[{"citation":{"short":"C. Bader, T. Jager, Y. Li, S. Schäge, in: Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II, 2016, pp. 273--304.","mla":"Bader, Christoph, et al. “On the Impossibility of Tight Cryptographic Reductions.” <i>Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II</i>, 2016, pp. 273--304, doi:<a href=\"https://doi.org/10.1007/978-3-662-49896-5_10\">10.1007/978-3-662-49896-5_10</a>.","bibtex":"@inproceedings{Bader_Jager_Li_Schäge_2016, title={On the Impossibility of Tight Cryptographic Reductions}, DOI={<a href=\"https://doi.org/10.1007/978-3-662-49896-5_10\">10.1007/978-3-662-49896-5_10</a>}, booktitle={Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II}, author={Bader, Christoph and Jager, Tibor and Li, Yong and Schäge, Sven}, year={2016}, pages={273--304} }","apa":"Bader, C., Jager, T., Li, Y., &#38; Schäge, S. (2016). On the Impossibility of Tight Cryptographic Reductions. In <i>Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II</i> (pp. 273--304). <a href=\"https://doi.org/10.1007/978-3-662-49896-5_10\">https://doi.org/10.1007/978-3-662-49896-5_10</a>","ama":"Bader C, Jager T, Li Y, Schäge S. On the Impossibility of Tight Cryptographic Reductions. In: <i>Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II</i>. ; 2016:273--304. doi:<a href=\"https://doi.org/10.1007/978-3-662-49896-5_10\">10.1007/978-3-662-49896-5_10</a>","chicago":"Bader, Christoph, Tibor Jager, Yong Li, and Sven Schäge. “On the Impossibility of Tight Cryptographic Reductions.” In <i>Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II</i>, 273--304, 2016. <a href=\"https://doi.org/10.1007/978-3-662-49896-5_10\">https://doi.org/10.1007/978-3-662-49896-5_10</a>.","ieee":"C. Bader, T. Jager, Y. Li, and S. Schäge, “On the Impossibility of Tight Cryptographic Reductions,” in <i>Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II</i>, 2016, pp. 273--304."},"page":"273--304","year":"2016","doi":"10.1007/978-3-662-49896-5_10","title":"On the Impossibility of Tight Cryptographic Reductions","author":[{"full_name":"Bader, Christoph","last_name":"Bader","first_name":"Christoph"},{"id":"64669","full_name":"Jager, Tibor","last_name":"Jager","first_name":"Tibor"},{"full_name":"Li, Yong","last_name":"Li","first_name":"Yong"},{"last_name":"Schäge","full_name":"Schäge, Sven","first_name":"Sven"}],"date_created":"2018-06-07T09:15:15Z","date_updated":"2022-01-06T06:58:57Z","status":"public","type":"conference","publication":"Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II","extern":"1","user_id":"38235","department":[{"_id":"558"}],"_id":"3117"},{"year":"2016","citation":{"apa":"Hofheinz, D., Jager, T., &#38; Rupp, A. (2016). Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts. In <i>Theory of Cryptography - 14th International Conference, TCC 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part II</i> (pp. 146--168). <a href=\"https://doi.org/10.1007/978-3-662-53644-5_6\">https://doi.org/10.1007/978-3-662-53644-5_6</a>","mla":"Hofheinz, Dennis, et al. “Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts.” <i>Theory of Cryptography - 14th International Conference, TCC 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part II</i>, 2016, pp. 146--168, doi:<a href=\"https://doi.org/10.1007/978-3-662-53644-5_6\">10.1007/978-3-662-53644-5_6</a>.","bibtex":"@inproceedings{Hofheinz_Jager_Rupp_2016, title={Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts}, DOI={<a href=\"https://doi.org/10.1007/978-3-662-53644-5_6\">10.1007/978-3-662-53644-5_6</a>}, booktitle={Theory of Cryptography - 14th International Conference, TCC 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part II}, author={Hofheinz, Dennis and Jager, Tibor and Rupp, Andy}, year={2016}, pages={146--168} }","short":"D. Hofheinz, T. Jager, A. Rupp, in: Theory of Cryptography - 14th International Conference, TCC 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part II, 2016, pp. 146--168.","ama":"Hofheinz D, Jager T, Rupp A. Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts. In: <i>Theory of Cryptography - 14th International Conference, TCC 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part II</i>. ; 2016:146--168. doi:<a href=\"https://doi.org/10.1007/978-3-662-53644-5_6\">10.1007/978-3-662-53644-5_6</a>","chicago":"Hofheinz, Dennis, Tibor Jager, and Andy Rupp. “Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts.” In <i>Theory of Cryptography - 14th International Conference, TCC 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part II</i>, 146--168, 2016. <a href=\"https://doi.org/10.1007/978-3-662-53644-5_6\">https://doi.org/10.1007/978-3-662-53644-5_6</a>.","ieee":"D. Hofheinz, T. Jager, and A. Rupp, “Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts,” in <i>Theory of Cryptography - 14th International Conference, TCC 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part II</i>, 2016, pp. 146--168."},"page":"146--168","title":"Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts","doi":"10.1007/978-3-662-53644-5_6","date_updated":"2022-01-06T06:58:57Z","date_created":"2018-06-07T09:15:51Z","author":[{"full_name":"Hofheinz, Dennis","last_name":"Hofheinz","first_name":"Dennis"},{"full_name":"Jager, Tibor","id":"64669","last_name":"Jager","first_name":"Tibor"},{"last_name":"Rupp","full_name":"Rupp, Andy","first_name":"Andy"}],"status":"public","type":"conference","publication":"Theory of Cryptography - 14th International Conference, TCC 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part II","extern":"1","_id":"3118","user_id":"38235","department":[{"_id":"558"}]},{"title":"Verifiable Random Functions from Standard Assumptions","doi":"10.1007/978-3-662-49096-9_14","date_updated":"2022-01-06T06:58:57Z","author":[{"first_name":"Dennis","last_name":"Hofheinz","full_name":"Hofheinz, Dennis"},{"first_name":"Tibor","last_name":"Jager","full_name":"Jager, Tibor","id":"64669"}],"date_created":"2018-06-07T09:16:30Z","year":"2016","page":"336--362","citation":{"chicago":"Hofheinz, Dennis, and Tibor Jager. “Verifiable Random Functions from Standard Assumptions.” In <i>Theory of Cryptography - 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part I</i>, 336--362, 2016. <a href=\"https://doi.org/10.1007/978-3-662-49096-9_14\">https://doi.org/10.1007/978-3-662-49096-9_14</a>.","ieee":"D. Hofheinz and T. Jager, “Verifiable Random Functions from Standard Assumptions,” in <i>Theory of Cryptography - 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part I</i>, 2016, pp. 336--362.","ama":"Hofheinz D, Jager T. Verifiable Random Functions from Standard Assumptions. In: <i>Theory of Cryptography - 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part I</i>. ; 2016:336--362. doi:<a href=\"https://doi.org/10.1007/978-3-662-49096-9_14\">10.1007/978-3-662-49096-9_14</a>","apa":"Hofheinz, D., &#38; Jager, T. (2016). Verifiable Random Functions from Standard Assumptions. In <i>Theory of Cryptography - 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part I</i> (pp. 336--362). <a href=\"https://doi.org/10.1007/978-3-662-49096-9_14\">https://doi.org/10.1007/978-3-662-49096-9_14</a>","mla":"Hofheinz, Dennis, and Tibor Jager. “Verifiable Random Functions from Standard Assumptions.” <i>Theory of Cryptography - 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part I</i>, 2016, pp. 336--362, doi:<a href=\"https://doi.org/10.1007/978-3-662-49096-9_14\">10.1007/978-3-662-49096-9_14</a>.","bibtex":"@inproceedings{Hofheinz_Jager_2016, title={Verifiable Random Functions from Standard Assumptions}, DOI={<a href=\"https://doi.org/10.1007/978-3-662-49096-9_14\">10.1007/978-3-662-49096-9_14</a>}, booktitle={Theory of Cryptography - 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part I}, author={Hofheinz, Dennis and Jager, Tibor}, year={2016}, pages={336--362} }","short":"D. Hofheinz, T. Jager, in: Theory of Cryptography - 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part I, 2016, pp. 336--362."},"extern":"1","_id":"3119","department":[{"_id":"558"}],"user_id":"38235","status":"public","publication":"Theory of Cryptography - 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part I","type":"conference"},{"ddc":["006"],"language":[{"iso":"eng"}],"file":[{"content_type":"application/pdf","success":1,"relation":"main_file","date_updated":"2018-11-08T13:04:30Z","creator":"abirke","date_created":"2018-11-08T13:04:30Z","file_size":750585,"file_id":"5447","access_level":"closed","file_name":"Black-Box_Accumulation__Collecting_Incentives_in_a_Privacy-Preserving_Way.pdf"}],"publication":"Proceedings on Privacy Enhancing Technologies","title":"Black-Box Accumulation: Collecting Incentives in a Privacy-Preserving Way","publisher":"Walter de Gruyter GmbH","date_created":"2018-11-08T13:03:39Z","year":"2016","issue":"3","extern":"1","file_date_updated":"2018-11-08T13:04:30Z","_id":"5446","department":[{"_id":"558"}],"user_id":"38235","status":"public","type":"journal_article","doi":"10.1515/popets-2016-0016","main_file_link":[{"url":"https://petsymposium.org/2016/files/papers/Black-Box_Accumulation__Collecting_Incentives_in_a_Privacy-Preserving_Way.pdf"}],"date_updated":"2022-01-06T07:01:54Z","volume":2016,"author":[{"first_name":"Tibor","last_name":"Jager","id":"64669","full_name":"Jager, Tibor"},{"full_name":"Rupp, Andy","last_name":"Rupp","first_name":"Andy"}],"intvolume":"      2016","page":"62-82","citation":{"chicago":"Jager, Tibor, and Andy Rupp. “Black-Box Accumulation: Collecting Incentives in a Privacy-Preserving Way.” <i>Proceedings on Privacy Enhancing Technologies</i> 2016, no. 3 (2016): 62–82. <a href=\"https://doi.org/10.1515/popets-2016-0016\">https://doi.org/10.1515/popets-2016-0016</a>.","ieee":"T. Jager and A. Rupp, “Black-Box Accumulation: Collecting Incentives in a Privacy-Preserving Way,” <i>Proceedings on Privacy Enhancing Technologies</i>, vol. 2016, no. 3, pp. 62–82, 2016.","ama":"Jager T, Rupp A. Black-Box Accumulation: Collecting Incentives in a Privacy-Preserving Way. <i>Proceedings on Privacy Enhancing Technologies</i>. 2016;2016(3):62-82. doi:<a href=\"https://doi.org/10.1515/popets-2016-0016\">10.1515/popets-2016-0016</a>","apa":"Jager, T., &#38; Rupp, A. (2016). Black-Box Accumulation: Collecting Incentives in a Privacy-Preserving Way. <i>Proceedings on Privacy Enhancing Technologies</i>, <i>2016</i>(3), 62–82. <a href=\"https://doi.org/10.1515/popets-2016-0016\">https://doi.org/10.1515/popets-2016-0016</a>","bibtex":"@article{Jager_Rupp_2016, title={Black-Box Accumulation: Collecting Incentives in a Privacy-Preserving Way}, volume={2016}, DOI={<a href=\"https://doi.org/10.1515/popets-2016-0016\">10.1515/popets-2016-0016</a>}, number={3}, journal={Proceedings on Privacy Enhancing Technologies}, publisher={Walter de Gruyter GmbH}, author={Jager, Tibor and Rupp, Andy}, year={2016}, pages={62–82} }","mla":"Jager, Tibor, and Andy Rupp. “Black-Box Accumulation: Collecting Incentives in a Privacy-Preserving Way.” <i>Proceedings on Privacy Enhancing Technologies</i>, vol. 2016, no. 3, Walter de Gruyter GmbH, 2016, pp. 62–82, doi:<a href=\"https://doi.org/10.1515/popets-2016-0016\">10.1515/popets-2016-0016</a>.","short":"T. Jager, A. Rupp, Proceedings on Privacy Enhancing Technologies 2016 (2016) 62–82."},"has_accepted_license":"1","publication_identifier":{"issn":["2299-0984"]},"publication_status":"published"},{"status":"public","type":"book_chapter","publication":"Lecture Notes in Computer Science","extern":"1","_id":"2921","user_id":"66268","department":[{"_id":"558"}],"year":"2015","place":"Berlin, Heidelberg","citation":{"chicago":"Blazy, Olivier, Saqib Kakvi, Eike Kiltz, and Jiaxin Pan. “Tightly-Secure Signatures from Chameleon Hash Functions.” In <i>Lecture Notes in Computer Science</i>, 256–79. Berlin, Heidelberg: Springer Berlin Heidelberg, 2015. <a href=\"https://doi.org/10.1007/978-3-662-46447-2_12\">https://doi.org/10.1007/978-3-662-46447-2_12</a>.","ieee":"O. Blazy, S. Kakvi, E. Kiltz, and J. Pan, “Tightly-Secure Signatures from Chameleon Hash Functions,” in <i>Lecture Notes in Computer Science</i>, Berlin, Heidelberg: Springer Berlin Heidelberg, 2015, pp. 256–279.","ama":"Blazy O, Kakvi S, Kiltz E, Pan J. Tightly-Secure Signatures from Chameleon Hash Functions. In: <i>Lecture Notes in Computer Science</i>. Berlin, Heidelberg: Springer Berlin Heidelberg; 2015:256-279. doi:<a href=\"https://doi.org/10.1007/978-3-662-46447-2_12\">10.1007/978-3-662-46447-2_12</a>","apa":"Blazy, O., Kakvi, S., Kiltz, E., &#38; Pan, J. (2015). Tightly-Secure Signatures from Chameleon Hash Functions. In <i>Lecture Notes in Computer Science</i> (pp. 256–279). Berlin, Heidelberg: Springer Berlin Heidelberg. <a href=\"https://doi.org/10.1007/978-3-662-46447-2_12\">https://doi.org/10.1007/978-3-662-46447-2_12</a>","short":"O. Blazy, S. Kakvi, E. Kiltz, J. Pan, in: Lecture Notes in Computer Science, Springer Berlin Heidelberg, Berlin, Heidelberg, 2015, pp. 256–279.","bibtex":"@inbook{Blazy_Kakvi_Kiltz_Pan_2015, place={Berlin, Heidelberg}, title={Tightly-Secure Signatures from Chameleon Hash Functions}, DOI={<a href=\"https://doi.org/10.1007/978-3-662-46447-2_12\">10.1007/978-3-662-46447-2_12</a>}, booktitle={Lecture Notes in Computer Science}, publisher={Springer Berlin Heidelberg}, author={Blazy, Olivier and Kakvi, Saqib and Kiltz, Eike and Pan, Jiaxin}, year={2015}, pages={256–279} }","mla":"Blazy, Olivier, et al. “Tightly-Secure Signatures from Chameleon Hash Functions.” <i>Lecture Notes in Computer Science</i>, Springer Berlin Heidelberg, 2015, pp. 256–79, doi:<a href=\"https://doi.org/10.1007/978-3-662-46447-2_12\">10.1007/978-3-662-46447-2_12</a>."},"page":"256-279","publication_status":"published","publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783662464465","9783662464472"]},"title":"Tightly-Secure Signatures from Chameleon Hash Functions","main_file_link":[{"open_access":"1","url":"https://eprint.iacr.org/2014/1021.pdf"}],"doi":"10.1007/978-3-662-46447-2_12","date_updated":"2022-01-06T06:58:47Z","publisher":"Springer Berlin Heidelberg","oa":"1","author":[{"last_name":"Blazy","full_name":"Blazy, Olivier","first_name":"Olivier"},{"first_name":"Saqib","id":"66268","full_name":"Kakvi, Saqib","last_name":"Kakvi"},{"full_name":"Kiltz, Eike","last_name":"Kiltz","first_name":"Eike"},{"full_name":"Pan, Jiaxin","last_name":"Pan","first_name":"Jiaxin"}],"date_created":"2018-05-25T12:46:08Z"},{"date_created":"2018-06-07T09:17:17Z","author":[{"last_name":"Böhl","full_name":"Böhl, Florian","first_name":"Florian"},{"last_name":"Hofheinz","full_name":"Hofheinz, Dennis","first_name":"Dennis"},{"last_name":"Jager","full_name":"Jager, Tibor","id":"64669","first_name":"Tibor"},{"full_name":"Koch, Jessica","last_name":"Koch","first_name":"Jessica"},{"last_name":"Striecks","full_name":"Striecks, Christoph","first_name":"Christoph"}],"date_updated":"2022-01-06T06:58:57Z","doi":"10.1007/s00145-014-9183-z","title":"Confined Guessing: New Signatures From Standard Assumptions","issue":"1","page":"176--208","citation":{"mla":"Böhl, Florian, et al. “Confined Guessing: New Signatures From Standard Assumptions.” <i>J. Cryptology</i>, no. 1, 2015, pp. 176--208, doi:<a href=\"https://doi.org/10.1007/s00145-014-9183-z\">10.1007/s00145-014-9183-z</a>.","short":"F. Böhl, D. Hofheinz, T. Jager, J. Koch, C. Striecks, J. Cryptology (2015) 176--208.","bibtex":"@article{Böhl_Hofheinz_Jager_Koch_Striecks_2015, title={Confined Guessing: New Signatures From Standard Assumptions}, DOI={<a href=\"https://doi.org/10.1007/s00145-014-9183-z\">10.1007/s00145-014-9183-z</a>}, number={1}, journal={J. Cryptology}, author={Böhl, Florian and Hofheinz, Dennis and Jager, Tibor and Koch, Jessica and Striecks, Christoph}, year={2015}, pages={176--208} }","apa":"Böhl, F., Hofheinz, D., Jager, T., Koch, J., &#38; Striecks, C. (2015). Confined Guessing: New Signatures From Standard Assumptions. <i>J. Cryptology</i>, (1), 176--208. <a href=\"https://doi.org/10.1007/s00145-014-9183-z\">https://doi.org/10.1007/s00145-014-9183-z</a>","ama":"Böhl F, Hofheinz D, Jager T, Koch J, Striecks C. Confined Guessing: New Signatures From Standard Assumptions. <i>J Cryptology</i>. 2015;(1):176--208. doi:<a href=\"https://doi.org/10.1007/s00145-014-9183-z\">10.1007/s00145-014-9183-z</a>","chicago":"Böhl, Florian, Dennis Hofheinz, Tibor Jager, Jessica Koch, and Christoph Striecks. “Confined Guessing: New Signatures From Standard Assumptions.” <i>J. Cryptology</i>, no. 1 (2015): 176--208. <a href=\"https://doi.org/10.1007/s00145-014-9183-z\">https://doi.org/10.1007/s00145-014-9183-z</a>.","ieee":"F. Böhl, D. Hofheinz, T. Jager, J. Koch, and C. Striecks, “Confined Guessing: New Signatures From Standard Assumptions,” <i>J. Cryptology</i>, no. 1, pp. 176--208, 2015."},"year":"2015","department":[{"_id":"558"}],"user_id":"38235","_id":"3120","extern":"1","publication":"J. Cryptology","type":"journal_article","status":"public"},{"date_updated":"2022-01-06T06:58:57Z","author":[{"first_name":"Tibor","last_name":"Jager","full_name":"Jager, Tibor","id":"64669"},{"last_name":"Schwenk","full_name":"Schwenk, Jörg","first_name":"Jörg"},{"full_name":"Somorovsky, Juraj","last_name":"Somorovsky","first_name":"Juraj"}],"date_created":"2018-06-07T09:17:47Z","title":"On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption","doi":"10.1145/2810103.2813657","year":"2015","page":"1185--1196","citation":{"ama":"Jager T, Schwenk J, Somorovsky J. On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption. In: <i>Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015</i>. ; 2015:1185--1196. doi:<a href=\"https://doi.org/10.1145/2810103.2813657\">10.1145/2810103.2813657</a>","chicago":"Jager, Tibor, Jörg Schwenk, and Juraj Somorovsky. “On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption.” In <i>Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015</i>, 1185--1196, 2015. <a href=\"https://doi.org/10.1145/2810103.2813657\">https://doi.org/10.1145/2810103.2813657</a>.","ieee":"T. Jager, J. Schwenk, and J. Somorovsky, “On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption,” in <i>Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015</i>, 2015, pp. 1185--1196.","apa":"Jager, T., Schwenk, J., &#38; Somorovsky, J. (2015). On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption. In <i>Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015</i> (pp. 1185--1196). <a href=\"https://doi.org/10.1145/2810103.2813657\">https://doi.org/10.1145/2810103.2813657</a>","short":"T. Jager, J. Schwenk, J. Somorovsky, in: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015, 2015, pp. 1185--1196.","bibtex":"@inproceedings{Jager_Schwenk_Somorovsky_2015, title={On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption}, DOI={<a href=\"https://doi.org/10.1145/2810103.2813657\">10.1145/2810103.2813657</a>}, booktitle={Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, author={Jager, Tibor and Schwenk, Jörg and Somorovsky, Juraj}, year={2015}, pages={1185--1196} }","mla":"Jager, Tibor, et al. “On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption.” <i>Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015</i>, 2015, pp. 1185--1196, doi:<a href=\"https://doi.org/10.1145/2810103.2813657\">10.1145/2810103.2813657</a>."},"_id":"3121","department":[{"_id":"558"}],"user_id":"38235","extern":"1","publication":"Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015","type":"conference","status":"public"},{"department":[{"_id":"558"}],"user_id":"38235","_id":"3122","extern":"1","publication":"Computer Security - ESORICS 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I","type":"conference","status":"public","date_created":"2018-06-07T09:18:33Z","author":[{"first_name":"Tibor","last_name":"Jager","full_name":"Jager, Tibor","id":"64669"},{"first_name":"Jörg","full_name":"Schwenk, Jörg","last_name":"Schwenk"},{"full_name":"Somorovsky, Juraj","last_name":"Somorovsky","first_name":"Juraj"}],"date_updated":"2022-01-06T06:58:57Z","doi":"10.1007/978-3-319-24174-6_21","title":"Practical Invalid Curve Attacks on TLS-ECDH","page":"407--425","citation":{"ieee":"T. Jager, J. Schwenk, and J. Somorovsky, “Practical Invalid Curve Attacks on TLS-ECDH,” in <i>Computer Security - ESORICS 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I</i>, 2015, pp. 407--425.","chicago":"Jager, Tibor, Jörg Schwenk, and Juraj Somorovsky. “Practical Invalid Curve Attacks on TLS-ECDH.” In <i>Computer Security - ESORICS 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I</i>, 407--425, 2015. <a href=\"https://doi.org/10.1007/978-3-319-24174-6_21\">https://doi.org/10.1007/978-3-319-24174-6_21</a>.","ama":"Jager T, Schwenk J, Somorovsky J. Practical Invalid Curve Attacks on TLS-ECDH. In: <i>Computer Security - ESORICS 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I</i>. ; 2015:407--425. doi:<a href=\"https://doi.org/10.1007/978-3-319-24174-6_21\">10.1007/978-3-319-24174-6_21</a>","short":"T. Jager, J. Schwenk, J. Somorovsky, in: Computer Security - ESORICS 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I, 2015, pp. 407--425.","bibtex":"@inproceedings{Jager_Schwenk_Somorovsky_2015, title={Practical Invalid Curve Attacks on TLS-ECDH}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-24174-6_21\">10.1007/978-3-319-24174-6_21</a>}, booktitle={Computer Security - ESORICS 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I}, author={Jager, Tibor and Schwenk, Jörg and Somorovsky, Juraj}, year={2015}, pages={407--425} }","mla":"Jager, Tibor, et al. “Practical Invalid Curve Attacks on TLS-ECDH.” <i>Computer Security - ESORICS 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I</i>, 2015, pp. 407--425, doi:<a href=\"https://doi.org/10.1007/978-3-319-24174-6_21\">10.1007/978-3-319-24174-6_21</a>.","apa":"Jager, T., Schwenk, J., &#38; Somorovsky, J. (2015). Practical Invalid Curve Attacks on TLS-ECDH. In <i>Computer Security - ESORICS 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I</i> (pp. 407--425). <a href=\"https://doi.org/10.1007/978-3-319-24174-6_21\">https://doi.org/10.1007/978-3-319-24174-6_21</a>"},"year":"2015"},{"date_updated":"2022-01-06T06:58:57Z","author":[{"first_name":"Felix","full_name":"Heuer, Felix","last_name":"Heuer"},{"full_name":"Jager, Tibor","id":"64669","last_name":"Jager","first_name":"Tibor"},{"first_name":"Eike","last_name":"Kiltz","full_name":"Kiltz, Eike"},{"first_name":"Sven","last_name":"Schäge","full_name":"Schäge, Sven"}],"date_created":"2018-06-07T09:19:04Z","title":"On the Selective Opening Security of Practical Public-Key Encryption Schemes","doi":"10.1007/978-3-662-46447-2_2","year":"2015","citation":{"apa":"Heuer, F., Jager, T., Kiltz, E., &#38; Schäge, S. (2015). On the Selective Opening Security of Practical Public-Key Encryption Schemes. In <i>Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings</i> (pp. 27--51). <a href=\"https://doi.org/10.1007/978-3-662-46447-2_2\">https://doi.org/10.1007/978-3-662-46447-2_2</a>","bibtex":"@inproceedings{Heuer_Jager_Kiltz_Schäge_2015, title={On the Selective Opening Security of Practical Public-Key Encryption Schemes}, DOI={<a href=\"https://doi.org/10.1007/978-3-662-46447-2_2\">10.1007/978-3-662-46447-2_2</a>}, booktitle={Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings}, author={Heuer, Felix and Jager, Tibor and Kiltz, Eike and Schäge, Sven}, year={2015}, pages={27--51} }","mla":"Heuer, Felix, et al. “On the Selective Opening Security of Practical Public-Key Encryption Schemes.” <i>Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings</i>, 2015, pp. 27--51, doi:<a href=\"https://doi.org/10.1007/978-3-662-46447-2_2\">10.1007/978-3-662-46447-2_2</a>.","short":"F. Heuer, T. Jager, E. Kiltz, S. Schäge, in: Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings, 2015, pp. 27--51.","ama":"Heuer F, Jager T, Kiltz E, Schäge S. On the Selective Opening Security of Practical Public-Key Encryption Schemes. In: <i>Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings</i>. ; 2015:27--51. doi:<a href=\"https://doi.org/10.1007/978-3-662-46447-2_2\">10.1007/978-3-662-46447-2_2</a>","chicago":"Heuer, Felix, Tibor Jager, Eike Kiltz, and Sven Schäge. “On the Selective Opening Security of Practical Public-Key Encryption Schemes.” In <i>Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings</i>, 27--51, 2015. <a href=\"https://doi.org/10.1007/978-3-662-46447-2_2\">https://doi.org/10.1007/978-3-662-46447-2_2</a>.","ieee":"F. Heuer, T. Jager, E. Kiltz, and S. Schäge, “On the Selective Opening Security of Practical Public-Key Encryption Schemes,” in <i>Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings</i>, 2015, pp. 27--51."},"page":"27--51","_id":"3123","user_id":"38235","department":[{"_id":"558"}],"extern":"1","type":"conference","publication":"Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings","status":"public"},{"year":"2015","citation":{"short":"F. Bergsma, T. Jager, J. Schwenk, in: Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings, 2015, pp. 477--494.","bibtex":"@inproceedings{Bergsma_Jager_Schwenk_2015, title={One-Round Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model}, DOI={<a href=\"https://doi.org/10.1007/978-3-662-46447-2_21\">10.1007/978-3-662-46447-2_21</a>}, booktitle={Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings}, author={Bergsma, Florian and Jager, Tibor and Schwenk, Jörg}, year={2015}, pages={477--494} }","mla":"Bergsma, Florian, et al. “One-Round Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model.” <i>Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings</i>, 2015, pp. 477--494, doi:<a href=\"https://doi.org/10.1007/978-3-662-46447-2_21\">10.1007/978-3-662-46447-2_21</a>.","apa":"Bergsma, F., Jager, T., &#38; Schwenk, J. (2015). One-Round Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model. In <i>Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings</i> (pp. 477--494). <a href=\"https://doi.org/10.1007/978-3-662-46447-2_21\">https://doi.org/10.1007/978-3-662-46447-2_21</a>","ama":"Bergsma F, Jager T, Schwenk J. One-Round Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model. In: <i>Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings</i>. ; 2015:477--494. doi:<a href=\"https://doi.org/10.1007/978-3-662-46447-2_21\">10.1007/978-3-662-46447-2_21</a>","chicago":"Bergsma, Florian, Tibor Jager, and Jörg Schwenk. “One-Round Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model.” In <i>Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings</i>, 477--494, 2015. <a href=\"https://doi.org/10.1007/978-3-662-46447-2_21\">https://doi.org/10.1007/978-3-662-46447-2_21</a>.","ieee":"F. Bergsma, T. Jager, and J. Schwenk, “One-Round Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model,” in <i>Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings</i>, 2015, pp. 477--494."},"page":"477--494","title":"One-Round Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model","doi":"10.1007/978-3-662-46447-2_21","date_updated":"2022-01-06T06:58:57Z","date_created":"2018-06-07T09:19:47Z","author":[{"first_name":"Florian","last_name":"Bergsma","full_name":"Bergsma, Florian"},{"last_name":"Jager","full_name":"Jager, Tibor","id":"64669","first_name":"Tibor"},{"first_name":"Jörg","last_name":"Schwenk","full_name":"Schwenk, Jörg"}],"status":"public","type":"conference","publication":"Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings","extern":"1","_id":"3124","user_id":"38235","department":[{"_id":"558"}]},{"year":"2015","citation":{"chicago":"Jager, Tibor. “Verifiable Random Functions from Weaker Assumptions.” In <i>Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {II}</i>, 121--143, 2015. <a href=\"https://doi.org/10.1007/978-3-662-46497-7_5\">https://doi.org/10.1007/978-3-662-46497-7_5</a>.","ieee":"T. Jager, “Verifiable Random Functions from Weaker Assumptions,” in <i>Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {II}</i>, 2015, pp. 121--143.","ama":"Jager T. Verifiable Random Functions from Weaker Assumptions. In: <i>Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {II}</i>. ; 2015:121--143. doi:<a href=\"https://doi.org/10.1007/978-3-662-46497-7_5\">10.1007/978-3-662-46497-7_5</a>","short":"T. Jager, in: Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {II}, 2015, pp. 121--143.","mla":"Jager, Tibor. “Verifiable Random Functions from Weaker Assumptions.” <i>Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {II}</i>, 2015, pp. 121--143, doi:<a href=\"https://doi.org/10.1007/978-3-662-46497-7_5\">10.1007/978-3-662-46497-7_5</a>.","bibtex":"@inproceedings{Jager_2015, title={Verifiable Random Functions from Weaker Assumptions}, DOI={<a href=\"https://doi.org/10.1007/978-3-662-46497-7_5\">10.1007/978-3-662-46497-7_5</a>}, booktitle={Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {II}}, author={Jager, Tibor}, year={2015}, pages={121--143} }","apa":"Jager, T. (2015). Verifiable Random Functions from Weaker Assumptions. In <i>Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {II}</i> (pp. 121--143). <a href=\"https://doi.org/10.1007/978-3-662-46497-7_5\">https://doi.org/10.1007/978-3-662-46497-7_5</a>"},"page":"121--143","date_updated":"2022-01-06T06:58:57Z","author":[{"first_name":"Tibor","full_name":"Jager, Tibor","id":"64669","last_name":"Jager"}],"date_created":"2018-06-07T09:20:19Z","title":"Verifiable Random Functions from Weaker Assumptions","doi":"10.1007/978-3-662-46497-7_5","type":"conference","publication":"Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {II}","status":"public","_id":"3125","user_id":"38235","department":[{"_id":"558"}],"extern":"1"},{"doi":"10.1007/978-3-662-46494-6_26","title":"Tightly-Secure Authenticated Key Exchange","author":[{"first_name":"Christoph","last_name":"Bader","full_name":"Bader, Christoph"},{"first_name":"Dennis","last_name":"Hofheinz","full_name":"Hofheinz, Dennis"},{"first_name":"Tibor","full_name":"Jager, Tibor","id":"64669","last_name":"Jager"},{"first_name":"Eike","last_name":"Kiltz","full_name":"Kiltz, Eike"},{"full_name":"Li, Yong","last_name":"Li","first_name":"Yong"}],"date_created":"2018-06-07T09:20:48Z","date_updated":"2022-01-06T06:58:57Z","page":"629--658","citation":{"ieee":"C. Bader, D. Hofheinz, T. Jager, E. Kiltz, and Y. Li, “Tightly-Secure Authenticated Key Exchange,” in <i>Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I</i>, 2015, pp. 629--658.","chicago":"Bader, Christoph, Dennis Hofheinz, Tibor Jager, Eike Kiltz, and Yong Li. “Tightly-Secure Authenticated Key Exchange.” In <i>Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I</i>, 629--658, 2015. <a href=\"https://doi.org/10.1007/978-3-662-46494-6_26\">https://doi.org/10.1007/978-3-662-46494-6_26</a>.","ama":"Bader C, Hofheinz D, Jager T, Kiltz E, Li Y. Tightly-Secure Authenticated Key Exchange. In: <i>Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I</i>. ; 2015:629--658. doi:<a href=\"https://doi.org/10.1007/978-3-662-46494-6_26\">10.1007/978-3-662-46494-6_26</a>","bibtex":"@inproceedings{Bader_Hofheinz_Jager_Kiltz_Li_2015, title={Tightly-Secure Authenticated Key Exchange}, DOI={<a href=\"https://doi.org/10.1007/978-3-662-46494-6_26\">10.1007/978-3-662-46494-6_26</a>}, booktitle={Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I}, author={Bader, Christoph and Hofheinz, Dennis and Jager, Tibor and Kiltz, Eike and Li, Yong}, year={2015}, pages={629--658} }","short":"C. Bader, D. Hofheinz, T. Jager, E. Kiltz, Y. Li, in: Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I, 2015, pp. 629--658.","mla":"Bader, Christoph, et al. “Tightly-Secure Authenticated Key Exchange.” <i>Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I</i>, 2015, pp. 629--658, doi:<a href=\"https://doi.org/10.1007/978-3-662-46494-6_26\">10.1007/978-3-662-46494-6_26</a>.","apa":"Bader, C., Hofheinz, D., Jager, T., Kiltz, E., &#38; Li, Y. (2015). Tightly-Secure Authenticated Key Exchange. In <i>Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I</i> (pp. 629--658). <a href=\"https://doi.org/10.1007/978-3-662-46494-6_26\">https://doi.org/10.1007/978-3-662-46494-6_26</a>"},"year":"2015","extern":"1","department":[{"_id":"558"}],"user_id":"38235","_id":"3126","status":"public","publication":"Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I","type":"conference"},{"extern":"1","_id":"3127","user_id":"38235","department":[{"_id":"558"}],"status":"public","type":"journal_article","publication":"Datenschutz und Datensicherheit","title":"Die Zukunft der Kryptographie","doi":"10.1007/s11623-014-0204-8","date_updated":"2022-01-06T06:58:57Z","author":[{"first_name":"Tibor","id":"64669","full_name":"Jager, Tibor","last_name":"Jager"}],"date_created":"2018-06-07T09:21:18Z","year":"2014","citation":{"apa":"Jager, T. (2014). Die Zukunft der Kryptographie. <i>Datenschutz Und Datensicherheit</i>, (7), 445--451. <a href=\"https://doi.org/10.1007/s11623-014-0204-8\">https://doi.org/10.1007/s11623-014-0204-8</a>","mla":"Jager, Tibor. “Die Zukunft Der Kryptographie.” <i>Datenschutz Und Datensicherheit</i>, no. 7, 2014, pp. 445--451, doi:<a href=\"https://doi.org/10.1007/s11623-014-0204-8\">10.1007/s11623-014-0204-8</a>.","bibtex":"@article{Jager_2014, title={Die Zukunft der Kryptographie}, DOI={<a href=\"https://doi.org/10.1007/s11623-014-0204-8\">10.1007/s11623-014-0204-8</a>}, number={7}, journal={Datenschutz und Datensicherheit}, author={Jager, Tibor}, year={2014}, pages={445--451} }","short":"T. Jager, Datenschutz Und Datensicherheit (2014) 445--451.","ama":"Jager T. Die Zukunft der Kryptographie. <i>Datenschutz und Datensicherheit</i>. 2014;(7):445--451. doi:<a href=\"https://doi.org/10.1007/s11623-014-0204-8\">10.1007/s11623-014-0204-8</a>","ieee":"T. Jager, “Die Zukunft der Kryptographie,” <i>Datenschutz und Datensicherheit</i>, no. 7, pp. 445--451, 2014.","chicago":"Jager, Tibor. “Die Zukunft Der Kryptographie.” <i>Datenschutz Und Datensicherheit</i>, no. 7 (2014): 445--451. <a href=\"https://doi.org/10.1007/s11623-014-0204-8\">https://doi.org/10.1007/s11623-014-0204-8</a>."},"page":"445--451","issue":"7"},{"status":"public","type":"conference","publication":"Advances in Cryptology - ASIACRYPT 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part I","extern":"1","user_id":"38235","department":[{"_id":"558"}],"_id":"3128","citation":{"apa":"Fleischhacker, N., Jager, T., &#38; Schröder, D. (2014). On Tight Security Proofs for Schnorr Signatures. In <i>Advances in Cryptology - ASIACRYPT 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part I</i> (pp. 512--531). <a href=\"https://doi.org/10.1007/978-3-662-45611-8_27\">https://doi.org/10.1007/978-3-662-45611-8_27</a>","mla":"Fleischhacker, Nils, et al. “On Tight Security Proofs for Schnorr Signatures.” <i>Advances in Cryptology - ASIACRYPT 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part I</i>, 2014, pp. 512--531, doi:<a href=\"https://doi.org/10.1007/978-3-662-45611-8_27\">10.1007/978-3-662-45611-8_27</a>.","bibtex":"@inproceedings{Fleischhacker_Jager_Schröder_2014, title={On Tight Security Proofs for Schnorr Signatures}, DOI={<a href=\"https://doi.org/10.1007/978-3-662-45611-8_27\">10.1007/978-3-662-45611-8_27</a>}, booktitle={Advances in Cryptology - ASIACRYPT 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part I}, author={Fleischhacker, Nils and Jager, Tibor and Schröder, Dominique}, year={2014}, pages={512--531} }","short":"N. Fleischhacker, T. Jager, D. Schröder, in: Advances in Cryptology - ASIACRYPT 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part I, 2014, pp. 512--531.","ama":"Fleischhacker N, Jager T, Schröder D. On Tight Security Proofs for Schnorr Signatures. In: <i>Advances in Cryptology - ASIACRYPT 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part I</i>. ; 2014:512--531. doi:<a href=\"https://doi.org/10.1007/978-3-662-45611-8_27\">10.1007/978-3-662-45611-8_27</a>","ieee":"N. Fleischhacker, T. Jager, and D. Schröder, “On Tight Security Proofs for Schnorr Signatures,” in <i>Advances in Cryptology - ASIACRYPT 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part I</i>, 2014, pp. 512--531.","chicago":"Fleischhacker, Nils, Tibor Jager, and Dominique Schröder. “On Tight Security Proofs for Schnorr Signatures.” In <i>Advances in Cryptology - ASIACRYPT 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part I</i>, 512--531, 2014. <a href=\"https://doi.org/10.1007/978-3-662-45611-8_27\">https://doi.org/10.1007/978-3-662-45611-8_27</a>."},"page":"512--531","year":"2014","doi":"10.1007/978-3-662-45611-8_27","title":"On Tight Security Proofs for Schnorr Signatures","author":[{"first_name":"Nils","last_name":"Fleischhacker","full_name":"Fleischhacker, Nils"},{"full_name":"Jager, Tibor","id":"64669","last_name":"Jager","first_name":"Tibor"},{"first_name":"Dominique","full_name":"Schröder, Dominique","last_name":"Schröder"}],"date_created":"2018-06-07T09:21:46Z","date_updated":"2022-01-06T06:58:57Z"},{"type":"journal_article","publication":"J. Cryptology","status":"public","_id":"3129","user_id":"38235","department":[{"_id":"558"}],"extern":"1","issue":"2","year":"2013","citation":{"ama":"Jager T, Schwenk J. On the Analysis of Cryptographic Assumptions in the Generic Ring Model. <i>J Cryptology</i>. 2013;(2):225--245. doi:<a href=\"https://doi.org/10.1007/s00145-012-9120-y\">10.1007/s00145-012-9120-y</a>","ieee":"T. Jager and J. Schwenk, “On the Analysis of Cryptographic Assumptions in the Generic Ring Model,” <i>J. Cryptology</i>, no. 2, pp. 225--245, 2013.","chicago":"Jager, Tibor, and Jörg Schwenk. “On the Analysis of Cryptographic Assumptions in the Generic Ring Model.” <i>J. Cryptology</i>, no. 2 (2013): 225--245. <a href=\"https://doi.org/10.1007/s00145-012-9120-y\">https://doi.org/10.1007/s00145-012-9120-y</a>.","apa":"Jager, T., &#38; Schwenk, J. (2013). On the Analysis of Cryptographic Assumptions in the Generic Ring Model. <i>J. Cryptology</i>, (2), 225--245. <a href=\"https://doi.org/10.1007/s00145-012-9120-y\">https://doi.org/10.1007/s00145-012-9120-y</a>","bibtex":"@article{Jager_Schwenk_2013, title={On the Analysis of Cryptographic Assumptions in the Generic Ring Model}, DOI={<a href=\"https://doi.org/10.1007/s00145-012-9120-y\">10.1007/s00145-012-9120-y</a>}, number={2}, journal={J. Cryptology}, author={Jager, Tibor and Schwenk, Jörg}, year={2013}, pages={225--245} }","short":"T. Jager, J. Schwenk, J. Cryptology (2013) 225--245.","mla":"Jager, Tibor, and Jörg Schwenk. “On the Analysis of Cryptographic Assumptions in the Generic Ring Model.” <i>J. Cryptology</i>, no. 2, 2013, pp. 225--245, doi:<a href=\"https://doi.org/10.1007/s00145-012-9120-y\">10.1007/s00145-012-9120-y</a>."},"page":"225--245","date_updated":"2022-01-06T06:58:57Z","date_created":"2018-06-07T09:22:18Z","author":[{"last_name":"Jager","id":"64669","full_name":"Jager, Tibor","first_name":"Tibor"},{"last_name":"Schwenk","full_name":"Schwenk, Jörg","first_name":"Jörg"}],"title":"On the Analysis of Cryptographic Assumptions in the Generic Ring Model","doi":"10.1007/s00145-012-9120-y"},{"status":"public","type":"conference","publication":"Advances in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings","extern":"1","_id":"3130","user_id":"38235","department":[{"_id":"558"}],"year":"2013","citation":{"bibtex":"@inproceedings{Böhl_Hofheinz_Jager_Koch_Hong Seo_Striecks_2013, title={Practical Signatures from Standard Assumptions}, DOI={<a href=\"https://doi.org/10.1007/978-3-642-38348-9_28\">10.1007/978-3-642-38348-9_28</a>}, booktitle={Advances in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings}, author={Böhl, Florian and Hofheinz, Dennis and Jager, Tibor and Koch, Jessica and Hong Seo, Jae and Striecks, Christoph}, year={2013}, pages={461--485} }","short":"F. Böhl, D. Hofheinz, T. Jager, J. Koch, J. Hong Seo, C. Striecks, in: Advances in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings, 2013, pp. 461--485.","mla":"Böhl, Florian, et al. “Practical Signatures from Standard Assumptions.” <i>Advances in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings</i>, 2013, pp. 461--485, doi:<a href=\"https://doi.org/10.1007/978-3-642-38348-9_28\">10.1007/978-3-642-38348-9_28</a>.","apa":"Böhl, F., Hofheinz, D., Jager, T., Koch, J., Hong Seo, J., &#38; Striecks, C. (2013). Practical Signatures from Standard Assumptions. In <i>Advances in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings</i> (pp. 461--485). <a href=\"https://doi.org/10.1007/978-3-642-38348-9_28\">https://doi.org/10.1007/978-3-642-38348-9_28</a>","chicago":"Böhl, Florian, Dennis Hofheinz, Tibor Jager, Jessica Koch, Jae Hong Seo, and Christoph Striecks. “Practical Signatures from Standard Assumptions.” In <i>Advances in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings</i>, 461--485, 2013. <a href=\"https://doi.org/10.1007/978-3-642-38348-9_28\">https://doi.org/10.1007/978-3-642-38348-9_28</a>.","ieee":"F. Böhl, D. Hofheinz, T. Jager, J. Koch, J. Hong Seo, and C. Striecks, “Practical Signatures from Standard Assumptions,” in <i>Advances in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings</i>, 2013, pp. 461--485.","ama":"Böhl F, Hofheinz D, Jager T, Koch J, Hong Seo J, Striecks C. Practical Signatures from Standard Assumptions. In: <i>Advances in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings</i>. ; 2013:461--485. doi:<a href=\"https://doi.org/10.1007/978-3-642-38348-9_28\">10.1007/978-3-642-38348-9_28</a>"},"page":"461--485","title":"Practical Signatures from Standard Assumptions","doi":"10.1007/978-3-642-38348-9_28","date_updated":"2022-01-06T06:58:58Z","author":[{"full_name":"Böhl, Florian","last_name":"Böhl","first_name":"Florian"},{"first_name":"Dennis","last_name":"Hofheinz","full_name":"Hofheinz, Dennis"},{"id":"64669","full_name":"Jager, Tibor","last_name":"Jager","first_name":"Tibor"},{"first_name":"Jessica","last_name":"Koch","full_name":"Koch, Jessica"},{"first_name":"Jae","last_name":"Hong Seo","full_name":"Hong Seo, Jae"},{"first_name":"Christoph","last_name":"Striecks","full_name":"Striecks, Christoph"}],"date_created":"2018-06-07T09:22:39Z"},{"year":"2013","citation":{"ama":"Jager T, Paterson KG, Somorovsky J. One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography. In: <i>20th Annual Network and Distributed System Security Symposium, NDSS 2013, San Diego, California, USA, February 24-27, 2013</i>. ; 2013.","chicago":"Jager, Tibor, Kenneth G. Paterson, and Juraj Somorovsky. “One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography.” In <i>20th Annual Network and Distributed System Security Symposium, NDSS 2013, San Diego, California, USA, February 24-27, 2013</i>, 2013.","ieee":"T. Jager, K. G. Paterson, and J. Somorovsky, “One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography,” in <i>20th Annual Network and Distributed System Security Symposium, NDSS 2013, San Diego, California, USA, February 24-27, 2013</i>, 2013.","apa":"Jager, T., Paterson, K. G., &#38; Somorovsky, J. (2013). One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography. In <i>20th Annual Network and Distributed System Security Symposium, NDSS 2013, San Diego, California, USA, February 24-27, 2013</i>.","mla":"Jager, Tibor, et al. “One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography.” <i>20th Annual Network and Distributed System Security Symposium, NDSS 2013, San Diego, California, USA, February 24-27, 2013</i>, 2013.","bibtex":"@inproceedings{Jager_Paterson_Somorovsky_2013, title={One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography}, booktitle={20th Annual Network and Distributed System Security Symposium, NDSS 2013, San Diego, California, USA, February 24-27, 2013}, author={Jager, Tibor and Paterson, Kenneth G. and Somorovsky, Juraj}, year={2013} }","short":"T. Jager, K.G. Paterson, J. Somorovsky, in: 20th Annual Network and Distributed System Security Symposium, NDSS 2013, San Diego, California, USA, February 24-27, 2013, 2013."},"date_updated":"2022-01-06T06:58:58Z","date_created":"2018-06-07T09:23:49Z","author":[{"first_name":"Tibor","full_name":"Jager, Tibor","id":"64669","last_name":"Jager"},{"full_name":"Paterson, Kenneth G.","last_name":"Paterson","first_name":"Kenneth G."},{"last_name":"Somorovsky","full_name":"Somorovsky, Juraj","first_name":"Juraj"}],"title":"One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography","type":"conference","publication":"20th Annual Network and Distributed System Security Symposium, NDSS 2013, San Diego, California, USA, February 24-27, 2013","status":"public","_id":"3131","user_id":"38235","department":[{"_id":"558"}],"extern":"1"},{"publication":"Advances in Cryptology – ASIACRYPT 2012","type":"book_chapter","status":"public","_id":"2918","department":[{"_id":"558"}],"user_id":"25078","extern":"1","publication_identifier":{"isbn":["9783642349607","9783642349614"],"issn":["0302-9743","1611-3349"]},"publication_status":"published","year":"2012","place":"Berlin, Heidelberg","page":"404-414","citation":{"bibtex":"@inbook{Kakvi_Kiltz_May_2012, place={Berlin, Heidelberg}, title={Certifying RSA}, DOI={<a href=\"https://doi.org/10.1007/978-3-642-34961-4_25\">10.1007/978-3-642-34961-4_25</a>}, booktitle={Advances in Cryptology – ASIACRYPT 2012}, publisher={Springer Berlin Heidelberg}, author={Kakvi, Saqib and Kiltz, Eike and May, Alexander}, year={2012}, pages={404–414} }","short":"S. Kakvi, E. Kiltz, A. May, in: Advances in Cryptology – ASIACRYPT 2012, Springer Berlin Heidelberg, Berlin, Heidelberg, 2012, pp. 404–414.","mla":"Kakvi, Saqib, et al. “Certifying RSA.” <i>Advances in Cryptology – ASIACRYPT 2012</i>, Springer Berlin Heidelberg, 2012, pp. 404–14, doi:<a href=\"https://doi.org/10.1007/978-3-642-34961-4_25\">10.1007/978-3-642-34961-4_25</a>.","apa":"Kakvi, S., Kiltz, E., &#38; May, A. (2012). Certifying RSA. In <i>Advances in Cryptology – ASIACRYPT 2012</i> (pp. 404–414). Berlin, Heidelberg: Springer Berlin Heidelberg. <a href=\"https://doi.org/10.1007/978-3-642-34961-4_25\">https://doi.org/10.1007/978-3-642-34961-4_25</a>","chicago":"Kakvi, Saqib, Eike Kiltz, and Alexander May. “Certifying RSA.” In <i>Advances in Cryptology – ASIACRYPT 2012</i>, 404–14. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. <a href=\"https://doi.org/10.1007/978-3-642-34961-4_25\">https://doi.org/10.1007/978-3-642-34961-4_25</a>.","ieee":"S. Kakvi, E. Kiltz, and A. May, “Certifying RSA,” in <i>Advances in Cryptology – ASIACRYPT 2012</i>, Berlin, Heidelberg: Springer Berlin Heidelberg, 2012, pp. 404–414.","ama":"Kakvi S, Kiltz E, May A. Certifying RSA. In: <i>Advances in Cryptology – ASIACRYPT 2012</i>. Berlin, Heidelberg: Springer Berlin Heidelberg; 2012:404-414. doi:<a href=\"https://doi.org/10.1007/978-3-642-34961-4_25\">10.1007/978-3-642-34961-4_25</a>"},"date_updated":"2022-01-06T06:58:47Z","publisher":"Springer Berlin Heidelberg","author":[{"first_name":"Saqib","full_name":"Kakvi, Saqib","id":"66268","last_name":"Kakvi"},{"full_name":"Kiltz, Eike","last_name":"Kiltz","first_name":"Eike"},{"first_name":"Alexander","last_name":"May","full_name":"May, Alexander"}],"date_created":"2018-05-25T12:34:06Z","title":"Certifying RSA","doi":"10.1007/978-3-642-34961-4_25"},{"status":"public","publication":"Advances in Cryptology – EUROCRYPT 2012","type":"book_chapter","extern":"1","_id":"2919","department":[{"_id":"558"}],"user_id":"66268","year":"2012","place":"Berlin, Heidelberg","page":"537-553","citation":{"ieee":"S. Kakvi and E. Kiltz, “Optimal Security Proofs for Full Domain Hash, Revisited,” in <i>Advances in Cryptology – EUROCRYPT 2012</i>, Berlin, Heidelberg: Springer Berlin Heidelberg, 2012, pp. 537–553.","chicago":"Kakvi, Saqib, and Eike Kiltz. “Optimal Security Proofs for Full Domain Hash, Revisited.” In <i>Advances in Cryptology – EUROCRYPT 2012</i>, 537–53. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. <a href=\"https://doi.org/10.1007/978-3-642-29011-4_32\">https://doi.org/10.1007/978-3-642-29011-4_32</a>.","ama":"Kakvi S, Kiltz E. Optimal Security Proofs for Full Domain Hash, Revisited. In: <i>Advances in Cryptology – EUROCRYPT 2012</i>. Berlin, Heidelberg: Springer Berlin Heidelberg; 2012:537-553. doi:<a href=\"https://doi.org/10.1007/978-3-642-29011-4_32\">10.1007/978-3-642-29011-4_32</a>","bibtex":"@inbook{Kakvi_Kiltz_2012, place={Berlin, Heidelberg}, title={Optimal Security Proofs for Full Domain Hash, Revisited}, DOI={<a href=\"https://doi.org/10.1007/978-3-642-29011-4_32\">10.1007/978-3-642-29011-4_32</a>}, booktitle={Advances in Cryptology – EUROCRYPT 2012}, publisher={Springer Berlin Heidelberg}, author={Kakvi, Saqib and Kiltz, Eike}, year={2012}, pages={537–553} }","short":"S. Kakvi, E. Kiltz, in: Advances in Cryptology – EUROCRYPT 2012, Springer Berlin Heidelberg, Berlin, Heidelberg, 2012, pp. 537–553.","mla":"Kakvi, Saqib, and Eike Kiltz. “Optimal Security Proofs for Full Domain Hash, Revisited.” <i>Advances in Cryptology – EUROCRYPT 2012</i>, Springer Berlin Heidelberg, 2012, pp. 537–53, doi:<a href=\"https://doi.org/10.1007/978-3-642-29011-4_32\">10.1007/978-3-642-29011-4_32</a>.","apa":"Kakvi, S., &#38; Kiltz, E. (2012). Optimal Security Proofs for Full Domain Hash, Revisited. In <i>Advances in Cryptology – EUROCRYPT 2012</i> (pp. 537–553). Berlin, Heidelberg: Springer Berlin Heidelberg. <a href=\"https://doi.org/10.1007/978-3-642-29011-4_32\">https://doi.org/10.1007/978-3-642-29011-4_32</a>"},"publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783642290107","9783642290114"]},"publication_status":"published","title":"Optimal Security Proofs for Full Domain Hash, Revisited","doi":"10.1007/978-3-642-29011-4_32","main_file_link":[{"url":"https://doi.org/10.1007/s00145-017-9257-9"}],"date_updated":"2022-01-06T06:58:47Z","publisher":"Springer Berlin Heidelberg","author":[{"first_name":"Saqib","last_name":"Kakvi","id":"66268","full_name":"Kakvi, Saqib"},{"last_name":"Kiltz","full_name":"Kiltz, Eike","first_name":"Eike"}],"date_created":"2018-05-25T12:36:44Z"},{"title":"On black-box models of computation in cryptology","author":[{"last_name":"Jager","id":"64669","full_name":"Jager, Tibor","first_name":"Tibor"}],"date_created":"2018-06-07T09:25:35Z","publisher":"Ruhr University Bochum","date_updated":"2022-01-06T06:58:58Z","citation":{"chicago":"Jager, Tibor. <i>On Black-Box Models of Computation in Cryptology</i>. Ruhr University Bochum, 2012.","ieee":"T. Jager, <i>On black-box models of computation in cryptology</i>. Ruhr University Bochum, 2012.","ama":"Jager T. <i>On Black-Box Models of Computation in Cryptology</i>. Ruhr University Bochum; 2012.","short":"T. Jager, On Black-Box Models of Computation in Cryptology, Ruhr University Bochum, 2012.","bibtex":"@book{Jager_2012, title={On black-box models of computation in cryptology}, publisher={Ruhr University Bochum}, author={Jager, Tibor}, year={2012} }","mla":"Jager, Tibor. <i>On Black-Box Models of Computation in Cryptology</i>. Ruhr University Bochum, 2012.","apa":"Jager, T. (2012). <i>On black-box models of computation in cryptology</i>. Ruhr University Bochum."},"year":"2012","publication_identifier":{"isbn":["978-3-8348-1989-5"]},"extern":"1","user_id":"38235","department":[{"_id":"558"}],"_id":"3132","status":"public","type":"dissertation"}]
