Charlie Jacomme
Charlie Jacomme
Home
Open Positions
Teaching
Non Academic Materials
Contact
Light
Dark
Automatic
1
Subversion-resilient Key-exchange in the Post-quantum World
Add the full text or supplementary notes for the publication here using Markdown formatting.
Token Weaver: Privacy Preserving and Post-Compromise Secure Attestation
Add the full text or supplementary notes for the publication here using Markdown formatting.
Formal verification of the PQXDH Post-Quantum key agreement protocol for end-to-end secure messaging
Post-quantum sound CryptoVerif and verification of hybrid TLS and SSH key-exchanges
A comprehensive, formal and automated analysis of the EDHOC protocol
Automated Analysis of Protocols that use Authenticated Encryption: How Subtle AEAD Differences can impact Protocol Security
Formal Analysis of Session-Handling in Secure Messaging: Lifting Security from Sessions to Conversations
Hash Gone Bad: Automated discovery of protocol attacks that exploit hash function weaknesses
Subterm-based proof techniques for improving the automation and scope of security protocol analysis
A Logic and an Interactive Prover for the Computational Post-Quantum Security of Protocols
»
Cite
×