Joseph Jaeger

Orcid: 0000-0002-4934-3405

According to our database1, Joseph Jaeger authored at least 19 papers between 2014 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Symmetric Signcryption and E2EE Group Messaging in Keybase.
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024

2023
Memory-Tight Multi-Challenge Security of Public-Key Encryption.
IACR Cryptol. ePrint Arch., 2023

Let Attackers Program Ideal Models: Modularity and Composability for Adaptive Compromise.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023

2021
Quantum Key-length Extension.
IACR Cryptol. ePrint Arch., 2021

Hiding in Plain Sight: Memory-tight Proofs via Randomness Programming.
IACR Cryptol. ePrint Arch., 2021

Quantum Key-Length Extension.
Proceedings of the Theory of Cryptography - 19th International Conference, 2021

2020
Expected-Time Cryptography: Generic Techniques and Applications to Concrete Soundness.
IACR Cryptol. ePrint Arch., 2020

Handling Adaptive Compromise for Practical Encryption Schemes.
IACR Cryptol. ePrint Arch., 2020

The Memory-Tightness of Authenticated Encryption.
IACR Cryptol. ePrint Arch., 2020

PACT: Privacy-Sensitive Protocols And Mechanisms for Mobile Contact Tracing.
IEEE Data Eng. Bull., 2020

PACT: Privacy Sensitive Protocols and Mechanisms for Mobile Contact Tracing.
CoRR, 2020

2019
Secure Messaging: From Systems to Theory.
PhD thesis, 2019

Tight Time-Memory Trade-offs for Symmetric Encryption.
IACR Cryptol. ePrint Arch., 2019

2018
Optimal Channel Security Against Fine-Grained State Compromise: The Safety of Messaging.
IACR Cryptol. ePrint Arch., 2018

Better Than Advertised: Improved Collision-Resistance Guarantees for MD-Based Hash Functions.
IACR Cryptol. ePrint Arch., 2018

2016
Honey Encryption Beyond Message Recovery Security.
IACR Cryptol. ePrint Arch., 2016

Ratcheted Encryption and Key Exchange: The Security of Messaging.
IACR Cryptol. ePrint Arch., 2016

2015
Mass-surveillance without the State: Strongly Undetectable Algorithm-Substitution Attacks.
IACR Cryptol. ePrint Arch., 2015

2014
Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation.
IACR Cryptol. ePrint Arch., 2014


  Loading...