Presented in-person and online via Bluejeans Meetings on October 8, 2021 at 12:30 p.m.Joseph Jaeger is an Assistant Professor in the School of Cybersecurity and Privacy at the Georgia Institute of Technology. He works on cryptography, cybersecurity, and theoretical computer science. His research aims to apply the proof-based techniques of theory to better understand or improve the security of real-world protocols.Runtime: 52:31 minutesCryptography is deployed at scale to protect data, both in transit and at rest. However, protocols are often designed or even deployed aiming for security that extends beyond what is formally understood. This talk will cover my efforts to narrow this gap and to provide protocols that are both practical and pro...
Presented on November 1, 2019 at 12:00 p.m. in the Krone Engineered Biosystems Building, Room 1005.D...
With the advancement in Internet-based technologies, network applications are no longer just limited...
Cryptography will continue to play important roles in developing of new security solutions which wil...
Presented on March 1, 2018 at 6:00 p.m. in the Klaus Advanced Computing Building, Room 1443.Jill C. ...
In 2015 more than 150 million records and $400 billion were lost due to publicly-reported criminal a...
We study several basic problems in cryptography: Leakage resilient cryptography: cryptographic schem...
This book constitutes the thoroughly refereed post-workshop proceedings of the 26th International Wo...
Secure communication has become an essential ingredient of our daily life. Mostly unnoticed, cryptog...
Secure connections are at the heart of today's Internet infrastructure, protecting the confidentiali...
The need for secure systems and improved authentication methods is growing as online transactions an...
The popularity of personal computing devices (e.g. smart cards) exposes users to risks, notably iden...
My research interests lie at the intersection of cryptographic research, and systems security and pr...
Cryptography is now ubiquitous – moving beyond the traditional environments, such as government comm...
Security has become a buzzword over the current years. As per Wikipedia, 55.1% of global population ...
Cryptography has a long and fascinating history. Over the centuries, an elaborate set of protocols a...
Presented on November 1, 2019 at 12:00 p.m. in the Krone Engineered Biosystems Building, Room 1005.D...
With the advancement in Internet-based technologies, network applications are no longer just limited...
Cryptography will continue to play important roles in developing of new security solutions which wil...
Presented on March 1, 2018 at 6:00 p.m. in the Klaus Advanced Computing Building, Room 1443.Jill C. ...
In 2015 more than 150 million records and $400 billion were lost due to publicly-reported criminal a...
We study several basic problems in cryptography: Leakage resilient cryptography: cryptographic schem...
This book constitutes the thoroughly refereed post-workshop proceedings of the 26th International Wo...
Secure communication has become an essential ingredient of our daily life. Mostly unnoticed, cryptog...
Secure connections are at the heart of today's Internet infrastructure, protecting the confidentiali...
The need for secure systems and improved authentication methods is growing as online transactions an...
The popularity of personal computing devices (e.g. smart cards) exposes users to risks, notably iden...
My research interests lie at the intersection of cryptographic research, and systems security and pr...
Cryptography is now ubiquitous – moving beyond the traditional environments, such as government comm...
Security has become a buzzword over the current years. As per Wikipedia, 55.1% of global population ...
Cryptography has a long and fascinating history. Over the centuries, an elaborate set of protocols a...
Presented on November 1, 2019 at 12:00 p.m. in the Krone Engineered Biosystems Building, Room 1005.D...
With the advancement in Internet-based technologies, network applications are no longer just limited...
Cryptography will continue to play important roles in developing of new security solutions which wil...