Tibor Jager
TitleCited byYear
On the security of TLS-DHE in the standard model
T Jager, F Kohlar, S Schäge, J Schwenk
Annual Cryptology Conference, 273-293, 2012
1772012
Tightly secure signatures and public-key encryption
D Hofheinz, T Jager
Designs, Codes and Cryptography 80 (1), 29-61, 2016
1142016
Short signatures from weaker assumptions
D Hofheinz, T Jager, E Kiltz
International Conference on the Theory and Application of Cryptology and …, 2011
572011
On the security of TLS 1.3 and QUIC against weaknesses in PKCS# 1 v1. 5 encryption
T Jager, J Schwenk, J Somorovsky
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
532015
Simple and efficient public-key encryption from computational diffie-hellman in the standard model
K Haralambiev, T Jager, E Kiltz, V Shoup
International Workshop on Public Key Cryptography, 1-18, 2010
532010
How to break XML encryption
T Jager, J Somorovsky
Proceedings of the 18th ACM conference on Computer and communications …, 2011
512011
Waters signatures with optimal security reduction
D Hofheinz, T Jager, E Knapp
International Workshop on Public Key Cryptography, 66-83, 2012
432012
Practical signatures from standard assumptions
F Böhl, D Hofheinz, T Jager, J Koch, JH Seo, C Striecks
Annual International Conference on the Theory and Applications of …, 2013
362013
Bleichenbacher’s attack strikes again: breaking PKCS# 1 v1. 5 in XML Encryption
T Jager, S Schinzel, J Somorovsky
European Symposium on Research in Computer Security, 752-769, 2012
362012
On the impossibility of tight cryptographic reductions
C Bader, T Jager, Y Li, S Schäge
Annual International Conference on the Theory and Applications of …, 2016
352016
Tightly-secure authenticated key exchange
C Bader, D Hofheinz, T Jager, E Kiltz, Y Li
Theory of Cryptography Conference, 629-658, 2015
352015
How to generate and use universal samplers
D Hofheinz, T Jager, D Khurana, A Sahai, B Waters, M Zhandry
International Conference on the Theory and Application of Cryptology and …, 2016
332016
One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography.
T Jager, KG Paterson, J Somorovsky
NDSS, 2013
302013
Practical invalid curve attacks on TLS-ECDH
T Jager, J Schwenk, J Somorovsky
European Symposium on research in computer security, 407-425, 2015
292015
Verifiable random functions from weaker assumptions
T Jager
Theory of Cryptography Conference, 121-143, 2015
292015
Confined guessing: New signatures from standard assumptions
F Böhl, D Hofheinz, T Jager, J Koch, C Striecks
Journal of Cryptology 28 (1), 176-208, 2015
282015
Generic compilers for authenticated key exchange
T Jager, F Kohlar, S Schäge, J Schwenk
International Conference on the Theory and Application of Cryptology and …, 2010
28*2010
How to build time-lock encryption
J Liu, T Jager, SA Kakvi, B Warinschi
Designs, Codes and Cryptography 86 (11), 2549-2586, 2018
252018
A browser-based kerberos authentication scheme
S Gajek, T Jager, M Manulis, J Schwenk
European Symposium on Research in Computer Security, 115-129, 2008
222008
On tight security proofs for Schnorr signatures
N Fleischhacker, T Jager, D Schröder
International Conference on the Theory and Application of Cryptology and …, 2014
212014
The system can't perform the operation now. Try again later.
Articles 1–20