Joël Alwen

Orcid: 0000-0002-4473-903X

According to our database1, Joël Alwen authored at least 49 papers between 2005 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Lattice-Based Updatable Public-Key Encryption for Group Messaging.
IACR Cryptol. ePrint Arch., 2025

Succinct PPRFs via Memory-Tight Reductions.
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025

2024
DeCAF: Decentralizable CGKA with Fast Healing.
Proceedings of the Security and Cryptography for Networks - 14th International Conference, 2024

Updatable Public-Key Encryption, Revisited.
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024

2023
Fork-Resilient Continuous Group Key Agreement.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023

Post-Quantum Multi-Recipient Public Key Encryption.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

The Pre-Shared Key Modes of HPKE.
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023

2022
Analysing the HPKE Standard - Supplementary Material.
Dataset, August, 2022

Coffee: Fast Healing Concurrent Continuous Group Key Agreement for Decentralized Group Messaging.
IACR Cryptol. ePrint Arch., 2022

CoCoA: Concurrent Continuous Group Key Agreement.
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022

On the Insider Security of MLS.
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022

Server-Aided Continuous Group Key Agreement.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Analysing the HPKE Standard - Supplementary Material.
Dataset, September, 2021

Grafting Key Trees: Efficient Key Management for Overlapping Groups.
Proceedings of the Theory of Cryptography - 19th International Conference, 2021

Keep the Dirt: Tainted TreeKEM, Adaptively and Actively Secure Continuous Group Key Agreement.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

Analysing the HPKE Standard.
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021

Modular Design of Secure Group Messaging Protocols and the Security of MLS.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
Analysing the HPKE Standard - Supplementary Material.
Dataset, November, 2020

Continuous Group Key Agreement with Active Security.
Proceedings of the Theory of Cryptography - 18th International Conference, 2020

Security Analysis and Improvements for the IETF MLS Standard for Group Messaging.
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020

2019
Keep the Dirt: Tainted TreeKEM, an Efficient and Provably Secure Continuous Group Key Agreement Protocol.
IACR Cryptol. ePrint Arch., 2019

The Double Ratchet: Security Notions, Proofs, and Modularization for the Signal Protocol.
Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019

2018
SpaceMint: A Cryptocurrency Based on Proofs of Space.
Proceedings of the Financial Cryptography and Data Security, 2018

Sustained Space Complexity.
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018

On the Memory-Hardness of Data-Independent Password-Hashing Functions.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

2017
Moderately Hard Functions: Definition, Instantiations, and Applications.
Proceedings of the Theory of Cryptography - 15th International Conference, 2017

Cumulative Space in Black-White Pebbling and Resolution.
Proceedings of the 8th Innovations in Theoretical Computer Science Conference, 2017

Towards Practical Attacks on Argon2i and Balloon Hashing.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017

Scrypt Is Maximally Memory-Hard.
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017

Depth-Robust Graphs and Their Cumulative Memory Complexity.
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017

Practical Graphs for Optimal Side-Channel Resistant Memory-Hard Functions.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

Beyond Hellman's Time-Memory Trade-Offs with Applications to Proofs of Space.
Proceedings of the Advances in Cryptology - ASIACRYPT 2017, 2017

2016
On the Complexity of Scrypt and Proofs of Space in the Parallel Random Oracle Model.
Proceedings of the Advances in Cryptology - EUROCRYPT 2016, 2016

Efficiently Computing Data-Independent Memory-Hard Functions.
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016

2015
High Parallel Complexity Graphs and Memory-Hard Functions.
Proceedings of the Forty-Seventh Annual ACM on Symposium on Theory of Computing, 2015

Incoercible Multi-party Computation and Universally Composable Receipt-Free Voting.
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015

2014
Key-Indistinguishable Message Authentication Codes.
Proceedings of the Security and Cryptography for Networks - 9th International Conference, 2014

Anonymous Authentication with Shared Secrets.
Proceedings of the Progress in Cryptology - LATINCRYPT 2014, 2014

2013
On the Relationship between Functional Encryption, Obfuscation, and Fully Homomorphic Encryption.
Proceedings of the Cryptography and Coding - 14th IMA International Conference, 2013

Learning with Rounding, Revisited - New Reduction, Properties and Applications.
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013

2012
Collusion-Preserving Computation.
Proceedings of the Advances in Cryptology - CRYPTO 2012, 2012

2011
Collusion Preserving Computation.
PhD thesis, 2011

2010
Public-Key Encryption in the Bounded-Retrieval Model.
Proceedings of the Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30, 2010

2009
Generating Shorter Bases for Hard Random Lattices.
Proceedings of the 26th International Symposium on Theoretical Aspects of Computer Science, 2009

Survey: Leakage Resilience and the Bounded Retrieval Model.
Proceedings of the Information Theoretic Security, 4th International Conference, 2009

Collusion-Free Multiparty Computation in the Mediated Model.
Proceedings of the Advances in Cryptology, 2009

Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model.
Proceedings of the Advances in Cryptology, 2009

2008
Collusion-Free Protocols in the Mediated Model.
Proceedings of the Advances in Cryptology, 2008

2005
Impossibility and Feasibility Results for Zero Knowledge with Public Keys.
Proceedings of the Advances in Cryptology, 2005


  Loading...