Dynamic searchable encryption in very-large databases: Data structures and implementation D Cash, J Jaeger, S Jarecki, C Jutla, H Krawczyk, MC Roşu, M Steiner Cryptology ePrint Archive, 2014 | 767 | 2014 |
Pact: Privacy sensitive protocols and mechanisms for mobile contact tracing J Chan, D Foster, S Gollakota, E Horvitz, J Jaeger, S Kakade, T Kohno, ... arXiv preprint arXiv:2004.03544, 2020 | 167 | 2020 |
Ratcheted encryption and key exchange: The security of messaging M Bellare, AC Singh, J Jaeger, M Nyayapati, I Stepanovs Advances in Cryptology–CRYPTO 2017: 37th Annual International Cryptology …, 2017 | 92 | 2017 |
Mass-surveillance without the state: Strongly undetectable algorithm-substitution attacks M Bellare, J Jaeger, D Kane Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 86 | 2015 |
Optimal channel security against fine-grained state compromise: The safety of messaging J Jaeger, I Stepanovs Advances in Cryptology–CRYPTO 2018: 38th Annual International Cryptology …, 2018 | 71 | 2018 |
Honey encryption beyond message recovery security J Jaeger, T Ristenpart, Q Tang Advances in Cryptology–EUROCRYPT 2016: 35th Annual International Conference …, 2016 | 29 | 2016 |
Expected-time cryptography: generic techniques and applications to concrete soundness J Jaeger, S Tessaro Theory of Cryptography: 18th International Conference, TCC 2020, Durham, NC …, 2020 | 14 | 2020 |
Tight time-memory trade-offs for symmetric encryption J Jaeger, S Tessaro Advances in Cryptology–EUROCRYPT 2019: 38th Annual International Conference …, 2019 | 14 | 2019 |
Quantum key-length extension J Jaeger, F Song, S Tessaro Theory of Cryptography: 19th International Conference, TCC 2021, Raleigh, NC …, 2021 | 10 | 2021 |
Handling adaptive compromise for practical encryption schemes J Jaeger, N Tyagi Advances in Cryptology–CRYPTO 2020: 40th Annual International Cryptology …, 2020 | 9 | 2020 |
Better than advertised: Improved collision-resistance guarantees for md-based hash functions M Bellare, J Jaeger, J Len Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 9 | 2017 |
The memory-tightness of authenticated encryption A Ghoshal, J Jaeger, S Tessaro Advances in Cryptology–CRYPTO 2020: 40th Annual International Cryptology …, 2020 | 8 | 2020 |
Hiding in plain sight: memory-tight proofs via randomness programming A Ghoshal, R Ghosal, J Jaeger, S Tessaro Advances in Cryptology–EUROCRYPT 2022: 41st Annual International Conference …, 2022 | 2 | 2022 |
Secure Messaging: From Systems to Theory J Jaeger University of California, San Diego, 2019 | 1 | 2019 |
Let Attackers Program Ideal Models: Modularity and Composability for Adaptive Compromise J Jaeger Advances in Cryptology–EUROCRYPT 2023: 42nd Annual International Conference …, 2023 | | 2023 |
Memory-tight multi-challenge security of public-key encryption J Jaeger, A Kumar Advances in Cryptology–ASIACRYPT 2022: 28th International Conference on the …, 2023 | | 2023 |
Bridging the Theory and Practice of Cryptography J Jaeger Georgia Institute of Technology, 2021 | | 2021 |