Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

56 Publications


2022 | Dissertation | LibreCat-ID: 29763 | OA
Niehues D. More Efficient Techniques for Adaptively-Secure Cryptography.; 2022. doi:10.25926/rdtq-jw45
LibreCat | Files available | DOI | Download (ext.)
 

2021 | Book Chapter | LibreCat-ID: 22057
Jager T, Kurek R, Niehues D. Efficient Adaptively-Secure IB-KEMs and VRFs via Near-Collision Resistance. In: Public-Key Cryptography – PKC 2021. Cham; 2021. doi:10.1007/978-3-030-75245-3_22
LibreCat | Files available | DOI
 

2021 | Book Chapter | LibreCat-ID: 22059
Niehues D. Verifiable Random Functions with Optimal Tightness. In: Public-Key Cryptography – PKC 2021. Cham; 2021. doi:10.1007/978-3-030-75248-4_3
LibreCat | Files available | DOI
 

2020 | Book Chapter | LibreCat-ID: 21396
Jager T, Niehues D. On the Real-World Instantiability of Admissible Hash Functions and Efficient Verifiable Random Functions. In: Lecture Notes in Computer Science. Cham; 2020. doi:10.1007/978-3-030-38471-5_13
LibreCat | Files available | DOI | Download (ext.)
 

2018 | Conference Paper | LibreCat-ID: 3105
Derler D, Jager T, Slamanig D, Striecks C. Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange. In: Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part III. ; 2018:425--455. doi:10.1007/978-3-319-78372-7_14
LibreCat | Files available | DOI | Download (ext.)
 

2018 | Conference Paper | LibreCat-ID: 5861
Jager T, Kurek R. Short Digital Signatures and ID-KEMs via Truncation Collision Resistance. In: Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part II. ; 2018:221-250. doi:10.1007/978-3-030-03329-3_8
LibreCat | DOI
 

2018 | Conference Paper | LibreCat-ID: 5862
Jager T, Kurek R, Pan J. Simple and More Efficient PRFs with Tight Security from LWE and Matrix-DDH. In: Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part III. ; 2018:490-518. doi:10.1007/978-3-030-03332-3_18
LibreCat | DOI
 

2018 | Journal Article | LibreCat-ID: 9606
Liu J, Jager T, Kakvi S, Warinschi B. How to build time-lock encryption. Designs, Codes and Cryptography. 2018:2549-2586. doi:10.1007/s10623-018-0461-x
LibreCat | DOI
 

2018 | Conference Paper | LibreCat-ID: 5438
Gjøsteen K, Jager T. Practical and Tightly-Secure Digital Signatures and Authenticated Key Exchange. In: Advances in Cryptology - CRYPTO 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part II. ; 2018. doi:10.1007/978-3-319-96881-0_4
LibreCat | Files available | DOI | Download (ext.)
 

2018 | Conference Paper | LibreCat-ID: 5442
Jager T, Kakvi S, May A. On the Security of the PKCS#1 v1.5 Signature Scheme. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security  - CCS ’18. ACM Press; 2018. doi:10.1145/3243734.3243798
LibreCat | Files available | DOI | Download (ext.)
 

2017 | Journal Article | LibreCat-ID: 3108
Jager T, Kohlar F, Schäge S, Schwenk J. Authenticated Confidential Channel Establishment and the Security of TLS-DHE. J Cryptology. 2017;(4):1276--1324. doi:10.1007/s00145-016-9248-2
LibreCat | DOI
 

2017 | Conference Paper | LibreCat-ID: 3109
Hale B, Jager T, Lauer S, Schwenk J. Simple Security Definitions for and Constructions of 0-RTT Key Exchange. In: Applied Cryptography and Network Security - 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings. ; 2017:20--38. doi:10.1007/978-3-319-61204-1_2
LibreCat | DOI
 

2017 | Conference Paper | LibreCat-ID: 3110
Günther F, Hale B, Jager T, Lauer S. 0-RTT Key Exchange with Full Forward Secrecy. In: Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part III. ; 2017:519--548. doi:10.1007/978-3-319-56617-7_18
LibreCat | DOI
 

2017 | Conference Paper | LibreCat-ID: 3111
Jager T, Stam M, Stanley-Oakes R, Warinschi B. Multi-key Authenticated Encryption with Corruptions: Reductions Are Lossy. In: Theory of Cryptography - 15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part I. ; 2017:409--441. doi:10.1007/978-3-319-70500-2_14
LibreCat | DOI
 

2017 | Journal Article | LibreCat-ID: 9607
Kakvi S, Kiltz E. Optimal Security Proofs for Full Domain Hash, Revisited. Journal of Cryptology. 2017:276-306. doi:10.1007/s00145-017-9257-9
LibreCat | DOI | Download (ext.)
 

2016 | Journal Article | LibreCat-ID: 3112
Hofheinz D, Jager T. Tightly secure signatures and public-key encryption. Des Codes Cryptography. 2016;(1):29--61. doi:10.1007/s10623-015-0062-x
LibreCat | DOI
 

2016 | Journal Article | LibreCat-ID: 3113
Heuer F, Jager T, Schäge S, Kiltz E. Selective opening security of practical public-key encryption schemes. IET Information Security. 2016;(6):304--318. doi:10.1049/iet-ifs.2015.0507
LibreCat | DOI
 

2016 | Journal Article | LibreCat-ID: 3114
Jager T, Rupp A. Black-Box Accumulation: Collecting Incentives in a Privacy-Preserving Way. PoPETs. 2016;(3):62--82.
LibreCat
 

2016 | Conference Paper | LibreCat-ID: 3115
Hofheinz D, Jager T, Khurana D, Sahai A, Waters B, Zhandry M. How to Generate and Use Universal Samplers. In: Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part II. ; 2016:715--744. doi:10.1007/978-3-662-53890-6_24
LibreCat | DOI
 

2016 | Conference Paper | LibreCat-ID: 3116
Horst M, Grothe M, Jager T, Schwenk J. Breaking PPTP VPNs via RADIUS Encryption. In: Cryptology and Network Security - 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings. ; 2016:159--175. doi:10.1007/978-3-319-48965-0_10
LibreCat | DOI
 

2016 | Conference Paper | LibreCat-ID: 3117
Bader C, Jager T, Li Y, Schäge S. On the Impossibility of Tight Cryptographic Reductions. In: Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II. ; 2016:273--304. doi:10.1007/978-3-662-49896-5_10
LibreCat | DOI
 

2016 | Conference Paper | LibreCat-ID: 3118
Hofheinz D, Jager T, Rupp A. Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts. In: Theory of Cryptography - 14th International Conference, TCC 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part II. ; 2016:146--168. doi:10.1007/978-3-662-53644-5_6
LibreCat | DOI
 

2016 | Conference Paper | LibreCat-ID: 3119
Hofheinz D, Jager T. Verifiable Random Functions from Standard Assumptions. In: Theory of Cryptography - 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part I. ; 2016:336--362. doi:10.1007/978-3-662-49096-9_14
LibreCat | DOI
 

2016 | Journal Article | LibreCat-ID: 5446
Jager T, Rupp A. Black-Box Accumulation: Collecting Incentives in a Privacy-Preserving Way. Proceedings on Privacy Enhancing Technologies. 2016;2016(3):62-82. doi:10.1515/popets-2016-0016
LibreCat | Files available | DOI | Download (ext.)
 

2015 | Book Chapter | LibreCat-ID: 2921 | OA
Blazy O, Kakvi S, Kiltz E, Pan J. Tightly-Secure Signatures from Chameleon Hash Functions. In: Lecture Notes in Computer Science. Berlin, Heidelberg: Springer Berlin Heidelberg; 2015:256-279. doi:10.1007/978-3-662-46447-2_12
LibreCat | DOI | Download (ext.)
 

2015 | Journal Article | LibreCat-ID: 3120
Böhl F, Hofheinz D, Jager T, Koch J, Striecks C. Confined Guessing: New Signatures From Standard Assumptions. J Cryptology. 2015;(1):176--208. doi:10.1007/s00145-014-9183-z
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 3121
Jager T, Schwenk J, Somorovsky J. On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015. ; 2015:1185--1196. doi:10.1145/2810103.2813657
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 3122
Jager T, Schwenk J, Somorovsky J. Practical Invalid Curve Attacks on TLS-ECDH. In: Computer Security - ESORICS 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I. ; 2015:407--425. doi:10.1007/978-3-319-24174-6_21
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 3123
Heuer F, Jager T, Kiltz E, Schäge S. On the Selective Opening Security of Practical Public-Key Encryption Schemes. In: Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings. ; 2015:27--51. doi:10.1007/978-3-662-46447-2_2
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 3124
Bergsma F, Jager T, Schwenk J. One-Round Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model. In: Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings. ; 2015:477--494. doi:10.1007/978-3-662-46447-2_21
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 3125
Jager T. Verifiable Random Functions from Weaker Assumptions. In: Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {II}. ; 2015:121--143. doi:10.1007/978-3-662-46497-7_5
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 3126
Bader C, Hofheinz D, Jager T, Kiltz E, Li Y. Tightly-Secure Authenticated Key Exchange. In: Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I. ; 2015:629--658. doi:10.1007/978-3-662-46494-6_26
LibreCat | DOI
 

2014 | Journal Article | LibreCat-ID: 3127
Jager T. Die Zukunft der Kryptographie. Datenschutz und Datensicherheit. 2014;(7):445--451. doi:10.1007/s11623-014-0204-8
LibreCat | DOI
 

2014 | Conference Paper | LibreCat-ID: 3128
Fleischhacker N, Jager T, Schröder D. On Tight Security Proofs for Schnorr Signatures. In: Advances in Cryptology - ASIACRYPT 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part I. ; 2014:512--531. doi:10.1007/978-3-662-45611-8_27
LibreCat | DOI
 

2013 | Journal Article | LibreCat-ID: 3129
Jager T, Schwenk J. On the Analysis of Cryptographic Assumptions in the Generic Ring Model. J Cryptology. 2013;(2):225--245. doi:10.1007/s00145-012-9120-y
LibreCat | DOI
 

2013 | Conference Paper | LibreCat-ID: 3130
Böhl F, Hofheinz D, Jager T, Koch J, Hong Seo J, Striecks C. Practical Signatures from Standard Assumptions. In: Advances in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings. ; 2013:461--485. doi:10.1007/978-3-642-38348-9_28
LibreCat | DOI
 

2013 | Conference Paper | LibreCat-ID: 3131
Jager T, Paterson KG, Somorovsky J. One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography. In: 20th Annual Network and Distributed System Security Symposium, NDSS 2013, San Diego, California, USA, February 24-27, 2013. ; 2013.
LibreCat
 

2012 | Book Chapter | LibreCat-ID: 2918
Kakvi S, Kiltz E, May A. Certifying RSA. In: Advances in Cryptology – ASIACRYPT 2012. Berlin, Heidelberg: Springer Berlin Heidelberg; 2012:404-414. doi:10.1007/978-3-642-34961-4_25
LibreCat | DOI
 

2012 | Book Chapter | LibreCat-ID: 2919
Kakvi S, Kiltz E. Optimal Security Proofs for Full Domain Hash, Revisited. In: Advances in Cryptology – EUROCRYPT 2012. Berlin, Heidelberg: Springer Berlin Heidelberg; 2012:537-553. doi:10.1007/978-3-642-29011-4_32
LibreCat | DOI | Download (ext.)
 

2012 | Dissertation | LibreCat-ID: 3132
Jager T. On Black-Box Models of Computation in Cryptology. Ruhr University Bochum; 2012.
LibreCat
 

2012 | Conference Paper | LibreCat-ID: 3133
Jager T, Kohlar F, Schäge S, Schwenk J. On the Security of TLS-DHE in the Standard Model. In: Advances in Cryptology - CRYPTO 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings. ; 2012:273--293. doi:10.1007/978-3-642-32009-5_17
LibreCat | DOI
 

2012 | Conference Paper | LibreCat-ID: 3134
Hofheinz D, Jager T. Tightly Secure Signatures and Public-Key Encryption. In: Advances in Cryptology - CRYPTO 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings. ; 2012:590--607. doi:10.1007/978-3-642-32009-5_35
LibreCat | DOI
 

2012 | Conference Paper | LibreCat-ID: 3135
Jager T, Schinzel S, Somorovsky J. Bleichenbacher’s Attack Strikes again: Breaking PKCS#1 v1.5 in XML Encryption. In: Computer Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings. ; 2012:752--769. doi:10.1007/978-3-642-33167-1_43
LibreCat | DOI
 

2012 | Conference Paper | LibreCat-ID: 3136
Hofheinz D, Jager T, Knapp E. Waters Signatures with Optimal Security Reduction. In: Public Key Cryptography - PKC 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings. ; 2012:66--83. doi:10.1007/978-3-642-30057-8_5
LibreCat | DOI
 

2011 | Conference Paper | LibreCat-ID: 3137
Hofheinz D, Jager T, Kiltz E. Short Signatures from Weaker Assumptions. In: Advances in Cryptology - ASIACRYPT 2011 - 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings. ; 2011:647--666. doi:10.1007/978-3-642-25385-0_35
LibreCat | DOI
 

2011 | Conference Paper | LibreCat-ID: 3138
Jager T, Somorovsky J. How to break XML encryption. In: Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS 2011, Chicago, Illinois, USA, October 17-21, 2011. ; 2011:413--422. doi:10.1145/2046707.2046756
LibreCat | DOI
 

2010 | Conference Paper | LibreCat-ID: 3139
Jager T, Kohlar F, Schäge S, Schwenk J. Generic Compilers for Authenticated Key Exchange. In: Advances in Cryptology - ASIACRYPT 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings. ; 2010:232--249. doi:10.1007/978-3-642-17373-8_14
LibreCat | DOI
 

2010 | Conference Paper | LibreCat-ID: 3140
Jager T, Rupp A. The Semi-Generic Group Model and Applications to Pairing-Based Cryptography. In: Advances in Cryptology - ASIACRYPT 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings. ; 2010:539--556. doi:10.1007/978-3-642-17373-8_31
LibreCat | DOI
 

2010 | Conference Paper | LibreCat-ID: 3141
Haralambiev K, Jager T, Kiltz E, Shoup V. Simple and Efficient Public-Key Encryption from Computational Diffie-Hellman in the Standard Model. In: Public Key Cryptography - PKC 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings. ; 2010:1--18. doi:10.1007/978-3-642-13013-7_1
LibreCat | DOI
 

2009 | Book Chapter | LibreCat-ID: 2920
Kakvi S. Reinforcement Learning for Blackjack. In: Lecture Notes in Computer Science. Berlin, Heidelberg: Springer Berlin Heidelberg; 2009:300-301. doi:10.1007/978-3-642-04052-8_43
LibreCat | DOI
 

2009 | Conference Paper | LibreCat-ID: 3142
Jager T, Schwenk J. On the Analysis of Cryptographic Assumptions in the Generic Ring Model. In: Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings. ; 2009:399--416. doi:10.1007/978-3-642-10366-7_24
LibreCat | DOI
 

2009 | Book Chapter | LibreCat-ID: 9616
Kakvi S. Reinforcement Learning for Blackjack. In: Lecture Notes in Computer Science. Berlin, Heidelberg; 2009. doi:10.1007/978-3-642-04052-8_43
LibreCat | DOI
 

2008 | Conference Paper | LibreCat-ID: 3143
Gajek S, Jager T, Manulis M, Schwenk J. A Browser-Based Kerberos Authentication Scheme. In: Computer Security - ESORICS 2008, 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings. ; 2008:115--129. doi:10.1007/978-3-540-88313-5_8
LibreCat | DOI
 

2008 | Conference Paper | LibreCat-ID: 3144
Altmann K, Jager T, Rupp A. On Black-Box Ring Extraction and Integer Factorization. In: Automata, Languages and Programming, 35th International Colloquium, ICALP 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part II - Track B: Logic, Semantics, and Theory of Programming & Track C: Security and Cryptography Foundations. ; 2008:437--448. doi:10.1007/978-3-540-70583-3_36
LibreCat | DOI
 

2008 | Conference Paper | LibreCat-ID: 3145
Jager T, Schwenk J. On the Equivalence of Generic Group Models. In: Provable Security, Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings. ; 2008:200--209. doi:10.1007/978-3-540-88733-1_14
LibreCat | DOI
 

2008 | Conference Paper | LibreCat-ID: 3146
Jager T, Jäkel H, Schwenk J. Nutzung von selbstsignierten Client-Zertifikaten zur Authentifikation bei SSL/TLS. In: Sicherheit 2008: Sicherheit, Schutz Und Zuverlässigkeit. Konferenzband Der 4. Jahrestagung Des Fachbereichs Sicherheit Der Gesellschaft Für Informatik e.V. (GI), 2.-4. April 2008 Im Saarbrücker Schloss. ; 2008:127--136.
LibreCat
 

Filters and Search Terms

department=558

Search

Filter Publications

Display / Sort

Citation Style: AMA

Export / Embed