Tibor Jager
Tibor Jager
Bestätigte E-Mail-Adresse bei - Startseite
Zitiert von
Zitiert von
On the security of TLS-DHE in the standard model
T Jager, F Kohlar, S Schäge, J Schwenk
Advances in Cryptology–CRYPTO 2012: 32nd Annual Cryptology Conference, Santa …, 2012
Tightly secure signatures and public-key encryption
D Hofheinz, T Jager
Designs, Codes and Cryptography 80, 29-61, 2016
On the security of TLS 1.3 and QUIC against weaknesses in PKCS# 1 v1. 5 encryption
T Jager, J Schwenk, J Somorovsky
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
Tightly-secure authenticated key exchange
C Bader, D Hofheinz, T Jager, E Kiltz, Y Li
Theory of Cryptography: 12th Theory of Cryptography Conference, TCC 2015 …, 2015
How to build time-lock encryption
J Liu, T Jager, SA Kakvi, B Warinschi
Designs, Codes and Cryptography 86, 2549-2586, 2018
0-RTT key exchange with full forward secrecy
F Günther, B Hale, T Jager, S Lauer
Advances in Cryptology–EUROCRYPT 2017: 36th Annual International Conference …, 2017
On the impossibility of tight cryptographic reductions
C Bader, T Jager, Y Li, S Schäge
Advances in Cryptology–EUROCRYPT 2016: 35th Annual International Conference …, 2016
Bloom filter encryption and applications to efficient forward-secret 0-RTT key exchange
D Derler, K Gellert, T Jager, D Slamanig, C Striecks
Journal of Cryptology 34, 1-59, 2021
Short signatures from weaker assumptions
D Hofheinz, T Jager, E Kiltz
Advances in Cryptology–ASIACRYPT 2011: 17th International Conference on the …, 2011
Waters signatures with optimal security reduction
D Hofheinz, T Jager, E Knapp
Public Key Cryptography–PKC 2012: 15th International Conference on Practice …, 2012
How to break XML encryption
T Jager, J Somorovsky
Proceedings of the 18th ACM conference on Computer and communications …, 2011
Practical and tightly-secure digital signatures and authenticated key exchange
K Gjøsteen, T Jager
Advances in Cryptology–CRYPTO 2018: 38th Annual International Cryptology …, 2018
Verifiable random functions from weaker assumptions
T Jager
Theory of Cryptography: 12th Theory of Cryptography Conference, TCC 2015 …, 2015
Practical invalid curve attacks on TLS-ECDH
T Jager, J Schwenk, J Somorovsky
European Symposium on research in computer security, 407-425, 2015
Simple and efficient public-key encryption from computational Diffie-Hellman in the standard model
K Haralambiev, T Jager, E Kiltz, V Shoup
International Workshop on Public Key Cryptography, 1-18, 2010
Bleichenbacher’s attack strikes again: Breaking PKCS# 1 v1. 5 in XML encryption
T Jager, S Schinzel, J Somorovsky
Computer Security–ESORICS 2012: 17th European Symposium on Research in …, 2012
Session resumption protocols and efficient forward security for TLS 1.3 0-RTT
N Aviram, K Gellert, T Jager
Journal of Cryptology 34 (3), 20, 2021
Practical signatures from standard assumptions
F Böhl, D Hofheinz, T Jager, J Koch, JH Seo, C Striecks
Advances in Cryptology–EUROCRYPT 2013: 32nd Annual International Conference …, 2013
How to generate and use universal samplers
D Hofheinz, T Jager, D Khurana, A Sahai, B Waters, M Zhandry
International Conference on the Theory and Application of Cryptology and …, 2016
On tight security proofs for Schnorr signatures
N Fleischhacker, T Jager, D Schröder
Advances in Cryptology–ASIACRYPT 2014: 20th International Conference on the …, 2014
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20