Charlie Jacomme
Charlie Jacomme
Home
Open Positions
Teaching
Non Academic Materials
Contact
Light
Dark
Automatic
Are ideal functionalities really ideal?
Myrto Arapinis
,
Véronique Cortier
,
Hubert de Groote
,
Charlie Jacomme
,
Steve Kremer
January 2026
Cite
URL
Type
Conference paper
Publication
CSF 2026–39th IEEE Computer Security Foundations Symposium
Add the
full text
or
supplementary notes
for the publication here using Markdown formatting.
Related
A comprehensive, formal and automated analysis of the EDHOC protocol
Hash Gone Bad: Automated discovery of protocol attacks that exploit hash function weaknesses
SAPIC+: protocol verifiers of the world, unite!
Universal Equivalence and Majority of Probabilistic Programs over Finite Fields
An extensive formal analysis of multi-factor authentication protocols
Cite
×