st ACM SIGPLAN Conference on Programming Language …, 2020
1422020
Probabilistic relational verification for cryptographic implementations
G Barthe, C Fournet, B Grégoire, PY Strub, N Swamy, S Zanella-Béguelin
ACM SIGPLAN Notices 49 (1), 193-205, 2014
1342014
The system can't perform the operation now. Try again later.
Articles 1–20