Charlie Jacomme
Charlie Jacomme
Home
Open Positions
Teaching
Non Academic Materials
Contact
Light
Dark
Automatic
Steve Kremer
Latest
A comprehensive, formal and automated analysis of the EDHOC protocol
Hash Gone Bad: Automated discovery of protocol attacks that exploit hash function weaknesses
SAPIC+: protocol verifiers of the world, unite!
Universal Equivalence and Majority of Probabilistic Programs over Finite Fields
An extensive formal analysis of multi-factor authentication protocols
Universal equivalence and majority on probabilistic programs over finite fields
Symbolic methods in computational cryptography proofs
An extensive formal analysis of multi-factor authentication protocols
Symbolic Models for Isolated Execution Environments
Cite
×