---
_id: '45901'
author:
- first_name: Johannes
  full_name: Blömer, Johannes
  id: '23'
  last_name: Blömer
- first_name: Jan
  full_name: Bobolz, Jan
  id: '27207'
  last_name: Bobolz
- first_name: Fabian
  full_name: Eidens, Fabian
  id: '25078'
  last_name: Eidens
- first_name: Tibor
  full_name: Jager, Tibor
  id: '64669'
  last_name: Jager
- first_name: Paul
  full_name: Kramer, Paul
  id: '64594'
  last_name: Kramer
citation:
  ama: 'Blömer J, Bobolz J, Eidens F, Jager T, Kramer P. Practical Cryptograhic Techniques
    for Secure and Privacy-Preserving Customer Loyalty Systems. In: Haake C-J, Meyer
    auf der Heide F, Platzner M, Wachsmuth H, Wehrheim H, eds. <i>On-The-Fly Computing
    -- Individualized IT-Services in Dynamic Markets</i>. Vol 412. Verlagsschriftenreihe
    des Heinz Nixdorf Instituts. Heinz Nixdorf Institut, Universität Paderborn; 2023:237-246.
    doi:<a href="https://doi.org/10.5281/zenodo.8068755">10.5281/zenodo.8068755</a>'
  apa: Blömer, J., Bobolz, J., Eidens, F., Jager, T., &#38; Kramer, P. (2023). Practical
    Cryptograhic Techniques for Secure and Privacy-Preserving Customer Loyalty Systems.
    In C.-J. Haake, F. Meyer auf der Heide, M. Platzner, H. Wachsmuth, &#38; H. Wehrheim
    (Eds.), <i>On-The-Fly Computing -- Individualized IT-services in dynamic markets</i>
    (Vol. 412, pp. 237–246). Heinz Nixdorf Institut, Universität Paderborn. <a href="https://doi.org/10.5281/zenodo.8068755">https://doi.org/10.5281/zenodo.8068755</a>
  bibtex: '@inbook{Blömer_Bobolz_Eidens_Jager_Kramer_2023, place={Paderborn}, series={Verlagsschriftenreihe
    des Heinz Nixdorf Instituts}, title={Practical Cryptograhic Techniques for Secure
    and Privacy-Preserving Customer Loyalty Systems}, volume={412}, DOI={<a href="https://doi.org/10.5281/zenodo.8068755">10.5281/zenodo.8068755</a>},
    booktitle={On-The-Fly Computing -- Individualized IT-services in dynamic markets},
    publisher={Heinz Nixdorf Institut, Universität Paderborn}, author={Blömer, Johannes
    and Bobolz, Jan and Eidens, Fabian and Jager, Tibor and Kramer, Paul}, editor={Haake,
    Claus-Jochen and Meyer auf der Heide, Friedhelm and Platzner, Marco and Wachsmuth,
    Henning and Wehrheim, Heike}, year={2023}, pages={237–246}, collection={Verlagsschriftenreihe
    des Heinz Nixdorf Instituts} }'
  chicago: 'Blömer, Johannes, Jan Bobolz, Fabian Eidens, Tibor Jager, and Paul Kramer.
    “Practical Cryptograhic Techniques for Secure and Privacy-Preserving Customer
    Loyalty Systems.” In <i>On-The-Fly Computing -- Individualized IT-Services in
    Dynamic Markets</i>, edited by Claus-Jochen Haake, Friedhelm Meyer auf der Heide,
    Marco Platzner, Henning Wachsmuth, and Heike Wehrheim, 412:237–46. Verlagsschriftenreihe
    Des Heinz Nixdorf Instituts. Paderborn: Heinz Nixdorf Institut, Universität Paderborn,
    2023. <a href="https://doi.org/10.5281/zenodo.8068755">https://doi.org/10.5281/zenodo.8068755</a>.'
  ieee: 'J. Blömer, J. Bobolz, F. Eidens, T. Jager, and P. Kramer, “Practical Cryptograhic
    Techniques for Secure and Privacy-Preserving Customer Loyalty Systems,” in <i>On-The-Fly
    Computing -- Individualized IT-services in dynamic markets</i>, vol. 412, C.-J.
    Haake, F. Meyer auf der Heide, M. Platzner, H. Wachsmuth, and H. Wehrheim, Eds.
    Paderborn: Heinz Nixdorf Institut, Universität Paderborn, 2023, pp. 237–246.'
  mla: Blömer, Johannes, et al. “Practical Cryptograhic Techniques for Secure and
    Privacy-Preserving Customer Loyalty Systems.” <i>On-The-Fly Computing -- Individualized
    IT-Services in Dynamic Markets</i>, edited by Claus-Jochen Haake et al., vol.
    412, Heinz Nixdorf Institut, Universität Paderborn, 2023, pp. 237–46, doi:<a href="https://doi.org/10.5281/zenodo.8068755">10.5281/zenodo.8068755</a>.
  short: 'J. Blömer, J. Bobolz, F. Eidens, T. Jager, P. Kramer, in: C.-J. Haake, F.
    Meyer auf der Heide, M. Platzner, H. Wachsmuth, H. Wehrheim (Eds.), On-The-Fly
    Computing -- Individualized IT-Services in Dynamic Markets, Heinz Nixdorf Institut,
    Universität Paderborn, Paderborn, 2023, pp. 237–246.'
date_created: 2023-07-07T08:41:44Z
date_updated: 2023-07-07T11:13:37Z
ddc:
- '004'
department:
- _id: '7'
doi: 10.5281/zenodo.8068755
editor:
- first_name: Claus-Jochen
  full_name: Haake, Claus-Jochen
  last_name: Haake
- first_name: Friedhelm
  full_name: Meyer auf der Heide, Friedhelm
  last_name: Meyer auf der Heide
- first_name: Marco
  full_name: Platzner, Marco
  last_name: Platzner
- first_name: Henning
  full_name: Wachsmuth, Henning
  last_name: Wachsmuth
- first_name: Heike
  full_name: Wehrheim, Heike
  last_name: Wehrheim
file:
- access_level: open_access
  content_type: application/pdf
  creator: florida
  date_created: 2023-07-07T08:41:35Z
  date_updated: 2023-07-07T11:13:37Z
  file_id: '45902'
  file_name: T2-Chapter-SFB-Buch-Final.pdf
  file_size: 5944790
  relation: main_file
file_date_updated: 2023-07-07T11:13:37Z
has_accepted_license: '1'
intvolume: '       412'
language:
- iso: eng
oa: '1'
page: 237-246
place: Paderborn
project:
- _id: '1'
  grant_number: '160364472'
  name: 'SFB 901: SFB 901: On-The-Fly Computing - Individualisierte IT-Dienstleistungen
    in dynamischen Märkten '
- _id: '82'
  name: 'SFB 901 - T: SFB 901 - Project Area T'
- _id: '84'
  name: 'SFB 901 - T2: SFB 901 -Subproject T2'
publication: On-The-Fly Computing -- Individualized IT-services in dynamic markets
publisher: Heinz Nixdorf Institut, Universität Paderborn
series_title: Verlagsschriftenreihe des Heinz Nixdorf Instituts
status: public
title: Practical Cryptograhic Techniques for Secure and Privacy-Preserving Customer
  Loyalty Systems
type: book_chapter
user_id: '477'
volume: 412
year: '2023'
...
---
_id: '45891'
author:
- first_name: Johannes
  full_name: Blömer, Johannes
  id: '23'
  last_name: Blömer
- first_name: Fabian
  full_name: Eidens, Fabian
  id: '25078'
  last_name: Eidens
- first_name: Tibor
  full_name: Jager, Tibor
  id: '64669'
  last_name: Jager
- first_name: David
  full_name: Niehues, David
  id: '36113'
  last_name: Niehues
- first_name: Christian
  full_name: Scheideler, Christian
  id: '20792'
  last_name: Scheideler
citation:
  ama: 'Blömer J, Eidens F, Jager T, Niehues D, Scheideler C. Robustness and Security.
    In: Haake C-J, Meyer auf der Heide F, Platzner M, Wachsmuth H, Wehrheim H, eds.
    <i>On-The-Fly Computing -- Individualized IT-Services in Dynamic Markets</i>.
    Vol 412. Verlagsschriftenreihe des Heinz Nixdorf Instituts. Heinz Nixdorf Institut,
    Universität Paderborn; 2023:145-164. doi:<a href="https://doi.org/10.5281/zenodo.8068629">10.5281/zenodo.8068629</a>'
  apa: Blömer, J., Eidens, F., Jager, T., Niehues, D., &#38; Scheideler, C. (2023).
    Robustness and Security. In C.-J. Haake, F. Meyer auf der Heide, M. Platzner,
    H. Wachsmuth, &#38; H. Wehrheim (Eds.), <i>On-The-Fly Computing -- Individualized
    IT-services in dynamic markets</i> (Vol. 412, pp. 145–164). Heinz Nixdorf Institut,
    Universität Paderborn. <a href="https://doi.org/10.5281/zenodo.8068629">https://doi.org/10.5281/zenodo.8068629</a>
  bibtex: '@inbook{Blömer_Eidens_Jager_Niehues_Scheideler_2023, place={Paderborn},
    series={Verlagsschriftenreihe des Heinz Nixdorf Instituts}, title={Robustness
    and Security}, volume={412}, DOI={<a href="https://doi.org/10.5281/zenodo.8068629">10.5281/zenodo.8068629</a>},
    booktitle={On-The-Fly Computing -- Individualized IT-services in dynamic markets},
    publisher={Heinz Nixdorf Institut, Universität Paderborn}, author={Blömer, Johannes
    and Eidens, Fabian and Jager, Tibor and Niehues, David and Scheideler, Christian},
    editor={Haake, Claus-Jochen and Meyer auf der Heide, Friedhelm and Platzner, Marco
    and Wachsmuth, Henning and Wehrheim, Heike}, year={2023}, pages={145–164}, collection={Verlagsschriftenreihe
    des Heinz Nixdorf Instituts} }'
  chicago: 'Blömer, Johannes, Fabian Eidens, Tibor Jager, David Niehues, and Christian
    Scheideler. “Robustness and Security.” In <i>On-The-Fly Computing -- Individualized
    IT-Services in Dynamic Markets</i>, edited by Claus-Jochen Haake, Friedhelm Meyer
    auf der Heide, Marco Platzner, Henning Wachsmuth, and Heike Wehrheim, 412:145–64.
    Verlagsschriftenreihe Des Heinz Nixdorf Instituts. Paderborn: Heinz Nixdorf Institut,
    Universität Paderborn, 2023. <a href="https://doi.org/10.5281/zenodo.8068629">https://doi.org/10.5281/zenodo.8068629</a>.'
  ieee: 'J. Blömer, F. Eidens, T. Jager, D. Niehues, and C. Scheideler, “Robustness
    and Security,” in <i>On-The-Fly Computing -- Individualized IT-services in dynamic
    markets</i>, vol. 412, C.-J. Haake, F. Meyer auf der Heide, M. Platzner, H. Wachsmuth,
    and H. Wehrheim, Eds. Paderborn: Heinz Nixdorf Institut, Universität Paderborn,
    2023, pp. 145–164.'
  mla: Blömer, Johannes, et al. “Robustness and Security.” <i>On-The-Fly Computing
    -- Individualized IT-Services in Dynamic Markets</i>, edited by Claus-Jochen Haake
    et al., vol. 412, Heinz Nixdorf Institut, Universität Paderborn, 2023, pp. 145–64,
    doi:<a href="https://doi.org/10.5281/zenodo.8068629">10.5281/zenodo.8068629</a>.
  short: 'J. Blömer, F. Eidens, T. Jager, D. Niehues, C. Scheideler, in: C.-J. Haake,
    F. Meyer auf der Heide, M. Platzner, H. Wachsmuth, H. Wehrheim (Eds.), On-The-Fly
    Computing -- Individualized IT-Services in Dynamic Markets, Heinz Nixdorf Institut,
    Universität Paderborn, Paderborn, 2023, pp. 145–164.'
date_created: 2023-07-07T08:08:47Z
date_updated: 2023-07-07T11:18:21Z
ddc:
- '004'
department:
- _id: '7'
doi: 10.5281/zenodo.8068629
editor:
- first_name: Claus-Jochen
  full_name: Haake, Claus-Jochen
  last_name: Haake
- first_name: Friedhelm
  full_name: Meyer auf der Heide, Friedhelm
  last_name: Meyer auf der Heide
- first_name: Marco
  full_name: Platzner, Marco
  last_name: Platzner
- first_name: Henning
  full_name: Wachsmuth, Henning
  last_name: Wachsmuth
- first_name: Heike
  full_name: Wehrheim, Heike
  last_name: Wehrheim
file:
- access_level: open_access
  content_type: application/pdf
  creator: florida
  date_created: 2023-07-07T08:08:37Z
  date_updated: 2023-07-07T11:18:21Z
  file_id: '45892'
  file_name: C1-Chapter-SFB-Buch-Final.pdf
  file_size: 320980
  relation: main_file
file_date_updated: 2023-07-07T11:18:21Z
has_accepted_license: '1'
intvolume: '       412'
language:
- iso: eng
oa: '1'
page: 145-164
place: Paderborn
project:
- _id: '1'
  grant_number: '160364472'
  name: 'SFB 901: SFB 901: On-The-Fly Computing - Individualisierte IT-Dienstleistungen
    in dynamischen Märkten '
- _id: '4'
  name: 'SFB 901 - C: SFB 901 - Project Area C'
- _id: '13'
  name: 'SFB 901 - C1: SFB 901 - Subproject C1'
publication: On-The-Fly Computing -- Individualized IT-services in dynamic markets
publisher: Heinz Nixdorf Institut, Universität Paderborn
series_title: Verlagsschriftenreihe des Heinz Nixdorf Instituts
status: public
title: Robustness and Security
type: book_chapter
user_id: '477'
volume: 412
year: '2023'
...
---
_id: '3105'
author:
- first_name: David
  full_name: Derler, David
  last_name: Derler
- first_name: Tibor
  full_name: Jager, Tibor
  id: '64669'
  last_name: Jager
- first_name: Daniel
  full_name: Slamanig, Daniel
  last_name: Slamanig
- first_name: Christoph
  full_name: Striecks, Christoph
  last_name: Striecks
citation:
  ama: 'Derler D, Jager T, Slamanig D, Striecks C. Bloom Filter Encryption and Applications
    to Efficient Forward-Secret 0-RTT Key Exchange. In: <i>Advances in Cryptology
    - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications
    of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings,
    Part III</i>. ; 2018:425--455. doi:<a href="https://doi.org/10.1007/978-3-319-78372-7_14">10.1007/978-3-319-78372-7_14</a>'
  apa: Derler, D., Jager, T., Slamanig, D., &#38; Striecks, C. (2018). Bloom Filter
    Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange. In
    <i>Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference
    on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel,
    April 29 - May 3, 2018 Proceedings, Part III</i> (pp. 425--455). <a href="https://doi.org/10.1007/978-3-319-78372-7_14">https://doi.org/10.1007/978-3-319-78372-7_14</a>
  bibtex: '@inproceedings{Derler_Jager_Slamanig_Striecks_2018, title={Bloom Filter
    Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange}, DOI={<a
    href="https://doi.org/10.1007/978-3-319-78372-7_14">10.1007/978-3-319-78372-7_14</a>},
    booktitle={Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International
    Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv,
    Israel, April 29 - May 3, 2018 Proceedings, Part III}, author={Derler, David and
    Jager, Tibor and Slamanig, Daniel and Striecks, Christoph}, year={2018}, pages={425--455}
    }'
  chicago: Derler, David, Tibor Jager, Daniel Slamanig, and Christoph Striecks. “Bloom
    Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange.”
    In <i>Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference
    on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel,
    April 29 - May 3, 2018 Proceedings, Part III</i>, 425--455, 2018. <a href="https://doi.org/10.1007/978-3-319-78372-7_14">https://doi.org/10.1007/978-3-319-78372-7_14</a>.
  ieee: D. Derler, T. Jager, D. Slamanig, and C. Striecks, “Bloom Filter Encryption
    and Applications to Efficient Forward-Secret 0-RTT Key Exchange,” in <i>Advances
    in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory
    and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May
    3, 2018 Proceedings, Part III</i>, 2018, pp. 425--455.
  mla: Derler, David, et al. “Bloom Filter Encryption and Applications to Efficient
    Forward-Secret 0-RTT Key Exchange.” <i>Advances in Cryptology - EUROCRYPT 2018
    - 37th Annual International Conference on the Theory and Applications of Cryptographic
    Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part III</i>,
    2018, pp. 425--455, doi:<a href="https://doi.org/10.1007/978-3-319-78372-7_14">10.1007/978-3-319-78372-7_14</a>.
  short: 'D. Derler, T. Jager, D. Slamanig, C. Striecks, in: Advances in Cryptology
    - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications
    of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings,
    Part III, 2018, pp. 425--455.'
date_created: 2018-06-07T08:47:17Z
date_updated: 2022-01-06T06:58:56Z
ddc:
- '006'
department:
- _id: '558'
doi: 10.1007/978-3-319-78372-7_14
file:
- access_level: closed
  content_type: application/pdf
  creator: abirke
  date_created: 2018-11-08T13:25:52Z
  date_updated: 2018-11-08T13:25:52Z
  file_id: '5453'
  file_name: 2018-199.pdf
  file_size: 533731
  relation: main_file
  success: 1
file_date_updated: 2018-11-08T13:25:52Z
has_accepted_license: '1'
language:
- iso: eng
main_file_link:
- url: https://eprint.iacr.org/2018/199.pdf
page: 425--455
publication: Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference
  on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April
  29 - May 3, 2018 Proceedings, Part III
status: public
title: Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT
  Key Exchange
type: conference
user_id: '38235'
year: '2018'
...
---
_id: '5861'
author:
- first_name: Tibor
  full_name: Jager, Tibor
  id: '64669'
  last_name: Jager
- first_name: Rafael
  full_name: Kurek, Rafael
  id: '64752'
  last_name: Kurek
citation:
  ama: 'Jager T, Kurek R. Short Digital Signatures and ID-KEMs via Truncation Collision
    Resistance. In: <i>Advances in Cryptology - ASIACRYPT 2018 - 24th International
    Conference on the Theory and Application of Cryptology and Information Security,
    Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part II</i>. ; 2018:221-250.
    doi:<a href="https://doi.org/10.1007/978-3-030-03329-3_8">10.1007/978-3-030-03329-3_8</a>'
  apa: Jager, T., &#38; Kurek, R. (2018). Short Digital Signatures and ID-KEMs via
    Truncation Collision Resistance. In <i>Advances in Cryptology - ASIACRYPT 2018
    - 24th International Conference on the Theory and Application of Cryptology and
    Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings,
    Part II</i> (pp. 221–250). <a href="https://doi.org/10.1007/978-3-030-03329-3_8">https://doi.org/10.1007/978-3-030-03329-3_8</a>
  bibtex: '@inproceedings{Jager_Kurek_2018, title={Short Digital Signatures and ID-KEMs
    via Truncation Collision Resistance}, DOI={<a href="https://doi.org/10.1007/978-3-030-03329-3_8">10.1007/978-3-030-03329-3_8</a>},
    booktitle={Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference
    on the Theory and Application of Cryptology and Information Security, Brisbane,
    QLD, Australia, December 2-6, 2018, Proceedings, Part II}, author={Jager, Tibor
    and Kurek, Rafael}, year={2018}, pages={221–250} }'
  chicago: Jager, Tibor, and Rafael Kurek. “Short Digital Signatures and ID-KEMs via
    Truncation Collision Resistance.” In <i>Advances in Cryptology - ASIACRYPT 2018
    - 24th International Conference on the Theory and Application of Cryptology and
    Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings,
    Part II</i>, 221–50, 2018. <a href="https://doi.org/10.1007/978-3-030-03329-3_8">https://doi.org/10.1007/978-3-030-03329-3_8</a>.
  ieee: T. Jager and R. Kurek, “Short Digital Signatures and ID-KEMs via Truncation
    Collision Resistance,” in <i>Advances in Cryptology - ASIACRYPT 2018 - 24th International
    Conference on the Theory and Application of Cryptology and Information Security,
    Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part II</i>, 2018,
    pp. 221–250.
  mla: Jager, Tibor, and Rafael Kurek. “Short Digital Signatures and ID-KEMs via Truncation
    Collision Resistance.” <i>Advances in Cryptology - ASIACRYPT 2018 - 24th International
    Conference on the Theory and Application of Cryptology and Information Security,
    Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part II</i>, 2018,
    pp. 221–50, doi:<a href="https://doi.org/10.1007/978-3-030-03329-3_8">10.1007/978-3-030-03329-3_8</a>.
  short: 'T. Jager, R. Kurek, in: Advances in Cryptology - ASIACRYPT 2018 - 24th International
    Conference on the Theory and Application of Cryptology and Information Security,
    Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part II, 2018, pp.
    221–250.'
date_created: 2018-11-27T09:39:57Z
date_updated: 2022-01-06T07:02:44Z
department:
- _id: '558'
doi: 10.1007/978-3-030-03329-3_8
language:
- iso: eng
page: 221-250
publication: Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference
  on the Theory and Application of Cryptology and Information Security, Brisbane,
  QLD, Australia, December 2-6, 2018, Proceedings, Part II
status: public
title: Short Digital Signatures and ID-KEMs via Truncation Collision Resistance
type: conference
user_id: '38235'
year: '2018'
...
---
_id: '5862'
author:
- first_name: Tibor
  full_name: Jager, Tibor
  id: '64669'
  last_name: Jager
- first_name: Rafael
  full_name: Kurek, Rafael
  id: '64752'
  last_name: Kurek
- first_name: Jiaxin
  full_name: Pan, Jiaxin
  last_name: Pan
citation:
  ama: 'Jager T, Kurek R, Pan J. Simple and More Efficient PRFs with Tight Security
    from LWE and Matrix-DDH. In: <i>Advances in Cryptology - ASIACRYPT 2018 - 24th
    International Conference on the Theory and Application of Cryptology and Information
    Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part III</i>.
    ; 2018:490-518. doi:<a href="https://doi.org/10.1007/978-3-030-03332-3_18">10.1007/978-3-030-03332-3_18</a>'
  apa: Jager, T., Kurek, R., &#38; Pan, J. (2018). Simple and More Efficient PRFs
    with Tight Security from LWE and Matrix-DDH. In <i>Advances in Cryptology - ASIACRYPT
    2018 - 24th International Conference on the Theory and Application of Cryptology
    and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings,
    Part III</i> (pp. 490–518). <a href="https://doi.org/10.1007/978-3-030-03332-3_18">https://doi.org/10.1007/978-3-030-03332-3_18</a>
  bibtex: '@inproceedings{Jager_Kurek_Pan_2018, title={Simple and More Efficient PRFs
    with Tight Security from LWE and Matrix-DDH}, DOI={<a href="https://doi.org/10.1007/978-3-030-03332-3_18">10.1007/978-3-030-03332-3_18</a>},
    booktitle={Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference
    on the Theory and Application of Cryptology and Information Security, Brisbane,
    QLD, Australia, December 2-6, 2018, Proceedings, Part III}, author={Jager, Tibor
    and Kurek, Rafael and Pan, Jiaxin}, year={2018}, pages={490–518} }'
  chicago: Jager, Tibor, Rafael Kurek, and Jiaxin Pan. “Simple and More Efficient
    PRFs with Tight Security from LWE and Matrix-DDH.” In <i>Advances in Cryptology
    - ASIACRYPT 2018 - 24th International Conference on the Theory and Application
    of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6,
    2018, Proceedings, Part III</i>, 490–518, 2018. <a href="https://doi.org/10.1007/978-3-030-03332-3_18">https://doi.org/10.1007/978-3-030-03332-3_18</a>.
  ieee: T. Jager, R. Kurek, and J. Pan, “Simple and More Efficient PRFs with Tight
    Security from LWE and Matrix-DDH,” in <i>Advances in Cryptology - ASIACRYPT 2018
    - 24th International Conference on the Theory and Application of Cryptology and
    Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings,
    Part III</i>, 2018, pp. 490–518.
  mla: Jager, Tibor, et al. “Simple and More Efficient PRFs with Tight Security from
    LWE and Matrix-DDH.” <i>Advances in Cryptology - ASIACRYPT 2018 - 24th International
    Conference on the Theory and Application of Cryptology and Information Security,
    Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part III</i>, 2018,
    pp. 490–518, doi:<a href="https://doi.org/10.1007/978-3-030-03332-3_18">10.1007/978-3-030-03332-3_18</a>.
  short: 'T. Jager, R. Kurek, J. Pan, in: Advances in Cryptology - ASIACRYPT 2018
    - 24th International Conference on the Theory and Application of Cryptology and
    Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings,
    Part III, 2018, pp. 490–518.'
date_created: 2018-11-27T09:42:49Z
date_updated: 2022-01-06T07:02:44Z
department:
- _id: '558'
doi: 10.1007/978-3-030-03332-3_18
language:
- iso: eng
page: 490-518
publication: Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference
  on the Theory and Application of Cryptology and Information Security, Brisbane,
  QLD, Australia, December 2-6, 2018, Proceedings, Part III
status: public
title: Simple and More Efficient PRFs with Tight Security from LWE and Matrix-DDH
type: conference
user_id: '38235'
year: '2018'
...
---
_id: '9606'
author:
- first_name: Jia
  full_name: Liu, Jia
  last_name: Liu
- first_name: Tibor
  full_name: Jager, Tibor
  id: '64669'
  last_name: Jager
- first_name: Saqib
  full_name: Kakvi, Saqib
  id: '66268'
  last_name: Kakvi
- first_name: Bogdan
  full_name: Warinschi, Bogdan
  last_name: Warinschi
citation:
  ama: Liu J, Jager T, Kakvi S, Warinschi B. How to build time-lock encryption. <i>Designs,
    Codes and Cryptography</i>. 2018:2549-2586. doi:<a href="https://doi.org/10.1007/s10623-018-0461-x">10.1007/s10623-018-0461-x</a>
  apa: Liu, J., Jager, T., Kakvi, S., &#38; Warinschi, B. (2018). How to build time-lock
    encryption. <i>Designs, Codes and Cryptography</i>, 2549–2586. <a href="https://doi.org/10.1007/s10623-018-0461-x">https://doi.org/10.1007/s10623-018-0461-x</a>
  bibtex: '@article{Liu_Jager_Kakvi_Warinschi_2018, title={How to build time-lock
    encryption}, DOI={<a href="https://doi.org/10.1007/s10623-018-0461-x">10.1007/s10623-018-0461-x</a>},
    journal={Designs, Codes and Cryptography}, author={Liu, Jia and Jager, Tibor and
    Kakvi, Saqib and Warinschi, Bogdan}, year={2018}, pages={2549–2586} }'
  chicago: Liu, Jia, Tibor Jager, Saqib Kakvi, and Bogdan Warinschi. “How to Build
    Time-Lock Encryption.” <i>Designs, Codes and Cryptography</i>, 2018, 2549–86.
    <a href="https://doi.org/10.1007/s10623-018-0461-x">https://doi.org/10.1007/s10623-018-0461-x</a>.
  ieee: J. Liu, T. Jager, S. Kakvi, and B. Warinschi, “How to build time-lock encryption,”
    <i>Designs, Codes and Cryptography</i>, pp. 2549–2586, 2018.
  mla: Liu, Jia, et al. “How to Build Time-Lock Encryption.” <i>Designs, Codes and
    Cryptography</i>, 2018, pp. 2549–86, doi:<a href="https://doi.org/10.1007/s10623-018-0461-x">10.1007/s10623-018-0461-x</a>.
  short: J. Liu, T. Jager, S. Kakvi, B. Warinschi, Designs, Codes and Cryptography
    (2018) 2549–2586.
date_created: 2019-05-03T12:42:01Z
date_updated: 2022-01-06T07:04:16Z
department:
- _id: '558'
doi: 10.1007/s10623-018-0461-x
language:
- iso: eng
page: 2549-2586
publication: Designs, Codes and Cryptography
publication_identifier:
  issn:
  - 0925-1022
  - 1573-7586
publication_status: published
status: public
title: How to build time-lock encryption
type: journal_article
user_id: '66268'
year: '2018'
...
---
_id: '5438'
author:
- first_name: Kristian
  full_name: Gjøsteen, Kristian
  last_name: Gjøsteen
- first_name: Tibor
  full_name: Jager, Tibor
  id: '64669'
  last_name: Jager
citation:
  ama: 'Gjøsteen K, Jager T. Practical and Tightly-Secure Digital Signatures and Authenticated
    Key Exchange. In: <i>Advances in Cryptology - CRYPTO 2018 - 38th Annual International
    Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings,
    Part II</i>. ; 2018. doi:<a href="https://doi.org/10.1007/978-3-319-96881-0_4">10.1007/978-3-319-96881-0_4</a>'
  apa: Gjøsteen, K., &#38; Jager, T. (2018). Practical and Tightly-Secure Digital
    Signatures and Authenticated Key Exchange. In <i>Advances in Cryptology - CRYPTO
    2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA,
    August 19-23, 2018, Proceedings, Part II</i>. <a href="https://doi.org/10.1007/978-3-319-96881-0_4">https://doi.org/10.1007/978-3-319-96881-0_4</a>
  bibtex: '@inproceedings{Gjøsteen_Jager_2018, title={Practical and Tightly-Secure
    Digital Signatures and Authenticated Key Exchange}, DOI={<a href="https://doi.org/10.1007/978-3-319-96881-0_4">10.1007/978-3-319-96881-0_4</a>},
    booktitle={Advances in Cryptology - CRYPTO 2018 - 38th Annual International Cryptology
    Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part II},
    author={Gjøsteen, Kristian and Jager, Tibor}, year={2018} }'
  chicago: Gjøsteen, Kristian, and Tibor Jager. “Practical and Tightly-Secure Digital
    Signatures and Authenticated Key Exchange.” In <i>Advances in Cryptology - CRYPTO
    2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA,
    August 19-23, 2018, Proceedings, Part II</i>, 2018. <a href="https://doi.org/10.1007/978-3-319-96881-0_4">https://doi.org/10.1007/978-3-319-96881-0_4</a>.
  ieee: K. Gjøsteen and T. Jager, “Practical and Tightly-Secure Digital Signatures
    and Authenticated Key Exchange,” in <i>Advances in Cryptology - CRYPTO 2018 -
    38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August
    19-23, 2018, Proceedings, Part II</i>, 2018.
  mla: Gjøsteen, Kristian, and Tibor Jager. “Practical and Tightly-Secure Digital
    Signatures and Authenticated Key Exchange.” <i>Advances in Cryptology - CRYPTO
    2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA,
    August 19-23, 2018, Proceedings, Part II</i>, 2018, doi:<a href="https://doi.org/10.1007/978-3-319-96881-0_4">10.1007/978-3-319-96881-0_4</a>.
  short: 'K. Gjøsteen, T. Jager, in: Advances in Cryptology - CRYPTO 2018 - 38th Annual
    International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
    Proceedings, Part II, 2018.'
date_created: 2018-11-08T12:47:45Z
date_updated: 2022-01-06T07:01:53Z
ddc:
- '006'
department:
- _id: '558'
doi: 10.1007/978-3-319-96881-0_4
file:
- access_level: closed
  content_type: application/octet-stream
  creator: abirke
  date_created: 2018-11-08T12:53:03Z
  date_updated: 2018-11-08T12:53:03Z
  file_id: '5440'
  file_name: 2018-543
  file_size: 486642
  relation: main_file
file_date_updated: 2018-11-08T12:53:03Z
has_accepted_license: '1'
language:
- iso: eng
main_file_link:
- url: https://eprint.iacr.org/2018/543.pdf
publication: Advances in Cryptology - CRYPTO 2018 - 38th Annual International Cryptology
  Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part II
publication_status: published
status: public
title: Practical and Tightly-Secure Digital Signatures and Authenticated Key Exchange
type: conference
user_id: '38235'
year: '2018'
...
---
_id: '5442'
author:
- first_name: Tibor
  full_name: Jager, Tibor
  id: '64669'
  last_name: Jager
- first_name: Saqib
  full_name: Kakvi, Saqib
  id: '66268'
  last_name: Kakvi
- first_name: Alexander
  full_name: May, Alexander
  last_name: May
citation:
  ama: 'Jager T, Kakvi S, May A. On the Security of the PKCS#1 v1.5 Signature Scheme.
    In: <i>Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications
    Security  - CCS ’18</i>. ACM Press; 2018. doi:<a href="https://doi.org/10.1145/3243734.3243798">10.1145/3243734.3243798</a>'
  apa: Jager, T., Kakvi, S., &#38; May, A. (2018). On the Security of the PKCS#1 v1.5
    Signature Scheme. In <i>Proceedings of the 2018 ACM SIGSAC Conference on Computer
    and Communications Security  - CCS ’18</i>. ACM Press. <a href="https://doi.org/10.1145/3243734.3243798">https://doi.org/10.1145/3243734.3243798</a>
  bibtex: '@inproceedings{Jager_Kakvi_May_2018, title={On the Security of the PKCS#1
    v1.5 Signature Scheme}, DOI={<a href="https://doi.org/10.1145/3243734.3243798">10.1145/3243734.3243798</a>},
    booktitle={Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications
    Security  - CCS ’18}, publisher={ACM Press}, author={Jager, Tibor and Kakvi, Saqib
    and May, Alexander}, year={2018} }'
  chicago: Jager, Tibor, Saqib Kakvi, and Alexander May. “On the Security of the PKCS#1
    v1.5 Signature Scheme.” In <i>Proceedings of the 2018 ACM SIGSAC Conference on
    Computer and Communications Security  - CCS ’18</i>. ACM Press, 2018. <a href="https://doi.org/10.1145/3243734.3243798">https://doi.org/10.1145/3243734.3243798</a>.
  ieee: T. Jager, S. Kakvi, and A. May, “On the Security of the PKCS#1 v1.5 Signature
    Scheme,” in <i>Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications
    Security  - CCS ’18</i>, 2018.
  mla: Jager, Tibor, et al. “On the Security of the PKCS#1 v1.5 Signature Scheme.”
    <i>Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications
    Security  - CCS ’18</i>, ACM Press, 2018, doi:<a href="https://doi.org/10.1145/3243734.3243798">10.1145/3243734.3243798</a>.
  short: 'T. Jager, S. Kakvi, A. May, in: Proceedings of the 2018 ACM SIGSAC Conference
    on Computer and Communications Security  - CCS ’18, ACM Press, 2018.'
date_created: 2018-11-08T12:56:04Z
date_updated: 2022-01-06T07:01:54Z
ddc:
- '006'
department:
- _id: '558'
doi: 10.1145/3243734.3243798
file:
- access_level: closed
  content_type: application/pdf
  creator: abirke
  date_created: 2018-11-08T12:57:34Z
  date_updated: 2018-11-08T12:57:34Z
  file_id: '5443'
  file_name: 2018-855.pdf
  file_size: 481982
  relation: main_file
  success: 1
file_date_updated: 2018-11-08T12:57:34Z
has_accepted_license: '1'
language:
- iso: eng
main_file_link:
- url: https://eprint.iacr.org/2018/855.pdf
publication: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications
  Security  - CCS '18
publication_identifier:
  isbn:
  - '9781450356930'
publication_status: published
publisher: ACM Press
status: public
title: On the Security of the PKCS#1 v1.5 Signature Scheme
type: conference
user_id: '38235'
year: '2018'
...
---
_id: '3108'
author:
- first_name: Tibor
  full_name: Jager, Tibor
  id: '64669'
  last_name: Jager
- first_name: Florian
  full_name: Kohlar, Florian
  last_name: Kohlar
- first_name: Sven
  full_name: Schäge, Sven
  last_name: Schäge
- first_name: Jörg
  full_name: Schwenk, Jörg
  last_name: Schwenk
citation:
  ama: Jager T, Kohlar F, Schäge S, Schwenk J. Authenticated Confidential Channel
    Establishment and the Security of TLS-DHE. <i>J Cryptology</i>. 2017;(4):1276--1324.
    doi:<a href="https://doi.org/10.1007/s00145-016-9248-2">10.1007/s00145-016-9248-2</a>
  apa: Jager, T., Kohlar, F., Schäge, S., &#38; Schwenk, J. (2017). Authenticated
    Confidential Channel Establishment and the Security of TLS-DHE. <i>J. Cryptology</i>,
    (4), 1276--1324. <a href="https://doi.org/10.1007/s00145-016-9248-2">https://doi.org/10.1007/s00145-016-9248-2</a>
  bibtex: '@article{Jager_Kohlar_Schäge_Schwenk_2017, title={Authenticated Confidential
    Channel Establishment and the Security of TLS-DHE}, DOI={<a href="https://doi.org/10.1007/s00145-016-9248-2">10.1007/s00145-016-9248-2</a>},
    number={4}, journal={J. Cryptology}, author={Jager, Tibor and Kohlar, Florian
    and Schäge, Sven and Schwenk, Jörg}, year={2017}, pages={1276--1324} }'
  chicago: 'Jager, Tibor, Florian Kohlar, Sven Schäge, and Jörg Schwenk. “Authenticated
    Confidential Channel Establishment and the Security of TLS-DHE.” <i>J. Cryptology</i>,
    no. 4 (2017): 1276--1324. <a href="https://doi.org/10.1007/s00145-016-9248-2">https://doi.org/10.1007/s00145-016-9248-2</a>.'
  ieee: T. Jager, F. Kohlar, S. Schäge, and J. Schwenk, “Authenticated Confidential
    Channel Establishment and the Security of TLS-DHE,” <i>J. Cryptology</i>, no.
    4, pp. 1276--1324, 2017.
  mla: Jager, Tibor, et al. “Authenticated Confidential Channel Establishment and
    the Security of TLS-DHE.” <i>J. Cryptology</i>, no. 4, 2017, pp. 1276--1324, doi:<a
    href="https://doi.org/10.1007/s00145-016-9248-2">10.1007/s00145-016-9248-2</a>.
  short: T. Jager, F. Kohlar, S. Schäge, J. Schwenk, J. Cryptology (2017) 1276--1324.
date_created: 2018-06-07T08:58:36Z
date_updated: 2022-01-06T06:58:56Z
department:
- _id: '558'
doi: 10.1007/s00145-016-9248-2
issue: '4'
page: 1276--1324
publication: J. Cryptology
status: public
title: Authenticated Confidential Channel Establishment and the Security of TLS-DHE
type: journal_article
user_id: '38235'
year: '2017'
...
---
_id: '3109'
author:
- first_name: Britta
  full_name: Hale, Britta
  last_name: Hale
- first_name: Tibor
  full_name: Jager, Tibor
  id: '64669'
  last_name: Jager
- first_name: Sebastian
  full_name: Lauer, Sebastian
  last_name: Lauer
- first_name: Jörg
  full_name: Schwenk, Jörg
  last_name: Schwenk
citation:
  ama: 'Hale B, Jager T, Lauer S, Schwenk J. Simple Security Definitions for and Constructions
    of 0-RTT Key Exchange. In: <i>Applied Cryptography and Network Security - 15th
    International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings</i>.
    ; 2017:20--38. doi:<a href="https://doi.org/10.1007/978-3-319-61204-1_2">10.1007/978-3-319-61204-1_2</a>'
  apa: Hale, B., Jager, T., Lauer, S., &#38; Schwenk, J. (2017). Simple Security Definitions
    for and Constructions of 0-RTT Key Exchange. In <i>Applied Cryptography and Network
    Security - 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12,
    2017, Proceedings</i> (pp. 20--38). <a href="https://doi.org/10.1007/978-3-319-61204-1_2">https://doi.org/10.1007/978-3-319-61204-1_2</a>
  bibtex: '@inproceedings{Hale_Jager_Lauer_Schwenk_2017, title={Simple Security Definitions
    for and Constructions of 0-RTT Key Exchange}, DOI={<a href="https://doi.org/10.1007/978-3-319-61204-1_2">10.1007/978-3-319-61204-1_2</a>},
    booktitle={Applied Cryptography and Network Security - 15th International Conference,
    ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings}, author={Hale, Britta
    and Jager, Tibor and Lauer, Sebastian and Schwenk, Jörg}, year={2017}, pages={20--38}
    }'
  chicago: Hale, Britta, Tibor Jager, Sebastian Lauer, and Jörg Schwenk. “Simple Security
    Definitions for and Constructions of 0-RTT Key Exchange.” In <i>Applied Cryptography
    and Network Security - 15th International Conference, ACNS 2017, Kanazawa, Japan,
    July 10-12, 2017, Proceedings</i>, 20--38, 2017. <a href="https://doi.org/10.1007/978-3-319-61204-1_2">https://doi.org/10.1007/978-3-319-61204-1_2</a>.
  ieee: B. Hale, T. Jager, S. Lauer, and J. Schwenk, “Simple Security Definitions
    for and Constructions of 0-RTT Key Exchange,” in <i>Applied Cryptography and Network
    Security - 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12,
    2017, Proceedings</i>, 2017, pp. 20--38.
  mla: Hale, Britta, et al. “Simple Security Definitions for and Constructions of
    0-RTT Key Exchange.” <i>Applied Cryptography and Network Security - 15th International
    Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings</i>, 2017,
    pp. 20--38, doi:<a href="https://doi.org/10.1007/978-3-319-61204-1_2">10.1007/978-3-319-61204-1_2</a>.
  short: 'B. Hale, T. Jager, S. Lauer, J. Schwenk, in: Applied Cryptography and Network
    Security - 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12,
    2017, Proceedings, 2017, pp. 20--38.'
date_created: 2018-06-07T09:07:59Z
date_updated: 2022-01-06T06:58:56Z
department:
- _id: '558'
doi: 10.1007/978-3-319-61204-1_2
page: 20--38
publication: Applied Cryptography and Network Security - 15th International Conference,
  ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings
status: public
title: Simple Security Definitions for and Constructions of 0-RTT Key Exchange
type: conference
user_id: '38235'
year: '2017'
...
---
_id: '3110'
author:
- first_name: Felix
  full_name: Günther, Felix
  last_name: Günther
- first_name: Britta
  full_name: Hale, Britta
  last_name: Hale
- first_name: Tibor
  full_name: Jager, Tibor
  id: '64669'
  last_name: Jager
- first_name: Sebastian
  full_name: Lauer, Sebastian
  last_name: Lauer
citation:
  ama: 'Günther F, Hale B, Jager T, Lauer S. 0-RTT Key Exchange with Full Forward
    Secrecy. In: <i>Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International
    Conference on the Theory and Applications of Cryptographic Techniques, Paris,
    France, April 30 - May 4, 2017, Proceedings, Part III</i>. ; 2017:519--548. doi:<a
    href="https://doi.org/10.1007/978-3-319-56617-7_18">10.1007/978-3-319-56617-7_18</a>'
  apa: Günther, F., Hale, B., Jager, T., &#38; Lauer, S. (2017). 0-RTT Key Exchange
    with Full Forward Secrecy. In <i>Advances in Cryptology - EUROCRYPT 2017 - 36th
    Annual International Conference on the Theory and Applications of Cryptographic
    Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part III</i> (pp.
    519--548). <a href="https://doi.org/10.1007/978-3-319-56617-7_18">https://doi.org/10.1007/978-3-319-56617-7_18</a>
  bibtex: '@inproceedings{Günther_Hale_Jager_Lauer_2017, title={0-RTT Key Exchange
    with Full Forward Secrecy}, DOI={<a href="https://doi.org/10.1007/978-3-319-56617-7_18">10.1007/978-3-319-56617-7_18</a>},
    booktitle={Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International
    Conference on the Theory and Applications of Cryptographic Techniques, Paris,
    France, April 30 - May 4, 2017, Proceedings, Part III}, author={Günther, Felix
    and Hale, Britta and Jager, Tibor and Lauer, Sebastian}, year={2017}, pages={519--548}
    }'
  chicago: Günther, Felix, Britta Hale, Tibor Jager, and Sebastian Lauer. “0-RTT Key
    Exchange with Full Forward Secrecy.” In <i>Advances in Cryptology - EUROCRYPT
    2017 - 36th Annual International Conference on the Theory and Applications of
    Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings,
    Part III</i>, 519--548, 2017. <a href="https://doi.org/10.1007/978-3-319-56617-7_18">https://doi.org/10.1007/978-3-319-56617-7_18</a>.
  ieee: F. Günther, B. Hale, T. Jager, and S. Lauer, “0-RTT Key Exchange with Full
    Forward Secrecy,” in <i>Advances in Cryptology - EUROCRYPT 2017 - 36th Annual
    International Conference on the Theory and Applications of Cryptographic Techniques,
    Paris, France, April 30 - May 4, 2017, Proceedings, Part III</i>, 2017, pp. 519--548.
  mla: Günther, Felix, et al. “0-RTT Key Exchange with Full Forward Secrecy.” <i>Advances
    in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory
    and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4,
    2017, Proceedings, Part III</i>, 2017, pp. 519--548, doi:<a href="https://doi.org/10.1007/978-3-319-56617-7_18">10.1007/978-3-319-56617-7_18</a>.
  short: 'F. Günther, B. Hale, T. Jager, S. Lauer, in: Advances in Cryptology - EUROCRYPT
    2017 - 36th Annual International Conference on the Theory and Applications of
    Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings,
    Part III, 2017, pp. 519--548.'
date_created: 2018-06-07T09:10:17Z
date_updated: 2022-01-06T06:58:56Z
department:
- _id: '558'
doi: 10.1007/978-3-319-56617-7_18
page: 519--548
publication: Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference
  on the Theory and Applications of Cryptographic Techniques, Paris, France, April
  30 - May 4, 2017, Proceedings, Part III
status: public
title: 0-RTT Key Exchange with Full Forward Secrecy
type: conference
user_id: '38235'
year: '2017'
...
---
_id: '3111'
author:
- first_name: Tibor
  full_name: Jager, Tibor
  id: '64669'
  last_name: Jager
- first_name: Martijn
  full_name: Stam, Martijn
  last_name: Stam
- first_name: Ryan
  full_name: Stanley-Oakes, Ryan
  last_name: Stanley-Oakes
- first_name: Bogdan
  full_name: Warinschi, Bogdan
  last_name: Warinschi
citation:
  ama: 'Jager T, Stam M, Stanley-Oakes R, Warinschi B. Multi-key Authenticated Encryption
    with Corruptions: Reductions Are Lossy. In: <i>Theory of Cryptography - 15th International
    Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part
    I</i>. ; 2017:409--441. doi:<a href="https://doi.org/10.1007/978-3-319-70500-2_14">10.1007/978-3-319-70500-2_14</a>'
  apa: 'Jager, T., Stam, M., Stanley-Oakes, R., &#38; Warinschi, B. (2017). Multi-key
    Authenticated Encryption with Corruptions: Reductions Are Lossy. In <i>Theory
    of Cryptography - 15th International Conference, TCC 2017, Baltimore, MD, USA,
    November 12-15, 2017, Proceedings, Part I</i> (pp. 409--441). <a href="https://doi.org/10.1007/978-3-319-70500-2_14">https://doi.org/10.1007/978-3-319-70500-2_14</a>'
  bibtex: '@inproceedings{Jager_Stam_Stanley-Oakes_Warinschi_2017, title={Multi-key
    Authenticated Encryption with Corruptions: Reductions Are Lossy}, DOI={<a href="https://doi.org/10.1007/978-3-319-70500-2_14">10.1007/978-3-319-70500-2_14</a>},
    booktitle={Theory of Cryptography - 15th International Conference, TCC 2017, Baltimore,
    MD, USA, November 12-15, 2017, Proceedings, Part I}, author={Jager, Tibor and
    Stam, Martijn and Stanley-Oakes, Ryan and Warinschi, Bogdan}, year={2017}, pages={409--441}
    }'
  chicago: 'Jager, Tibor, Martijn Stam, Ryan Stanley-Oakes, and Bogdan Warinschi.
    “Multi-Key Authenticated Encryption with Corruptions: Reductions Are Lossy.” In
    <i>Theory of Cryptography - 15th International Conference, TCC 2017, Baltimore,
    MD, USA, November 12-15, 2017, Proceedings, Part I</i>, 409--441, 2017. <a href="https://doi.org/10.1007/978-3-319-70500-2_14">https://doi.org/10.1007/978-3-319-70500-2_14</a>.'
  ieee: 'T. Jager, M. Stam, R. Stanley-Oakes, and B. Warinschi, “Multi-key Authenticated
    Encryption with Corruptions: Reductions Are Lossy,” in <i>Theory of Cryptography
    - 15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15,
    2017, Proceedings, Part I</i>, 2017, pp. 409--441.'
  mla: 'Jager, Tibor, et al. “Multi-Key Authenticated Encryption with Corruptions:
    Reductions Are Lossy.” <i>Theory of Cryptography - 15th International Conference,
    TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part I</i>, 2017,
    pp. 409--441, doi:<a href="https://doi.org/10.1007/978-3-319-70500-2_14">10.1007/978-3-319-70500-2_14</a>.'
  short: 'T. Jager, M. Stam, R. Stanley-Oakes, B. Warinschi, in: Theory of Cryptography
    - 15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15,
    2017, Proceedings, Part I, 2017, pp. 409--441.'
date_created: 2018-06-07T09:11:07Z
date_updated: 2022-01-06T06:58:56Z
department:
- _id: '558'
doi: 10.1007/978-3-319-70500-2_14
page: 409--441
publication: Theory of Cryptography - 15th International Conference, TCC 2017, Baltimore,
  MD, USA, November 12-15, 2017, Proceedings, Part I
status: public
title: 'Multi-key Authenticated Encryption with Corruptions: Reductions Are Lossy'
type: conference
user_id: '38235'
year: '2017'
...
---
_id: '3112'
author:
- first_name: Dennis
  full_name: Hofheinz, Dennis
  last_name: Hofheinz
- first_name: Tibor
  full_name: Jager, Tibor
  id: '64669'
  last_name: Jager
citation:
  ama: Hofheinz D, Jager T. Tightly secure signatures and public-key encryption. <i>Des
    Codes Cryptography</i>. 2016;(1):29--61. doi:<a href="https://doi.org/10.1007/s10623-015-0062-x">10.1007/s10623-015-0062-x</a>
  apa: Hofheinz, D., &#38; Jager, T. (2016). Tightly secure signatures and public-key
    encryption. <i>Des. Codes Cryptography</i>, (1), 29--61. <a href="https://doi.org/10.1007/s10623-015-0062-x">https://doi.org/10.1007/s10623-015-0062-x</a>
  bibtex: '@article{Hofheinz_Jager_2016, title={Tightly secure signatures and public-key
    encryption}, DOI={<a href="https://doi.org/10.1007/s10623-015-0062-x">10.1007/s10623-015-0062-x</a>},
    number={1}, journal={Des. Codes Cryptography}, author={Hofheinz, Dennis and Jager,
    Tibor}, year={2016}, pages={29--61} }'
  chicago: 'Hofheinz, Dennis, and Tibor Jager. “Tightly Secure Signatures and Public-Key
    Encryption.” <i>Des. Codes Cryptography</i>, no. 1 (2016): 29--61. <a href="https://doi.org/10.1007/s10623-015-0062-x">https://doi.org/10.1007/s10623-015-0062-x</a>.'
  ieee: D. Hofheinz and T. Jager, “Tightly secure signatures and public-key encryption,”
    <i>Des. Codes Cryptography</i>, no. 1, pp. 29--61, 2016.
  mla: Hofheinz, Dennis, and Tibor Jager. “Tightly Secure Signatures and Public-Key
    Encryption.” <i>Des. Codes Cryptography</i>, no. 1, 2016, pp. 29--61, doi:<a href="https://doi.org/10.1007/s10623-015-0062-x">10.1007/s10623-015-0062-x</a>.
  short: D. Hofheinz, T. Jager, Des. Codes Cryptography (2016) 29--61.
date_created: 2018-06-07T09:12:15Z
date_updated: 2022-01-06T06:58:56Z
department:
- _id: '558'
doi: 10.1007/s10623-015-0062-x
extern: '1'
issue: '1'
page: 29--61
publication: Des. Codes Cryptography
status: public
title: Tightly secure signatures and public-key encryption
type: journal_article
user_id: '38235'
year: '2016'
...
---
_id: '3113'
author:
- first_name: Felix
  full_name: Heuer, Felix
  last_name: Heuer
- first_name: Tibor
  full_name: Jager, Tibor
  id: '64669'
  last_name: Jager
- first_name: Sven
  full_name: Schäge, Sven
  last_name: Schäge
- first_name: Eike
  full_name: Kiltz, Eike
  last_name: Kiltz
citation:
  ama: Heuer F, Jager T, Schäge S, Kiltz E. Selective opening security of practical
    public-key encryption schemes. <i>IET Information Security</i>. 2016;(6):304--318.
    doi:<a href="https://doi.org/10.1049/iet-ifs.2015.0507">10.1049/iet-ifs.2015.0507</a>
  apa: Heuer, F., Jager, T., Schäge, S., &#38; Kiltz, E. (2016). Selective opening
    security of practical public-key encryption schemes. <i>IET Information Security</i>,
    (6), 304--318. <a href="https://doi.org/10.1049/iet-ifs.2015.0507">https://doi.org/10.1049/iet-ifs.2015.0507</a>
  bibtex: '@article{Heuer_Jager_Schäge_Kiltz_2016, title={Selective opening security
    of practical public-key encryption schemes}, DOI={<a href="https://doi.org/10.1049/iet-ifs.2015.0507">10.1049/iet-ifs.2015.0507</a>},
    number={6}, journal={IET Information Security}, author={Heuer, Felix and Jager,
    Tibor and Schäge, Sven and Kiltz, Eike}, year={2016}, pages={304--318} }'
  chicago: 'Heuer, Felix, Tibor Jager, Sven Schäge, and Eike Kiltz. “Selective Opening
    Security of Practical Public-Key Encryption Schemes.” <i>IET Information Security</i>,
    no. 6 (2016): 304--318. <a href="https://doi.org/10.1049/iet-ifs.2015.0507">https://doi.org/10.1049/iet-ifs.2015.0507</a>.'
  ieee: F. Heuer, T. Jager, S. Schäge, and E. Kiltz, “Selective opening security of
    practical public-key encryption schemes,” <i>IET Information Security</i>, no.
    6, pp. 304--318, 2016.
  mla: Heuer, Felix, et al. “Selective Opening Security of Practical Public-Key Encryption
    Schemes.” <i>IET Information Security</i>, no. 6, 2016, pp. 304--318, doi:<a href="https://doi.org/10.1049/iet-ifs.2015.0507">10.1049/iet-ifs.2015.0507</a>.
  short: F. Heuer, T. Jager, S. Schäge, E. Kiltz, IET Information Security (2016)
    304--318.
date_created: 2018-06-07T09:12:50Z
date_updated: 2022-01-06T06:58:56Z
department:
- _id: '558'
doi: 10.1049/iet-ifs.2015.0507
extern: '1'
issue: '6'
page: 304--318
publication: IET Information Security
status: public
title: Selective opening security of practical public-key encryption schemes
type: journal_article
user_id: '38235'
year: '2016'
...
---
_id: '3114'
author:
- first_name: Tibor
  full_name: Jager, Tibor
  id: '64669'
  last_name: Jager
- first_name: Andy
  full_name: Rupp, Andy
  last_name: Rupp
citation:
  ama: 'Jager T, Rupp A. Black-Box Accumulation: Collecting Incentives in a Privacy-Preserving
    Way. <i>PoPETs</i>. 2016;(3):62--82.'
  apa: 'Jager, T., &#38; Rupp, A. (2016). Black-Box Accumulation: Collecting Incentives
    in a Privacy-Preserving Way. <i>PoPETs</i>, (3), 62--82.'
  bibtex: '@article{Jager_Rupp_2016, title={Black-Box Accumulation: Collecting Incentives
    in a Privacy-Preserving Way}, number={3}, journal={PoPETs}, author={Jager, Tibor
    and Rupp, Andy}, year={2016}, pages={62--82} }'
  chicago: 'Jager, Tibor, and Andy Rupp. “Black-Box Accumulation: Collecting Incentives
    in a Privacy-Preserving Way.” <i>PoPETs</i>, no. 3 (2016): 62--82.'
  ieee: 'T. Jager and A. Rupp, “Black-Box Accumulation: Collecting Incentives in a
    Privacy-Preserving Way,” <i>PoPETs</i>, no. 3, pp. 62--82, 2016.'
  mla: 'Jager, Tibor, and Andy Rupp. “Black-Box Accumulation: Collecting Incentives
    in a Privacy-Preserving Way.” <i>PoPETs</i>, no. 3, 2016, pp. 62--82.'
  short: T. Jager, A. Rupp, PoPETs (2016) 62--82.
date_created: 2018-06-07T09:13:15Z
date_updated: 2022-01-06T06:58:56Z
department:
- _id: '558'
extern: '1'
issue: '3'
page: 62--82
publication: PoPETs
status: public
title: 'Black-Box Accumulation: Collecting Incentives in a Privacy-Preserving Way'
type: journal_article
user_id: '38235'
year: '2016'
...
---
_id: '3115'
author:
- first_name: Dennis
  full_name: Hofheinz, Dennis
  last_name: Hofheinz
- first_name: Tibor
  full_name: Jager, Tibor
  id: '64669'
  last_name: Jager
- first_name: Dakshita
  full_name: Khurana, Dakshita
  last_name: Khurana
- first_name: Amit
  full_name: Sahai, Amit
  last_name: Sahai
- first_name: Brent
  full_name: Waters, Brent
  last_name: Waters
- first_name: Mark
  full_name: Zhandry, Mark
  last_name: Zhandry
citation:
  ama: 'Hofheinz D, Jager T, Khurana D, Sahai A, Waters B, Zhandry M. How to Generate
    and Use Universal Samplers. In: <i>Advances in Cryptology - ASIACRYPT 2016 - 22nd
    International Conference on the Theory and Application of Cryptology and Information
    Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part II</i>. ; 2016:715--744.
    doi:<a href="https://doi.org/10.1007/978-3-662-53890-6_24">10.1007/978-3-662-53890-6_24</a>'
  apa: Hofheinz, D., Jager, T., Khurana, D., Sahai, A., Waters, B., &#38; Zhandry,
    M. (2016). How to Generate and Use Universal Samplers. In <i>Advances in Cryptology
    - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application
    of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings,
    Part II</i> (pp. 715--744). <a href="https://doi.org/10.1007/978-3-662-53890-6_24">https://doi.org/10.1007/978-3-662-53890-6_24</a>
  bibtex: '@inproceedings{Hofheinz_Jager_Khurana_Sahai_Waters_Zhandry_2016, title={How
    to Generate and Use Universal Samplers}, DOI={<a href="https://doi.org/10.1007/978-3-662-53890-6_24">10.1007/978-3-662-53890-6_24</a>},
    booktitle={Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference
    on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam,
    December 4-8, 2016, Proceedings, Part II}, author={Hofheinz, Dennis and Jager,
    Tibor and Khurana, Dakshita and Sahai, Amit and Waters, Brent and Zhandry, Mark},
    year={2016}, pages={715--744} }'
  chicago: Hofheinz, Dennis, Tibor Jager, Dakshita Khurana, Amit Sahai, Brent Waters,
    and Mark Zhandry. “How to Generate and Use Universal Samplers.” In <i>Advances
    in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and
    Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8,
    2016, Proceedings, Part II</i>, 715--744, 2016. <a href="https://doi.org/10.1007/978-3-662-53890-6_24">https://doi.org/10.1007/978-3-662-53890-6_24</a>.
  ieee: D. Hofheinz, T. Jager, D. Khurana, A. Sahai, B. Waters, and M. Zhandry, “How
    to Generate and Use Universal Samplers,” in <i>Advances in Cryptology - ASIACRYPT
    2016 - 22nd International Conference on the Theory and Application of Cryptology
    and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part
    II</i>, 2016, pp. 715--744.
  mla: Hofheinz, Dennis, et al. “How to Generate and Use Universal Samplers.” <i>Advances
    in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and
    Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8,
    2016, Proceedings, Part II</i>, 2016, pp. 715--744, doi:<a href="https://doi.org/10.1007/978-3-662-53890-6_24">10.1007/978-3-662-53890-6_24</a>.
  short: 'D. Hofheinz, T. Jager, D. Khurana, A. Sahai, B. Waters, M. Zhandry, in:
    Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the
    Theory and Application of Cryptology and Information Security, Hanoi, Vietnam,
    December 4-8, 2016, Proceedings, Part II, 2016, pp. 715--744.'
date_created: 2018-06-07T09:13:48Z
date_updated: 2022-01-06T06:58:57Z
department:
- _id: '558'
doi: 10.1007/978-3-662-53890-6_24
extern: '1'
page: 715--744
publication: Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference
  on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam,
  December 4-8, 2016, Proceedings, Part II
status: public
title: How to Generate and Use Universal Samplers
type: conference
user_id: '38235'
year: '2016'
...
---
_id: '3116'
author:
- first_name: Matthias
  full_name: Horst, Matthias
  last_name: Horst
- first_name: Martin
  full_name: Grothe, Martin
  last_name: Grothe
- first_name: Tibor
  full_name: Jager, Tibor
  id: '64669'
  last_name: Jager
- first_name: Jörg
  full_name: Schwenk, Jörg
  last_name: Schwenk
citation:
  ama: 'Horst M, Grothe M, Jager T, Schwenk J. Breaking PPTP VPNs via RADIUS Encryption.
    In: <i>Cryptology and Network Security - 15th International Conference, CANS 2016,
    Milan, Italy, November 14-16, 2016, Proceedings</i>. ; 2016:159--175. doi:<a href="https://doi.org/10.1007/978-3-319-48965-0_10">10.1007/978-3-319-48965-0_10</a>'
  apa: Horst, M., Grothe, M., Jager, T., &#38; Schwenk, J. (2016). Breaking PPTP VPNs
    via RADIUS Encryption. In <i>Cryptology and Network Security - 15th International
    Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings</i> (pp.
    159--175). <a href="https://doi.org/10.1007/978-3-319-48965-0_10">https://doi.org/10.1007/978-3-319-48965-0_10</a>
  bibtex: '@inproceedings{Horst_Grothe_Jager_Schwenk_2016, title={Breaking PPTP VPNs
    via RADIUS Encryption}, DOI={<a href="https://doi.org/10.1007/978-3-319-48965-0_10">10.1007/978-3-319-48965-0_10</a>},
    booktitle={Cryptology and Network Security - 15th International Conference, CANS
    2016, Milan, Italy, November 14-16, 2016, Proceedings}, author={Horst, Matthias
    and Grothe, Martin and Jager, Tibor and Schwenk, Jörg}, year={2016}, pages={159--175}
    }'
  chicago: Horst, Matthias, Martin Grothe, Tibor Jager, and Jörg Schwenk. “Breaking
    PPTP VPNs via RADIUS Encryption.” In <i>Cryptology and Network Security - 15th
    International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings</i>,
    159--175, 2016. <a href="https://doi.org/10.1007/978-3-319-48965-0_10">https://doi.org/10.1007/978-3-319-48965-0_10</a>.
  ieee: M. Horst, M. Grothe, T. Jager, and J. Schwenk, “Breaking PPTP VPNs via RADIUS
    Encryption,” in <i>Cryptology and Network Security - 15th International Conference,
    CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings</i>, 2016, pp. 159--175.
  mla: Horst, Matthias, et al. “Breaking PPTP VPNs via RADIUS Encryption.” <i>Cryptology
    and Network Security - 15th International Conference, CANS 2016, Milan, Italy,
    November 14-16, 2016, Proceedings</i>, 2016, pp. 159--175, doi:<a href="https://doi.org/10.1007/978-3-319-48965-0_10">10.1007/978-3-319-48965-0_10</a>.
  short: 'M. Horst, M. Grothe, T. Jager, J. Schwenk, in: Cryptology and Network Security
    - 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016,
    Proceedings, 2016, pp. 159--175.'
date_created: 2018-06-07T09:14:34Z
date_updated: 2022-01-06T06:58:57Z
department:
- _id: '558'
doi: 10.1007/978-3-319-48965-0_10
extern: '1'
page: 159--175
publication: Cryptology and Network Security - 15th International Conference, CANS
  2016, Milan, Italy, November 14-16, 2016, Proceedings
status: public
title: Breaking PPTP VPNs via RADIUS Encryption
type: conference
user_id: '38235'
year: '2016'
...
---
_id: '3117'
author:
- first_name: Christoph
  full_name: Bader, Christoph
  last_name: Bader
- first_name: Tibor
  full_name: Jager, Tibor
  id: '64669'
  last_name: Jager
- first_name: Yong
  full_name: Li, Yong
  last_name: Li
- first_name: Sven
  full_name: Schäge, Sven
  last_name: Schäge
citation:
  ama: 'Bader C, Jager T, Li Y, Schäge S. On the Impossibility of Tight Cryptographic
    Reductions. In: <i>Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International
    Conference on the Theory and Applications of Cryptographic Techniques, Vienna,
    Austria, May 8-12, 2016, Proceedings, Part II</i>. ; 2016:273--304. doi:<a href="https://doi.org/10.1007/978-3-662-49896-5_10">10.1007/978-3-662-49896-5_10</a>'
  apa: Bader, C., Jager, T., Li, Y., &#38; Schäge, S. (2016). On the Impossibility
    of Tight Cryptographic Reductions. In <i>Advances in Cryptology - EUROCRYPT 2016
    - 35th Annual International Conference on the Theory and Applications of Cryptographic
    Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II</i> (pp. 273--304).
    <a href="https://doi.org/10.1007/978-3-662-49896-5_10">https://doi.org/10.1007/978-3-662-49896-5_10</a>
  bibtex: '@inproceedings{Bader_Jager_Li_Schäge_2016, title={On the Impossibility
    of Tight Cryptographic Reductions}, DOI={<a href="https://doi.org/10.1007/978-3-662-49896-5_10">10.1007/978-3-662-49896-5_10</a>},
    booktitle={Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International
    Conference on the Theory and Applications of Cryptographic Techniques, Vienna,
    Austria, May 8-12, 2016, Proceedings, Part II}, author={Bader, Christoph and Jager,
    Tibor and Li, Yong and Schäge, Sven}, year={2016}, pages={273--304} }'
  chicago: Bader, Christoph, Tibor Jager, Yong Li, and Sven Schäge. “On the Impossibility
    of Tight Cryptographic Reductions.” In <i>Advances in Cryptology - EUROCRYPT 2016
    - 35th Annual International Conference on the Theory and Applications of Cryptographic
    Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II</i>, 273--304,
    2016. <a href="https://doi.org/10.1007/978-3-662-49896-5_10">https://doi.org/10.1007/978-3-662-49896-5_10</a>.
  ieee: C. Bader, T. Jager, Y. Li, and S. Schäge, “On the Impossibility of Tight Cryptographic
    Reductions,” in <i>Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International
    Conference on the Theory and Applications of Cryptographic Techniques, Vienna,
    Austria, May 8-12, 2016, Proceedings, Part II</i>, 2016, pp. 273--304.
  mla: Bader, Christoph, et al. “On the Impossibility of Tight Cryptographic Reductions.”
    <i>Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference
    on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May
    8-12, 2016, Proceedings, Part II</i>, 2016, pp. 273--304, doi:<a href="https://doi.org/10.1007/978-3-662-49896-5_10">10.1007/978-3-662-49896-5_10</a>.
  short: 'C. Bader, T. Jager, Y. Li, S. Schäge, in: Advances in Cryptology - EUROCRYPT
    2016 - 35th Annual International Conference on the Theory and Applications of
    Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II,
    2016, pp. 273--304.'
date_created: 2018-06-07T09:15:15Z
date_updated: 2022-01-06T06:58:57Z
department:
- _id: '558'
doi: 10.1007/978-3-662-49896-5_10
extern: '1'
page: 273--304
publication: Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference
  on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May
  8-12, 2016, Proceedings, Part II
status: public
title: On the Impossibility of Tight Cryptographic Reductions
type: conference
user_id: '38235'
year: '2016'
...
---
_id: '3118'
author:
- first_name: Dennis
  full_name: Hofheinz, Dennis
  last_name: Hofheinz
- first_name: Tibor
  full_name: Jager, Tibor
  id: '64669'
  last_name: Jager
- first_name: Andy
  full_name: Rupp, Andy
  last_name: Rupp
citation:
  ama: 'Hofheinz D, Jager T, Rupp A. Public-Key Encryption with Simulation-Based Selective-Opening
    Security and Compact Ciphertexts. In: <i>Theory of Cryptography - 14th International
    Conference, TCC 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings,
    Part II</i>. ; 2016:146--168. doi:<a href="https://doi.org/10.1007/978-3-662-53644-5_6">10.1007/978-3-662-53644-5_6</a>'
  apa: Hofheinz, D., Jager, T., &#38; Rupp, A. (2016). Public-Key Encryption with
    Simulation-Based Selective-Opening Security and Compact Ciphertexts. In <i>Theory
    of Cryptography - 14th International Conference, TCC 2016-B, Beijing, China, October
    31 - November 3, 2016, Proceedings, Part II</i> (pp. 146--168). <a href="https://doi.org/10.1007/978-3-662-53644-5_6">https://doi.org/10.1007/978-3-662-53644-5_6</a>
  bibtex: '@inproceedings{Hofheinz_Jager_Rupp_2016, title={Public-Key Encryption with
    Simulation-Based Selective-Opening Security and Compact Ciphertexts}, DOI={<a
    href="https://doi.org/10.1007/978-3-662-53644-5_6">10.1007/978-3-662-53644-5_6</a>},
    booktitle={Theory of Cryptography - 14th International Conference, TCC 2016-B,
    Beijing, China, October 31 - November 3, 2016, Proceedings, Part II}, author={Hofheinz,
    Dennis and Jager, Tibor and Rupp, Andy}, year={2016}, pages={146--168} }'
  chicago: Hofheinz, Dennis, Tibor Jager, and Andy Rupp. “Public-Key Encryption with
    Simulation-Based Selective-Opening Security and Compact Ciphertexts.” In <i>Theory
    of Cryptography - 14th International Conference, TCC 2016-B, Beijing, China, October
    31 - November 3, 2016, Proceedings, Part II</i>, 146--168, 2016. <a href="https://doi.org/10.1007/978-3-662-53644-5_6">https://doi.org/10.1007/978-3-662-53644-5_6</a>.
  ieee: D. Hofheinz, T. Jager, and A. Rupp, “Public-Key Encryption with Simulation-Based
    Selective-Opening Security and Compact Ciphertexts,” in <i>Theory of Cryptography
    - 14th International Conference, TCC 2016-B, Beijing, China, October 31 - November
    3, 2016, Proceedings, Part II</i>, 2016, pp. 146--168.
  mla: Hofheinz, Dennis, et al. “Public-Key Encryption with Simulation-Based Selective-Opening
    Security and Compact Ciphertexts.” <i>Theory of Cryptography - 14th International
    Conference, TCC 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings,
    Part II</i>, 2016, pp. 146--168, doi:<a href="https://doi.org/10.1007/978-3-662-53644-5_6">10.1007/978-3-662-53644-5_6</a>.
  short: 'D. Hofheinz, T. Jager, A. Rupp, in: Theory of Cryptography - 14th International
    Conference, TCC 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings,
    Part II, 2016, pp. 146--168.'
date_created: 2018-06-07T09:15:51Z
date_updated: 2022-01-06T06:58:57Z
department:
- _id: '558'
doi: 10.1007/978-3-662-53644-5_6
extern: '1'
page: 146--168
publication: Theory of Cryptography - 14th International Conference, TCC 2016-B, Beijing,
  China, October 31 - November 3, 2016, Proceedings, Part II
status: public
title: Public-Key Encryption with Simulation-Based Selective-Opening Security and
  Compact Ciphertexts
type: conference
user_id: '38235'
year: '2016'
...
---
_id: '3119'
author:
- first_name: Dennis
  full_name: Hofheinz, Dennis
  last_name: Hofheinz
- first_name: Tibor
  full_name: Jager, Tibor
  id: '64669'
  last_name: Jager
citation:
  ama: 'Hofheinz D, Jager T. Verifiable Random Functions from Standard Assumptions.
    In: <i>Theory of Cryptography - 13th International Conference, TCC 2016-A, Tel
    Aviv, Israel, January 10-13, 2016, Proceedings, Part I</i>. ; 2016:336--362. doi:<a
    href="https://doi.org/10.1007/978-3-662-49096-9_14">10.1007/978-3-662-49096-9_14</a>'
  apa: Hofheinz, D., &#38; Jager, T. (2016). Verifiable Random Functions from Standard
    Assumptions. In <i>Theory of Cryptography - 13th International Conference, TCC
    2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part I</i> (pp. 336--362).
    <a href="https://doi.org/10.1007/978-3-662-49096-9_14">https://doi.org/10.1007/978-3-662-49096-9_14</a>
  bibtex: '@inproceedings{Hofheinz_Jager_2016, title={Verifiable Random Functions
    from Standard Assumptions}, DOI={<a href="https://doi.org/10.1007/978-3-662-49096-9_14">10.1007/978-3-662-49096-9_14</a>},
    booktitle={Theory of Cryptography - 13th International Conference, TCC 2016-A,
    Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part I}, author={Hofheinz,
    Dennis and Jager, Tibor}, year={2016}, pages={336--362} }'
  chicago: Hofheinz, Dennis, and Tibor Jager. “Verifiable Random Functions from Standard
    Assumptions.” In <i>Theory of Cryptography - 13th International Conference, TCC
    2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part I</i>, 336--362,
    2016. <a href="https://doi.org/10.1007/978-3-662-49096-9_14">https://doi.org/10.1007/978-3-662-49096-9_14</a>.
  ieee: D. Hofheinz and T. Jager, “Verifiable Random Functions from Standard Assumptions,”
    in <i>Theory of Cryptography - 13th International Conference, TCC 2016-A, Tel
    Aviv, Israel, January 10-13, 2016, Proceedings, Part I</i>, 2016, pp. 336--362.
  mla: Hofheinz, Dennis, and Tibor Jager. “Verifiable Random Functions from Standard
    Assumptions.” <i>Theory of Cryptography - 13th International Conference, TCC 2016-A,
    Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part I</i>, 2016, pp. 336--362,
    doi:<a href="https://doi.org/10.1007/978-3-662-49096-9_14">10.1007/978-3-662-49096-9_14</a>.
  short: 'D. Hofheinz, T. Jager, in: Theory of Cryptography - 13th International Conference,
    TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part I, 2016,
    pp. 336--362.'
date_created: 2018-06-07T09:16:30Z
date_updated: 2022-01-06T06:58:57Z
department:
- _id: '558'
doi: 10.1007/978-3-662-49096-9_14
extern: '1'
page: 336--362
publication: Theory of Cryptography - 13th International Conference, TCC 2016-A, Tel
  Aviv, Israel, January 10-13, 2016, Proceedings, Part I
status: public
title: Verifiable Random Functions from Standard Assumptions
type: conference
user_id: '38235'
year: '2016'
...
