46 Publications

Mark all

[46]
2018 | Conference Paper | LibreCat-ID: 3105
Derler, David, Tibor Jager, Daniel Slamanig, and Christoph Striecks. “Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange.” In Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part III, 425--455, 2018. https://doi.org/10.1007/978-3-319-78372-7_14.
LibreCat | Files available | DOI | Download (ext.)
 
[45]
2018 | Conference Paper | LibreCat-ID: 5442
Jager, Tibor, Saqib Kakvi, and Alexander May. “On the Security of the PKCS#1 v1.5 Signature Scheme.” In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security  - CCS ’18. ACM Press, 2018. https://doi.org/10.1145/3243734.3243798.
LibreCat | Files available | DOI | Download (ext.)
 
[44]
2018 | Conference Paper | LibreCat-ID: 5861
Jager, Tibor, and Rafael Kurek. “Short Digital Signatures and ID-KEMs via Truncation Collision Resistance.” In Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part II, 221–50, 2018. https://doi.org/10.1007/978-3-030-03329-3_8.
LibreCat | DOI
 
[43]
2018 | Conference Paper | LibreCat-ID: 5862
Jager, Tibor, Rafael Kurek, and Jiaxin Pan. “Simple and More Efficient PRFs with Tight Security from LWE and Matrix-DDH.” In Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part III, 490–518, 2018. https://doi.org/10.1007/978-3-030-03332-3_18.
LibreCat | DOI
 
[42]
2018 | Conference Paper | LibreCat-ID: 5438
Gjøsteen, Kristian, and Tibor Jager. “Practical and Tightly-Secure Digital Signatures and Authenticated Key Exchange.” In Advances in Cryptology - CRYPTO 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part II, 2018. https://doi.org/10.1007/978-3-319-96881-0_4.
LibreCat | Files available | DOI | Download (ext.)
 
[41]
2018 | Journal Article | LibreCat-ID: 9606
Liu, Jia, Tibor Jager, Saqib Kakvi, and Bogdan Warinschi. “How to Build Time-Lock Encryption.” Designs, Codes and Cryptography, 2018, 2549–86. https://doi.org/10.1007/s10623-018-0461-x.
LibreCat | DOI
 
[40]
2017 | Journal Article | LibreCat-ID: 3108
Jager, Tibor, Florian Kohlar, Sven Schäge, and Jörg Schwenk. “Authenticated Confidential Channel Establishment and the Security of TLS-DHE.” J. Cryptology, no. 4 (2017): 1276--1324. https://doi.org/10.1007/s00145-016-9248-2.
LibreCat | DOI
 
[39]
2017 | Conference Paper | LibreCat-ID: 3110
Günther, Felix, Britta Hale, Tibor Jager, and Sebastian Lauer. “0-RTT Key Exchange with Full Forward Secrecy.” In Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part III, 519--548, 2017. https://doi.org/10.1007/978-3-319-56617-7_18.
LibreCat | DOI
 
[38]
2017 | Conference Paper | LibreCat-ID: 3109
Hale, Britta, Tibor Jager, Sebastian Lauer, and Jörg Schwenk. “Simple Security Definitions for and Constructions of 0-RTT Key Exchange.” In Applied Cryptography and Network Security - 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings, 20--38, 2017. https://doi.org/10.1007/978-3-319-61204-1_2.
LibreCat | DOI
 
[37]
2017 | Conference Paper | LibreCat-ID: 3111
Jager, Tibor, Martijn Stam, Ryan Stanley-Oakes, and Bogdan Warinschi. “Multi-Key Authenticated Encryption with Corruptions: Reductions Are Lossy.” In Theory of Cryptography - 15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part I, 409--441, 2017. https://doi.org/10.1007/978-3-319-70500-2_14.
LibreCat | DOI
 
[36]
2016 | Journal Article | LibreCat-ID: 3112
Hofheinz, Dennis, and Tibor Jager. “Tightly Secure Signatures and Public-Key Encryption.” Des. Codes Cryptography, no. 1 (2016): 29--61. https://doi.org/10.1007/s10623-015-0062-x.
LibreCat | DOI
 
[35]
2016 | Conference Paper | LibreCat-ID: 3117
Bader, Christoph, Tibor Jager, Yong Li, and Sven Schäge. “On the Impossibility of Tight Cryptographic Reductions.” In Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II, 273--304, 2016. https://doi.org/10.1007/978-3-662-49896-5_10.
LibreCat | DOI
 
[34]
2016 | Journal Article | LibreCat-ID: 3113
Heuer, Felix, Tibor Jager, Sven Schäge, and Eike Kiltz. “Selective Opening Security of Practical Public-Key Encryption Schemes.” IET Information Security, no. 6 (2016): 304--318. https://doi.org/10.1049/iet-ifs.2015.0507.
LibreCat | DOI
 
[33]
2016 | Conference Paper | LibreCat-ID: 3118
Hofheinz, Dennis, Tibor Jager, and Andy Rupp. “Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts.” In Theory of Cryptography - 14th International Conference, TCC 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part II, 146--168, 2016. https://doi.org/10.1007/978-3-662-53644-5_6.
LibreCat | DOI
 
[32]
2016 | Journal Article | LibreCat-ID: 3114
Jager, Tibor, and Andy Rupp. “Black-Box Accumulation: Collecting Incentives in a Privacy-Preserving Way.” PoPETs, no. 3 (2016): 62--82.
LibreCat
 
[31]
2016 | Conference Paper | LibreCat-ID: 3119
Hofheinz, Dennis, and Tibor Jager. “Verifiable Random Functions from Standard Assumptions.” In Theory of Cryptography - 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part I, 336--362, 2016. https://doi.org/10.1007/978-3-662-49096-9_14.
LibreCat | DOI
 
[30]
2016 | Conference Paper | LibreCat-ID: 3115
Hofheinz, Dennis, Tibor Jager, Dakshita Khurana, Amit Sahai, Brent Waters, and Mark Zhandry. “How to Generate and Use Universal Samplers.” In Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part II, 715--744, 2016. https://doi.org/10.1007/978-3-662-53890-6_24.
LibreCat | DOI
 
[29]
2016 | Conference Paper | LibreCat-ID: 3116
Horst, Matthias, Martin Grothe, Tibor Jager, and Jörg Schwenk. “Breaking PPTP VPNs via RADIUS Encryption.” In Cryptology and Network Security - 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings, 159--175, 2016. https://doi.org/10.1007/978-3-319-48965-0_10.
LibreCat | DOI
 
[28]
2016 | Journal Article | LibreCat-ID: 5446
Jager, Tibor, and Andy Rupp. “Black-Box Accumulation: Collecting Incentives in a Privacy-Preserving Way.” Proceedings on Privacy Enhancing Technologies 2016, no. 3 (2016): 62–82. https://doi.org/10.1515/popets-2016-0016.
LibreCat | Files available | DOI | Download (ext.)
 
[27]
2015 | Conference Paper | LibreCat-ID: 3124
Bergsma, Florian, Tibor Jager, and Jörg Schwenk. “One-Round Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model.” In Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings, 477--494, 2015. https://doi.org/10.1007/978-3-662-46447-2_21.
LibreCat | DOI
 
[26]
2015 | Journal Article | LibreCat-ID: 3120
Böhl, Florian, Dennis Hofheinz, Tibor Jager, Jessica Koch, and Christoph Striecks. “Confined Guessing: New Signatures From Standard Assumptions.” J. Cryptology, no. 1 (2015): 176--208. https://doi.org/10.1007/s00145-014-9183-z.
LibreCat | DOI
 
[25]
2015 | Conference Paper | LibreCat-ID: 3125
Jager, Tibor. “Verifiable Random Functions from Weaker Assumptions.” In Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {II}, 121--143, 2015. https://doi.org/10.1007/978-3-662-46497-7_5.
LibreCat | DOI
 
[24]
2015 | Conference Paper | LibreCat-ID: 3121
Jager, Tibor, Jörg Schwenk, and Juraj Somorovsky. “On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption.” In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015, 1185--1196, 2015. https://doi.org/10.1145/2810103.2813657.
LibreCat | DOI
 
[23]
2015 | Conference Paper | LibreCat-ID: 3126
Bader, Christoph, Dennis Hofheinz, Tibor Jager, Eike Kiltz, and Yong Li. “Tightly-Secure Authenticated Key Exchange.” In Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I, 629--658, 2015. https://doi.org/10.1007/978-3-662-46494-6_26.
LibreCat | DOI
 
[22]
2015 | Conference Paper | LibreCat-ID: 3122
Jager, Tibor, Jörg Schwenk, and Juraj Somorovsky. “Practical Invalid Curve Attacks on TLS-ECDH.” In Computer Security - ESORICS 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I, 407--425, 2015. https://doi.org/10.1007/978-3-319-24174-6_21.
LibreCat | DOI
 
[21]
2015 | Conference Paper | LibreCat-ID: 3123
Heuer, Felix, Tibor Jager, Eike Kiltz, and Sven Schäge. “On the Selective Opening Security of Practical Public-Key Encryption Schemes.” In Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings, 27--51, 2015. https://doi.org/10.1007/978-3-662-46447-2_2.
LibreCat | DOI
 
[20]
2014 | Journal Article | LibreCat-ID: 3127
Jager, Tibor. “Die Zukunft Der Kryptographie.” Datenschutz Und Datensicherheit, no. 7 (2014): 445--451. https://doi.org/10.1007/s11623-014-0204-8.
LibreCat | DOI
 
[19]
2014 | Conference Paper | LibreCat-ID: 3128
Fleischhacker, Nils, Tibor Jager, and Dominique Schröder. “On Tight Security Proofs for Schnorr Signatures.” In Advances in Cryptology - ASIACRYPT 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part I, 512--531, 2014. https://doi.org/10.1007/978-3-662-45611-8_27.
LibreCat | DOI
 
[18]
2013 | Journal Article | LibreCat-ID: 3129
Jager, Tibor, and Jörg Schwenk. “On the Analysis of Cryptographic Assumptions in the Generic Ring Model.” J. Cryptology, no. 2 (2013): 225--245. https://doi.org/10.1007/s00145-012-9120-y.
LibreCat | DOI
 
[17]
2013 | Conference Paper | LibreCat-ID: 3131
Jager, Tibor, Kenneth G. Paterson, and Juraj Somorovsky. “One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography.” In 20th Annual Network and Distributed System Security Symposium, NDSS 2013, San Diego, California, USA, February 24-27, 2013, 2013.
LibreCat
 
[16]
2013 | Conference Paper | LibreCat-ID: 3130
Böhl, Florian, Dennis Hofheinz, Tibor Jager, Jessica Koch, Jae Hong Seo, and Christoph Striecks. “Practical Signatures from Standard Assumptions.” In Advances in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings, 461--485, 2013. https://doi.org/10.1007/978-3-642-38348-9_28.
LibreCat | DOI
 
[15]
2012 | Conference Paper | LibreCat-ID: 3136
Hofheinz, Dennis, Tibor Jager, and Edward Knapp. “Waters Signatures with Optimal Security Reduction.” In Public Key Cryptography - PKC 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings, 66--83, 2012. https://doi.org/10.1007/978-3-642-30057-8_5.
LibreCat | DOI
 
[14]
2012 | Dissertation | LibreCat-ID: 3132
Jager, Tibor. On Black-Box Models of Computation in Cryptology. Ruhr University Bochum, 2012.
LibreCat
 
[13]
2012 | Conference Paper | LibreCat-ID: 3133
Jager, Tibor, Florian Kohlar, Sven Schäge, and Jörg Schwenk. “On the Security of TLS-DHE in the Standard Model.” In Advances in Cryptology - CRYPTO 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings, 273--293, 2012. https://doi.org/10.1007/978-3-642-32009-5_17.
LibreCat | DOI
 
[12]
2012 | Conference Paper | LibreCat-ID: 3134
Hofheinz, Dennis, and Tibor Jager. “Tightly Secure Signatures and Public-Key Encryption.” In Advances in Cryptology - CRYPTO 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings, 590--607, 2012. https://doi.org/10.1007/978-3-642-32009-5_35.
LibreCat | DOI
 
[11]
2012 | Conference Paper | LibreCat-ID: 3135
Jager, Tibor, Sebastian Schinzel, and Juraj Somorovsky. “Bleichenbacher’s Attack Strikes Again: Breaking PKCS#1 v1.5 in XML Encryption.” In Computer Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings, 752--769, 2012. https://doi.org/10.1007/978-3-642-33167-1_43.
LibreCat | DOI
 
[10]
2011 | Conference Paper | LibreCat-ID: 3137
Hofheinz, Dennis, Tibor Jager, and Eike Kiltz. “Short Signatures from Weaker Assumptions.” In Advances in Cryptology - ASIACRYPT 2011 - 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings, 647--666, 2011. https://doi.org/10.1007/978-3-642-25385-0_35.
LibreCat | DOI
 
[9]
2011 | Conference Paper | LibreCat-ID: 3138
Jager, Tibor, and Juraj Somorovsky. “How to Break XML Encryption.” In Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS 2011, Chicago, Illinois, USA, October 17-21, 2011, 413--422, 2011. https://doi.org/10.1145/2046707.2046756.
LibreCat | DOI
 
[8]
2010 | Conference Paper | LibreCat-ID: 3140
Jager, Tibor, and Andy Rupp. “The Semi-Generic Group Model and Applications to Pairing-Based Cryptography.” In Advances in Cryptology - ASIACRYPT 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings, 539--556, 2010. https://doi.org/10.1007/978-3-642-17373-8_31.
LibreCat | DOI
 
[7]
2010 | Conference Paper | LibreCat-ID: 3139
Jager, Tibor, Florian Kohlar, Sven Schäge, and Jörg Schwenk. “Generic Compilers for Authenticated Key Exchange.” In Advances in Cryptology - ASIACRYPT 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings, 232--249, 2010. https://doi.org/10.1007/978-3-642-17373-8_14.
LibreCat | DOI
 
[6]
2010 | Conference Paper | LibreCat-ID: 3141
Haralambiev, Kristiyan, Tibor Jager, Eike Kiltz, and Victor Shoup. “Simple and Efficient Public-Key Encryption from Computational Diffie-Hellman in the Standard Model.” In Public Key Cryptography - PKC 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings, 1--18, 2010. https://doi.org/10.1007/978-3-642-13013-7_1.
LibreCat | DOI
 
[5]
2009 | Conference Paper | LibreCat-ID: 3142
Jager, Tibor, and Jörg Schwenk. “On the Analysis of Cryptographic Assumptions in the Generic Ring Model.” In Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings, 399--416, 2009. https://doi.org/10.1007/978-3-642-10366-7_24.
LibreCat | DOI
 
[4]
2008 | Conference Paper | LibreCat-ID: 3143
Gajek, Sebastian, Tibor Jager, Mark Manulis, and Jörg Schwenk. “A Browser-Based Kerberos Authentication Scheme.” In Computer Security - ESORICS 2008, 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings, 115--129, 2008. https://doi.org/10.1007/978-3-540-88313-5_8.
LibreCat | DOI
 
[3]
2008 | Conference Paper | LibreCat-ID: 3144
Altmann, Kristina, Tibor Jager, and Andy Rupp. “On Black-Box Ring Extraction and Integer Factorization.” In Automata, Languages and Programming, 35th International Colloquium, ICALP 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part II - Track B: Logic, Semantics, and Theory of Programming & Track C: Security and Cryptography Foundations, 437--448, 2008. https://doi.org/10.1007/978-3-540-70583-3_36.
LibreCat | DOI
 
[2]
2008 | Conference Paper | LibreCat-ID: 3145
Jager, Tibor, and Jörg Schwenk. “On the Equivalence of Generic Group Models.” In Provable Security, Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings, 200--209, 2008. https://doi.org/10.1007/978-3-540-88733-1_14.
LibreCat | DOI
 
[1]
2008 | Conference Paper | LibreCat-ID: 3146
Jager, Tibor, Heiko Jäkel, and Jörg Schwenk. “Nutzung von Selbstsignierten Client-Zertifikaten Zur Authentifikation Bei SSL/TLS.” In Sicherheit 2008: Sicherheit, Schutz Und Zuverlässigkeit. Konferenzband Der 4. Jahrestagung Des Fachbereichs Sicherheit Der Gesellschaft Für Informatik e.V. (GI), 2.-4. April 2008 Im Saarbrücker Schloss., 127--136, 2008.
LibreCat
 

Search

Filter Publications

Display / Sort

Citation Style: Chicago

Export / Embed

46 Publications

Mark all

[46]
2018 | Conference Paper | LibreCat-ID: 3105
Derler, David, Tibor Jager, Daniel Slamanig, and Christoph Striecks. “Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange.” In Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part III, 425--455, 2018. https://doi.org/10.1007/978-3-319-78372-7_14.
LibreCat | Files available | DOI | Download (ext.)
 
[45]
2018 | Conference Paper | LibreCat-ID: 5442
Jager, Tibor, Saqib Kakvi, and Alexander May. “On the Security of the PKCS#1 v1.5 Signature Scheme.” In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security  - CCS ’18. ACM Press, 2018. https://doi.org/10.1145/3243734.3243798.
LibreCat | Files available | DOI | Download (ext.)
 
[44]
2018 | Conference Paper | LibreCat-ID: 5861
Jager, Tibor, and Rafael Kurek. “Short Digital Signatures and ID-KEMs via Truncation Collision Resistance.” In Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part II, 221–50, 2018. https://doi.org/10.1007/978-3-030-03329-3_8.
LibreCat | DOI
 
[43]
2018 | Conference Paper | LibreCat-ID: 5862
Jager, Tibor, Rafael Kurek, and Jiaxin Pan. “Simple and More Efficient PRFs with Tight Security from LWE and Matrix-DDH.” In Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part III, 490–518, 2018. https://doi.org/10.1007/978-3-030-03332-3_18.
LibreCat | DOI
 
[42]
2018 | Conference Paper | LibreCat-ID: 5438
Gjøsteen, Kristian, and Tibor Jager. “Practical and Tightly-Secure Digital Signatures and Authenticated Key Exchange.” In Advances in Cryptology - CRYPTO 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part II, 2018. https://doi.org/10.1007/978-3-319-96881-0_4.
LibreCat | Files available | DOI | Download (ext.)
 
[41]
2018 | Journal Article | LibreCat-ID: 9606
Liu, Jia, Tibor Jager, Saqib Kakvi, and Bogdan Warinschi. “How to Build Time-Lock Encryption.” Designs, Codes and Cryptography, 2018, 2549–86. https://doi.org/10.1007/s10623-018-0461-x.
LibreCat | DOI
 
[40]
2017 | Journal Article | LibreCat-ID: 3108
Jager, Tibor, Florian Kohlar, Sven Schäge, and Jörg Schwenk. “Authenticated Confidential Channel Establishment and the Security of TLS-DHE.” J. Cryptology, no. 4 (2017): 1276--1324. https://doi.org/10.1007/s00145-016-9248-2.
LibreCat | DOI
 
[39]
2017 | Conference Paper | LibreCat-ID: 3110
Günther, Felix, Britta Hale, Tibor Jager, and Sebastian Lauer. “0-RTT Key Exchange with Full Forward Secrecy.” In Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part III, 519--548, 2017. https://doi.org/10.1007/978-3-319-56617-7_18.
LibreCat | DOI
 
[38]
2017 | Conference Paper | LibreCat-ID: 3109
Hale, Britta, Tibor Jager, Sebastian Lauer, and Jörg Schwenk. “Simple Security Definitions for and Constructions of 0-RTT Key Exchange.” In Applied Cryptography and Network Security - 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings, 20--38, 2017. https://doi.org/10.1007/978-3-319-61204-1_2.
LibreCat | DOI
 
[37]
2017 | Conference Paper | LibreCat-ID: 3111
Jager, Tibor, Martijn Stam, Ryan Stanley-Oakes, and Bogdan Warinschi. “Multi-Key Authenticated Encryption with Corruptions: Reductions Are Lossy.” In Theory of Cryptography - 15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part I, 409--441, 2017. https://doi.org/10.1007/978-3-319-70500-2_14.
LibreCat | DOI
 
[36]
2016 | Journal Article | LibreCat-ID: 3112
Hofheinz, Dennis, and Tibor Jager. “Tightly Secure Signatures and Public-Key Encryption.” Des. Codes Cryptography, no. 1 (2016): 29--61. https://doi.org/10.1007/s10623-015-0062-x.
LibreCat | DOI
 
[35]
2016 | Conference Paper | LibreCat-ID: 3117
Bader, Christoph, Tibor Jager, Yong Li, and Sven Schäge. “On the Impossibility of Tight Cryptographic Reductions.” In Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II, 273--304, 2016. https://doi.org/10.1007/978-3-662-49896-5_10.
LibreCat | DOI
 
[34]
2016 | Journal Article | LibreCat-ID: 3113
Heuer, Felix, Tibor Jager, Sven Schäge, and Eike Kiltz. “Selective Opening Security of Practical Public-Key Encryption Schemes.” IET Information Security, no. 6 (2016): 304--318. https://doi.org/10.1049/iet-ifs.2015.0507.
LibreCat | DOI
 
[33]
2016 | Conference Paper | LibreCat-ID: 3118
Hofheinz, Dennis, Tibor Jager, and Andy Rupp. “Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts.” In Theory of Cryptography - 14th International Conference, TCC 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part II, 146--168, 2016. https://doi.org/10.1007/978-3-662-53644-5_6.
LibreCat | DOI
 
[32]
2016 | Journal Article | LibreCat-ID: 3114
Jager, Tibor, and Andy Rupp. “Black-Box Accumulation: Collecting Incentives in a Privacy-Preserving Way.” PoPETs, no. 3 (2016): 62--82.
LibreCat
 
[31]
2016 | Conference Paper | LibreCat-ID: 3119
Hofheinz, Dennis, and Tibor Jager. “Verifiable Random Functions from Standard Assumptions.” In Theory of Cryptography - 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part I, 336--362, 2016. https://doi.org/10.1007/978-3-662-49096-9_14.
LibreCat | DOI
 
[30]
2016 | Conference Paper | LibreCat-ID: 3115
Hofheinz, Dennis, Tibor Jager, Dakshita Khurana, Amit Sahai, Brent Waters, and Mark Zhandry. “How to Generate and Use Universal Samplers.” In Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part II, 715--744, 2016. https://doi.org/10.1007/978-3-662-53890-6_24.
LibreCat | DOI
 
[29]
2016 | Conference Paper | LibreCat-ID: 3116
Horst, Matthias, Martin Grothe, Tibor Jager, and Jörg Schwenk. “Breaking PPTP VPNs via RADIUS Encryption.” In Cryptology and Network Security - 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings, 159--175, 2016. https://doi.org/10.1007/978-3-319-48965-0_10.
LibreCat | DOI
 
[28]
2016 | Journal Article | LibreCat-ID: 5446
Jager, Tibor, and Andy Rupp. “Black-Box Accumulation: Collecting Incentives in a Privacy-Preserving Way.” Proceedings on Privacy Enhancing Technologies 2016, no. 3 (2016): 62–82. https://doi.org/10.1515/popets-2016-0016.
LibreCat | Files available | DOI | Download (ext.)
 
[27]
2015 | Conference Paper | LibreCat-ID: 3124
Bergsma, Florian, Tibor Jager, and Jörg Schwenk. “One-Round Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model.” In Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings, 477--494, 2015. https://doi.org/10.1007/978-3-662-46447-2_21.
LibreCat | DOI
 
[26]
2015 | Journal Article | LibreCat-ID: 3120
Böhl, Florian, Dennis Hofheinz, Tibor Jager, Jessica Koch, and Christoph Striecks. “Confined Guessing: New Signatures From Standard Assumptions.” J. Cryptology, no. 1 (2015): 176--208. https://doi.org/10.1007/s00145-014-9183-z.
LibreCat | DOI
 
[25]
2015 | Conference Paper | LibreCat-ID: 3125
Jager, Tibor. “Verifiable Random Functions from Weaker Assumptions.” In Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {II}, 121--143, 2015. https://doi.org/10.1007/978-3-662-46497-7_5.
LibreCat | DOI
 
[24]
2015 | Conference Paper | LibreCat-ID: 3121
Jager, Tibor, Jörg Schwenk, and Juraj Somorovsky. “On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption.” In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015, 1185--1196, 2015. https://doi.org/10.1145/2810103.2813657.
LibreCat | DOI
 
[23]
2015 | Conference Paper | LibreCat-ID: 3126
Bader, Christoph, Dennis Hofheinz, Tibor Jager, Eike Kiltz, and Yong Li. “Tightly-Secure Authenticated Key Exchange.” In Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I, 629--658, 2015. https://doi.org/10.1007/978-3-662-46494-6_26.
LibreCat | DOI
 
[22]
2015 | Conference Paper | LibreCat-ID: 3122
Jager, Tibor, Jörg Schwenk, and Juraj Somorovsky. “Practical Invalid Curve Attacks on TLS-ECDH.” In Computer Security - ESORICS 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I, 407--425, 2015. https://doi.org/10.1007/978-3-319-24174-6_21.
LibreCat | DOI
 
[21]
2015 | Conference Paper | LibreCat-ID: 3123
Heuer, Felix, Tibor Jager, Eike Kiltz, and Sven Schäge. “On the Selective Opening Security of Practical Public-Key Encryption Schemes.” In Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings, 27--51, 2015. https://doi.org/10.1007/978-3-662-46447-2_2.
LibreCat | DOI
 
[20]
2014 | Journal Article | LibreCat-ID: 3127
Jager, Tibor. “Die Zukunft Der Kryptographie.” Datenschutz Und Datensicherheit, no. 7 (2014): 445--451. https://doi.org/10.1007/s11623-014-0204-8.
LibreCat | DOI
 
[19]
2014 | Conference Paper | LibreCat-ID: 3128
Fleischhacker, Nils, Tibor Jager, and Dominique Schröder. “On Tight Security Proofs for Schnorr Signatures.” In Advances in Cryptology - ASIACRYPT 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part I, 512--531, 2014. https://doi.org/10.1007/978-3-662-45611-8_27.
LibreCat | DOI
 
[18]
2013 | Journal Article | LibreCat-ID: 3129
Jager, Tibor, and Jörg Schwenk. “On the Analysis of Cryptographic Assumptions in the Generic Ring Model.” J. Cryptology, no. 2 (2013): 225--245. https://doi.org/10.1007/s00145-012-9120-y.
LibreCat | DOI
 
[17]
2013 | Conference Paper | LibreCat-ID: 3131
Jager, Tibor, Kenneth G. Paterson, and Juraj Somorovsky. “One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography.” In 20th Annual Network and Distributed System Security Symposium, NDSS 2013, San Diego, California, USA, February 24-27, 2013, 2013.
LibreCat
 
[16]
2013 | Conference Paper | LibreCat-ID: 3130
Böhl, Florian, Dennis Hofheinz, Tibor Jager, Jessica Koch, Jae Hong Seo, and Christoph Striecks. “Practical Signatures from Standard Assumptions.” In Advances in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings, 461--485, 2013. https://doi.org/10.1007/978-3-642-38348-9_28.
LibreCat | DOI
 
[15]
2012 | Conference Paper | LibreCat-ID: 3136
Hofheinz, Dennis, Tibor Jager, and Edward Knapp. “Waters Signatures with Optimal Security Reduction.” In Public Key Cryptography - PKC 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings, 66--83, 2012. https://doi.org/10.1007/978-3-642-30057-8_5.
LibreCat | DOI
 
[14]
2012 | Dissertation | LibreCat-ID: 3132
Jager, Tibor. On Black-Box Models of Computation in Cryptology. Ruhr University Bochum, 2012.
LibreCat
 
[13]
2012 | Conference Paper | LibreCat-ID: 3133
Jager, Tibor, Florian Kohlar, Sven Schäge, and Jörg Schwenk. “On the Security of TLS-DHE in the Standard Model.” In Advances in Cryptology - CRYPTO 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings, 273--293, 2012. https://doi.org/10.1007/978-3-642-32009-5_17.
LibreCat | DOI
 
[12]
2012 | Conference Paper | LibreCat-ID: 3134
Hofheinz, Dennis, and Tibor Jager. “Tightly Secure Signatures and Public-Key Encryption.” In Advances in Cryptology - CRYPTO 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings, 590--607, 2012. https://doi.org/10.1007/978-3-642-32009-5_35.
LibreCat | DOI
 
[11]
2012 | Conference Paper | LibreCat-ID: 3135
Jager, Tibor, Sebastian Schinzel, and Juraj Somorovsky. “Bleichenbacher’s Attack Strikes Again: Breaking PKCS#1 v1.5 in XML Encryption.” In Computer Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings, 752--769, 2012. https://doi.org/10.1007/978-3-642-33167-1_43.
LibreCat | DOI
 
[10]
2011 | Conference Paper | LibreCat-ID: 3137
Hofheinz, Dennis, Tibor Jager, and Eike Kiltz. “Short Signatures from Weaker Assumptions.” In Advances in Cryptology - ASIACRYPT 2011 - 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings, 647--666, 2011. https://doi.org/10.1007/978-3-642-25385-0_35.
LibreCat | DOI
 
[9]
2011 | Conference Paper | LibreCat-ID: 3138
Jager, Tibor, and Juraj Somorovsky. “How to Break XML Encryption.” In Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS 2011, Chicago, Illinois, USA, October 17-21, 2011, 413--422, 2011. https://doi.org/10.1145/2046707.2046756.
LibreCat | DOI
 
[8]
2010 | Conference Paper | LibreCat-ID: 3140
Jager, Tibor, and Andy Rupp. “The Semi-Generic Group Model and Applications to Pairing-Based Cryptography.” In Advances in Cryptology - ASIACRYPT 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings, 539--556, 2010. https://doi.org/10.1007/978-3-642-17373-8_31.
LibreCat | DOI
 
[7]
2010 | Conference Paper | LibreCat-ID: 3139
Jager, Tibor, Florian Kohlar, Sven Schäge, and Jörg Schwenk. “Generic Compilers for Authenticated Key Exchange.” In Advances in Cryptology - ASIACRYPT 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings, 232--249, 2010. https://doi.org/10.1007/978-3-642-17373-8_14.
LibreCat | DOI
 
[6]
2010 | Conference Paper | LibreCat-ID: 3141
Haralambiev, Kristiyan, Tibor Jager, Eike Kiltz, and Victor Shoup. “Simple and Efficient Public-Key Encryption from Computational Diffie-Hellman in the Standard Model.” In Public Key Cryptography - PKC 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings, 1--18, 2010. https://doi.org/10.1007/978-3-642-13013-7_1.
LibreCat | DOI
 
[5]
2009 | Conference Paper | LibreCat-ID: 3142
Jager, Tibor, and Jörg Schwenk. “On the Analysis of Cryptographic Assumptions in the Generic Ring Model.” In Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings, 399--416, 2009. https://doi.org/10.1007/978-3-642-10366-7_24.
LibreCat | DOI
 
[4]
2008 | Conference Paper | LibreCat-ID: 3143
Gajek, Sebastian, Tibor Jager, Mark Manulis, and Jörg Schwenk. “A Browser-Based Kerberos Authentication Scheme.” In Computer Security - ESORICS 2008, 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings, 115--129, 2008. https://doi.org/10.1007/978-3-540-88313-5_8.
LibreCat | DOI
 
[3]
2008 | Conference Paper | LibreCat-ID: 3144
Altmann, Kristina, Tibor Jager, and Andy Rupp. “On Black-Box Ring Extraction and Integer Factorization.” In Automata, Languages and Programming, 35th International Colloquium, ICALP 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part II - Track B: Logic, Semantics, and Theory of Programming & Track C: Security and Cryptography Foundations, 437--448, 2008. https://doi.org/10.1007/978-3-540-70583-3_36.
LibreCat | DOI
 
[2]
2008 | Conference Paper | LibreCat-ID: 3145
Jager, Tibor, and Jörg Schwenk. “On the Equivalence of Generic Group Models.” In Provable Security, Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings, 200--209, 2008. https://doi.org/10.1007/978-3-540-88733-1_14.
LibreCat | DOI
 
[1]
2008 | Conference Paper | LibreCat-ID: 3146
Jager, Tibor, Heiko Jäkel, and Jörg Schwenk. “Nutzung von Selbstsignierten Client-Zertifikaten Zur Authentifikation Bei SSL/TLS.” In Sicherheit 2008: Sicherheit, Schutz Und Zuverlässigkeit. Konferenzband Der 4. Jahrestagung Des Fachbereichs Sicherheit Der Gesellschaft Für Informatik e.V. (GI), 2.-4. April 2008 Im Saarbrücker Schloss., 127--136, 2008.
LibreCat
 

Search

Filter Publications

Display / Sort

Citation Style: Chicago

Export / Embed