Follow
Sven Schäge
Title
Cited by
Cited by
Year
On the security of TLS-DHE in the standard model
T Jager, F Kohlar, S Schäge, J Schwenk
Advances in Cryptology–CRYPTO 2012: 32nd Annual Cryptology Conference, Santa …, 2012
2722012
On the security of TLS-DHE in the standard model
T Jager, F Kohlar, S Schäge, J Schwenk
Advances in Cryptology–CRYPTO 2012: 32nd Annual Cryptology Conference, Santa …, 2012
2672012
On the impossibility of tight cryptographic reductions
C Bader, T Jager, Y Li, S Schäge
Advances in Cryptology–EUROCRYPT 2016: 35th Annual International Conference …, 2016
712016
Tight proofs for signature schemes without random oracles
S Schäge
Advances in Cryptology–EUROCRYPT 2011: 30th Annual International Conference …, 2011
552011
Generic authenticated key exchange in the quantum random oracle model
K Hövelmanns, E Kiltz, S Schäge, D Unruh
Public-Key Cryptography–PKC 2020: 23rd IACR International Conference on …, 2020
502020
On the security of the pre-shared key ciphersuites of TLS
Y Li, S Schäge, Z Yang, F Kohlar, J Schwenk
Public-Key Cryptography–PKC 2014: 17th International Conference on Practice …, 2014
482014
Towards an anonymous access control and accountability scheme for cloud computing
M Jensen, S Schäge, J Schwenk
2010 IEEE 3rd International Conference on Cloud Computing, 540-541, 2010
422010
On the security of TLS-DH and TLS-RSA in the standard model
F Kohlar, S Schäge, J Schwenk
Cryptology ePrint Archive, 2013
392013
A CDH-based ring signature scheme with short signatures and public keys
S Schäge, J Schwenk
Financial Cryptography and Data Security: 14th International Conference, FC …, 2010
392010
Generic Compilers for Authenticated Key Exchange.
T Jager, F Kohlar, S Schäge, J Schwenk
ASIACRYPT 6477, 232-249, 2010
342010
Selective opening security of practical public‐key encryption schemes
F Heuer, T Jager, S Schäge, E Kiltz
IET Information Security 10 (6), 304-318, 2016
282016
Code voting with linkable group signatures
J Helbach, J Schwenk, S Schäge
Electronic Voting 2008 (EVOTE08). 3rd International Conference on Electronic …, 2008
262008
No-match attacks and robust partnering definitions: defining trivial attacks for security protocols is not trivial
Y Li, S Schäge
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
242017
New modular compilers for authenticated key exchange
Y Li, S Schäge, Z Yang, C Bader, J Schwenk
Applied Cryptography and Network Security: 12th International Conference …, 2014
172014
Authenticated confidential channel establishment and the security of TLS-DHE
T Jager, F Kohlar, S Schäge, J Schwenk
Journal of Cryptology 30, 1276-1324, 2017
162017
Tightly-secure authenticated key exchange, revisited
T Jager, E Kiltz, D Riepel, S Schäge
Advances in Cryptology–EUROCRYPT 2021: 40th Annual International Conference …, 2021
112021
Authenticated key exchange and signatures with tight security in the standard model
S Han, T Jager, E Kiltz, S Liu, J Pan, D Riepel, S Schäge
Advances in Cryptology–CRYPTO 2021: 41st Annual International Cryptology …, 2021
92021
Privacy-preserving authenticated key exchange and the case of IKEv2
S Schäge, J Schwenk, S Lauer
Public-Key Cryptography–PKC 2020: 23rd IACR International Conference on …, 2020
72020
TOPAS: 2-pass key exchange with full perfect forward secrecy and optimal communication complexity
S Schäge
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
72015
On the Impossibility of Short Algebraic Signatures.
N Döttling, D Hartmann, D Hofheinz, E Kiltz, S Schäge, B Ursu
IACR Cryptol. ePrint Arch. 2021, 738, 2021
6*2021
The system can't perform the operation now. Try again later.
Articles 1–20