46 Publications

Mark all

[46]
2018 | Conference Paper | LibreCat-ID: 3105
D. Derler, T. Jager, D. Slamanig, and C. Striecks, “Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange,” in Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part III, 2018, pp. 425--455.
LibreCat | Files available | DOI | Download (ext.)
 
[45]
2018 | Conference Paper | LibreCat-ID: 5442
T. Jager, S. Kakvi, and A. May, “On the Security of the PKCS#1 v1.5 Signature Scheme,” in Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security  - CCS ’18, 2018.
LibreCat | Files available | DOI | Download (ext.)
 
[44]
2018 | Conference Paper | LibreCat-ID: 5861
T. Jager and R. Kurek, “Short Digital Signatures and ID-KEMs via Truncation Collision Resistance,” in Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part II, 2018, pp. 221–250.
LibreCat | DOI
 
[43]
2018 | Conference Paper | LibreCat-ID: 5862
T. Jager, R. Kurek, and J. Pan, “Simple and More Efficient PRFs with Tight Security from LWE and Matrix-DDH,” in Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part III, 2018, pp. 490–518.
LibreCat | DOI
 
[42]
2018 | Conference Paper | LibreCat-ID: 5438
K. Gjøsteen and T. Jager, “Practical and Tightly-Secure Digital Signatures and Authenticated Key Exchange,” in Advances in Cryptology - CRYPTO 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part II, 2018.
LibreCat | Files available | DOI | Download (ext.)
 
[41]
2018 | Journal Article | LibreCat-ID: 9606
J. Liu, T. Jager, S. Kakvi, and B. Warinschi, “How to build time-lock encryption,” Designs, Codes and Cryptography, pp. 2549–2586, 2018.
LibreCat | DOI
 
[40]
2017 | Journal Article | LibreCat-ID: 3108
T. Jager, F. Kohlar, S. Schäge, and J. Schwenk, “Authenticated Confidential Channel Establishment and the Security of TLS-DHE,” J. Cryptology, no. 4, pp. 1276--1324, 2017.
LibreCat | DOI
 
[39]
2017 | Conference Paper | LibreCat-ID: 3110
F. Günther, B. Hale, T. Jager, and S. Lauer, “0-RTT Key Exchange with Full Forward Secrecy,” in Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part III, 2017, pp. 519--548.
LibreCat | DOI
 
[38]
2017 | Conference Paper | LibreCat-ID: 3109
B. Hale, T. Jager, S. Lauer, and J. Schwenk, “Simple Security Definitions for and Constructions of 0-RTT Key Exchange,” in Applied Cryptography and Network Security - 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings, 2017, pp. 20--38.
LibreCat | DOI
 
[37]
2017 | Conference Paper | LibreCat-ID: 3111
T. Jager, M. Stam, R. Stanley-Oakes, and B. Warinschi, “Multi-key Authenticated Encryption with Corruptions: Reductions Are Lossy,” in Theory of Cryptography - 15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part I, 2017, pp. 409--441.
LibreCat | DOI
 
[36]
2016 | Journal Article | LibreCat-ID: 3112
D. Hofheinz and T. Jager, “Tightly secure signatures and public-key encryption,” Des. Codes Cryptography, no. 1, pp. 29--61, 2016.
LibreCat | DOI
 
[35]
2016 | Conference Paper | LibreCat-ID: 3117
C. Bader, T. Jager, Y. Li, and S. Schäge, “On the Impossibility of Tight Cryptographic Reductions,” in Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II, 2016, pp. 273--304.
LibreCat | DOI
 
[34]
2016 | Journal Article | LibreCat-ID: 3113
F. Heuer, T. Jager, S. Schäge, and E. Kiltz, “Selective opening security of practical public-key encryption schemes,” IET Information Security, no. 6, pp. 304--318, 2016.
LibreCat | DOI
 
[33]
2016 | Conference Paper | LibreCat-ID: 3118
D. Hofheinz, T. Jager, and A. Rupp, “Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts,” in Theory of Cryptography - 14th International Conference, TCC 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part II, 2016, pp. 146--168.
LibreCat | DOI
 
[32]
2016 | Journal Article | LibreCat-ID: 3114
T. Jager and A. Rupp, “Black-Box Accumulation: Collecting Incentives in a Privacy-Preserving Way,” PoPETs, no. 3, pp. 62--82, 2016.
LibreCat
 
[31]
2016 | Conference Paper | LibreCat-ID: 3119
D. Hofheinz and T. Jager, “Verifiable Random Functions from Standard Assumptions,” in Theory of Cryptography - 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part I, 2016, pp. 336--362.
LibreCat | DOI
 
[30]
2016 | Conference Paper | LibreCat-ID: 3115
D. Hofheinz, T. Jager, D. Khurana, A. Sahai, B. Waters, and M. Zhandry, “How to Generate and Use Universal Samplers,” in Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part II, 2016, pp. 715--744.
LibreCat | DOI
 
[29]
2016 | Conference Paper | LibreCat-ID: 3116
M. Horst, M. Grothe, T. Jager, and J. Schwenk, “Breaking PPTP VPNs via RADIUS Encryption,” in Cryptology and Network Security - 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings, 2016, pp. 159--175.
LibreCat | DOI
 
[28]
2016 | Journal Article | LibreCat-ID: 5446
T. Jager and A. Rupp, “Black-Box Accumulation: Collecting Incentives in a Privacy-Preserving Way,” Proceedings on Privacy Enhancing Technologies, vol. 2016, no. 3, pp. 62–82, 2016.
LibreCat | Files available | DOI | Download (ext.)
 
[27]
2015 | Conference Paper | LibreCat-ID: 3124
F. Bergsma, T. Jager, and J. Schwenk, “One-Round Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model,” in Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings, 2015, pp. 477--494.
LibreCat | DOI
 
[26]
2015 | Journal Article | LibreCat-ID: 3120
F. Böhl, D. Hofheinz, T. Jager, J. Koch, and C. Striecks, “Confined Guessing: New Signatures From Standard Assumptions,” J. Cryptology, no. 1, pp. 176--208, 2015.
LibreCat | DOI
 
[25]
2015 | Conference Paper | LibreCat-ID: 3125
T. Jager, “Verifiable Random Functions from Weaker Assumptions,” in Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {II}, 2015, pp. 121--143.
LibreCat | DOI
 
[24]
2015 | Conference Paper | LibreCat-ID: 3121
T. Jager, J. Schwenk, and J. Somorovsky, “On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption,” in Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015, 2015, pp. 1185--1196.
LibreCat | DOI
 
[23]
2015 | Conference Paper | LibreCat-ID: 3126
C. Bader, D. Hofheinz, T. Jager, E. Kiltz, and Y. Li, “Tightly-Secure Authenticated Key Exchange,” in Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I, 2015, pp. 629--658.
LibreCat | DOI
 
[22]
2015 | Conference Paper | LibreCat-ID: 3122
T. Jager, J. Schwenk, and J. Somorovsky, “Practical Invalid Curve Attacks on TLS-ECDH,” in Computer Security - ESORICS 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I, 2015, pp. 407--425.
LibreCat | DOI
 
[21]
2015 | Conference Paper | LibreCat-ID: 3123
F. Heuer, T. Jager, E. Kiltz, and S. Schäge, “On the Selective Opening Security of Practical Public-Key Encryption Schemes,” in Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings, 2015, pp. 27--51.
LibreCat | DOI
 
[20]
2014 | Journal Article | LibreCat-ID: 3127
T. Jager, “Die Zukunft der Kryptographie,” Datenschutz und Datensicherheit, no. 7, pp. 445--451, 2014.
LibreCat | DOI
 
[19]
2014 | Conference Paper | LibreCat-ID: 3128
N. Fleischhacker, T. Jager, and D. Schröder, “On Tight Security Proofs for Schnorr Signatures,” in Advances in Cryptology - ASIACRYPT 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part I, 2014, pp. 512--531.
LibreCat | DOI
 
[18]
2013 | Journal Article | LibreCat-ID: 3129
T. Jager and J. Schwenk, “On the Analysis of Cryptographic Assumptions in the Generic Ring Model,” J. Cryptology, no. 2, pp. 225--245, 2013.
LibreCat | DOI
 
[17]
2013 | Conference Paper | LibreCat-ID: 3131
T. Jager, K. G. Paterson, and J. Somorovsky, “One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography,” in 20th Annual Network and Distributed System Security Symposium, NDSS 2013, San Diego, California, USA, February 24-27, 2013, 2013.
LibreCat
 
[16]
2013 | Conference Paper | LibreCat-ID: 3130
F. Böhl, D. Hofheinz, T. Jager, J. Koch, J. Hong Seo, and C. Striecks, “Practical Signatures from Standard Assumptions,” in Advances in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings, 2013, pp. 461--485.
LibreCat | DOI
 
[15]
2012 | Conference Paper | LibreCat-ID: 3136
D. Hofheinz, T. Jager, and E. Knapp, “Waters Signatures with Optimal Security Reduction,” in Public Key Cryptography - PKC 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings, 2012, pp. 66--83.
LibreCat | DOI
 
[14]
2012 | Dissertation | LibreCat-ID: 3132
T. Jager, On black-box models of computation in cryptology. Ruhr University Bochum, 2012.
LibreCat
 
[13]
2012 | Conference Paper | LibreCat-ID: 3133
T. Jager, F. Kohlar, S. Schäge, and J. Schwenk, “On the Security of TLS-DHE in the Standard Model,” in Advances in Cryptology - CRYPTO 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings, 2012, pp. 273--293.
LibreCat | DOI
 
[12]
2012 | Conference Paper | LibreCat-ID: 3134
D. Hofheinz and T. Jager, “Tightly Secure Signatures and Public-Key Encryption,” in Advances in Cryptology - CRYPTO 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings, 2012, pp. 590--607.
LibreCat | DOI
 
[11]
2012 | Conference Paper | LibreCat-ID: 3135
T. Jager, S. Schinzel, and J. Somorovsky, “Bleichenbacher’s Attack Strikes again: Breaking PKCS#1 v1.5 in XML Encryption,” in Computer Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings, 2012, pp. 752--769.
LibreCat | DOI
 
[10]
2011 | Conference Paper | LibreCat-ID: 3137
D. Hofheinz, T. Jager, and E. Kiltz, “Short Signatures from Weaker Assumptions,” in Advances in Cryptology - ASIACRYPT 2011 - 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings, 2011, pp. 647--666.
LibreCat | DOI
 
[9]
2011 | Conference Paper | LibreCat-ID: 3138
T. Jager and J. Somorovsky, “How to break XML encryption,” in Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS 2011, Chicago, Illinois, USA, October 17-21, 2011, 2011, pp. 413--422.
LibreCat | DOI
 
[8]
2010 | Conference Paper | LibreCat-ID: 3140
T. Jager and A. Rupp, “The Semi-Generic Group Model and Applications to Pairing-Based Cryptography,” in Advances in Cryptology - ASIACRYPT 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings, 2010, pp. 539--556.
LibreCat | DOI
 
[7]
2010 | Conference Paper | LibreCat-ID: 3139
T. Jager, F. Kohlar, S. Schäge, and J. Schwenk, “Generic Compilers for Authenticated Key Exchange,” in Advances in Cryptology - ASIACRYPT 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings, 2010, pp. 232--249.
LibreCat | DOI
 
[6]
2010 | Conference Paper | LibreCat-ID: 3141
K. Haralambiev, T. Jager, E. Kiltz, and V. Shoup, “Simple and Efficient Public-Key Encryption from Computational Diffie-Hellman in the Standard Model,” in Public Key Cryptography - PKC 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings, 2010, pp. 1--18.
LibreCat | DOI
 
[5]
2009 | Conference Paper | LibreCat-ID: 3142
T. Jager and J. Schwenk, “On the Analysis of Cryptographic Assumptions in the Generic Ring Model,” in Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings, 2009, pp. 399--416.
LibreCat | DOI
 
[4]
2008 | Conference Paper | LibreCat-ID: 3143
S. Gajek, T. Jager, M. Manulis, and J. Schwenk, “A Browser-Based Kerberos Authentication Scheme,” in Computer Security - ESORICS 2008, 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings, 2008, pp. 115--129.
LibreCat | DOI
 
[3]
2008 | Conference Paper | LibreCat-ID: 3144
K. Altmann, T. Jager, and A. Rupp, “On Black-Box Ring Extraction and Integer Factorization,” in Automata, Languages and Programming, 35th International Colloquium, ICALP 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part II - Track B: Logic, Semantics, and Theory of Programming & Track C: Security and Cryptography Foundations, 2008, pp. 437--448.
LibreCat | DOI
 
[2]
2008 | Conference Paper | LibreCat-ID: 3145
T. Jager and J. Schwenk, “On the Equivalence of Generic Group Models,” in Provable Security, Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings, 2008, pp. 200--209.
LibreCat | DOI
 
[1]
2008 | Conference Paper | LibreCat-ID: 3146
T. Jager, H. Jäkel, and J. Schwenk, “Nutzung von selbstsignierten Client-Zertifikaten zur Authentifikation bei SSL/TLS,” in Sicherheit 2008: Sicherheit, Schutz und Zuverlässigkeit. Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 2.-4. April 2008 im Saarbrücker Schloss., 2008, pp. 127--136.
LibreCat
 

Search

Filter Publications

Display / Sort

Citation Style: IEEE

Export / Embed

46 Publications

Mark all

[46]
2018 | Conference Paper | LibreCat-ID: 3105
D. Derler, T. Jager, D. Slamanig, and C. Striecks, “Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange,” in Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part III, 2018, pp. 425--455.
LibreCat | Files available | DOI | Download (ext.)
 
[45]
2018 | Conference Paper | LibreCat-ID: 5442
T. Jager, S. Kakvi, and A. May, “On the Security of the PKCS#1 v1.5 Signature Scheme,” in Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security  - CCS ’18, 2018.
LibreCat | Files available | DOI | Download (ext.)
 
[44]
2018 | Conference Paper | LibreCat-ID: 5861
T. Jager and R. Kurek, “Short Digital Signatures and ID-KEMs via Truncation Collision Resistance,” in Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part II, 2018, pp. 221–250.
LibreCat | DOI
 
[43]
2018 | Conference Paper | LibreCat-ID: 5862
T. Jager, R. Kurek, and J. Pan, “Simple and More Efficient PRFs with Tight Security from LWE and Matrix-DDH,” in Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part III, 2018, pp. 490–518.
LibreCat | DOI
 
[42]
2018 | Conference Paper | LibreCat-ID: 5438
K. Gjøsteen and T. Jager, “Practical and Tightly-Secure Digital Signatures and Authenticated Key Exchange,” in Advances in Cryptology - CRYPTO 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part II, 2018.
LibreCat | Files available | DOI | Download (ext.)
 
[41]
2018 | Journal Article | LibreCat-ID: 9606
J. Liu, T. Jager, S. Kakvi, and B. Warinschi, “How to build time-lock encryption,” Designs, Codes and Cryptography, pp. 2549–2586, 2018.
LibreCat | DOI
 
[40]
2017 | Journal Article | LibreCat-ID: 3108
T. Jager, F. Kohlar, S. Schäge, and J. Schwenk, “Authenticated Confidential Channel Establishment and the Security of TLS-DHE,” J. Cryptology, no. 4, pp. 1276--1324, 2017.
LibreCat | DOI
 
[39]
2017 | Conference Paper | LibreCat-ID: 3110
F. Günther, B. Hale, T. Jager, and S. Lauer, “0-RTT Key Exchange with Full Forward Secrecy,” in Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part III, 2017, pp. 519--548.
LibreCat | DOI
 
[38]
2017 | Conference Paper | LibreCat-ID: 3109
B. Hale, T. Jager, S. Lauer, and J. Schwenk, “Simple Security Definitions for and Constructions of 0-RTT Key Exchange,” in Applied Cryptography and Network Security - 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings, 2017, pp. 20--38.
LibreCat | DOI
 
[37]
2017 | Conference Paper | LibreCat-ID: 3111
T. Jager, M. Stam, R. Stanley-Oakes, and B. Warinschi, “Multi-key Authenticated Encryption with Corruptions: Reductions Are Lossy,” in Theory of Cryptography - 15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part I, 2017, pp. 409--441.
LibreCat | DOI
 
[36]
2016 | Journal Article | LibreCat-ID: 3112
D. Hofheinz and T. Jager, “Tightly secure signatures and public-key encryption,” Des. Codes Cryptography, no. 1, pp. 29--61, 2016.
LibreCat | DOI
 
[35]
2016 | Conference Paper | LibreCat-ID: 3117
C. Bader, T. Jager, Y. Li, and S. Schäge, “On the Impossibility of Tight Cryptographic Reductions,” in Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II, 2016, pp. 273--304.
LibreCat | DOI
 
[34]
2016 | Journal Article | LibreCat-ID: 3113
F. Heuer, T. Jager, S. Schäge, and E. Kiltz, “Selective opening security of practical public-key encryption schemes,” IET Information Security, no. 6, pp. 304--318, 2016.
LibreCat | DOI
 
[33]
2016 | Conference Paper | LibreCat-ID: 3118
D. Hofheinz, T. Jager, and A. Rupp, “Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts,” in Theory of Cryptography - 14th International Conference, TCC 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part II, 2016, pp. 146--168.
LibreCat | DOI
 
[32]
2016 | Journal Article | LibreCat-ID: 3114
T. Jager and A. Rupp, “Black-Box Accumulation: Collecting Incentives in a Privacy-Preserving Way,” PoPETs, no. 3, pp. 62--82, 2016.
LibreCat
 
[31]
2016 | Conference Paper | LibreCat-ID: 3119
D. Hofheinz and T. Jager, “Verifiable Random Functions from Standard Assumptions,” in Theory of Cryptography - 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part I, 2016, pp. 336--362.
LibreCat | DOI
 
[30]
2016 | Conference Paper | LibreCat-ID: 3115
D. Hofheinz, T. Jager, D. Khurana, A. Sahai, B. Waters, and M. Zhandry, “How to Generate and Use Universal Samplers,” in Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part II, 2016, pp. 715--744.
LibreCat | DOI
 
[29]
2016 | Conference Paper | LibreCat-ID: 3116
M. Horst, M. Grothe, T. Jager, and J. Schwenk, “Breaking PPTP VPNs via RADIUS Encryption,” in Cryptology and Network Security - 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings, 2016, pp. 159--175.
LibreCat | DOI
 
[28]
2016 | Journal Article | LibreCat-ID: 5446
T. Jager and A. Rupp, “Black-Box Accumulation: Collecting Incentives in a Privacy-Preserving Way,” Proceedings on Privacy Enhancing Technologies, vol. 2016, no. 3, pp. 62–82, 2016.
LibreCat | Files available | DOI | Download (ext.)
 
[27]
2015 | Conference Paper | LibreCat-ID: 3124
F. Bergsma, T. Jager, and J. Schwenk, “One-Round Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model,” in Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings, 2015, pp. 477--494.
LibreCat | DOI
 
[26]
2015 | Journal Article | LibreCat-ID: 3120
F. Böhl, D. Hofheinz, T. Jager, J. Koch, and C. Striecks, “Confined Guessing: New Signatures From Standard Assumptions,” J. Cryptology, no. 1, pp. 176--208, 2015.
LibreCat | DOI
 
[25]
2015 | Conference Paper | LibreCat-ID: 3125
T. Jager, “Verifiable Random Functions from Weaker Assumptions,” in Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {II}, 2015, pp. 121--143.
LibreCat | DOI
 
[24]
2015 | Conference Paper | LibreCat-ID: 3121
T. Jager, J. Schwenk, and J. Somorovsky, “On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption,” in Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015, 2015, pp. 1185--1196.
LibreCat | DOI
 
[23]
2015 | Conference Paper | LibreCat-ID: 3126
C. Bader, D. Hofheinz, T. Jager, E. Kiltz, and Y. Li, “Tightly-Secure Authenticated Key Exchange,” in Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I, 2015, pp. 629--658.
LibreCat | DOI
 
[22]
2015 | Conference Paper | LibreCat-ID: 3122
T. Jager, J. Schwenk, and J. Somorovsky, “Practical Invalid Curve Attacks on TLS-ECDH,” in Computer Security - ESORICS 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I, 2015, pp. 407--425.
LibreCat | DOI
 
[21]
2015 | Conference Paper | LibreCat-ID: 3123
F. Heuer, T. Jager, E. Kiltz, and S. Schäge, “On the Selective Opening Security of Practical Public-Key Encryption Schemes,” in Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings, 2015, pp. 27--51.
LibreCat | DOI
 
[20]
2014 | Journal Article | LibreCat-ID: 3127
T. Jager, “Die Zukunft der Kryptographie,” Datenschutz und Datensicherheit, no. 7, pp. 445--451, 2014.
LibreCat | DOI
 
[19]
2014 | Conference Paper | LibreCat-ID: 3128
N. Fleischhacker, T. Jager, and D. Schröder, “On Tight Security Proofs for Schnorr Signatures,” in Advances in Cryptology - ASIACRYPT 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part I, 2014, pp. 512--531.
LibreCat | DOI
 
[18]
2013 | Journal Article | LibreCat-ID: 3129
T. Jager and J. Schwenk, “On the Analysis of Cryptographic Assumptions in the Generic Ring Model,” J. Cryptology, no. 2, pp. 225--245, 2013.
LibreCat | DOI
 
[17]
2013 | Conference Paper | LibreCat-ID: 3131
T. Jager, K. G. Paterson, and J. Somorovsky, “One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography,” in 20th Annual Network and Distributed System Security Symposium, NDSS 2013, San Diego, California, USA, February 24-27, 2013, 2013.
LibreCat
 
[16]
2013 | Conference Paper | LibreCat-ID: 3130
F. Böhl, D. Hofheinz, T. Jager, J. Koch, J. Hong Seo, and C. Striecks, “Practical Signatures from Standard Assumptions,” in Advances in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings, 2013, pp. 461--485.
LibreCat | DOI
 
[15]
2012 | Conference Paper | LibreCat-ID: 3136
D. Hofheinz, T. Jager, and E. Knapp, “Waters Signatures with Optimal Security Reduction,” in Public Key Cryptography - PKC 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings, 2012, pp. 66--83.
LibreCat | DOI
 
[14]
2012 | Dissertation | LibreCat-ID: 3132
T. Jager, On black-box models of computation in cryptology. Ruhr University Bochum, 2012.
LibreCat
 
[13]
2012 | Conference Paper | LibreCat-ID: 3133
T. Jager, F. Kohlar, S. Schäge, and J. Schwenk, “On the Security of TLS-DHE in the Standard Model,” in Advances in Cryptology - CRYPTO 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings, 2012, pp. 273--293.
LibreCat | DOI
 
[12]
2012 | Conference Paper | LibreCat-ID: 3134
D. Hofheinz and T. Jager, “Tightly Secure Signatures and Public-Key Encryption,” in Advances in Cryptology - CRYPTO 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings, 2012, pp. 590--607.
LibreCat | DOI
 
[11]
2012 | Conference Paper | LibreCat-ID: 3135
T. Jager, S. Schinzel, and J. Somorovsky, “Bleichenbacher’s Attack Strikes again: Breaking PKCS#1 v1.5 in XML Encryption,” in Computer Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings, 2012, pp. 752--769.
LibreCat | DOI
 
[10]
2011 | Conference Paper | LibreCat-ID: 3137
D. Hofheinz, T. Jager, and E. Kiltz, “Short Signatures from Weaker Assumptions,” in Advances in Cryptology - ASIACRYPT 2011 - 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings, 2011, pp. 647--666.
LibreCat | DOI
 
[9]
2011 | Conference Paper | LibreCat-ID: 3138
T. Jager and J. Somorovsky, “How to break XML encryption,” in Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS 2011, Chicago, Illinois, USA, October 17-21, 2011, 2011, pp. 413--422.
LibreCat | DOI
 
[8]
2010 | Conference Paper | LibreCat-ID: 3140
T. Jager and A. Rupp, “The Semi-Generic Group Model and Applications to Pairing-Based Cryptography,” in Advances in Cryptology - ASIACRYPT 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings, 2010, pp. 539--556.
LibreCat | DOI
 
[7]
2010 | Conference Paper | LibreCat-ID: 3139
T. Jager, F. Kohlar, S. Schäge, and J. Schwenk, “Generic Compilers for Authenticated Key Exchange,” in Advances in Cryptology - ASIACRYPT 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings, 2010, pp. 232--249.
LibreCat | DOI
 
[6]
2010 | Conference Paper | LibreCat-ID: 3141
K. Haralambiev, T. Jager, E. Kiltz, and V. Shoup, “Simple and Efficient Public-Key Encryption from Computational Diffie-Hellman in the Standard Model,” in Public Key Cryptography - PKC 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings, 2010, pp. 1--18.
LibreCat | DOI
 
[5]
2009 | Conference Paper | LibreCat-ID: 3142
T. Jager and J. Schwenk, “On the Analysis of Cryptographic Assumptions in the Generic Ring Model,” in Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings, 2009, pp. 399--416.
LibreCat | DOI
 
[4]
2008 | Conference Paper | LibreCat-ID: 3143
S. Gajek, T. Jager, M. Manulis, and J. Schwenk, “A Browser-Based Kerberos Authentication Scheme,” in Computer Security - ESORICS 2008, 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings, 2008, pp. 115--129.
LibreCat | DOI
 
[3]
2008 | Conference Paper | LibreCat-ID: 3144
K. Altmann, T. Jager, and A. Rupp, “On Black-Box Ring Extraction and Integer Factorization,” in Automata, Languages and Programming, 35th International Colloquium, ICALP 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part II - Track B: Logic, Semantics, and Theory of Programming & Track C: Security and Cryptography Foundations, 2008, pp. 437--448.
LibreCat | DOI
 
[2]
2008 | Conference Paper | LibreCat-ID: 3145
T. Jager and J. Schwenk, “On the Equivalence of Generic Group Models,” in Provable Security, Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings, 2008, pp. 200--209.
LibreCat | DOI
 
[1]
2008 | Conference Paper | LibreCat-ID: 3146
T. Jager, H. Jäkel, and J. Schwenk, “Nutzung von selbstsignierten Client-Zertifikaten zur Authentifikation bei SSL/TLS,” in Sicherheit 2008: Sicherheit, Schutz und Zuverlässigkeit. Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 2.-4. April 2008 im Saarbrücker Schloss., 2008, pp. 127--136.
LibreCat
 

Search

Filter Publications

Display / Sort

Citation Style: IEEE

Export / Embed