What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Cédric Fournet
Google Scholar
37
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/uss
Transparent Attested DNS for Confidential Computing Services.
Antoine Delignat-Lavaud
Cédric Fournet
Kapil Vaswani
Manuel Costa
Sylvan Clebsch
Christoph M. Wintersteiger
2024
conf/ccs
Gaussian Elimination of Side-Channels: Linear Algebra for Memory Coloring.
Jana Hofmann
Cédric Fournet
Boris Köpf
Stavros Volos
2024
conf/ccs
Principled Microarchitectural Isolation on Cloud CPUs.
Stavros Volos
Cédric Fournet
Jana Hofmann
Boris Köpf
Oleksii Oleksenko
2023
conf/uss
Speculation at Fault: Modeling and Testing Microarchitectural Leakage of CPU Exceptions.
Jana Hofmann
Emanuele Vannacci
Cédric Fournet
Boris Köpf
Oleksii Oleksenko
2022
conf/asiacrypt
Key-Schedule Security for the TLS 1.3 Standard.
Chris Brzuska
Antoine Delignat-Lavaud
Christoph Egger
Cédric Fournet
Konrad Kohbrok
Markulf Kohlweiss
2021
conf/sp
A Security Model and Fully Verified Implementation for the IETF QUIC Record Layer.
Antoine Delignat-Lavaud
Cédric Fournet
Bryan Parno
Jonathan Protzenko
Tahina Ramananandro
Jay Bosamiya
Joseph Lallemand
Itsaka Rakotonirina
Yi Zhou
2020
conf/sp
EverCrypt: A Fast, Verified, Cross-Platform Cryptographic Provider.
Jonathan Protzenko
Bryan Parno
Aymeric Fromherz
Chris Hawblitzel
Marina Polubelova
Karthikeyan Bhargavan
Benjamin Beurdouche
Joonwon Choi
Antoine Delignat-Lavaud
Cédric Fournet
Natalia Kulatova
Tahina Ramananandro
Aseem Rastogi
Nikhil Swamy
Christoph M. Wintersteiger
Santiago Zanella-Béguelin
2019
conf/uss
EverParse: Verified Secure Zero-Copy Parsers for Authenticated Message Formats.
Tahina Ramananandro
Antoine Delignat-Lavaud
Cédric Fournet
Nikhil Swamy
Tej Chajed
Nadim Kobeissi
Jonathan Protzenko
2018
conf/asiacrypt
State Separation for Code-Based Game-Playing Proofs.
Chris Brzuska
Antoine Delignat-Lavaud
Cédric Fournet
Konrad Kohbrok
Markulf Kohlweiss
2017
conf/sp
Implementing and Proving the TLS 1.3 Record Layer.
Antoine Delignat-Lavaud
Cédric Fournet
Markulf Kohlweiss
Jonathan Protzenko
Aseem Rastogi
Nikhil Swamy
Santiago Zanella-Béguelin
Karthikeyan Bhargavan
Jianyang Pan
Jean Karim Zinzindohoue
2016
conf/ccs
Hash First, Argue Later: Adaptive Verifiable Computations on Outsourced Data.
Dario Fiore
Cédric Fournet
Esha Ghosh
Markulf Kohlweiss
Olga Ohrimenko
Bryan Parno
2016
conf/ccs
Formal Verification of Smart Contracts: Short Paper.
Karthikeyan Bhargavan
Antoine Delignat-Lavaud
Cédric Fournet
Anitha Gollamudi
Georges Gonthier
Nadim Kobeissi
Natalia Kulatova
Aseem Rastogi
Thomas Sibut-Pinote
Nikhil Swamy
Santiago Zanella-Béguelin
2016
conf/ccs
Verified Secure Implementations for the HTTPS Ecosystem: Invited Talk.
Cédric Fournet
2016
conf/uss
Oblivious Multi-Party Machine Learning on Trusted Processors.
Olga Ohrimenko
Felix Schuster
Cédric Fournet
Aastha Mehta
Sebastian Nowozin
Kapil Vaswani
Manuel Costa
2016
conf/sp
Downgrade Resilience in Key-Exchange Protocols.
Karthikeyan Bhargavan
Christina Brzuska
Cédric Fournet
Matthew Green
Markulf Kohlweiss
Santiago Zanella-Béguelin
2016
conf/sp
Cinderella: Turning Shabby X.509 Certificates into Elegant Anonymous Credentials with the Magic of Verifiable Computation.
Antoine Delignat-Lavaud
Cédric Fournet
Markulf Kohlweiss
Bryan Parno
2015
conf/ccs
Observing and Preventing Leakage in MapReduce.
Olga Ohrimenko
Manuel Costa
Cédric Fournet
Christos Gkantsidis
Markulf Kohlweiss
Divya Sharma
2015
conf/sp
Geppetto: Versatile Verifiable Computation.
Craig Costello
Cédric Fournet
Jon Howell
Markulf Kohlweiss
Benjamin Kreuter
Michael Naehrig
Bryan Parno
Samee Zahur
2015
conf/sp
A Messy State of the Union: Taming the Composite State Machines of TLS.
Benjamin Beurdouche
Karthikeyan Bhargavan
Antoine Delignat-Lavaud
Cédric Fournet
Markulf Kohlweiss
Alfredo Pironti
Pierre-Yves Strub
Jean Karim Zinzindohoue
2015
conf/sp
VC3: Trustworthy Data Analytics in the Cloud Using SGX.
Felix Schuster
Manuel Costa
Cédric Fournet
Christos Gkantsidis
Marcus Peinado
Gloria Mainar-Ruiz
Mark Russinovich
2014
conf/crypto
Proving the TLS Handshake Secure (As It Is).
Karthikeyan Bhargavan
Cédric Fournet
Markulf Kohlweiss
Alfredo Pironti
Pierre-Yves Strub
Santiago Zanella-Béguelin
2014
conf/sp
Triple Handshakes and Cookie Cutters: Breaking and Fixing Authentication over TLS.
Karthikeyan Bhargavan
Antoine Delignat-Lavaud
Cédric Fournet
Alfredo Pironti
Pierre-Yves Strub
2014
conf/asiacrypt
Square Span Programs with Applications to Succinct NIZK Arguments.
George Danezis
Cédric Fournet
Jens Groth
Markulf Kohlweiss
2013
conf/ccs
Smart meter aggregation via secret-sharing.
George Danezis
Cédric Fournet
Markulf Kohlweiss
Santiago Zanella-Béguelin
2013
conf/ccs
Pinocchio coin: building zerocoin from a succinct pairing-based proof system.
George Danezis
Cédric Fournet
Markulf Kohlweiss
Bryan Parno
2013
conf/uss
ZQL: A Compiler for Privacy-Preserving Data Processing.
Cédric Fournet
Markulf Kohlweiss
George Danezis
Zhengqin Luo
2013
conf/sp
Implementing TLS with Verified Cryptographic Security.
Karthikeyan Bhargavan
Cédric Fournet
Markulf Kohlweiss
Alfredo Pironti
Pierre-Yves Strub
2011
conf/ccs
Modular code-based cryptographic verification.
Cédric Fournet
Markulf Kohlweiss
Pierre-Yves Strub
2011
conf/ccs
Information-flow types for homomorphic encryptions.
Cédric Fournet
Jérémy Planul
Tamara Rezk
2009
conf/ccs
A security-preserving compiler for distributed programs: from information-flow policies to cryptographic mechanisms.
Cédric Fournet
Gurvan Le Guernic
Tamara Rezk
2009
conf/esorics
Reliable Evidence: Auditability by Typing.
Nataliya Guts
Cédric Fournet
Francesco Zappa Nardelli
2008
conf/ccs
Cryptographically verified implementations for TLS.
Karthikeyan Bhargavan
Cédric Fournet
Ricardo Corin
Eugen Zalinescu
2008
conf/ccs
Verified implementations of the information card federated identity-management protocol.
Karthikeyan Bhargavan
Cédric Fournet
Andrew D. Gordon
Nikhil Swamy
2008
conf/esorics
Code-Carrying Authorization.
Sergio Maffeis
Martín Abadi
Cédric Fournet
Andrew D. Gordon
2004
conf/ccs
Verifying policy-based security for web services.
Karthikeyan Bhargavan
Cédric Fournet
Andrew D. Gordon
2003
conf/ndss
Access Control Based on Execution History.
Martín Abadi
Cédric Fournet
1999
conf/sp
Secure Communications Processing for Distributed Languages.
Martín Abadi
Cédric Fournet
Georges Gonthier
Coauthors
Aastha Mehta
(1)
Alfredo Pironti
(4)
Andrew D. Gordon
(3)
Anitha Gollamudi
(1)
Antoine Delignat-Lavaud
(11)
Aseem Rastogi
(3)
Aymeric Fromherz
(1)
Benjamin Beurdouche
(2)
Benjamin Kreuter
(1)
Boris Köpf
(3)
Bryan Parno
(6)
Cédric Fournet
(37)
Chris Brzuska
(2)
Chris Hawblitzel
(1)
Christina Brzuska
(1)
Christoph Egger
(1)
Christoph M. Wintersteiger
(2)
Christos Gkantsidis
(2)
Craig Costello
(1)
Dario Fiore
(1)
Divya Sharma
(1)
Emanuele Vannacci
(1)
Esha Ghosh
(1)
Eugen Zalinescu
(1)
Felix Schuster
(2)
Francesco Zappa Nardelli
(1)
George Danezis
(4)
Georges Gonthier
(2)
Gloria Mainar-Ruiz
(1)
Gurvan Le Guernic
(1)
Itsaka Rakotonirina
(1)
Jana Hofmann
(3)
Jay Bosamiya
(1)
Jean Karim Zinzindohoué
(2)
Jens Groth
(1)
Jérémy Planul
(1)
Jianyang Pan
(1)
Jon Howell
(1)
Jonathan Protzenko
(4)
Joonwon Choi
(1)
Joseph Lallemand
(1)
Kapil Vaswani
(2)
Karthikeyan Bhargavan
(11)
Konrad Kohbrok
(2)
Manuel Costa
(4)
Marcus Peinado
(1)
Marina Polubelova
(1)
Mark Russinovich
(1)
Markulf Kohlweiss
(16)
Martín Abadi
(3)
Matthew Green
(1)
Michael Naehrig
(1)
Nadim Kobeissi
(2)
Natalia Kulatova
(2)
Nataliya Guts
(1)
Nikhil Swamy
(5)
Oleksii Oleksenko
(2)
Olga Ohrimenko
(3)
Pierre-Yves Strub
(5)
Ricardo Corin
(1)
Samee Zahur
(1)
Santiago Zanella-Béguelin
(6)
Sebastian Nowozin
(1)
Sergio Maffeis
(1)
Stavros Volos
(2)
Sylvan Clebsch
(1)
Tahina Ramananandro
(3)
Tamara Rezk
(2)
Tej Chajed
(1)
Thomas Sibut-Pinote
(1)
Yi Zhou
(1)
Zhengqin Luo
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to