Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

56 Publications


2017 | Journal Article | LibreCat-ID: 3108
T. Jager, F. Kohlar, S. Schäge, and J. Schwenk, “Authenticated Confidential Channel Establishment and the Security of TLS-DHE,” J. Cryptology, no. 4, pp. 1276--1324, 2017.
LibreCat | DOI
 

2017 | Conference Paper | LibreCat-ID: 3109
B. Hale, T. Jager, S. Lauer, and J. Schwenk, “Simple Security Definitions for and Constructions of 0-RTT Key Exchange,” in Applied Cryptography and Network Security - 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings, 2017, pp. 20--38.
LibreCat | DOI
 

2017 | Conference Paper | LibreCat-ID: 3110
F. Günther, B. Hale, T. Jager, and S. Lauer, “0-RTT Key Exchange with Full Forward Secrecy,” in Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part III, 2017, pp. 519--548.
LibreCat | DOI
 

2017 | Conference Paper | LibreCat-ID: 3111
T. Jager, M. Stam, R. Stanley-Oakes, and B. Warinschi, “Multi-key Authenticated Encryption with Corruptions: Reductions Are Lossy,” in Theory of Cryptography - 15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part I, 2017, pp. 409--441.
LibreCat | DOI
 

2017 | Journal Article | LibreCat-ID: 9607
S. Kakvi and E. Kiltz, “Optimal Security Proofs for Full Domain Hash, Revisited,” Journal of Cryptology, pp. 276–306, 2017.
LibreCat | DOI | Download (ext.)
 

2016 | Journal Article | LibreCat-ID: 3112
D. Hofheinz and T. Jager, “Tightly secure signatures and public-key encryption,” Des. Codes Cryptography, no. 1, pp. 29--61, 2016.
LibreCat | DOI
 

2016 | Journal Article | LibreCat-ID: 3113
F. Heuer, T. Jager, S. Schäge, and E. Kiltz, “Selective opening security of practical public-key encryption schemes,” IET Information Security, no. 6, pp. 304--318, 2016.
LibreCat | DOI
 

2016 | Journal Article | LibreCat-ID: 3114
T. Jager and A. Rupp, “Black-Box Accumulation: Collecting Incentives in a Privacy-Preserving Way,” PoPETs, no. 3, pp. 62--82, 2016.
LibreCat
 

2016 | Conference Paper | LibreCat-ID: 3115
D. Hofheinz, T. Jager, D. Khurana, A. Sahai, B. Waters, and M. Zhandry, “How to Generate and Use Universal Samplers,” in Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part II, 2016, pp. 715--744.
LibreCat | DOI
 

2016 | Conference Paper | LibreCat-ID: 3116
M. Horst, M. Grothe, T. Jager, and J. Schwenk, “Breaking PPTP VPNs via RADIUS Encryption,” in Cryptology and Network Security - 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings, 2016, pp. 159--175.
LibreCat | DOI
 

2016 | Conference Paper | LibreCat-ID: 3117
C. Bader, T. Jager, Y. Li, and S. Schäge, “On the Impossibility of Tight Cryptographic Reductions,” in Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II, 2016, pp. 273--304.
LibreCat | DOI
 

2016 | Conference Paper | LibreCat-ID: 3118
D. Hofheinz, T. Jager, and A. Rupp, “Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts,” in Theory of Cryptography - 14th International Conference, TCC 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part II, 2016, pp. 146--168.
LibreCat | DOI
 

2016 | Conference Paper | LibreCat-ID: 3119
D. Hofheinz and T. Jager, “Verifiable Random Functions from Standard Assumptions,” in Theory of Cryptography - 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part I, 2016, pp. 336--362.
LibreCat | DOI
 

2016 | Journal Article | LibreCat-ID: 5446
T. Jager and A. Rupp, “Black-Box Accumulation: Collecting Incentives in a Privacy-Preserving Way,” Proceedings on Privacy Enhancing Technologies, vol. 2016, no. 3, pp. 62–82, 2016.
LibreCat | Files available | DOI | Download (ext.)
 

2015 | Book Chapter | LibreCat-ID: 2921 | OA
O. Blazy, S. Kakvi, E. Kiltz, and J. Pan, “Tightly-Secure Signatures from Chameleon Hash Functions,” in Lecture Notes in Computer Science, Berlin, Heidelberg: Springer Berlin Heidelberg, 2015, pp. 256–279.
LibreCat | DOI | Download (ext.)
 

2015 | Journal Article | LibreCat-ID: 3120
F. Böhl, D. Hofheinz, T. Jager, J. Koch, and C. Striecks, “Confined Guessing: New Signatures From Standard Assumptions,” J. Cryptology, no. 1, pp. 176--208, 2015.
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 3121
T. Jager, J. Schwenk, and J. Somorovsky, “On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption,” in Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015, 2015, pp. 1185--1196.
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 3122
T. Jager, J. Schwenk, and J. Somorovsky, “Practical Invalid Curve Attacks on TLS-ECDH,” in Computer Security - ESORICS 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I, 2015, pp. 407--425.
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 3123
F. Heuer, T. Jager, E. Kiltz, and S. Schäge, “On the Selective Opening Security of Practical Public-Key Encryption Schemes,” in Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings, 2015, pp. 27--51.
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 3124
F. Bergsma, T. Jager, and J. Schwenk, “One-Round Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model,” in Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings, 2015, pp. 477--494.
LibreCat | DOI
 

Filters and Search Terms

department=558

Search

Filter Publications

Display / Sort

Citation Style: IEEE

Export / Embed