---
_id: '5446'
author:
- first_name: Tibor
  full_name: Jager, Tibor
  id: '64669'
  last_name: Jager
- first_name: Andy
  full_name: Rupp, Andy
  last_name: Rupp
citation:
  ama: 'Jager T, Rupp A. Black-Box Accumulation: Collecting Incentives in a Privacy-Preserving
    Way. <i>Proceedings on Privacy Enhancing Technologies</i>. 2016;2016(3):62-82.
    doi:<a href="https://doi.org/10.1515/popets-2016-0016">10.1515/popets-2016-0016</a>'
  apa: 'Jager, T., &#38; Rupp, A. (2016). Black-Box Accumulation: Collecting Incentives
    in a Privacy-Preserving Way. <i>Proceedings on Privacy Enhancing Technologies</i>,
    <i>2016</i>(3), 62–82. <a href="https://doi.org/10.1515/popets-2016-0016">https://doi.org/10.1515/popets-2016-0016</a>'
  bibtex: '@article{Jager_Rupp_2016, title={Black-Box Accumulation: Collecting Incentives
    in a Privacy-Preserving Way}, volume={2016}, DOI={<a href="https://doi.org/10.1515/popets-2016-0016">10.1515/popets-2016-0016</a>},
    number={3}, journal={Proceedings on Privacy Enhancing Technologies}, publisher={Walter
    de Gruyter GmbH}, author={Jager, Tibor and Rupp, Andy}, year={2016}, pages={62–82}
    }'
  chicago: 'Jager, Tibor, and Andy Rupp. “Black-Box Accumulation: Collecting Incentives
    in a Privacy-Preserving Way.” <i>Proceedings on Privacy Enhancing Technologies</i>
    2016, no. 3 (2016): 62–82. <a href="https://doi.org/10.1515/popets-2016-0016">https://doi.org/10.1515/popets-2016-0016</a>.'
  ieee: 'T. Jager and A. Rupp, “Black-Box Accumulation: Collecting Incentives in a
    Privacy-Preserving Way,” <i>Proceedings on Privacy Enhancing Technologies</i>,
    vol. 2016, no. 3, pp. 62–82, 2016.'
  mla: 'Jager, Tibor, and Andy Rupp. “Black-Box Accumulation: Collecting Incentives
    in a Privacy-Preserving Way.” <i>Proceedings on Privacy Enhancing Technologies</i>,
    vol. 2016, no. 3, Walter de Gruyter GmbH, 2016, pp. 62–82, doi:<a href="https://doi.org/10.1515/popets-2016-0016">10.1515/popets-2016-0016</a>.'
  short: T. Jager, A. Rupp, Proceedings on Privacy Enhancing Technologies 2016 (2016)
    62–82.
date_created: 2018-11-08T13:03:39Z
date_updated: 2022-01-06T07:01:54Z
ddc:
- '006'
department:
- _id: '558'
doi: 10.1515/popets-2016-0016
extern: '1'
file:
- access_level: closed
  content_type: application/pdf
  creator: abirke
  date_created: 2018-11-08T13:04:30Z
  date_updated: 2018-11-08T13:04:30Z
  file_id: '5447'
  file_name: Black-Box_Accumulation__Collecting_Incentives_in_a_Privacy-Preserving_Way.pdf
  file_size: 750585
  relation: main_file
  success: 1
file_date_updated: 2018-11-08T13:04:30Z
has_accepted_license: '1'
intvolume: '      2016'
issue: '3'
language:
- iso: eng
main_file_link:
- url: https://petsymposium.org/2016/files/papers/Black-Box_Accumulation__Collecting_Incentives_in_a_Privacy-Preserving_Way.pdf
page: 62-82
publication: Proceedings on Privacy Enhancing Technologies
publication_identifier:
  issn:
  - 2299-0984
publication_status: published
publisher: Walter de Gruyter GmbH
status: public
title: 'Black-Box Accumulation: Collecting Incentives in a Privacy-Preserving Way'
type: journal_article
user_id: '38235'
volume: 2016
year: '2016'
...
---
_id: '3120'
author:
- first_name: Florian
  full_name: Böhl, Florian
  last_name: Böhl
- first_name: Dennis
  full_name: Hofheinz, Dennis
  last_name: Hofheinz
- first_name: Tibor
  full_name: Jager, Tibor
  id: '64669'
  last_name: Jager
- first_name: Jessica
  full_name: Koch, Jessica
  last_name: Koch
- first_name: Christoph
  full_name: Striecks, Christoph
  last_name: Striecks
citation:
  ama: 'Böhl F, Hofheinz D, Jager T, Koch J, Striecks C. Confined Guessing: New Signatures
    From Standard Assumptions. <i>J Cryptology</i>. 2015;(1):176--208. doi:<a href="https://doi.org/10.1007/s00145-014-9183-z">10.1007/s00145-014-9183-z</a>'
  apa: 'Böhl, F., Hofheinz, D., Jager, T., Koch, J., &#38; Striecks, C. (2015). Confined
    Guessing: New Signatures From Standard Assumptions. <i>J. Cryptology</i>, (1),
    176--208. <a href="https://doi.org/10.1007/s00145-014-9183-z">https://doi.org/10.1007/s00145-014-9183-z</a>'
  bibtex: '@article{Böhl_Hofheinz_Jager_Koch_Striecks_2015, title={Confined Guessing:
    New Signatures From Standard Assumptions}, DOI={<a href="https://doi.org/10.1007/s00145-014-9183-z">10.1007/s00145-014-9183-z</a>},
    number={1}, journal={J. Cryptology}, author={Böhl, Florian and Hofheinz, Dennis
    and Jager, Tibor and Koch, Jessica and Striecks, Christoph}, year={2015}, pages={176--208}
    }'
  chicago: 'Böhl, Florian, Dennis Hofheinz, Tibor Jager, Jessica Koch, and Christoph
    Striecks. “Confined Guessing: New Signatures From Standard Assumptions.” <i>J.
    Cryptology</i>, no. 1 (2015): 176--208. <a href="https://doi.org/10.1007/s00145-014-9183-z">https://doi.org/10.1007/s00145-014-9183-z</a>.'
  ieee: 'F. Böhl, D. Hofheinz, T. Jager, J. Koch, and C. Striecks, “Confined Guessing:
    New Signatures From Standard Assumptions,” <i>J. Cryptology</i>, no. 1, pp. 176--208,
    2015.'
  mla: 'Böhl, Florian, et al. “Confined Guessing: New Signatures From Standard Assumptions.”
    <i>J. Cryptology</i>, no. 1, 2015, pp. 176--208, doi:<a href="https://doi.org/10.1007/s00145-014-9183-z">10.1007/s00145-014-9183-z</a>.'
  short: F. Böhl, D. Hofheinz, T. Jager, J. Koch, C. Striecks, J. Cryptology (2015)
    176--208.
date_created: 2018-06-07T09:17:17Z
date_updated: 2022-01-06T06:58:57Z
department:
- _id: '558'
doi: 10.1007/s00145-014-9183-z
extern: '1'
issue: '1'
page: 176--208
publication: J. Cryptology
status: public
title: 'Confined Guessing: New Signatures From Standard Assumptions'
type: journal_article
user_id: '38235'
year: '2015'
...
---
_id: '3121'
author:
- first_name: Tibor
  full_name: Jager, Tibor
  id: '64669'
  last_name: Jager
- first_name: Jörg
  full_name: Schwenk, Jörg
  last_name: Schwenk
- first_name: Juraj
  full_name: Somorovsky, Juraj
  last_name: Somorovsky
citation:
  ama: 'Jager T, Schwenk J, Somorovsky J. On the Security of TLS 1.3 and QUIC Against
    Weaknesses in PKCS#1 v1.5 Encryption. In: <i>Proceedings of the 22nd ACM SIGSAC
    Conference on Computer and Communications Security, Denver, CO, USA, October 12-16,
    2015</i>. ; 2015:1185--1196. doi:<a href="https://doi.org/10.1145/2810103.2813657">10.1145/2810103.2813657</a>'
  apa: Jager, T., Schwenk, J., &#38; Somorovsky, J. (2015). On the Security of TLS
    1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption. In <i>Proceedings of
    the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver,
    CO, USA, October 12-16, 2015</i> (pp. 1185--1196). <a href="https://doi.org/10.1145/2810103.2813657">https://doi.org/10.1145/2810103.2813657</a>
  bibtex: '@inproceedings{Jager_Schwenk_Somorovsky_2015, title={On the Security of
    TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption}, DOI={<a href="https://doi.org/10.1145/2810103.2813657">10.1145/2810103.2813657</a>},
    booktitle={Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications
    Security, Denver, CO, USA, October 12-16, 2015}, author={Jager, Tibor and Schwenk,
    Jörg and Somorovsky, Juraj}, year={2015}, pages={1185--1196} }'
  chicago: Jager, Tibor, Jörg Schwenk, and Juraj Somorovsky. “On the Security of TLS
    1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption.” In <i>Proceedings
    of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver,
    CO, USA, October 12-16, 2015</i>, 1185--1196, 2015. <a href="https://doi.org/10.1145/2810103.2813657">https://doi.org/10.1145/2810103.2813657</a>.
  ieee: T. Jager, J. Schwenk, and J. Somorovsky, “On the Security of TLS 1.3 and QUIC
    Against Weaknesses in PKCS#1 v1.5 Encryption,” in <i>Proceedings of the 22nd ACM
    SIGSAC Conference on Computer and Communications Security, Denver, CO, USA, October
    12-16, 2015</i>, 2015, pp. 1185--1196.
  mla: Jager, Tibor, et al. “On the Security of TLS 1.3 and QUIC Against Weaknesses
    in PKCS#1 v1.5 Encryption.” <i>Proceedings of the 22nd ACM SIGSAC Conference on
    Computer and Communications Security, Denver, CO, USA, October 12-16, 2015</i>,
    2015, pp. 1185--1196, doi:<a href="https://doi.org/10.1145/2810103.2813657">10.1145/2810103.2813657</a>.
  short: 'T. Jager, J. Schwenk, J. Somorovsky, in: Proceedings of the 22nd ACM SIGSAC
    Conference on Computer and Communications Security, Denver, CO, USA, October 12-16,
    2015, 2015, pp. 1185--1196.'
date_created: 2018-06-07T09:17:47Z
date_updated: 2022-01-06T06:58:57Z
department:
- _id: '558'
doi: 10.1145/2810103.2813657
extern: '1'
page: 1185--1196
publication: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications
  Security, Denver, CO, USA, October 12-16, 2015
status: public
title: On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption
type: conference
user_id: '38235'
year: '2015'
...
---
_id: '3122'
author:
- first_name: Tibor
  full_name: Jager, Tibor
  id: '64669'
  last_name: Jager
- first_name: Jörg
  full_name: Schwenk, Jörg
  last_name: Schwenk
- first_name: Juraj
  full_name: Somorovsky, Juraj
  last_name: Somorovsky
citation:
  ama: 'Jager T, Schwenk J, Somorovsky J. Practical Invalid Curve Attacks on TLS-ECDH.
    In: <i>Computer Security - ESORICS 2015 - 20th European Symposium on Research
    in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part
    I</i>. ; 2015:407--425. doi:<a href="https://doi.org/10.1007/978-3-319-24174-6_21">10.1007/978-3-319-24174-6_21</a>'
  apa: Jager, T., Schwenk, J., &#38; Somorovsky, J. (2015). Practical Invalid Curve
    Attacks on TLS-ECDH. In <i>Computer Security - ESORICS 2015 - 20th European Symposium
    on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings,
    Part I</i> (pp. 407--425). <a href="https://doi.org/10.1007/978-3-319-24174-6_21">https://doi.org/10.1007/978-3-319-24174-6_21</a>
  bibtex: '@inproceedings{Jager_Schwenk_Somorovsky_2015, title={Practical Invalid
    Curve Attacks on TLS-ECDH}, DOI={<a href="https://doi.org/10.1007/978-3-319-24174-6_21">10.1007/978-3-319-24174-6_21</a>},
    booktitle={Computer Security - ESORICS 2015 - 20th European Symposium on Research
    in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part
    I}, author={Jager, Tibor and Schwenk, Jörg and Somorovsky, Juraj}, year={2015},
    pages={407--425} }'
  chicago: Jager, Tibor, Jörg Schwenk, and Juraj Somorovsky. “Practical Invalid Curve
    Attacks on TLS-ECDH.” In <i>Computer Security - ESORICS 2015 - 20th European Symposium
    on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings,
    Part I</i>, 407--425, 2015. <a href="https://doi.org/10.1007/978-3-319-24174-6_21">https://doi.org/10.1007/978-3-319-24174-6_21</a>.
  ieee: T. Jager, J. Schwenk, and J. Somorovsky, “Practical Invalid Curve Attacks
    on TLS-ECDH,” in <i>Computer Security - ESORICS 2015 - 20th European Symposium
    on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings,
    Part I</i>, 2015, pp. 407--425.
  mla: Jager, Tibor, et al. “Practical Invalid Curve Attacks on TLS-ECDH.” <i>Computer
    Security - ESORICS 2015 - 20th European Symposium on Research in Computer Security,
    Vienna, Austria, September 21-25, 2015, Proceedings, Part I</i>, 2015, pp. 407--425,
    doi:<a href="https://doi.org/10.1007/978-3-319-24174-6_21">10.1007/978-3-319-24174-6_21</a>.
  short: 'T. Jager, J. Schwenk, J. Somorovsky, in: Computer Security - ESORICS 2015
    - 20th European Symposium on Research in Computer Security, Vienna, Austria, September
    21-25, 2015, Proceedings, Part I, 2015, pp. 407--425.'
date_created: 2018-06-07T09:18:33Z
date_updated: 2022-01-06T06:58:57Z
department:
- _id: '558'
doi: 10.1007/978-3-319-24174-6_21
extern: '1'
page: 407--425
publication: Computer Security - ESORICS 2015 - 20th European Symposium on Research
  in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part
  I
status: public
title: Practical Invalid Curve Attacks on TLS-ECDH
type: conference
user_id: '38235'
year: '2015'
...
---
_id: '3123'
author:
- first_name: Felix
  full_name: Heuer, Felix
  last_name: Heuer
- first_name: Tibor
  full_name: Jager, Tibor
  id: '64669'
  last_name: Jager
- first_name: Eike
  full_name: Kiltz, Eike
  last_name: Kiltz
- first_name: Sven
  full_name: Schäge, Sven
  last_name: Schäge
citation:
  ama: 'Heuer F, Jager T, Kiltz E, Schäge S. On the Selective Opening Security of
    Practical Public-Key Encryption Schemes. In: <i>Public-Key Cryptography - PKC
    2015 - 18th IACR International Conference on Practice and Theory in Public-Key
    Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings</i>.
    ; 2015:27--51. doi:<a href="https://doi.org/10.1007/978-3-662-46447-2_2">10.1007/978-3-662-46447-2_2</a>'
  apa: Heuer, F., Jager, T., Kiltz, E., &#38; Schäge, S. (2015). On the Selective
    Opening Security of Practical Public-Key Encryption Schemes. In <i>Public-Key
    Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory
    in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings</i>
    (pp. 27--51). <a href="https://doi.org/10.1007/978-3-662-46447-2_2">https://doi.org/10.1007/978-3-662-46447-2_2</a>
  bibtex: '@inproceedings{Heuer_Jager_Kiltz_Schäge_2015, title={On the Selective Opening
    Security of Practical Public-Key Encryption Schemes}, DOI={<a href="https://doi.org/10.1007/978-3-662-46447-2_2">10.1007/978-3-662-46447-2_2</a>},
    booktitle={Public-Key Cryptography - PKC 2015 - 18th IACR International Conference
    on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March
    30 - April 1, 2015, Proceedings}, author={Heuer, Felix and Jager, Tibor and Kiltz,
    Eike and Schäge, Sven}, year={2015}, pages={27--51} }'
  chicago: Heuer, Felix, Tibor Jager, Eike Kiltz, and Sven Schäge. “On the Selective
    Opening Security of Practical Public-Key Encryption Schemes.” In <i>Public-Key
    Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory
    in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings</i>,
    27--51, 2015. <a href="https://doi.org/10.1007/978-3-662-46447-2_2">https://doi.org/10.1007/978-3-662-46447-2_2</a>.
  ieee: F. Heuer, T. Jager, E. Kiltz, and S. Schäge, “On the Selective Opening Security
    of Practical Public-Key Encryption Schemes,” in <i>Public-Key Cryptography - PKC
    2015 - 18th IACR International Conference on Practice and Theory in Public-Key
    Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings</i>,
    2015, pp. 27--51.
  mla: Heuer, Felix, et al. “On the Selective Opening Security of Practical Public-Key
    Encryption Schemes.” <i>Public-Key Cryptography - PKC 2015 - 18th IACR International
    Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD,
    USA, March 30 - April 1, 2015, Proceedings</i>, 2015, pp. 27--51, doi:<a href="https://doi.org/10.1007/978-3-662-46447-2_2">10.1007/978-3-662-46447-2_2</a>.
  short: 'F. Heuer, T. Jager, E. Kiltz, S. Schäge, in: Public-Key Cryptography - PKC
    2015 - 18th IACR International Conference on Practice and Theory in Public-Key
    Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings, 2015,
    pp. 27--51.'
date_created: 2018-06-07T09:19:04Z
date_updated: 2022-01-06T06:58:57Z
department:
- _id: '558'
doi: 10.1007/978-3-662-46447-2_2
extern: '1'
page: 27--51
publication: Public-Key Cryptography - PKC 2015 - 18th IACR International Conference
  on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March
  30 - April 1, 2015, Proceedings
status: public
title: On the Selective Opening Security of Practical Public-Key Encryption Schemes
type: conference
user_id: '38235'
year: '2015'
...
---
_id: '3124'
author:
- first_name: Florian
  full_name: Bergsma, Florian
  last_name: Bergsma
- first_name: Tibor
  full_name: Jager, Tibor
  id: '64669'
  last_name: Jager
- first_name: Jörg
  full_name: Schwenk, Jörg
  last_name: Schwenk
citation:
  ama: 'Bergsma F, Jager T, Schwenk J. One-Round Key Exchange with Strong Security:
    An Efficient and Generic Construction in the Standard Model. In: <i>Public-Key
    Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory
    in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings</i>.
    ; 2015:477--494. doi:<a href="https://doi.org/10.1007/978-3-662-46447-2_21">10.1007/978-3-662-46447-2_21</a>'
  apa: 'Bergsma, F., Jager, T., &#38; Schwenk, J. (2015). One-Round Key Exchange with
    Strong Security: An Efficient and Generic Construction in the Standard Model.
    In <i>Public-Key Cryptography - PKC 2015 - 18th IACR International Conference
    on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March
    30 - April 1, 2015, Proceedings</i> (pp. 477--494). <a href="https://doi.org/10.1007/978-3-662-46447-2_21">https://doi.org/10.1007/978-3-662-46447-2_21</a>'
  bibtex: '@inproceedings{Bergsma_Jager_Schwenk_2015, title={One-Round Key Exchange
    with Strong Security: An Efficient and Generic Construction in the Standard Model},
    DOI={<a href="https://doi.org/10.1007/978-3-662-46447-2_21">10.1007/978-3-662-46447-2_21</a>},
    booktitle={Public-Key Cryptography - PKC 2015 - 18th IACR International Conference
    on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March
    30 - April 1, 2015, Proceedings}, author={Bergsma, Florian and Jager, Tibor and
    Schwenk, Jörg}, year={2015}, pages={477--494} }'
  chicago: 'Bergsma, Florian, Tibor Jager, and Jörg Schwenk. “One-Round Key Exchange
    with Strong Security: An Efficient and Generic Construction in the Standard Model.”
    In <i>Public-Key Cryptography - PKC 2015 - 18th IACR International Conference
    on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March
    30 - April 1, 2015, Proceedings</i>, 477--494, 2015. <a href="https://doi.org/10.1007/978-3-662-46447-2_21">https://doi.org/10.1007/978-3-662-46447-2_21</a>.'
  ieee: 'F. Bergsma, T. Jager, and J. Schwenk, “One-Round Key Exchange with Strong
    Security: An Efficient and Generic Construction in the Standard Model,” in <i>Public-Key
    Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory
    in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings</i>,
    2015, pp. 477--494.'
  mla: 'Bergsma, Florian, et al. “One-Round Key Exchange with Strong Security: An
    Efficient and Generic Construction in the Standard Model.” <i>Public-Key Cryptography
    - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key
    Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings</i>,
    2015, pp. 477--494, doi:<a href="https://doi.org/10.1007/978-3-662-46447-2_21">10.1007/978-3-662-46447-2_21</a>.'
  short: 'F. Bergsma, T. Jager, J. Schwenk, in: Public-Key Cryptography - PKC 2015
    - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography,
    Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings, 2015, pp. 477--494.'
date_created: 2018-06-07T09:19:47Z
date_updated: 2022-01-06T06:58:57Z
department:
- _id: '558'
doi: 10.1007/978-3-662-46447-2_21
extern: '1'
page: 477--494
publication: Public-Key Cryptography - PKC 2015 - 18th IACR International Conference
  on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March
  30 - April 1, 2015, Proceedings
status: public
title: 'One-Round Key Exchange with Strong Security: An Efficient and Generic Construction
  in the Standard Model'
type: conference
user_id: '38235'
year: '2015'
...
---
_id: '3125'
author:
- first_name: Tibor
  full_name: Jager, Tibor
  id: '64669'
  last_name: Jager
citation:
  ama: 'Jager T. Verifiable Random Functions from Weaker Assumptions. In: <i>Theory
    of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland,
    March 23-25, 2015, Proceedings, Part {II}</i>. ; 2015:121--143. doi:<a href="https://doi.org/10.1007/978-3-662-46497-7_5">10.1007/978-3-662-46497-7_5</a>'
  apa: Jager, T. (2015). Verifiable Random Functions from Weaker Assumptions. In <i>Theory
    of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland,
    March 23-25, 2015, Proceedings, Part {II}</i> (pp. 121--143). <a href="https://doi.org/10.1007/978-3-662-46497-7_5">https://doi.org/10.1007/978-3-662-46497-7_5</a>
  bibtex: '@inproceedings{Jager_2015, title={Verifiable Random Functions from Weaker
    Assumptions}, DOI={<a href="https://doi.org/10.1007/978-3-662-46497-7_5">10.1007/978-3-662-46497-7_5</a>},
    booktitle={Theory of Cryptography - 12th Theory of Cryptography Conference, TCC
    2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {II}}, author={Jager,
    Tibor}, year={2015}, pages={121--143} }'
  chicago: Jager, Tibor. “Verifiable Random Functions from Weaker Assumptions.” In
    <i>Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015,
    Warsaw, Poland, March 23-25, 2015, Proceedings, Part {II}</i>, 121--143, 2015.
    <a href="https://doi.org/10.1007/978-3-662-46497-7_5">https://doi.org/10.1007/978-3-662-46497-7_5</a>.
  ieee: T. Jager, “Verifiable Random Functions from Weaker Assumptions,” in <i>Theory
    of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland,
    March 23-25, 2015, Proceedings, Part {II}</i>, 2015, pp. 121--143.
  mla: Jager, Tibor. “Verifiable Random Functions from Weaker Assumptions.” <i>Theory
    of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland,
    March 23-25, 2015, Proceedings, Part {II}</i>, 2015, pp. 121--143, doi:<a href="https://doi.org/10.1007/978-3-662-46497-7_5">10.1007/978-3-662-46497-7_5</a>.
  short: 'T. Jager, in: Theory of Cryptography - 12th Theory of Cryptography Conference,
    TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {II}, 2015, pp.
    121--143.'
date_created: 2018-06-07T09:20:19Z
date_updated: 2022-01-06T06:58:57Z
department:
- _id: '558'
doi: 10.1007/978-3-662-46497-7_5
extern: '1'
page: 121--143
publication: Theory of Cryptography - 12th Theory of Cryptography Conference, TCC
  2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {II}
status: public
title: Verifiable Random Functions from Weaker Assumptions
type: conference
user_id: '38235'
year: '2015'
...
---
_id: '3126'
author:
- first_name: Christoph
  full_name: Bader, Christoph
  last_name: Bader
- first_name: Dennis
  full_name: Hofheinz, Dennis
  last_name: Hofheinz
- first_name: Tibor
  full_name: Jager, Tibor
  id: '64669'
  last_name: Jager
- first_name: Eike
  full_name: Kiltz, Eike
  last_name: Kiltz
- first_name: Yong
  full_name: Li, Yong
  last_name: Li
citation:
  ama: 'Bader C, Hofheinz D, Jager T, Kiltz E, Li Y. Tightly-Secure Authenticated
    Key Exchange. In: <i>Theory of Cryptography - 12th Theory of Cryptography Conference,
    TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I</i>. ; 2015:629--658.
    doi:<a href="https://doi.org/10.1007/978-3-662-46494-6_26">10.1007/978-3-662-46494-6_26</a>'
  apa: Bader, C., Hofheinz, D., Jager, T., Kiltz, E., &#38; Li, Y. (2015). Tightly-Secure
    Authenticated Key Exchange. In <i>Theory of Cryptography - 12th Theory of Cryptography
    Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I</i>
    (pp. 629--658). <a href="https://doi.org/10.1007/978-3-662-46494-6_26">https://doi.org/10.1007/978-3-662-46494-6_26</a>
  bibtex: '@inproceedings{Bader_Hofheinz_Jager_Kiltz_Li_2015, title={Tightly-Secure
    Authenticated Key Exchange}, DOI={<a href="https://doi.org/10.1007/978-3-662-46494-6_26">10.1007/978-3-662-46494-6_26</a>},
    booktitle={Theory of Cryptography - 12th Theory of Cryptography Conference, TCC
    2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I}, author={Bader,
    Christoph and Hofheinz, Dennis and Jager, Tibor and Kiltz, Eike and Li, Yong},
    year={2015}, pages={629--658} }'
  chicago: Bader, Christoph, Dennis Hofheinz, Tibor Jager, Eike Kiltz, and Yong Li.
    “Tightly-Secure Authenticated Key Exchange.” In <i>Theory of Cryptography - 12th
    Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015,
    Proceedings, Part I</i>, 629--658, 2015. <a href="https://doi.org/10.1007/978-3-662-46494-6_26">https://doi.org/10.1007/978-3-662-46494-6_26</a>.
  ieee: C. Bader, D. Hofheinz, T. Jager, E. Kiltz, and Y. Li, “Tightly-Secure Authenticated
    Key Exchange,” in <i>Theory of Cryptography - 12th Theory of Cryptography Conference,
    TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I</i>, 2015, pp.
    629--658.
  mla: Bader, Christoph, et al. “Tightly-Secure Authenticated Key Exchange.” <i>Theory
    of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland,
    March 23-25, 2015, Proceedings, Part I</i>, 2015, pp. 629--658, doi:<a href="https://doi.org/10.1007/978-3-662-46494-6_26">10.1007/978-3-662-46494-6_26</a>.
  short: 'C. Bader, D. Hofheinz, T. Jager, E. Kiltz, Y. Li, in: Theory of Cryptography
    - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25,
    2015, Proceedings, Part I, 2015, pp. 629--658.'
date_created: 2018-06-07T09:20:48Z
date_updated: 2022-01-06T06:58:57Z
department:
- _id: '558'
doi: 10.1007/978-3-662-46494-6_26
extern: '1'
page: 629--658
publication: Theory of Cryptography - 12th Theory of Cryptography Conference, TCC
  2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I
status: public
title: Tightly-Secure Authenticated Key Exchange
type: conference
user_id: '38235'
year: '2015'
...
---
_id: '3127'
author:
- first_name: Tibor
  full_name: Jager, Tibor
  id: '64669'
  last_name: Jager
citation:
  ama: Jager T. Die Zukunft der Kryptographie. <i>Datenschutz und Datensicherheit</i>.
    2014;(7):445--451. doi:<a href="https://doi.org/10.1007/s11623-014-0204-8">10.1007/s11623-014-0204-8</a>
  apa: Jager, T. (2014). Die Zukunft der Kryptographie. <i>Datenschutz Und Datensicherheit</i>,
    (7), 445--451. <a href="https://doi.org/10.1007/s11623-014-0204-8">https://doi.org/10.1007/s11623-014-0204-8</a>
  bibtex: '@article{Jager_2014, title={Die Zukunft der Kryptographie}, DOI={<a href="https://doi.org/10.1007/s11623-014-0204-8">10.1007/s11623-014-0204-8</a>},
    number={7}, journal={Datenschutz und Datensicherheit}, author={Jager, Tibor},
    year={2014}, pages={445--451} }'
  chicago: 'Jager, Tibor. “Die Zukunft Der Kryptographie.” <i>Datenschutz Und Datensicherheit</i>,
    no. 7 (2014): 445--451. <a href="https://doi.org/10.1007/s11623-014-0204-8">https://doi.org/10.1007/s11623-014-0204-8</a>.'
  ieee: T. Jager, “Die Zukunft der Kryptographie,” <i>Datenschutz und Datensicherheit</i>,
    no. 7, pp. 445--451, 2014.
  mla: Jager, Tibor. “Die Zukunft Der Kryptographie.” <i>Datenschutz Und Datensicherheit</i>,
    no. 7, 2014, pp. 445--451, doi:<a href="https://doi.org/10.1007/s11623-014-0204-8">10.1007/s11623-014-0204-8</a>.
  short: T. Jager, Datenschutz Und Datensicherheit (2014) 445--451.
date_created: 2018-06-07T09:21:18Z
date_updated: 2022-01-06T06:58:57Z
department:
- _id: '558'
doi: 10.1007/s11623-014-0204-8
extern: '1'
issue: '7'
page: 445--451
publication: Datenschutz und Datensicherheit
status: public
title: Die Zukunft der Kryptographie
type: journal_article
user_id: '38235'
year: '2014'
...
---
_id: '3128'
author:
- first_name: Nils
  full_name: Fleischhacker, Nils
  last_name: Fleischhacker
- first_name: Tibor
  full_name: Jager, Tibor
  id: '64669'
  last_name: Jager
- first_name: Dominique
  full_name: Schröder, Dominique
  last_name: Schröder
citation:
  ama: 'Fleischhacker N, Jager T, Schröder D. On Tight Security Proofs for Schnorr
    Signatures. In: <i>Advances in Cryptology - ASIACRYPT 2014 - 20th International
    Conference on the Theory and Application of Cryptology and Information Security,
    Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part I</i>. ; 2014:512--531.
    doi:<a href="https://doi.org/10.1007/978-3-662-45611-8_27">10.1007/978-3-662-45611-8_27</a>'
  apa: Fleischhacker, N., Jager, T., &#38; Schröder, D. (2014). On Tight Security
    Proofs for Schnorr Signatures. In <i>Advances in Cryptology - ASIACRYPT 2014 -
    20th International Conference on the Theory and Application of Cryptology and
    Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings,
    Part I</i> (pp. 512--531). <a href="https://doi.org/10.1007/978-3-662-45611-8_27">https://doi.org/10.1007/978-3-662-45611-8_27</a>
  bibtex: '@inproceedings{Fleischhacker_Jager_Schröder_2014, title={On Tight Security
    Proofs for Schnorr Signatures}, DOI={<a href="https://doi.org/10.1007/978-3-662-45611-8_27">10.1007/978-3-662-45611-8_27</a>},
    booktitle={Advances in Cryptology - ASIACRYPT 2014 - 20th International Conference
    on the Theory and Application of Cryptology and Information Security, Kaoshiung,
    Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part I}, author={Fleischhacker,
    Nils and Jager, Tibor and Schröder, Dominique}, year={2014}, pages={512--531}
    }'
  chicago: Fleischhacker, Nils, Tibor Jager, and Dominique Schröder. “On Tight Security
    Proofs for Schnorr Signatures.” In <i>Advances in Cryptology - ASIACRYPT 2014
    - 20th International Conference on the Theory and Application of Cryptology and
    Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings,
    Part I</i>, 512--531, 2014. <a href="https://doi.org/10.1007/978-3-662-45611-8_27">https://doi.org/10.1007/978-3-662-45611-8_27</a>.
  ieee: N. Fleischhacker, T. Jager, and D. Schröder, “On Tight Security Proofs for
    Schnorr Signatures,” in <i>Advances in Cryptology - ASIACRYPT 2014 - 20th International
    Conference on the Theory and Application of Cryptology and Information Security,
    Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part I</i>, 2014,
    pp. 512--531.
  mla: Fleischhacker, Nils, et al. “On Tight Security Proofs for Schnorr Signatures.”
    <i>Advances in Cryptology - ASIACRYPT 2014 - 20th International Conference on
    the Theory and Application of Cryptology and Information Security, Kaoshiung,
    Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part I</i>, 2014, pp. 512--531,
    doi:<a href="https://doi.org/10.1007/978-3-662-45611-8_27">10.1007/978-3-662-45611-8_27</a>.
  short: 'N. Fleischhacker, T. Jager, D. Schröder, in: Advances in Cryptology - ASIACRYPT
    2014 - 20th International Conference on the Theory and Application of Cryptology
    and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings,
    Part I, 2014, pp. 512--531.'
date_created: 2018-06-07T09:21:46Z
date_updated: 2022-01-06T06:58:57Z
department:
- _id: '558'
doi: 10.1007/978-3-662-45611-8_27
extern: '1'
page: 512--531
publication: Advances in Cryptology - ASIACRYPT 2014 - 20th International Conference
  on the Theory and Application of Cryptology and Information Security, Kaoshiung,
  Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part I
status: public
title: On Tight Security Proofs for Schnorr Signatures
type: conference
user_id: '38235'
year: '2014'
...
---
_id: '3129'
author:
- first_name: Tibor
  full_name: Jager, Tibor
  id: '64669'
  last_name: Jager
- first_name: Jörg
  full_name: Schwenk, Jörg
  last_name: Schwenk
citation:
  ama: Jager T, Schwenk J. On the Analysis of Cryptographic Assumptions in the Generic
    Ring Model. <i>J Cryptology</i>. 2013;(2):225--245. doi:<a href="https://doi.org/10.1007/s00145-012-9120-y">10.1007/s00145-012-9120-y</a>
  apa: Jager, T., &#38; Schwenk, J. (2013). On the Analysis of Cryptographic Assumptions
    in the Generic Ring Model. <i>J. Cryptology</i>, (2), 225--245. <a href="https://doi.org/10.1007/s00145-012-9120-y">https://doi.org/10.1007/s00145-012-9120-y</a>
  bibtex: '@article{Jager_Schwenk_2013, title={On the Analysis of Cryptographic Assumptions
    in the Generic Ring Model}, DOI={<a href="https://doi.org/10.1007/s00145-012-9120-y">10.1007/s00145-012-9120-y</a>},
    number={2}, journal={J. Cryptology}, author={Jager, Tibor and Schwenk, Jörg},
    year={2013}, pages={225--245} }'
  chicago: 'Jager, Tibor, and Jörg Schwenk. “On the Analysis of Cryptographic Assumptions
    in the Generic Ring Model.” <i>J. Cryptology</i>, no. 2 (2013): 225--245. <a href="https://doi.org/10.1007/s00145-012-9120-y">https://doi.org/10.1007/s00145-012-9120-y</a>.'
  ieee: T. Jager and J. Schwenk, “On the Analysis of Cryptographic Assumptions in
    the Generic Ring Model,” <i>J. Cryptology</i>, no. 2, pp. 225--245, 2013.
  mla: Jager, Tibor, and Jörg Schwenk. “On the Analysis of Cryptographic Assumptions
    in the Generic Ring Model.” <i>J. Cryptology</i>, no. 2, 2013, pp. 225--245, doi:<a
    href="https://doi.org/10.1007/s00145-012-9120-y">10.1007/s00145-012-9120-y</a>.
  short: T. Jager, J. Schwenk, J. Cryptology (2013) 225--245.
date_created: 2018-06-07T09:22:18Z
date_updated: 2022-01-06T06:58:57Z
department:
- _id: '558'
doi: 10.1007/s00145-012-9120-y
extern: '1'
issue: '2'
page: 225--245
publication: J. Cryptology
status: public
title: On the Analysis of Cryptographic Assumptions in the Generic Ring Model
type: journal_article
user_id: '38235'
year: '2013'
...
---
_id: '3130'
author:
- first_name: Florian
  full_name: Böhl, Florian
  last_name: Böhl
- first_name: Dennis
  full_name: Hofheinz, Dennis
  last_name: Hofheinz
- first_name: Tibor
  full_name: Jager, Tibor
  id: '64669'
  last_name: Jager
- first_name: Jessica
  full_name: Koch, Jessica
  last_name: Koch
- first_name: Jae
  full_name: Hong Seo, Jae
  last_name: Hong Seo
- first_name: Christoph
  full_name: Striecks, Christoph
  last_name: Striecks
citation:
  ama: 'Böhl F, Hofheinz D, Jager T, Koch J, Hong Seo J, Striecks C. Practical Signatures
    from Standard Assumptions. In: <i>Advances in Cryptology - EUROCRYPT 2013, 32nd
    Annual International Conference on the Theory and Applications of Cryptographic
    Techniques, Athens, Greece, May 26-30, 2013. Proceedings</i>. ; 2013:461--485.
    doi:<a href="https://doi.org/10.1007/978-3-642-38348-9_28">10.1007/978-3-642-38348-9_28</a>'
  apa: Böhl, F., Hofheinz, D., Jager, T., Koch, J., Hong Seo, J., &#38; Striecks,
    C. (2013). Practical Signatures from Standard Assumptions. In <i>Advances in Cryptology
    - EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications
    of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings</i>
    (pp. 461--485). <a href="https://doi.org/10.1007/978-3-642-38348-9_28">https://doi.org/10.1007/978-3-642-38348-9_28</a>
  bibtex: '@inproceedings{Böhl_Hofheinz_Jager_Koch_Hong Seo_Striecks_2013, title={Practical
    Signatures from Standard Assumptions}, DOI={<a href="https://doi.org/10.1007/978-3-642-38348-9_28">10.1007/978-3-642-38348-9_28</a>},
    booktitle={Advances in Cryptology - EUROCRYPT 2013, 32nd Annual International
    Conference on the Theory and Applications of Cryptographic Techniques, Athens,
    Greece, May 26-30, 2013. Proceedings}, author={Böhl, Florian and Hofheinz, Dennis
    and Jager, Tibor and Koch, Jessica and Hong Seo, Jae and Striecks, Christoph},
    year={2013}, pages={461--485} }'
  chicago: Böhl, Florian, Dennis Hofheinz, Tibor Jager, Jessica Koch, Jae Hong Seo,
    and Christoph Striecks. “Practical Signatures from Standard Assumptions.” In <i>Advances
    in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference on the Theory
    and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013.
    Proceedings</i>, 461--485, 2013. <a href="https://doi.org/10.1007/978-3-642-38348-9_28">https://doi.org/10.1007/978-3-642-38348-9_28</a>.
  ieee: F. Böhl, D. Hofheinz, T. Jager, J. Koch, J. Hong Seo, and C. Striecks, “Practical
    Signatures from Standard Assumptions,” in <i>Advances in Cryptology - EUROCRYPT
    2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic
    Techniques, Athens, Greece, May 26-30, 2013. Proceedings</i>, 2013, pp. 461--485.
  mla: Böhl, Florian, et al. “Practical Signatures from Standard Assumptions.” <i>Advances
    in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference on the Theory
    and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013.
    Proceedings</i>, 2013, pp. 461--485, doi:<a href="https://doi.org/10.1007/978-3-642-38348-9_28">10.1007/978-3-642-38348-9_28</a>.
  short: 'F. Böhl, D. Hofheinz, T. Jager, J. Koch, J. Hong Seo, C. Striecks, in: Advances
    in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference on the Theory
    and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013.
    Proceedings, 2013, pp. 461--485.'
date_created: 2018-06-07T09:22:39Z
date_updated: 2022-01-06T06:58:58Z
department:
- _id: '558'
doi: 10.1007/978-3-642-38348-9_28
extern: '1'
page: 461--485
publication: Advances in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference
  on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May
  26-30, 2013. Proceedings
status: public
title: Practical Signatures from Standard Assumptions
type: conference
user_id: '38235'
year: '2013'
...
---
_id: '3131'
author:
- first_name: Tibor
  full_name: Jager, Tibor
  id: '64669'
  last_name: Jager
- first_name: Kenneth G.
  full_name: Paterson, Kenneth G.
  last_name: Paterson
- first_name: Juraj
  full_name: Somorovsky, Juraj
  last_name: Somorovsky
citation:
  ama: 'Jager T, Paterson KG, Somorovsky J. One Bad Apple: Backwards Compatibility
    Attacks on State-of-the-Art Cryptography. In: <i>20th Annual Network and Distributed
    System Security Symposium, NDSS 2013, San Diego, California, USA, February 24-27,
    2013</i>. ; 2013.'
  apa: 'Jager, T., Paterson, K. G., &#38; Somorovsky, J. (2013). One Bad Apple: Backwards
    Compatibility Attacks on State-of-the-Art Cryptography. In <i>20th Annual Network
    and Distributed System Security Symposium, NDSS 2013, San Diego, California, USA,
    February 24-27, 2013</i>.'
  bibtex: '@inproceedings{Jager_Paterson_Somorovsky_2013, title={One Bad Apple: Backwards
    Compatibility Attacks on State-of-the-Art Cryptography}, booktitle={20th Annual
    Network and Distributed System Security Symposium, NDSS 2013, San Diego, California,
    USA, February 24-27, 2013}, author={Jager, Tibor and Paterson, Kenneth G. and
    Somorovsky, Juraj}, year={2013} }'
  chicago: 'Jager, Tibor, Kenneth G. Paterson, and Juraj Somorovsky. “One Bad Apple:
    Backwards Compatibility Attacks on State-of-the-Art Cryptography.” In <i>20th
    Annual Network and Distributed System Security Symposium, NDSS 2013, San Diego,
    California, USA, February 24-27, 2013</i>, 2013.'
  ieee: 'T. Jager, K. G. Paterson, and J. Somorovsky, “One Bad Apple: Backwards Compatibility
    Attacks on State-of-the-Art Cryptography,” in <i>20th Annual Network and Distributed
    System Security Symposium, NDSS 2013, San Diego, California, USA, February 24-27,
    2013</i>, 2013.'
  mla: 'Jager, Tibor, et al. “One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art
    Cryptography.” <i>20th Annual Network and Distributed System Security Symposium,
    NDSS 2013, San Diego, California, USA, February 24-27, 2013</i>, 2013.'
  short: 'T. Jager, K.G. Paterson, J. Somorovsky, in: 20th Annual Network and Distributed
    System Security Symposium, NDSS 2013, San Diego, California, USA, February 24-27,
    2013, 2013.'
date_created: 2018-06-07T09:23:49Z
date_updated: 2022-01-06T06:58:58Z
department:
- _id: '558'
extern: '1'
publication: 20th Annual Network and Distributed System Security Symposium, NDSS 2013,
  San Diego, California, USA, February 24-27, 2013
status: public
title: 'One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography'
type: conference
user_id: '38235'
year: '2013'
...
---
_id: '3132'
author:
- first_name: Tibor
  full_name: Jager, Tibor
  id: '64669'
  last_name: Jager
citation:
  ama: Jager T. <i>On Black-Box Models of Computation in Cryptology</i>. Ruhr University
    Bochum; 2012.
  apa: Jager, T. (2012). <i>On black-box models of computation in cryptology</i>.
    Ruhr University Bochum.
  bibtex: '@book{Jager_2012, title={On black-box models of computation in cryptology},
    publisher={Ruhr University Bochum}, author={Jager, Tibor}, year={2012} }'
  chicago: Jager, Tibor. <i>On Black-Box Models of Computation in Cryptology</i>.
    Ruhr University Bochum, 2012.
  ieee: T. Jager, <i>On black-box models of computation in cryptology</i>. Ruhr University
    Bochum, 2012.
  mla: Jager, Tibor. <i>On Black-Box Models of Computation in Cryptology</i>. Ruhr
    University Bochum, 2012.
  short: T. Jager, On Black-Box Models of Computation in Cryptology, Ruhr University
    Bochum, 2012.
date_created: 2018-06-07T09:25:35Z
date_updated: 2022-01-06T06:58:58Z
department:
- _id: '558'
extern: '1'
publication_identifier:
  isbn:
  - 978-3-8348-1989-5
publisher: Ruhr University Bochum
status: public
title: On black-box models of computation in cryptology
type: dissertation
user_id: '38235'
year: '2012'
...
---
_id: '3133'
author:
- first_name: Tibor
  full_name: Jager, Tibor
  id: '64669'
  last_name: Jager
- first_name: Florian
  full_name: Kohlar, Florian
  last_name: Kohlar
- first_name: Sven
  full_name: Schäge, Sven
  last_name: Schäge
- first_name: Jörg
  full_name: Schwenk, Jörg
  last_name: Schwenk
citation:
  ama: 'Jager T, Kohlar F, Schäge S, Schwenk J. On the Security of TLS-DHE in the
    Standard Model. In: <i>Advances in Cryptology - CRYPTO 2012 - 32nd Annual Cryptology
    Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings</i>. ; 2012:273--293.
    doi:<a href="https://doi.org/10.1007/978-3-642-32009-5_17">10.1007/978-3-642-32009-5_17</a>'
  apa: Jager, T., Kohlar, F., Schäge, S., &#38; Schwenk, J. (2012). On the Security
    of TLS-DHE in the Standard Model. In <i>Advances in Cryptology - CRYPTO 2012 -
    32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012.
    Proceedings</i> (pp. 273--293). <a href="https://doi.org/10.1007/978-3-642-32009-5_17">https://doi.org/10.1007/978-3-642-32009-5_17</a>
  bibtex: '@inproceedings{Jager_Kohlar_Schäge_Schwenk_2012, title={On the Security
    of TLS-DHE in the Standard Model}, DOI={<a href="https://doi.org/10.1007/978-3-642-32009-5_17">10.1007/978-3-642-32009-5_17</a>},
    booktitle={Advances in Cryptology - CRYPTO 2012 - 32nd Annual Cryptology Conference,
    Santa Barbara, CA, USA, August 19-23, 2012. Proceedings}, author={Jager, Tibor
    and Kohlar, Florian and Schäge, Sven and Schwenk, Jörg}, year={2012}, pages={273--293}
    }'
  chicago: Jager, Tibor, Florian Kohlar, Sven Schäge, and Jörg Schwenk. “On the Security
    of TLS-DHE in the Standard Model.” In <i>Advances in Cryptology - CRYPTO 2012
    - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012.
    Proceedings</i>, 273--293, 2012. <a href="https://doi.org/10.1007/978-3-642-32009-5_17">https://doi.org/10.1007/978-3-642-32009-5_17</a>.
  ieee: T. Jager, F. Kohlar, S. Schäge, and J. Schwenk, “On the Security of TLS-DHE
    in the Standard Model,” in <i>Advances in Cryptology - CRYPTO 2012 - 32nd Annual
    Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings</i>,
    2012, pp. 273--293.
  mla: Jager, Tibor, et al. “On the Security of TLS-DHE in the Standard Model.” <i>Advances
    in Cryptology - CRYPTO 2012 - 32nd Annual Cryptology Conference, Santa Barbara,
    CA, USA, August 19-23, 2012. Proceedings</i>, 2012, pp. 273--293, doi:<a href="https://doi.org/10.1007/978-3-642-32009-5_17">10.1007/978-3-642-32009-5_17</a>.
  short: 'T. Jager, F. Kohlar, S. Schäge, J. Schwenk, in: Advances in Cryptology -
    CRYPTO 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August
    19-23, 2012. Proceedings, 2012, pp. 273--293.'
date_created: 2018-06-07T09:25:56Z
date_updated: 2022-01-06T06:58:58Z
department:
- _id: '558'
doi: 10.1007/978-3-642-32009-5_17
extern: '1'
page: 273--293
publication: Advances in Cryptology - CRYPTO 2012 - 32nd Annual Cryptology Conference,
  Santa Barbara, CA, USA, August 19-23, 2012. Proceedings
status: public
title: On the Security of TLS-DHE in the Standard Model
type: conference
user_id: '38235'
year: '2012'
...
---
_id: '3134'
author:
- first_name: Dennis
  full_name: Hofheinz, Dennis
  last_name: Hofheinz
- first_name: Tibor
  full_name: Jager, Tibor
  id: '64669'
  last_name: Jager
citation:
  ama: 'Hofheinz D, Jager T. Tightly Secure Signatures and Public-Key Encryption.
    In: <i>Advances in Cryptology - CRYPTO 2012 - 32nd Annual Cryptology Conference,
    Santa Barbara, CA, USA, August 19-23, 2012. Proceedings</i>. ; 2012:590--607.
    doi:<a href="https://doi.org/10.1007/978-3-642-32009-5_35">10.1007/978-3-642-32009-5_35</a>'
  apa: Hofheinz, D., &#38; Jager, T. (2012). Tightly Secure Signatures and Public-Key
    Encryption. In <i>Advances in Cryptology - CRYPTO 2012 - 32nd Annual Cryptology
    Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings</i> (pp. 590--607).
    <a href="https://doi.org/10.1007/978-3-642-32009-5_35">https://doi.org/10.1007/978-3-642-32009-5_35</a>
  bibtex: '@inproceedings{Hofheinz_Jager_2012, title={Tightly Secure Signatures and
    Public-Key Encryption}, DOI={<a href="https://doi.org/10.1007/978-3-642-32009-5_35">10.1007/978-3-642-32009-5_35</a>},
    booktitle={Advances in Cryptology - CRYPTO 2012 - 32nd Annual Cryptology Conference,
    Santa Barbara, CA, USA, August 19-23, 2012. Proceedings}, author={Hofheinz, Dennis
    and Jager, Tibor}, year={2012}, pages={590--607} }'
  chicago: Hofheinz, Dennis, and Tibor Jager. “Tightly Secure Signatures and Public-Key
    Encryption.” In <i>Advances in Cryptology - CRYPTO 2012 - 32nd Annual Cryptology
    Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings</i>, 590--607,
    2012. <a href="https://doi.org/10.1007/978-3-642-32009-5_35">https://doi.org/10.1007/978-3-642-32009-5_35</a>.
  ieee: D. Hofheinz and T. Jager, “Tightly Secure Signatures and Public-Key Encryption,”
    in <i>Advances in Cryptology - CRYPTO 2012 - 32nd Annual Cryptology Conference,
    Santa Barbara, CA, USA, August 19-23, 2012. Proceedings</i>, 2012, pp. 590--607.
  mla: Hofheinz, Dennis, and Tibor Jager. “Tightly Secure Signatures and Public-Key
    Encryption.” <i>Advances in Cryptology - CRYPTO 2012 - 32nd Annual Cryptology
    Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings</i>, 2012,
    pp. 590--607, doi:<a href="https://doi.org/10.1007/978-3-642-32009-5_35">10.1007/978-3-642-32009-5_35</a>.
  short: 'D. Hofheinz, T. Jager, in: Advances in Cryptology - CRYPTO 2012 - 32nd Annual
    Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings,
    2012, pp. 590--607.'
date_created: 2018-06-07T09:26:31Z
date_updated: 2022-01-06T06:58:58Z
department:
- _id: '558'
doi: 10.1007/978-3-642-32009-5_35
extern: '1'
page: 590--607
publication: Advances in Cryptology - CRYPTO 2012 - 32nd Annual Cryptology Conference,
  Santa Barbara, CA, USA, August 19-23, 2012. Proceedings
status: public
title: Tightly Secure Signatures and Public-Key Encryption
type: conference
user_id: '38235'
year: '2012'
...
---
_id: '3135'
author:
- first_name: Tibor
  full_name: Jager, Tibor
  id: '64669'
  last_name: Jager
- first_name: Sebastian
  full_name: Schinzel, Sebastian
  last_name: Schinzel
- first_name: Juraj
  full_name: Somorovsky, Juraj
  last_name: Somorovsky
citation:
  ama: 'Jager T, Schinzel S, Somorovsky J. Bleichenbacher’s Attack Strikes again:
    Breaking PKCS#1 v1.5 in XML Encryption. In: <i>Computer Security - ESORICS 2012
    - 17th European Symposium on Research in Computer Security, Pisa, Italy, September
    10-12, 2012. Proceedings</i>. ; 2012:752--769. doi:<a href="https://doi.org/10.1007/978-3-642-33167-1_43">10.1007/978-3-642-33167-1_43</a>'
  apa: 'Jager, T., Schinzel, S., &#38; Somorovsky, J. (2012). Bleichenbacher’s Attack
    Strikes again: Breaking PKCS#1 v1.5 in XML Encryption. In <i>Computer Security
    - ESORICS 2012 - 17th European Symposium on Research in Computer Security, Pisa,
    Italy, September 10-12, 2012. Proceedings</i> (pp. 752--769). <a href="https://doi.org/10.1007/978-3-642-33167-1_43">https://doi.org/10.1007/978-3-642-33167-1_43</a>'
  bibtex: '@inproceedings{Jager_Schinzel_Somorovsky_2012, title={Bleichenbacher’s
    Attack Strikes again: Breaking PKCS#1 v1.5 in XML Encryption}, DOI={<a href="https://doi.org/10.1007/978-3-642-33167-1_43">10.1007/978-3-642-33167-1_43</a>},
    booktitle={Computer Security - ESORICS 2012 - 17th European Symposium on Research
    in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings}, author={Jager,
    Tibor and Schinzel, Sebastian and Somorovsky, Juraj}, year={2012}, pages={752--769}
    }'
  chicago: 'Jager, Tibor, Sebastian Schinzel, and Juraj Somorovsky. “Bleichenbacher’s
    Attack Strikes Again: Breaking PKCS#1 v1.5 in XML Encryption.” In <i>Computer
    Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security,
    Pisa, Italy, September 10-12, 2012. Proceedings</i>, 752--769, 2012. <a href="https://doi.org/10.1007/978-3-642-33167-1_43">https://doi.org/10.1007/978-3-642-33167-1_43</a>.'
  ieee: 'T. Jager, S. Schinzel, and J. Somorovsky, “Bleichenbacher’s Attack Strikes
    again: Breaking PKCS#1 v1.5 in XML Encryption,” in <i>Computer Security - ESORICS
    2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy,
    September 10-12, 2012. Proceedings</i>, 2012, pp. 752--769.'
  mla: 'Jager, Tibor, et al. “Bleichenbacher’s Attack Strikes Again: Breaking PKCS#1
    v1.5 in XML Encryption.” <i>Computer Security - ESORICS 2012 - 17th European Symposium
    on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings</i>,
    2012, pp. 752--769, doi:<a href="https://doi.org/10.1007/978-3-642-33167-1_43">10.1007/978-3-642-33167-1_43</a>.'
  short: 'T. Jager, S. Schinzel, J. Somorovsky, in: Computer Security - ESORICS 2012
    - 17th European Symposium on Research in Computer Security, Pisa, Italy, September
    10-12, 2012. Proceedings, 2012, pp. 752--769.'
date_created: 2018-06-07T09:26:54Z
date_updated: 2022-01-06T06:58:58Z
department:
- _id: '558'
doi: 10.1007/978-3-642-33167-1_43
extern: '1'
page: 752--769
publication: Computer Security - ESORICS 2012 - 17th European Symposium on Research
  in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings
status: public
title: 'Bleichenbacher''s Attack Strikes again: Breaking PKCS#1 v1.5 in XML Encryption'
type: conference
user_id: '38235'
year: '2012'
...
---
_id: '3136'
author:
- first_name: Dennis
  full_name: Hofheinz, Dennis
  last_name: Hofheinz
- first_name: Tibor
  full_name: Jager, Tibor
  id: '64669'
  last_name: Jager
- first_name: Edward
  full_name: Knapp, Edward
  last_name: Knapp
citation:
  ama: 'Hofheinz D, Jager T, Knapp E. Waters Signatures with Optimal Security Reduction.
    In: <i>Public Key Cryptography - PKC 2012 - 15th International Conference on Practice
    and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings</i>.
    ; 2012:66--83. doi:<a href="https://doi.org/10.1007/978-3-642-30057-8_5">10.1007/978-3-642-30057-8_5</a>'
  apa: Hofheinz, D., Jager, T., &#38; Knapp, E. (2012). Waters Signatures with Optimal
    Security Reduction. In <i>Public Key Cryptography - PKC 2012 - 15th International
    Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany,
    May 21-23, 2012. Proceedings</i> (pp. 66--83). <a href="https://doi.org/10.1007/978-3-642-30057-8_5">https://doi.org/10.1007/978-3-642-30057-8_5</a>
  bibtex: '@inproceedings{Hofheinz_Jager_Knapp_2012, title={Waters Signatures with
    Optimal Security Reduction}, DOI={<a href="https://doi.org/10.1007/978-3-642-30057-8_5">10.1007/978-3-642-30057-8_5</a>},
    booktitle={Public Key Cryptography - PKC 2012 - 15th International Conference
    on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23,
    2012. Proceedings}, author={Hofheinz, Dennis and Jager, Tibor and Knapp, Edward},
    year={2012}, pages={66--83} }'
  chicago: Hofheinz, Dennis, Tibor Jager, and Edward Knapp. “Waters Signatures with
    Optimal Security Reduction.” In <i>Public Key Cryptography - PKC 2012 - 15th International
    Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany,
    May 21-23, 2012. Proceedings</i>, 66--83, 2012. <a href="https://doi.org/10.1007/978-3-642-30057-8_5">https://doi.org/10.1007/978-3-642-30057-8_5</a>.
  ieee: D. Hofheinz, T. Jager, and E. Knapp, “Waters Signatures with Optimal Security
    Reduction,” in <i>Public Key Cryptography - PKC 2012 - 15th International Conference
    on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23,
    2012. Proceedings</i>, 2012, pp. 66--83.
  mla: Hofheinz, Dennis, et al. “Waters Signatures with Optimal Security Reduction.”
    <i>Public Key Cryptography - PKC 2012 - 15th International Conference on Practice
    and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings</i>,
    2012, pp. 66--83, doi:<a href="https://doi.org/10.1007/978-3-642-30057-8_5">10.1007/978-3-642-30057-8_5</a>.
  short: 'D. Hofheinz, T. Jager, E. Knapp, in: Public Key Cryptography - PKC 2012
    - 15th International Conference on Practice and Theory in Public Key Cryptography,
    Darmstadt, Germany, May 21-23, 2012. Proceedings, 2012, pp. 66--83.'
date_created: 2018-06-07T09:27:25Z
date_updated: 2022-01-06T06:58:58Z
department:
- _id: '558'
doi: 10.1007/978-3-642-30057-8_5
extern: '1'
page: 66--83
publication: Public Key Cryptography - PKC 2012 - 15th International Conference on
  Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012.
  Proceedings
status: public
title: Waters Signatures with Optimal Security Reduction
type: conference
user_id: '38235'
year: '2012'
...
---
_id: '3137'
author:
- first_name: Dennis
  full_name: Hofheinz, Dennis
  last_name: Hofheinz
- first_name: Tibor
  full_name: Jager, Tibor
  id: '64669'
  last_name: Jager
- first_name: Eike
  full_name: Kiltz, Eike
  last_name: Kiltz
citation:
  ama: 'Hofheinz D, Jager T, Kiltz E. Short Signatures from Weaker Assumptions. In:
    <i>Advances in Cryptology - ASIACRYPT 2011 - 17th International Conference on
    the Theory and Application of Cryptology and Information Security, Seoul, South
    Korea, December 4-8, 2011. Proceedings</i>. ; 2011:647--666. doi:<a href="https://doi.org/10.1007/978-3-642-25385-0_35">10.1007/978-3-642-25385-0_35</a>'
  apa: Hofheinz, D., Jager, T., &#38; Kiltz, E. (2011). Short Signatures from Weaker
    Assumptions. In <i>Advances in Cryptology - ASIACRYPT 2011 - 17th International
    Conference on the Theory and Application of Cryptology and Information Security,
    Seoul, South Korea, December 4-8, 2011. Proceedings</i> (pp. 647--666). <a href="https://doi.org/10.1007/978-3-642-25385-0_35">https://doi.org/10.1007/978-3-642-25385-0_35</a>
  bibtex: '@inproceedings{Hofheinz_Jager_Kiltz_2011, title={Short Signatures from
    Weaker Assumptions}, DOI={<a href="https://doi.org/10.1007/978-3-642-25385-0_35">10.1007/978-3-642-25385-0_35</a>},
    booktitle={Advances in Cryptology - ASIACRYPT 2011 - 17th International Conference
    on the Theory and Application of Cryptology and Information Security, Seoul, South
    Korea, December 4-8, 2011. Proceedings}, author={Hofheinz, Dennis and Jager, Tibor
    and Kiltz, Eike}, year={2011}, pages={647--666} }'
  chicago: Hofheinz, Dennis, Tibor Jager, and Eike Kiltz. “Short Signatures from Weaker
    Assumptions.” In <i>Advances in Cryptology - ASIACRYPT 2011 - 17th International
    Conference on the Theory and Application of Cryptology and Information Security,
    Seoul, South Korea, December 4-8, 2011. Proceedings</i>, 647--666, 2011. <a href="https://doi.org/10.1007/978-3-642-25385-0_35">https://doi.org/10.1007/978-3-642-25385-0_35</a>.
  ieee: D. Hofheinz, T. Jager, and E. Kiltz, “Short Signatures from Weaker Assumptions,”
    in <i>Advances in Cryptology - ASIACRYPT 2011 - 17th International Conference
    on the Theory and Application of Cryptology and Information Security, Seoul, South
    Korea, December 4-8, 2011. Proceedings</i>, 2011, pp. 647--666.
  mla: Hofheinz, Dennis, et al. “Short Signatures from Weaker Assumptions.” <i>Advances
    in Cryptology - ASIACRYPT 2011 - 17th International Conference on the Theory and
    Application of Cryptology and Information Security, Seoul, South Korea, December
    4-8, 2011. Proceedings</i>, 2011, pp. 647--666, doi:<a href="https://doi.org/10.1007/978-3-642-25385-0_35">10.1007/978-3-642-25385-0_35</a>.
  short: 'D. Hofheinz, T. Jager, E. Kiltz, in: Advances in Cryptology - ASIACRYPT
    2011 - 17th International Conference on the Theory and Application of Cryptology
    and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings,
    2011, pp. 647--666.'
date_created: 2018-06-07T09:27:58Z
date_updated: 2022-01-06T06:58:58Z
department:
- _id: '558'
doi: 10.1007/978-3-642-25385-0_35
extern: '1'
page: 647--666
publication: Advances in Cryptology - ASIACRYPT 2011 - 17th International Conference
  on the Theory and Application of Cryptology and Information Security, Seoul, South
  Korea, December 4-8, 2011. Proceedings
status: public
title: Short Signatures from Weaker Assumptions
type: conference
user_id: '38235'
year: '2011'
...
---
_id: '3138'
author:
- first_name: Tibor
  full_name: Jager, Tibor
  id: '64669'
  last_name: Jager
- first_name: Juraj
  full_name: Somorovsky, Juraj
  last_name: Somorovsky
citation:
  ama: 'Jager T, Somorovsky J. How to break XML encryption. In: <i>Proceedings of
    the 18th ACM Conference on Computer and Communications Security, CCS 2011, Chicago,
    Illinois, USA, October 17-21, 2011</i>. ; 2011:413--422. doi:<a href="https://doi.org/10.1145/2046707.2046756">10.1145/2046707.2046756</a>'
  apa: Jager, T., &#38; Somorovsky, J. (2011). How to break XML encryption. In <i>Proceedings
    of the 18th ACM Conference on Computer and Communications Security, CCS 2011,
    Chicago, Illinois, USA, October 17-21, 2011</i> (pp. 413--422). <a href="https://doi.org/10.1145/2046707.2046756">https://doi.org/10.1145/2046707.2046756</a>
  bibtex: '@inproceedings{Jager_Somorovsky_2011, title={How to break XML encryption},
    DOI={<a href="https://doi.org/10.1145/2046707.2046756">10.1145/2046707.2046756</a>},
    booktitle={Proceedings of the 18th ACM Conference on Computer and Communications
    Security, CCS 2011, Chicago, Illinois, USA, October 17-21, 2011}, author={Jager,
    Tibor and Somorovsky, Juraj}, year={2011}, pages={413--422} }'
  chicago: Jager, Tibor, and Juraj Somorovsky. “How to Break XML Encryption.” In <i>Proceedings
    of the 18th ACM Conference on Computer and Communications Security, CCS 2011,
    Chicago, Illinois, USA, October 17-21, 2011</i>, 413--422, 2011. <a href="https://doi.org/10.1145/2046707.2046756">https://doi.org/10.1145/2046707.2046756</a>.
  ieee: T. Jager and J. Somorovsky, “How to break XML encryption,” in <i>Proceedings
    of the 18th ACM Conference on Computer and Communications Security, CCS 2011,
    Chicago, Illinois, USA, October 17-21, 2011</i>, 2011, pp. 413--422.
  mla: Jager, Tibor, and Juraj Somorovsky. “How to Break XML Encryption.” <i>Proceedings
    of the 18th ACM Conference on Computer and Communications Security, CCS 2011,
    Chicago, Illinois, USA, October 17-21, 2011</i>, 2011, pp. 413--422, doi:<a href="https://doi.org/10.1145/2046707.2046756">10.1145/2046707.2046756</a>.
  short: 'T. Jager, J. Somorovsky, in: Proceedings of the 18th ACM Conference on Computer
    and Communications Security, CCS 2011, Chicago, Illinois, USA, October 17-21,
    2011, 2011, pp. 413--422.'
date_created: 2018-06-07T09:28:23Z
date_updated: 2022-01-06T06:58:58Z
department:
- _id: '558'
doi: 10.1145/2046707.2046756
extern: '1'
page: 413--422
publication: Proceedings of the 18th ACM Conference on Computer and Communications
  Security, CCS 2011, Chicago, Illinois, USA, October 17-21, 2011
status: public
title: How to break XML encryption
type: conference
user_id: '38235'
year: '2011'
...
