---
_id: '3139'
author:
- first_name: Tibor
  full_name: Jager, Tibor
  id: '64669'
  last_name: Jager
- first_name: Florian
  full_name: Kohlar, Florian
  last_name: Kohlar
- first_name: Sven
  full_name: Schäge, Sven
  last_name: Schäge
- first_name: Jörg
  full_name: Schwenk, Jörg
  last_name: Schwenk
citation:
  ama: 'Jager T, Kohlar F, Schäge S, Schwenk J. Generic Compilers for Authenticated
    Key Exchange. In: <i>Advances in Cryptology - ASIACRYPT 2010 - 16th International
    Conference on the Theory and Application of Cryptology and Information Security,
    Singapore, December 5-9, 2010. Proceedings</i>. ; 2010:232--249. doi:<a href="https://doi.org/10.1007/978-3-642-17373-8_14">10.1007/978-3-642-17373-8_14</a>'
  apa: Jager, T., Kohlar, F., Schäge, S., &#38; Schwenk, J. (2010). Generic Compilers
    for Authenticated Key Exchange. In <i>Advances in Cryptology - ASIACRYPT 2010
    - 16th International Conference on the Theory and Application of Cryptology and
    Information Security, Singapore, December 5-9, 2010. Proceedings</i> (pp. 232--249).
    <a href="https://doi.org/10.1007/978-3-642-17373-8_14">https://doi.org/10.1007/978-3-642-17373-8_14</a>
  bibtex: '@inproceedings{Jager_Kohlar_Schäge_Schwenk_2010, title={Generic Compilers
    for Authenticated Key Exchange}, DOI={<a href="https://doi.org/10.1007/978-3-642-17373-8_14">10.1007/978-3-642-17373-8_14</a>},
    booktitle={Advances in Cryptology - ASIACRYPT 2010 - 16th International Conference
    on the Theory and Application of Cryptology and Information Security, Singapore,
    December 5-9, 2010. Proceedings}, author={Jager, Tibor and Kohlar, Florian and
    Schäge, Sven and Schwenk, Jörg}, year={2010}, pages={232--249} }'
  chicago: Jager, Tibor, Florian Kohlar, Sven Schäge, and Jörg Schwenk. “Generic Compilers
    for Authenticated Key Exchange.” In <i>Advances in Cryptology - ASIACRYPT 2010
    - 16th International Conference on the Theory and Application of Cryptology and
    Information Security, Singapore, December 5-9, 2010. Proceedings</i>, 232--249,
    2010. <a href="https://doi.org/10.1007/978-3-642-17373-8_14">https://doi.org/10.1007/978-3-642-17373-8_14</a>.
  ieee: T. Jager, F. Kohlar, S. Schäge, and J. Schwenk, “Generic Compilers for Authenticated
    Key Exchange,” in <i>Advances in Cryptology - ASIACRYPT 2010 - 16th International
    Conference on the Theory and Application of Cryptology and Information Security,
    Singapore, December 5-9, 2010. Proceedings</i>, 2010, pp. 232--249.
  mla: Jager, Tibor, et al. “Generic Compilers for Authenticated Key Exchange.” <i>Advances
    in Cryptology - ASIACRYPT 2010 - 16th International Conference on the Theory and
    Application of Cryptology and Information Security, Singapore, December 5-9, 2010.
    Proceedings</i>, 2010, pp. 232--249, doi:<a href="https://doi.org/10.1007/978-3-642-17373-8_14">10.1007/978-3-642-17373-8_14</a>.
  short: 'T. Jager, F. Kohlar, S. Schäge, J. Schwenk, in: Advances in Cryptology -
    ASIACRYPT 2010 - 16th International Conference on the Theory and Application of
    Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings,
    2010, pp. 232--249.'
date_created: 2018-06-07T09:28:51Z
date_updated: 2022-01-06T06:58:58Z
department:
- _id: '558'
doi: 10.1007/978-3-642-17373-8_14
extern: '1'
page: 232--249
publication: Advances in Cryptology - ASIACRYPT 2010 - 16th International Conference
  on the Theory and Application of Cryptology and Information Security, Singapore,
  December 5-9, 2010. Proceedings
status: public
title: Generic Compilers for Authenticated Key Exchange
type: conference
user_id: '38235'
year: '2010'
...
---
_id: '3140'
author:
- first_name: Tibor
  full_name: Jager, Tibor
  id: '64669'
  last_name: Jager
- first_name: Andy
  full_name: Rupp, Andy
  last_name: Rupp
citation:
  ama: 'Jager T, Rupp A. The Semi-Generic Group Model and Applications to Pairing-Based
    Cryptography. In: <i>Advances in Cryptology - ASIACRYPT 2010 - 16th International
    Conference on the Theory and Application of Cryptology and Information Security,
    Singapore, December 5-9, 2010. Proceedings</i>. ; 2010:539--556. doi:<a href="https://doi.org/10.1007/978-3-642-17373-8_31">10.1007/978-3-642-17373-8_31</a>'
  apa: Jager, T., &#38; Rupp, A. (2010). The Semi-Generic Group Model and Applications
    to Pairing-Based Cryptography. In <i>Advances in Cryptology - ASIACRYPT 2010 -
    16th International Conference on the Theory and Application of Cryptology and
    Information Security, Singapore, December 5-9, 2010. Proceedings</i> (pp. 539--556).
    <a href="https://doi.org/10.1007/978-3-642-17373-8_31">https://doi.org/10.1007/978-3-642-17373-8_31</a>
  bibtex: '@inproceedings{Jager_Rupp_2010, title={The Semi-Generic Group Model and
    Applications to Pairing-Based Cryptography}, DOI={<a href="https://doi.org/10.1007/978-3-642-17373-8_31">10.1007/978-3-642-17373-8_31</a>},
    booktitle={Advances in Cryptology - ASIACRYPT 2010 - 16th International Conference
    on the Theory and Application of Cryptology and Information Security, Singapore,
    December 5-9, 2010. Proceedings}, author={Jager, Tibor and Rupp, Andy}, year={2010},
    pages={539--556} }'
  chicago: Jager, Tibor, and Andy Rupp. “The Semi-Generic Group Model and Applications
    to Pairing-Based Cryptography.” In <i>Advances in Cryptology - ASIACRYPT 2010
    - 16th International Conference on the Theory and Application of Cryptology and
    Information Security, Singapore, December 5-9, 2010. Proceedings</i>, 539--556,
    2010. <a href="https://doi.org/10.1007/978-3-642-17373-8_31">https://doi.org/10.1007/978-3-642-17373-8_31</a>.
  ieee: T. Jager and A. Rupp, “The Semi-Generic Group Model and Applications to Pairing-Based
    Cryptography,” in <i>Advances in Cryptology - ASIACRYPT 2010 - 16th International
    Conference on the Theory and Application of Cryptology and Information Security,
    Singapore, December 5-9, 2010. Proceedings</i>, 2010, pp. 539--556.
  mla: Jager, Tibor, and Andy Rupp. “The Semi-Generic Group Model and Applications
    to Pairing-Based Cryptography.” <i>Advances in Cryptology - ASIACRYPT 2010 - 16th
    International Conference on the Theory and Application of Cryptology and Information
    Security, Singapore, December 5-9, 2010. Proceedings</i>, 2010, pp. 539--556,
    doi:<a href="https://doi.org/10.1007/978-3-642-17373-8_31">10.1007/978-3-642-17373-8_31</a>.
  short: 'T. Jager, A. Rupp, in: Advances in Cryptology - ASIACRYPT 2010 - 16th International
    Conference on the Theory and Application of Cryptology and Information Security,
    Singapore, December 5-9, 2010. Proceedings, 2010, pp. 539--556.'
date_created: 2018-06-07T09:29:23Z
date_updated: 2022-01-06T06:58:58Z
department:
- _id: '558'
doi: 10.1007/978-3-642-17373-8_31
extern: '1'
page: 539--556
publication: Advances in Cryptology - ASIACRYPT 2010 - 16th International Conference
  on the Theory and Application of Cryptology and Information Security, Singapore,
  December 5-9, 2010. Proceedings
status: public
title: The Semi-Generic Group Model and Applications to Pairing-Based Cryptography
type: conference
user_id: '38235'
year: '2010'
...
---
_id: '3141'
author:
- first_name: Kristiyan
  full_name: Haralambiev, Kristiyan
  last_name: Haralambiev
- first_name: Tibor
  full_name: Jager, Tibor
  id: '64669'
  last_name: Jager
- first_name: Eike
  full_name: Kiltz, Eike
  last_name: Kiltz
- first_name: Victor
  full_name: Shoup, Victor
  last_name: Shoup
citation:
  ama: 'Haralambiev K, Jager T, Kiltz E, Shoup V. Simple and Efficient Public-Key
    Encryption from Computational Diffie-Hellman in the Standard Model. In: <i>Public
    Key Cryptography - PKC 2010, 13th International Conference on Practice and Theory
    in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings</i>. ;
    2010:1--18. doi:<a href="https://doi.org/10.1007/978-3-642-13013-7_1">10.1007/978-3-642-13013-7_1</a>'
  apa: Haralambiev, K., Jager, T., Kiltz, E., &#38; Shoup, V. (2010). Simple and Efficient
    Public-Key Encryption from Computational Diffie-Hellman in the Standard Model.
    In <i>Public Key Cryptography - PKC 2010, 13th International Conference on Practice
    and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings</i>
    (pp. 1--18). <a href="https://doi.org/10.1007/978-3-642-13013-7_1">https://doi.org/10.1007/978-3-642-13013-7_1</a>
  bibtex: '@inproceedings{Haralambiev_Jager_Kiltz_Shoup_2010, title={Simple and Efficient
    Public-Key Encryption from Computational Diffie-Hellman in the Standard Model},
    DOI={<a href="https://doi.org/10.1007/978-3-642-13013-7_1">10.1007/978-3-642-13013-7_1</a>},
    booktitle={Public Key Cryptography - PKC 2010, 13th International Conference on
    Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010.
    Proceedings}, author={Haralambiev, Kristiyan and Jager, Tibor and Kiltz, Eike
    and Shoup, Victor}, year={2010}, pages={1--18} }'
  chicago: Haralambiev, Kristiyan, Tibor Jager, Eike Kiltz, and Victor Shoup. “Simple
    and Efficient Public-Key Encryption from Computational Diffie-Hellman in the Standard
    Model.” In <i>Public Key Cryptography - PKC 2010, 13th International Conference
    on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010.
    Proceedings</i>, 1--18, 2010. <a href="https://doi.org/10.1007/978-3-642-13013-7_1">https://doi.org/10.1007/978-3-642-13013-7_1</a>.
  ieee: K. Haralambiev, T. Jager, E. Kiltz, and V. Shoup, “Simple and Efficient Public-Key
    Encryption from Computational Diffie-Hellman in the Standard Model,” in <i>Public
    Key Cryptography - PKC 2010, 13th International Conference on Practice and Theory
    in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings</i>, 2010,
    pp. 1--18.
  mla: Haralambiev, Kristiyan, et al. “Simple and Efficient Public-Key Encryption
    from Computational Diffie-Hellman in the Standard Model.” <i>Public Key Cryptography
    - PKC 2010, 13th International Conference on Practice and Theory in Public Key
    Cryptography, Paris, France, May 26-28, 2010. Proceedings</i>, 2010, pp. 1--18,
    doi:<a href="https://doi.org/10.1007/978-3-642-13013-7_1">10.1007/978-3-642-13013-7_1</a>.
  short: 'K. Haralambiev, T. Jager, E. Kiltz, V. Shoup, in: Public Key Cryptography
    - PKC 2010, 13th International Conference on Practice and Theory in Public Key
    Cryptography, Paris, France, May 26-28, 2010. Proceedings, 2010, pp. 1--18.'
date_created: 2018-06-07T09:29:52Z
date_updated: 2022-01-06T06:58:58Z
department:
- _id: '558'
doi: 10.1007/978-3-642-13013-7_1
extern: '1'
page: 1--18
publication: Public Key Cryptography - PKC 2010, 13th International Conference on
  Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010.
  Proceedings
status: public
title: Simple and Efficient Public-Key Encryption from Computational Diffie-Hellman
  in the Standard Model
type: conference
user_id: '38235'
year: '2010'
...
---
_id: '3142'
author:
- first_name: Tibor
  full_name: Jager, Tibor
  id: '64669'
  last_name: Jager
- first_name: Jörg
  full_name: Schwenk, Jörg
  last_name: Schwenk
citation:
  ama: 'Jager T, Schwenk J. On the Analysis of Cryptographic Assumptions in the Generic
    Ring Model. In: <i>Advances in Cryptology - ASIACRYPT 2009, 15th International
    Conference on the Theory and Application of Cryptology and Information Security,
    Tokyo, Japan, December 6-10, 2009. Proceedings</i>. ; 2009:399--416. doi:<a href="https://doi.org/10.1007/978-3-642-10366-7_24">10.1007/978-3-642-10366-7_24</a>'
  apa: Jager, T., &#38; Schwenk, J. (2009). On the Analysis of Cryptographic Assumptions
    in the Generic Ring Model. In <i>Advances in Cryptology - ASIACRYPT 2009, 15th
    International Conference on the Theory and Application of Cryptology and Information
    Security, Tokyo, Japan, December 6-10, 2009. Proceedings</i> (pp. 399--416). <a
    href="https://doi.org/10.1007/978-3-642-10366-7_24">https://doi.org/10.1007/978-3-642-10366-7_24</a>
  bibtex: '@inproceedings{Jager_Schwenk_2009, title={On the Analysis of Cryptographic
    Assumptions in the Generic Ring Model}, DOI={<a href="https://doi.org/10.1007/978-3-642-10366-7_24">10.1007/978-3-642-10366-7_24</a>},
    booktitle={Advances in Cryptology - ASIACRYPT 2009, 15th International Conference
    on the Theory and Application of Cryptology and Information Security, Tokyo, Japan,
    December 6-10, 2009. Proceedings}, author={Jager, Tibor and Schwenk, Jörg}, year={2009},
    pages={399--416} }'
  chicago: Jager, Tibor, and Jörg Schwenk. “On the Analysis of Cryptographic Assumptions
    in the Generic Ring Model.” In <i>Advances in Cryptology - ASIACRYPT 2009, 15th
    International Conference on the Theory and Application of Cryptology and Information
    Security, Tokyo, Japan, December 6-10, 2009. Proceedings</i>, 399--416, 2009.
    <a href="https://doi.org/10.1007/978-3-642-10366-7_24">https://doi.org/10.1007/978-3-642-10366-7_24</a>.
  ieee: T. Jager and J. Schwenk, “On the Analysis of Cryptographic Assumptions in
    the Generic Ring Model,” in <i>Advances in Cryptology - ASIACRYPT 2009, 15th International
    Conference on the Theory and Application of Cryptology and Information Security,
    Tokyo, Japan, December 6-10, 2009. Proceedings</i>, 2009, pp. 399--416.
  mla: Jager, Tibor, and Jörg Schwenk. “On the Analysis of Cryptographic Assumptions
    in the Generic Ring Model.” <i>Advances in Cryptology - ASIACRYPT 2009, 15th International
    Conference on the Theory and Application of Cryptology and Information Security,
    Tokyo, Japan, December 6-10, 2009. Proceedings</i>, 2009, pp. 399--416, doi:<a
    href="https://doi.org/10.1007/978-3-642-10366-7_24">10.1007/978-3-642-10366-7_24</a>.
  short: 'T. Jager, J. Schwenk, in: Advances in Cryptology - ASIACRYPT 2009, 15th
    International Conference on the Theory and Application of Cryptology and Information
    Security, Tokyo, Japan, December 6-10, 2009. Proceedings, 2009, pp. 399--416.'
date_created: 2018-06-07T09:30:18Z
date_updated: 2022-01-06T06:58:58Z
department:
- _id: '558'
doi: 10.1007/978-3-642-10366-7_24
extern: '1'
page: 399--416
publication: Advances in Cryptology - ASIACRYPT 2009, 15th International Conference
  on the Theory and Application of Cryptology and Information Security, Tokyo, Japan,
  December 6-10, 2009. Proceedings
status: public
title: On the Analysis of Cryptographic Assumptions in the Generic Ring Model
type: conference
user_id: '38235'
year: '2009'
...
---
_id: '3143'
author:
- first_name: Sebastian
  full_name: Gajek, Sebastian
  last_name: Gajek
- first_name: Tibor
  full_name: Jager, Tibor
  id: '64669'
  last_name: Jager
- first_name: Mark
  full_name: Manulis, Mark
  last_name: Manulis
- first_name: Jörg
  full_name: Schwenk, Jörg
  last_name: Schwenk
citation:
  ama: 'Gajek S, Jager T, Manulis M, Schwenk J. A Browser-Based Kerberos Authentication
    Scheme. In: <i>Computer Security - ESORICS 2008, 13th European Symposium on Research
    in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings</i>. ; 2008:115--129.
    doi:<a href="https://doi.org/10.1007/978-3-540-88313-5_8">10.1007/978-3-540-88313-5_8</a>'
  apa: Gajek, S., Jager, T., Manulis, M., &#38; Schwenk, J. (2008). A Browser-Based
    Kerberos Authentication Scheme. In <i>Computer Security - ESORICS 2008, 13th European
    Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008.
    Proceedings</i> (pp. 115--129). <a href="https://doi.org/10.1007/978-3-540-88313-5_8">https://doi.org/10.1007/978-3-540-88313-5_8</a>
  bibtex: '@inproceedings{Gajek_Jager_Manulis_Schwenk_2008, title={A Browser-Based
    Kerberos Authentication Scheme}, DOI={<a href="https://doi.org/10.1007/978-3-540-88313-5_8">10.1007/978-3-540-88313-5_8</a>},
    booktitle={Computer Security - ESORICS 2008, 13th European Symposium on Research
    in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings}, author={Gajek,
    Sebastian and Jager, Tibor and Manulis, Mark and Schwenk, Jörg}, year={2008},
    pages={115--129} }'
  chicago: Gajek, Sebastian, Tibor Jager, Mark Manulis, and Jörg Schwenk. “A Browser-Based
    Kerberos Authentication Scheme.” In <i>Computer Security - ESORICS 2008, 13th
    European Symposium on Research in Computer Security, Málaga, Spain, October 6-8,
    2008. Proceedings</i>, 115--129, 2008. <a href="https://doi.org/10.1007/978-3-540-88313-5_8">https://doi.org/10.1007/978-3-540-88313-5_8</a>.
  ieee: S. Gajek, T. Jager, M. Manulis, and J. Schwenk, “A Browser-Based Kerberos
    Authentication Scheme,” in <i>Computer Security - ESORICS 2008, 13th European
    Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008.
    Proceedings</i>, 2008, pp. 115--129.
  mla: Gajek, Sebastian, et al. “A Browser-Based Kerberos Authentication Scheme.”
    <i>Computer Security - ESORICS 2008, 13th European Symposium on Research in Computer
    Security, Málaga, Spain, October 6-8, 2008. Proceedings</i>, 2008, pp. 115--129,
    doi:<a href="https://doi.org/10.1007/978-3-540-88313-5_8">10.1007/978-3-540-88313-5_8</a>.
  short: 'S. Gajek, T. Jager, M. Manulis, J. Schwenk, in: Computer Security - ESORICS
    2008, 13th European Symposium on Research in Computer Security, Málaga, Spain,
    October 6-8, 2008. Proceedings, 2008, pp. 115--129.'
date_created: 2018-06-07T09:30:48Z
date_updated: 2022-01-06T06:58:58Z
department:
- _id: '558'
doi: 10.1007/978-3-540-88313-5_8
extern: '1'
page: 115--129
publication: Computer Security - ESORICS 2008, 13th European Symposium on Research
  in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings
status: public
title: A Browser-Based Kerberos Authentication Scheme
type: conference
user_id: '38235'
year: '2008'
...
---
_id: '3144'
author:
- first_name: Kristina
  full_name: Altmann, Kristina
  last_name: Altmann
- first_name: Tibor
  full_name: Jager, Tibor
  id: '64669'
  last_name: Jager
- first_name: Andy
  full_name: Rupp, Andy
  last_name: Rupp
citation:
  ama: 'Altmann K, Jager T, Rupp A. On Black-Box Ring Extraction and Integer Factorization.
    In: <i>Automata, Languages and Programming, 35th International Colloquium, ICALP
    2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part II - Track B: Logic,
    Semantics, and Theory of Programming &#38; Track C: Security and Cryptography
    Foundations</i>. ; 2008:437--448. doi:<a href="https://doi.org/10.1007/978-3-540-70583-3_36">10.1007/978-3-540-70583-3_36</a>'
  apa: 'Altmann, K., Jager, T., &#38; Rupp, A. (2008). On Black-Box Ring Extraction
    and Integer Factorization. In <i>Automata, Languages and Programming, 35th International
    Colloquium, ICALP 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part
    II - Track B: Logic, Semantics, and Theory of Programming &#38; Track C: Security
    and Cryptography Foundations</i> (pp. 437--448). <a href="https://doi.org/10.1007/978-3-540-70583-3_36">https://doi.org/10.1007/978-3-540-70583-3_36</a>'
  bibtex: '@inproceedings{Altmann_Jager_Rupp_2008, title={On Black-Box Ring Extraction
    and Integer Factorization}, DOI={<a href="https://doi.org/10.1007/978-3-540-70583-3_36">10.1007/978-3-540-70583-3_36</a>},
    booktitle={Automata, Languages and Programming, 35th International Colloquium,
    ICALP 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part II - Track
    B: Logic, Semantics, and Theory of Programming &#38; Track C: Security and Cryptography
    Foundations}, author={Altmann, Kristina and Jager, Tibor and Rupp, Andy}, year={2008},
    pages={437--448} }'
  chicago: 'Altmann, Kristina, Tibor Jager, and Andy Rupp. “On Black-Box Ring Extraction
    and Integer Factorization.” In <i>Automata, Languages and Programming, 35th International
    Colloquium, ICALP 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part
    II - Track B: Logic, Semantics, and Theory of Programming &#38; Track C: Security
    and Cryptography Foundations</i>, 437--448, 2008. <a href="https://doi.org/10.1007/978-3-540-70583-3_36">https://doi.org/10.1007/978-3-540-70583-3_36</a>.'
  ieee: 'K. Altmann, T. Jager, and A. Rupp, “On Black-Box Ring Extraction and Integer
    Factorization,” in <i>Automata, Languages and Programming, 35th International
    Colloquium, ICALP 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part
    II - Track B: Logic, Semantics, and Theory of Programming &#38; Track C: Security
    and Cryptography Foundations</i>, 2008, pp. 437--448.'
  mla: 'Altmann, Kristina, et al. “On Black-Box Ring Extraction and Integer Factorization.”
    <i>Automata, Languages and Programming, 35th International Colloquium, ICALP 2008,
    Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part II - Track B: Logic, Semantics,
    and Theory of Programming &#38; Track C: Security and Cryptography Foundations</i>,
    2008, pp. 437--448, doi:<a href="https://doi.org/10.1007/978-3-540-70583-3_36">10.1007/978-3-540-70583-3_36</a>.'
  short: 'K. Altmann, T. Jager, A. Rupp, in: Automata, Languages and Programming,
    35th International Colloquium, ICALP 2008, Reykjavik, Iceland, July 7-11, 2008,
    Proceedings, Part II - Track B: Logic, Semantics, and Theory of Programming &#38;
    Track C: Security and Cryptography Foundations, 2008, pp. 437--448.'
date_created: 2018-06-07T09:32:07Z
date_updated: 2022-01-06T06:58:58Z
department:
- _id: '558'
doi: 10.1007/978-3-540-70583-3_36
extern: '1'
page: 437--448
publication: 'Automata, Languages and Programming, 35th International Colloquium,
  ICALP 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part II - Track B:
  Logic, Semantics, and Theory of Programming & Track C: Security and Cryptography
  Foundations'
status: public
title: On Black-Box Ring Extraction and Integer Factorization
type: conference
user_id: '38235'
year: '2008'
...
---
_id: '3145'
author:
- first_name: Tibor
  full_name: Jager, Tibor
  id: '64669'
  last_name: Jager
- first_name: Jörg
  full_name: Schwenk, Jörg
  last_name: Schwenk
citation:
  ama: 'Jager T, Schwenk J. On the Equivalence of Generic Group Models. In: <i>Provable
    Security, Second International Conference, ProvSec 2008, Shanghai, China, October
    30 - November 1, 2008. Proceedings</i>. ; 2008:200--209. doi:<a href="https://doi.org/10.1007/978-3-540-88733-1_14">10.1007/978-3-540-88733-1_14</a>'
  apa: Jager, T., &#38; Schwenk, J. (2008). On the Equivalence of Generic Group Models.
    In <i>Provable Security, Second International Conference, ProvSec 2008, Shanghai,
    China, October 30 - November 1, 2008. Proceedings</i> (pp. 200--209). <a href="https://doi.org/10.1007/978-3-540-88733-1_14">https://doi.org/10.1007/978-3-540-88733-1_14</a>
  bibtex: '@inproceedings{Jager_Schwenk_2008, title={On the Equivalence of Generic
    Group Models}, DOI={<a href="https://doi.org/10.1007/978-3-540-88733-1_14">10.1007/978-3-540-88733-1_14</a>},
    booktitle={Provable Security, Second International Conference, ProvSec 2008, Shanghai,
    China, October 30 - November 1, 2008. Proceedings}, author={Jager, Tibor and Schwenk,
    Jörg}, year={2008}, pages={200--209} }'
  chicago: Jager, Tibor, and Jörg Schwenk. “On the Equivalence of Generic Group Models.”
    In <i>Provable Security, Second International Conference, ProvSec 2008, Shanghai,
    China, October 30 - November 1, 2008. Proceedings</i>, 200--209, 2008. <a href="https://doi.org/10.1007/978-3-540-88733-1_14">https://doi.org/10.1007/978-3-540-88733-1_14</a>.
  ieee: T. Jager and J. Schwenk, “On the Equivalence of Generic Group Models,” in
    <i>Provable Security, Second International Conference, ProvSec 2008, Shanghai,
    China, October 30 - November 1, 2008. Proceedings</i>, 2008, pp. 200--209.
  mla: Jager, Tibor, and Jörg Schwenk. “On the Equivalence of Generic Group Models.”
    <i>Provable Security, Second International Conference, ProvSec 2008, Shanghai,
    China, October 30 - November 1, 2008. Proceedings</i>, 2008, pp. 200--209, doi:<a
    href="https://doi.org/10.1007/978-3-540-88733-1_14">10.1007/978-3-540-88733-1_14</a>.
  short: 'T. Jager, J. Schwenk, in: Provable Security, Second International Conference,
    ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings, 2008,
    pp. 200--209.'
date_created: 2018-06-07T09:32:53Z
date_updated: 2022-01-06T06:58:58Z
department:
- _id: '558'
doi: 10.1007/978-3-540-88733-1_14
extern: '1'
page: 200--209
publication: Provable Security, Second International Conference, ProvSec 2008, Shanghai,
  China, October 30 - November 1, 2008. Proceedings
status: public
title: On the Equivalence of Generic Group Models
type: conference
user_id: '38235'
year: '2008'
...
---
_id: '3146'
author:
- first_name: Tibor
  full_name: Jager, Tibor
  id: '64669'
  last_name: Jager
- first_name: Heiko
  full_name: Jäkel, Heiko
  last_name: Jäkel
- first_name: Jörg
  full_name: Schwenk, Jörg
  last_name: Schwenk
citation:
  ama: 'Jager T, Jäkel H, Schwenk J. Nutzung von selbstsignierten Client-Zertifikaten
    zur Authentifikation bei SSL/TLS. In: <i>Sicherheit 2008: Sicherheit, Schutz Und
    Zuverlässigkeit. Konferenzband Der 4. Jahrestagung Des Fachbereichs Sicherheit
    Der Gesellschaft Für Informatik e.V. (GI), 2.-4. April 2008 Im Saarbrücker Schloss.</i>
    ; 2008:127--136.'
  apa: 'Jager, T., Jäkel, H., &#38; Schwenk, J. (2008). Nutzung von selbstsignierten
    Client-Zertifikaten zur Authentifikation bei SSL/TLS. In <i>Sicherheit 2008: Sicherheit,
    Schutz und Zuverlässigkeit. Konferenzband der 4. Jahrestagung des Fachbereichs
    Sicherheit der Gesellschaft für Informatik e.V. (GI), 2.-4. April 2008 im Saarbrücker
    Schloss.</i> (pp. 127--136).'
  bibtex: '@inproceedings{Jager_Jäkel_Schwenk_2008, title={Nutzung von selbstsignierten
    Client-Zertifikaten zur Authentifikation bei SSL/TLS}, booktitle={Sicherheit 2008:
    Sicherheit, Schutz und Zuverlässigkeit. Konferenzband der 4. Jahrestagung des
    Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 2.-4. April
    2008 im Saarbrücker Schloss.}, author={Jager, Tibor and Jäkel, Heiko and Schwenk,
    Jörg}, year={2008}, pages={127--136} }'
  chicago: 'Jager, Tibor, Heiko Jäkel, and Jörg Schwenk. “Nutzung von Selbstsignierten
    Client-Zertifikaten Zur Authentifikation Bei SSL/TLS.” In <i>Sicherheit 2008:
    Sicherheit, Schutz Und Zuverlässigkeit. Konferenzband Der 4. Jahrestagung Des
    Fachbereichs Sicherheit Der Gesellschaft Für Informatik e.V. (GI), 2.-4. April
    2008 Im Saarbrücker Schloss.</i>, 127--136, 2008.'
  ieee: 'T. Jager, H. Jäkel, and J. Schwenk, “Nutzung von selbstsignierten Client-Zertifikaten
    zur Authentifikation bei SSL/TLS,” in <i>Sicherheit 2008: Sicherheit, Schutz und
    Zuverlässigkeit. Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit
    der Gesellschaft für Informatik e.V. (GI), 2.-4. April 2008 im Saarbrücker Schloss.</i>,
    2008, pp. 127--136.'
  mla: 'Jager, Tibor, et al. “Nutzung von Selbstsignierten Client-Zertifikaten Zur
    Authentifikation Bei SSL/TLS.” <i>Sicherheit 2008: Sicherheit, Schutz Und Zuverlässigkeit.
    Konferenzband Der 4. Jahrestagung Des Fachbereichs Sicherheit Der Gesellschaft
    Für Informatik e.V. (GI), 2.-4. April 2008 Im Saarbrücker Schloss.</i>, 2008,
    pp. 127--136.'
  short: 'T. Jager, H. Jäkel, J. Schwenk, in: Sicherheit 2008: Sicherheit, Schutz
    Und Zuverlässigkeit. Konferenzband Der 4. Jahrestagung Des Fachbereichs Sicherheit
    Der Gesellschaft Für Informatik e.V. (GI), 2.-4. April 2008 Im Saarbrücker Schloss.,
    2008, pp. 127--136.'
date_created: 2018-06-07T09:33:24Z
date_updated: 2022-01-06T06:58:58Z
department:
- _id: '558'
extern: '1'
page: 127--136
publication: 'Sicherheit 2008: Sicherheit, Schutz und Zuverlässigkeit. Konferenzband
  der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik
  e.V. (GI), 2.-4. April 2008 im Saarbrücker Schloss.'
status: public
title: Nutzung von selbstsignierten Client-Zertifikaten zur Authentifikation bei SSL/TLS
type: conference
user_id: '38235'
year: '2008'
...
