S
Santiago Zanella-Béguelin
Researcher at Microsoft
Publications - 32
Citations - 2391
Santiago Zanella-Béguelin is an academic researcher from Microsoft. The author has contributed to research in topics: Cryptography & Hash function. The author has an hindex of 17, co-authored 31 publications receiving 1983 citations. Previous affiliations of Santiago Zanella-Béguelin include Johns Hopkins University.
Papers
More filters
Posted Content
HACL×N: Verified Generic SIMD Crypto (for all your favorite platforms)
Proceedings Article
Grey-box Extraction of Natural Language Models
TL;DR: In this paper, the authors present algebraic attacks on large-scale natural language models in a grey-box setting, targeting models with a pre-trained (public) encoder followed by a single (private) classification layer.
Towards a Provably Secure Implementation of TLS 1.3
Antoine Delignat-Lavaud,Cédric Fournet,Markulf Kohlweiss,Jonathan Protzenko,Nikhil Swamy,Santiago Zanella-Béguelin +5 more
TL;DR: The implementation architecture, the new composite state machine for TLS 1.0–1.3, and the target security theorem are described, which will be the first cryptographic proofs for an implementation of HTTPS 1.3.
Posted Content
Fully Automated Analysis of Padding-Based Encryption in the Computational Model
Gilles Barthe,Juan Manuel Crespo,Benjamin Grégoire,César Kunz,Yassine Lakhnech,Benedikt Schmidt,Santiago Zanella-Béguelin +6 more
TL;DR: In this article, a combination of techniques from computational and symbolic cryptography is presented for analyzing the chosen-plaintext and chosen-ciphertext security of public-key encryption schemes in the random oracle model.
Proceedings Article
Verified Low-Level Programming Embedded in F*
Jonathan Protzenko,Jean Karim Zinzindohoue,Aseem Rastogi,Tahina Ramananandro,Peng Wang,Santiago Zanella-Béguelin,Antoine Delignat-Lavaud,Cătălin Hriţcu,Karthikeyan Bhargavan,Cédric Fournet,Nikhil Swamy +10 more
TL;DR: Low* as discussed by the authors is a dependently typed variant of ML aimed at program verification, which does not involve any garbage collection or implicit heap allocation; instead, it has a structured memory model a la CompCert, and it provides the control required for writing efficient low-level securitycritical code.