https://eprint.iacr.org/2023/215
Formally verifying Kyber Episode IV: Implementation Correctness
In this paper we present the first formally verified implementations of Kyber and, to the best of our knowledge, the first such implementations of any...
formally verifying kyberiv
https://eprint.iacr.org/2024/843
Formally verifying Kyber Episode V: Machine-checked IND-CCA security and correctness of ML-KEM in...
We present a formally verified proof of the correctness and IND-CCA security of ML-KEM, the Kyber-based Key Encapsulation Mechanism (KEM) undergoing...
formally verifying kyberind