Formal verification of quantum programs: Theory, tools, and challenges

M Lewis, S Soudjani, P Zuliani - ACM Transactions on Quantum …, 2023 - dl.acm.org
Over the past 27 years, quantum computing has seen a huge rise in interest from both
academia and industry. At the current rate, quantum computers are growing in size rapidly …

Coqq: Foundational verification of quantum programs

L Zhou, G Barthe, PY Strub, J Liu, M Ying - Proceedings of the ACM on …, 2023 - dl.acm.org
CoqQ is a framework for reasoning about quantum programs in the Coq proof assistant. Its
main components are: a deeply embedded quantum programming language, in which …

Formally Verifying Kyber: Episode V: Machine-Checked IND-CCA Security and Correctness of ML-KEM in EasyCrypt

JB Almeida, S Arranz Olmos, M Barbosa… - Annual International …, 2024 - Springer
We present a formally verified proof of the correctness and IND-CCA security of ML-KEM, the
Kyber-based Key Encapsulation Mechanism (KEM) undergoing standardization by NIST …

A logic and an interactive prover for the computational post-quantum security of protocols

C Cremers, C Fontaine… - 2022 IEEE Symposium on …, 2022 - ieeexplore.ieee.org
We provide the first mechanized post-quantum sound security protocol proofs. We achieve
this by develo** PQ-BC, a computational first-order logic that is sound with respect to …

[HTML][HTML] An optimized hybrid encryption framework for smart home healthcare: Ensuring data confidentiality and security

O Popoola, MA Rodrigues, J Marchang, A Shenfield… - Internet of Things, 2024 - Elsevier
This study proposes an optimized hybrid encryption framework combining ECC-256r1 with
AES-128 in EAX mode, tailored for smart home healthcare environments, and conducts a …

A quantitative probabilistic relational Hoare logic

M Avanzini, G Barthe, D Davoli, B Grégoire - Proceedings of the ACM on …, 2025 - dl.acm.org
We introduce eRHL, a program logic for reasoning about relational expectation properties of
pairs of probabilistic programs. eRHL is quantitative, ie, its pre-and post-conditions take …

Formally verifying Kyber

JB Almeida, SA Olmos, M Barbosa, G Barthe… - 2024 - hal.science
We present a formally verified proof of the correctness and IND-CCA security of ML-KEM, the
Kyber-based Key Encapsulation Mechanism (KEM) undergoing standardization by NIST …

Formalizing Soundness Proofs of Linear {PCP}{SNARKs}

B Bailey, A Miller - 33rd USENIX Security Symposium (USENIX Security …, 2024 - usenix.org
Succinct Non-interactive Arguments of Knowledge (SNARKs) have seen interest and
development from the cryptographic community over recent years, and there are now …

Formal verification of Saber's public-key encryption scheme in EasyCrypt

A Hülsing, M Meijers, PY Strub - Annual International Cryptology …, 2022 - Springer
In this work, we consider the formal verification of the public-key encryption scheme of
Saber, one of the selected few post-quantum cipher suites currently considered for potential …

Machine-Checked Security for as in RFC 8391 and

M Barbosa, F Dupressoir, B Grégoire, A Hülsing… - Annual International …, 2023 - Springer
This work presents a novel machine-checked tight security proof for—a stateful hash-based
signature scheme that is (1) standardized in RFC 8391 and NIST SP 800-208, and (2) …