What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Joël Alwen
Google Scholar
35
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/crypto
Succinct PPRFs via Memory-Tight Reductions.
Joël Alwen
Chris Brzuska
Jérôme Govinden
Patrick Harasser
Stefano Tessaro
2024
conf/eurocrypt
Updatable Public-Key Encryption, Revisited.
Joël Alwen
Georg Fuchsbauer
Marta Mularczyk
2023
conf/ccs
Post-Quantum Multi-Recipient Public Key Encryption.
Joël Alwen
Dominik Hartmann
Eike Kiltz
Marta Mularczyk
Peter Schwabe
2023
conf/crypto
Fork-Resilient Continuous Group Key Agreement.
Joël Alwen
Marta Mularczyk
Yiannis Tselekounis
2023
conf/asiacrypt
The Pre-Shared Key Modes of HPKE.
Joël Alwen
Jonas Janneck
Eike Kiltz
Benjamin Lipp
2022
conf/ccs
Server-Aided Continuous Group Key Agreement.
Joël Alwen
Dominik Hartmann
Eike Kiltz
Marta Mularczyk
2022
conf/crypto
On the Insider Security of MLS.
Joël Alwen
Daniel Jost
Marta Mularczyk
2022
conf/eurocrypt
CoCoA: Concurrent Continuous Group Key Agreement.
Joël Alwen
Benedikt Auerbach
Miguel Cueto Noval
Karen Klein
Guillermo Pascual-Perez
Krzysztof Pietrzak
Michael Walter
2021
conf/ccs
Modular Design of Secure Group Messaging Protocols and the Security of MLS.
Joël Alwen
Sandro Coretti
Yevgeniy Dodis
Yiannis Tselekounis
2021
conf/sp
Keep the Dirt: Tainted TreeKEM, Adaptively and Actively Secure Continuous Group Key Agreement.
Karen Klein
Guillermo Pascual-Perez
Michael Walter
Chethan Kamath
Margarita Capretto
Miguel Cueto
Ilia Markov
Michelle Yeo
Joël Alwen
Krzysztof Pietrzak
2021
conf/eurocrypt
Analysing the HPKE Standard.
Joël Alwen
Bruno Blanchet
Eduard Hauck
Eike Kiltz
Benjamin Lipp
Doreen Riepel
2021
conf/tcc
Grafting Key Trees: Efficient Key Management for Overlapping Groups.
Joël Alwen
Benedikt Auerbach
Mirza Ahad Baig
Miguel Cueto Noval
Karen Klein
Guillermo Pascual-Perez
Krzysztof Pietrzak
Michael Walter
2020
conf/crypto
Security Analysis and Improvements for the IETF MLS Standard for Group Messaging.
Joël Alwen
Sandro Coretti
Yevgeniy Dodis
Yiannis Tselekounis
2020
conf/tcc
Continuous Group Key Agreement with Active Security.
Joël Alwen
Sandro Coretti
Daniel Jost
Marta Mularczyk
2019
conf/eurocrypt
The Double Ratchet: Security Notions, Proofs, and Modularization for the Signal Protocol.
Joël Alwen
Sandro Coretti
Yevgeniy Dodis
2018
conf/ccs
On the Memory-Hardness of Data-Independent Password-Hashing Functions.
Joël Alwen
Peter Gazi
Chethan Kamath
Karen Klein
Georg Osang
Krzysztof Pietrzak
Leonid Reyzin
Michal Rolínek
Michal Rybár
2018
conf/fc
SpaceMint: A Cryptocurrency Based on Proofs of Space.
Sunoo Park
Albert Kwon
Georg Fuchsbauer
Peter Gazi
Joël Alwen
Krzysztof Pietrzak
2018
conf/eurocrypt
Sustained Space Complexity.
Joël Alwen
Jeremiah Blocki
Krzysztof Pietrzak
2017
conf/ccs
Practical Graphs for Optimal Side-Channel Resistant Memory-Hard Functions.
Joël Alwen
Jeremiah Blocki
Benjamin Harsha
2017
conf/eurosp
Towards Practical Attacks on Argon2i and Balloon Hashing.
Joël Alwen
Jeremiah Blocki
2017
conf/eurocrypt
Depth-Robust Graphs and Their Cumulative Memory Complexity.
Joël Alwen
Jeremiah Blocki
Krzysztof Pietrzak
2017
conf/eurocrypt
Scrypt Is Maximally Memory-Hard.
Joël Alwen
Binyi Chen
Krzysztof Pietrzak
Leonid Reyzin
Stefano Tessaro
2017
conf/asiacrypt
Beyond Hellman's Time-Memory Trade-Offs with Applications to Proofs of Space.
Hamza Abusalah
Joël Alwen
Bram Cohen
Danylo Khilko
Krzysztof Pietrzak
Leonid Reyzin
2017
conf/tcc
Moderately Hard Functions: Definition, Instantiations, and Applications.
Joël Alwen
Björn Tackmann
2016
conf/crypto
Efficiently Computing Data-Independent Memory-Hard Functions.
Joël Alwen
Jeremiah Blocki
2016
conf/eurocrypt
On the Complexity of Scrypt and Proofs of Space in the Parallel Random Oracle Model.
Joël Alwen
Binyi Chen
Chethan Kamath
Vladimir Kolmogorov
Krzysztof Pietrzak
Stefano Tessaro
2015
conf/crypto
Incoercible Multi-party Computation and Universally Composable Receipt-Free Voting.
Joël Alwen
Rafail Ostrovsky
Hong-Sheng Zhou
Vassilis Zikas
2014
conf/latincrypt
Anonymous Authentication with Shared Secrets.
Joël Alwen
Martin Hirt
Ueli Maurer
Arpita Patra
Pavel Raykov
2013
conf/crypto
Learning with Rounding, Revisited - New Reduction, Properties and Applications.
Joël Alwen
Stephan Krenn
Krzysztof Pietrzak
Daniel Wichs
2012
conf/crypto
Collusion-Preserving Computation.
Joël Alwen
Jonathan Katz
Ueli Maurer
Vassilis Zikas
2010
conf/eurocrypt
Public-Key Encryption in the Bounded-Retrieval Model.
Joël Alwen
Yevgeniy Dodis
Moni Naor
Gil Segev
Shabsi Walfish
Daniel Wichs
2009
conf/crypto
Collusion-Free Multiparty Computation in the Mediated Model.
Joël Alwen
Jonathan Katz
Yehuda Lindell
Giuseppe Persiano
Abhi Shelat
Ivan Visconti
2009
conf/crypto
Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model.
Joël Alwen
Yevgeniy Dodis
Daniel Wichs
2008
conf/crypto
Collusion-Free Protocols in the Mediated Model.
Joël Alwen
Abhi Shelat
Ivan Visconti
2005
conf/crypto
Impossibility and Feasibility Results for Zero Knowledge with Public Keys.
Joël Alwen
Giuseppe Persiano
Ivan Visconti
Coauthors
Abhi Shelat
(2)
Albert Kwon
(1)
Arpita Patra
(1)
Benedikt Auerbach
(2)
Benjamin Harsha
(1)
Benjamin Lipp
(2)
Binyi Chen
(2)
Björn Tackmann
(1)
Bram Cohen
(1)
Bruno Blanchet
(1)
Chethan Kamath
(3)
Chris Brzuska
(1)
Daniel Jost
(2)
Daniel Wichs
(3)
Danylo Khilko
(1)
Dominik Hartmann
(2)
Doreen Riepel
(1)
Eduard Hauck
(1)
Eike Kiltz
(4)
Georg Fuchsbauer
(2)
Georg Osang
(1)
Gil Segev
(1)
Giuseppe Persiano
(2)
Guillermo Pascual-Perez
(3)
Hamza Abusalah
(1)
Hong-Sheng Zhou
(1)
Ilia Markov
(1)
Ivan Visconti
(3)
Jeremiah Blocki
(5)
Jérôme Govinden
(1)
Joël Alwen
(35)
Jonas Janneck
(1)
Jonathan Katz
(2)
Karen Klein
(4)
Krzysztof Pietrzak
(11)
Leonid Reyzin
(3)
Margarita Capretto
(1)
Marta Mularczyk
(6)
Martin Hirt
(1)
Michael Walter
(3)
Michal Rolínek
(1)
Michal Rybár
(1)
Michelle Yeo
(1)
Miguel Cueto
(1)
Miguel Cueto Noval
(2)
Mirza Ahad Baig
(1)
Moni Naor
(1)
Patrick Harasser
(1)
Pavel Raykov
(1)
Peter Gazi
(2)
Peter Schwabe
(1)
Rafail Ostrovsky
(1)
Sandro Coretti
(4)
Shabsi Walfish
(1)
Stefano Tessaro
(3)
Stephan Krenn
(1)
Sunoo Park
(1)
Ueli Maurer
(2)
Vassilis Zikas
(2)
Vladimir Kolmogorov
(1)
Yehuda Lindell
(1)
Yevgeniy Dodis
(5)
Yiannis Tselekounis
(3)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to