System-Level Non-interference of Constant-Time Cryptography. Part II: Verified Static Analysis and Stealth Memory | Publicación