Charlie Jacomme

Affiliations:
  • CISPA Helmholtz Center for Information Security, Saarbrücken, Germany
  • ENS Paris-Saclay, France (PhD 2020)


According to our database1, Charlie Jacomme authored at least 16 papers between 2017 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Automated Analysis of Protocols that use Authenticated Encryption: How Subtle AEAD Differences can impact Protocol Security.
IACR Cryptol. ePrint Arch., 2023

A comprehensive, formal and automated analysis of the EDHOC protocol.
Proceedings of the 32nd USENIX Security Symposium, 2023

2022
Universal Equivalence and Majority of Probabilistic Programs over Finite Fields.
ACM Trans. Comput. Log., 2022

TokenWeaver: Privacy Preserving and Post-Compromise Secure Attestation.
IACR Cryptol. ePrint Arch., 2022

Formal Analysis of Session-Handling in Secure Messaging: Lifting Security from Sessions to Conversations.
IACR Cryptol. ePrint Arch., 2022

Subterm-based proof techniques for improving the automation and scope of security protocol analysis.
IACR Cryptol. ePrint Arch., 2022

A Logic and an Interactive Prover for the Computational Post-Quantum Security of Protocols.
IACR Cryptol. ePrint Arch., 2022

Sapic+: protocol verifiers of the world, unite!
IACR Cryptol. ePrint Arch., 2022

Hash Gone Bad: Automated discovery of protocol attacks that exploit hash function weaknesses.
IACR Cryptol. ePrint Arch., 2022

2021
An Extensive Formal Analysis of Multi-factor Authentication Protocols.
ACM Trans. Priv. Secur., 2021

An Interactive Prover for Protocol Verification in the Computational Model.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

2020
Preuves de protocoles cryptographiques : méthodes symboliques et attaquants puissants. (Proofs of security protocols : symbolic methods and powerful attackers).
PhD thesis, 2020

Oracle Simulation: A Technique for Protocol Composition with Long Term Shared Secrets.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
Symbolic Methods in Computational Cryptography Proofs.
Proceedings of the 32nd IEEE Computer Security Foundations Symposium, 2019

2018
Symbolic Proofs for Lattice-Based Cryptography.
IACR Cryptol. ePrint Arch., 2018

2017
Symbolic Models for Isolated Execution Environments.
IACR Cryptol. ePrint Arch., 2017


  Loading...