Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Joseph Jaeger
@inproceedings{DBLP:conf/eurocrypt/Jaeger23, author = {Joseph Jaeger}, editor = {Carmit Hazay and Martijn Stam}, title = {Let Attackers Program Ideal Models: Modularity and Composability for Adaptive Compromise}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14006}, pages = {101--131}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30620-4\_4}, doi = {10.1007/978-3-031-30620-4\_4}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Jaeger23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JaegerK23, author = {Joseph Jaeger and Akshaya Kumar}, title = {Memory-Tight Multi-Challenge Security of Public-Key Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {314}, year = {2023}, url = {https://eprint.iacr.org/2023/314}, timestamp = {Fri, 31 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JaegerK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/JaegerK22, author = {Joseph Jaeger and Akshaya Kumar}, editor = {Shweta Agrawal and Dongdai Lin}, title = {Memory-Tight Multi-challenge Security of Public-Key Encryption}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5-9, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13793}, pages = {454--484}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22969-5\_16}, doi = {10.1007/978-3-031-22969-5\_16}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/JaegerK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GhoshalGJT22, author = {Ashrujit Ghoshal and Riddhi Ghosal and Joseph Jaeger and Stefano Tessaro}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {Hiding in Plain Sight: Memory-Tight Proofs via Randomness Programming}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13276}, pages = {706--735}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-07085-3\_24}, doi = {10.1007/978-3-031-07085-3\_24}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GhoshalGJT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/JaegerST21, author = {Joseph Jaeger and Fang Song and Stefano Tessaro}, editor = {Kobbi Nissim and Brent Waters}, title = {Quantum Key-Length Extension}, booktitle = {Theory of Cryptography - 19th International Conference, {TCC} 2021, Raleigh, NC, USA, November 8-11, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13042}, pages = {209--239}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90459-3\_8}, doi = {10.1007/978-3-030-90459-3\_8}, timestamp = {Fri, 17 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/JaegerST21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2105-01242, author = {Joseph Jaeger and Fang Song and Stefano Tessaro}, title = {Quantum Key-length Extension}, journal = {CoRR}, volume = {abs/2105.01242}, year = {2021}, url = {https://arxiv.org/abs/2105.01242}, eprinttype = {arXiv}, eprint = {2105.01242}, timestamp = {Fri, 14 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2105-01242.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JaegerST21, author = {Joseph Jaeger and Fang Song and Stefano Tessaro}, title = {Quantum Key-length Extension}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {579}, year = {2021}, url = {https://eprint.iacr.org/2021/579}, timestamp = {Mon, 07 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JaegerST21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GhoshalGJT21, author = {Ashrujit Ghoshal and Riddhi Ghosal and Joseph Jaeger and Stefano Tessaro}, title = {Hiding in Plain Sight: Memory-tight Proofs via Randomness Programming}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1409}, year = {2021}, url = {https://eprint.iacr.org/2021/1409}, timestamp = {Fri, 12 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/GhoshalGJT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/debu/ChanFGHJKK0LSSS20, author = {Justin Chan and Landon P. Cox and Dean P. Foster and Shyam Gollakota and Eric Horvitz and Joseph Jaeger and Sham M. Kakade and Tadayoshi Kohno and John Langford and Jonathan Larson and Puneet Sharma and Sudheesh Singanamalla and Jacob E. Sunshine and Stefano Tessaro}, title = {{PACT:} Privacy-Sensitive Protocols And Mechanisms for Mobile Contact Tracing}, journal = {{IEEE} Data Eng. Bull.}, volume = {43}, number = {2}, pages = {15--35}, year = {2020}, url = {http://sites.computer.org/debull/A20june/p15.pdf}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/debu/ChanFGHJKK0LSSS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/JaegerT20, author = {Joseph Jaeger and Nirvan Tyagi}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {Handling Adaptive Compromise for Practical Encryption Schemes}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12170}, pages = {3--32}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56784-2\_1}, doi = {10.1007/978-3-030-56784-2\_1}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/JaegerT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GhoshalJT20, author = {Ashrujit Ghoshal and Joseph Jaeger and Stefano Tessaro}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {The Memory-Tightness of Authenticated Encryption}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12170}, pages = {127--156}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56784-2\_5}, doi = {10.1007/978-3-030-56784-2\_5}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GhoshalJT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/JaegerT20, author = {Joseph Jaeger and Stefano Tessaro}, editor = {Rafael Pass and Krzysztof Pietrzak}, title = {Expected-Time Cryptography: Generic Techniques and Applications to Concrete Soundness}, booktitle = {Theory of Cryptography - 18th International Conference, {TCC} 2020, Durham, NC, USA, November 16-19, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12552}, pages = {414--443}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64381-2\_15}, doi = {10.1007/978-3-030-64381-2\_15}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/JaegerT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2004-03544, author = {Justin Chan and Dean P. Foster and Shyam Gollakota and Eric Horvitz and Joseph Jaeger and Sham M. Kakade and Tadayoshi Kohno and John Langford and Jonathan Larson and Sudheesh Singanamalla and Jacob E. Sunshine and Stefano Tessaro}, title = {{PACT:} Privacy Sensitive Protocols and Mechanisms for Mobile Contact Tracing}, journal = {CoRR}, volume = {abs/2004.03544}, year = {2020}, url = {https://arxiv.org/abs/2004.03544}, eprinttype = {arXiv}, eprint = {2004.03544}, timestamp = {Tue, 21 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2004-03544.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JaegerT20, author = {Joseph Jaeger and Nirvan Tyagi}, title = {Handling Adaptive Compromise for Practical Encryption Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {765}, year = {2020}, url = {https://eprint.iacr.org/2020/765}, timestamp = {Tue, 30 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JaegerT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GhoshalJT20, author = {Ashrujit Ghoshal and Joseph Jaeger and Stefano Tessaro}, title = {The Memory-Tightness of Authenticated Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {785}, year = {2020}, url = {https://eprint.iacr.org/2020/785}, timestamp = {Mon, 27 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GhoshalJT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JaegerT20a, author = {Joseph Jaeger and Stefano Tessaro}, title = {Expected-Time Cryptography: Generic Techniques and Applications to Concrete Soundness}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1213}, year = {2020}, url = {https://eprint.iacr.org/2020/1213}, timestamp = {Fri, 30 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/JaegerT20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/us/Jaeger19, author = {Joseph Jaeger}, title = {Secure Messaging: From Systems to Theory}, school = {University of California, San Diego, {USA}}, year = {2019}, url = {https://www.escholarship.org/uc/item/7kd1q23d}, timestamp = {Wed, 15 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/us/Jaeger19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/JaegerT19, author = {Joseph Jaeger and Stefano Tessaro}, editor = {Yuval Ishai and Vincent Rijmen}, title = {Tight Time-Memory Trade-Offs for Symmetric Encryption}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11476}, pages = {467--497}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17653-2\_16}, doi = {10.1007/978-3-030-17653-2\_16}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/JaegerT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JaegerT19, author = {Joseph Jaeger and Stefano Tessaro}, title = {Tight Time-Memory Trade-offs for Symmetric Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {258}, year = {2019}, url = {https://eprint.iacr.org/2019/258}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JaegerT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/JaegerS18, author = {Joseph Jaeger and Igors Stepanovs}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {Optimal Channel Security Against Fine-Grained State Compromise: The Safety of Messaging}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10991}, pages = {33--62}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96884-1\_2}, doi = {10.1007/978-3-319-96884-1\_2}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/JaegerS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JaegerS18, author = {Joseph Jaeger and Igors Stepanovs}, title = {Optimal Channel Security Against Fine-Grained State Compromise: The Safety of Messaging}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {553}, year = {2018}, url = {https://eprint.iacr.org/2018/553}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JaegerS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BellareJL18, author = {Mihir Bellare and Joseph Jaeger and Julia Len}, title = {Better Than Advertised: Improved Collision-Resistance Guarantees for MD-Based Hash Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {625}, year = {2018}, url = {https://eprint.iacr.org/2018/625}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BellareJL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BellareJL17, author = {Mihir Bellare and Joseph Jaeger and Julia Len}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Better Than Advertised: Improved Collision-Resistance Guarantees for MD-Based Hash Functions}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {891--906}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134087}, doi = {10.1145/3133956.3134087}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/BellareJL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BellareSJNS17, author = {Mihir Bellare and Asha Camper Singh and Joseph Jaeger and Maya Nyayapati and Igors Stepanovs}, editor = {Jonathan Katz and Hovav Shacham}, title = {Ratcheted Encryption and Key Exchange: The Security of Messaging}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10403}, pages = {619--650}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63697-9\_21}, doi = {10.1007/978-3-319-63697-9\_21}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BellareSJNS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/JaegerRT16, author = {Joseph Jaeger and Thomas Ristenpart and Qiang Tang}, editor = {Marc Fischlin and Jean{-}S{\'{e}}bastien Coron}, title = {Honey Encryption Beyond Message Recovery Security}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9665}, pages = {758--788}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49890-3\_29}, doi = {10.1007/978-3-662-49890-3\_29}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/JaegerRT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JaegerRT16, author = {Joseph Jaeger and Thomas Ristenpart and Qiang Tang}, title = {Honey Encryption Beyond Message Recovery Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {174}, year = {2016}, url = {http://eprint.iacr.org/2016/174}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JaegerRT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BellareSJNS16, author = {Mihir Bellare and Asha Camper Singh and Joseph Jaeger and Maya Nyayapati and Igors Stepanovs}, title = {Ratcheted Encryption and Key Exchange: The Security of Messaging}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1028}, year = {2016}, url = {http://eprint.iacr.org/2016/1028}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BellareSJNS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BellareJK15, author = {Mihir Bellare and Joseph Jaeger and Daniel Kane}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Mass-surveillance without the State: Strongly Undetectable Algorithm-Substitution Attacks}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1431--1440}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813681}, doi = {10.1145/2810103.2813681}, timestamp = {Tue, 09 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/BellareJK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BellareJK15, author = {Mihir Bellare and Joseph Jaeger and Daniel Kane}, title = {Mass-surveillance without the State: Strongly Undetectable Algorithm-Substitution Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {808}, year = {2015}, url = {http://eprint.iacr.org/2015/808}, timestamp = {Tue, 09 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BellareJK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/CashJJJKRS14, author = {David Cash and Joseph Jaeger and Stanislaw Jarecki and Charanjit S. Jutla and Hugo Krawczyk and Marcel{-}Catalin Rosu and Michael Steiner}, title = {Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation}, booktitle = {21st Annual Network and Distributed System Security Symposium, {NDSS} 2014, San Diego, California, USA, February 23-26, 2014}, publisher = {The Internet Society}, year = {2014}, url = {https://www.ndss-symposium.org/ndss2014/dynamic-searchable-encryption-very-large-databases-data-structures-and-implementation}, timestamp = {Mon, 01 Feb 2021 08:42:18 +0100}, biburl = {https://dblp.org/rec/conf/ndss/CashJJJKRS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CashJJJKRS14, author = {David Cash and Joseph Jaeger and Stanislaw Jarecki and Charanjit S. Jutla and Hugo Krawczyk and Marcel{-}Catalin Rosu and Michael Steiner}, title = {Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {853}, year = {2014}, url = {http://eprint.iacr.org/2014/853}, timestamp = {Sat, 23 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CashJJJKRS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.