46 Publications

Mark all

[46]
2018 | Conference Paper | LibreCat-ID: 3105
@inproceedings{Derler_Jager_Slamanig_Striecks_2018, title={Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange}, DOI={10.1007/978-3-319-78372-7_14}, booktitle={Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part III}, author={Derler, David and Jager, Tibor and Slamanig, Daniel and Striecks, Christoph}, year={2018}, pages={425--455} }
LibreCat | Files available | DOI | Download (ext.)
 
[45]
2018 | Conference Paper | LibreCat-ID: 5442
@inproceedings{Jager_Kakvi_May_2018, title={On the Security of the PKCS#1 v1.5 Signature Scheme}, DOI={10.1145/3243734.3243798}, booktitle={Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security  - CCS ’18}, publisher={ACM Press}, author={Jager, Tibor and Kakvi, Saqib and May, Alexander}, year={2018} }
LibreCat | Files available | DOI | Download (ext.)
 
[44]
2018 | Conference Paper | LibreCat-ID: 5861
@inproceedings{Jager_Kurek_2018, title={Short Digital Signatures and ID-KEMs via Truncation Collision Resistance}, DOI={10.1007/978-3-030-03329-3_8}, booktitle={Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part II}, author={Jager, Tibor and Kurek, Rafael}, year={2018}, pages={221–250} }
LibreCat | DOI
 
[43]
2018 | Conference Paper | LibreCat-ID: 5862
@inproceedings{Jager_Kurek_Pan_2018, title={Simple and More Efficient PRFs with Tight Security from LWE and Matrix-DDH}, DOI={10.1007/978-3-030-03332-3_18}, booktitle={Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part III}, author={Jager, Tibor and Kurek, Rafael and Pan, Jiaxin}, year={2018}, pages={490–518} }
LibreCat | DOI
 
[42]
2018 | Conference Paper | LibreCat-ID: 5438
@inproceedings{Gjøsteen_Jager_2018, title={Practical and Tightly-Secure Digital Signatures and Authenticated Key Exchange}, DOI={10.1007/978-3-319-96881-0_4}, booktitle={Advances in Cryptology - CRYPTO 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part II}, author={Gjøsteen, Kristian and Jager, Tibor}, year={2018} }
LibreCat | Files available | DOI | Download (ext.)
 
[41]
2018 | Journal Article | LibreCat-ID: 9606
@article{Liu_Jager_Kakvi_Warinschi_2018, title={How to build time-lock encryption}, DOI={10.1007/s10623-018-0461-x}, journal={Designs, Codes and Cryptography}, author={Liu, Jia and Jager, Tibor and Kakvi, Saqib and Warinschi, Bogdan}, year={2018}, pages={2549–2586} }
LibreCat | DOI
 
[40]
2017 | Journal Article | LibreCat-ID: 3108
@article{Jager_Kohlar_Schäge_Schwenk_2017, title={Authenticated Confidential Channel Establishment and the Security of TLS-DHE}, DOI={10.1007/s00145-016-9248-2}, number={4}, journal={J. Cryptology}, author={Jager, Tibor and Kohlar, Florian and Schäge, Sven and Schwenk, Jörg}, year={2017}, pages={1276--1324} }
LibreCat | DOI
 
[39]
2017 | Conference Paper | LibreCat-ID: 3110
@inproceedings{Günther_Hale_Jager_Lauer_2017, title={0-RTT Key Exchange with Full Forward Secrecy}, DOI={10.1007/978-3-319-56617-7_18}, booktitle={Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part III}, author={Günther, Felix and Hale, Britta and Jager, Tibor and Lauer, Sebastian}, year={2017}, pages={519--548} }
LibreCat | DOI
 
[38]
2017 | Conference Paper | LibreCat-ID: 3109
@inproceedings{Hale_Jager_Lauer_Schwenk_2017, title={Simple Security Definitions for and Constructions of 0-RTT Key Exchange}, DOI={10.1007/978-3-319-61204-1_2}, booktitle={Applied Cryptography and Network Security - 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings}, author={Hale, Britta and Jager, Tibor and Lauer, Sebastian and Schwenk, Jörg}, year={2017}, pages={20--38} }
LibreCat | DOI
 
[37]
2017 | Conference Paper | LibreCat-ID: 3111
@inproceedings{Jager_Stam_Stanley-Oakes_Warinschi_2017, title={Multi-key Authenticated Encryption with Corruptions: Reductions Are Lossy}, DOI={10.1007/978-3-319-70500-2_14}, booktitle={Theory of Cryptography - 15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part I}, author={Jager, Tibor and Stam, Martijn and Stanley-Oakes, Ryan and Warinschi, Bogdan}, year={2017}, pages={409--441} }
LibreCat | DOI
 
[36]
2016 | Journal Article | LibreCat-ID: 3112
@article{Hofheinz_Jager_2016, title={Tightly secure signatures and public-key encryption}, DOI={10.1007/s10623-015-0062-x}, number={1}, journal={Des. Codes Cryptography}, author={Hofheinz, Dennis and Jager, Tibor}, year={2016}, pages={29--61} }
LibreCat | DOI
 
[35]
2016 | Conference Paper | LibreCat-ID: 3117
@inproceedings{Bader_Jager_Li_Schäge_2016, title={On the Impossibility of Tight Cryptographic Reductions}, DOI={10.1007/978-3-662-49896-5_10}, booktitle={Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II}, author={Bader, Christoph and Jager, Tibor and Li, Yong and Schäge, Sven}, year={2016}, pages={273--304} }
LibreCat | DOI
 
[34]
2016 | Journal Article | LibreCat-ID: 3113
@article{Heuer_Jager_Schäge_Kiltz_2016, title={Selective opening security of practical public-key encryption schemes}, DOI={10.1049/iet-ifs.2015.0507}, number={6}, journal={IET Information Security}, author={Heuer, Felix and Jager, Tibor and Schäge, Sven and Kiltz, Eike}, year={2016}, pages={304--318} }
LibreCat | DOI
 
[33]
2016 | Conference Paper | LibreCat-ID: 3118
@inproceedings{Hofheinz_Jager_Rupp_2016, title={Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts}, DOI={10.1007/978-3-662-53644-5_6}, booktitle={Theory of Cryptography - 14th International Conference, TCC 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part II}, author={Hofheinz, Dennis and Jager, Tibor and Rupp, Andy}, year={2016}, pages={146--168} }
LibreCat | DOI
 
[32]
2016 | Journal Article | LibreCat-ID: 3114
@article{Jager_Rupp_2016, title={Black-Box Accumulation: Collecting Incentives in a Privacy-Preserving Way}, number={3}, journal={PoPETs}, author={Jager, Tibor and Rupp, Andy}, year={2016}, pages={62--82} }
LibreCat
 
[31]
2016 | Conference Paper | LibreCat-ID: 3119
@inproceedings{Hofheinz_Jager_2016, title={Verifiable Random Functions from Standard Assumptions}, DOI={10.1007/978-3-662-49096-9_14}, booktitle={Theory of Cryptography - 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part I}, author={Hofheinz, Dennis and Jager, Tibor}, year={2016}, pages={336--362} }
LibreCat | DOI
 
[30]
2016 | Conference Paper | LibreCat-ID: 3115
@inproceedings{Hofheinz_Jager_Khurana_Sahai_Waters_Zhandry_2016, title={How to Generate and Use Universal Samplers}, DOI={10.1007/978-3-662-53890-6_24}, booktitle={Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part II}, author={Hofheinz, Dennis and Jager, Tibor and Khurana, Dakshita and Sahai, Amit and Waters, Brent and Zhandry, Mark}, year={2016}, pages={715--744} }
LibreCat | DOI
 
[29]
2016 | Conference Paper | LibreCat-ID: 3116
@inproceedings{Horst_Grothe_Jager_Schwenk_2016, title={Breaking PPTP VPNs via RADIUS Encryption}, DOI={10.1007/978-3-319-48965-0_10}, booktitle={Cryptology and Network Security - 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings}, author={Horst, Matthias and Grothe, Martin and Jager, Tibor and Schwenk, Jörg}, year={2016}, pages={159--175} }
LibreCat | DOI
 
[28]
2016 | Journal Article | LibreCat-ID: 5446
@article{Jager_Rupp_2016, title={Black-Box Accumulation: Collecting Incentives in a Privacy-Preserving Way}, volume={2016}, DOI={10.1515/popets-2016-0016}, number={3}, journal={Proceedings on Privacy Enhancing Technologies}, publisher={Walter de Gruyter GmbH}, author={Jager, Tibor and Rupp, Andy}, year={2016}, pages={62–82} }
LibreCat | Files available | DOI | Download (ext.)
 
[27]
2015 | Conference Paper | LibreCat-ID: 3124
@inproceedings{Bergsma_Jager_Schwenk_2015, title={One-Round Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model}, DOI={10.1007/978-3-662-46447-2_21}, booktitle={Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings}, author={Bergsma, Florian and Jager, Tibor and Schwenk, Jörg}, year={2015}, pages={477--494} }
LibreCat | DOI
 
[26]
2015 | Journal Article | LibreCat-ID: 3120
@article{Böhl_Hofheinz_Jager_Koch_Striecks_2015, title={Confined Guessing: New Signatures From Standard Assumptions}, DOI={10.1007/s00145-014-9183-z}, number={1}, journal={J. Cryptology}, author={Böhl, Florian and Hofheinz, Dennis and Jager, Tibor and Koch, Jessica and Striecks, Christoph}, year={2015}, pages={176--208} }
LibreCat | DOI
 
[25]
2015 | Conference Paper | LibreCat-ID: 3125
@inproceedings{Jager_2015, title={Verifiable Random Functions from Weaker Assumptions}, DOI={10.1007/978-3-662-46497-7_5}, booktitle={Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {II}}, author={Jager, Tibor}, year={2015}, pages={121--143} }
LibreCat | DOI
 
[24]
2015 | Conference Paper | LibreCat-ID: 3121
@inproceedings{Jager_Schwenk_Somorovsky_2015, title={On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption}, DOI={10.1145/2810103.2813657}, booktitle={Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, author={Jager, Tibor and Schwenk, Jörg and Somorovsky, Juraj}, year={2015}, pages={1185--1196} }
LibreCat | DOI
 
[23]
2015 | Conference Paper | LibreCat-ID: 3126
@inproceedings{Bader_Hofheinz_Jager_Kiltz_Li_2015, title={Tightly-Secure Authenticated Key Exchange}, DOI={10.1007/978-3-662-46494-6_26}, booktitle={Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I}, author={Bader, Christoph and Hofheinz, Dennis and Jager, Tibor and Kiltz, Eike and Li, Yong}, year={2015}, pages={629--658} }
LibreCat | DOI
 
[22]
2015 | Conference Paper | LibreCat-ID: 3122
@inproceedings{Jager_Schwenk_Somorovsky_2015, title={Practical Invalid Curve Attacks on TLS-ECDH}, DOI={10.1007/978-3-319-24174-6_21}, booktitle={Computer Security - ESORICS 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I}, author={Jager, Tibor and Schwenk, Jörg and Somorovsky, Juraj}, year={2015}, pages={407--425} }
LibreCat | DOI
 
[21]
2015 | Conference Paper | LibreCat-ID: 3123
@inproceedings{Heuer_Jager_Kiltz_Schäge_2015, title={On the Selective Opening Security of Practical Public-Key Encryption Schemes}, DOI={10.1007/978-3-662-46447-2_2}, booktitle={Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings}, author={Heuer, Felix and Jager, Tibor and Kiltz, Eike and Schäge, Sven}, year={2015}, pages={27--51} }
LibreCat | DOI
 
[20]
2014 | Journal Article | LibreCat-ID: 3127
@article{Jager_2014, title={Die Zukunft der Kryptographie}, DOI={10.1007/s11623-014-0204-8}, number={7}, journal={Datenschutz und Datensicherheit}, author={Jager, Tibor}, year={2014}, pages={445--451} }
LibreCat | DOI
 
[19]
2014 | Conference Paper | LibreCat-ID: 3128
@inproceedings{Fleischhacker_Jager_Schröder_2014, title={On Tight Security Proofs for Schnorr Signatures}, DOI={10.1007/978-3-662-45611-8_27}, booktitle={Advances in Cryptology - ASIACRYPT 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part I}, author={Fleischhacker, Nils and Jager, Tibor and Schröder, Dominique}, year={2014}, pages={512--531} }
LibreCat | DOI
 
[18]
2013 | Journal Article | LibreCat-ID: 3129
@article{Jager_Schwenk_2013, title={On the Analysis of Cryptographic Assumptions in the Generic Ring Model}, DOI={10.1007/s00145-012-9120-y}, number={2}, journal={J. Cryptology}, author={Jager, Tibor and Schwenk, Jörg}, year={2013}, pages={225--245} }
LibreCat | DOI
 
[17]
2013 | Conference Paper | LibreCat-ID: 3131
@inproceedings{Jager_Paterson_Somorovsky_2013, title={One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography}, booktitle={20th Annual Network and Distributed System Security Symposium, NDSS 2013, San Diego, California, USA, February 24-27, 2013}, author={Jager, Tibor and Paterson, Kenneth G. and Somorovsky, Juraj}, year={2013} }
LibreCat
 
[16]
2013 | Conference Paper | LibreCat-ID: 3130
@inproceedings{Böhl_Hofheinz_Jager_Koch_Hong Seo_Striecks_2013, title={Practical Signatures from Standard Assumptions}, DOI={10.1007/978-3-642-38348-9_28}, booktitle={Advances in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings}, author={Böhl, Florian and Hofheinz, Dennis and Jager, Tibor and Koch, Jessica and Hong Seo, Jae and Striecks, Christoph}, year={2013}, pages={461--485} }
LibreCat | DOI
 
[15]
2012 | Conference Paper | LibreCat-ID: 3136
@inproceedings{Hofheinz_Jager_Knapp_2012, title={Waters Signatures with Optimal Security Reduction}, DOI={10.1007/978-3-642-30057-8_5}, booktitle={Public Key Cryptography - PKC 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings}, author={Hofheinz, Dennis and Jager, Tibor and Knapp, Edward}, year={2012}, pages={66--83} }
LibreCat | DOI
 
[14]
2012 | Dissertation | LibreCat-ID: 3132
@book{Jager_2012, title={On black-box models of computation in cryptology}, publisher={Ruhr University Bochum}, author={Jager, Tibor}, year={2012} }
LibreCat
 
[13]
2012 | Conference Paper | LibreCat-ID: 3133
@inproceedings{Jager_Kohlar_Schäge_Schwenk_2012, title={On the Security of TLS-DHE in the Standard Model}, DOI={10.1007/978-3-642-32009-5_17}, booktitle={Advances in Cryptology - CRYPTO 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings}, author={Jager, Tibor and Kohlar, Florian and Schäge, Sven and Schwenk, Jörg}, year={2012}, pages={273--293} }
LibreCat | DOI
 
[12]
2012 | Conference Paper | LibreCat-ID: 3134
@inproceedings{Hofheinz_Jager_2012, title={Tightly Secure Signatures and Public-Key Encryption}, DOI={10.1007/978-3-642-32009-5_35}, booktitle={Advances in Cryptology - CRYPTO 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings}, author={Hofheinz, Dennis and Jager, Tibor}, year={2012}, pages={590--607} }
LibreCat | DOI
 
[11]
2012 | Conference Paper | LibreCat-ID: 3135
@inproceedings{Jager_Schinzel_Somorovsky_2012, title={Bleichenbacher’s Attack Strikes again: Breaking PKCS#1 v1.5 in XML Encryption}, DOI={10.1007/978-3-642-33167-1_43}, booktitle={Computer Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings}, author={Jager, Tibor and Schinzel, Sebastian and Somorovsky, Juraj}, year={2012}, pages={752--769} }
LibreCat | DOI
 
[10]
2011 | Conference Paper | LibreCat-ID: 3137
@inproceedings{Hofheinz_Jager_Kiltz_2011, title={Short Signatures from Weaker Assumptions}, DOI={10.1007/978-3-642-25385-0_35}, booktitle={Advances in Cryptology - ASIACRYPT 2011 - 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings}, author={Hofheinz, Dennis and Jager, Tibor and Kiltz, Eike}, year={2011}, pages={647--666} }
LibreCat | DOI
 
[9]
2011 | Conference Paper | LibreCat-ID: 3138
@inproceedings{Jager_Somorovsky_2011, title={How to break XML encryption}, DOI={10.1145/2046707.2046756}, booktitle={Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS 2011, Chicago, Illinois, USA, October 17-21, 2011}, author={Jager, Tibor and Somorovsky, Juraj}, year={2011}, pages={413--422} }
LibreCat | DOI
 
[8]
2010 | Conference Paper | LibreCat-ID: 3140
@inproceedings{Jager_Rupp_2010, title={The Semi-Generic Group Model and Applications to Pairing-Based Cryptography}, DOI={10.1007/978-3-642-17373-8_31}, booktitle={Advances in Cryptology - ASIACRYPT 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings}, author={Jager, Tibor and Rupp, Andy}, year={2010}, pages={539--556} }
LibreCat | DOI
 
[7]
2010 | Conference Paper | LibreCat-ID: 3139
@inproceedings{Jager_Kohlar_Schäge_Schwenk_2010, title={Generic Compilers for Authenticated Key Exchange}, DOI={10.1007/978-3-642-17373-8_14}, booktitle={Advances in Cryptology - ASIACRYPT 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings}, author={Jager, Tibor and Kohlar, Florian and Schäge, Sven and Schwenk, Jörg}, year={2010}, pages={232--249} }
LibreCat | DOI
 
[6]
2010 | Conference Paper | LibreCat-ID: 3141
@inproceedings{Haralambiev_Jager_Kiltz_Shoup_2010, title={Simple and Efficient Public-Key Encryption from Computational Diffie-Hellman in the Standard Model}, DOI={10.1007/978-3-642-13013-7_1}, booktitle={Public Key Cryptography - PKC 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings}, author={Haralambiev, Kristiyan and Jager, Tibor and Kiltz, Eike and Shoup, Victor}, year={2010}, pages={1--18} }
LibreCat | DOI
 
[5]
2009 | Conference Paper | LibreCat-ID: 3142
@inproceedings{Jager_Schwenk_2009, title={On the Analysis of Cryptographic Assumptions in the Generic Ring Model}, DOI={10.1007/978-3-642-10366-7_24}, booktitle={Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings}, author={Jager, Tibor and Schwenk, Jörg}, year={2009}, pages={399--416} }
LibreCat | DOI
 
[4]
2008 | Conference Paper | LibreCat-ID: 3143
@inproceedings{Gajek_Jager_Manulis_Schwenk_2008, title={A Browser-Based Kerberos Authentication Scheme}, DOI={10.1007/978-3-540-88313-5_8}, booktitle={Computer Security - ESORICS 2008, 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings}, author={Gajek, Sebastian and Jager, Tibor and Manulis, Mark and Schwenk, Jörg}, year={2008}, pages={115--129} }
LibreCat | DOI
 
[3]
2008 | Conference Paper | LibreCat-ID: 3144
@inproceedings{Altmann_Jager_Rupp_2008, title={On Black-Box Ring Extraction and Integer Factorization}, DOI={10.1007/978-3-540-70583-3_36}, booktitle={Automata, Languages and Programming, 35th International Colloquium, ICALP 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part II - Track B: Logic, Semantics, and Theory of Programming & Track C: Security and Cryptography Foundations}, author={Altmann, Kristina and Jager, Tibor and Rupp, Andy}, year={2008}, pages={437--448} }
LibreCat | DOI
 
[2]
2008 | Conference Paper | LibreCat-ID: 3145
@inproceedings{Jager_Schwenk_2008, title={On the Equivalence of Generic Group Models}, DOI={10.1007/978-3-540-88733-1_14}, booktitle={Provable Security, Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings}, author={Jager, Tibor and Schwenk, Jörg}, year={2008}, pages={200--209} }
LibreCat | DOI
 
[1]
2008 | Conference Paper | LibreCat-ID: 3146
@inproceedings{Jager_Jäkel_Schwenk_2008, title={Nutzung von selbstsignierten Client-Zertifikaten zur Authentifikation bei SSL/TLS}, booktitle={Sicherheit 2008: Sicherheit, Schutz und Zuverlässigkeit. Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 2.-4. April 2008 im Saarbrücker Schloss.}, author={Jager, Tibor and Jäkel, Heiko and Schwenk, Jörg}, year={2008}, pages={127--136} }
LibreCat
 

Search

Filter Publications

Display / Sort

Citation Style: BibTeX

Export / Embed

46 Publications

Mark all

[46]
2018 | Conference Paper | LibreCat-ID: 3105
@inproceedings{Derler_Jager_Slamanig_Striecks_2018, title={Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange}, DOI={10.1007/978-3-319-78372-7_14}, booktitle={Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part III}, author={Derler, David and Jager, Tibor and Slamanig, Daniel and Striecks, Christoph}, year={2018}, pages={425--455} }
LibreCat | Files available | DOI | Download (ext.)
 
[45]
2018 | Conference Paper | LibreCat-ID: 5442
@inproceedings{Jager_Kakvi_May_2018, title={On the Security of the PKCS#1 v1.5 Signature Scheme}, DOI={10.1145/3243734.3243798}, booktitle={Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security  - CCS ’18}, publisher={ACM Press}, author={Jager, Tibor and Kakvi, Saqib and May, Alexander}, year={2018} }
LibreCat | Files available | DOI | Download (ext.)
 
[44]
2018 | Conference Paper | LibreCat-ID: 5861
@inproceedings{Jager_Kurek_2018, title={Short Digital Signatures and ID-KEMs via Truncation Collision Resistance}, DOI={10.1007/978-3-030-03329-3_8}, booktitle={Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part II}, author={Jager, Tibor and Kurek, Rafael}, year={2018}, pages={221–250} }
LibreCat | DOI
 
[43]
2018 | Conference Paper | LibreCat-ID: 5862
@inproceedings{Jager_Kurek_Pan_2018, title={Simple and More Efficient PRFs with Tight Security from LWE and Matrix-DDH}, DOI={10.1007/978-3-030-03332-3_18}, booktitle={Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part III}, author={Jager, Tibor and Kurek, Rafael and Pan, Jiaxin}, year={2018}, pages={490–518} }
LibreCat | DOI
 
[42]
2018 | Conference Paper | LibreCat-ID: 5438
@inproceedings{Gjøsteen_Jager_2018, title={Practical and Tightly-Secure Digital Signatures and Authenticated Key Exchange}, DOI={10.1007/978-3-319-96881-0_4}, booktitle={Advances in Cryptology - CRYPTO 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part II}, author={Gjøsteen, Kristian and Jager, Tibor}, year={2018} }
LibreCat | Files available | DOI | Download (ext.)
 
[41]
2018 | Journal Article | LibreCat-ID: 9606
@article{Liu_Jager_Kakvi_Warinschi_2018, title={How to build time-lock encryption}, DOI={10.1007/s10623-018-0461-x}, journal={Designs, Codes and Cryptography}, author={Liu, Jia and Jager, Tibor and Kakvi, Saqib and Warinschi, Bogdan}, year={2018}, pages={2549–2586} }
LibreCat | DOI
 
[40]
2017 | Journal Article | LibreCat-ID: 3108
@article{Jager_Kohlar_Schäge_Schwenk_2017, title={Authenticated Confidential Channel Establishment and the Security of TLS-DHE}, DOI={10.1007/s00145-016-9248-2}, number={4}, journal={J. Cryptology}, author={Jager, Tibor and Kohlar, Florian and Schäge, Sven and Schwenk, Jörg}, year={2017}, pages={1276--1324} }
LibreCat | DOI
 
[39]
2017 | Conference Paper | LibreCat-ID: 3110
@inproceedings{Günther_Hale_Jager_Lauer_2017, title={0-RTT Key Exchange with Full Forward Secrecy}, DOI={10.1007/978-3-319-56617-7_18}, booktitle={Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part III}, author={Günther, Felix and Hale, Britta and Jager, Tibor and Lauer, Sebastian}, year={2017}, pages={519--548} }
LibreCat | DOI
 
[38]
2017 | Conference Paper | LibreCat-ID: 3109
@inproceedings{Hale_Jager_Lauer_Schwenk_2017, title={Simple Security Definitions for and Constructions of 0-RTT Key Exchange}, DOI={10.1007/978-3-319-61204-1_2}, booktitle={Applied Cryptography and Network Security - 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings}, author={Hale, Britta and Jager, Tibor and Lauer, Sebastian and Schwenk, Jörg}, year={2017}, pages={20--38} }
LibreCat | DOI
 
[37]
2017 | Conference Paper | LibreCat-ID: 3111
@inproceedings{Jager_Stam_Stanley-Oakes_Warinschi_2017, title={Multi-key Authenticated Encryption with Corruptions: Reductions Are Lossy}, DOI={10.1007/978-3-319-70500-2_14}, booktitle={Theory of Cryptography - 15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part I}, author={Jager, Tibor and Stam, Martijn and Stanley-Oakes, Ryan and Warinschi, Bogdan}, year={2017}, pages={409--441} }
LibreCat | DOI
 
[36]
2016 | Journal Article | LibreCat-ID: 3112
@article{Hofheinz_Jager_2016, title={Tightly secure signatures and public-key encryption}, DOI={10.1007/s10623-015-0062-x}, number={1}, journal={Des. Codes Cryptography}, author={Hofheinz, Dennis and Jager, Tibor}, year={2016}, pages={29--61} }
LibreCat | DOI
 
[35]
2016 | Conference Paper | LibreCat-ID: 3117
@inproceedings{Bader_Jager_Li_Schäge_2016, title={On the Impossibility of Tight Cryptographic Reductions}, DOI={10.1007/978-3-662-49896-5_10}, booktitle={Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II}, author={Bader, Christoph and Jager, Tibor and Li, Yong and Schäge, Sven}, year={2016}, pages={273--304} }
LibreCat | DOI
 
[34]
2016 | Journal Article | LibreCat-ID: 3113
@article{Heuer_Jager_Schäge_Kiltz_2016, title={Selective opening security of practical public-key encryption schemes}, DOI={10.1049/iet-ifs.2015.0507}, number={6}, journal={IET Information Security}, author={Heuer, Felix and Jager, Tibor and Schäge, Sven and Kiltz, Eike}, year={2016}, pages={304--318} }
LibreCat | DOI
 
[33]
2016 | Conference Paper | LibreCat-ID: 3118
@inproceedings{Hofheinz_Jager_Rupp_2016, title={Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts}, DOI={10.1007/978-3-662-53644-5_6}, booktitle={Theory of Cryptography - 14th International Conference, TCC 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part II}, author={Hofheinz, Dennis and Jager, Tibor and Rupp, Andy}, year={2016}, pages={146--168} }
LibreCat | DOI
 
[32]
2016 | Journal Article | LibreCat-ID: 3114
@article{Jager_Rupp_2016, title={Black-Box Accumulation: Collecting Incentives in a Privacy-Preserving Way}, number={3}, journal={PoPETs}, author={Jager, Tibor and Rupp, Andy}, year={2016}, pages={62--82} }
LibreCat
 
[31]
2016 | Conference Paper | LibreCat-ID: 3119
@inproceedings{Hofheinz_Jager_2016, title={Verifiable Random Functions from Standard Assumptions}, DOI={10.1007/978-3-662-49096-9_14}, booktitle={Theory of Cryptography - 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part I}, author={Hofheinz, Dennis and Jager, Tibor}, year={2016}, pages={336--362} }
LibreCat | DOI
 
[30]
2016 | Conference Paper | LibreCat-ID: 3115
@inproceedings{Hofheinz_Jager_Khurana_Sahai_Waters_Zhandry_2016, title={How to Generate and Use Universal Samplers}, DOI={10.1007/978-3-662-53890-6_24}, booktitle={Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part II}, author={Hofheinz, Dennis and Jager, Tibor and Khurana, Dakshita and Sahai, Amit and Waters, Brent and Zhandry, Mark}, year={2016}, pages={715--744} }
LibreCat | DOI
 
[29]
2016 | Conference Paper | LibreCat-ID: 3116
@inproceedings{Horst_Grothe_Jager_Schwenk_2016, title={Breaking PPTP VPNs via RADIUS Encryption}, DOI={10.1007/978-3-319-48965-0_10}, booktitle={Cryptology and Network Security - 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings}, author={Horst, Matthias and Grothe, Martin and Jager, Tibor and Schwenk, Jörg}, year={2016}, pages={159--175} }
LibreCat | DOI
 
[28]
2016 | Journal Article | LibreCat-ID: 5446
@article{Jager_Rupp_2016, title={Black-Box Accumulation: Collecting Incentives in a Privacy-Preserving Way}, volume={2016}, DOI={10.1515/popets-2016-0016}, number={3}, journal={Proceedings on Privacy Enhancing Technologies}, publisher={Walter de Gruyter GmbH}, author={Jager, Tibor and Rupp, Andy}, year={2016}, pages={62–82} }
LibreCat | Files available | DOI | Download (ext.)
 
[27]
2015 | Conference Paper | LibreCat-ID: 3124
@inproceedings{Bergsma_Jager_Schwenk_2015, title={One-Round Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model}, DOI={10.1007/978-3-662-46447-2_21}, booktitle={Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings}, author={Bergsma, Florian and Jager, Tibor and Schwenk, Jörg}, year={2015}, pages={477--494} }
LibreCat | DOI
 
[26]
2015 | Journal Article | LibreCat-ID: 3120
@article{Böhl_Hofheinz_Jager_Koch_Striecks_2015, title={Confined Guessing: New Signatures From Standard Assumptions}, DOI={10.1007/s00145-014-9183-z}, number={1}, journal={J. Cryptology}, author={Böhl, Florian and Hofheinz, Dennis and Jager, Tibor and Koch, Jessica and Striecks, Christoph}, year={2015}, pages={176--208} }
LibreCat | DOI
 
[25]
2015 | Conference Paper | LibreCat-ID: 3125
@inproceedings{Jager_2015, title={Verifiable Random Functions from Weaker Assumptions}, DOI={10.1007/978-3-662-46497-7_5}, booktitle={Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {II}}, author={Jager, Tibor}, year={2015}, pages={121--143} }
LibreCat | DOI
 
[24]
2015 | Conference Paper | LibreCat-ID: 3121
@inproceedings{Jager_Schwenk_Somorovsky_2015, title={On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption}, DOI={10.1145/2810103.2813657}, booktitle={Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, author={Jager, Tibor and Schwenk, Jörg and Somorovsky, Juraj}, year={2015}, pages={1185--1196} }
LibreCat | DOI
 
[23]
2015 | Conference Paper | LibreCat-ID: 3126
@inproceedings{Bader_Hofheinz_Jager_Kiltz_Li_2015, title={Tightly-Secure Authenticated Key Exchange}, DOI={10.1007/978-3-662-46494-6_26}, booktitle={Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I}, author={Bader, Christoph and Hofheinz, Dennis and Jager, Tibor and Kiltz, Eike and Li, Yong}, year={2015}, pages={629--658} }
LibreCat | DOI
 
[22]
2015 | Conference Paper | LibreCat-ID: 3122
@inproceedings{Jager_Schwenk_Somorovsky_2015, title={Practical Invalid Curve Attacks on TLS-ECDH}, DOI={10.1007/978-3-319-24174-6_21}, booktitle={Computer Security - ESORICS 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I}, author={Jager, Tibor and Schwenk, Jörg and Somorovsky, Juraj}, year={2015}, pages={407--425} }
LibreCat | DOI
 
[21]
2015 | Conference Paper | LibreCat-ID: 3123
@inproceedings{Heuer_Jager_Kiltz_Schäge_2015, title={On the Selective Opening Security of Practical Public-Key Encryption Schemes}, DOI={10.1007/978-3-662-46447-2_2}, booktitle={Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings}, author={Heuer, Felix and Jager, Tibor and Kiltz, Eike and Schäge, Sven}, year={2015}, pages={27--51} }
LibreCat | DOI
 
[20]
2014 | Journal Article | LibreCat-ID: 3127
@article{Jager_2014, title={Die Zukunft der Kryptographie}, DOI={10.1007/s11623-014-0204-8}, number={7}, journal={Datenschutz und Datensicherheit}, author={Jager, Tibor}, year={2014}, pages={445--451} }
LibreCat | DOI
 
[19]
2014 | Conference Paper | LibreCat-ID: 3128
@inproceedings{Fleischhacker_Jager_Schröder_2014, title={On Tight Security Proofs for Schnorr Signatures}, DOI={10.1007/978-3-662-45611-8_27}, booktitle={Advances in Cryptology - ASIACRYPT 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part I}, author={Fleischhacker, Nils and Jager, Tibor and Schröder, Dominique}, year={2014}, pages={512--531} }
LibreCat | DOI
 
[18]
2013 | Journal Article | LibreCat-ID: 3129
@article{Jager_Schwenk_2013, title={On the Analysis of Cryptographic Assumptions in the Generic Ring Model}, DOI={10.1007/s00145-012-9120-y}, number={2}, journal={J. Cryptology}, author={Jager, Tibor and Schwenk, Jörg}, year={2013}, pages={225--245} }
LibreCat | DOI
 
[17]
2013 | Conference Paper | LibreCat-ID: 3131
@inproceedings{Jager_Paterson_Somorovsky_2013, title={One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography}, booktitle={20th Annual Network and Distributed System Security Symposium, NDSS 2013, San Diego, California, USA, February 24-27, 2013}, author={Jager, Tibor and Paterson, Kenneth G. and Somorovsky, Juraj}, year={2013} }
LibreCat
 
[16]
2013 | Conference Paper | LibreCat-ID: 3130
@inproceedings{Böhl_Hofheinz_Jager_Koch_Hong Seo_Striecks_2013, title={Practical Signatures from Standard Assumptions}, DOI={10.1007/978-3-642-38348-9_28}, booktitle={Advances in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings}, author={Böhl, Florian and Hofheinz, Dennis and Jager, Tibor and Koch, Jessica and Hong Seo, Jae and Striecks, Christoph}, year={2013}, pages={461--485} }
LibreCat | DOI
 
[15]
2012 | Conference Paper | LibreCat-ID: 3136
@inproceedings{Hofheinz_Jager_Knapp_2012, title={Waters Signatures with Optimal Security Reduction}, DOI={10.1007/978-3-642-30057-8_5}, booktitle={Public Key Cryptography - PKC 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings}, author={Hofheinz, Dennis and Jager, Tibor and Knapp, Edward}, year={2012}, pages={66--83} }
LibreCat | DOI
 
[14]
2012 | Dissertation | LibreCat-ID: 3132
@book{Jager_2012, title={On black-box models of computation in cryptology}, publisher={Ruhr University Bochum}, author={Jager, Tibor}, year={2012} }
LibreCat
 
[13]
2012 | Conference Paper | LibreCat-ID: 3133
@inproceedings{Jager_Kohlar_Schäge_Schwenk_2012, title={On the Security of TLS-DHE in the Standard Model}, DOI={10.1007/978-3-642-32009-5_17}, booktitle={Advances in Cryptology - CRYPTO 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings}, author={Jager, Tibor and Kohlar, Florian and Schäge, Sven and Schwenk, Jörg}, year={2012}, pages={273--293} }
LibreCat | DOI
 
[12]
2012 | Conference Paper | LibreCat-ID: 3134
@inproceedings{Hofheinz_Jager_2012, title={Tightly Secure Signatures and Public-Key Encryption}, DOI={10.1007/978-3-642-32009-5_35}, booktitle={Advances in Cryptology - CRYPTO 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings}, author={Hofheinz, Dennis and Jager, Tibor}, year={2012}, pages={590--607} }
LibreCat | DOI
 
[11]
2012 | Conference Paper | LibreCat-ID: 3135
@inproceedings{Jager_Schinzel_Somorovsky_2012, title={Bleichenbacher’s Attack Strikes again: Breaking PKCS#1 v1.5 in XML Encryption}, DOI={10.1007/978-3-642-33167-1_43}, booktitle={Computer Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings}, author={Jager, Tibor and Schinzel, Sebastian and Somorovsky, Juraj}, year={2012}, pages={752--769} }
LibreCat | DOI
 
[10]
2011 | Conference Paper | LibreCat-ID: 3137
@inproceedings{Hofheinz_Jager_Kiltz_2011, title={Short Signatures from Weaker Assumptions}, DOI={10.1007/978-3-642-25385-0_35}, booktitle={Advances in Cryptology - ASIACRYPT 2011 - 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings}, author={Hofheinz, Dennis and Jager, Tibor and Kiltz, Eike}, year={2011}, pages={647--666} }
LibreCat | DOI
 
[9]
2011 | Conference Paper | LibreCat-ID: 3138
@inproceedings{Jager_Somorovsky_2011, title={How to break XML encryption}, DOI={10.1145/2046707.2046756}, booktitle={Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS 2011, Chicago, Illinois, USA, October 17-21, 2011}, author={Jager, Tibor and Somorovsky, Juraj}, year={2011}, pages={413--422} }
LibreCat | DOI
 
[8]
2010 | Conference Paper | LibreCat-ID: 3140
@inproceedings{Jager_Rupp_2010, title={The Semi-Generic Group Model and Applications to Pairing-Based Cryptography}, DOI={10.1007/978-3-642-17373-8_31}, booktitle={Advances in Cryptology - ASIACRYPT 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings}, author={Jager, Tibor and Rupp, Andy}, year={2010}, pages={539--556} }
LibreCat | DOI
 
[7]
2010 | Conference Paper | LibreCat-ID: 3139
@inproceedings{Jager_Kohlar_Schäge_Schwenk_2010, title={Generic Compilers for Authenticated Key Exchange}, DOI={10.1007/978-3-642-17373-8_14}, booktitle={Advances in Cryptology - ASIACRYPT 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings}, author={Jager, Tibor and Kohlar, Florian and Schäge, Sven and Schwenk, Jörg}, year={2010}, pages={232--249} }
LibreCat | DOI
 
[6]
2010 | Conference Paper | LibreCat-ID: 3141
@inproceedings{Haralambiev_Jager_Kiltz_Shoup_2010, title={Simple and Efficient Public-Key Encryption from Computational Diffie-Hellman in the Standard Model}, DOI={10.1007/978-3-642-13013-7_1}, booktitle={Public Key Cryptography - PKC 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings}, author={Haralambiev, Kristiyan and Jager, Tibor and Kiltz, Eike and Shoup, Victor}, year={2010}, pages={1--18} }
LibreCat | DOI
 
[5]
2009 | Conference Paper | LibreCat-ID: 3142
@inproceedings{Jager_Schwenk_2009, title={On the Analysis of Cryptographic Assumptions in the Generic Ring Model}, DOI={10.1007/978-3-642-10366-7_24}, booktitle={Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings}, author={Jager, Tibor and Schwenk, Jörg}, year={2009}, pages={399--416} }
LibreCat | DOI
 
[4]
2008 | Conference Paper | LibreCat-ID: 3143
@inproceedings{Gajek_Jager_Manulis_Schwenk_2008, title={A Browser-Based Kerberos Authentication Scheme}, DOI={10.1007/978-3-540-88313-5_8}, booktitle={Computer Security - ESORICS 2008, 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings}, author={Gajek, Sebastian and Jager, Tibor and Manulis, Mark and Schwenk, Jörg}, year={2008}, pages={115--129} }
LibreCat | DOI
 
[3]
2008 | Conference Paper | LibreCat-ID: 3144
@inproceedings{Altmann_Jager_Rupp_2008, title={On Black-Box Ring Extraction and Integer Factorization}, DOI={10.1007/978-3-540-70583-3_36}, booktitle={Automata, Languages and Programming, 35th International Colloquium, ICALP 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part II - Track B: Logic, Semantics, and Theory of Programming & Track C: Security and Cryptography Foundations}, author={Altmann, Kristina and Jager, Tibor and Rupp, Andy}, year={2008}, pages={437--448} }
LibreCat | DOI
 
[2]
2008 | Conference Paper | LibreCat-ID: 3145
@inproceedings{Jager_Schwenk_2008, title={On the Equivalence of Generic Group Models}, DOI={10.1007/978-3-540-88733-1_14}, booktitle={Provable Security, Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings}, author={Jager, Tibor and Schwenk, Jörg}, year={2008}, pages={200--209} }
LibreCat | DOI
 
[1]
2008 | Conference Paper | LibreCat-ID: 3146
@inproceedings{Jager_Jäkel_Schwenk_2008, title={Nutzung von selbstsignierten Client-Zertifikaten zur Authentifikation bei SSL/TLS}, booktitle={Sicherheit 2008: Sicherheit, Schutz und Zuverlässigkeit. Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 2.-4. April 2008 im Saarbrücker Schloss.}, author={Jager, Tibor and Jäkel, Heiko and Schwenk, Jörg}, year={2008}, pages={127--136} }
LibreCat
 

Search

Filter Publications

Display / Sort

Citation Style: BibTeX

Export / Embed