An extensive formal analysis of multi-factor authentication protocols C Jacomme, S Kremer 2018 IEEE 31st Computer Security Foundations Symposium (CSF), 1-15, 2018 | 80 | 2018 |
An interactive prover for protocol verification in the computational model D Baelde, S Delaune, C Jacomme, A Koutsos, S Moreau 2021 IEEE Symposium on Security and Privacy (SP), 537-554, 2021 | 43 | 2021 |
{SAPIC+}: protocol verifiers of the world, unite! V Cheval, C Jacomme, S Kremer, R Künnemann 31st USENIX Security Symposium (USENIX Security 22), 3935-3952, 2022 | 26 | 2022 |
A comprehensive, formal and automated analysis of the {EDHOC} protocol C Jacomme, E Klein, S Kremer, M Racouchot 32nd USENIX Security Symposium (USENIX Security 23), 5881-5898, 2023 | 18 | 2023 |
Symbolic Proofs for Lattice-Based Cryptography G Barthe, X Fan, J Gancher, B Grégoire, C Jacomme, E Shi Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 17 | 2018 |
A Logic and an Interactive Prover for the Computational Post-Quantum Security of Protocols C Cremers, C Fontaine, C Jacomme 2022 IEEE Symposium on Security and Privacy (SP), 125-141, 2022 | 16 | 2022 |
Symbolic models for isolated execution environments C Jacomme, S Kremer, G Scerri 2017 IEEE European Symposium on Security and Privacy (EuroS&P), 530-545, 2017 | 12 | 2017 |
Hash Gone Bad: Automated discovery of protocol attacks that exploit hash function weaknesses V Cheval, C Cremers, A Dax, L Hirschi, C Jacomme, S Kremer 32nd USENIX Security Symposium (USENIX Security 23), 5899-5916, 2023 | 10 | 2023 |
Subterm-based proof techniques for improving the automation and scope of security protocol analysis C Cremers, C Jacomme, P Lukert 2023 IEEE 36th Computer Security Foundations Symposium (CSF), 200-213, 2023 | 8 | 2023 |
Formal Analysis of {Session-Handling} in Secure Messaging: Lifting Security from Sessions to Conversations C Cremers, C Jacomme, A Naska 32nd USENIX Security Symposium (USENIX Security 23), 1235-1252, 2023 | 7 | 2023 |
Universal Equivalence and Majority of Probabilistic Programs over Finite Fields G Barthe, C Jacomme, S Kremer ACM Transactions on Computational Logic (TOCL) 23 (1), 1-42, 2021 | 6 | 2021 |
Oracle simulation: a technique for protocol composition with long term shared secrets H Comon, C Jacomme, G Scerri Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020 | 6 | 2020 |
Symbolic methods in computational cryptography proofs G Barthe, B Grégoire, C Jacomme, S Kremer, PY Strub 2019 IEEE 32nd Computer Security Foundations Symposium (CSF), 136-13615, 2019 | 6 | 2019 |
Automated Analysis of Protocols that use Authenticated Encryption: Analysing the Impact of the Subtle Differences between AEADs on Protocol Security C Cremers, A Dax, C Jacomme, M Zhao USENIX Security 2023, 2023 | 3 | 2023 |
TokenWeaver: Privacy Preserving and Post-Compromise Secure Attestation C Cremers, G Horowitz, C Jacomme, E Ronen Cryptology ePrint Archive, 2022 | 2 | 2022 |
Post-quantum sound CryptoVerif and verification of hybrid TLS and SSH key-exchanges B Blanchet, C Jacomme CSF'24-37th IEEE Computer Security Foundations Symposium, 2024 | 1 | 2024 |
CryptoVerif: A computationally-sound security protocol verifier B Blanchet, C Jacomme Inria, 2023 | 1 | 2023 |
Automated Analysis of Protocols that use Authenticated Encryption: How Subtle AEAD Differences can impact Protocol Security C Cremers, A Dax, C Jacomme, M Zhao | 1* | |
Formal verification of the PQXDH Post-Quantum key agreement protocol for end-to-end secure messaging K Bhargavan, C Jacomme, F Kiefer, R Schmidt 33rd USENIX Security Symposium, 2024 | | 2024 |
The Squirrel Prover and its Logic D Baelde, C Jacomme ACM SIGLOG News 11 (2), 62-83, 2024 | | 2024 |