Degabriele, Jean Paul
17  results:
Search for persons X
?
1

Populating the Zoo of Rugged Pseudorandom Permutations:

, In: Advances in Cryptology – ASIACRYPT 2023; Lecture Notes in Computer Science,
 
?
2

The Indifferentiability of the Duplex and Its Practical App..:

, In: Advances in Cryptology – ASIACRYPT 2023; Lecture Notes in Computer Science,
 
?
3

Overloading the Nonce: Rugged PRPs, Nonce-Set AEAD, and Ord..:

, In: Advances in Cryptology – CRYPTO 2022; Lecture Notes in Computer Science,
 
?
4

The Security of ChaCha20-Poly1305 in the Multi-User Setting:

, In: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security,
 
?
5

Hiding the Lengths of Encrypted Messages via Gaussian Paddi..:

, In: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security,
Degabriele, Jean Paul - p. 1549-1565 , 2021
 
?
6

Sponges Resist Leakage: The Case of Authenticated Encryptio:

, In: Lecture Notes in Computer Science; Advances in Cryptology – ASIACRYPT 2019,
 
?
7

Simulatable Channels: Extended Security that is Universally..:

, In: Lecture Notes in Computer Science; Advances in Cryptology – ASIACRYPT 2018,
Degabriele, Jean Paul ; Fischlin, Marc - p. 519-550 , 2018
 
?
8

A Surfeit of SSH Cipher Suites:

, In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security,
 
?
9

Unpicking PLAID: a cryptographic analysis of an ISO-standar..:

Degabriele, Jean Paul ; Fehr, Victoria ; Fischlin, Marc...
International Journal of Information Security.  15 (2016)  6 - p. 637-657 , 2016
 
?
10

Provable Security in the Real World:

Degabriele, Jean Paul ; Paterson, Kenny ; Watson, Gaven
IEEE Security & Privacy Magazine.  9 (2011)  3 - p. 33-41 , 2011
 
?
11

On the (in)security of IPsec in MAC-then-encrypt configurat..:

, In: Proceedings of the 17th ACM conference on Computer and communications security,
 
?
12

Economic aspects of a utility computing service:

, In: Proceedings of the first international conference on Networks for grid applications,
Degabriele, Jean Paul ; Pym, David - p. 1-7 , 2007
 
?
13

SoK: Efficient Design and Implementation of Polynomial Hash..:

Degabriele, Jean Paul ; Gilcher, Jan ; Govinden, Jérôme.
info:eu-repo/semantics/altIdentifier/doi/10.1109/SP54263.2024.00132.  , 2024
 
?
14

Untagging Tor:A Formal Treatment of Onion Encryption:

Degabriele, Jean Paul ; Stam, Martijn
Degabriele , J P & Stam , M 2018 , Untagging Tor : A Formal Treatment of Onion Encryption . in J Buus Nielsen & V Rijmen (eds) , Advances in Cryptology - EUROCRYPT 2018 : 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part I . Lecture Notes in Computer Science , vol. 10820 , Springer , pp. 259-293 . https://doi.org/10.1007/978-3-319-78372-7_9.  , 2018
 
?
15

Unpicking PLAID: a cryptographic analysis of an ISO-standar..:

Degabriele, Jean Paul ; Fehr, Victoria ; Fischlin, Marc...
https://rhul.elsevierpure.com/en/publications/656e0c31-493e-4c5d-bede-a997c55e9c4d.  , 2016
 
1-15