Formal verification of quantum programs: Theory, tools, and challenges
M Lewis, S Soudjani, P Zuliani - ACM Transactions on Quantum …, 2023 - dl.acm.org
Over the past 27 years, quantum computing has seen a huge rise in interest from both
academia and industry. At the current rate, quantum computers are growing in size rapidly …
academia and industry. At the current rate, quantum computers are growing in size rapidly …
Coqq: Foundational verification of quantum programs
CoqQ is a framework for reasoning about quantum programs in the Coq proof assistant. Its
main components are: a deeply embedded quantum programming language, in which …
main components are: a deeply embedded quantum programming language, in which …
Formally Verifying Kyber: Episode V: Machine-Checked IND-CCA Security and Correctness of ML-KEM in EasyCrypt
We present a formally verified proof of the correctness and IND-CCA security of ML-KEM, the
Kyber-based Key Encapsulation Mechanism (KEM) undergoing standardization by NIST …
Kyber-based Key Encapsulation Mechanism (KEM) undergoing standardization by NIST …
A logic and an interactive prover for the computational post-quantum security of protocols
C Cremers, C Fontaine… - 2022 IEEE Symposium on …, 2022 - ieeexplore.ieee.org
We provide the first mechanized post-quantum sound security protocol proofs. We achieve
this by develo** PQ-BC, a computational first-order logic that is sound with respect to …
this by develo** PQ-BC, a computational first-order logic that is sound with respect to …
[HTML][HTML] An optimized hybrid encryption framework for smart home healthcare: Ensuring data confidentiality and security
This study proposes an optimized hybrid encryption framework combining ECC-256r1 with
AES-128 in EAX mode, tailored for smart home healthcare environments, and conducts a …
AES-128 in EAX mode, tailored for smart home healthcare environments, and conducts a …
A quantitative probabilistic relational Hoare logic
We introduce eRHL, a program logic for reasoning about relational expectation properties of
pairs of probabilistic programs. eRHL is quantitative, ie, its pre-and post-conditions take …
pairs of probabilistic programs. eRHL is quantitative, ie, its pre-and post-conditions take …
Formally verifying Kyber
We present a formally verified proof of the correctness and IND-CCA security of ML-KEM, the
Kyber-based Key Encapsulation Mechanism (KEM) undergoing standardization by NIST …
Kyber-based Key Encapsulation Mechanism (KEM) undergoing standardization by NIST …
Formalizing Soundness Proofs of Linear {PCP}{SNARKs}
Succinct Non-interactive Arguments of Knowledge (SNARKs) have seen interest and
development from the cryptographic community over recent years, and there are now …
development from the cryptographic community over recent years, and there are now …
Formal verification of Saber's public-key encryption scheme in EasyCrypt
In this work, we consider the formal verification of the public-key encryption scheme of
Saber, one of the selected few post-quantum cipher suites currently considered for potential …
Saber, one of the selected few post-quantum cipher suites currently considered for potential …
Machine-Checked Security for as in RFC 8391 and
This work presents a novel machine-checked tight security proof for—a stateful hash-based
signature scheme that is (1) standardized in RFC 8391 and NIST SP 800-208, and (2) …
signature scheme that is (1) standardized in RFC 8391 and NIST SP 800-208, and (2) …