Title: "Secure Refinement of Cryptographic Algorithms" Abstract: IT security relies heavily on implementations of cryptographic algorithms. Thus, it is crucial that these implementations do not leak secret information. Despite security proofs on the specification level, a concrete implementation of a cryptographic algorithm may contain side-channel vulnerabilities. These can cause the output of a side channel (i.e., physical characteristics of an execution) to depend on secret information. The overall goal of my research is to improve the security of cryptographic implementations with respect to side-channel vulnerabilities. To this end, I am leveraging program analyses. The main challenge here is to make sound analysis tools precise enough. This talk presents the current state of the project "Secure Refinement of Cryptographic Algorithms" to which I contribute.