Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

56 Publications


2016 | Conference Paper | LibreCat-ID: 3117
Bader, Christoph, et al. “On the Impossibility of Tight Cryptographic Reductions.” Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II, 2016, pp. 273--304, doi:10.1007/978-3-662-49896-5_10.
LibreCat | DOI
 

2016 | Conference Paper | LibreCat-ID: 3118
Hofheinz, Dennis, et al. “Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts.” Theory of Cryptography - 14th International Conference, TCC 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part II, 2016, pp. 146--168, doi:10.1007/978-3-662-53644-5_6.
LibreCat | DOI
 

2016 | Conference Paper | LibreCat-ID: 3119
Hofheinz, Dennis, and Tibor Jager. “Verifiable Random Functions from Standard Assumptions.” Theory of Cryptography - 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part I, 2016, pp. 336--362, doi:10.1007/978-3-662-49096-9_14.
LibreCat | DOI
 

2016 | Journal Article | LibreCat-ID: 5446
Jager, Tibor, and Andy Rupp. “Black-Box Accumulation: Collecting Incentives in a Privacy-Preserving Way.” Proceedings on Privacy Enhancing Technologies, vol. 2016, no. 3, Walter de Gruyter GmbH, 2016, pp. 62–82, doi:10.1515/popets-2016-0016.
LibreCat | Files available | DOI | Download (ext.)
 

2015 | Book Chapter | LibreCat-ID: 2921 | OA
Blazy, Olivier, et al. “Tightly-Secure Signatures from Chameleon Hash Functions.” Lecture Notes in Computer Science, Springer Berlin Heidelberg, 2015, pp. 256–79, doi:10.1007/978-3-662-46447-2_12.
LibreCat | DOI | Download (ext.)
 

2015 | Journal Article | LibreCat-ID: 3120
Böhl, Florian, et al. “Confined Guessing: New Signatures From Standard Assumptions.” J. Cryptology, no. 1, 2015, pp. 176--208, doi:10.1007/s00145-014-9183-z.
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 3121
Jager, Tibor, et al. “On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption.” Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015, 2015, pp. 1185--1196, doi:10.1145/2810103.2813657.
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 3122
Jager, Tibor, et al. “Practical Invalid Curve Attacks on TLS-ECDH.” Computer Security - ESORICS 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I, 2015, pp. 407--425, doi:10.1007/978-3-319-24174-6_21.
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 3123
Heuer, Felix, et al. “On the Selective Opening Security of Practical Public-Key Encryption Schemes.” Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings, 2015, pp. 27--51, doi:10.1007/978-3-662-46447-2_2.
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 3124
Bergsma, Florian, et al. “One-Round Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model.” Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings, 2015, pp. 477--494, doi:10.1007/978-3-662-46447-2_21.
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 3125
Jager, Tibor. “Verifiable Random Functions from Weaker Assumptions.” Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {II}, 2015, pp. 121--143, doi:10.1007/978-3-662-46497-7_5.
LibreCat | DOI
 

2015 | Conference Paper | LibreCat-ID: 3126
Bader, Christoph, et al. “Tightly-Secure Authenticated Key Exchange.” Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I, 2015, pp. 629--658, doi:10.1007/978-3-662-46494-6_26.
LibreCat | DOI
 

2014 | Journal Article | LibreCat-ID: 3127
Jager, Tibor. “Die Zukunft Der Kryptographie.” Datenschutz Und Datensicherheit, no. 7, 2014, pp. 445--451, doi:10.1007/s11623-014-0204-8.
LibreCat | DOI
 

2014 | Conference Paper | LibreCat-ID: 3128
Fleischhacker, Nils, et al. “On Tight Security Proofs for Schnorr Signatures.” Advances in Cryptology - ASIACRYPT 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part I, 2014, pp. 512--531, doi:10.1007/978-3-662-45611-8_27.
LibreCat | DOI
 

2013 | Journal Article | LibreCat-ID: 3129
Jager, Tibor, and Jörg Schwenk. “On the Analysis of Cryptographic Assumptions in the Generic Ring Model.” J. Cryptology, no. 2, 2013, pp. 225--245, doi:10.1007/s00145-012-9120-y.
LibreCat | DOI
 

2013 | Conference Paper | LibreCat-ID: 3130
Böhl, Florian, et al. “Practical Signatures from Standard Assumptions.” Advances in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings, 2013, pp. 461--485, doi:10.1007/978-3-642-38348-9_28.
LibreCat | DOI
 

2013 | Conference Paper | LibreCat-ID: 3131
Jager, Tibor, et al. “One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography.” 20th Annual Network and Distributed System Security Symposium, NDSS 2013, San Diego, California, USA, February 24-27, 2013, 2013.
LibreCat
 

2012 | Book Chapter | LibreCat-ID: 2918
Kakvi, Saqib, et al. “Certifying RSA.” Advances in Cryptology – ASIACRYPT 2012, Springer Berlin Heidelberg, 2012, pp. 404–14, doi:10.1007/978-3-642-34961-4_25.
LibreCat | DOI
 

2012 | Book Chapter | LibreCat-ID: 2919
Kakvi, Saqib, and Eike Kiltz. “Optimal Security Proofs for Full Domain Hash, Revisited.” Advances in Cryptology – EUROCRYPT 2012, Springer Berlin Heidelberg, 2012, pp. 537–53, doi:10.1007/978-3-642-29011-4_32.
LibreCat | DOI | Download (ext.)
 

2012 | Dissertation | LibreCat-ID: 3132
Jager, Tibor. On Black-Box Models of Computation in Cryptology. Ruhr University Bochum, 2012.
LibreCat
 

Filters and Search Terms

department=558

Search

Filter Publications

Display / Sort

Citation Style: MLA

Export / Embed