| Secure information flow by self-composition G Barthe, P D'Argenio, T Rezk 17th IEEE Computer Security Foundations Workshop, 2004, 100-114, 2004 | 691* | 2004 |
| Privacy profiles and amplification by subsampling B Balle, G Barthe, M Gaboardi Journal of Privacy and Confidentiality 10 (1), 2020 | 587* | 2020 |
| A survey of algorithmic recourse: contrastive explanations and consequential recommendations AH Karimi, G Barthe, B Schölkopf, I Valera ACM Computing Surveys 55 (5), 1-29, 2022 | 483* | 2022 |
| Formal certification of code-based cryptographic proofs G Barthe, B Grégoire, S Zanella Béguelin Proceedings of the 36th annual ACM SIGPLAN-SIGACT symposium on Principles of …, 2009 | 476 | 2009 |
| Model-agnostic counterfactual explanations for consequential decisions AH Karimi, G Barthe, B Balle, I Valera International conference on artificial intelligence and statistics, 895-905, 2020 | 469 | 2020 |
| Computer-aided security proofs for the working cryptographer G Barthe, B Grégoire, S Heraud, SZ Béguelin Annual Cryptology Conference, 71-90, 2011 | 425 | 2011 |
| Strong non-interference and type-directed higher-order masking G Barthe, S Belaïd, F Dupressoir, PA Fouque, B Grégoire, PY Strub, ... Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 399* | 2016 |
| Verifying Constant-Time Implementations JB Almeida, M Barbosa, G Barthe, F Dupressoir, M Emmi 25th USENIX Security Symposium (USENIX Security 16), 53-70, 2016 | 397 | 2016 |
| Probabilistic relational reasoning for differential privacy G Barthe, B Köpf, F Olmedo, S Zanella Beguelin Proceedings of the 39th annual ACM SIGPLAN-SIGACT symposium on Principles of …, 2012 | 320 | 2012 |
| Relational verification using product programs G Barthe, JM Crespo, C Kunz International Symposium on Formal Methods, 200-214, 2011 | 318 | 2011 |
| SoK: Computer-aided cryptography M Barbosa, G Barthe, K Bhargavan, B Blanchet, C Cremers, K Liao, ... 2021 IEEE symposium on security and privacy (SP), 777-795, 2021 | 287 | 2021 |
| Easycrypt: A tutorial G Barthe, F Dupressoir, B Grégoire, C Kunz, B Schmidt, PY Strub International School on Foundations of Security Analysis and Design, 146-166, 2012 | 257 | 2012 |
| Verified proofs of higher-order masking G Barthe, S Belaïd, F Dupressoir, PA Fouque, B Grégoire, PY Strub Annual International Conference on the Theory and Applications of …, 2015 | 243 | 2015 |
| Jasmin: High-assurance and high-speed cryptography JB Almeida, M Barbosa, G Barthe, A Blot, B Grégoire, V Laporte, ... Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 235 | 2017 |
| System-level non-interference for constant-time cryptography G Barthe, G Betarte, J Campo, C Luna, D Pichardie Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014 | 203 | 2014 |
| Parallel implementations of masking schemes and the bounded moment leakage model G Barthe, F Dupressoir, S Faust, B Grégoire, FX Standaert, PY Strub Annual International Conference on the Theory and Applications of …, 2017 | 189 | 2017 |
| Constant-time foundations for the new spectre era S Cauligi, C Disselkoen, KV Gleissenthall, D Tullsen, D Stefan, T Rezk, ... Proceedings of the 41st ACM SIGPLAN Conference on Programming Language …, 2020 | 170 | 2020 |
| Hypothesis testing interpretations and renyi differential privacy B Balle, G Barthe, M Gaboardi, J Hsu, T Sato International Conference on Artificial Intelligence and Statistics, 2496-2506, 2020 | 162 | 2020 |
| A certified lightweight non-interference Java bytecode verifier† G Barthe, D Pichardie, T Rezk Mathematical Structures in Computer Science 23 (5), 1032-1081, 2013 | 161* | 2013 |
| Secure compilation of side-channel countermeasures: the case of cryptographic “constant-time” G Barthe, B Grégoire, V Laporte 2018 IEEE 31st Computer Security Foundations Symposium (CSF), 328-343, 2018 | 160 | 2018 |