Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

55 Publications


2016 | Conference Paper | LibreCat-ID: 3115
Hofheinz D, Jager T, Khurana D, Sahai A, Waters B, Zhandry M. How to Generate and Use Universal Samplers. In: Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part II. ; 2016:715--744. doi:10.1007/978-3-662-53890-6_24
LibreCat | DOI
 

2016 | Conference Paper | LibreCat-ID: 3116
Horst M, Grothe M, Jager T, Schwenk J. Breaking PPTP VPNs via RADIUS Encryption. In: Cryptology and Network Security - 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings. ; 2016:159--175. doi:10.1007/978-3-319-48965-0_10
LibreCat | DOI
 

2016 | Journal Article | LibreCat-ID: 5446
Jager T, Rupp A. Black-Box Accumulation: Collecting Incentives in a Privacy-Preserving Way. Proceedings on Privacy Enhancing Technologies. 2016;2016(3):62-82. doi:10.1515/popets-2016-0016
LibreCat | Files available | DOI | Download (ext.)
 

2015 | Conference Paper | LibreCat-ID: 3124
Bergsma F, Jager T, Schwenk J. One-Round Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model. In: Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings. ; 2015:477--494. doi:10.1007/978-3-662-46447-2_21
LibreCat | DOI
 

2015 | Journal Article | LibreCat-ID: 3120
Böhl F, Hofheinz D, Jager T, Koch J, Striecks C. Confined Guessing: New Signatures From Standard Assumptions. J Cryptology. 2015;(1):176--208. doi:10.1007/s00145-014-9183-z
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 3125
Jager T. Verifiable Random Functions from Weaker Assumptions. In: Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {II}. ; 2015:121--143. doi:10.1007/978-3-662-46497-7_5
LibreCat | DOI
 

2015 | Book Chapter | LibreCat-ID: 2921
Blazy O, Kakvi S, Kiltz E, Pan J. Tightly-Secure Signatures from Chameleon Hash Functions. In: Lecture Notes in Computer Science. Berlin, Heidelberg: Springer Berlin Heidelberg; 2015:256-279. doi:10.1007/978-3-662-46447-2_12
LibreCat | DOI | Download (ext.)
 

2015 | Conference Paper | LibreCat-ID: 3121
Jager T, Schwenk J, Somorovsky J. On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015. ; 2015:1185--1196. doi:10.1145/2810103.2813657
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 3126
Bader C, Hofheinz D, Jager T, Kiltz E, Li Y. Tightly-Secure Authenticated Key Exchange. In: Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I. ; 2015:629--658. doi:10.1007/978-3-662-46494-6_26
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 3122
Jager T, Schwenk J, Somorovsky J. Practical Invalid Curve Attacks on TLS-ECDH. In: Computer Security - ESORICS 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I. ; 2015:407--425. doi:10.1007/978-3-319-24174-6_21
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 3123
Heuer F, Jager T, Kiltz E, Schäge S. On the Selective Opening Security of Practical Public-Key Encryption Schemes. In: Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings. ; 2015:27--51. doi:10.1007/978-3-662-46447-2_2
LibreCat | DOI
 

2014 | Journal Article | LibreCat-ID: 3127
Jager T. Die Zukunft der Kryptographie. Datenschutz und Datensicherheit. 2014;(7):445--451. doi:10.1007/s11623-014-0204-8
LibreCat | DOI
 

2014 | Conference Paper | LibreCat-ID: 3128
Fleischhacker N, Jager T, Schröder D. On Tight Security Proofs for Schnorr Signatures. In: Advances in Cryptology - ASIACRYPT 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part I. ; 2014:512--531. doi:10.1007/978-3-662-45611-8_27
LibreCat | DOI
 

2013 | Journal Article | LibreCat-ID: 3129
Jager T, Schwenk J. On the Analysis of Cryptographic Assumptions in the Generic Ring Model. J Cryptology. 2013;(2):225--245. doi:10.1007/s00145-012-9120-y
LibreCat | DOI
 

2013 | Conference Paper | LibreCat-ID: 3131
Jager T, Paterson KG, Somorovsky J. One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography. In: 20th Annual Network and Distributed System Security Symposium, NDSS 2013, San Diego, California, USA, February 24-27, 2013. ; 2013.
LibreCat
 

2013 | Conference Paper | LibreCat-ID: 3130
Böhl F, Hofheinz D, Jager T, Koch J, Hong Seo J, Striecks C. Practical Signatures from Standard Assumptions. In: Advances in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings. ; 2013:461--485. doi:10.1007/978-3-642-38348-9_28
LibreCat | DOI
 

2012 | Conference Paper | LibreCat-ID: 3136
Hofheinz D, Jager T, Knapp E. Waters Signatures with Optimal Security Reduction. In: Public Key Cryptography - PKC 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings. ; 2012:66--83. doi:10.1007/978-3-642-30057-8_5
LibreCat | DOI
 

2012 | Book Chapter | LibreCat-ID: 2918
Kakvi S, Kiltz E, May A. Certifying RSA. In: Advances in Cryptology – ASIACRYPT 2012. Berlin, Heidelberg: Springer Berlin Heidelberg; 2012:404-414. doi:10.1007/978-3-642-34961-4_25
LibreCat | DOI
 

2012 | Dissertation | LibreCat-ID: 3132
Jager T. On Black-Box Models of Computation in Cryptology. Ruhr University Bochum; 2012.
LibreCat
 

2012 | Book Chapter | LibreCat-ID: 2919
Kakvi S, Kiltz E. Optimal Security Proofs for Full Domain Hash, Revisited. In: Advances in Cryptology – EUROCRYPT 2012. Berlin, Heidelberg: Springer Berlin Heidelberg; 2012:537-553. doi:10.1007/978-3-642-29011-4_32
LibreCat | DOI | Download (ext.)
 

Filters and Search Terms

department=558

Search

Filter Publications

Display / Sort

Citation Style: AMA

Export / Embed