Dynamic searchable encryption in very-large databases: Data structures and implementation D Cash, J Jaeger, S Jarecki, C Jutla, H Krawczyk, MC Roşu, M Steiner Cryptology ePrint Archive, 2014 | 863 | 2014 |
Pact: Privacy sensitive protocols and mechanisms for mobile contact tracing J Chan, D Foster, S Gollakota, E Horvitz, J Jaeger, S Kakade, T Kohno, ... arXiv preprint arXiv:2004.03544, 2020 | 186 | 2020 |
Ratcheted encryption and key exchange: The security of messaging M Bellare, AC Singh, J Jaeger, M Nyayapati, I Stepanovs Advances in Cryptology–CRYPTO 2017: 37th Annual International Cryptology …, 2017 | 116 | 2017 |
Mass-surveillance without the state: Strongly undetectable algorithm-substitution attacks M Bellare, J Jaeger, D Kane Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 107 | 2015 |
Optimal channel security against fine-grained state compromise: The safety of messaging J Jaeger, I Stepanovs Advances in Cryptology–CRYPTO 2018: 38th Annual International Cryptology …, 2018 | 91 | 2018 |
Honey encryption beyond message recovery security J Jaeger, T Ristenpart, Q Tang Advances in Cryptology–EUROCRYPT 2016: 35th Annual International Conference …, 2016 | 35 | 2016 |
Expected-time cryptography: generic techniques and applications to concrete soundness J Jaeger, S Tessaro Theory of Cryptography: 18th International Conference, TCC 2020, Durham, NC …, 2020 | 24 | 2020 |
Quantum key-length extension J Jaeger, F Song, S Tessaro Theory of Cryptography Conference, 209-239, 2021 | 19 | 2021 |
Tight time-memory trade-offs for symmetric encryption J Jaeger, S Tessaro Advances in Cryptology–EUROCRYPT 2019: 38th Annual International Conference …, 2019 | 19 | 2019 |
The memory-tightness of authenticated encryption A Ghoshal, J Jaeger, S Tessaro Advances in Cryptology–CRYPTO 2020: 40th Annual International Cryptology …, 2020 | 14 | 2020 |
Handling adaptive compromise for practical encryption schemes J Jaeger, N Tyagi Advances in Cryptology–CRYPTO 2020: 40th Annual International Cryptology …, 2020 | 13 | 2020 |
Better than advertised: Improved collision-resistance guarantees for md-based hash functions M Bellare, J Jaeger, J Len Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 9 | 2017 |
Hiding in plain sight: memory-tight proofs via randomness programming A Ghoshal, R Ghosal, J Jaeger, S Tessaro Annual International Conference on the Theory and Applications of …, 2022 | 5 | 2022 |
Network protection with a process computer H Strecker, J Jaeger, A Kumar | 3 | 1979 |
Let attackers program ideal models: Modularity and composability for adaptive compromise J Jaeger Annual International Conference on the Theory and Applications of …, 2023 | 2 | 2023 |
Memory-tight multi-challenge security of public-key encryption J Jaeger, A Kumar International Conference on the Theory and Application of Cryptology and …, 2022 | 1 | 2022 |
Secure Messaging: From Systems to Theory J Jaeger University of California, San Diego, 2019 | 1 | 2019 |
Symmetric Signcryption and E2EE Group Messaging in Keybase J Jaeger, A Kumar, I Stepanovs Annual International Conference on the Theory and Applications of …, 2024 | | 2024 |
Nonadaptive One-Way to Hiding Implies Adaptive Quantum Reprogramming J Jaeger Cryptology ePrint Archive, 2024 | | 2024 |
Bridging the Theory and Practice of Cryptography J Jaeger Georgia Institute of Technology, 2021 | | 2021 |