Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

58 Publications


2016 | Conference Paper | LibreCat-ID: 3115
How to Generate and Use Universal Samplers
D. Hofheinz, T. Jager, D. Khurana, A. Sahai, B. Waters, M. Zhandry, in: Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part II, 2016, pp. 715--744.
LibreCat | DOI
 

2016 | Conference Paper | LibreCat-ID: 3116
Breaking PPTP VPNs via RADIUS Encryption
M. Horst, M. Grothe, T. Jager, J. Schwenk, in: Cryptology and Network Security - 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings, 2016, pp. 159--175.
LibreCat | DOI
 

2016 | Conference Paper | LibreCat-ID: 3117
On the Impossibility of Tight Cryptographic Reductions
C. Bader, T. Jager, Y. Li, S. Schäge, in: Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II, 2016, pp. 273--304.
LibreCat | DOI
 

2016 | Conference Paper | LibreCat-ID: 3118
Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts
D. Hofheinz, T. Jager, A. Rupp, in: Theory of Cryptography - 14th International Conference, TCC 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part II, 2016, pp. 146--168.
LibreCat | DOI
 

2016 | Conference Paper | LibreCat-ID: 3119
Verifiable Random Functions from Standard Assumptions
D. Hofheinz, T. Jager, in: Theory of Cryptography - 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part I, 2016, pp. 336--362.
LibreCat | DOI
 

2016 | Journal Article | LibreCat-ID: 5446
Black-Box Accumulation: Collecting Incentives in a Privacy-Preserving Way
T. Jager, A. Rupp, Proceedings on Privacy Enhancing Technologies 2016 (2016) 62–82.
LibreCat | Files available | DOI | Download (ext.)
 

2015 | Book Chapter | LibreCat-ID: 2921 | OA
Tightly-Secure Signatures from Chameleon Hash Functions
O. Blazy, S. Kakvi, E. Kiltz, J. Pan, in: Lecture Notes in Computer Science, Springer Berlin Heidelberg, Berlin, Heidelberg, 2015, pp. 256–279.
LibreCat | DOI | Download (ext.)
 

2015 | Journal Article | LibreCat-ID: 3120
Confined Guessing: New Signatures From Standard Assumptions
F. Böhl, D. Hofheinz, T. Jager, J. Koch, C. Striecks, J. Cryptology (2015) 176--208.
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 3121
On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption
T. Jager, J. Schwenk, J. Somorovsky, in: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015, 2015, pp. 1185--1196.
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 3122
Practical Invalid Curve Attacks on TLS-ECDH
T. Jager, J. Schwenk, J. Somorovsky, in: Computer Security - ESORICS 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I, 2015, pp. 407--425.
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 3123
On the Selective Opening Security of Practical Public-Key Encryption Schemes
F. Heuer, T. Jager, E. Kiltz, S. Schäge, in: Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings, 2015, pp. 27--51.
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 3124
One-Round Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model
F. Bergsma, T. Jager, J. Schwenk, in: Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings, 2015, pp. 477--494.
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 3125
Verifiable Random Functions from Weaker Assumptions
T. Jager, in: Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {II}, 2015, pp. 121--143.
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 3126
Tightly-Secure Authenticated Key Exchange
C. Bader, D. Hofheinz, T. Jager, E. Kiltz, Y. Li, in: Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I, 2015, pp. 629--658.
LibreCat | DOI
 

2014 | Journal Article | LibreCat-ID: 3127
Die Zukunft der Kryptographie
T. Jager, Datenschutz Und Datensicherheit (2014) 445--451.
LibreCat | DOI
 

2014 | Conference Paper | LibreCat-ID: 3128
On Tight Security Proofs for Schnorr Signatures
N. Fleischhacker, T. Jager, D. Schröder, in: Advances in Cryptology - ASIACRYPT 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part I, 2014, pp. 512--531.
LibreCat | DOI
 

2013 | Journal Article | LibreCat-ID: 3129
On the Analysis of Cryptographic Assumptions in the Generic Ring Model
T. Jager, J. Schwenk, J. Cryptology (2013) 225--245.
LibreCat | DOI
 

2013 | Conference Paper | LibreCat-ID: 3130
Practical Signatures from Standard Assumptions
F. Böhl, D. Hofheinz, T. Jager, J. Koch, J. Hong Seo, C. Striecks, in: Advances in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings, 2013, pp. 461--485.
LibreCat | DOI
 

2013 | Conference Paper | LibreCat-ID: 3131
One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography
T. Jager, K.G. Paterson, J. Somorovsky, in: 20th Annual Network and Distributed System Security Symposium, NDSS 2013, San Diego, California, USA, February 24-27, 2013, 2013.
LibreCat
 

2012 | Book Chapter | LibreCat-ID: 2918
Certifying RSA
S. Kakvi, E. Kiltz, A. May, in: Advances in Cryptology – ASIACRYPT 2012, Springer Berlin Heidelberg, Berlin, Heidelberg, 2012, pp. 404–414.
LibreCat | DOI
 

Filters and Search Terms

(person=64669) OR (department=558)

Search

Filter Publications

Display / Sort

Export / Embed