Jean Paul Degabriele

Affiliations:
  • Technische Universität Darmstadt, Germany


According to our database1, Jean Paul Degabriele authored at least 23 papers between 2007 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Counter Galois Onion (CGO) for Tor: Fast Non-Malleable Onion Encryption.
IACR Cryptol. ePrint Arch., 2025

Rugged Pseudorandom Permutations with Beyond-Birthday-Bound Security.
IACR Cryptol. ePrint Arch., 2025

Pencil: A Domain-Extended PRF with Full n-bit Security \\ for Strengthening GCM and More.
IACR Cryptol. ePrint Arch., 2025

2024
SoK: Efficient Design and Implementation of Polynomial Hash Functions over Prime Fields.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

2023
Populating the Zoo of Rugged Pseudorandom Permutations.
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023

The Indifferentiability of the Duplex and Its Practical Applications.
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023

2022
Overloading the Nonce: Rugged PRPs, Nonce-Set AEAD, and Order-Resilient Channels.
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022

2021
The Security of ChaCha20-Poly1305 in the Multi-User Setting.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

Hiding the Lengths of Encrypted Messages via Gaussian Padding.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2019
Sponges Resist Leakage: The Case of Authenticated Encryption.
Proceedings of the 31. Krypto-Tag, Berlin, Germany, October 17-18, 2019, 2019

2018
Untagging Tor: A Formal Treatment of Onion Encryption.
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018

Simulatable Channels: Extended Security that is Universally Composable and Easier to Prove.
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018

2016
Backdoors in Pseudorandom Number Generators: Possibility and Impossibility Results.
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016

A Surfeit of SSH Cipher Suites.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
A More Cautious Approach to Security Against Mass Surveillance.
Proceedings of the Fast Software Encryption - 22nd International Workshop, 2015

2014
Unpicking PLAID - A Cryptographic Analysis of an ISO-Standards-Track Authentication Protocol.
Proceedings of the Security Standardisation Research - First International Conference, 2014

2013
On Symmetric Encryption with Distinguishable Decryption Failures.
Proceedings of the Fast Software Encryption - 20th International Workshop, 2013

2012
Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation.
Proceedings of the Advances in Cryptology - EUROCRYPT 2012, 2012

On the Joint Security of Encryption and Signature in EMV.
Proceedings of the Topics in Cryptology - CT-RSA 2012 - The Cryptographers' Track at the RSA Conference 2012, San Francisco, CA, USA, February 27, 2012

2011
Provable Security in the Real World.
IEEE Secur. Priv., 2011

2010
On the (in)security of IPsec in MAC-then-encrypt configurations.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

2007
Attacking the IPsec Standards in Encryption-only Configurations.
Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P 2007), 2007

Economic aspects of a utility computing service.
Proceedings of the 1st International ICST Conference on Networks for Grid Applications, 2007


  Loading...