Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

56 Publications


2016 | Conference Paper | LibreCat-ID: 3117
Bader C, Jager T, Li Y, Schäge S. On the Impossibility of Tight Cryptographic Reductions. In: Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II. ; 2016:273--304. doi:10.1007/978-3-662-49896-5_10
LibreCat | DOI
 

2016 | Conference Paper | LibreCat-ID: 3118
Hofheinz D, Jager T, Rupp A. Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts. In: Theory of Cryptography - 14th International Conference, TCC 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part II. ; 2016:146--168. doi:10.1007/978-3-662-53644-5_6
LibreCat | DOI
 

2016 | Conference Paper | LibreCat-ID: 3119
Hofheinz D, Jager T. Verifiable Random Functions from Standard Assumptions. In: Theory of Cryptography - 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part I. ; 2016:336--362. doi:10.1007/978-3-662-49096-9_14
LibreCat | DOI
 

2016 | Journal Article | LibreCat-ID: 5446
Jager T, Rupp A. Black-Box Accumulation: Collecting Incentives in a Privacy-Preserving Way. Proceedings on Privacy Enhancing Technologies. 2016;2016(3):62-82. doi:10.1515/popets-2016-0016
LibreCat | Files available | DOI | Download (ext.)
 

2015 | Book Chapter | LibreCat-ID: 2921 | OA
Blazy O, Kakvi S, Kiltz E, Pan J. Tightly-Secure Signatures from Chameleon Hash Functions. In: Lecture Notes in Computer Science. Berlin, Heidelberg: Springer Berlin Heidelberg; 2015:256-279. doi:10.1007/978-3-662-46447-2_12
LibreCat | DOI | Download (ext.)
 

2015 | Journal Article | LibreCat-ID: 3120
Böhl F, Hofheinz D, Jager T, Koch J, Striecks C. Confined Guessing: New Signatures From Standard Assumptions. J Cryptology. 2015;(1):176--208. doi:10.1007/s00145-014-9183-z
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 3121
Jager T, Schwenk J, Somorovsky J. On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015. ; 2015:1185--1196. doi:10.1145/2810103.2813657
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 3122
Jager T, Schwenk J, Somorovsky J. Practical Invalid Curve Attacks on TLS-ECDH. In: Computer Security - ESORICS 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I. ; 2015:407--425. doi:10.1007/978-3-319-24174-6_21
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 3123
Heuer F, Jager T, Kiltz E, Schäge S. On the Selective Opening Security of Practical Public-Key Encryption Schemes. In: Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings. ; 2015:27--51. doi:10.1007/978-3-662-46447-2_2
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 3124
Bergsma F, Jager T, Schwenk J. One-Round Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model. In: Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings. ; 2015:477--494. doi:10.1007/978-3-662-46447-2_21
LibreCat | DOI
 

Filters and Search Terms

department=558

Search

Filter Publications

Display / Sort

Citation Style: AMA

Export / Embed