[{"language":[{"iso":"eng"}],"series_title":"Verlagsschriftenreihe des Heinz Nixdorf Instituts","doi":"10.5281/zenodo.8068755","oa":"1","date_updated":"2023-07-07T11:13:37Z","editor":[{"first_name":"Claus-Jochen","full_name":"Haake, Claus-Jochen","last_name":"Haake"},{"first_name":"Friedhelm","full_name":"Meyer auf der Heide, Friedhelm","last_name":"Meyer auf der Heide"},{"last_name":"Platzner","full_name":"Platzner, Marco","first_name":"Marco"},{"first_name":"Henning","full_name":"Wachsmuth, Henning","last_name":"Wachsmuth"},{"full_name":"Wehrheim, Heike","first_name":"Heike","last_name":"Wehrheim"}],"project":[{"_id":"1","name":"SFB 901: SFB 901: On-The-Fly Computing - Individualisierte IT-Dienstleistungen in dynamischen Märkten ","grant_number":"160364472"},{"name":"SFB 901 - T: SFB 901 - Project Area T","_id":"82"},{"name":"SFB 901 - T2: SFB 901 -Subproject T2","_id":"84"}],"department":[{"_id":"7"}],"title":"Practical Cryptograhic Techniques for Secure and Privacy-Preserving Customer Loyalty Systems","place":"Paderborn","page":"237-246","citation":{"apa":"Blömer, J., Bobolz, J., Eidens, F., Jager, T., & Kramer, P. (2023). Practical Cryptograhic Techniques for Secure and Privacy-Preserving Customer Loyalty Systems. In C.-J. Haake, F. Meyer auf der Heide, M. Platzner, H. Wachsmuth, & H. Wehrheim (Eds.), On-The-Fly Computing -- Individualized IT-services in dynamic markets (Vol. 412, pp. 237–246). Heinz Nixdorf Institut, Universität Paderborn. https://doi.org/10.5281/zenodo.8068755","ama":"Blömer J, Bobolz J, Eidens F, Jager T, Kramer P. Practical Cryptograhic Techniques for Secure and Privacy-Preserving Customer Loyalty Systems. In: Haake C-J, Meyer auf der Heide F, Platzner M, Wachsmuth H, Wehrheim H, eds. On-The-Fly Computing -- Individualized IT-Services in Dynamic Markets. Vol 412. Verlagsschriftenreihe des Heinz Nixdorf Instituts. Heinz Nixdorf Institut, Universität Paderborn; 2023:237-246. doi:10.5281/zenodo.8068755","chicago":"Blömer, Johannes, Jan Bobolz, Fabian Eidens, Tibor Jager, and Paul Kramer. “Practical Cryptograhic Techniques for Secure and Privacy-Preserving Customer Loyalty Systems.” In On-The-Fly Computing -- Individualized IT-Services in Dynamic Markets, edited by Claus-Jochen Haake, Friedhelm Meyer auf der Heide, Marco Platzner, Henning Wachsmuth, and Heike Wehrheim, 412:237–46. Verlagsschriftenreihe Des Heinz Nixdorf Instituts. Paderborn: Heinz Nixdorf Institut, Universität Paderborn, 2023. https://doi.org/10.5281/zenodo.8068755.","mla":"Blömer, Johannes, et al. “Practical Cryptograhic Techniques for Secure and Privacy-Preserving Customer Loyalty Systems.” On-The-Fly Computing -- Individualized IT-Services in Dynamic Markets, edited by Claus-Jochen Haake et al., vol. 412, Heinz Nixdorf Institut, Universität Paderborn, 2023, pp. 237–46, doi:10.5281/zenodo.8068755.","bibtex":"@inbook{Blömer_Bobolz_Eidens_Jager_Kramer_2023, place={Paderborn}, series={Verlagsschriftenreihe des Heinz Nixdorf Instituts}, title={Practical Cryptograhic Techniques for Secure and Privacy-Preserving Customer Loyalty Systems}, volume={412}, DOI={10.5281/zenodo.8068755}, booktitle={On-The-Fly Computing -- Individualized IT-services in dynamic markets}, publisher={Heinz Nixdorf Institut, Universität Paderborn}, author={Blömer, Johannes and Bobolz, Jan and Eidens, Fabian and Jager, Tibor and Kramer, Paul}, editor={Haake, Claus-Jochen and Meyer auf der Heide, Friedhelm and Platzner, Marco and Wachsmuth, Henning and Wehrheim, Heike}, year={2023}, pages={237–246}, collection={Verlagsschriftenreihe des Heinz Nixdorf Instituts} }","short":"J. Blömer, J. Bobolz, F. Eidens, T. Jager, P. Kramer, in: C.-J. Haake, F. Meyer auf der Heide, M. Platzner, H. Wachsmuth, H. Wehrheim (Eds.), On-The-Fly Computing -- Individualized IT-Services in Dynamic Markets, Heinz Nixdorf Institut, Universität Paderborn, Paderborn, 2023, pp. 237–246.","ieee":"J. Blömer, J. Bobolz, F. Eidens, T. Jager, and P. Kramer, “Practical Cryptograhic Techniques for Secure and Privacy-Preserving Customer Loyalty Systems,” in On-The-Fly Computing -- Individualized IT-services in dynamic markets, vol. 412, C.-J. Haake, F. Meyer auf der Heide, M. Platzner, H. Wachsmuth, and H. Wehrheim, Eds. Paderborn: Heinz Nixdorf Institut, Universität Paderborn, 2023, pp. 237–246."},"type":"book_chapter","year":"2023","_id":"45901","intvolume":" 412","volume":412,"date_created":"2023-07-07T08:41:44Z","status":"public","has_accepted_license":"1","publication":"On-The-Fly Computing -- Individualized IT-services in dynamic markets","file_date_updated":"2023-07-07T11:13:37Z","author":[{"id":"23","last_name":"Blömer","full_name":"Blömer, Johannes","first_name":"Johannes"},{"first_name":"Jan","full_name":"Bobolz, Jan","last_name":"Bobolz","id":"27207"},{"full_name":"Eidens, Fabian","first_name":"Fabian","id":"25078","last_name":"Eidens"},{"full_name":"Jager, Tibor","first_name":"Tibor","id":"64669","last_name":"Jager"},{"last_name":"Kramer","id":"64594","first_name":"Paul","full_name":"Kramer, Paul"}],"publisher":"Heinz Nixdorf Institut, Universität Paderborn","file":[{"date_created":"2023-07-07T08:41:35Z","file_name":"T2-Chapter-SFB-Buch-Final.pdf","access_level":"open_access","creator":"florida","file_id":"45902","file_size":5944790,"relation":"main_file","content_type":"application/pdf","date_updated":"2023-07-07T11:13:37Z"}],"ddc":["004"],"user_id":"477"},{"title":"Robustness and Security","place":"Paderborn","editor":[{"last_name":"Haake","first_name":"Claus-Jochen","full_name":"Haake, Claus-Jochen"},{"full_name":"Meyer auf der Heide, Friedhelm","first_name":"Friedhelm","last_name":"Meyer auf der Heide"},{"last_name":"Platzner","first_name":"Marco","full_name":"Platzner, Marco"},{"last_name":"Wachsmuth","first_name":"Henning","full_name":"Wachsmuth, Henning"},{"full_name":"Wehrheim, Heike","first_name":"Heike","last_name":"Wehrheim"}],"project":[{"grant_number":"160364472","name":"SFB 901: SFB 901: On-The-Fly Computing - Individualisierte IT-Dienstleistungen in dynamischen Märkten ","_id":"1"},{"_id":"4","name":"SFB 901 - C: SFB 901 - Project Area C"},{"name":"SFB 901 - C1: SFB 901 - Subproject C1","_id":"13"}],"department":[{"_id":"7"}],"doi":"10.5281/zenodo.8068629","oa":"1","date_updated":"2023-07-07T11:18:21Z","language":[{"iso":"eng"}],"series_title":"Verlagsschriftenreihe des Heinz Nixdorf Instituts","ddc":["004"],"user_id":"477","volume":412,"date_created":"2023-07-07T08:08:47Z","has_accepted_license":"1","status":"public","file_date_updated":"2023-07-07T11:18:21Z","publication":"On-The-Fly Computing -- Individualized IT-services in dynamic markets","publisher":"Heinz Nixdorf Institut, Universität Paderborn","author":[{"last_name":"Blömer","id":"23","first_name":"Johannes","full_name":"Blömer, Johannes"},{"id":"25078","last_name":"Eidens","full_name":"Eidens, Fabian","first_name":"Fabian"},{"full_name":"Jager, Tibor","first_name":"Tibor","id":"64669","last_name":"Jager"},{"last_name":"Niehues","id":"36113","first_name":"David","full_name":"Niehues, David"},{"full_name":"Scheideler, Christian","first_name":"Christian","id":"20792","last_name":"Scheideler"}],"file":[{"file_id":"45892","creator":"florida","file_size":320980,"relation":"main_file","date_updated":"2023-07-07T11:18:21Z","content_type":"application/pdf","file_name":"C1-Chapter-SFB-Buch-Final.pdf","date_created":"2023-07-07T08:08:37Z","access_level":"open_access"}],"_id":"45891","intvolume":" 412","page":"145-164","type":"book_chapter","citation":{"bibtex":"@inbook{Blömer_Eidens_Jager_Niehues_Scheideler_2023, place={Paderborn}, series={Verlagsschriftenreihe des Heinz Nixdorf Instituts}, title={Robustness and Security}, volume={412}, DOI={10.5281/zenodo.8068629}, booktitle={On-The-Fly Computing -- Individualized IT-services in dynamic markets}, publisher={Heinz Nixdorf Institut, Universität Paderborn}, author={Blömer, Johannes and Eidens, Fabian and Jager, Tibor and Niehues, David and Scheideler, Christian}, editor={Haake, Claus-Jochen and Meyer auf der Heide, Friedhelm and Platzner, Marco and Wachsmuth, Henning and Wehrheim, Heike}, year={2023}, pages={145–164}, collection={Verlagsschriftenreihe des Heinz Nixdorf Instituts} }","mla":"Blömer, Johannes, et al. “Robustness and Security.” On-The-Fly Computing -- Individualized IT-Services in Dynamic Markets, edited by Claus-Jochen Haake et al., vol. 412, Heinz Nixdorf Institut, Universität Paderborn, 2023, pp. 145–64, doi:10.5281/zenodo.8068629.","ama":"Blömer J, Eidens F, Jager T, Niehues D, Scheideler C. Robustness and Security. In: Haake C-J, Meyer auf der Heide F, Platzner M, Wachsmuth H, Wehrheim H, eds. On-The-Fly Computing -- Individualized IT-Services in Dynamic Markets. Vol 412. Verlagsschriftenreihe des Heinz Nixdorf Instituts. Heinz Nixdorf Institut, Universität Paderborn; 2023:145-164. doi:10.5281/zenodo.8068629","apa":"Blömer, J., Eidens, F., Jager, T., Niehues, D., & Scheideler, C. (2023). Robustness and Security. In C.-J. Haake, F. Meyer auf der Heide, M. Platzner, H. Wachsmuth, & H. Wehrheim (Eds.), On-The-Fly Computing -- Individualized IT-services in dynamic markets (Vol. 412, pp. 145–164). Heinz Nixdorf Institut, Universität Paderborn. https://doi.org/10.5281/zenodo.8068629","chicago":"Blömer, Johannes, Fabian Eidens, Tibor Jager, David Niehues, and Christian Scheideler. “Robustness and Security.” In On-The-Fly Computing -- Individualized IT-Services in Dynamic Markets, edited by Claus-Jochen Haake, Friedhelm Meyer auf der Heide, Marco Platzner, Henning Wachsmuth, and Heike Wehrheim, 412:145–64. Verlagsschriftenreihe Des Heinz Nixdorf Instituts. Paderborn: Heinz Nixdorf Institut, Universität Paderborn, 2023. https://doi.org/10.5281/zenodo.8068629.","ieee":"J. Blömer, F. Eidens, T. Jager, D. Niehues, and C. Scheideler, “Robustness and Security,” in On-The-Fly Computing -- Individualized IT-services in dynamic markets, vol. 412, C.-J. Haake, F. Meyer auf der Heide, M. Platzner, H. Wachsmuth, and H. Wehrheim, Eds. Paderborn: Heinz Nixdorf Institut, Universität Paderborn, 2023, pp. 145–164.","short":"J. Blömer, F. Eidens, T. Jager, D. Niehues, C. Scheideler, in: C.-J. Haake, F. Meyer auf der Heide, M. Platzner, H. Wachsmuth, H. Wehrheim (Eds.), On-The-Fly Computing -- Individualized IT-Services in Dynamic Markets, Heinz Nixdorf Institut, Universität Paderborn, Paderborn, 2023, pp. 145–164."},"year":"2023"},{"date_created":"2018-06-07T08:47:17Z","has_accepted_license":"1","status":"public","file":[{"date_created":"2018-11-08T13:25:52Z","file_name":"2018-199.pdf","access_level":"closed","creator":"abirke","file_id":"5453","file_size":533731,"relation":"main_file","success":1,"date_updated":"2018-11-08T13:25:52Z","content_type":"application/pdf"}],"file_date_updated":"2018-11-08T13:25:52Z","publication":"Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part III","department":[{"_id":"558"}],"author":[{"first_name":"David","full_name":"Derler, David","last_name":"Derler"},{"full_name":"Jager, Tibor","first_name":"Tibor","id":"64669","last_name":"Jager"},{"full_name":"Slamanig, Daniel","first_name":"Daniel","last_name":"Slamanig"},{"first_name":"Christoph","full_name":"Striecks, Christoph","last_name":"Striecks"}],"user_id":"38235","title":"Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange","ddc":["006"],"language":[{"iso":"eng"}],"page":"425--455","year":"2018","citation":{"short":"D. Derler, T. Jager, D. Slamanig, C. Striecks, in: Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part III, 2018, pp. 425--455.","ieee":"D. Derler, T. Jager, D. Slamanig, and C. Striecks, “Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange,” in Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part III, 2018, pp. 425--455.","ama":"Derler D, Jager T, Slamanig D, Striecks C. Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange. In: Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part III. ; 2018:425--455. doi:10.1007/978-3-319-78372-7_14","apa":"Derler, D., Jager, T., Slamanig, D., & Striecks, C. (2018). Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange. In Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part III (pp. 425--455). https://doi.org/10.1007/978-3-319-78372-7_14","chicago":"Derler, David, Tibor Jager, Daniel Slamanig, and Christoph Striecks. “Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange.” In Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part III, 425--455, 2018. https://doi.org/10.1007/978-3-319-78372-7_14.","bibtex":"@inproceedings{Derler_Jager_Slamanig_Striecks_2018, title={Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange}, DOI={10.1007/978-3-319-78372-7_14}, booktitle={Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part III}, author={Derler, David and Jager, Tibor and Slamanig, Daniel and Striecks, Christoph}, year={2018}, pages={425--455} }","mla":"Derler, David, et al. “Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange.” Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part III, 2018, pp. 425--455, doi:10.1007/978-3-319-78372-7_14."},"type":"conference","main_file_link":[{"url":"https://eprint.iacr.org/2018/199.pdf"}],"doi":"10.1007/978-3-319-78372-7_14","_id":"3105","date_updated":"2022-01-06T06:58:56Z"},{"_id":"5861","date_updated":"2022-01-06T07:02:44Z","doi":"10.1007/978-3-030-03329-3_8","year":"2018","citation":{"short":"T. Jager, R. Kurek, in: Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part II, 2018, pp. 221–250.","ieee":"T. Jager and R. Kurek, “Short Digital Signatures and ID-KEMs via Truncation Collision Resistance,” in Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part II, 2018, pp. 221–250.","chicago":"Jager, Tibor, and Rafael Kurek. “Short Digital Signatures and ID-KEMs via Truncation Collision Resistance.” In Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part II, 221–50, 2018. https://doi.org/10.1007/978-3-030-03329-3_8.","apa":"Jager, T., & Kurek, R. (2018). Short Digital Signatures and ID-KEMs via Truncation Collision Resistance. In Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part II (pp. 221–250). https://doi.org/10.1007/978-3-030-03329-3_8","ama":"Jager T, Kurek R. Short Digital Signatures and ID-KEMs via Truncation Collision Resistance. In: Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part II. ; 2018:221-250. doi:10.1007/978-3-030-03329-3_8","bibtex":"@inproceedings{Jager_Kurek_2018, title={Short Digital Signatures and ID-KEMs via Truncation Collision Resistance}, DOI={10.1007/978-3-030-03329-3_8}, booktitle={Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part II}, author={Jager, Tibor and Kurek, Rafael}, year={2018}, pages={221–250} }","mla":"Jager, Tibor, and Rafael Kurek. “Short Digital Signatures and ID-KEMs via Truncation Collision Resistance.” Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part II, 2018, pp. 221–50, doi:10.1007/978-3-030-03329-3_8."},"type":"conference","page":"221-250","language":[{"iso":"eng"}],"title":"Short Digital Signatures and ID-KEMs via Truncation Collision Resistance","user_id":"38235","author":[{"full_name":"Jager, Tibor","first_name":"Tibor","id":"64669","last_name":"Jager"},{"first_name":"Rafael","full_name":"Kurek, Rafael","last_name":"Kurek","id":"64752"}],"publication":"Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part II","department":[{"_id":"558"}],"status":"public","date_created":"2018-11-27T09:39:57Z"},{"author":[{"full_name":"Jager, Tibor","first_name":"Tibor","id":"64669","last_name":"Jager"},{"full_name":"Kurek, Rafael","first_name":"Rafael","id":"64752","last_name":"Kurek"},{"last_name":"Pan","first_name":"Jiaxin","full_name":"Pan, Jiaxin"}],"department":[{"_id":"558"}],"publication":"Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part III","status":"public","date_created":"2018-11-27T09:42:49Z","title":"Simple and More Efficient PRFs with Tight Security from LWE and Matrix-DDH","user_id":"38235","type":"conference","citation":{"chicago":"Jager, Tibor, Rafael Kurek, and Jiaxin Pan. “Simple and More Efficient PRFs with Tight Security from LWE and Matrix-DDH.” In Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part III, 490–518, 2018. https://doi.org/10.1007/978-3-030-03332-3_18.","apa":"Jager, T., Kurek, R., & Pan, J. (2018). Simple and More Efficient PRFs with Tight Security from LWE and Matrix-DDH. In Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part III (pp. 490–518). https://doi.org/10.1007/978-3-030-03332-3_18","ama":"Jager T, Kurek R, Pan J. Simple and More Efficient PRFs with Tight Security from LWE and Matrix-DDH. In: Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part III. ; 2018:490-518. doi:10.1007/978-3-030-03332-3_18","bibtex":"@inproceedings{Jager_Kurek_Pan_2018, title={Simple and More Efficient PRFs with Tight Security from LWE and Matrix-DDH}, DOI={10.1007/978-3-030-03332-3_18}, booktitle={Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part III}, author={Jager, Tibor and Kurek, Rafael and Pan, Jiaxin}, year={2018}, pages={490–518} }","mla":"Jager, Tibor, et al. “Simple and More Efficient PRFs with Tight Security from LWE and Matrix-DDH.” Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part III, 2018, pp. 490–518, doi:10.1007/978-3-030-03332-3_18.","short":"T. Jager, R. Kurek, J. Pan, in: Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part III, 2018, pp. 490–518.","ieee":"T. Jager, R. Kurek, and J. Pan, “Simple and More Efficient PRFs with Tight Security from LWE and Matrix-DDH,” in Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part III, 2018, pp. 490–518."},"year":"2018","page":"490-518","language":[{"iso":"eng"}],"_id":"5862","date_updated":"2022-01-06T07:02:44Z","doi":"10.1007/978-3-030-03332-3_18"},{"type":"journal_article","year":"2018","citation":{"bibtex":"@article{Liu_Jager_Kakvi_Warinschi_2018, title={How to build time-lock encryption}, DOI={10.1007/s10623-018-0461-x}, journal={Designs, Codes and Cryptography}, author={Liu, Jia and Jager, Tibor and Kakvi, Saqib and Warinschi, Bogdan}, year={2018}, pages={2549–2586} }","mla":"Liu, Jia, et al. “How to Build Time-Lock Encryption.” Designs, Codes and Cryptography, 2018, pp. 2549–86, doi:10.1007/s10623-018-0461-x.","apa":"Liu, J., Jager, T., Kakvi, S., & Warinschi, B. (2018). How to build time-lock encryption. Designs, Codes and Cryptography, 2549–2586. https://doi.org/10.1007/s10623-018-0461-x","ama":"Liu J, Jager T, Kakvi S, Warinschi B. How to build time-lock encryption. Designs, Codes and Cryptography. 2018:2549-2586. doi:10.1007/s10623-018-0461-x","chicago":"Liu, Jia, Tibor Jager, Saqib Kakvi, and Bogdan Warinschi. “How to Build Time-Lock Encryption.” Designs, Codes and Cryptography, 2018, 2549–86. https://doi.org/10.1007/s10623-018-0461-x.","ieee":"J. Liu, T. Jager, S. Kakvi, and B. Warinschi, “How to build time-lock encryption,” Designs, Codes and Cryptography, pp. 2549–2586, 2018.","short":"J. Liu, T. Jager, S. Kakvi, B. Warinschi, Designs, Codes and Cryptography (2018) 2549–2586."},"page":"2549-2586","language":[{"iso":"eng"}],"doi":"10.1007/s10623-018-0461-x","_id":"9606","date_updated":"2022-01-06T07:04:16Z","publication_identifier":{"issn":["0925-1022","1573-7586"]},"publication_status":"published","status":"public","date_created":"2019-05-03T12:42:01Z","author":[{"last_name":"Liu","full_name":"Liu, Jia","first_name":"Jia"},{"full_name":"Jager, Tibor","first_name":"Tibor","id":"64669","last_name":"Jager"},{"first_name":"Saqib","full_name":"Kakvi, Saqib","last_name":"Kakvi","id":"66268"},{"last_name":"Warinschi","full_name":"Warinschi, Bogdan","first_name":"Bogdan"}],"publication":"Designs, Codes and Cryptography","department":[{"_id":"558"}],"title":"How to build time-lock encryption","user_id":"66268"},{"date_created":"2018-11-08T12:47:45Z","has_accepted_license":"1","status":"public","publication_status":"published","file":[{"creator":"abirke","file_id":"5440","file_size":486642,"relation":"main_file","date_updated":"2018-11-08T12:53:03Z","content_type":"application/octet-stream","file_name":"2018-543","date_created":"2018-11-08T12:53:03Z","access_level":"closed"}],"department":[{"_id":"558"}],"publication":"Advances in Cryptology - CRYPTO 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part II","file_date_updated":"2018-11-08T12:53:03Z","author":[{"last_name":"Gjøsteen","full_name":"Gjøsteen, Kristian","first_name":"Kristian"},{"id":"64669","last_name":"Jager","full_name":"Jager, Tibor","first_name":"Tibor"}],"user_id":"38235","title":"Practical and Tightly-Secure Digital Signatures and Authenticated Key Exchange","ddc":["006"],"language":[{"iso":"eng"}],"citation":{"chicago":"Gjøsteen, Kristian, and Tibor Jager. “Practical and Tightly-Secure Digital Signatures and Authenticated Key Exchange.” In Advances in Cryptology - CRYPTO 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part II, 2018. https://doi.org/10.1007/978-3-319-96881-0_4.","apa":"Gjøsteen, K., & Jager, T. (2018). Practical and Tightly-Secure Digital Signatures and Authenticated Key Exchange. In Advances in Cryptology - CRYPTO 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part II. https://doi.org/10.1007/978-3-319-96881-0_4","ama":"Gjøsteen K, Jager T. Practical and Tightly-Secure Digital Signatures and Authenticated Key Exchange. In: Advances in Cryptology - CRYPTO 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part II. ; 2018. doi:10.1007/978-3-319-96881-0_4","bibtex":"@inproceedings{Gjøsteen_Jager_2018, title={Practical and Tightly-Secure Digital Signatures and Authenticated Key Exchange}, DOI={10.1007/978-3-319-96881-0_4}, booktitle={Advances in Cryptology - CRYPTO 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part II}, author={Gjøsteen, Kristian and Jager, Tibor}, year={2018} }","mla":"Gjøsteen, Kristian, and Tibor Jager. “Practical and Tightly-Secure Digital Signatures and Authenticated Key Exchange.” Advances in Cryptology - CRYPTO 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part II, 2018, doi:10.1007/978-3-319-96881-0_4.","short":"K. Gjøsteen, T. Jager, in: Advances in Cryptology - CRYPTO 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part II, 2018.","ieee":"K. Gjøsteen and T. Jager, “Practical and Tightly-Secure Digital Signatures and Authenticated Key Exchange,” in Advances in Cryptology - CRYPTO 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part II, 2018."},"type":"conference","year":"2018","main_file_link":[{"url":"https://eprint.iacr.org/2018/543.pdf"}],"doi":"10.1007/978-3-319-96881-0_4","date_updated":"2022-01-06T07:01:53Z","_id":"5438"},{"date_created":"2018-11-08T12:56:04Z","status":"public","has_accepted_license":"1","file":[{"date_created":"2018-11-08T12:57:34Z","file_name":"2018-855.pdf","access_level":"closed","file_size":481982,"creator":"abirke","file_id":"5443","content_type":"application/pdf","date_updated":"2018-11-08T12:57:34Z","relation":"main_file","success":1}],"file_date_updated":"2018-11-08T12:57:34Z","publication":"Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security - CCS '18","publisher":"ACM Press","author":[{"id":"64669","last_name":"Jager","full_name":"Jager, Tibor","first_name":"Tibor"},{"full_name":"Kakvi, Saqib","first_name":"Saqib","id":"66268","last_name":"Kakvi"},{"last_name":"May","full_name":"May, Alexander","first_name":"Alexander"}],"user_id":"38235","ddc":["006"],"citation":{"short":"T. Jager, S. Kakvi, A. May, in: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security - CCS ’18, ACM Press, 2018.","ieee":"T. Jager, S. Kakvi, and A. May, “On the Security of the PKCS#1 v1.5 Signature Scheme,” in Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security - CCS ’18, 2018.","ama":"Jager T, Kakvi S, May A. On the Security of the PKCS#1 v1.5 Signature Scheme. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security - CCS ’18. ACM Press; 2018. doi:10.1145/3243734.3243798","apa":"Jager, T., Kakvi, S., & May, A. (2018). On the Security of the PKCS#1 v1.5 Signature Scheme. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security - CCS ’18. ACM Press. https://doi.org/10.1145/3243734.3243798","chicago":"Jager, Tibor, Saqib Kakvi, and Alexander May. “On the Security of the PKCS#1 v1.5 Signature Scheme.” In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security - CCS ’18. ACM Press, 2018. https://doi.org/10.1145/3243734.3243798.","bibtex":"@inproceedings{Jager_Kakvi_May_2018, title={On the Security of the PKCS#1 v1.5 Signature Scheme}, DOI={10.1145/3243734.3243798}, booktitle={Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security - CCS ’18}, publisher={ACM Press}, author={Jager, Tibor and Kakvi, Saqib and May, Alexander}, year={2018} }","mla":"Jager, Tibor, et al. “On the Security of the PKCS#1 v1.5 Signature Scheme.” Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security - CCS ’18, ACM Press, 2018, doi:10.1145/3243734.3243798."},"year":"2018","type":"conference","main_file_link":[{"url":"https://eprint.iacr.org/2018/855.pdf"}],"_id":"5442","publication_identifier":{"isbn":["9781450356930"]},"publication_status":"published","department":[{"_id":"558"}],"title":"On the Security of the PKCS#1 v1.5 Signature Scheme","language":[{"iso":"eng"}],"doi":"10.1145/3243734.3243798","date_updated":"2022-01-06T07:01:54Z"},{"user_id":"38235","title":"Authenticated Confidential Channel Establishment and the Security of TLS-DHE","status":"public","date_created":"2018-06-07T08:58:36Z","author":[{"full_name":"Jager, Tibor","first_name":"Tibor","id":"64669","last_name":"Jager"},{"last_name":"Kohlar","first_name":"Florian","full_name":"Kohlar, Florian"},{"last_name":"Schäge","first_name":"Sven","full_name":"Schäge, Sven"},{"last_name":"Schwenk","first_name":"Jörg","full_name":"Schwenk, Jörg"}],"publication":"J. Cryptology","department":[{"_id":"558"}],"issue":"4","doi":"10.1007/s00145-016-9248-2","_id":"3108","date_updated":"2022-01-06T06:58:56Z","year":"2017","type":"journal_article","citation":{"chicago":"Jager, Tibor, Florian Kohlar, Sven Schäge, and Jörg Schwenk. “Authenticated Confidential Channel Establishment and the Security of TLS-DHE.” J. Cryptology, no. 4 (2017): 1276--1324. https://doi.org/10.1007/s00145-016-9248-2.","apa":"Jager, T., Kohlar, F., Schäge, S., & Schwenk, J. (2017). Authenticated Confidential Channel Establishment and the Security of TLS-DHE. J. Cryptology, (4), 1276--1324. https://doi.org/10.1007/s00145-016-9248-2","ama":"Jager T, Kohlar F, Schäge S, Schwenk J. Authenticated Confidential Channel Establishment and the Security of TLS-DHE. J Cryptology. 2017;(4):1276--1324. doi:10.1007/s00145-016-9248-2","bibtex":"@article{Jager_Kohlar_Schäge_Schwenk_2017, title={Authenticated Confidential Channel Establishment and the Security of TLS-DHE}, DOI={10.1007/s00145-016-9248-2}, number={4}, journal={J. Cryptology}, author={Jager, Tibor and Kohlar, Florian and Schäge, Sven and Schwenk, Jörg}, year={2017}, pages={1276--1324} }","mla":"Jager, Tibor, et al. “Authenticated Confidential Channel Establishment and the Security of TLS-DHE.” J. Cryptology, no. 4, 2017, pp. 1276--1324, doi:10.1007/s00145-016-9248-2.","short":"T. Jager, F. Kohlar, S. Schäge, J. Schwenk, J. Cryptology (2017) 1276--1324.","ieee":"T. Jager, F. Kohlar, S. Schäge, and J. Schwenk, “Authenticated Confidential Channel Establishment and the Security of TLS-DHE,” J. Cryptology, no. 4, pp. 1276--1324, 2017."},"page":"1276--1324"},{"title":"Simple Security Definitions for and Constructions of 0-RTT Key Exchange","user_id":"38235","author":[{"last_name":"Hale","first_name":"Britta","full_name":"Hale, Britta"},{"id":"64669","last_name":"Jager","full_name":"Jager, Tibor","first_name":"Tibor"},{"last_name":"Lauer","first_name":"Sebastian","full_name":"Lauer, Sebastian"},{"full_name":"Schwenk, Jörg","first_name":"Jörg","last_name":"Schwenk"}],"publication":"Applied Cryptography and Network Security - 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings","department":[{"_id":"558"}],"status":"public","date_created":"2018-06-07T09:07:59Z","_id":"3109","date_updated":"2022-01-06T06:58:56Z","doi":"10.1007/978-3-319-61204-1_2","type":"conference","citation":{"ama":"Hale B, Jager T, Lauer S, Schwenk J. Simple Security Definitions for and Constructions of 0-RTT Key Exchange. In: Applied Cryptography and Network Security - 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings. ; 2017:20--38. doi:10.1007/978-3-319-61204-1_2","apa":"Hale, B., Jager, T., Lauer, S., & Schwenk, J. (2017). Simple Security Definitions for and Constructions of 0-RTT Key Exchange. In Applied Cryptography and Network Security - 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings (pp. 20--38). https://doi.org/10.1007/978-3-319-61204-1_2","chicago":"Hale, Britta, Tibor Jager, Sebastian Lauer, and Jörg Schwenk. “Simple Security Definitions for and Constructions of 0-RTT Key Exchange.” In Applied Cryptography and Network Security - 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings, 20--38, 2017. https://doi.org/10.1007/978-3-319-61204-1_2.","mla":"Hale, Britta, et al. “Simple Security Definitions for and Constructions of 0-RTT Key Exchange.” Applied Cryptography and Network Security - 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings, 2017, pp. 20--38, doi:10.1007/978-3-319-61204-1_2.","bibtex":"@inproceedings{Hale_Jager_Lauer_Schwenk_2017, title={Simple Security Definitions for and Constructions of 0-RTT Key Exchange}, DOI={10.1007/978-3-319-61204-1_2}, booktitle={Applied Cryptography and Network Security - 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings}, author={Hale, Britta and Jager, Tibor and Lauer, Sebastian and Schwenk, Jörg}, year={2017}, pages={20--38} }","short":"B. Hale, T. Jager, S. Lauer, J. Schwenk, in: Applied Cryptography and Network Security - 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings, 2017, pp. 20--38.","ieee":"B. Hale, T. Jager, S. Lauer, and J. Schwenk, “Simple Security Definitions for and Constructions of 0-RTT Key Exchange,” in Applied Cryptography and Network Security - 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings, 2017, pp. 20--38."},"year":"2017","page":"20--38"},{"_id":"3110","date_updated":"2022-01-06T06:58:56Z","doi":"10.1007/978-3-319-56617-7_18","page":"519--548","year":"2017","citation":{"ieee":"F. Günther, B. Hale, T. Jager, and S. Lauer, “0-RTT Key Exchange with Full Forward Secrecy,” in Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part III, 2017, pp. 519--548.","short":"F. Günther, B. Hale, T. Jager, S. Lauer, in: Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part III, 2017, pp. 519--548.","mla":"Günther, Felix, et al. “0-RTT Key Exchange with Full Forward Secrecy.” Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part III, 2017, pp. 519--548, doi:10.1007/978-3-319-56617-7_18.","bibtex":"@inproceedings{Günther_Hale_Jager_Lauer_2017, title={0-RTT Key Exchange with Full Forward Secrecy}, DOI={10.1007/978-3-319-56617-7_18}, booktitle={Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part III}, author={Günther, Felix and Hale, Britta and Jager, Tibor and Lauer, Sebastian}, year={2017}, pages={519--548} }","ama":"Günther F, Hale B, Jager T, Lauer S. 0-RTT Key Exchange with Full Forward Secrecy. In: Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part III. ; 2017:519--548. doi:10.1007/978-3-319-56617-7_18","apa":"Günther, F., Hale, B., Jager, T., & Lauer, S. (2017). 0-RTT Key Exchange with Full Forward Secrecy. In Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part III (pp. 519--548). https://doi.org/10.1007/978-3-319-56617-7_18","chicago":"Günther, Felix, Britta Hale, Tibor Jager, and Sebastian Lauer. “0-RTT Key Exchange with Full Forward Secrecy.” In Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part III, 519--548, 2017. https://doi.org/10.1007/978-3-319-56617-7_18."},"type":"conference","user_id":"38235","title":"0-RTT Key Exchange with Full Forward Secrecy","department":[{"_id":"558"}],"publication":"Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part III","author":[{"first_name":"Felix","full_name":"Günther, Felix","last_name":"Günther"},{"last_name":"Hale","first_name":"Britta","full_name":"Hale, Britta"},{"last_name":"Jager","id":"64669","first_name":"Tibor","full_name":"Jager, Tibor"},{"last_name":"Lauer","first_name":"Sebastian","full_name":"Lauer, Sebastian"}],"date_created":"2018-06-07T09:10:17Z","status":"public"},{"page":"409--441","type":"conference","citation":{"ieee":"T. Jager, M. Stam, R. Stanley-Oakes, and B. Warinschi, “Multi-key Authenticated Encryption with Corruptions: Reductions Are Lossy,” in Theory of Cryptography - 15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part I, 2017, pp. 409--441.","short":"T. Jager, M. Stam, R. Stanley-Oakes, B. Warinschi, in: Theory of Cryptography - 15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part I, 2017, pp. 409--441.","mla":"Jager, Tibor, et al. “Multi-Key Authenticated Encryption with Corruptions: Reductions Are Lossy.” Theory of Cryptography - 15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part I, 2017, pp. 409--441, doi:10.1007/978-3-319-70500-2_14.","bibtex":"@inproceedings{Jager_Stam_Stanley-Oakes_Warinschi_2017, title={Multi-key Authenticated Encryption with Corruptions: Reductions Are Lossy}, DOI={10.1007/978-3-319-70500-2_14}, booktitle={Theory of Cryptography - 15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part I}, author={Jager, Tibor and Stam, Martijn and Stanley-Oakes, Ryan and Warinschi, Bogdan}, year={2017}, pages={409--441} }","apa":"Jager, T., Stam, M., Stanley-Oakes, R., & Warinschi, B. (2017). Multi-key Authenticated Encryption with Corruptions: Reductions Are Lossy. In Theory of Cryptography - 15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part I (pp. 409--441). https://doi.org/10.1007/978-3-319-70500-2_14","ama":"Jager T, Stam M, Stanley-Oakes R, Warinschi B. Multi-key Authenticated Encryption with Corruptions: Reductions Are Lossy. In: Theory of Cryptography - 15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part I. ; 2017:409--441. doi:10.1007/978-3-319-70500-2_14","chicago":"Jager, Tibor, Martijn Stam, Ryan Stanley-Oakes, and Bogdan Warinschi. “Multi-Key Authenticated Encryption with Corruptions: Reductions Are Lossy.” In Theory of Cryptography - 15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part I, 409--441, 2017. https://doi.org/10.1007/978-3-319-70500-2_14."},"year":"2017","date_updated":"2022-01-06T06:58:56Z","_id":"3111","doi":"10.1007/978-3-319-70500-2_14","department":[{"_id":"558"}],"publication":"Theory of Cryptography - 15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part I","author":[{"first_name":"Tibor","full_name":"Jager, Tibor","last_name":"Jager","id":"64669"},{"first_name":"Martijn","full_name":"Stam, Martijn","last_name":"Stam"},{"first_name":"Ryan","full_name":"Stanley-Oakes, Ryan","last_name":"Stanley-Oakes"},{"last_name":"Warinschi","full_name":"Warinschi, Bogdan","first_name":"Bogdan"}],"date_created":"2018-06-07T09:11:07Z","status":"public","user_id":"38235","title":"Multi-key Authenticated Encryption with Corruptions: Reductions Are Lossy"},{"author":[{"full_name":"Hofheinz, Dennis","first_name":"Dennis","last_name":"Hofheinz"},{"id":"64669","last_name":"Jager","full_name":"Jager, Tibor","first_name":"Tibor"}],"department":[{"_id":"558"}],"publication":"Des. Codes Cryptography","status":"public","date_created":"2018-06-07T09:12:15Z","extern":"1","user_id":"38235","title":"Tightly secure signatures and public-key encryption","citation":{"ieee":"D. Hofheinz and T. Jager, “Tightly secure signatures and public-key encryption,” Des. Codes Cryptography, no. 1, pp. 29--61, 2016.","short":"D. Hofheinz, T. Jager, Des. Codes Cryptography (2016) 29--61.","bibtex":"@article{Hofheinz_Jager_2016, title={Tightly secure signatures and public-key encryption}, DOI={10.1007/s10623-015-0062-x}, number={1}, journal={Des. Codes Cryptography}, author={Hofheinz, Dennis and Jager, Tibor}, year={2016}, pages={29--61} }","mla":"Hofheinz, Dennis, and Tibor Jager. “Tightly Secure Signatures and Public-Key Encryption.” Des. Codes Cryptography, no. 1, 2016, pp. 29--61, doi:10.1007/s10623-015-0062-x.","chicago":"Hofheinz, Dennis, and Tibor Jager. “Tightly Secure Signatures and Public-Key Encryption.” Des. Codes Cryptography, no. 1 (2016): 29--61. https://doi.org/10.1007/s10623-015-0062-x.","ama":"Hofheinz D, Jager T. Tightly secure signatures and public-key encryption. Des Codes Cryptography. 2016;(1):29--61. doi:10.1007/s10623-015-0062-x","apa":"Hofheinz, D., & Jager, T. (2016). Tightly secure signatures and public-key encryption. Des. Codes Cryptography, (1), 29--61. https://doi.org/10.1007/s10623-015-0062-x"},"year":"2016","type":"journal_article","page":"29--61","_id":"3112","date_updated":"2022-01-06T06:58:56Z","issue":"1","doi":"10.1007/s10623-015-0062-x"},{"page":"304--318","year":"2016","type":"journal_article","citation":{"ieee":"F. Heuer, T. Jager, S. Schäge, and E. Kiltz, “Selective opening security of practical public-key encryption schemes,” IET Information Security, no. 6, pp. 304--318, 2016.","short":"F. Heuer, T. Jager, S. Schäge, E. Kiltz, IET Information Security (2016) 304--318.","mla":"Heuer, Felix, et al. “Selective Opening Security of Practical Public-Key Encryption Schemes.” IET Information Security, no. 6, 2016, pp. 304--318, doi:10.1049/iet-ifs.2015.0507.","bibtex":"@article{Heuer_Jager_Schäge_Kiltz_2016, title={Selective opening security of practical public-key encryption schemes}, DOI={10.1049/iet-ifs.2015.0507}, number={6}, journal={IET Information Security}, author={Heuer, Felix and Jager, Tibor and Schäge, Sven and Kiltz, Eike}, year={2016}, pages={304--318} }","chicago":"Heuer, Felix, Tibor Jager, Sven Schäge, and Eike Kiltz. “Selective Opening Security of Practical Public-Key Encryption Schemes.” IET Information Security, no. 6 (2016): 304--318. https://doi.org/10.1049/iet-ifs.2015.0507.","apa":"Heuer, F., Jager, T., Schäge, S., & Kiltz, E. (2016). Selective opening security of practical public-key encryption schemes. IET Information Security, (6), 304--318. https://doi.org/10.1049/iet-ifs.2015.0507","ama":"Heuer F, Jager T, Schäge S, Kiltz E. Selective opening security of practical public-key encryption schemes. IET Information Security. 2016;(6):304--318. doi:10.1049/iet-ifs.2015.0507"},"issue":"6","doi":"10.1049/iet-ifs.2015.0507","date_updated":"2022-01-06T06:58:56Z","_id":"3113","date_created":"2018-06-07T09:12:50Z","status":"public","publication":"IET Information Security","department":[{"_id":"558"}],"author":[{"last_name":"Heuer","full_name":"Heuer, Felix","first_name":"Felix"},{"id":"64669","last_name":"Jager","full_name":"Jager, Tibor","first_name":"Tibor"},{"last_name":"Schäge","first_name":"Sven","full_name":"Schäge, Sven"},{"last_name":"Kiltz","first_name":"Eike","full_name":"Kiltz, Eike"}],"user_id":"38235","title":"Selective opening security of practical public-key encryption schemes","extern":"1"},{"page":"62--82","type":"journal_article","year":"2016","citation":{"short":"T. Jager, A. Rupp, PoPETs (2016) 62--82.","ieee":"T. Jager and A. Rupp, “Black-Box Accumulation: Collecting Incentives in a Privacy-Preserving Way,” PoPETs, no. 3, pp. 62--82, 2016.","apa":"Jager, T., & Rupp, A. (2016). Black-Box Accumulation: Collecting Incentives in a Privacy-Preserving Way. PoPETs, (3), 62--82.","ama":"Jager T, Rupp A. Black-Box Accumulation: Collecting Incentives in a Privacy-Preserving Way. PoPETs. 2016;(3):62--82.","chicago":"Jager, Tibor, and Andy Rupp. “Black-Box Accumulation: Collecting Incentives in a Privacy-Preserving Way.” PoPETs, no. 3 (2016): 62--82.","bibtex":"@article{Jager_Rupp_2016, title={Black-Box Accumulation: Collecting Incentives in a Privacy-Preserving Way}, number={3}, journal={PoPETs}, author={Jager, Tibor and Rupp, Andy}, year={2016}, pages={62--82} }","mla":"Jager, Tibor, and Andy Rupp. “Black-Box Accumulation: Collecting Incentives in a Privacy-Preserving Way.” PoPETs, no. 3, 2016, pp. 62--82."},"_id":"3114","date_updated":"2022-01-06T06:58:56Z","issue":"3","publication":"PoPETs","department":[{"_id":"558"}],"author":[{"first_name":"Tibor","full_name":"Jager, Tibor","last_name":"Jager","id":"64669"},{"last_name":"Rupp","full_name":"Rupp, Andy","first_name":"Andy"}],"date_created":"2018-06-07T09:13:15Z","status":"public","extern":"1","title":"Black-Box Accumulation: Collecting Incentives in a Privacy-Preserving Way","user_id":"38235"},{"date_created":"2018-06-07T09:13:48Z","status":"public","publication":"Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part II","department":[{"_id":"558"}],"author":[{"first_name":"Dennis","full_name":"Hofheinz, Dennis","last_name":"Hofheinz"},{"id":"64669","last_name":"Jager","full_name":"Jager, Tibor","first_name":"Tibor"},{"full_name":"Khurana, Dakshita","first_name":"Dakshita","last_name":"Khurana"},{"last_name":"Sahai","full_name":"Sahai, Amit","first_name":"Amit"},{"first_name":"Brent","full_name":"Waters, Brent","last_name":"Waters"},{"first_name":"Mark","full_name":"Zhandry, Mark","last_name":"Zhandry"}],"title":"How to Generate and Use Universal Samplers","user_id":"38235","extern":"1","page":"715--744","type":"conference","citation":{"chicago":"Hofheinz, Dennis, Tibor Jager, Dakshita Khurana, Amit Sahai, Brent Waters, and Mark Zhandry. “How to Generate and Use Universal Samplers.” In Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part II, 715--744, 2016. https://doi.org/10.1007/978-3-662-53890-6_24.","apa":"Hofheinz, D., Jager, T., Khurana, D., Sahai, A., Waters, B., & Zhandry, M. (2016). How to Generate and Use Universal Samplers. In Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part II (pp. 715--744). https://doi.org/10.1007/978-3-662-53890-6_24","ama":"Hofheinz D, Jager T, Khurana D, Sahai A, Waters B, Zhandry M. How to Generate and Use Universal Samplers. In: Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part II. ; 2016:715--744. doi:10.1007/978-3-662-53890-6_24","bibtex":"@inproceedings{Hofheinz_Jager_Khurana_Sahai_Waters_Zhandry_2016, title={How to Generate and Use Universal Samplers}, DOI={10.1007/978-3-662-53890-6_24}, booktitle={Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part II}, author={Hofheinz, Dennis and Jager, Tibor and Khurana, Dakshita and Sahai, Amit and Waters, Brent and Zhandry, Mark}, year={2016}, pages={715--744} }","mla":"Hofheinz, Dennis, et al. “How to Generate and Use Universal Samplers.” Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part II, 2016, pp. 715--744, doi:10.1007/978-3-662-53890-6_24.","short":"D. Hofheinz, T. Jager, D. Khurana, A. Sahai, B. Waters, M. Zhandry, in: Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part II, 2016, pp. 715--744.","ieee":"D. Hofheinz, T. Jager, D. Khurana, A. Sahai, B. Waters, and M. Zhandry, “How to Generate and Use Universal Samplers,” in Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part II, 2016, pp. 715--744."},"year":"2016","doi":"10.1007/978-3-662-53890-6_24","_id":"3115","date_updated":"2022-01-06T06:58:57Z"},{"date_updated":"2022-01-06T06:58:57Z","_id":"3116","doi":"10.1007/978-3-319-48965-0_10","page":"159--175","type":"conference","citation":{"apa":"Horst, M., Grothe, M., Jager, T., & Schwenk, J. (2016). Breaking PPTP VPNs via RADIUS Encryption. In Cryptology and Network Security - 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings (pp. 159--175). https://doi.org/10.1007/978-3-319-48965-0_10","ama":"Horst M, Grothe M, Jager T, Schwenk J. Breaking PPTP VPNs via RADIUS Encryption. In: Cryptology and Network Security - 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings. ; 2016:159--175. doi:10.1007/978-3-319-48965-0_10","chicago":"Horst, Matthias, Martin Grothe, Tibor Jager, and Jörg Schwenk. “Breaking PPTP VPNs via RADIUS Encryption.” In Cryptology and Network Security - 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings, 159--175, 2016. https://doi.org/10.1007/978-3-319-48965-0_10.","mla":"Horst, Matthias, et al. “Breaking PPTP VPNs via RADIUS Encryption.” Cryptology and Network Security - 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings, 2016, pp. 159--175, doi:10.1007/978-3-319-48965-0_10.","bibtex":"@inproceedings{Horst_Grothe_Jager_Schwenk_2016, title={Breaking PPTP VPNs via RADIUS Encryption}, DOI={10.1007/978-3-319-48965-0_10}, booktitle={Cryptology and Network Security - 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings}, author={Horst, Matthias and Grothe, Martin and Jager, Tibor and Schwenk, Jörg}, year={2016}, pages={159--175} }","short":"M. Horst, M. Grothe, T. Jager, J. Schwenk, in: Cryptology and Network Security - 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings, 2016, pp. 159--175.","ieee":"M. Horst, M. Grothe, T. Jager, and J. Schwenk, “Breaking PPTP VPNs via RADIUS Encryption,” in Cryptology and Network Security - 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings, 2016, pp. 159--175."},"year":"2016","extern":"1","title":"Breaking PPTP VPNs via RADIUS Encryption","user_id":"38235","department":[{"_id":"558"}],"publication":"Cryptology and Network Security - 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings","author":[{"last_name":"Horst","first_name":"Matthias","full_name":"Horst, Matthias"},{"first_name":"Martin","full_name":"Grothe, Martin","last_name":"Grothe"},{"first_name":"Tibor","full_name":"Jager, Tibor","last_name":"Jager","id":"64669"},{"full_name":"Schwenk, Jörg","first_name":"Jörg","last_name":"Schwenk"}],"date_created":"2018-06-07T09:14:34Z","status":"public"},{"doi":"10.1007/978-3-662-49896-5_10","date_updated":"2022-01-06T06:58:57Z","_id":"3117","year":"2016","citation":{"ieee":"C. Bader, T. Jager, Y. Li, and S. Schäge, “On the Impossibility of Tight Cryptographic Reductions,” in Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II, 2016, pp. 273--304.","short":"C. Bader, T. Jager, Y. Li, S. Schäge, in: Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II, 2016, pp. 273--304.","mla":"Bader, Christoph, et al. “On the Impossibility of Tight Cryptographic Reductions.” Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II, 2016, pp. 273--304, doi:10.1007/978-3-662-49896-5_10.","bibtex":"@inproceedings{Bader_Jager_Li_Schäge_2016, title={On the Impossibility of Tight Cryptographic Reductions}, DOI={10.1007/978-3-662-49896-5_10}, booktitle={Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II}, author={Bader, Christoph and Jager, Tibor and Li, Yong and Schäge, Sven}, year={2016}, pages={273--304} }","apa":"Bader, C., Jager, T., Li, Y., & Schäge, S. (2016). On the Impossibility of Tight Cryptographic Reductions. In Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II (pp. 273--304). https://doi.org/10.1007/978-3-662-49896-5_10","ama":"Bader C, Jager T, Li Y, Schäge S. On the Impossibility of Tight Cryptographic Reductions. In: Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II. ; 2016:273--304. doi:10.1007/978-3-662-49896-5_10","chicago":"Bader, Christoph, Tibor Jager, Yong Li, and Sven Schäge. “On the Impossibility of Tight Cryptographic Reductions.” In Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II, 273--304, 2016. https://doi.org/10.1007/978-3-662-49896-5_10."},"type":"conference","page":"273--304","user_id":"38235","title":"On the Impossibility of Tight Cryptographic Reductions","extern":"1","status":"public","date_created":"2018-06-07T09:15:15Z","author":[{"full_name":"Bader, Christoph","first_name":"Christoph","last_name":"Bader"},{"last_name":"Jager","id":"64669","first_name":"Tibor","full_name":"Jager, Tibor"},{"full_name":"Li, Yong","first_name":"Yong","last_name":"Li"},{"last_name":"Schäge","first_name":"Sven","full_name":"Schäge, Sven"}],"publication":"Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II","department":[{"_id":"558"}]},{"citation":{"ieee":"D. Hofheinz, T. Jager, and A. Rupp, “Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts,” in Theory of Cryptography - 14th International Conference, TCC 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part II, 2016, pp. 146--168.","short":"D. Hofheinz, T. Jager, A. Rupp, in: Theory of Cryptography - 14th International Conference, TCC 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part II, 2016, pp. 146--168.","mla":"Hofheinz, Dennis, et al. “Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts.” Theory of Cryptography - 14th International Conference, TCC 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part II, 2016, pp. 146--168, doi:10.1007/978-3-662-53644-5_6.","bibtex":"@inproceedings{Hofheinz_Jager_Rupp_2016, title={Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts}, DOI={10.1007/978-3-662-53644-5_6}, booktitle={Theory of Cryptography - 14th International Conference, TCC 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part II}, author={Hofheinz, Dennis and Jager, Tibor and Rupp, Andy}, year={2016}, pages={146--168} }","chicago":"Hofheinz, Dennis, Tibor Jager, and Andy Rupp. “Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts.” In Theory of Cryptography - 14th International Conference, TCC 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part II, 146--168, 2016. https://doi.org/10.1007/978-3-662-53644-5_6.","ama":"Hofheinz D, Jager T, Rupp A. Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts. In: Theory of Cryptography - 14th International Conference, TCC 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part II. ; 2016:146--168. doi:10.1007/978-3-662-53644-5_6","apa":"Hofheinz, D., Jager, T., & Rupp, A. (2016). Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts. In Theory of Cryptography - 14th International Conference, TCC 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part II (pp. 146--168). https://doi.org/10.1007/978-3-662-53644-5_6"},"year":"2016","type":"conference","page":"146--168","doi":"10.1007/978-3-662-53644-5_6","_id":"3118","date_updated":"2022-01-06T06:58:57Z","status":"public","date_created":"2018-06-07T09:15:51Z","author":[{"last_name":"Hofheinz","first_name":"Dennis","full_name":"Hofheinz, Dennis"},{"id":"64669","last_name":"Jager","full_name":"Jager, Tibor","first_name":"Tibor"},{"first_name":"Andy","full_name":"Rupp, Andy","last_name":"Rupp"}],"department":[{"_id":"558"}],"publication":"Theory of Cryptography - 14th International Conference, TCC 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part II","title":"Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts","user_id":"38235","extern":"1"},{"date_created":"2018-06-07T09:16:30Z","status":"public","department":[{"_id":"558"}],"publication":"Theory of Cryptography - 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part I","author":[{"full_name":"Hofheinz, Dennis","first_name":"Dennis","last_name":"Hofheinz"},{"first_name":"Tibor","full_name":"Jager, Tibor","last_name":"Jager","id":"64669"}],"title":"Verifiable Random Functions from Standard Assumptions","user_id":"38235","extern":"1","page":"336--362","year":"2016","citation":{"short":"D. Hofheinz, T. Jager, in: Theory of Cryptography - 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part I, 2016, pp. 336--362.","ieee":"D. Hofheinz and T. Jager, “Verifiable Random Functions from Standard Assumptions,” in Theory of Cryptography - 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part I, 2016, pp. 336--362.","apa":"Hofheinz, D., & Jager, T. (2016). Verifiable Random Functions from Standard Assumptions. In Theory of Cryptography - 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part I (pp. 336--362). https://doi.org/10.1007/978-3-662-49096-9_14","ama":"Hofheinz D, Jager T. Verifiable Random Functions from Standard Assumptions. In: Theory of Cryptography - 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part I. ; 2016:336--362. doi:10.1007/978-3-662-49096-9_14","chicago":"Hofheinz, Dennis, and Tibor Jager. “Verifiable Random Functions from Standard Assumptions.” In Theory of Cryptography - 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part I, 336--362, 2016. https://doi.org/10.1007/978-3-662-49096-9_14.","mla":"Hofheinz, Dennis, and Tibor Jager. “Verifiable Random Functions from Standard Assumptions.” Theory of Cryptography - 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part I, 2016, pp. 336--362, doi:10.1007/978-3-662-49096-9_14.","bibtex":"@inproceedings{Hofheinz_Jager_2016, title={Verifiable Random Functions from Standard Assumptions}, DOI={10.1007/978-3-662-49096-9_14}, booktitle={Theory of Cryptography - 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part I}, author={Hofheinz, Dennis and Jager, Tibor}, year={2016}, pages={336--362} }"},"type":"conference","doi":"10.1007/978-3-662-49096-9_14","date_updated":"2022-01-06T06:58:57Z","_id":"3119"}]