@inproceedings{3117, author = {{Bader, Christoph and Jager, Tibor and Li, Yong and Schäge, Sven}}, booktitle = {{Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II}}, pages = {{273----304}}, title = {{{On the Impossibility of Tight Cryptographic Reductions}}}, doi = {{10.1007/978-3-662-49896-5_10}}, year = {{2016}}, } @inproceedings{3118, author = {{Hofheinz, Dennis and Jager, Tibor and Rupp, Andy}}, booktitle = {{Theory of Cryptography - 14th International Conference, TCC 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part II}}, pages = {{146----168}}, title = {{{Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts}}}, doi = {{10.1007/978-3-662-53644-5_6}}, year = {{2016}}, } @inproceedings{3119, author = {{Hofheinz, Dennis and Jager, Tibor}}, booktitle = {{Theory of Cryptography - 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part I}}, pages = {{336----362}}, title = {{{Verifiable Random Functions from Standard Assumptions}}}, doi = {{10.1007/978-3-662-49096-9_14}}, year = {{2016}}, } @article{5446, author = {{Jager, Tibor and Rupp, Andy}}, issn = {{2299-0984}}, journal = {{Proceedings on Privacy Enhancing Technologies}}, number = {{3}}, pages = {{62--82}}, publisher = {{Walter de Gruyter GmbH}}, title = {{{Black-Box Accumulation: Collecting Incentives in a Privacy-Preserving Way}}}, doi = {{10.1515/popets-2016-0016}}, volume = {{2016}}, year = {{2016}}, } @inbook{2921, author = {{Blazy, Olivier and Kakvi, Saqib and Kiltz, Eike and Pan, Jiaxin}}, booktitle = {{Lecture Notes in Computer Science}}, isbn = {{9783662464465}}, issn = {{0302-9743}}, pages = {{256--279}}, publisher = {{Springer Berlin Heidelberg}}, title = {{{Tightly-Secure Signatures from Chameleon Hash Functions}}}, doi = {{10.1007/978-3-662-46447-2_12}}, year = {{2015}}, } @article{3120, author = {{Böhl, Florian and Hofheinz, Dennis and Jager, Tibor and Koch, Jessica and Striecks, Christoph}}, journal = {{J. Cryptology}}, number = {{1}}, pages = {{176----208}}, title = {{{Confined Guessing: New Signatures From Standard Assumptions}}}, doi = {{10.1007/s00145-014-9183-z}}, year = {{2015}}, } @inproceedings{3121, author = {{Jager, Tibor and Schwenk, Jörg and Somorovsky, Juraj}}, booktitle = {{Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}}, pages = {{1185----1196}}, title = {{{On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption}}}, doi = {{10.1145/2810103.2813657}}, year = {{2015}}, } @inproceedings{3122, author = {{Jager, Tibor and Schwenk, Jörg and Somorovsky, Juraj}}, booktitle = {{Computer Security - ESORICS 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I}}, pages = {{407----425}}, title = {{{Practical Invalid Curve Attacks on TLS-ECDH}}}, doi = {{10.1007/978-3-319-24174-6_21}}, year = {{2015}}, } @inproceedings{3123, author = {{Heuer, Felix and Jager, Tibor and Kiltz, Eike and Schäge, Sven}}, booktitle = {{Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings}}, pages = {{27----51}}, title = {{{On the Selective Opening Security of Practical Public-Key Encryption Schemes}}}, doi = {{10.1007/978-3-662-46447-2_2}}, year = {{2015}}, } @inproceedings{3124, author = {{Bergsma, Florian and Jager, Tibor and Schwenk, Jörg}}, booktitle = {{Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings}}, pages = {{477----494}}, title = {{{One-Round Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model}}}, doi = {{10.1007/978-3-662-46447-2_21}}, year = {{2015}}, } @inproceedings{3125, author = {{Jager, Tibor}}, booktitle = {{Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {II}}}, pages = {{121----143}}, title = {{{Verifiable Random Functions from Weaker Assumptions}}}, doi = {{10.1007/978-3-662-46497-7_5}}, year = {{2015}}, } @inproceedings{3126, author = {{Bader, Christoph and Hofheinz, Dennis and Jager, Tibor and Kiltz, Eike and Li, Yong}}, booktitle = {{Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I}}, pages = {{629----658}}, title = {{{Tightly-Secure Authenticated Key Exchange}}}, doi = {{10.1007/978-3-662-46494-6_26}}, year = {{2015}}, } @article{3127, author = {{Jager, Tibor}}, journal = {{Datenschutz und Datensicherheit}}, number = {{7}}, pages = {{445----451}}, title = {{{Die Zukunft der Kryptographie}}}, doi = {{10.1007/s11623-014-0204-8}}, year = {{2014}}, } @inproceedings{3128, author = {{Fleischhacker, Nils and Jager, Tibor and Schröder, Dominique}}, booktitle = {{Advances in Cryptology - ASIACRYPT 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part I}}, pages = {{512----531}}, title = {{{On Tight Security Proofs for Schnorr Signatures}}}, doi = {{10.1007/978-3-662-45611-8_27}}, year = {{2014}}, } @article{3129, author = {{Jager, Tibor and Schwenk, Jörg}}, journal = {{J. Cryptology}}, number = {{2}}, pages = {{225----245}}, title = {{{On the Analysis of Cryptographic Assumptions in the Generic Ring Model}}}, doi = {{10.1007/s00145-012-9120-y}}, year = {{2013}}, } @inproceedings{3130, author = {{Böhl, Florian and Hofheinz, Dennis and Jager, Tibor and Koch, Jessica and Hong Seo, Jae and Striecks, Christoph}}, booktitle = {{Advances in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings}}, pages = {{461----485}}, title = {{{Practical Signatures from Standard Assumptions}}}, doi = {{10.1007/978-3-642-38348-9_28}}, year = {{2013}}, } @inproceedings{3131, author = {{Jager, Tibor and Paterson, Kenneth G. and Somorovsky, Juraj}}, booktitle = {{20th Annual Network and Distributed System Security Symposium, NDSS 2013, San Diego, California, USA, February 24-27, 2013}}, title = {{{One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography}}}, year = {{2013}}, } @inbook{2918, author = {{Kakvi, Saqib and Kiltz, Eike and May, Alexander}}, booktitle = {{Advances in Cryptology – ASIACRYPT 2012}}, isbn = {{9783642349607}}, issn = {{0302-9743}}, pages = {{404--414}}, publisher = {{Springer Berlin Heidelberg}}, title = {{{Certifying RSA}}}, doi = {{10.1007/978-3-642-34961-4_25}}, year = {{2012}}, } @inbook{2919, author = {{Kakvi, Saqib and Kiltz, Eike}}, booktitle = {{Advances in Cryptology – EUROCRYPT 2012}}, isbn = {{9783642290107}}, issn = {{0302-9743}}, pages = {{537--553}}, publisher = {{Springer Berlin Heidelberg}}, title = {{{Optimal Security Proofs for Full Domain Hash, Revisited}}}, doi = {{10.1007/978-3-642-29011-4_32}}, year = {{2012}}, } @phdthesis{3132, author = {{Jager, Tibor}}, isbn = {{978-3-8348-1989-5}}, publisher = {{Ruhr University Bochum}}, title = {{{On black-box models of computation in cryptology}}}, year = {{2012}}, }