Charlie Jacomme
Orcid: 0009-0003-4465-3150Affiliations:
- CISPA Helmholtz Center for Information Security, Saarbrücken, Germany
- ENS Paris-Saclay, France (PhD 2020)
According to our database1,
Charlie Jacomme
authored at least 21 papers
between 2017 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2025
Proceedings of the IEEE Symposium on Security and Privacy, 2025
Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, 2025
2024
Formal verification of the PQXDH Post-Quantum key agreement protocol for end-to-end secure messaging.
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 37th IEEE Computer Security Foundations Symposium, 2024
2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Formal Analysis of Session-Handling in Secure Messaging: Lifting Security from Sessions to Conversations.
Proceedings of the 32nd USENIX Security Symposium, 2023
Automated Analysis of Protocols that use Authenticated Encryption: How Subtle AEAD Differences can impact Protocol Security.
Proceedings of the 32nd USENIX Security Symposium, 2023
Hash Gone Bad: Automated discovery of protocol attacks that exploit hash function weaknesses.
Proceedings of the 32nd USENIX Security Symposium, 2023
Subterm-Based Proof Techniques for Improving the Automation and Scope of Security Protocol Analysis.
Proceedings of the 36th IEEE Computer Security Foundations Symposium, 2023
2022
IACR Cryptol. ePrint Arch., 2022
Proceedings of the 31st USENIX Security Symposium, 2022
A Logic and an Interactive Prover for the Computational Post-Quantum Security of Protocols.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
2021
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021
2020
Preuves de protocoles cryptographiques : méthodes symboliques et attaquants puissants. (Proofs of security protocols : symbolic methods and powerful attackers).
PhD thesis, 2020
Proceedings of the LICS '20: 35th Annual ACM/IEEE Symposium on Logic in Computer Science, 2020
Oracle Simulation: A Technique for Protocol Composition with Long Term Shared Secrets.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
2019
Proceedings of the 32nd IEEE Computer Security Foundations Symposium, 2019
2018
Proceedings of the 31st IEEE Computer Security Foundations Symposium, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017