@article{5446,
  author       = {{Jager, Tibor and Rupp, Andy}},
  issn         = {{2299-0984}},
  journal      = {{Proceedings on Privacy Enhancing Technologies}},
  number       = {{3}},
  pages        = {{62--82}},
  publisher    = {{Walter de Gruyter GmbH}},
  title        = {{{Black-Box Accumulation: Collecting Incentives in a Privacy-Preserving Way}}},
  doi          = {{10.1515/popets-2016-0016}},
  volume       = {{2016}},
  year         = {{2016}},
}

@article{3120,
  author       = {{Böhl, Florian and Hofheinz, Dennis and Jager, Tibor and Koch, Jessica and Striecks, Christoph}},
  journal      = {{J. Cryptology}},
  number       = {{1}},
  pages        = {{176----208}},
  title        = {{{Confined Guessing: New Signatures From Standard Assumptions}}},
  doi          = {{10.1007/s00145-014-9183-z}},
  year         = {{2015}},
}

@inproceedings{3121,
  author       = {{Jager, Tibor and Schwenk, Jörg and Somorovsky, Juraj}},
  booktitle    = {{Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}},
  pages        = {{1185----1196}},
  title        = {{{On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption}}},
  doi          = {{10.1145/2810103.2813657}},
  year         = {{2015}},
}

@inproceedings{3122,
  author       = {{Jager, Tibor and Schwenk, Jörg and Somorovsky, Juraj}},
  booktitle    = {{Computer Security - ESORICS 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I}},
  pages        = {{407----425}},
  title        = {{{Practical Invalid Curve Attacks on TLS-ECDH}}},
  doi          = {{10.1007/978-3-319-24174-6_21}},
  year         = {{2015}},
}

@inproceedings{3123,
  author       = {{Heuer, Felix and Jager, Tibor and Kiltz, Eike and Schäge, Sven}},
  booktitle    = {{Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings}},
  pages        = {{27----51}},
  title        = {{{On the Selective Opening Security of Practical Public-Key Encryption Schemes}}},
  doi          = {{10.1007/978-3-662-46447-2_2}},
  year         = {{2015}},
}

@inproceedings{3124,
  author       = {{Bergsma, Florian and Jager, Tibor and Schwenk, Jörg}},
  booktitle    = {{Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings}},
  pages        = {{477----494}},
  title        = {{{One-Round Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model}}},
  doi          = {{10.1007/978-3-662-46447-2_21}},
  year         = {{2015}},
}

@inproceedings{3125,
  author       = {{Jager, Tibor}},
  booktitle    = {{Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {II}}},
  pages        = {{121----143}},
  title        = {{{Verifiable Random Functions from Weaker Assumptions}}},
  doi          = {{10.1007/978-3-662-46497-7_5}},
  year         = {{2015}},
}

@inproceedings{3126,
  author       = {{Bader, Christoph and Hofheinz, Dennis and Jager, Tibor and Kiltz, Eike and Li, Yong}},
  booktitle    = {{Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I}},
  pages        = {{629----658}},
  title        = {{{Tightly-Secure Authenticated Key Exchange}}},
  doi          = {{10.1007/978-3-662-46494-6_26}},
  year         = {{2015}},
}

@article{3127,
  author       = {{Jager, Tibor}},
  journal      = {{Datenschutz und Datensicherheit}},
  number       = {{7}},
  pages        = {{445----451}},
  title        = {{{Die Zukunft der Kryptographie}}},
  doi          = {{10.1007/s11623-014-0204-8}},
  year         = {{2014}},
}

@inproceedings{3128,
  author       = {{Fleischhacker, Nils and Jager, Tibor and Schröder, Dominique}},
  booktitle    = {{Advances in Cryptology - ASIACRYPT 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part I}},
  pages        = {{512----531}},
  title        = {{{On Tight Security Proofs for Schnorr Signatures}}},
  doi          = {{10.1007/978-3-662-45611-8_27}},
  year         = {{2014}},
}

@article{3129,
  author       = {{Jager, Tibor and Schwenk, Jörg}},
  journal      = {{J. Cryptology}},
  number       = {{2}},
  pages        = {{225----245}},
  title        = {{{On the Analysis of Cryptographic Assumptions in the Generic Ring Model}}},
  doi          = {{10.1007/s00145-012-9120-y}},
  year         = {{2013}},
}

@inproceedings{3130,
  author       = {{Böhl, Florian and Hofheinz, Dennis and Jager, Tibor and Koch, Jessica and Hong Seo, Jae and Striecks, Christoph}},
  booktitle    = {{Advances in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings}},
  pages        = {{461----485}},
  title        = {{{Practical Signatures from Standard Assumptions}}},
  doi          = {{10.1007/978-3-642-38348-9_28}},
  year         = {{2013}},
}

@inproceedings{3131,
  author       = {{Jager, Tibor and Paterson, Kenneth G. and Somorovsky, Juraj}},
  booktitle    = {{20th Annual Network and Distributed System Security Symposium, NDSS 2013, San Diego, California, USA, February 24-27, 2013}},
  title        = {{{One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography}}},
  year         = {{2013}},
}

@phdthesis{3132,
  author       = {{Jager, Tibor}},
  isbn         = {{978-3-8348-1989-5}},
  publisher    = {{Ruhr University Bochum}},
  title        = {{{On black-box models of computation in cryptology}}},
  year         = {{2012}},
}

@inproceedings{3133,
  author       = {{Jager, Tibor and Kohlar, Florian and Schäge, Sven and Schwenk, Jörg}},
  booktitle    = {{Advances in Cryptology - CRYPTO 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings}},
  pages        = {{273----293}},
  title        = {{{On the Security of TLS-DHE in the Standard Model}}},
  doi          = {{10.1007/978-3-642-32009-5_17}},
  year         = {{2012}},
}

@inproceedings{3134,
  author       = {{Hofheinz, Dennis and Jager, Tibor}},
  booktitle    = {{Advances in Cryptology - CRYPTO 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings}},
  pages        = {{590----607}},
  title        = {{{Tightly Secure Signatures and Public-Key Encryption}}},
  doi          = {{10.1007/978-3-642-32009-5_35}},
  year         = {{2012}},
}

@inproceedings{3135,
  author       = {{Jager, Tibor and Schinzel, Sebastian and Somorovsky, Juraj}},
  booktitle    = {{Computer Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings}},
  pages        = {{752----769}},
  title        = {{{Bleichenbacher's Attack Strikes again: Breaking PKCS#1 v1.5 in XML Encryption}}},
  doi          = {{10.1007/978-3-642-33167-1_43}},
  year         = {{2012}},
}

@inproceedings{3136,
  author       = {{Hofheinz, Dennis and Jager, Tibor and Knapp, Edward}},
  booktitle    = {{Public Key Cryptography - PKC 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings}},
  pages        = {{66----83}},
  title        = {{{Waters Signatures with Optimal Security Reduction}}},
  doi          = {{10.1007/978-3-642-30057-8_5}},
  year         = {{2012}},
}

@inproceedings{3137,
  author       = {{Hofheinz, Dennis and Jager, Tibor and Kiltz, Eike}},
  booktitle    = {{Advances in Cryptology - ASIACRYPT 2011 - 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings}},
  pages        = {{647----666}},
  title        = {{{Short Signatures from Weaker Assumptions}}},
  doi          = {{10.1007/978-3-642-25385-0_35}},
  year         = {{2011}},
}

@inproceedings{3138,
  author       = {{Jager, Tibor and Somorovsky, Juraj}},
  booktitle    = {{Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS 2011, Chicago, Illinois, USA, October 17-21, 2011}},
  pages        = {{413----422}},
  title        = {{{How to break XML encryption}}},
  doi          = {{10.1145/2046707.2046756}},
  year         = {{2011}},
}

