Charlie Jacomme

Orcid: 0009-0003-4465-3150

Affiliations:
  • CISPA Helmholtz Center for Information Security, Saarbrücken, Germany
  • ENS Paris-Saclay, France (PhD 2020)


According to our database1, Charlie Jacomme authored at least 21 papers between 2017 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Token Weaver: Privacy Preserving and Post-Compromise Secure Attestation.
Proceedings of the IEEE Symposium on Security and Privacy, 2025

Subversion-resilient Key-exchange in the Post-quantum World.
Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, 2025

2024
The Squirrel Prover and its Logic.
ACM SIGLOG News, April, 2024

Formal verification of the PQXDH Post-Quantum key agreement protocol for end-to-end secure messaging.
Proceedings of the 33rd USENIX Security Symposium, 2024

Post-Quantum Sound CryptoVerif and Verification of Hybrid TLS and SSH Key-Exchanges.
Proceedings of the 37th IEEE Computer Security Foundations Symposium, 2024

2023
A comprehensive, formal and automated analysis of the EDHOC protocol.
Proceedings of the 32nd USENIX Security Symposium, 2023

Formal Analysis of Session-Handling in Secure Messaging: Lifting Security from Sessions to Conversations.
Proceedings of the 32nd USENIX Security Symposium, 2023

Automated Analysis of Protocols that use Authenticated Encryption: How Subtle AEAD Differences can impact Protocol Security.
Proceedings of the 32nd USENIX Security Symposium, 2023

Hash Gone Bad: Automated discovery of protocol attacks that exploit hash function weaknesses.
Proceedings of the 32nd USENIX Security Symposium, 2023

Subterm-Based Proof Techniques for Improving the Automation and Scope of Security Protocol Analysis.
Proceedings of the 36th IEEE Computer Security Foundations Symposium, 2023

2022
TokenWeaver: Privacy Preserving and Post-Compromise Secure Attestation.
IACR Cryptol. ePrint Arch., 2022

SAPIC+: protocol verifiers of the world, unite!
Proceedings of the 31st USENIX Security Symposium, 2022

A Logic and an Interactive Prover for the Computational Post-Quantum Security of Protocols.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

2021
An Interactive Prover for Protocol Verification in the Computational Model.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

2020
Preuves de protocoles cryptographiques : méthodes symboliques et attaquants puissants. (Proofs of security protocols : symbolic methods and powerful attackers).
PhD thesis, 2020

Universal equivalence and majority of probabilistic programs over finite fields.
Proceedings of the LICS '20: 35th Annual ACM/IEEE Symposium on Logic in Computer Science, 2020

Oracle Simulation: A Technique for Protocol Composition with Long Term Shared Secrets.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
Symbolic Methods in Computational Cryptography Proofs.
Proceedings of the 32nd IEEE Computer Security Foundations Symposium, 2019

2018
An Extensive Formal Analysis of Multi-factor Authentication Protocols.
Proceedings of the 31st IEEE Computer Security Foundations Symposium, 2018

Symbolic Proofs for Lattice-Based Cryptography.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Symbolic Models for Isolated Execution Environments.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017


  Loading...