S
Swarn Priya
Researcher at Purdue University
Publications - 4
Citations - 45
Swarn Priya is an academic researcher from Purdue University. The author has contributed to research in topics: Computer science & Provable security. The author has an hindex of 2, co-authored 2 publications receiving 15 citations.
Papers
More filters
Journal ArticleDOI
Mergeable replicated data types
TL;DR: This work presents a fundamentally different approach to programming in the presence of replicated state based on the use of invertible relational specifications of an inductively-defined data type as a mechanism to capture salient aspects of the data type relevant to how its different instances can be safely merged in a replicated environment.
Proceedings ArticleDOI
High-Assurance Cryptography in the Spectre Era
Gilles Barthe,Sunjay Cauligi,Benjamin Grégoire,Adrien Koutsos,Kevin Liao,Tiago Oliveira,Swarn Priya,Tamara Rezk,Peter Schwabe +8 more
TL;DR: This paper builds atop the Jasmin verification framework an end-to-end approach for proving properties of cryptographic software under speculative execution, and validate this approach experimentally with efficient, functionally correct assembly implementations of ChaCha20 and Poly1305, which are secure against both traditional timing and speculative execution attacks.
Proceedings ArticleDOI
Enforcing Fine-grained Constant-time Policies
TL;DR: This paper develops a systematic, sound, approach for enforcing fine-grained constant-time policies beyond the BL model, and implements the approach in the Jasmin framework for high-assurance cryptography.
Proceedings ArticleDOI
Typing High-Speed Cryptography against Spectre v1
Basavesh Shivakumar,Gilles Barthe,Benjamin Grégoire,Vincent Laporte,Tiago Oliveira,Swarn Priya,Peter Schwabe,Lucas Tabary-Maujean +7 more
TL;DR: The approach ensures speculative constant-time, an information property which guarantees that programs are protected against Spectre v1 attacks, for protecting all implementations of an experimental cryptographic library that includes highly optimized implementations of symmetric primitives, of elliptic-curve cryptography, and of Kyber, a lattice-based KEM recently selected by NIST for standardization.