Charlie Jacomme
Charlie Jacomme
Home
Open Positions
Teaching
Non Academic Materials
Contact
Light
Dark
Automatic
Subterm-based proof techniques for improving the automation and scope of security protocol analysis
Cas Cremers
,
Charlie Jacome
,
Philip Lukert
January 2023
PDF
Cite
Type
Conference paper
Publication
Proceedings of the 36th IEEE Computer Security Foundations Symposium (CSF'23)
Related
Formal Analysis of Session-Handling in Secure Messaging: Lifting Security from Sessions to Conversations
Hash Gone Bad: Automated discovery of protocol attacks that exploit hash function weaknesses
A Logic and an Interactive Prover for the Computational Post-Quantum Security of Protocols
Automated Analysis of Protocols that use Authenticated Encryption: How Subtle AEAD Differences can impact Protocol Security
Cite
×