Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

56 Publications


2017 | Journal Article | LibreCat-ID: 3108
Jager, T., Kohlar, F., Schäge, S., & Schwenk, J. (2017). Authenticated Confidential Channel Establishment and the Security of TLS-DHE. J. Cryptology, (4), 1276--1324. https://doi.org/10.1007/s00145-016-9248-2
LibreCat | DOI
 

2017 | Conference Paper | LibreCat-ID: 3109
Hale, B., Jager, T., Lauer, S., & Schwenk, J. (2017). Simple Security Definitions for and Constructions of 0-RTT Key Exchange. In Applied Cryptography and Network Security - 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings (pp. 20--38). https://doi.org/10.1007/978-3-319-61204-1_2
LibreCat | DOI
 

2017 | Conference Paper | LibreCat-ID: 3110
Günther, F., Hale, B., Jager, T., & Lauer, S. (2017). 0-RTT Key Exchange with Full Forward Secrecy. In Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part III (pp. 519--548). https://doi.org/10.1007/978-3-319-56617-7_18
LibreCat | DOI
 

2017 | Conference Paper | LibreCat-ID: 3111
Jager, T., Stam, M., Stanley-Oakes, R., & Warinschi, B. (2017). Multi-key Authenticated Encryption with Corruptions: Reductions Are Lossy. In Theory of Cryptography - 15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part I (pp. 409--441). https://doi.org/10.1007/978-3-319-70500-2_14
LibreCat | DOI
 

2017 | Journal Article | LibreCat-ID: 9607
Kakvi, S., & Kiltz, E. (2017). Optimal Security Proofs for Full Domain Hash, Revisited. Journal of Cryptology, 276–306. https://doi.org/10.1007/s00145-017-9257-9
LibreCat | DOI | Download (ext.)
 

2016 | Journal Article | LibreCat-ID: 3112
Hofheinz, D., & Jager, T. (2016). Tightly secure signatures and public-key encryption. Des. Codes Cryptography, (1), 29--61. https://doi.org/10.1007/s10623-015-0062-x
LibreCat | DOI
 

2016 | Journal Article | LibreCat-ID: 3113
Heuer, F., Jager, T., Schäge, S., & Kiltz, E. (2016). Selective opening security of practical public-key encryption schemes. IET Information Security, (6), 304--318. https://doi.org/10.1049/iet-ifs.2015.0507
LibreCat | DOI
 

2016 | Journal Article | LibreCat-ID: 3114
Jager, T., & Rupp, A. (2016). Black-Box Accumulation: Collecting Incentives in a Privacy-Preserving Way. PoPETs, (3), 62--82.
LibreCat
 

2016 | Conference Paper | LibreCat-ID: 3115
Hofheinz, D., Jager, T., Khurana, D., Sahai, A., Waters, B., & Zhandry, M. (2016). How to Generate and Use Universal Samplers. In Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part II (pp. 715--744). https://doi.org/10.1007/978-3-662-53890-6_24
LibreCat | DOI
 

2016 | Conference Paper | LibreCat-ID: 3116
Horst, M., Grothe, M., Jager, T., & Schwenk, J. (2016). Breaking PPTP VPNs via RADIUS Encryption. In Cryptology and Network Security - 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings (pp. 159--175). https://doi.org/10.1007/978-3-319-48965-0_10
LibreCat | DOI
 

Filters and Search Terms

department=558

Search

Filter Publications

Display / Sort

Citation Style: APA

Export / Embed