Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

56 Publications


2015 | Conference Paper | LibreCat-ID: 3125
Jager, Tibor. “Verifiable Random Functions from Weaker Assumptions.” In Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {II}, 121--143, 2015. https://doi.org/10.1007/978-3-662-46497-7_5.
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 3126
Bader, Christoph, Dennis Hofheinz, Tibor Jager, Eike Kiltz, and Yong Li. “Tightly-Secure Authenticated Key Exchange.” In Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I, 629--658, 2015. https://doi.org/10.1007/978-3-662-46494-6_26.
LibreCat | DOI
 

2014 | Journal Article | LibreCat-ID: 3127
Jager, Tibor. “Die Zukunft Der Kryptographie.” Datenschutz Und Datensicherheit, no. 7 (2014): 445--451. https://doi.org/10.1007/s11623-014-0204-8.
LibreCat | DOI
 

2014 | Conference Paper | LibreCat-ID: 3128
Fleischhacker, Nils, Tibor Jager, and Dominique Schröder. “On Tight Security Proofs for Schnorr Signatures.” In Advances in Cryptology - ASIACRYPT 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part I, 512--531, 2014. https://doi.org/10.1007/978-3-662-45611-8_27.
LibreCat | DOI
 

2013 | Journal Article | LibreCat-ID: 3129
Jager, Tibor, and Jörg Schwenk. “On the Analysis of Cryptographic Assumptions in the Generic Ring Model.” J. Cryptology, no. 2 (2013): 225--245. https://doi.org/10.1007/s00145-012-9120-y.
LibreCat | DOI
 

2013 | Conference Paper | LibreCat-ID: 3130
Böhl, Florian, Dennis Hofheinz, Tibor Jager, Jessica Koch, Jae Hong Seo, and Christoph Striecks. “Practical Signatures from Standard Assumptions.” In Advances in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings, 461--485, 2013. https://doi.org/10.1007/978-3-642-38348-9_28.
LibreCat | DOI
 

2013 | Conference Paper | LibreCat-ID: 3131
Jager, Tibor, Kenneth G. Paterson, and Juraj Somorovsky. “One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography.” In 20th Annual Network and Distributed System Security Symposium, NDSS 2013, San Diego, California, USA, February 24-27, 2013, 2013.
LibreCat
 

2012 | Book Chapter | LibreCat-ID: 2918
Kakvi, Saqib, Eike Kiltz, and Alexander May. “Certifying RSA.” In Advances in Cryptology – ASIACRYPT 2012, 404–14. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. https://doi.org/10.1007/978-3-642-34961-4_25.
LibreCat | DOI
 

2012 | Book Chapter | LibreCat-ID: 2919
Kakvi, Saqib, and Eike Kiltz. “Optimal Security Proofs for Full Domain Hash, Revisited.” In Advances in Cryptology – EUROCRYPT 2012, 537–53. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. https://doi.org/10.1007/978-3-642-29011-4_32.
LibreCat | DOI | Download (ext.)
 

2012 | Dissertation | LibreCat-ID: 3132
Jager, Tibor. On Black-Box Models of Computation in Cryptology. Ruhr University Bochum, 2012.
LibreCat
 

2012 | Conference Paper | LibreCat-ID: 3133
Jager, Tibor, Florian Kohlar, Sven Schäge, and Jörg Schwenk. “On the Security of TLS-DHE in the Standard Model.” In Advances in Cryptology - CRYPTO 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings, 273--293, 2012. https://doi.org/10.1007/978-3-642-32009-5_17.
LibreCat | DOI
 

2012 | Conference Paper | LibreCat-ID: 3134
Hofheinz, Dennis, and Tibor Jager. “Tightly Secure Signatures and Public-Key Encryption.” In Advances in Cryptology - CRYPTO 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings, 590--607, 2012. https://doi.org/10.1007/978-3-642-32009-5_35.
LibreCat | DOI
 

2012 | Conference Paper | LibreCat-ID: 3135
Jager, Tibor, Sebastian Schinzel, and Juraj Somorovsky. “Bleichenbacher’s Attack Strikes Again: Breaking PKCS#1 v1.5 in XML Encryption.” In Computer Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings, 752--769, 2012. https://doi.org/10.1007/978-3-642-33167-1_43.
LibreCat | DOI
 

2012 | Conference Paper | LibreCat-ID: 3136
Hofheinz, Dennis, Tibor Jager, and Edward Knapp. “Waters Signatures with Optimal Security Reduction.” In Public Key Cryptography - PKC 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings, 66--83, 2012. https://doi.org/10.1007/978-3-642-30057-8_5.
LibreCat | DOI
 

2011 | Conference Paper | LibreCat-ID: 3137
Hofheinz, Dennis, Tibor Jager, and Eike Kiltz. “Short Signatures from Weaker Assumptions.” In Advances in Cryptology - ASIACRYPT 2011 - 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings, 647--666, 2011. https://doi.org/10.1007/978-3-642-25385-0_35.
LibreCat | DOI
 

2011 | Conference Paper | LibreCat-ID: 3138
Jager, Tibor, and Juraj Somorovsky. “How to Break XML Encryption.” In Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS 2011, Chicago, Illinois, USA, October 17-21, 2011, 413--422, 2011. https://doi.org/10.1145/2046707.2046756.
LibreCat | DOI
 

2010 | Conference Paper | LibreCat-ID: 3139
Jager, Tibor, Florian Kohlar, Sven Schäge, and Jörg Schwenk. “Generic Compilers for Authenticated Key Exchange.” In Advances in Cryptology - ASIACRYPT 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings, 232--249, 2010. https://doi.org/10.1007/978-3-642-17373-8_14.
LibreCat | DOI
 

2010 | Conference Paper | LibreCat-ID: 3140
Jager, Tibor, and Andy Rupp. “The Semi-Generic Group Model and Applications to Pairing-Based Cryptography.” In Advances in Cryptology - ASIACRYPT 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings, 539--556, 2010. https://doi.org/10.1007/978-3-642-17373-8_31.
LibreCat | DOI
 

2010 | Conference Paper | LibreCat-ID: 3141
Haralambiev, Kristiyan, Tibor Jager, Eike Kiltz, and Victor Shoup. “Simple and Efficient Public-Key Encryption from Computational Diffie-Hellman in the Standard Model.” In Public Key Cryptography - PKC 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings, 1--18, 2010. https://doi.org/10.1007/978-3-642-13013-7_1.
LibreCat | DOI
 

2009 | Book Chapter | LibreCat-ID: 2920
Kakvi, Saqib. “Reinforcement Learning for Blackjack.” In Lecture Notes in Computer Science, 300–301. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. https://doi.org/10.1007/978-3-642-04052-8_43.
LibreCat | DOI
 

Filters and Search Terms

department=558

Search

Filter Publications

Display / Sort

Citation Style: Chicago

Export / Embed