Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

56 Publications


2012 | Conference Paper | LibreCat-ID: 3133
Jager, Tibor, et al. “On the Security of TLS-DHE in the Standard Model.” Advances in Cryptology - CRYPTO 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings, 2012, pp. 273--293, doi:10.1007/978-3-642-32009-5_17.
LibreCat | DOI
 

2012 | Conference Paper | LibreCat-ID: 3134
Hofheinz, Dennis, and Tibor Jager. “Tightly Secure Signatures and Public-Key Encryption.” Advances in Cryptology - CRYPTO 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings, 2012, pp. 590--607, doi:10.1007/978-3-642-32009-5_35.
LibreCat | DOI
 

2012 | Conference Paper | LibreCat-ID: 3135
Jager, Tibor, et al. “Bleichenbacher’s Attack Strikes Again: Breaking PKCS#1 v1.5 in XML Encryption.” Computer Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings, 2012, pp. 752--769, doi:10.1007/978-3-642-33167-1_43.
LibreCat | DOI
 

2012 | Conference Paper | LibreCat-ID: 3136
Hofheinz, Dennis, et al. “Waters Signatures with Optimal Security Reduction.” Public Key Cryptography - PKC 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings, 2012, pp. 66--83, doi:10.1007/978-3-642-30057-8_5.
LibreCat | DOI
 

2011 | Conference Paper | LibreCat-ID: 3137
Hofheinz, Dennis, et al. “Short Signatures from Weaker Assumptions.” Advances in Cryptology - ASIACRYPT 2011 - 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings, 2011, pp. 647--666, doi:10.1007/978-3-642-25385-0_35.
LibreCat | DOI
 

2011 | Conference Paper | LibreCat-ID: 3138
Jager, Tibor, and Juraj Somorovsky. “How to Break XML Encryption.” Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS 2011, Chicago, Illinois, USA, October 17-21, 2011, 2011, pp. 413--422, doi:10.1145/2046707.2046756.
LibreCat | DOI
 

2010 | Conference Paper | LibreCat-ID: 3139
Jager, Tibor, et al. “Generic Compilers for Authenticated Key Exchange.” Advances in Cryptology - ASIACRYPT 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings, 2010, pp. 232--249, doi:10.1007/978-3-642-17373-8_14.
LibreCat | DOI
 

2010 | Conference Paper | LibreCat-ID: 3140
Jager, Tibor, and Andy Rupp. “The Semi-Generic Group Model and Applications to Pairing-Based Cryptography.” Advances in Cryptology - ASIACRYPT 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings, 2010, pp. 539--556, doi:10.1007/978-3-642-17373-8_31.
LibreCat | DOI
 

2010 | Conference Paper | LibreCat-ID: 3141
Haralambiev, Kristiyan, et al. “Simple and Efficient Public-Key Encryption from Computational Diffie-Hellman in the Standard Model.” Public Key Cryptography - PKC 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings, 2010, pp. 1--18, doi:10.1007/978-3-642-13013-7_1.
LibreCat | DOI
 

2009 | Book Chapter | LibreCat-ID: 2920
Kakvi, Saqib. “Reinforcement Learning for Blackjack.” Lecture Notes in Computer Science, Springer Berlin Heidelberg, 2009, pp. 300–01, doi:10.1007/978-3-642-04052-8_43.
LibreCat | DOI
 

2009 | Conference Paper | LibreCat-ID: 3142
Jager, Tibor, and Jörg Schwenk. “On the Analysis of Cryptographic Assumptions in the Generic Ring Model.” Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings, 2009, pp. 399--416, doi:10.1007/978-3-642-10366-7_24.
LibreCat | DOI
 

2009 | Book Chapter | LibreCat-ID: 9616
Kakvi, Saqib. “Reinforcement Learning for Blackjack.” Lecture Notes in Computer Science, 2009, doi:10.1007/978-3-642-04052-8_43.
LibreCat | DOI
 

2008 | Conference Paper | LibreCat-ID: 3143
Gajek, Sebastian, et al. “A Browser-Based Kerberos Authentication Scheme.” Computer Security - ESORICS 2008, 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings, 2008, pp. 115--129, doi:10.1007/978-3-540-88313-5_8.
LibreCat | DOI
 

2008 | Conference Paper | LibreCat-ID: 3144
Altmann, Kristina, et al. “On Black-Box Ring Extraction and Integer Factorization.” Automata, Languages and Programming, 35th International Colloquium, ICALP 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part II - Track B: Logic, Semantics, and Theory of Programming & Track C: Security and Cryptography Foundations, 2008, pp. 437--448, doi:10.1007/978-3-540-70583-3_36.
LibreCat | DOI
 

2008 | Conference Paper | LibreCat-ID: 3145
Jager, Tibor, and Jörg Schwenk. “On the Equivalence of Generic Group Models.” Provable Security, Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings, 2008, pp. 200--209, doi:10.1007/978-3-540-88733-1_14.
LibreCat | DOI
 

2008 | Conference Paper | LibreCat-ID: 3146
Jager, Tibor, et al. “Nutzung von Selbstsignierten Client-Zertifikaten Zur Authentifikation Bei SSL/TLS.” Sicherheit 2008: Sicherheit, Schutz Und Zuverlässigkeit. Konferenzband Der 4. Jahrestagung Des Fachbereichs Sicherheit Der Gesellschaft Für Informatik e.V. (GI), 2.-4. April 2008 Im Saarbrücker Schloss., 2008, pp. 127--136.
LibreCat
 

Filters and Search Terms

department=558

Search

Filter Publications

Display / Sort

Citation Style: MLA

Export / Embed