Secure information flow by self-composition G Barthe, P D'Argenio, T Rezk 17th IEEE Computer Security Foundations Workshop, 2004, 100-114, 2004 | 577* | 2004 |

Formal certification of code-based cryptographic proofs G Barthe, B Grégoire, S Zanella Béguelin Proceedings of the 36th annual ACM SIGPLAN-SIGACT symposium on Principles of …, 2009 | 401 | 2009 |

Computer-aided security proofs for the working cryptographer G Barthe, B Grégoire, S Heraud, SZ Béguelin Advances in Cryptology–CRYPTO 2011: 31st Annual Cryptology Conference, Santa …, 2011 | 326 | 2011 |

Verifying Constant-Time Implementations. JB Almeida, M Barbosa, G Barthe, F Dupressoir, M Emmi USENIX Security Symposium 16, 53-70, 2016 | 270 | 2016 |

Probabilistic relational reasoning for differential privacy G Barthe, B Köpf, F Olmedo, S Zanella Beguelin Proceedings of the 39th annual ACM SIGPLAN-SIGACT symposium on Principles of …, 2012 | 257 | 2012 |

Relational verification using product programs G Barthe, JM Crespo, C Kunz FM 2011: Formal Methods: 17th International Symposium on Formal Methods …, 2011 | 255 | 2011 |

Privacy profiles and amplification by subsampling B Balle, G Barthe, M Gaboardi Journal of Privacy and Confidentiality 10 (1), 2020 | 253* | 2020 |

Strong non-interference and type-directed higher-order masking G Barthe, S Belaïd, F Dupressoir, PA Fouque, B Grégoire, PY Strub, ... Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 234* | 2016 |

Model-agnostic counterfactual explanations for consequential decisions AH Karimi, G Barthe, B Balle, I Valera International Conference on Artificial Intelligence and Statistics, 895-905, 2020 | 213 | 2020 |

*EasyCrypt*: A TutorialG Barthe, F Dupressoir, B Grégoire, C Kunz, B Schmidt, PY Strub Foundations of Security Analysis and Design VII: FOSAD 2012/2013 Tutorial …, 2014 | 177 | 2014 |

Verified proofs of higher-order masking G Barthe, S Belaïd, F Dupressoir, PA Fouque, B Grégoire, PY Strub Advances in Cryptology--EUROCRYPT 2015: 34th Annual International Conference …, 2015 | 167 | 2015 |

A certified lightweight non-interference Java bytecode verifier^{†}G Barthe, D Pichardie, T Rezk Mathematical Structures in Computer Science 23 (5), 1032-1081, 2013 | 154* | 2013 |

System-level non-interference for constant-time cryptography G Barthe, G Betarte, J Campo, C Luna, D Pichardie Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014 | 151 | 2014 |

A survey of algorithmic recourse: contrastive explanations and consequential recommendations AH Karimi, G Barthe, B Schölkopf, I Valera ACM Computing Surveys 55 (5), 1-29, 2022 | 144* | 2022 |

Type-based termination of recursive definitions G Barthe, MJ Frade, E Giménez, L Pinto, T Uustalu Mathematical structures in computer science 14 (1), 97-141, 2004 | 140 | 2004 |

Parallel implementations of masking schemes and the bounded moment leakage model G Barthe, F Dupressoir, S Faust, B Grégoire, FX Standaert, PY Strub Advances in Cryptology–EUROCRYPT 2017: 36th Annual International Conference …, 2017 | 139 | 2017 |

Jasmin: High-assurance and high-speed cryptography JB Almeida, M Barbosa, G Barthe, A Blot, B Grégoire, V Laporte, ... Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 135 | 2017 |

Setoids in type theory G Barthe, V Capretta, O Pons Journal of Functional Programming 13 (2), 261-293, 2003 | 123 | 2003 |

Probabilistic relational verification for cryptographic implementations G Barthe, C Fournet, B Grégoire, PY Strub, N Swamy, S Zanella-Béguelin ACM SIGPLAN Notices 49 (1), 193-205, 2014 | 121 | 2014 |

SoK: Computer-aided cryptography M Barbosa, G Barthe, K Bhargavan, B Blanchet, C Cremers, K Liao, ... 2021 IEEE symposium on security and privacy (SP), 777-795, 2021 | 108 | 2021 |