Joseph Jaeger

Orcid: 0000-0002-4934-3405

According to our database1, Joseph Jaeger authored at least 23 papers between 2014 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Analyzing Group Chat Encryption in MLS, Session, Signal, and Matrix.
Proceedings of the Advances in Cryptology - EUROCRYPT 2025, 2025

Adaptive Security for Constrained PRFs.
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025

2024
Nonadaptive One-Way to Hiding Implies Adaptive Quantum Reprogramming.
IACR Cryptol. ePrint Arch., 2024

Symmetric Signcryption and E2EE Group Messaging in Keybase.
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024

Generic and Algebraic Computation Models: When AGM Proofs Transfer to the GGM.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024

Dictators? Friends? Forgers. - Breaking and Fixing Unforgeability Definitions for Anamorphic Signature Schemes.
Proceedings of the Advances in Cryptology - ASIACRYPT 2024, 2024

2023
Let Attackers Program Ideal Models: Modularity and Composability for Adaptive Compromise.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023

2022
Hiding in Plain Sight: Memory-Tight Proofs via Randomness Programming.
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022

Memory-Tight Multi-challenge Security of Public-Key Encryption.
Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022

2021
Quantum Key-Length Extension.
Proceedings of the Theory of Cryptography - 19th International Conference, 2021

2020
PACT: Privacy-Sensitive Protocols And Mechanisms for Mobile Contact Tracing.
IEEE Data Eng. Bull., 2020

PACT: Privacy Sensitive Protocols and Mechanisms for Mobile Contact Tracing.
CoRR, 2020

Expected-Time Cryptography: Generic Techniques and Applications to Concrete Soundness.
Proceedings of the Theory of Cryptography - 18th International Conference, 2020

Handling Adaptive Compromise for Practical Encryption Schemes.
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020

The Memory-Tightness of Authenticated Encryption.
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020

2019
Secure Messaging: From Systems to Theory.
PhD thesis, 2019

Tight Time-Memory Trade-Offs for Symmetric Encryption.
Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019

2018
Optimal Channel Security Against Fine-Grained State Compromise: The Safety of Messaging.
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018

2017
Ratcheted Encryption and Key Exchange: The Security of Messaging.
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017

Better Than Advertised: Improved Collision-Resistance Guarantees for MD-Based Hash Functions.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Honey Encryption Beyond Message Recovery Security.
Proceedings of the Advances in Cryptology - EUROCRYPT 2016, 2016

2015
Mass-surveillance without the State: Strongly Undetectable Algorithm-Substitution Attacks.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014


  Loading...