Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

56 Publications


2015 | Conference Paper | LibreCat-ID: 3125
Jager, T. (2015). Verifiable Random Functions from Weaker Assumptions. In Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {II} (pp. 121--143). https://doi.org/10.1007/978-3-662-46497-7_5
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 3126
Bader, C., Hofheinz, D., Jager, T., Kiltz, E., & Li, Y. (2015). Tightly-Secure Authenticated Key Exchange. In Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I (pp. 629--658). https://doi.org/10.1007/978-3-662-46494-6_26
LibreCat | DOI
 

2014 | Journal Article | LibreCat-ID: 3127
Jager, T. (2014). Die Zukunft der Kryptographie. Datenschutz Und Datensicherheit, (7), 445--451. https://doi.org/10.1007/s11623-014-0204-8
LibreCat | DOI
 

2014 | Conference Paper | LibreCat-ID: 3128
Fleischhacker, N., Jager, T., & Schröder, D. (2014). On Tight Security Proofs for Schnorr Signatures. In Advances in Cryptology - ASIACRYPT 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part I (pp. 512--531). https://doi.org/10.1007/978-3-662-45611-8_27
LibreCat | DOI
 

2013 | Journal Article | LibreCat-ID: 3129
Jager, T., & Schwenk, J. (2013). On the Analysis of Cryptographic Assumptions in the Generic Ring Model. J. Cryptology, (2), 225--245. https://doi.org/10.1007/s00145-012-9120-y
LibreCat | DOI
 

2013 | Conference Paper | LibreCat-ID: 3130
Böhl, F., Hofheinz, D., Jager, T., Koch, J., Hong Seo, J., & Striecks, C. (2013). Practical Signatures from Standard Assumptions. In Advances in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings (pp. 461--485). https://doi.org/10.1007/978-3-642-38348-9_28
LibreCat | DOI
 

2013 | Conference Paper | LibreCat-ID: 3131
Jager, T., Paterson, K. G., & Somorovsky, J. (2013). One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography. In 20th Annual Network and Distributed System Security Symposium, NDSS 2013, San Diego, California, USA, February 24-27, 2013.
LibreCat
 

2012 | Book Chapter | LibreCat-ID: 2918
Kakvi, S., Kiltz, E., & May, A. (2012). Certifying RSA. In Advances in Cryptology – ASIACRYPT 2012 (pp. 404–414). Berlin, Heidelberg: Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-34961-4_25
LibreCat | DOI
 

2012 | Book Chapter | LibreCat-ID: 2919
Kakvi, S., & Kiltz, E. (2012). Optimal Security Proofs for Full Domain Hash, Revisited. In Advances in Cryptology – EUROCRYPT 2012 (pp. 537–553). Berlin, Heidelberg: Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-29011-4_32
LibreCat | DOI | Download (ext.)
 

2012 | Dissertation | LibreCat-ID: 3132
Jager, T. (2012). On black-box models of computation in cryptology. Ruhr University Bochum.
LibreCat
 

Filters and Search Terms

department=558

Search

Filter Publications

Display / Sort

Citation Style: APA

Export / Embed