Theo dõi
Charlie Jacomme
Charlie Jacomme
Université de Lorraine, LORIA, Inria Nancy Grand-Est
Email được xác minh tại inria.fr - Trang chủ
Tiêu đề
Trích dẫn bởi
Trích dẫn bởi
Năm
An extensive formal analysis of multi-factor authentication protocols
C Jacomme, S Kremer
2018 IEEE 31st Computer Security Foundations Symposium (CSF), 1-15, 2018
1052018
An interactive prover for protocol verification in the computational model
D Baelde, S Delaune, C Jacomme, A Koutsos, S Moreau
2021 IEEE Symposium on Security and Privacy (SP), 537-554, 2021
492021
{SAPIC+}: protocol verifiers of the world, unite!
V Cheval, C Jacomme, S Kremer, R Künnemann
31st USENIX Security Symposium (USENIX Security 22), 3935-3952, 2022
302022
A comprehensive, formal and automated analysis of the {EDHOC} protocol
C Jacomme, E Klein, S Kremer, M Racouchot
32nd USENIX Security Symposium (USENIX Security 23), 5881-5898, 2023
262023
A Logic and an Interactive Prover for the Computational Post-Quantum Security of Protocols
C Cremers, C Fontaine, C Jacomme
2022 IEEE Symposium on Security and Privacy (SP), 125-141, 2022
212022
Symbolic Proofs for Lattice-Based Cryptography
G Barthe, X Fan, J Gancher, B Grégoire, C Jacomme, E Shi
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
182018
Hash Gone Bad: Automated discovery of protocol attacks that exploit hash function weaknesses
V Cheval, C Cremers, A Dax, L Hirschi, C Jacomme, S Kremer
32nd USENIX Security Symposium (USENIX Security 23), 5899-5916, 2023
172023
Subterm-based proof techniques for improving the automation and scope of security protocol analysis
C Cremers, C Jacomme, P Lukert
2023 IEEE 36th Computer Security Foundations Symposium (CSF), 200-213, 2023
142023
Symbolic models for isolated execution environments
C Jacomme, S Kremer, G Scerri
2017 IEEE European Symposium on Security and Privacy (EuroS&P), 530-545, 2017
142017
Formal Analysis of {Session-Handling} in Secure Messaging: Lifting Security from Sessions to Conversations
C Cremers, C Jacomme, A Naska
32nd USENIX Security Symposium (USENIX Security 23), 1235-1252, 2023
132023
Automated Analysis of Protocols that use Authenticated Encryption: How Subtle AEAD Differences can impact Protocol Security
C Cremers, A Dax, C Jacomme, M Zhao
9*
Universal Equivalence and Majority of Probabilistic Programs over Finite Fields
G Barthe, C Jacomme, S Kremer
ACM Transactions on Computational Logic (TOCL) 23 (1), 1-42, 2021
72021
Oracle simulation: a technique for protocol composition with long term shared secrets
H Comon, C Jacomme, G Scerri
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
72020
Symbolic methods in computational cryptography proofs
G Barthe, B Grégoire, C Jacomme, S Kremer, PY Strub
2019 IEEE 32nd Computer Security Foundations Symposium (CSF), 136-13615, 2019
72019
Formal verification of the {PQXDH}{Post-Quantum} key agreement protocol for end-to-end secure messaging
K Bhargavan, C Jacomme, F Kiefer, R Schmidt
33rd USENIX Security Symposium (USENIX Security 24), 469-486, 2024
62024
Automated analysis of protocols that use authenticated encryption: Analysing the impact of the subtle differences between aeads on protocol security
C Cremers, A Dax, C Jacomme, M Zhao
USENIX Security, 2023
52023
The Squirrel Prover and its Logic
D Baelde, S Delaune, C Jacomme, A Koutsos, J Lallemand
ACM SIGLOG News 11 (2), 62-83, 2024
32024
CryptoVerif: A computationally-sound security protocol verifier
B Blanchet, C Jacomme
Inria, 2023
32023
Post-quantum sound CryptoVerif and verification of hybrid TLS and SSH key-exchanges
B Blanchet, C Jacomme
2024 IEEE 37th Computer Security Foundations Symposium (CSF), 543-556, 2024
22024
TokenWeaver: Privacy Preserving and Post-Compromise Secure Attestation
C Cremers, G Horowitz, C Jacomme, E Ronen
Cryptology ePrint Archive, 2022
22022
Hệ thống không thể thực hiện thao tác ngay bây giờ. Hãy thử lại sau.
Bài viết 1–20