BibTeX records: Joseph Jaeger

download as .bib file

@inproceedings{DBLP:conf/eurocrypt/Jaeger23,
  author       = {Joseph Jaeger},
  editor       = {Carmit Hazay and
                  Martijn Stam},
  title        = {Let Attackers Program Ideal Models: Modularity and Composability for
                  Adaptive Compromise},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Lyon, France, April 23-27, 2023, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14006},
  pages        = {101--131},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-30620-4\_4},
  doi          = {10.1007/978-3-031-30620-4\_4},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Jaeger23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JaegerK23,
  author       = {Joseph Jaeger and
                  Akshaya Kumar},
  title        = {Memory-Tight Multi-Challenge Security of Public-Key Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {314},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/314},
  timestamp    = {Fri, 31 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JaegerK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/JaegerK22,
  author       = {Joseph Jaeger and
                  Akshaya Kumar},
  editor       = {Shweta Agrawal and
                  Dongdai Lin},
  title        = {Memory-Tight Multi-challenge Security of Public-Key Encryption},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2022 - 28th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Taipei, Taiwan, December 5-9, 2022, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13793},
  pages        = {454--484},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22969-5\_16},
  doi          = {10.1007/978-3-031-22969-5\_16},
  timestamp    = {Mon, 01 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/JaegerK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/GhoshalGJT22,
  author       = {Ashrujit Ghoshal and
                  Riddhi Ghosal and
                  Joseph Jaeger and
                  Stefano Tessaro},
  editor       = {Orr Dunkelman and
                  Stefan Dziembowski},
  title        = {Hiding in Plain Sight: Memory-Tight Proofs via Randomness Programming},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13276},
  pages        = {706--735},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-07085-3\_24},
  doi          = {10.1007/978-3-031-07085-3\_24},
  timestamp    = {Mon, 01 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/GhoshalGJT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/JaegerST21,
  author       = {Joseph Jaeger and
                  Fang Song and
                  Stefano Tessaro},
  editor       = {Kobbi Nissim and
                  Brent Waters},
  title        = {Quantum Key-Length Extension},
  booktitle    = {Theory of Cryptography - 19th International Conference, {TCC} 2021,
                  Raleigh, NC, USA, November 8-11, 2021, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13042},
  pages        = {209--239},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90459-3\_8},
  doi          = {10.1007/978-3-030-90459-3\_8},
  timestamp    = {Fri, 17 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/JaegerST21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2105-01242,
  author       = {Joseph Jaeger and
                  Fang Song and
                  Stefano Tessaro},
  title        = {Quantum Key-length Extension},
  journal      = {CoRR},
  volume       = {abs/2105.01242},
  year         = {2021},
  url          = {https://arxiv.org/abs/2105.01242},
  eprinttype    = {arXiv},
  eprint       = {2105.01242},
  timestamp    = {Fri, 14 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2105-01242.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JaegerST21,
  author       = {Joseph Jaeger and
                  Fang Song and
                  Stefano Tessaro},
  title        = {Quantum Key-length Extension},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {579},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/579},
  timestamp    = {Mon, 07 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JaegerST21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GhoshalGJT21,
  author       = {Ashrujit Ghoshal and
                  Riddhi Ghosal and
                  Joseph Jaeger and
                  Stefano Tessaro},
  title        = {Hiding in Plain Sight: Memory-tight Proofs via Randomness Programming},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1409},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1409},
  timestamp    = {Fri, 12 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/GhoshalGJT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/debu/ChanFGHJKK0LSSS20,
  author       = {Justin Chan and
                  Landon P. Cox and
                  Dean P. Foster and
                  Shyam Gollakota and
                  Eric Horvitz and
                  Joseph Jaeger and
                  Sham M. Kakade and
                  Tadayoshi Kohno and
                  John Langford and
                  Jonathan Larson and
                  Puneet Sharma and
                  Sudheesh Singanamalla and
                  Jacob E. Sunshine and
                  Stefano Tessaro},
  title        = {{PACT:} Privacy-Sensitive Protocols And Mechanisms for Mobile Contact
                  Tracing},
  journal      = {{IEEE} Data Eng. Bull.},
  volume       = {43},
  number       = {2},
  pages        = {15--35},
  year         = {2020},
  url          = {http://sites.computer.org/debull/A20june/p15.pdf},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/debu/ChanFGHJKK0LSSS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/JaegerT20,
  author       = {Joseph Jaeger and
                  Nirvan Tyagi},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {Handling Adaptive Compromise for Practical Encryption Schemes},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12170},
  pages        = {3--32},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56784-2\_1},
  doi          = {10.1007/978-3-030-56784-2\_1},
  timestamp    = {Mon, 01 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/JaegerT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GhoshalJT20,
  author       = {Ashrujit Ghoshal and
                  Joseph Jaeger and
                  Stefano Tessaro},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {The Memory-Tightness of Authenticated Encryption},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12170},
  pages        = {127--156},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56784-2\_5},
  doi          = {10.1007/978-3-030-56784-2\_5},
  timestamp    = {Mon, 01 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GhoshalJT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/JaegerT20,
  author       = {Joseph Jaeger and
                  Stefano Tessaro},
  editor       = {Rafael Pass and
                  Krzysztof Pietrzak},
  title        = {Expected-Time Cryptography: Generic Techniques and Applications to
                  Concrete Soundness},
  booktitle    = {Theory of Cryptography - 18th International Conference, {TCC} 2020,
                  Durham, NC, USA, November 16-19, 2020, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12552},
  pages        = {414--443},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64381-2\_15},
  doi          = {10.1007/978-3-030-64381-2\_15},
  timestamp    = {Mon, 01 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/JaegerT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2004-03544,
  author       = {Justin Chan and
                  Dean P. Foster and
                  Shyam Gollakota and
                  Eric Horvitz and
                  Joseph Jaeger and
                  Sham M. Kakade and
                  Tadayoshi Kohno and
                  John Langford and
                  Jonathan Larson and
                  Sudheesh Singanamalla and
                  Jacob E. Sunshine and
                  Stefano Tessaro},
  title        = {{PACT:} Privacy Sensitive Protocols and Mechanisms for Mobile Contact
                  Tracing},
  journal      = {CoRR},
  volume       = {abs/2004.03544},
  year         = {2020},
  url          = {https://arxiv.org/abs/2004.03544},
  eprinttype    = {arXiv},
  eprint       = {2004.03544},
  timestamp    = {Tue, 21 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2004-03544.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JaegerT20,
  author       = {Joseph Jaeger and
                  Nirvan Tyagi},
  title        = {Handling Adaptive Compromise for Practical Encryption Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {765},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/765},
  timestamp    = {Tue, 30 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JaegerT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GhoshalJT20,
  author       = {Ashrujit Ghoshal and
                  Joseph Jaeger and
                  Stefano Tessaro},
  title        = {The Memory-Tightness of Authenticated Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {785},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/785},
  timestamp    = {Mon, 27 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GhoshalJT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JaegerT20a,
  author       = {Joseph Jaeger and
                  Stefano Tessaro},
  title        = {Expected-Time Cryptography: Generic Techniques and Applications to
                  Concrete Soundness},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1213},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1213},
  timestamp    = {Fri, 30 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/JaegerT20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/us/Jaeger19,
  author       = {Joseph Jaeger},
  title        = {Secure Messaging: From Systems to Theory},
  school       = {University of California, San Diego, {USA}},
  year         = {2019},
  url          = {https://www.escholarship.org/uc/item/7kd1q23d},
  timestamp    = {Wed, 15 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/us/Jaeger19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/JaegerT19,
  author       = {Joseph Jaeger and
                  Stefano Tessaro},
  editor       = {Yuval Ishai and
                  Vincent Rijmen},
  title        = {Tight Time-Memory Trade-Offs for Symmetric Encryption},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11476},
  pages        = {467--497},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-17653-2\_16},
  doi          = {10.1007/978-3-030-17653-2\_16},
  timestamp    = {Mon, 01 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/JaegerT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JaegerT19,
  author       = {Joseph Jaeger and
                  Stefano Tessaro},
  title        = {Tight Time-Memory Trade-offs for Symmetric Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {258},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/258},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JaegerT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/JaegerS18,
  author       = {Joseph Jaeger and
                  Igors Stepanovs},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {Optimal Channel Security Against Fine-Grained State Compromise: The
                  Safety of Messaging},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10991},
  pages        = {33--62},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96884-1\_2},
  doi          = {10.1007/978-3-319-96884-1\_2},
  timestamp    = {Mon, 01 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/JaegerS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JaegerS18,
  author       = {Joseph Jaeger and
                  Igors Stepanovs},
  title        = {Optimal Channel Security Against Fine-Grained State Compromise: The
                  Safety of Messaging},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {553},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/553},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JaegerS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellareJL18,
  author       = {Mihir Bellare and
                  Joseph Jaeger and
                  Julia Len},
  title        = {Better Than Advertised: Improved Collision-Resistance Guarantees for
                  MD-Based Hash Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {625},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/625},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellareJL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BellareJL17,
  author       = {Mihir Bellare and
                  Joseph Jaeger and
                  Julia Len},
  editor       = {Bhavani Thuraisingham and
                  David Evans and
                  Tal Malkin and
                  Dongyan Xu},
  title        = {Better Than Advertised: Improved Collision-Resistance Guarantees for
                  MD-Based Hash Functions},
  booktitle    = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
                  November 03, 2017},
  pages        = {891--906},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3133956.3134087},
  doi          = {10.1145/3133956.3134087},
  timestamp    = {Mon, 01 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/BellareJL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BellareSJNS17,
  author       = {Mihir Bellare and
                  Asha Camper Singh and
                  Joseph Jaeger and
                  Maya Nyayapati and
                  Igors Stepanovs},
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {Ratcheted Encryption and Key Exchange: The Security of Messaging},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10403},
  pages        = {619--650},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63697-9\_21},
  doi          = {10.1007/978-3-319-63697-9\_21},
  timestamp    = {Mon, 01 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BellareSJNS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/JaegerRT16,
  author       = {Joseph Jaeger and
                  Thomas Ristenpart and
                  Qiang Tang},
  editor       = {Marc Fischlin and
                  Jean{-}S{\'{e}}bastien Coron},
  title        = {Honey Encryption Beyond Message Recovery Security},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Vienna, Austria, May 8-12, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9665},
  pages        = {758--788},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49890-3\_29},
  doi          = {10.1007/978-3-662-49890-3\_29},
  timestamp    = {Mon, 01 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/JaegerRT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JaegerRT16,
  author       = {Joseph Jaeger and
                  Thomas Ristenpart and
                  Qiang Tang},
  title        = {Honey Encryption Beyond Message Recovery Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {174},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/174},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JaegerRT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellareSJNS16,
  author       = {Mihir Bellare and
                  Asha Camper Singh and
                  Joseph Jaeger and
                  Maya Nyayapati and
                  Igors Stepanovs},
  title        = {Ratcheted Encryption and Key Exchange: The Security of Messaging},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1028},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1028},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellareSJNS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BellareJK15,
  author       = {Mihir Bellare and
                  Joseph Jaeger and
                  Daniel Kane},
  editor       = {Indrajit Ray and
                  Ninghui Li and
                  Christopher Kruegel},
  title        = {Mass-surveillance without the State: Strongly Undetectable Algorithm-Substitution
                  Attacks},
  booktitle    = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Denver, CO, USA, October 12-16, 2015},
  pages        = {1431--1440},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2810103.2813681},
  doi          = {10.1145/2810103.2813681},
  timestamp    = {Tue, 09 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/BellareJK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellareJK15,
  author       = {Mihir Bellare and
                  Joseph Jaeger and
                  Daniel Kane},
  title        = {Mass-surveillance without the State: Strongly Undetectable Algorithm-Substitution
                  Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {808},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/808},
  timestamp    = {Tue, 09 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellareJK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/CashJJJKRS14,
  author       = {David Cash and
                  Joseph Jaeger and
                  Stanislaw Jarecki and
                  Charanjit S. Jutla and
                  Hugo Krawczyk and
                  Marcel{-}Catalin Rosu and
                  Michael Steiner},
  title        = {Dynamic Searchable Encryption in Very-Large Databases: Data Structures
                  and Implementation},
  booktitle    = {21st Annual Network and Distributed System Security Symposium, {NDSS}
                  2014, San Diego, California, USA, February 23-26, 2014},
  publisher    = {The Internet Society},
  year         = {2014},
  url          = {https://www.ndss-symposium.org/ndss2014/dynamic-searchable-encryption-very-large-databases-data-structures-and-implementation},
  timestamp    = {Mon, 01 Feb 2021 08:42:18 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/CashJJJKRS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CashJJJKRS14,
  author       = {David Cash and
                  Joseph Jaeger and
                  Stanislaw Jarecki and
                  Charanjit S. Jutla and
                  Hugo Krawczyk and
                  Marcel{-}Catalin Rosu and
                  Michael Steiner},
  title        = {Dynamic Searchable Encryption in Very-Large Databases: Data Structures
                  and Implementation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {853},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/853},
  timestamp    = {Sat, 23 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CashJJJKRS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics