D-Index & Metrics Best Publications

D-Index & Metrics

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 31 Citations 8,082 67 World Ranking 7969 National Ranking 201

Overview

What is he best known for?

The fields of study he is best known for:

  • Programming language
  • Computer network
  • Cryptography

Bruno Blanchet focuses on Cryptographic protocol, Theoretical computer science, Cryptography, Cryptographic primitive and Secrecy. His work in the fields of Theoretical computer science, such as Pi calculus, intersects with other areas such as Context and Process. His Cryptography research is multidisciplinary, incorporating elements of Process calculus and Programming language.

The study incorporates disciplines such as Correctness, Message authentication code, Authentication and Universal composability in addition to Cryptographic primitive. His research integrates issues of Forward secrecy and Prolog in his study of Correctness. His biological study spans a wide range of topics, including Equivalence, Adversary, Data security and Logic programming.

His most cited work include:

  • An efficient cryptographic protocol verifier based on prolog rules (803 citations)
  • A static analyzer for large safety-critical software (589 citations)
  • Escape analysis for object-oriented languages: application to Java (281 citations)

What are the main themes of his work throughout his whole career to date?

The scientist’s investigation covers issues in Cryptographic protocol, Theoretical computer science, Cryptographic primitive, Programming language and Observational equivalence. His study in Cryptographic protocol is interdisciplinary in nature, drawing from both Formal methods, Secrecy and Horn clause. His studies deal with areas such as Adversary, Hash function, Authentication and Public-key cryptography as well as Theoretical computer science.

His work carried out in the field of Cryptographic primitive brings together such families of science as Message authentication code and Universal composability. His research in the fields of Logic programming and Java overlaps with other disciplines such as Escape analysis and The Symbolic. The concepts of his Cryptography study are interwoven with issues in Correctness, Encryption, Key and Prolog.

He most often published in these fields:

  • Cryptographic protocol (82.47%)
  • Theoretical computer science (61.86%)
  • Cryptographic primitive (43.30%)

What were the highlights of his more recent work (between 2015-2021)?

  • Cryptographic protocol (82.47%)
  • Observational equivalence (25.77%)
  • Formal methods (24.74%)

In recent papers he was focusing on the following fields of study:

His primary areas of investigation include Cryptographic protocol, Observational equivalence, Formal methods, Reachability and Programming language. His research combines Theoretical computer science and Cryptographic protocol. Bruno Blanchet usually deals with Observational equivalence and limits it to topics linked to Calculus and Equivalence.

His Protocol verification, Software and Pi calculus study in the realm of Programming language interacts with subjects such as Basis and Semantics. The various areas that Bruno Blanchet examines in his Cryptographic primitive study include Horn clause and Encryption. His Cryptography study combines topics in areas such as Correctness, Authentication and Key.

Between 2015 and 2021, his most popular works were:

  • Modeling and Verifying Security Protocols with the Applied Pi Calculus and ProVerif (89 citations)
  • Automated Verification for Secure Messaging Protocols and Their Implementations: A Symbolic and Computational Approach (62 citations)
  • Verified Models and Reference Implementations for the TLS 1.3 Standard Candidate (54 citations)

In his most recent research, the most cited papers focused on:

  • Programming language
  • Computer network
  • Algorithm

Bruno Blanchet spends much of his time researching Cryptographic protocol, Protocol, Cryptographic primitive, Cryptography and Theoretical computer science. His Cryptographic protocol research incorporates themes from Protocol verification, Transport Layer Security, Secrecy and Process calculus. His Protocol verification research includes elements of Formal methods, Observational equivalence and Reachability.

His Transport Layer Security research integrates issues from Handshake and Distributed computing. His Secrecy research is multidisciplinary, relying on both Authentication, Horn clause and Resolution. His work in Process calculus addresses issues such as Construct, which are connected to fields such as Calculus of communicating systems.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

An efficient cryptographic protocol verifier based on prolog rules

B. Blanchet.
ieee computer security foundations symposium (2001)

1318 Citations

A static analyzer for large safety-critical software

Bruno Blanchet;Patrick Cousot;Radhia Cousot;Jérome Feret.
programming language design and implementation (2003)

819 Citations

Automated verification of selected equivalences for security protocols

Bruno Blanchet;Martín Abadi;Cédric Fournet.
The Journal of Logic and Algebraic Programming (2008)

445 Citations

Escape analysis for object-oriented languages: application to Java

Bruno Blanchet.
conference on object-oriented programming systems, languages, and applications (1999)

389 Citations

Design and implementation of a special-purpose static program analyzer for safety-critical real-time embedded software

Bruno Blanchet;Patrick Cousot;Radhia Cousot;Jérôme Feret.
Lecture Notes in Computer Science (2002)

280 Citations

Automatic verification of correspondences for security protocols

Bruno Blanchet.
Journal of Computer Security (2009)

271 Citations

Automatic proof of strong secrecy for security protocols

B. Blanchet.
ieee symposium on security and privacy (2004)

235 Citations

A computationally sound mechanized prover for security protocols

B. Blanchet.
ieee symposium on security and privacy (2006)

230 Citations

Analyzing security protocols with secrecy types and logic programs

Martín Abadi;Bruno Blanchet.
Journal of the ACM (2005)

219 Citations

From Secrecy to Authenticity in Security Protocols

Bruno Blanchet.
static analysis symposium (2002)

208 Citations

Best Scientists Citing Bruno Blanchet

Mark Ryan

Mark Ryan

University of Birmingham

Publications: 41

Andrew D. Gordon

Andrew D. Gordon

Microsoft (United States)

Publications: 40

Cédric Fournet

Cédric Fournet

Microsoft (United States)

Publications: 36

Karthikeyan Bhargavan

Karthikeyan Bhargavan

French Institute for Research in Computer Science and Automation - INRIA

Publications: 35

David Basin

David Basin

ETH Zurich

Publications: 35

Gilles Barthe

Gilles Barthe

Max Planck Institute for Security and Privacy

Publications: 34

Cas Cremers

Cas Cremers

University of Oxford

Publications: 31

Patrick Cousot

Patrick Cousot

New York University

Publications: 27

Joshua Guttman

Joshua Guttman

Worcester Polytechnic Institute

Publications: 23

Catherine Meadows

Catherine Meadows

United States Naval Research Laboratory

Publications: 22

José Meseguer

José Meseguer

University of Illinois at Urbana-Champaign

Publications: 20

Sriram Sankaranarayanan

Sriram Sankaranarayanan

University of Colorado Boulder

Publications: 20

Martin Rinard

Martin Rinard

MIT

Publications: 18

Flemming Nielson

Flemming Nielson

Technical University of Denmark

Publications: 17

Andrey Rybalchenko

Andrey Rybalchenko

Microsoft (United States)

Publications: 16

Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking d-index is inferred from publications deemed to belong to the considered discipline.

If you think any of the details on this page are incorrect, let us know.

Contact us
Something went wrong. Please try again later.