[{"doi":"10.5281/zenodo.8068755","oa":"1","date_updated":"2023-07-07T11:13:37Z","author":[{"first_name":"Johannes","last_name":"Blömer","id":"23","full_name":"Blömer, Johannes"},{"last_name":"Bobolz","id":"27207","full_name":"Bobolz, Jan","first_name":"Jan"},{"first_name":"Fabian","last_name":"Eidens","full_name":"Eidens, Fabian","id":"25078"},{"id":"64669","full_name":"Jager, Tibor","last_name":"Jager","first_name":"Tibor"},{"id":"64594","full_name":"Kramer, Paul","last_name":"Kramer","first_name":"Paul"}],"volume":412,"place":"Paderborn","citation":{"ama":"Blömer J, Bobolz J, Eidens F, Jager T, Kramer P. Practical Cryptograhic Techniques for Secure and Privacy-Preserving Customer Loyalty Systems. In: Haake C-J, Meyer auf der Heide F, Platzner M, Wachsmuth H, Wehrheim H, eds. <i>On-The-Fly Computing -- Individualized IT-Services in Dynamic Markets</i>. Vol 412. Verlagsschriftenreihe des Heinz Nixdorf Instituts. Heinz Nixdorf Institut, Universität Paderborn; 2023:237-246. doi:<a href=\"https://doi.org/10.5281/zenodo.8068755\">10.5281/zenodo.8068755</a>","ieee":"J. Blömer, J. Bobolz, F. Eidens, T. Jager, and P. Kramer, “Practical Cryptograhic Techniques for Secure and Privacy-Preserving Customer Loyalty Systems,” in <i>On-The-Fly Computing -- Individualized IT-services in dynamic markets</i>, vol. 412, C.-J. Haake, F. Meyer auf der Heide, M. Platzner, H. Wachsmuth, and H. Wehrheim, Eds. Paderborn: Heinz Nixdorf Institut, Universität Paderborn, 2023, pp. 237–246.","chicago":"Blömer, Johannes, Jan Bobolz, Fabian Eidens, Tibor Jager, and Paul Kramer. “Practical Cryptograhic Techniques for Secure and Privacy-Preserving Customer Loyalty Systems.” In <i>On-The-Fly Computing -- Individualized IT-Services in Dynamic Markets</i>, edited by Claus-Jochen Haake, Friedhelm Meyer auf der Heide, Marco Platzner, Henning Wachsmuth, and Heike Wehrheim, 412:237–46. Verlagsschriftenreihe Des Heinz Nixdorf Instituts. Paderborn: Heinz Nixdorf Institut, Universität Paderborn, 2023. <a href=\"https://doi.org/10.5281/zenodo.8068755\">https://doi.org/10.5281/zenodo.8068755</a>.","apa":"Blömer, J., Bobolz, J., Eidens, F., Jager, T., &#38; Kramer, P. (2023). Practical Cryptograhic Techniques for Secure and Privacy-Preserving Customer Loyalty Systems. In C.-J. Haake, F. Meyer auf der Heide, M. Platzner, H. Wachsmuth, &#38; H. Wehrheim (Eds.), <i>On-The-Fly Computing -- Individualized IT-services in dynamic markets</i> (Vol. 412, pp. 237–246). Heinz Nixdorf Institut, Universität Paderborn. <a href=\"https://doi.org/10.5281/zenodo.8068755\">https://doi.org/10.5281/zenodo.8068755</a>","short":"J. Blömer, J. Bobolz, F. Eidens, T. Jager, P. Kramer, in: C.-J. Haake, F. Meyer auf der Heide, M. Platzner, H. Wachsmuth, H. Wehrheim (Eds.), On-The-Fly Computing -- Individualized IT-Services in Dynamic Markets, Heinz Nixdorf Institut, Universität Paderborn, Paderborn, 2023, pp. 237–246.","mla":"Blömer, Johannes, et al. “Practical Cryptograhic Techniques for Secure and Privacy-Preserving Customer Loyalty Systems.” <i>On-The-Fly Computing -- Individualized IT-Services in Dynamic Markets</i>, edited by Claus-Jochen Haake et al., vol. 412, Heinz Nixdorf Institut, Universität Paderborn, 2023, pp. 237–46, doi:<a href=\"https://doi.org/10.5281/zenodo.8068755\">10.5281/zenodo.8068755</a>.","bibtex":"@inbook{Blömer_Bobolz_Eidens_Jager_Kramer_2023, place={Paderborn}, series={Verlagsschriftenreihe des Heinz Nixdorf Instituts}, title={Practical Cryptograhic Techniques for Secure and Privacy-Preserving Customer Loyalty Systems}, volume={412}, DOI={<a href=\"https://doi.org/10.5281/zenodo.8068755\">10.5281/zenodo.8068755</a>}, booktitle={On-The-Fly Computing -- Individualized IT-services in dynamic markets}, publisher={Heinz Nixdorf Institut, Universität Paderborn}, author={Blömer, Johannes and Bobolz, Jan and Eidens, Fabian and Jager, Tibor and Kramer, Paul}, editor={Haake, Claus-Jochen and Meyer auf der Heide, Friedhelm and Platzner, Marco and Wachsmuth, Henning and Wehrheim, Heike}, year={2023}, pages={237–246}, collection={Verlagsschriftenreihe des Heinz Nixdorf Instituts} }"},"page":"237-246","intvolume":"       412","has_accepted_license":"1","file_date_updated":"2023-07-07T11:13:37Z","project":[{"grant_number":"160364472","_id":"1","name":"SFB 901: SFB 901: On-The-Fly Computing - Individualisierte IT-Dienstleistungen in dynamischen Märkten "},{"_id":"82","name":"SFB 901 - T: SFB 901 - Project Area T"},{"_id":"84","name":"SFB 901 - T2: SFB 901 -Subproject T2"}],"_id":"45901","user_id":"477","series_title":"Verlagsschriftenreihe des Heinz Nixdorf Instituts","department":[{"_id":"7"}],"editor":[{"last_name":"Haake","full_name":"Haake, Claus-Jochen","first_name":"Claus-Jochen"},{"last_name":"Meyer auf der Heide","full_name":"Meyer auf der Heide, Friedhelm","first_name":"Friedhelm"},{"full_name":"Platzner, Marco","last_name":"Platzner","first_name":"Marco"},{"first_name":"Henning","full_name":"Wachsmuth, Henning","last_name":"Wachsmuth"},{"last_name":"Wehrheim","full_name":"Wehrheim, Heike","first_name":"Heike"}],"status":"public","type":"book_chapter","title":"Practical Cryptograhic Techniques for Secure and Privacy-Preserving Customer Loyalty Systems","publisher":"Heinz Nixdorf Institut, Universität Paderborn","date_created":"2023-07-07T08:41:44Z","year":"2023","ddc":["004"],"language":[{"iso":"eng"}],"file":[{"content_type":"application/pdf","relation":"main_file","date_created":"2023-07-07T08:41:35Z","creator":"florida","date_updated":"2023-07-07T11:13:37Z","file_id":"45902","access_level":"open_access","file_name":"T2-Chapter-SFB-Buch-Final.pdf","file_size":5944790}],"publication":"On-The-Fly Computing -- Individualized IT-services in dynamic markets"},{"doi":"10.5281/zenodo.8068629","oa":"1","date_updated":"2023-07-07T11:18:21Z","volume":412,"author":[{"first_name":"Johannes","id":"23","full_name":"Blömer, Johannes","last_name":"Blömer"},{"full_name":"Eidens, Fabian","id":"25078","last_name":"Eidens","first_name":"Fabian"},{"first_name":"Tibor","id":"64669","full_name":"Jager, Tibor","last_name":"Jager"},{"first_name":"David","last_name":"Niehues","full_name":"Niehues, David","id":"36113"},{"first_name":"Christian","full_name":"Scheideler, Christian","id":"20792","last_name":"Scheideler"}],"place":"Paderborn","page":"145-164","intvolume":"       412","citation":{"apa":"Blömer, J., Eidens, F., Jager, T., Niehues, D., &#38; Scheideler, C. (2023). Robustness and Security. In C.-J. Haake, F. Meyer auf der Heide, M. Platzner, H. Wachsmuth, &#38; H. Wehrheim (Eds.), <i>On-The-Fly Computing -- Individualized IT-services in dynamic markets</i> (Vol. 412, pp. 145–164). Heinz Nixdorf Institut, Universität Paderborn. <a href=\"https://doi.org/10.5281/zenodo.8068629\">https://doi.org/10.5281/zenodo.8068629</a>","short":"J. Blömer, F. Eidens, T. Jager, D. Niehues, C. Scheideler, in: C.-J. Haake, F. Meyer auf der Heide, M. Platzner, H. Wachsmuth, H. Wehrheim (Eds.), On-The-Fly Computing -- Individualized IT-Services in Dynamic Markets, Heinz Nixdorf Institut, Universität Paderborn, Paderborn, 2023, pp. 145–164.","bibtex":"@inbook{Blömer_Eidens_Jager_Niehues_Scheideler_2023, place={Paderborn}, series={Verlagsschriftenreihe des Heinz Nixdorf Instituts}, title={Robustness and Security}, volume={412}, DOI={<a href=\"https://doi.org/10.5281/zenodo.8068629\">10.5281/zenodo.8068629</a>}, booktitle={On-The-Fly Computing -- Individualized IT-services in dynamic markets}, publisher={Heinz Nixdorf Institut, Universität Paderborn}, author={Blömer, Johannes and Eidens, Fabian and Jager, Tibor and Niehues, David and Scheideler, Christian}, editor={Haake, Claus-Jochen and Meyer auf der Heide, Friedhelm and Platzner, Marco and Wachsmuth, Henning and Wehrheim, Heike}, year={2023}, pages={145–164}, collection={Verlagsschriftenreihe des Heinz Nixdorf Instituts} }","mla":"Blömer, Johannes, et al. “Robustness and Security.” <i>On-The-Fly Computing -- Individualized IT-Services in Dynamic Markets</i>, edited by Claus-Jochen Haake et al., vol. 412, Heinz Nixdorf Institut, Universität Paderborn, 2023, pp. 145–64, doi:<a href=\"https://doi.org/10.5281/zenodo.8068629\">10.5281/zenodo.8068629</a>.","ama":"Blömer J, Eidens F, Jager T, Niehues D, Scheideler C. Robustness and Security. In: Haake C-J, Meyer auf der Heide F, Platzner M, Wachsmuth H, Wehrheim H, eds. <i>On-The-Fly Computing -- Individualized IT-Services in Dynamic Markets</i>. Vol 412. Verlagsschriftenreihe des Heinz Nixdorf Instituts. Heinz Nixdorf Institut, Universität Paderborn; 2023:145-164. doi:<a href=\"https://doi.org/10.5281/zenodo.8068629\">10.5281/zenodo.8068629</a>","ieee":"J. Blömer, F. Eidens, T. Jager, D. Niehues, and C. Scheideler, “Robustness and Security,” in <i>On-The-Fly Computing -- Individualized IT-services in dynamic markets</i>, vol. 412, C.-J. Haake, F. Meyer auf der Heide, M. Platzner, H. Wachsmuth, and H. Wehrheim, Eds. Paderborn: Heinz Nixdorf Institut, Universität Paderborn, 2023, pp. 145–164.","chicago":"Blömer, Johannes, Fabian Eidens, Tibor Jager, David Niehues, and Christian Scheideler. “Robustness and Security.” In <i>On-The-Fly Computing -- Individualized IT-Services in Dynamic Markets</i>, edited by Claus-Jochen Haake, Friedhelm Meyer auf der Heide, Marco Platzner, Henning Wachsmuth, and Heike Wehrheim, 412:145–64. Verlagsschriftenreihe Des Heinz Nixdorf Instituts. Paderborn: Heinz Nixdorf Institut, Universität Paderborn, 2023. <a href=\"https://doi.org/10.5281/zenodo.8068629\">https://doi.org/10.5281/zenodo.8068629</a>."},"has_accepted_license":"1","file_date_updated":"2023-07-07T11:18:21Z","_id":"45891","project":[{"grant_number":"160364472","name":"SFB 901: SFB 901: On-The-Fly Computing - Individualisierte IT-Dienstleistungen in dynamischen Märkten ","_id":"1"},{"_id":"4","name":"SFB 901 - C: SFB 901 - Project Area C"},{"_id":"13","name":"SFB 901 - C1: SFB 901 - Subproject C1"}],"department":[{"_id":"7"}],"user_id":"477","series_title":"Verlagsschriftenreihe des Heinz Nixdorf Instituts","editor":[{"first_name":"Claus-Jochen","full_name":"Haake, Claus-Jochen","last_name":"Haake"},{"first_name":"Friedhelm","full_name":"Meyer auf der Heide, Friedhelm","last_name":"Meyer auf der Heide"},{"last_name":"Platzner","full_name":"Platzner, Marco","first_name":"Marco"},{"first_name":"Henning","full_name":"Wachsmuth, Henning","last_name":"Wachsmuth"},{"first_name":"Heike","full_name":"Wehrheim, Heike","last_name":"Wehrheim"}],"status":"public","type":"book_chapter","title":"Robustness and Security","publisher":"Heinz Nixdorf Institut, Universität Paderborn","date_created":"2023-07-07T08:08:47Z","year":"2023","ddc":["004"],"language":[{"iso":"eng"}],"file":[{"file_size":320980,"file_name":"C1-Chapter-SFB-Buch-Final.pdf","file_id":"45892","access_level":"open_access","date_updated":"2023-07-07T11:18:21Z","date_created":"2023-07-07T08:08:37Z","creator":"florida","relation":"main_file","content_type":"application/pdf"}],"publication":"On-The-Fly Computing -- Individualized IT-services in dynamic markets"},{"date_updated":"2022-01-06T06:58:56Z","date_created":"2018-06-07T08:47:17Z","author":[{"last_name":"Derler","full_name":"Derler, David","first_name":"David"},{"id":"64669","full_name":"Jager, Tibor","last_name":"Jager","first_name":"Tibor"},{"last_name":"Slamanig","full_name":"Slamanig, Daniel","first_name":"Daniel"},{"first_name":"Christoph","last_name":"Striecks","full_name":"Striecks, Christoph"}],"title":"Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange","doi":"10.1007/978-3-319-78372-7_14","main_file_link":[{"url":"https://eprint.iacr.org/2018/199.pdf"}],"has_accepted_license":"1","year":"2018","page":"425--455","citation":{"ama":"Derler D, Jager T, Slamanig D, Striecks C. Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange. In: <i>Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part III</i>. ; 2018:425--455. doi:<a href=\"https://doi.org/10.1007/978-3-319-78372-7_14\">10.1007/978-3-319-78372-7_14</a>","ieee":"D. Derler, T. Jager, D. Slamanig, and C. Striecks, “Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange,” in <i>Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part III</i>, 2018, pp. 425--455.","chicago":"Derler, David, Tibor Jager, Daniel Slamanig, and Christoph Striecks. “Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange.” In <i>Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part III</i>, 425--455, 2018. <a href=\"https://doi.org/10.1007/978-3-319-78372-7_14\">https://doi.org/10.1007/978-3-319-78372-7_14</a>.","apa":"Derler, D., Jager, T., Slamanig, D., &#38; Striecks, C. (2018). Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange. In <i>Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part III</i> (pp. 425--455). <a href=\"https://doi.org/10.1007/978-3-319-78372-7_14\">https://doi.org/10.1007/978-3-319-78372-7_14</a>","short":"D. Derler, T. Jager, D. Slamanig, C. Striecks, in: Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part III, 2018, pp. 425--455.","bibtex":"@inproceedings{Derler_Jager_Slamanig_Striecks_2018, title={Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-78372-7_14\">10.1007/978-3-319-78372-7_14</a>}, booktitle={Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part III}, author={Derler, David and Jager, Tibor and Slamanig, Daniel and Striecks, Christoph}, year={2018}, pages={425--455} }","mla":"Derler, David, et al. “Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange.” <i>Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part III</i>, 2018, pp. 425--455, doi:<a href=\"https://doi.org/10.1007/978-3-319-78372-7_14\">10.1007/978-3-319-78372-7_14</a>."},"_id":"3105","department":[{"_id":"558"}],"user_id":"38235","ddc":["006"],"language":[{"iso":"eng"}],"file_date_updated":"2018-11-08T13:25:52Z","publication":"Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part III","type":"conference","status":"public","file":[{"relation":"main_file","success":1,"content_type":"application/pdf","file_name":"2018-199.pdf","access_level":"closed","file_id":"5453","file_size":533731,"date_created":"2018-11-08T13:25:52Z","creator":"abirke","date_updated":"2018-11-08T13:25:52Z"}]},{"date_updated":"2022-01-06T07:02:44Z","date_created":"2018-11-27T09:39:57Z","author":[{"full_name":"Jager, Tibor","id":"64669","last_name":"Jager","first_name":"Tibor"},{"full_name":"Kurek, Rafael","id":"64752","last_name":"Kurek","first_name":"Rafael"}],"title":"Short Digital Signatures and ID-KEMs via Truncation Collision Resistance","doi":"10.1007/978-3-030-03329-3_8","year":"2018","page":"221-250","citation":{"apa":"Jager, T., &#38; Kurek, R. (2018). Short Digital Signatures and ID-KEMs via Truncation Collision Resistance. In <i>Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part II</i> (pp. 221–250). <a href=\"https://doi.org/10.1007/978-3-030-03329-3_8\">https://doi.org/10.1007/978-3-030-03329-3_8</a>","short":"T. Jager, R. Kurek, in: Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part II, 2018, pp. 221–250.","bibtex":"@inproceedings{Jager_Kurek_2018, title={Short Digital Signatures and ID-KEMs via Truncation Collision Resistance}, DOI={<a href=\"https://doi.org/10.1007/978-3-030-03329-3_8\">10.1007/978-3-030-03329-3_8</a>}, booktitle={Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part II}, author={Jager, Tibor and Kurek, Rafael}, year={2018}, pages={221–250} }","mla":"Jager, Tibor, and Rafael Kurek. “Short Digital Signatures and ID-KEMs via Truncation Collision Resistance.” <i>Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part II</i>, 2018, pp. 221–50, doi:<a href=\"https://doi.org/10.1007/978-3-030-03329-3_8\">10.1007/978-3-030-03329-3_8</a>.","ama":"Jager T, Kurek R. Short Digital Signatures and ID-KEMs via Truncation Collision Resistance. In: <i>Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part II</i>. ; 2018:221-250. doi:<a href=\"https://doi.org/10.1007/978-3-030-03329-3_8\">10.1007/978-3-030-03329-3_8</a>","ieee":"T. Jager and R. Kurek, “Short Digital Signatures and ID-KEMs via Truncation Collision Resistance,” in <i>Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part II</i>, 2018, pp. 221–250.","chicago":"Jager, Tibor, and Rafael Kurek. “Short Digital Signatures and ID-KEMs via Truncation Collision Resistance.” In <i>Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part II</i>, 221–50, 2018. <a href=\"https://doi.org/10.1007/978-3-030-03329-3_8\">https://doi.org/10.1007/978-3-030-03329-3_8</a>."},"_id":"5861","department":[{"_id":"558"}],"user_id":"38235","language":[{"iso":"eng"}],"publication":"Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part II","type":"conference","status":"public"},{"_id":"5862","user_id":"38235","department":[{"_id":"558"}],"language":[{"iso":"eng"}],"type":"conference","publication":"Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part III","status":"public","date_updated":"2022-01-06T07:02:44Z","date_created":"2018-11-27T09:42:49Z","author":[{"first_name":"Tibor","last_name":"Jager","id":"64669","full_name":"Jager, Tibor"},{"full_name":"Kurek, Rafael","id":"64752","last_name":"Kurek","first_name":"Rafael"},{"last_name":"Pan","full_name":"Pan, Jiaxin","first_name":"Jiaxin"}],"title":"Simple and More Efficient PRFs with Tight Security from LWE and Matrix-DDH","doi":"10.1007/978-3-030-03332-3_18","year":"2018","citation":{"ieee":"T. Jager, R. Kurek, and J. Pan, “Simple and More Efficient PRFs with Tight Security from LWE and Matrix-DDH,” in <i>Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part III</i>, 2018, pp. 490–518.","chicago":"Jager, Tibor, Rafael Kurek, and Jiaxin Pan. “Simple and More Efficient PRFs with Tight Security from LWE and Matrix-DDH.” In <i>Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part III</i>, 490–518, 2018. <a href=\"https://doi.org/10.1007/978-3-030-03332-3_18\">https://doi.org/10.1007/978-3-030-03332-3_18</a>.","ama":"Jager T, Kurek R, Pan J. Simple and More Efficient PRFs with Tight Security from LWE and Matrix-DDH. In: <i>Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part III</i>. ; 2018:490-518. doi:<a href=\"https://doi.org/10.1007/978-3-030-03332-3_18\">10.1007/978-3-030-03332-3_18</a>","bibtex":"@inproceedings{Jager_Kurek_Pan_2018, title={Simple and More Efficient PRFs with Tight Security from LWE and Matrix-DDH}, DOI={<a href=\"https://doi.org/10.1007/978-3-030-03332-3_18\">10.1007/978-3-030-03332-3_18</a>}, booktitle={Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part III}, author={Jager, Tibor and Kurek, Rafael and Pan, Jiaxin}, year={2018}, pages={490–518} }","mla":"Jager, Tibor, et al. “Simple and More Efficient PRFs with Tight Security from LWE and Matrix-DDH.” <i>Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part III</i>, 2018, pp. 490–518, doi:<a href=\"https://doi.org/10.1007/978-3-030-03332-3_18\">10.1007/978-3-030-03332-3_18</a>.","short":"T. Jager, R. Kurek, J. Pan, in: Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part III, 2018, pp. 490–518.","apa":"Jager, T., Kurek, R., &#38; Pan, J. (2018). Simple and More Efficient PRFs with Tight Security from LWE and Matrix-DDH. In <i>Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part III</i> (pp. 490–518). <a href=\"https://doi.org/10.1007/978-3-030-03332-3_18\">https://doi.org/10.1007/978-3-030-03332-3_18</a>"},"page":"490-518"},{"type":"journal_article","publication":"Designs, Codes and Cryptography","status":"public","_id":"9606","user_id":"66268","department":[{"_id":"558"}],"language":[{"iso":"eng"}],"publication_status":"published","publication_identifier":{"issn":["0925-1022","1573-7586"]},"year":"2018","citation":{"chicago":"Liu, Jia, Tibor Jager, Saqib Kakvi, and Bogdan Warinschi. “How to Build Time-Lock Encryption.” <i>Designs, Codes and Cryptography</i>, 2018, 2549–86. <a href=\"https://doi.org/10.1007/s10623-018-0461-x\">https://doi.org/10.1007/s10623-018-0461-x</a>.","ieee":"J. Liu, T. Jager, S. Kakvi, and B. Warinschi, “How to build time-lock encryption,” <i>Designs, Codes and Cryptography</i>, pp. 2549–2586, 2018.","ama":"Liu J, Jager T, Kakvi S, Warinschi B. How to build time-lock encryption. <i>Designs, Codes and Cryptography</i>. 2018:2549-2586. doi:<a href=\"https://doi.org/10.1007/s10623-018-0461-x\">10.1007/s10623-018-0461-x</a>","apa":"Liu, J., Jager, T., Kakvi, S., &#38; Warinschi, B. (2018). How to build time-lock encryption. <i>Designs, Codes and Cryptography</i>, 2549–2586. <a href=\"https://doi.org/10.1007/s10623-018-0461-x\">https://doi.org/10.1007/s10623-018-0461-x</a>","mla":"Liu, Jia, et al. “How to Build Time-Lock Encryption.” <i>Designs, Codes and Cryptography</i>, 2018, pp. 2549–86, doi:<a href=\"https://doi.org/10.1007/s10623-018-0461-x\">10.1007/s10623-018-0461-x</a>.","bibtex":"@article{Liu_Jager_Kakvi_Warinschi_2018, title={How to build time-lock encryption}, DOI={<a href=\"https://doi.org/10.1007/s10623-018-0461-x\">10.1007/s10623-018-0461-x</a>}, journal={Designs, Codes and Cryptography}, author={Liu, Jia and Jager, Tibor and Kakvi, Saqib and Warinschi, Bogdan}, year={2018}, pages={2549–2586} }","short":"J. Liu, T. Jager, S. Kakvi, B. Warinschi, Designs, Codes and Cryptography (2018) 2549–2586."},"page":"2549-2586","date_updated":"2022-01-06T07:04:16Z","author":[{"first_name":"Jia","full_name":"Liu, Jia","last_name":"Liu"},{"last_name":"Jager","id":"64669","full_name":"Jager, Tibor","first_name":"Tibor"},{"id":"66268","full_name":"Kakvi, Saqib","last_name":"Kakvi","first_name":"Saqib"},{"first_name":"Bogdan","last_name":"Warinschi","full_name":"Warinschi, Bogdan"}],"date_created":"2019-05-03T12:42:01Z","title":"How to build time-lock encryption","doi":"10.1007/s10623-018-0461-x"},{"publication":"Advances in Cryptology - CRYPTO 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part II","type":"conference","status":"public","file":[{"date_updated":"2018-11-08T12:53:03Z","date_created":"2018-11-08T12:53:03Z","creator":"abirke","file_size":486642,"file_name":"2018-543","file_id":"5440","access_level":"closed","content_type":"application/octet-stream","relation":"main_file"}],"_id":"5438","department":[{"_id":"558"}],"user_id":"38235","ddc":["006"],"language":[{"iso":"eng"}],"file_date_updated":"2018-11-08T12:53:03Z","has_accepted_license":"1","publication_status":"published","year":"2018","citation":{"ama":"Gjøsteen K, Jager T. Practical and Tightly-Secure Digital Signatures and Authenticated Key Exchange. In: <i>Advances in Cryptology - CRYPTO 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part II</i>. ; 2018. doi:<a href=\"https://doi.org/10.1007/978-3-319-96881-0_4\">10.1007/978-3-319-96881-0_4</a>","chicago":"Gjøsteen, Kristian, and Tibor Jager. “Practical and Tightly-Secure Digital Signatures and Authenticated Key Exchange.” In <i>Advances in Cryptology - CRYPTO 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part II</i>, 2018. <a href=\"https://doi.org/10.1007/978-3-319-96881-0_4\">https://doi.org/10.1007/978-3-319-96881-0_4</a>.","ieee":"K. Gjøsteen and T. Jager, “Practical and Tightly-Secure Digital Signatures and Authenticated Key Exchange,” in <i>Advances in Cryptology - CRYPTO 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part II</i>, 2018.","bibtex":"@inproceedings{Gjøsteen_Jager_2018, title={Practical and Tightly-Secure Digital Signatures and Authenticated Key Exchange}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-96881-0_4\">10.1007/978-3-319-96881-0_4</a>}, booktitle={Advances in Cryptology - CRYPTO 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part II}, author={Gjøsteen, Kristian and Jager, Tibor}, year={2018} }","mla":"Gjøsteen, Kristian, and Tibor Jager. “Practical and Tightly-Secure Digital Signatures and Authenticated Key Exchange.” <i>Advances in Cryptology - CRYPTO 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part II</i>, 2018, doi:<a href=\"https://doi.org/10.1007/978-3-319-96881-0_4\">10.1007/978-3-319-96881-0_4</a>.","short":"K. Gjøsteen, T. Jager, in: Advances in Cryptology - CRYPTO 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part II, 2018.","apa":"Gjøsteen, K., &#38; Jager, T. (2018). Practical and Tightly-Secure Digital Signatures and Authenticated Key Exchange. In <i>Advances in Cryptology - CRYPTO 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part II</i>. <a href=\"https://doi.org/10.1007/978-3-319-96881-0_4\">https://doi.org/10.1007/978-3-319-96881-0_4</a>"},"date_updated":"2022-01-06T07:01:53Z","date_created":"2018-11-08T12:47:45Z","author":[{"first_name":"Kristian","full_name":"Gjøsteen, Kristian","last_name":"Gjøsteen"},{"id":"64669","full_name":"Jager, Tibor","last_name":"Jager","first_name":"Tibor"}],"title":"Practical and Tightly-Secure Digital Signatures and Authenticated Key Exchange","doi":"10.1007/978-3-319-96881-0_4","main_file_link":[{"url":"https://eprint.iacr.org/2018/543.pdf"}]},{"date_updated":"2022-01-06T07:01:54Z","publisher":"ACM Press","date_created":"2018-11-08T12:56:04Z","author":[{"first_name":"Tibor","full_name":"Jager, Tibor","id":"64669","last_name":"Jager"},{"full_name":"Kakvi, Saqib","id":"66268","last_name":"Kakvi","first_name":"Saqib"},{"first_name":"Alexander","last_name":"May","full_name":"May, Alexander"}],"title":"On the Security of the PKCS#1 v1.5 Signature Scheme","doi":"10.1145/3243734.3243798","main_file_link":[{"url":"https://eprint.iacr.org/2018/855.pdf"}],"publication_identifier":{"isbn":["9781450356930"]},"has_accepted_license":"1","publication_status":"published","year":"2018","citation":{"chicago":"Jager, Tibor, Saqib Kakvi, and Alexander May. “On the Security of the PKCS#1 v1.5 Signature Scheme.” In <i>Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security  - CCS ’18</i>. ACM Press, 2018. <a href=\"https://doi.org/10.1145/3243734.3243798\">https://doi.org/10.1145/3243734.3243798</a>.","ieee":"T. Jager, S. Kakvi, and A. May, “On the Security of the PKCS#1 v1.5 Signature Scheme,” in <i>Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security  - CCS ’18</i>, 2018.","ama":"Jager T, Kakvi S, May A. On the Security of the PKCS#1 v1.5 Signature Scheme. In: <i>Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security  - CCS ’18</i>. ACM Press; 2018. doi:<a href=\"https://doi.org/10.1145/3243734.3243798\">10.1145/3243734.3243798</a>","mla":"Jager, Tibor, et al. “On the Security of the PKCS#1 v1.5 Signature Scheme.” <i>Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security  - CCS ’18</i>, ACM Press, 2018, doi:<a href=\"https://doi.org/10.1145/3243734.3243798\">10.1145/3243734.3243798</a>.","short":"T. Jager, S. Kakvi, A. May, in: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security  - CCS ’18, ACM Press, 2018.","bibtex":"@inproceedings{Jager_Kakvi_May_2018, title={On the Security of the PKCS#1 v1.5 Signature Scheme}, DOI={<a href=\"https://doi.org/10.1145/3243734.3243798\">10.1145/3243734.3243798</a>}, booktitle={Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security  - CCS ’18}, publisher={ACM Press}, author={Jager, Tibor and Kakvi, Saqib and May, Alexander}, year={2018} }","apa":"Jager, T., Kakvi, S., &#38; May, A. (2018). On the Security of the PKCS#1 v1.5 Signature Scheme. In <i>Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security  - CCS ’18</i>. ACM Press. <a href=\"https://doi.org/10.1145/3243734.3243798\">https://doi.org/10.1145/3243734.3243798</a>"},"_id":"5442","department":[{"_id":"558"}],"user_id":"38235","ddc":["006"],"language":[{"iso":"eng"}],"file_date_updated":"2018-11-08T12:57:34Z","publication":"Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security  - CCS '18","type":"conference","status":"public","file":[{"success":1,"relation":"main_file","content_type":"application/pdf","file_size":481982,"file_id":"5443","file_name":"2018-855.pdf","access_level":"closed","date_updated":"2018-11-08T12:57:34Z","creator":"abirke","date_created":"2018-11-08T12:57:34Z"}]},{"date_created":"2018-06-07T08:58:36Z","author":[{"id":"64669","full_name":"Jager, Tibor","last_name":"Jager","first_name":"Tibor"},{"first_name":"Florian","last_name":"Kohlar","full_name":"Kohlar, Florian"},{"full_name":"Schäge, Sven","last_name":"Schäge","first_name":"Sven"},{"first_name":"Jörg","full_name":"Schwenk, Jörg","last_name":"Schwenk"}],"date_updated":"2022-01-06T06:58:56Z","doi":"10.1007/s00145-016-9248-2","title":"Authenticated Confidential Channel Establishment and the Security of TLS-DHE","issue":"4","citation":{"bibtex":"@article{Jager_Kohlar_Schäge_Schwenk_2017, title={Authenticated Confidential Channel Establishment and the Security of TLS-DHE}, DOI={<a href=\"https://doi.org/10.1007/s00145-016-9248-2\">10.1007/s00145-016-9248-2</a>}, number={4}, journal={J. Cryptology}, author={Jager, Tibor and Kohlar, Florian and Schäge, Sven and Schwenk, Jörg}, year={2017}, pages={1276--1324} }","short":"T. Jager, F. Kohlar, S. Schäge, J. Schwenk, J. Cryptology (2017) 1276--1324.","mla":"Jager, Tibor, et al. “Authenticated Confidential Channel Establishment and the Security of TLS-DHE.” <i>J. Cryptology</i>, no. 4, 2017, pp. 1276--1324, doi:<a href=\"https://doi.org/10.1007/s00145-016-9248-2\">10.1007/s00145-016-9248-2</a>.","apa":"Jager, T., Kohlar, F., Schäge, S., &#38; Schwenk, J. (2017). Authenticated Confidential Channel Establishment and the Security of TLS-DHE. <i>J. Cryptology</i>, (4), 1276--1324. <a href=\"https://doi.org/10.1007/s00145-016-9248-2\">https://doi.org/10.1007/s00145-016-9248-2</a>","ama":"Jager T, Kohlar F, Schäge S, Schwenk J. Authenticated Confidential Channel Establishment and the Security of TLS-DHE. <i>J Cryptology</i>. 2017;(4):1276--1324. doi:<a href=\"https://doi.org/10.1007/s00145-016-9248-2\">10.1007/s00145-016-9248-2</a>","ieee":"T. Jager, F. Kohlar, S. Schäge, and J. Schwenk, “Authenticated Confidential Channel Establishment and the Security of TLS-DHE,” <i>J. Cryptology</i>, no. 4, pp. 1276--1324, 2017.","chicago":"Jager, Tibor, Florian Kohlar, Sven Schäge, and Jörg Schwenk. “Authenticated Confidential Channel Establishment and the Security of TLS-DHE.” <i>J. Cryptology</i>, no. 4 (2017): 1276--1324. <a href=\"https://doi.org/10.1007/s00145-016-9248-2\">https://doi.org/10.1007/s00145-016-9248-2</a>."},"page":"1276--1324","year":"2017","user_id":"38235","department":[{"_id":"558"}],"_id":"3108","type":"journal_article","publication":"J. Cryptology","status":"public"},{"title":"Simple Security Definitions for and Constructions of 0-RTT Key Exchange","doi":"10.1007/978-3-319-61204-1_2","date_updated":"2022-01-06T06:58:56Z","date_created":"2018-06-07T09:07:59Z","author":[{"first_name":"Britta","last_name":"Hale","full_name":"Hale, Britta"},{"last_name":"Jager","full_name":"Jager, Tibor","id":"64669","first_name":"Tibor"},{"last_name":"Lauer","full_name":"Lauer, Sebastian","first_name":"Sebastian"},{"first_name":"Jörg","last_name":"Schwenk","full_name":"Schwenk, Jörg"}],"year":"2017","citation":{"ieee":"B. Hale, T. Jager, S. Lauer, and J. Schwenk, “Simple Security Definitions for and Constructions of 0-RTT Key Exchange,” in <i>Applied Cryptography and Network Security - 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings</i>, 2017, pp. 20--38.","chicago":"Hale, Britta, Tibor Jager, Sebastian Lauer, and Jörg Schwenk. “Simple Security Definitions for and Constructions of 0-RTT Key Exchange.” In <i>Applied Cryptography and Network Security - 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings</i>, 20--38, 2017. <a href=\"https://doi.org/10.1007/978-3-319-61204-1_2\">https://doi.org/10.1007/978-3-319-61204-1_2</a>.","ama":"Hale B, Jager T, Lauer S, Schwenk J. Simple Security Definitions for and Constructions of 0-RTT Key Exchange. In: <i>Applied Cryptography and Network Security - 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings</i>. ; 2017:20--38. doi:<a href=\"https://doi.org/10.1007/978-3-319-61204-1_2\">10.1007/978-3-319-61204-1_2</a>","apa":"Hale, B., Jager, T., Lauer, S., &#38; Schwenk, J. (2017). Simple Security Definitions for and Constructions of 0-RTT Key Exchange. In <i>Applied Cryptography and Network Security - 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings</i> (pp. 20--38). <a href=\"https://doi.org/10.1007/978-3-319-61204-1_2\">https://doi.org/10.1007/978-3-319-61204-1_2</a>","mla":"Hale, Britta, et al. “Simple Security Definitions for and Constructions of 0-RTT Key Exchange.” <i>Applied Cryptography and Network Security - 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings</i>, 2017, pp. 20--38, doi:<a href=\"https://doi.org/10.1007/978-3-319-61204-1_2\">10.1007/978-3-319-61204-1_2</a>.","short":"B. Hale, T. Jager, S. Lauer, J. Schwenk, in: Applied Cryptography and Network Security - 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings, 2017, pp. 20--38.","bibtex":"@inproceedings{Hale_Jager_Lauer_Schwenk_2017, title={Simple Security Definitions for and Constructions of 0-RTT Key Exchange}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-61204-1_2\">10.1007/978-3-319-61204-1_2</a>}, booktitle={Applied Cryptography and Network Security - 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings}, author={Hale, Britta and Jager, Tibor and Lauer, Sebastian and Schwenk, Jörg}, year={2017}, pages={20--38} }"},"page":"20--38","_id":"3109","user_id":"38235","department":[{"_id":"558"}],"status":"public","type":"conference","publication":"Applied Cryptography and Network Security - 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings"},{"year":"2017","page":"519--548","citation":{"chicago":"Günther, Felix, Britta Hale, Tibor Jager, and Sebastian Lauer. “0-RTT Key Exchange with Full Forward Secrecy.” In <i>Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part III</i>, 519--548, 2017. <a href=\"https://doi.org/10.1007/978-3-319-56617-7_18\">https://doi.org/10.1007/978-3-319-56617-7_18</a>.","ieee":"F. Günther, B. Hale, T. Jager, and S. Lauer, “0-RTT Key Exchange with Full Forward Secrecy,” in <i>Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part III</i>, 2017, pp. 519--548.","ama":"Günther F, Hale B, Jager T, Lauer S. 0-RTT Key Exchange with Full Forward Secrecy. In: <i>Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part III</i>. ; 2017:519--548. doi:<a href=\"https://doi.org/10.1007/978-3-319-56617-7_18\">10.1007/978-3-319-56617-7_18</a>","apa":"Günther, F., Hale, B., Jager, T., &#38; Lauer, S. (2017). 0-RTT Key Exchange with Full Forward Secrecy. In <i>Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part III</i> (pp. 519--548). <a href=\"https://doi.org/10.1007/978-3-319-56617-7_18\">https://doi.org/10.1007/978-3-319-56617-7_18</a>","mla":"Günther, Felix, et al. “0-RTT Key Exchange with Full Forward Secrecy.” <i>Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part III</i>, 2017, pp. 519--548, doi:<a href=\"https://doi.org/10.1007/978-3-319-56617-7_18\">10.1007/978-3-319-56617-7_18</a>.","bibtex":"@inproceedings{Günther_Hale_Jager_Lauer_2017, title={0-RTT Key Exchange with Full Forward Secrecy}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-56617-7_18\">10.1007/978-3-319-56617-7_18</a>}, booktitle={Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part III}, author={Günther, Felix and Hale, Britta and Jager, Tibor and Lauer, Sebastian}, year={2017}, pages={519--548} }","short":"F. Günther, B. Hale, T. Jager, S. Lauer, in: Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part III, 2017, pp. 519--548."},"title":"0-RTT Key Exchange with Full Forward Secrecy","doi":"10.1007/978-3-319-56617-7_18","date_updated":"2022-01-06T06:58:56Z","date_created":"2018-06-07T09:10:17Z","author":[{"first_name":"Felix","last_name":"Günther","full_name":"Günther, Felix"},{"full_name":"Hale, Britta","last_name":"Hale","first_name":"Britta"},{"last_name":"Jager","id":"64669","full_name":"Jager, Tibor","first_name":"Tibor"},{"last_name":"Lauer","full_name":"Lauer, Sebastian","first_name":"Sebastian"}],"status":"public","publication":"Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part III","type":"conference","_id":"3110","department":[{"_id":"558"}],"user_id":"38235"},{"date_updated":"2022-01-06T06:58:56Z","author":[{"first_name":"Tibor","last_name":"Jager","id":"64669","full_name":"Jager, Tibor"},{"full_name":"Stam, Martijn","last_name":"Stam","first_name":"Martijn"},{"first_name":"Ryan","last_name":"Stanley-Oakes","full_name":"Stanley-Oakes, Ryan"},{"first_name":"Bogdan","last_name":"Warinschi","full_name":"Warinschi, Bogdan"}],"date_created":"2018-06-07T09:11:07Z","title":"Multi-key Authenticated Encryption with Corruptions: Reductions Are Lossy","doi":"10.1007/978-3-319-70500-2_14","year":"2017","page":"409--441","citation":{"chicago":"Jager, Tibor, Martijn Stam, Ryan Stanley-Oakes, and Bogdan Warinschi. “Multi-Key Authenticated Encryption with Corruptions: Reductions Are Lossy.” In <i>Theory of Cryptography - 15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part I</i>, 409--441, 2017. <a href=\"https://doi.org/10.1007/978-3-319-70500-2_14\">https://doi.org/10.1007/978-3-319-70500-2_14</a>.","ieee":"T. Jager, M. Stam, R. Stanley-Oakes, and B. Warinschi, “Multi-key Authenticated Encryption with Corruptions: Reductions Are Lossy,” in <i>Theory of Cryptography - 15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part I</i>, 2017, pp. 409--441.","ama":"Jager T, Stam M, Stanley-Oakes R, Warinschi B. Multi-key Authenticated Encryption with Corruptions: Reductions Are Lossy. In: <i>Theory of Cryptography - 15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part I</i>. ; 2017:409--441. doi:<a href=\"https://doi.org/10.1007/978-3-319-70500-2_14\">10.1007/978-3-319-70500-2_14</a>","short":"T. Jager, M. Stam, R. Stanley-Oakes, B. Warinschi, in: Theory of Cryptography - 15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part I, 2017, pp. 409--441.","bibtex":"@inproceedings{Jager_Stam_Stanley-Oakes_Warinschi_2017, title={Multi-key Authenticated Encryption with Corruptions: Reductions Are Lossy}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-70500-2_14\">10.1007/978-3-319-70500-2_14</a>}, booktitle={Theory of Cryptography - 15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part I}, author={Jager, Tibor and Stam, Martijn and Stanley-Oakes, Ryan and Warinschi, Bogdan}, year={2017}, pages={409--441} }","mla":"Jager, Tibor, et al. “Multi-Key Authenticated Encryption with Corruptions: Reductions Are Lossy.” <i>Theory of Cryptography - 15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part I</i>, 2017, pp. 409--441, doi:<a href=\"https://doi.org/10.1007/978-3-319-70500-2_14\">10.1007/978-3-319-70500-2_14</a>.","apa":"Jager, T., Stam, M., Stanley-Oakes, R., &#38; Warinschi, B. (2017). Multi-key Authenticated Encryption with Corruptions: Reductions Are Lossy. In <i>Theory of Cryptography - 15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part I</i> (pp. 409--441). <a href=\"https://doi.org/10.1007/978-3-319-70500-2_14\">https://doi.org/10.1007/978-3-319-70500-2_14</a>"},"_id":"3111","department":[{"_id":"558"}],"user_id":"38235","publication":"Theory of Cryptography - 15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part I","type":"conference","status":"public"},{"extern":"1","_id":"3112","department":[{"_id":"558"}],"user_id":"38235","status":"public","publication":"Des. Codes Cryptography","type":"journal_article","title":"Tightly secure signatures and public-key encryption","doi":"10.1007/s10623-015-0062-x","date_updated":"2022-01-06T06:58:56Z","date_created":"2018-06-07T09:12:15Z","author":[{"first_name":"Dennis","last_name":"Hofheinz","full_name":"Hofheinz, Dennis"},{"first_name":"Tibor","full_name":"Jager, Tibor","id":"64669","last_name":"Jager"}],"year":"2016","page":"29--61","citation":{"apa":"Hofheinz, D., &#38; Jager, T. (2016). Tightly secure signatures and public-key encryption. <i>Des. Codes Cryptography</i>, (1), 29--61. <a href=\"https://doi.org/10.1007/s10623-015-0062-x\">https://doi.org/10.1007/s10623-015-0062-x</a>","mla":"Hofheinz, Dennis, and Tibor Jager. “Tightly Secure Signatures and Public-Key Encryption.” <i>Des. Codes Cryptography</i>, no. 1, 2016, pp. 29--61, doi:<a href=\"https://doi.org/10.1007/s10623-015-0062-x\">10.1007/s10623-015-0062-x</a>.","bibtex":"@article{Hofheinz_Jager_2016, title={Tightly secure signatures and public-key encryption}, DOI={<a href=\"https://doi.org/10.1007/s10623-015-0062-x\">10.1007/s10623-015-0062-x</a>}, number={1}, journal={Des. Codes Cryptography}, author={Hofheinz, Dennis and Jager, Tibor}, year={2016}, pages={29--61} }","short":"D. Hofheinz, T. Jager, Des. Codes Cryptography (2016) 29--61.","ieee":"D. Hofheinz and T. Jager, “Tightly secure signatures and public-key encryption,” <i>Des. Codes Cryptography</i>, no. 1, pp. 29--61, 2016.","chicago":"Hofheinz, Dennis, and Tibor Jager. “Tightly Secure Signatures and Public-Key Encryption.” <i>Des. Codes Cryptography</i>, no. 1 (2016): 29--61. <a href=\"https://doi.org/10.1007/s10623-015-0062-x\">https://doi.org/10.1007/s10623-015-0062-x</a>.","ama":"Hofheinz D, Jager T. Tightly secure signatures and public-key encryption. <i>Des Codes Cryptography</i>. 2016;(1):29--61. doi:<a href=\"https://doi.org/10.1007/s10623-015-0062-x\">10.1007/s10623-015-0062-x</a>"},"issue":"1"},{"issue":"6","year":"2016","citation":{"ama":"Heuer F, Jager T, Schäge S, Kiltz E. Selective opening security of practical public-key encryption schemes. <i>IET Information Security</i>. 2016;(6):304--318. doi:<a href=\"https://doi.org/10.1049/iet-ifs.2015.0507\">10.1049/iet-ifs.2015.0507</a>","ieee":"F. Heuer, T. Jager, S. Schäge, and E. Kiltz, “Selective opening security of practical public-key encryption schemes,” <i>IET Information Security</i>, no. 6, pp. 304--318, 2016.","chicago":"Heuer, Felix, Tibor Jager, Sven Schäge, and Eike Kiltz. “Selective Opening Security of Practical Public-Key Encryption Schemes.” <i>IET Information Security</i>, no. 6 (2016): 304--318. <a href=\"https://doi.org/10.1049/iet-ifs.2015.0507\">https://doi.org/10.1049/iet-ifs.2015.0507</a>.","bibtex":"@article{Heuer_Jager_Schäge_Kiltz_2016, title={Selective opening security of practical public-key encryption schemes}, DOI={<a href=\"https://doi.org/10.1049/iet-ifs.2015.0507\">10.1049/iet-ifs.2015.0507</a>}, number={6}, journal={IET Information Security}, author={Heuer, Felix and Jager, Tibor and Schäge, Sven and Kiltz, Eike}, year={2016}, pages={304--318} }","short":"F. Heuer, T. Jager, S. Schäge, E. Kiltz, IET Information Security (2016) 304--318.","mla":"Heuer, Felix, et al. “Selective Opening Security of Practical Public-Key Encryption Schemes.” <i>IET Information Security</i>, no. 6, 2016, pp. 304--318, doi:<a href=\"https://doi.org/10.1049/iet-ifs.2015.0507\">10.1049/iet-ifs.2015.0507</a>.","apa":"Heuer, F., Jager, T., Schäge, S., &#38; Kiltz, E. (2016). Selective opening security of practical public-key encryption schemes. <i>IET Information Security</i>, (6), 304--318. <a href=\"https://doi.org/10.1049/iet-ifs.2015.0507\">https://doi.org/10.1049/iet-ifs.2015.0507</a>"},"page":"304--318","date_updated":"2022-01-06T06:58:56Z","author":[{"first_name":"Felix","last_name":"Heuer","full_name":"Heuer, Felix"},{"full_name":"Jager, Tibor","id":"64669","last_name":"Jager","first_name":"Tibor"},{"last_name":"Schäge","full_name":"Schäge, Sven","first_name":"Sven"},{"first_name":"Eike","full_name":"Kiltz, Eike","last_name":"Kiltz"}],"date_created":"2018-06-07T09:12:50Z","title":"Selective opening security of practical public-key encryption schemes","doi":"10.1049/iet-ifs.2015.0507","type":"journal_article","publication":"IET Information Security","status":"public","_id":"3113","user_id":"38235","department":[{"_id":"558"}],"extern":"1"},{"status":"public","type":"journal_article","publication":"PoPETs","extern":"1","user_id":"38235","department":[{"_id":"558"}],"_id":"3114","citation":{"apa":"Jager, T., &#38; Rupp, A. (2016). Black-Box Accumulation: Collecting Incentives in a Privacy-Preserving Way. <i>PoPETs</i>, (3), 62--82.","short":"T. Jager, A. Rupp, PoPETs (2016) 62--82.","mla":"Jager, Tibor, and Andy Rupp. “Black-Box Accumulation: Collecting Incentives in a Privacy-Preserving Way.” <i>PoPETs</i>, no. 3, 2016, pp. 62--82.","bibtex":"@article{Jager_Rupp_2016, title={Black-Box Accumulation: Collecting Incentives in a Privacy-Preserving Way}, number={3}, journal={PoPETs}, author={Jager, Tibor and Rupp, Andy}, year={2016}, pages={62--82} }","chicago":"Jager, Tibor, and Andy Rupp. “Black-Box Accumulation: Collecting Incentives in a Privacy-Preserving Way.” <i>PoPETs</i>, no. 3 (2016): 62--82.","ieee":"T. Jager and A. Rupp, “Black-Box Accumulation: Collecting Incentives in a Privacy-Preserving Way,” <i>PoPETs</i>, no. 3, pp. 62--82, 2016.","ama":"Jager T, Rupp A. Black-Box Accumulation: Collecting Incentives in a Privacy-Preserving Way. <i>PoPETs</i>. 2016;(3):62--82."},"page":"62--82","year":"2016","issue":"3","title":"Black-Box Accumulation: Collecting Incentives in a Privacy-Preserving Way","date_created":"2018-06-07T09:13:15Z","author":[{"id":"64669","full_name":"Jager, Tibor","last_name":"Jager","first_name":"Tibor"},{"first_name":"Andy","full_name":"Rupp, Andy","last_name":"Rupp"}],"date_updated":"2022-01-06T06:58:56Z"},{"title":"How to Generate and Use Universal Samplers","doi":"10.1007/978-3-662-53890-6_24","date_updated":"2022-01-06T06:58:57Z","author":[{"full_name":"Hofheinz, Dennis","last_name":"Hofheinz","first_name":"Dennis"},{"first_name":"Tibor","last_name":"Jager","full_name":"Jager, Tibor","id":"64669"},{"first_name":"Dakshita","full_name":"Khurana, Dakshita","last_name":"Khurana"},{"first_name":"Amit","full_name":"Sahai, Amit","last_name":"Sahai"},{"last_name":"Waters","full_name":"Waters, Brent","first_name":"Brent"},{"first_name":"Mark","full_name":"Zhandry, Mark","last_name":"Zhandry"}],"date_created":"2018-06-07T09:13:48Z","year":"2016","page":"715--744","citation":{"ama":"Hofheinz D, Jager T, Khurana D, Sahai A, Waters B, Zhandry M. How to Generate and Use Universal Samplers. In: <i>Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part II</i>. ; 2016:715--744. doi:<a href=\"https://doi.org/10.1007/978-3-662-53890-6_24\">10.1007/978-3-662-53890-6_24</a>","ieee":"D. Hofheinz, T. Jager, D. Khurana, A. Sahai, B. Waters, and M. Zhandry, “How to Generate and Use Universal Samplers,” in <i>Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part II</i>, 2016, pp. 715--744.","chicago":"Hofheinz, Dennis, Tibor Jager, Dakshita Khurana, Amit Sahai, Brent Waters, and Mark Zhandry. “How to Generate and Use Universal Samplers.” In <i>Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part II</i>, 715--744, 2016. <a href=\"https://doi.org/10.1007/978-3-662-53890-6_24\">https://doi.org/10.1007/978-3-662-53890-6_24</a>.","bibtex":"@inproceedings{Hofheinz_Jager_Khurana_Sahai_Waters_Zhandry_2016, title={How to Generate and Use Universal Samplers}, DOI={<a href=\"https://doi.org/10.1007/978-3-662-53890-6_24\">10.1007/978-3-662-53890-6_24</a>}, booktitle={Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part II}, author={Hofheinz, Dennis and Jager, Tibor and Khurana, Dakshita and Sahai, Amit and Waters, Brent and Zhandry, Mark}, year={2016}, pages={715--744} }","mla":"Hofheinz, Dennis, et al. “How to Generate and Use Universal Samplers.” <i>Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part II</i>, 2016, pp. 715--744, doi:<a href=\"https://doi.org/10.1007/978-3-662-53890-6_24\">10.1007/978-3-662-53890-6_24</a>.","short":"D. Hofheinz, T. Jager, D. Khurana, A. Sahai, B. Waters, M. Zhandry, in: Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part II, 2016, pp. 715--744.","apa":"Hofheinz, D., Jager, T., Khurana, D., Sahai, A., Waters, B., &#38; Zhandry, M. (2016). How to Generate and Use Universal Samplers. In <i>Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part II</i> (pp. 715--744). <a href=\"https://doi.org/10.1007/978-3-662-53890-6_24\">https://doi.org/10.1007/978-3-662-53890-6_24</a>"},"extern":"1","_id":"3115","department":[{"_id":"558"}],"user_id":"38235","status":"public","publication":"Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part II","type":"conference"},{"citation":{"ieee":"M. Horst, M. Grothe, T. Jager, and J. Schwenk, “Breaking PPTP VPNs via RADIUS Encryption,” in <i>Cryptology and Network Security - 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings</i>, 2016, pp. 159--175.","chicago":"Horst, Matthias, Martin Grothe, Tibor Jager, and Jörg Schwenk. “Breaking PPTP VPNs via RADIUS Encryption.” In <i>Cryptology and Network Security - 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings</i>, 159--175, 2016. <a href=\"https://doi.org/10.1007/978-3-319-48965-0_10\">https://doi.org/10.1007/978-3-319-48965-0_10</a>.","ama":"Horst M, Grothe M, Jager T, Schwenk J. Breaking PPTP VPNs via RADIUS Encryption. In: <i>Cryptology and Network Security - 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings</i>. ; 2016:159--175. doi:<a href=\"https://doi.org/10.1007/978-3-319-48965-0_10\">10.1007/978-3-319-48965-0_10</a>","apa":"Horst, M., Grothe, M., Jager, T., &#38; Schwenk, J. (2016). Breaking PPTP VPNs via RADIUS Encryption. In <i>Cryptology and Network Security - 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings</i> (pp. 159--175). <a href=\"https://doi.org/10.1007/978-3-319-48965-0_10\">https://doi.org/10.1007/978-3-319-48965-0_10</a>","bibtex":"@inproceedings{Horst_Grothe_Jager_Schwenk_2016, title={Breaking PPTP VPNs via RADIUS Encryption}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-48965-0_10\">10.1007/978-3-319-48965-0_10</a>}, booktitle={Cryptology and Network Security - 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings}, author={Horst, Matthias and Grothe, Martin and Jager, Tibor and Schwenk, Jörg}, year={2016}, pages={159--175} }","short":"M. Horst, M. Grothe, T. Jager, J. Schwenk, in: Cryptology and Network Security - 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings, 2016, pp. 159--175.","mla":"Horst, Matthias, et al. “Breaking PPTP VPNs via RADIUS Encryption.” <i>Cryptology and Network Security - 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings</i>, 2016, pp. 159--175, doi:<a href=\"https://doi.org/10.1007/978-3-319-48965-0_10\">10.1007/978-3-319-48965-0_10</a>."},"page":"159--175","year":"2016","doi":"10.1007/978-3-319-48965-0_10","title":"Breaking PPTP VPNs via RADIUS Encryption","author":[{"last_name":"Horst","full_name":"Horst, Matthias","first_name":"Matthias"},{"first_name":"Martin","last_name":"Grothe","full_name":"Grothe, Martin"},{"full_name":"Jager, Tibor","id":"64669","last_name":"Jager","first_name":"Tibor"},{"last_name":"Schwenk","full_name":"Schwenk, Jörg","first_name":"Jörg"}],"date_created":"2018-06-07T09:14:34Z","date_updated":"2022-01-06T06:58:57Z","status":"public","type":"conference","publication":"Cryptology and Network Security - 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings","extern":"1","user_id":"38235","department":[{"_id":"558"}],"_id":"3116"},{"extern":"1","_id":"3117","user_id":"38235","department":[{"_id":"558"}],"status":"public","type":"conference","publication":"Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II","title":"On the Impossibility of Tight Cryptographic Reductions","doi":"10.1007/978-3-662-49896-5_10","date_updated":"2022-01-06T06:58:57Z","author":[{"last_name":"Bader","full_name":"Bader, Christoph","first_name":"Christoph"},{"id":"64669","full_name":"Jager, Tibor","last_name":"Jager","first_name":"Tibor"},{"first_name":"Yong","full_name":"Li, Yong","last_name":"Li"},{"last_name":"Schäge","full_name":"Schäge, Sven","first_name":"Sven"}],"date_created":"2018-06-07T09:15:15Z","year":"2016","citation":{"apa":"Bader, C., Jager, T., Li, Y., &#38; Schäge, S. (2016). On the Impossibility of Tight Cryptographic Reductions. In <i>Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II</i> (pp. 273--304). <a href=\"https://doi.org/10.1007/978-3-662-49896-5_10\">https://doi.org/10.1007/978-3-662-49896-5_10</a>","short":"C. Bader, T. Jager, Y. Li, S. Schäge, in: Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II, 2016, pp. 273--304.","bibtex":"@inproceedings{Bader_Jager_Li_Schäge_2016, title={On the Impossibility of Tight Cryptographic Reductions}, DOI={<a href=\"https://doi.org/10.1007/978-3-662-49896-5_10\">10.1007/978-3-662-49896-5_10</a>}, booktitle={Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II}, author={Bader, Christoph and Jager, Tibor and Li, Yong and Schäge, Sven}, year={2016}, pages={273--304} }","mla":"Bader, Christoph, et al. “On the Impossibility of Tight Cryptographic Reductions.” <i>Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II</i>, 2016, pp. 273--304, doi:<a href=\"https://doi.org/10.1007/978-3-662-49896-5_10\">10.1007/978-3-662-49896-5_10</a>.","ama":"Bader C, Jager T, Li Y, Schäge S. On the Impossibility of Tight Cryptographic Reductions. In: <i>Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II</i>. ; 2016:273--304. doi:<a href=\"https://doi.org/10.1007/978-3-662-49896-5_10\">10.1007/978-3-662-49896-5_10</a>","chicago":"Bader, Christoph, Tibor Jager, Yong Li, and Sven Schäge. “On the Impossibility of Tight Cryptographic Reductions.” In <i>Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II</i>, 273--304, 2016. <a href=\"https://doi.org/10.1007/978-3-662-49896-5_10\">https://doi.org/10.1007/978-3-662-49896-5_10</a>.","ieee":"C. Bader, T. Jager, Y. Li, and S. Schäge, “On the Impossibility of Tight Cryptographic Reductions,” in <i>Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II</i>, 2016, pp. 273--304."},"page":"273--304"},{"title":"Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts","doi":"10.1007/978-3-662-53644-5_6","date_updated":"2022-01-06T06:58:57Z","date_created":"2018-06-07T09:15:51Z","author":[{"first_name":"Dennis","full_name":"Hofheinz, Dennis","last_name":"Hofheinz"},{"first_name":"Tibor","last_name":"Jager","full_name":"Jager, Tibor","id":"64669"},{"last_name":"Rupp","full_name":"Rupp, Andy","first_name":"Andy"}],"year":"2016","page":"146--168","citation":{"bibtex":"@inproceedings{Hofheinz_Jager_Rupp_2016, title={Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts}, DOI={<a href=\"https://doi.org/10.1007/978-3-662-53644-5_6\">10.1007/978-3-662-53644-5_6</a>}, booktitle={Theory of Cryptography - 14th International Conference, TCC 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part II}, author={Hofheinz, Dennis and Jager, Tibor and Rupp, Andy}, year={2016}, pages={146--168} }","short":"D. Hofheinz, T. Jager, A. Rupp, in: Theory of Cryptography - 14th International Conference, TCC 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part II, 2016, pp. 146--168.","mla":"Hofheinz, Dennis, et al. “Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts.” <i>Theory of Cryptography - 14th International Conference, TCC 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part II</i>, 2016, pp. 146--168, doi:<a href=\"https://doi.org/10.1007/978-3-662-53644-5_6\">10.1007/978-3-662-53644-5_6</a>.","apa":"Hofheinz, D., Jager, T., &#38; Rupp, A. (2016). Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts. In <i>Theory of Cryptography - 14th International Conference, TCC 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part II</i> (pp. 146--168). <a href=\"https://doi.org/10.1007/978-3-662-53644-5_6\">https://doi.org/10.1007/978-3-662-53644-5_6</a>","ama":"Hofheinz D, Jager T, Rupp A. Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts. In: <i>Theory of Cryptography - 14th International Conference, TCC 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part II</i>. ; 2016:146--168. doi:<a href=\"https://doi.org/10.1007/978-3-662-53644-5_6\">10.1007/978-3-662-53644-5_6</a>","chicago":"Hofheinz, Dennis, Tibor Jager, and Andy Rupp. “Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts.” In <i>Theory of Cryptography - 14th International Conference, TCC 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part II</i>, 146--168, 2016. <a href=\"https://doi.org/10.1007/978-3-662-53644-5_6\">https://doi.org/10.1007/978-3-662-53644-5_6</a>.","ieee":"D. Hofheinz, T. Jager, and A. Rupp, “Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts,” in <i>Theory of Cryptography - 14th International Conference, TCC 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part II</i>, 2016, pp. 146--168."},"extern":"1","_id":"3118","department":[{"_id":"558"}],"user_id":"38235","status":"public","publication":"Theory of Cryptography - 14th International Conference, TCC 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part II","type":"conference"},{"citation":{"ama":"Hofheinz D, Jager T. Verifiable Random Functions from Standard Assumptions. In: <i>Theory of Cryptography - 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part I</i>. ; 2016:336--362. doi:<a href=\"https://doi.org/10.1007/978-3-662-49096-9_14\">10.1007/978-3-662-49096-9_14</a>","ieee":"D. Hofheinz and T. Jager, “Verifiable Random Functions from Standard Assumptions,” in <i>Theory of Cryptography - 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part I</i>, 2016, pp. 336--362.","chicago":"Hofheinz, Dennis, and Tibor Jager. “Verifiable Random Functions from Standard Assumptions.” In <i>Theory of Cryptography - 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part I</i>, 336--362, 2016. <a href=\"https://doi.org/10.1007/978-3-662-49096-9_14\">https://doi.org/10.1007/978-3-662-49096-9_14</a>.","bibtex":"@inproceedings{Hofheinz_Jager_2016, title={Verifiable Random Functions from Standard Assumptions}, DOI={<a href=\"https://doi.org/10.1007/978-3-662-49096-9_14\">10.1007/978-3-662-49096-9_14</a>}, booktitle={Theory of Cryptography - 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part I}, author={Hofheinz, Dennis and Jager, Tibor}, year={2016}, pages={336--362} }","mla":"Hofheinz, Dennis, and Tibor Jager. “Verifiable Random Functions from Standard Assumptions.” <i>Theory of Cryptography - 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part I</i>, 2016, pp. 336--362, doi:<a href=\"https://doi.org/10.1007/978-3-662-49096-9_14\">10.1007/978-3-662-49096-9_14</a>.","short":"D. Hofheinz, T. Jager, in: Theory of Cryptography - 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part I, 2016, pp. 336--362.","apa":"Hofheinz, D., &#38; Jager, T. (2016). Verifiable Random Functions from Standard Assumptions. In <i>Theory of Cryptography - 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part I</i> (pp. 336--362). <a href=\"https://doi.org/10.1007/978-3-662-49096-9_14\">https://doi.org/10.1007/978-3-662-49096-9_14</a>"},"page":"336--362","year":"2016","doi":"10.1007/978-3-662-49096-9_14","title":"Verifiable Random Functions from Standard Assumptions","author":[{"first_name":"Dennis","last_name":"Hofheinz","full_name":"Hofheinz, Dennis"},{"first_name":"Tibor","last_name":"Jager","full_name":"Jager, Tibor","id":"64669"}],"date_created":"2018-06-07T09:16:30Z","date_updated":"2022-01-06T06:58:57Z","status":"public","type":"conference","publication":"Theory of Cryptography - 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part I","extern":"1","user_id":"38235","department":[{"_id":"558"}],"_id":"3119"}]
