TY - CONF AU - Bader, Christoph AU - Jager, Tibor AU - Li, Yong AU - Schäge, Sven ID - 3117 T2 - Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II TI - On the Impossibility of Tight Cryptographic Reductions ER - TY - CONF AU - Hofheinz, Dennis AU - Jager, Tibor AU - Rupp, Andy ID - 3118 T2 - Theory of Cryptography - 14th International Conference, TCC 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part II TI - Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts ER - TY - CONF AU - Hofheinz, Dennis AU - Jager, Tibor ID - 3119 T2 - Theory of Cryptography - 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part I TI - Verifiable Random Functions from Standard Assumptions ER - TY - JOUR AU - Jager, Tibor AU - Rupp, Andy ID - 5446 IS - 3 JF - Proceedings on Privacy Enhancing Technologies SN - 2299-0984 TI - Black-Box Accumulation: Collecting Incentives in a Privacy-Preserving Way VL - 2016 ER - TY - CHAP AU - Blazy, Olivier AU - Kakvi, Saqib AU - Kiltz, Eike AU - Pan, Jiaxin ID - 2921 SN - 0302-9743 T2 - Lecture Notes in Computer Science TI - Tightly-Secure Signatures from Chameleon Hash Functions ER - TY - JOUR AU - Böhl, Florian AU - Hofheinz, Dennis AU - Jager, Tibor AU - Koch, Jessica AU - Striecks, Christoph ID - 3120 IS - 1 JF - J. Cryptology TI - Confined Guessing: New Signatures From Standard Assumptions ER - TY - CONF AU - Jager, Tibor AU - Schwenk, Jörg AU - Somorovsky, Juraj ID - 3121 T2 - Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015 TI - On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption ER - TY - CONF AU - Jager, Tibor AU - Schwenk, Jörg AU - Somorovsky, Juraj ID - 3122 T2 - Computer Security - ESORICS 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I TI - Practical Invalid Curve Attacks on TLS-ECDH ER - TY - CONF AU - Heuer, Felix AU - Jager, Tibor AU - Kiltz, Eike AU - Schäge, Sven ID - 3123 T2 - Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings TI - On the Selective Opening Security of Practical Public-Key Encryption Schemes ER - TY - CONF AU - Bergsma, Florian AU - Jager, Tibor AU - Schwenk, Jörg ID - 3124 T2 - Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings TI - One-Round Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model ER -