default search action
Jean Paul Degabriele
Person information
- affiliation: Technische Universität Darmstadt, Germany
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c20]Jean Paul Degabriele, Jan Gilcher, Jérôme Govinden, Kenneth G. Paterson:
SoK: Efficient Design and Implementation of Polynomial Hash Functions over Prime Fields. SP 2024: 3128-3146 - 2023
- [c19]Jean Paul Degabriele, Marc Fischlin, Jérôme Govinden:
The Indifferentiability of the Duplex and Its Practical Applications. ASIACRYPT (8) 2023: 237-269 - [c18]Jean Paul Degabriele, Vukasin Karadzic:
Populating the Zoo of Rugged Pseudorandom Permutations. ASIACRYPT (8) 2023: 270-300 - [i13]Jean Paul Degabriele, Jérôme Govinden, Felix Günther, Kenneth G. Paterson:
The Security of ChaCha20-Poly1305 in the Multi-user Setting. IACR Cryptol. ePrint Arch. 2023: 85 (2023) - [i12]Jean Paul Degabriele, Vukasin Karadzic:
Populating the Zoo of Rugged Pseudorandom Permutations. IACR Cryptol. ePrint Arch. 2023: 1432 (2023) - 2022
- [c17]Jean Paul Degabriele, Vukasin Karadzic:
Overloading the Nonce: Rugged PRPs, Nonce-Set AEAD, and Order-Resilient Channels. CRYPTO (4) 2022: 264-295 - [i11]Jean Paul Degabriele, Vukasin Karadzic:
Overloading the Nonce: Rugged PRPs, Nonce-Set AEAD, and Order-Resilient Channels. IACR Cryptol. ePrint Arch. 2022: 817 (2022) - 2021
- [c16]Jean Paul Degabriele:
Hiding the Lengths of Encrypted Messages via Gaussian Padding. CCS 2021: 1549-1565 - [c15]Jean Paul Degabriele, Jérôme Govinden, Felix Günther, Kenneth G. Paterson:
The Security of ChaCha20-Poly1305 in the Multi-User Setting. CCS 2021: 1981-2003
2010 – 2019
- 2019
- [c14]Jean Paul Degabriele, Christian Janson, Patrick Struck:
Sponges Resist Leakage: The Case of Authenticated Encryption. ASIACRYPT (2) 2019: 209-240 - [c13]Jean Paul Degabriele, Christian Janson, Patrick Struck:
Sponges Resist Leakage: The Case of Authenticated Encryption. Krypto-Tag 2019 - [i10]Jean Paul Degabriele, Christian Janson, Patrick Struck:
Sponges Resist Leakage: The Case of Authenticated Encryption. IACR Cryptol. ePrint Arch. 2019: 1034 (2019) - 2018
- [c12]Jean Paul Degabriele, Marc Fischlin:
Simulatable Channels: Extended Security that is Universally Composable and Easier to Prove. ASIACRYPT (3) 2018: 519-550 - [c11]Jean Paul Degabriele, Martijn Stam:
Untagging Tor: A Formal Treatment of Onion Encryption. EUROCRYPT (3) 2018: 259-293 - [i9]Jean Paul Degabriele, Martijn Stam:
Untagging Tor: A Formal Treatment of Onion Encryption. IACR Cryptol. ePrint Arch. 2018: 162 (2018) - [i8]Jean Paul Degabriele, Marc Fischlin:
Simulatable Channels: Extended Security that is Universally Composable and Easier to Prove. IACR Cryptol. ePrint Arch. 2018: 844 (2018) - 2016
- [j2]Jean Paul Degabriele, Victoria Fehr, Marc Fischlin, Tommaso Gagliardoni, Felix Günther, Giorgia Azzurra Marson, Arno Mittelbach, Kenneth G. Paterson:
Unpicking PLAID: a cryptographic analysis of an ISO-standards-track authentication protocol. Int. J. Inf. Sec. 15(6): 637-657 (2016) - [c10]Martin R. Albrecht, Jean Paul Degabriele, Torben Brandt Hansen, Kenneth G. Paterson:
A Surfeit of SSH Cipher Suites. CCS 2016: 1480-1491 - [c9]Jean Paul Degabriele, Kenneth G. Paterson, Jacob C. N. Schuldt, Joanne Woodage:
Backdoors in Pseudorandom Number Generators: Possibility and Impossibility Results. CRYPTO (1) 2016: 403-432 - [i7]Jean Paul Degabriele, Kenneth G. Paterson, Jacob C. N. Schuldt, Joanne Woodage:
Backdoors in Pseudorandom Number Generators: Possibility and Impossibility Results. IACR Cryptol. ePrint Arch. 2016: 577 (2016) - 2015
- [c8]Jean Paul Degabriele, Pooya Farshim, Bertram Poettering:
A More Cautious Approach to Security Against Mass Surveillance. FSE 2015: 579-598 - [i6]Alexandra Boldyreva, Jean Paul Degabriele, Kenneth G. Paterson, Martijn Stam:
Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation. IACR Cryptol. ePrint Arch. 2015: 59 (2015) - [i5]Jean Paul Degabriele, Pooya Farshim, Bertram Poettering:
A More Cautious Approach to Security Against Mass Surveillance. IACR Cryptol. ePrint Arch. 2015: 748 (2015) - 2014
- [c7]Jean Paul Degabriele, Victoria Fehr, Marc Fischlin, Tommaso Gagliardoni, Felix Günther, Giorgia Azzurra Marson, Arno Mittelbach, Kenneth G. Paterson:
Unpicking PLAID - A Cryptographic Analysis of an ISO-Standards-Track Authentication Protocol. SSR 2014: 1-25 - [i4]Jean Paul Degabriele, Victoria Fehr, Marc Fischlin, Tommaso Gagliardoni, Felix Günther, Giorgia Azzurra Marson, Arno Mittelbach, Kenneth G. Paterson:
Unpicking PLAID - A Cryptographic Analysis of an ISO-standards-track Authentication Protocol. IACR Cryptol. ePrint Arch. 2014: 728 (2014) - 2013
- [c6]Alexandra Boldyreva, Jean Paul Degabriele, Kenneth G. Paterson, Martijn Stam:
On Symmetric Encryption with Distinguishable Decryption Failures. FSE 2013: 367-390 - [i3]Alexandra Boldyreva, Jean Paul Degabriele, Kenneth G. Paterson, Martijn Stam:
On Symmetric Encryption with Distinguishable Decryption Failures. IACR Cryptol. ePrint Arch. 2013: 433 (2013) - 2012
- [c5]Jean Paul Degabriele, Anja Lehmann, Kenneth G. Paterson, Nigel P. Smart, Mario Strefler:
On the Joint Security of Encryption and Signature in EMV. CT-RSA 2012: 116-135 - [c4]Alexandra Boldyreva, Jean Paul Degabriele, Kenneth G. Paterson, Martijn Stam:
Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation. EUROCRYPT 2012: 682-699 - 2011
- [j1]Jean Paul Degabriele, Kenneth G. Paterson, Gaven J. Watson:
Provable Security in the Real World. IEEE Secur. Priv. 9(3): 33-41 (2011) - [i2]Jean Paul Degabriele, Anja Lehmann, Kenneth G. Paterson, Nigel P. Smart, Mario Strefler:
On the Joint Security of Encryption and Signature in EMV. IACR Cryptol. ePrint Arch. 2011: 615 (2011) - 2010
- [c3]Jean Paul Degabriele, Kenneth G. Paterson:
On the (in)security of IPsec in MAC-then-encrypt configurations. CCS 2010: 493-504
2000 – 2009
- 2007
- [c2]Jean Paul Degabriele, David J. Pym:
Economic aspects of a utility computing service. GridNets 2007: 27 - [c1]Jean Paul Degabriele, Kenneth G. Paterson:
Attacking the IPsec Standards in Encryption-only Configurations. S&P 2007: 335-349 - [i1]Jean Paul Degabriele, Kenneth G. Paterson:
Attacking the IPsec Standards in Encryption-only Configurations. IACR Cryptol. ePrint Arch. 2007: 125 (2007)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-23 00:28 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint