General Information
Details
I work on cryptography, which lies at the intersection of computer security and theoretical computer science. Commonly my research aims to apply the proof-based techniques of theory to better understand or improve the security of real-world protocols. This includes extrapolating formal models to capture novel threats, developing new tools to give precise security analyses within these models, and designing new protocols.
My teaching has primarily focused on courses in cryptography and theoretical computer science. In recent years, I have taught the small graduate course "Secure Communication Protocols" and the undergraduate course "Automata and Complexity".
"Nonadaptive One-Way to Hiding Implies Adaptive Quantum Reprogramming". Joseph Jaeger. ASIACRYPT 2025.
“Adaptive Security for Constrained PRFs”. Kaishuo Cheng, Joseph Jaeger. CRYPTO 2025. https://doi.org/10.1007/978-3-032-01901-1_19
"Analyzing Group Chat Encryption in MLS, Session, Signal, and Matrix". Joseph Jaeger, Akshaya Kumar. EUROCRYPT 2025. https://doi.org/10.1007/978-3-031-91101-9_10
"Dictators? Friends? Forgers. Breaking and Fixing Unforgeability Definitions for Anamorphic Signature Schemes". Roy Stracovsky, Joseph Jaeger. ASIACRYPT 2024. https://doi.org/10.1007/978-981-96-0888-1_4
"Generic and Algebraic Computation Models: When AGM Proofs Transfer to the GGM". Joseph Jaeger, Deep Inder Mohan. CRYPTO 2024. https://doi.org/10.1007/978-3-031-68388-6_2
"Symmetric Signcryption and E2EE Group Messaging in Keybase". Joseph Jaeger, Akshaya Kumar, Igors Stepanovs. EUROCRYPT 2024. https://doi.org/10.1007/978-3-031-58734-4_10