Bruno Blanchet focuses on Cryptographic protocol, Theoretical computer science, Cryptography, Cryptographic primitive and Secrecy. His work in the fields of Theoretical computer science, such as Pi calculus, intersects with other areas such as Context and Process. His Cryptography research is multidisciplinary, incorporating elements of Process calculus and Programming language.
The study incorporates disciplines such as Correctness, Message authentication code, Authentication and Universal composability in addition to Cryptographic primitive. His research integrates issues of Forward secrecy and Prolog in his study of Correctness. His biological study spans a wide range of topics, including Equivalence, Adversary, Data security and Logic programming.
The scientist’s investigation covers issues in Cryptographic protocol, Theoretical computer science, Cryptographic primitive, Programming language and Observational equivalence. His study in Cryptographic protocol is interdisciplinary in nature, drawing from both Formal methods, Secrecy and Horn clause. His studies deal with areas such as Adversary, Hash function, Authentication and Public-key cryptography as well as Theoretical computer science.
His work carried out in the field of Cryptographic primitive brings together such families of science as Message authentication code and Universal composability. His research in the fields of Logic programming and Java overlaps with other disciplines such as Escape analysis and The Symbolic. The concepts of his Cryptography study are interwoven with issues in Correctness, Encryption, Key and Prolog.
His primary areas of investigation include Cryptographic protocol, Observational equivalence, Formal methods, Reachability and Programming language. His research combines Theoretical computer science and Cryptographic protocol. Bruno Blanchet usually deals with Observational equivalence and limits it to topics linked to Calculus and Equivalence.
His Protocol verification, Software and Pi calculus study in the realm of Programming language interacts with subjects such as Basis and Semantics. The various areas that Bruno Blanchet examines in his Cryptographic primitive study include Horn clause and Encryption. His Cryptography study combines topics in areas such as Correctness, Authentication and Key.
Bruno Blanchet spends much of his time researching Cryptographic protocol, Protocol, Cryptographic primitive, Cryptography and Theoretical computer science. His Cryptographic protocol research incorporates themes from Protocol verification, Transport Layer Security, Secrecy and Process calculus. His Protocol verification research includes elements of Formal methods, Observational equivalence and Reachability.
His Transport Layer Security research integrates issues from Handshake and Distributed computing. His Secrecy research is multidisciplinary, relying on both Authentication, Horn clause and Resolution. His work in Process calculus addresses issues such as Construct, which are connected to fields such as Calculus of communicating systems.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
An efficient cryptographic protocol verifier based on prolog rules
ieee computer security foundations symposium (2001)
A static analyzer for large safety-critical software
Bruno Blanchet;Patrick Cousot;Radhia Cousot;Jérome Feret.
programming language design and implementation (2003)
Automated verification of selected equivalences for security protocols
Bruno Blanchet;Martín Abadi;Cédric Fournet.
The Journal of Logic and Algebraic Programming (2008)
Escape analysis for object-oriented languages: application to Java
conference on object-oriented programming systems, languages, and applications (1999)
Design and implementation of a special-purpose static program analyzer for safety-critical real-time embedded software
Bruno Blanchet;Patrick Cousot;Radhia Cousot;Jérôme Feret.
Lecture Notes in Computer Science (2002)
Automatic verification of correspondences for security protocols
Journal of Computer Security (2009)
Automatic proof of strong secrecy for security protocols
ieee symposium on security and privacy (2004)
A computationally sound mechanized prover for security protocols
ieee symposium on security and privacy (2006)
Analyzing security protocols with secrecy types and logic programs
Martín Abadi;Bruno Blanchet.
Journal of the ACM (2005)
From Secrecy to Authenticity in Security Protocols
static analysis symposium (2002)
Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking d-index is inferred from publications deemed to belong to the considered discipline.
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below: