TY - CHAP AU - Blömer, Johannes AU - Bobolz, Jan AU - Eidens, Fabian AU - Jager, Tibor AU - Kramer, Paul ED - Haake, Claus-Jochen ED - Meyer auf der Heide, Friedhelm ED - Platzner, Marco ED - Wachsmuth, Henning ED - Wehrheim, Heike ID - 45901 T2 - On-The-Fly Computing -- Individualized IT-services in dynamic markets TI - Practical Cryptograhic Techniques for Secure and Privacy-Preserving Customer Loyalty Systems VL - 412 ER - TY - CHAP AU - Blömer, Johannes AU - Eidens, Fabian AU - Jager, Tibor AU - Niehues, David AU - Scheideler, Christian ED - Haake, Claus-Jochen ED - Meyer auf der Heide, Friedhelm ED - Platzner, Marco ED - Wachsmuth, Henning ED - Wehrheim, Heike ID - 45891 T2 - On-The-Fly Computing -- Individualized IT-services in dynamic markets TI - Robustness and Security VL - 412 ER - TY - CONF AU - Derler, David AU - Jager, Tibor AU - Slamanig, Daniel AU - Striecks, Christoph ID - 3105 T2 - Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part III TI - Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange ER - TY - CONF AU - Jager, Tibor AU - Kurek, Rafael ID - 5861 T2 - Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part II TI - Short Digital Signatures and ID-KEMs via Truncation Collision Resistance ER - TY - CONF AU - Jager, Tibor AU - Kurek, Rafael AU - Pan, Jiaxin ID - 5862 T2 - Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part III TI - Simple and More Efficient PRFs with Tight Security from LWE and Matrix-DDH ER - TY - JOUR AU - Liu, Jia AU - Jager, Tibor AU - Kakvi, Saqib AU - Warinschi, Bogdan ID - 9606 JF - Designs, Codes and Cryptography SN - 0925-1022 TI - How to build time-lock encryption ER - TY - CONF AU - Gjøsteen, Kristian AU - Jager, Tibor ID - 5438 T2 - Advances in Cryptology - CRYPTO 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part II TI - Practical and Tightly-Secure Digital Signatures and Authenticated Key Exchange ER - TY - CONF AU - Jager, Tibor AU - Kakvi, Saqib AU - May, Alexander ID - 5442 SN - 9781450356930 T2 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security - CCS '18 TI - On the Security of the PKCS#1 v1.5 Signature Scheme ER - TY - JOUR AU - Jager, Tibor AU - Kohlar, Florian AU - Schäge, Sven AU - Schwenk, Jörg ID - 3108 IS - 4 JF - J. Cryptology TI - Authenticated Confidential Channel Establishment and the Security of TLS-DHE ER - TY - CONF AU - Hale, Britta AU - Jager, Tibor AU - Lauer, Sebastian AU - Schwenk, Jörg ID - 3109 T2 - Applied Cryptography and Network Security - 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings TI - Simple Security Definitions for and Constructions of 0-RTT Key Exchange ER - TY - CONF AU - Günther, Felix AU - Hale, Britta AU - Jager, Tibor AU - Lauer, Sebastian ID - 3110 T2 - Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part III TI - 0-RTT Key Exchange with Full Forward Secrecy ER - TY - CONF AU - Jager, Tibor AU - Stam, Martijn AU - Stanley-Oakes, Ryan AU - Warinschi, Bogdan ID - 3111 T2 - Theory of Cryptography - 15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part I TI - Multi-key Authenticated Encryption with Corruptions: Reductions Are Lossy ER - TY - JOUR AU - Hofheinz, Dennis AU - Jager, Tibor ID - 3112 IS - 1 JF - Des. Codes Cryptography TI - Tightly secure signatures and public-key encryption ER - TY - JOUR AU - Heuer, Felix AU - Jager, Tibor AU - Schäge, Sven AU - Kiltz, Eike ID - 3113 IS - 6 JF - IET Information Security TI - Selective opening security of practical public-key encryption schemes ER - TY - JOUR AU - Jager, Tibor AU - Rupp, Andy ID - 3114 IS - 3 JF - PoPETs TI - Black-Box Accumulation: Collecting Incentives in a Privacy-Preserving Way ER - TY - CONF AU - Hofheinz, Dennis AU - Jager, Tibor AU - Khurana, Dakshita AU - Sahai, Amit AU - Waters, Brent AU - Zhandry, Mark ID - 3115 T2 - Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part II TI - How to Generate and Use Universal Samplers ER - TY - CONF AU - Horst, Matthias AU - Grothe, Martin AU - Jager, Tibor AU - Schwenk, Jörg ID - 3116 T2 - Cryptology and Network Security - 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings TI - Breaking PPTP VPNs via RADIUS Encryption ER - TY - CONF AU - Bader, Christoph AU - Jager, Tibor AU - Li, Yong AU - Schäge, Sven ID - 3117 T2 - Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II TI - On the Impossibility of Tight Cryptographic Reductions ER - TY - CONF AU - Hofheinz, Dennis AU - Jager, Tibor AU - Rupp, Andy ID - 3118 T2 - Theory of Cryptography - 14th International Conference, TCC 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part II TI - Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts ER - TY - CONF AU - Hofheinz, Dennis AU - Jager, Tibor ID - 3119 T2 - Theory of Cryptography - 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part I TI - Verifiable Random Functions from Standard Assumptions ER -