1. Almeida, J.B., et al.: Machine-checked proofs for cryptographic standards: indifferentiability of sponge and secure high-assurance implementations of SHA-3. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, CCS 2019, pp. 1607–1622. Association for Computing Machinery, New York (2019). https://doi.org/10.1145/3319535.3363211
2. Barthe, G., et al.: High-assurance cryptography in the spectre era. In: 2021 IEEE Symposium on Security and Privacy (SP), pp. 1884–1901 (2021). https://doi.org/10.1109/SP40001.2021.00046
3. Beringer, L., Petcher, A., Ye, K.Q., Appel, A.W.: Verified correctness and security of OpenSSL HMAC. In: 24th USENIX Security Symposium (USENIX Security 15), pp. 207–221. USENIX Association, Washington, D.C., August 2015. https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/beringer
4. Bond, B., et al.: Vale: verifying high-performance cryptographic assembly code. In: 26th USENIX Security Symposium (USENIX Security 2017), pp. 917–934. USENIX Association, Vancouver, August 2017. https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/bond
5. Browning, S., Weaver, P.: Designing tunable, verifiable cryptographic hardware using Cryptol. In: Hardin, D. (ed.) Design and Verification of Microprocessor Systems for High-Assurance Applications, pp. 89–143. Springer, Boston (2010). https://doi.org/10.1007/978-1-4419-1539-9_4