default search action
Stefan Ciobaca
Person information
- unicode name: Ștefan Ciobâcă
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j7]Cezar-Constantin Andrici, Stefan Ciobaca, Catalin Hritcu, Guido Martínez, Exequiel Rivas, Éric Tanter, Théo Winterhalter:
Securing Verified IO Programs Against Unverified Code in F. Proc. ACM Program. Lang. 8(POPL): 2226-2259 (2024) - 2023
- [j6]Stefan Ciobaca, Dorel Lucanu, Andrei-Sebastian Buruiana:
Operationally-based program equivalence proofs using LCTRSs. J. Log. Algebraic Methods Program. 135: 100894 (2023) - 2021
- [j5]Carmine Abate, Roberto Blanco, Stefan Ciobaca, Adrien Durier, Deepak Garg, Catalin Hritcu, Marco Patrignani, Éric Tanter, Jérémy Thibault:
An Extended Account of Trace-relating Compiler Correctness and Secure Compilation. ACM Trans. Program. Lang. Syst. 43(4): 14:1-14:48 (2021) - [c17]Viorel Iordache, Stefan Ciobaca:
Verifying the Conversion into CNF in Dafny. WoLLIC 2021: 150-166 - [i8]Valeriu Motroi, Stefan Ciobaca:
A Note on the Performance of Algorithms for Solving Linear Diophantine Equations in the Naturals. CoRR abs/2104.05200 (2021) - 2020
- [c16]Carmine Abate, Roberto Blanco, Stefan Ciobaca, Adrien Durier, Deepak Garg, Catalin Hritcu, Marco Patrignani, Éric Tanter, Jérémy Thibault:
Trace-Relating Compiler Correctness and Secure Compilation. ESOP 2020: 1-28 - [i7]Stefan Ciobaca, Dorel Lucanu, Andrei-Sebastian Buruiana:
Operationally-based Program Equivalence Proofs using LCTRSs. CoRR abs/2001.09649 (2020) - [i6]Valeriu Motroi, Stefan Ciobaca:
A Typo in the Paterson-Wegman-de Champeaux algorithm. CoRR abs/2007.00304 (2020) - [i5]Cezar-Constantin Andrici, Stefan Ciobaca:
Who Verifies the Verifiers? A Computer-Checked Implementation of the DPLL Algorithm in Dafny. CoRR abs/2007.10842 (2020)
2010 – 2019
- 2019
- [j4]Andrei Stefanescu, Stefan Ciobaca, Radu Mereuta, Brandon M. Moore, Traian-Florin Serbanuta, Grigore Rosu:
All-Path Reachability Logic. Log. Methods Comput. Sci. 15(2) (2019) - [c15]Cezar-Constantin Andrici, Stefan Ciobaca:
Verifying the DPLL Algorithm in Dafny. FROM 2019: 3-15 - [i4]Carmine Abate, Roberto Blanco, Stefan Ciobaca, Deepak Garg, Catalin Hritcu, Marco Patrignani, Éric Tanter, Jérémy Thibault:
Trace-Relating Compiler Correctness and Secure Compilation. CoRR abs/1907.05320 (2019) - 2018
- [c14]Stefan Ciobaca, Dorel Lucanu:
A Coinductive Approach to Proving Reachability Properties in Logically Constrained Term Rewriting Systems. IJCAR 2018: 295-311 - [c13]Stefan Ciobaca, Andrei Arusoaie, Dorel Lucanu:
Unification Modulo Builtins. WoLLIC 2018: 179-195 - [c12]Andrei-Sebastian Buruiana, Stefan Ciobaca:
Reducing Total Correctness to Partial Correctness by a Transformation of the Language Semantics. WPTE@FSCD 2018: 1-16 - [i3]Stefan Ciobaca, Dorel Lucanu:
A Coinductive Approach to Proving Reachability Properties in Logically Constrained Term Rewriting Systems. CoRR abs/1804.08308 (2018) - [i2]Andrei Stefanescu, Stefan Ciobaca, Radu Mereuta, Brandon M. Moore, Traian-Florin Serbanuta, Grigore Rosu:
All-Path Reachability Logic. CoRR abs/1810.10826 (2018) - 2017
- [c11]Andrei Arusoaie, Stefan Ciobaca, Vlad Craciun, Dragos Gavrilut, Dorel Lucanu:
A Comparison of Open-Source Static Analysis Tools for Vulnerability Detection in C/C++ Code. SYNASC 2017: 161-168 - 2016
- [j3]Stefan Ciobaca, Dorel Lucanu, Vlad Rusu, Grigore Rosu:
A language-independent proof system for full program equivalence. Formal Aspects Comput. 28(3): 469-497 (2016) - [j2]Rohit Chadha, Vincent Cheval, Stefan Ciobaca, Steve Kremer:
Automated Verification of Equivalence Properties of Cryptographic Protocols. ACM Trans. Comput. Log. 17(4): 23 (2016) - 2014
- [c10]Stefan Ciobaca, Dorel Lucanu, Vlad Rusu, Grigore Rosu:
A Language-Independent Proof System for Mutual Program Equivalence. ICFEM 2014: 75-90 - [c9]Andrei Stefanescu, Stefan Ciobaca, Radu Mereuta, Brandon M. Moore, Traian-Florin Serbanuta, Grigore Rosu:
All-Path Reachability Logic. RTA-TLCA 2014: 425-440 - [c8]Stefan Ciobaca:
Reducing Partial Equivalence to Partial Correctness. SYNASC 2014: 164-171 - [c7]Stefan Ciobaca, Dorel Lucanu, Vlad Rusu, Grigore Rosu:
A Theoretical Foundation for Programming Languages Aggregation. WADT 2014: 30-47 - 2013
- [c6]Stefan Ciobaca:
From Small-Step Semantics to Big-Step Semantics, Automatically. IFM 2013: 347-361 - [c5]Grigore Rosu, Andrei Stefanescu, Stefan Ciobaca, Brandon M. Moore:
One-Path Reachability Logic. LICS 2013: 358-367 - 2012
- [j1]Stefan Ciobaca, Stéphanie Delaune, Steve Kremer:
Computing Knowledge in Security Protocols Under Convergent Equational Theories. J. Autom. Reason. 48(2): 219-262 (2012) - [c4]Rohit Chadha, Stefan Ciobaca, Steve Kremer:
Automated Verification of Equivalence Properties of Cryptographic Protocols. ESOP 2012: 108-127 - 2011
- [b1]Stefan Ciobaca:
Verification and composition of security protocols with applications to electronic voting. (Vérification et composition des protocoles de securité avec des applications aux protocoles de vote electronique). École normale supérieure de Cachan, France, 2011 - [c3]Stefan Ciobaca:
Computing finite variants for subterm convergent rewrite systems. UNIF 2011: 28-34 - 2010
- [c2]Stefan Ciobaca, Véronique Cortier:
Protocol Composition for Arbitrary Primitives. CSF 2010: 322-336
2000 – 2009
- 2009
- [c1]Stefan Ciobaca, Stéphanie Delaune, Steve Kremer:
Computing Knowledge in Security Protocols under Convergent Equational Theories. CADE 2009: 355-370 - 2008
- [i1]Sorin Iftene, Stefan Ciobaca, Manuela Grindei:
Compartmented Threshold RSA Based on the Chinese Remainder Theorem. IACR Cryptol. ePrint Arch. 2008: 370 (2008)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint