Follow
Joseph Jaeger
Joseph Jaeger
Assistant Professor, Georgia Institute of Technology
Verified email at gatech.edu - Homepage
Title
Cited by
Cited by
Year
Dynamic searchable encryption in very-large databases: Data structures and implementation
D Cash, J Jaeger, S Jarecki, C Jutla, H Krawczyk, MC Roşu, M Steiner
Cryptology ePrint Archive, 2014
8552014
Pact: Privacy sensitive protocols and mechanisms for mobile contact tracing
J Chan, D Foster, S Gollakota, E Horvitz, J Jaeger, S Kakade, T Kohno, ...
arXiv preprint arXiv:2004.03544, 2020
1872020
Ratcheted encryption and key exchange: The security of messaging
M Bellare, AC Singh, J Jaeger, M Nyayapati, I Stepanovs
Advances in Cryptology–CRYPTO 2017: 37th Annual International Cryptology …, 2017
1142017
Mass-surveillance without the state: Strongly undetectable algorithm-substitution attacks
M Bellare, J Jaeger, D Kane
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
1042015
Optimal channel security against fine-grained state compromise: The safety of messaging
J Jaeger, I Stepanovs
Advances in Cryptology–CRYPTO 2018: 38th Annual International Cryptology …, 2018
882018
Honey encryption beyond message recovery security
J Jaeger, T Ristenpart, Q Tang
Advances in Cryptology–EUROCRYPT 2016: 35th Annual International Conference …, 2016
342016
Expected-time cryptography: generic techniques and applications to concrete soundness
J Jaeger, S Tessaro
Theory of Cryptography: 18th International Conference, TCC 2020, Durham, NC …, 2020
242020
Quantum key-length extension
J Jaeger, F Song, S Tessaro
Theory of Cryptography Conference, 209-239, 2021
192021
Tight time-memory trade-offs for symmetric encryption
J Jaeger, S Tessaro
Advances in Cryptology–EUROCRYPT 2019: 38th Annual International Conference …, 2019
192019
The memory-tightness of authenticated encryption
A Ghoshal, J Jaeger, S Tessaro
Advances in Cryptology–CRYPTO 2020: 40th Annual International Cryptology …, 2020
142020
Handling adaptive compromise for practical encryption schemes
J Jaeger, N Tyagi
Advances in Cryptology–CRYPTO 2020: 40th Annual International Cryptology …, 2020
122020
Better than advertised: Improved collision-resistance guarantees for md-based hash functions
M Bellare, J Jaeger, J Len
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
92017
Hiding in plain sight: memory-tight proofs via randomness programming
A Ghoshal, R Ghosal, J Jaeger, S Tessaro
Annual International Conference on the Theory and Applications of …, 2022
52022
Network protection with a process computer
H Strecker, J Jaeger, A Kumar
31979
Let Attackers Program Ideal Models: Modularity and Composability for Adaptive Compromise
J Jaeger
Annual International Conference on the Theory and Applications of …, 2023
12023
Memory-tight multi-challenge security of public-key encryption
J Jaeger, A Kumar
International Conference on the Theory and Application of Cryptology and …, 2022
12022
Secure Messaging: From Systems to Theory
J Jaeger
University of California, San Diego, 2019
12019
Symmetric Signcryption and E2EE Group Messaging in Keybase
J Jaeger, A Kumar, I Stepanovs
Annual International Conference on the Theory and Applications of …, 2024
2024
Nonadaptive One-Way to Hiding Implies Adaptive Quantum Reprogramming
J Jaeger
Cryptology ePrint Archive, 2024
2024
The system can't perform the operation now. Try again later.
Articles 1–19