Efficient ratcheting: Almost-optimal guarantees for secure messaging D Jost, U Maurer, M Mularczyk Advances in Cryptology–EUROCRYPT 2019: 38th Annual International Conference …, 2019 | 121 | 2019 |
Continuous group key agreement with active security J Alwen, S Coretti, D Jost, M Mularczyk Theory of Cryptography: 18th International Conference, TCC 2020, Durham, NC …, 2020 | 72 | 2020 |
On the insider security of MLS J Alwen, D Jost, M Mularczyk Annual International Cryptology Conference, 34-68, 2022 | 51 | 2022 |
A unified and composable take on ratcheting D Jost, U Maurer, M Mularczyk Theory of Cryptography Conference, 180-210, 2019 | 41 | 2019 |
Overcoming impossibility results in composable security using interval-wise guarantees D Jost, U Maurer Annual International Cryptology Conference, 33-62, 2020 | 22 | 2020 |
Information-theoretic secret-key agreement: The asymptotically tight relation between the secret-key rate and the channel quality ratio D Jost, U Maurer, JL Ribeiro Theory of Cryptography: 16th International Conference, TCC 2018, Panaji …, 2018 | 13 | 2018 |
End-to-end encrypted zoom meetings: Proving security and strengthening liveness Y Dodis, D Jost, B Kesavan, A Marcedone Annual International Conference on the Theory and Applications of …, 2023 | 9 | 2023 |
Security Definitions for Hash Functions: Combining UCE and Indifferentiability D Jost, U Maurer International Conference on Security and Cryptography for Networks, 83-101, 2018 | 9* | 2018 |
An automatic encoding from VeriFast predicates into implicit dynamic frames D Jost, AJ Summers Working Conference on Verified Software: Theories, Tools, and Experiments …, 2013 | 9 | 2013 |
ELEKTRA: efficient lightweight multi-device Key Transparency J Len, M Chase, E Ghosh, D Jost, B Kesavan, A Marcedone Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023 | 6 | 2023 |
Forward-secure encryption with fast forwarding Y Dodis, D Jost, H Karthikeyan Theory of Cryptography Conference, 3-32, 2022 | 5 | 2022 |
Agree-and-prove: generalized proofs of knowledge and applications C Badertscher, D Jost, U Maurer Cryptology ePrint Archive 2019, 2019 | 4 | 2019 |
A constructive analysis of IPsec D Jost ETH-Zürich, 2014 | 4 | 2014 |
A note on the equivalence of IND-CCA & INT-PTXT and IND-CCA & INT-CTXT D Jost, C Badertscher, F Banfi Cryptology ePrint Archive, 2018 | 2 | 2018 |
Compact Key Storage: A Modern Approach to Key Backup and Delegation Y Dodis, D Jost, A Marcedone Annual International Cryptology Conference, 75-109, 2024 | 1 | 2024 |
Generalized proofs of knowledge with fully dynamic setup C Badertscher, D Jost, U Maurer Theory of Cryptography Conference, 499-528, 2021 | 1 | 2021 |
Triple Ratchet: A Bandwidth Efficient Hybrid-Secure Signal Protocol Y Dodis, D Jost, S Katsumata, T Prest, R Schmidt Cryptology ePrint Archive, 2025 | | 2025 |
Compact Key Storage in the Standard Model Y Dodis, D Jost Theory of Cryptography Conference, 444-475, 2024 | | 2024 |
On Generalizations of Composable Security D Jost ETH Zurich, 2020 | | 2020 |
Verifying Separation Logic in Chalice D Jost | | 2013 |