Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

56 Publications


2022 | Dissertation | LibreCat-ID: 29763 | OA
Niehues, D. (2022). More Efficient Techniques for Adaptively-Secure Cryptography. https://doi.org/10.25926/rdtq-jw45
LibreCat | Files available | DOI | Download (ext.)
 

2021 | Book Chapter | LibreCat-ID: 22057
Jager, T., Kurek, R., & Niehues, D. (2021). Efficient Adaptively-Secure IB-KEMs and VRFs via Near-Collision Resistance. In Public-Key Cryptography – PKC 2021. Cham. https://doi.org/10.1007/978-3-030-75245-3_22
LibreCat | Files available | DOI
 

2021 | Book Chapter | LibreCat-ID: 22059
Niehues, D. (2021). Verifiable Random Functions with Optimal Tightness. In Public-Key Cryptography – PKC 2021. Cham. https://doi.org/10.1007/978-3-030-75248-4_3
LibreCat | Files available | DOI
 

2020 | Book Chapter | LibreCat-ID: 21396
Jager, T., & Niehues, D. (2020). On the Real-World Instantiability of Admissible Hash Functions and Efficient Verifiable Random Functions. In Lecture Notes in Computer Science. Cham. https://doi.org/10.1007/978-3-030-38471-5_13
LibreCat | Files available | DOI | Download (ext.)
 

2018 | Conference Paper | LibreCat-ID: 3105
Derler, D., Jager, T., Slamanig, D., & Striecks, C. (2018). Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange. In Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part III (pp. 425--455). https://doi.org/10.1007/978-3-319-78372-7_14
LibreCat | Files available | DOI | Download (ext.)
 

2018 | Conference Paper | LibreCat-ID: 5861
Jager, T., & Kurek, R. (2018). Short Digital Signatures and ID-KEMs via Truncation Collision Resistance. In Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part II (pp. 221–250). https://doi.org/10.1007/978-3-030-03329-3_8
LibreCat | DOI
 

2018 | Conference Paper | LibreCat-ID: 5862
Jager, T., Kurek, R., & Pan, J. (2018). Simple and More Efficient PRFs with Tight Security from LWE and Matrix-DDH. In Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part III (pp. 490–518). https://doi.org/10.1007/978-3-030-03332-3_18
LibreCat | DOI
 

2018 | Journal Article | LibreCat-ID: 9606
Liu, J., Jager, T., Kakvi, S., & Warinschi, B. (2018). How to build time-lock encryption. Designs, Codes and Cryptography, 2549–2586. https://doi.org/10.1007/s10623-018-0461-x
LibreCat | DOI
 

2018 | Conference Paper | LibreCat-ID: 5438
Gjøsteen, K., & Jager, T. (2018). Practical and Tightly-Secure Digital Signatures and Authenticated Key Exchange. In Advances in Cryptology - CRYPTO 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part II. https://doi.org/10.1007/978-3-319-96881-0_4
LibreCat | Files available | DOI | Download (ext.)
 

2018 | Conference Paper | LibreCat-ID: 5442
Jager, T., Kakvi, S., & May, A. (2018). On the Security of the PKCS#1 v1.5 Signature Scheme. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security  - CCS ’18. ACM Press. https://doi.org/10.1145/3243734.3243798
LibreCat | Files available | DOI | Download (ext.)
 

2017 | Journal Article | LibreCat-ID: 3108
Jager, T., Kohlar, F., Schäge, S., & Schwenk, J. (2017). Authenticated Confidential Channel Establishment and the Security of TLS-DHE. J. Cryptology, (4), 1276--1324. https://doi.org/10.1007/s00145-016-9248-2
LibreCat | DOI
 

2017 | Conference Paper | LibreCat-ID: 3109
Hale, B., Jager, T., Lauer, S., & Schwenk, J. (2017). Simple Security Definitions for and Constructions of 0-RTT Key Exchange. In Applied Cryptography and Network Security - 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings (pp. 20--38). https://doi.org/10.1007/978-3-319-61204-1_2
LibreCat | DOI
 

2017 | Conference Paper | LibreCat-ID: 3110
Günther, F., Hale, B., Jager, T., & Lauer, S. (2017). 0-RTT Key Exchange with Full Forward Secrecy. In Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part III (pp. 519--548). https://doi.org/10.1007/978-3-319-56617-7_18
LibreCat | DOI
 

2017 | Conference Paper | LibreCat-ID: 3111
Jager, T., Stam, M., Stanley-Oakes, R., & Warinschi, B. (2017). Multi-key Authenticated Encryption with Corruptions: Reductions Are Lossy. In Theory of Cryptography - 15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part I (pp. 409--441). https://doi.org/10.1007/978-3-319-70500-2_14
LibreCat | DOI
 

2017 | Journal Article | LibreCat-ID: 9607
Kakvi, S., & Kiltz, E. (2017). Optimal Security Proofs for Full Domain Hash, Revisited. Journal of Cryptology, 276–306. https://doi.org/10.1007/s00145-017-9257-9
LibreCat | DOI | Download (ext.)
 

2016 | Journal Article | LibreCat-ID: 3112
Hofheinz, D., & Jager, T. (2016). Tightly secure signatures and public-key encryption. Des. Codes Cryptography, (1), 29--61. https://doi.org/10.1007/s10623-015-0062-x
LibreCat | DOI
 

2016 | Journal Article | LibreCat-ID: 3113
Heuer, F., Jager, T., Schäge, S., & Kiltz, E. (2016). Selective opening security of practical public-key encryption schemes. IET Information Security, (6), 304--318. https://doi.org/10.1049/iet-ifs.2015.0507
LibreCat | DOI
 

2016 | Journal Article | LibreCat-ID: 3114
Jager, T., & Rupp, A. (2016). Black-Box Accumulation: Collecting Incentives in a Privacy-Preserving Way. PoPETs, (3), 62--82.
LibreCat
 

2016 | Conference Paper | LibreCat-ID: 3115
Hofheinz, D., Jager, T., Khurana, D., Sahai, A., Waters, B., & Zhandry, M. (2016). How to Generate and Use Universal Samplers. In Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part II (pp. 715--744). https://doi.org/10.1007/978-3-662-53890-6_24
LibreCat | DOI
 

2016 | Conference Paper | LibreCat-ID: 3116
Horst, M., Grothe, M., Jager, T., & Schwenk, J. (2016). Breaking PPTP VPNs via RADIUS Encryption. In Cryptology and Network Security - 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings (pp. 159--175). https://doi.org/10.1007/978-3-319-48965-0_10
LibreCat | DOI
 

2016 | Conference Paper | LibreCat-ID: 3117
Bader, C., Jager, T., Li, Y., & Schäge, S. (2016). On the Impossibility of Tight Cryptographic Reductions. In Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II (pp. 273--304). https://doi.org/10.1007/978-3-662-49896-5_10
LibreCat | DOI
 

2016 | Conference Paper | LibreCat-ID: 3118
Hofheinz, D., Jager, T., & Rupp, A. (2016). Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts. In Theory of Cryptography - 14th International Conference, TCC 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part II (pp. 146--168). https://doi.org/10.1007/978-3-662-53644-5_6
LibreCat | DOI
 

2016 | Conference Paper | LibreCat-ID: 3119
Hofheinz, D., & Jager, T. (2016). Verifiable Random Functions from Standard Assumptions. In Theory of Cryptography - 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part I (pp. 336--362). https://doi.org/10.1007/978-3-662-49096-9_14
LibreCat | DOI
 

2016 | Journal Article | LibreCat-ID: 5446
Jager, T., & Rupp, A. (2016). Black-Box Accumulation: Collecting Incentives in a Privacy-Preserving Way. Proceedings on Privacy Enhancing Technologies, 2016(3), 62–82. https://doi.org/10.1515/popets-2016-0016
LibreCat | Files available | DOI | Download (ext.)
 

2015 | Book Chapter | LibreCat-ID: 2921 | OA
Blazy, O., Kakvi, S., Kiltz, E., & Pan, J. (2015). Tightly-Secure Signatures from Chameleon Hash Functions. In Lecture Notes in Computer Science (pp. 256–279). Berlin, Heidelberg: Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-662-46447-2_12
LibreCat | DOI | Download (ext.)
 

2015 | Journal Article | LibreCat-ID: 3120
Böhl, F., Hofheinz, D., Jager, T., Koch, J., & Striecks, C. (2015). Confined Guessing: New Signatures From Standard Assumptions. J. Cryptology, (1), 176--208. https://doi.org/10.1007/s00145-014-9183-z
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 3121
Jager, T., Schwenk, J., & Somorovsky, J. (2015). On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015 (pp. 1185--1196). https://doi.org/10.1145/2810103.2813657
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 3122
Jager, T., Schwenk, J., & Somorovsky, J. (2015). Practical Invalid Curve Attacks on TLS-ECDH. In Computer Security - ESORICS 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I (pp. 407--425). https://doi.org/10.1007/978-3-319-24174-6_21
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 3123
Heuer, F., Jager, T., Kiltz, E., & Schäge, S. (2015). On the Selective Opening Security of Practical Public-Key Encryption Schemes. In Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings (pp. 27--51). https://doi.org/10.1007/978-3-662-46447-2_2
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 3124
Bergsma, F., Jager, T., & Schwenk, J. (2015). One-Round Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model. In Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings (pp. 477--494). https://doi.org/10.1007/978-3-662-46447-2_21
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 3125
Jager, T. (2015). Verifiable Random Functions from Weaker Assumptions. In Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {II} (pp. 121--143). https://doi.org/10.1007/978-3-662-46497-7_5
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 3126
Bader, C., Hofheinz, D., Jager, T., Kiltz, E., & Li, Y. (2015). Tightly-Secure Authenticated Key Exchange. In Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I (pp. 629--658). https://doi.org/10.1007/978-3-662-46494-6_26
LibreCat | DOI
 

2014 | Journal Article | LibreCat-ID: 3127
Jager, T. (2014). Die Zukunft der Kryptographie. Datenschutz Und Datensicherheit, (7), 445--451. https://doi.org/10.1007/s11623-014-0204-8
LibreCat | DOI
 

2014 | Conference Paper | LibreCat-ID: 3128
Fleischhacker, N., Jager, T., & Schröder, D. (2014). On Tight Security Proofs for Schnorr Signatures. In Advances in Cryptology - ASIACRYPT 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part I (pp. 512--531). https://doi.org/10.1007/978-3-662-45611-8_27
LibreCat | DOI
 

2013 | Journal Article | LibreCat-ID: 3129
Jager, T., & Schwenk, J. (2013). On the Analysis of Cryptographic Assumptions in the Generic Ring Model. J. Cryptology, (2), 225--245. https://doi.org/10.1007/s00145-012-9120-y
LibreCat | DOI
 

2013 | Conference Paper | LibreCat-ID: 3130
Böhl, F., Hofheinz, D., Jager, T., Koch, J., Hong Seo, J., & Striecks, C. (2013). Practical Signatures from Standard Assumptions. In Advances in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings (pp. 461--485). https://doi.org/10.1007/978-3-642-38348-9_28
LibreCat | DOI
 

2013 | Conference Paper | LibreCat-ID: 3131
Jager, T., Paterson, K. G., & Somorovsky, J. (2013). One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography. In 20th Annual Network and Distributed System Security Symposium, NDSS 2013, San Diego, California, USA, February 24-27, 2013.
LibreCat
 

2012 | Book Chapter | LibreCat-ID: 2918
Kakvi, S., Kiltz, E., & May, A. (2012). Certifying RSA. In Advances in Cryptology – ASIACRYPT 2012 (pp. 404–414). Berlin, Heidelberg: Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-34961-4_25
LibreCat | DOI
 

2012 | Book Chapter | LibreCat-ID: 2919
Kakvi, S., & Kiltz, E. (2012). Optimal Security Proofs for Full Domain Hash, Revisited. In Advances in Cryptology – EUROCRYPT 2012 (pp. 537–553). Berlin, Heidelberg: Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-29011-4_32
LibreCat | DOI | Download (ext.)
 

2012 | Dissertation | LibreCat-ID: 3132
Jager, T. (2012). On black-box models of computation in cryptology. Ruhr University Bochum.
LibreCat
 

2012 | Conference Paper | LibreCat-ID: 3133
Jager, T., Kohlar, F., Schäge, S., & Schwenk, J. (2012). On the Security of TLS-DHE in the Standard Model. In Advances in Cryptology - CRYPTO 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings (pp. 273--293). https://doi.org/10.1007/978-3-642-32009-5_17
LibreCat | DOI
 

2012 | Conference Paper | LibreCat-ID: 3134
Hofheinz, D., & Jager, T. (2012). Tightly Secure Signatures and Public-Key Encryption. In Advances in Cryptology - CRYPTO 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings (pp. 590--607). https://doi.org/10.1007/978-3-642-32009-5_35
LibreCat | DOI
 

2012 | Conference Paper | LibreCat-ID: 3135
Jager, T., Schinzel, S., & Somorovsky, J. (2012). Bleichenbacher’s Attack Strikes again: Breaking PKCS#1 v1.5 in XML Encryption. In Computer Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings (pp. 752--769). https://doi.org/10.1007/978-3-642-33167-1_43
LibreCat | DOI
 

2012 | Conference Paper | LibreCat-ID: 3136
Hofheinz, D., Jager, T., & Knapp, E. (2012). Waters Signatures with Optimal Security Reduction. In Public Key Cryptography - PKC 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings (pp. 66--83). https://doi.org/10.1007/978-3-642-30057-8_5
LibreCat | DOI
 

2011 | Conference Paper | LibreCat-ID: 3137
Hofheinz, D., Jager, T., & Kiltz, E. (2011). Short Signatures from Weaker Assumptions. In Advances in Cryptology - ASIACRYPT 2011 - 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings (pp. 647--666). https://doi.org/10.1007/978-3-642-25385-0_35
LibreCat | DOI
 

2011 | Conference Paper | LibreCat-ID: 3138
Jager, T., & Somorovsky, J. (2011). How to break XML encryption. In Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS 2011, Chicago, Illinois, USA, October 17-21, 2011 (pp. 413--422). https://doi.org/10.1145/2046707.2046756
LibreCat | DOI
 

2010 | Conference Paper | LibreCat-ID: 3139
Jager, T., Kohlar, F., Schäge, S., & Schwenk, J. (2010). Generic Compilers for Authenticated Key Exchange. In Advances in Cryptology - ASIACRYPT 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings (pp. 232--249). https://doi.org/10.1007/978-3-642-17373-8_14
LibreCat | DOI
 

2010 | Conference Paper | LibreCat-ID: 3140
Jager, T., & Rupp, A. (2010). The Semi-Generic Group Model and Applications to Pairing-Based Cryptography. In Advances in Cryptology - ASIACRYPT 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings (pp. 539--556). https://doi.org/10.1007/978-3-642-17373-8_31
LibreCat | DOI
 

2010 | Conference Paper | LibreCat-ID: 3141
Haralambiev, K., Jager, T., Kiltz, E., & Shoup, V. (2010). Simple and Efficient Public-Key Encryption from Computational Diffie-Hellman in the Standard Model. In Public Key Cryptography - PKC 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings (pp. 1--18). https://doi.org/10.1007/978-3-642-13013-7_1
LibreCat | DOI
 

2009 | Book Chapter | LibreCat-ID: 2920
Kakvi, S. (2009). Reinforcement Learning for Blackjack. In Lecture Notes in Computer Science (pp. 300–301). Berlin, Heidelberg: Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-04052-8_43
LibreCat | DOI
 

2009 | Conference Paper | LibreCat-ID: 3142
Jager, T., & Schwenk, J. (2009). On the Analysis of Cryptographic Assumptions in the Generic Ring Model. In Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings (pp. 399--416). https://doi.org/10.1007/978-3-642-10366-7_24
LibreCat | DOI
 

2009 | Book Chapter | LibreCat-ID: 9616
Kakvi, S. (2009). Reinforcement Learning for Blackjack. In Lecture Notes in Computer Science. Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-04052-8_43
LibreCat | DOI
 

2008 | Conference Paper | LibreCat-ID: 3143
Gajek, S., Jager, T., Manulis, M., & Schwenk, J. (2008). A Browser-Based Kerberos Authentication Scheme. In Computer Security - ESORICS 2008, 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings (pp. 115--129). https://doi.org/10.1007/978-3-540-88313-5_8
LibreCat | DOI
 

2008 | Conference Paper | LibreCat-ID: 3144
Altmann, K., Jager, T., & Rupp, A. (2008). On Black-Box Ring Extraction and Integer Factorization. In Automata, Languages and Programming, 35th International Colloquium, ICALP 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part II - Track B: Logic, Semantics, and Theory of Programming & Track C: Security and Cryptography Foundations (pp. 437--448). https://doi.org/10.1007/978-3-540-70583-3_36
LibreCat | DOI
 

2008 | Conference Paper | LibreCat-ID: 3145
Jager, T., & Schwenk, J. (2008). On the Equivalence of Generic Group Models. In Provable Security, Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings (pp. 200--209). https://doi.org/10.1007/978-3-540-88733-1_14
LibreCat | DOI
 

2008 | Conference Paper | LibreCat-ID: 3146
Jager, T., Jäkel, H., & Schwenk, J. (2008). Nutzung von selbstsignierten Client-Zertifikaten zur Authentifikation bei SSL/TLS. In Sicherheit 2008: Sicherheit, Schutz und Zuverlässigkeit. Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 2.-4. April 2008 im Saarbrücker Schloss. (pp. 127--136).
LibreCat
 

Filters and Search Terms

department=558

Search

Filter Publications

Display / Sort

Citation Style: APA

Export / Embed