On the security of TLS-DHE in the standard model T Jager, F Kohlar, S Schäge, J Schwenk Advances in Cryptology–CRYPTO 2012: 32nd Annual Cryptology Conference, Santa …, 2012 | 272 | 2012 |
On the security of TLS-DHE in the standard model T Jager, F Kohlar, S Schäge, J Schwenk Advances in Cryptology–CRYPTO 2012: 32nd Annual Cryptology Conference, Santa …, 2012 | 267 | 2012 |
On the impossibility of tight cryptographic reductions C Bader, T Jager, Y Li, S Schäge Advances in Cryptology–EUROCRYPT 2016: 35th Annual International Conference …, 2016 | 71 | 2016 |
Tight proofs for signature schemes without random oracles S Schäge Advances in Cryptology–EUROCRYPT 2011: 30th Annual International Conference …, 2011 | 55 | 2011 |
Generic authenticated key exchange in the quantum random oracle model K Hövelmanns, E Kiltz, S Schäge, D Unruh Public-Key Cryptography–PKC 2020: 23rd IACR International Conference on …, 2020 | 50 | 2020 |
On the security of the pre-shared key ciphersuites of TLS Y Li, S Schäge, Z Yang, F Kohlar, J Schwenk Public-Key Cryptography–PKC 2014: 17th International Conference on Practice …, 2014 | 48 | 2014 |
Towards an anonymous access control and accountability scheme for cloud computing M Jensen, S Schäge, J Schwenk 2010 IEEE 3rd International Conference on Cloud Computing, 540-541, 2010 | 42 | 2010 |
On the security of TLS-DH and TLS-RSA in the standard model F Kohlar, S Schäge, J Schwenk Cryptology ePrint Archive, 2013 | 39 | 2013 |
A CDH-based ring signature scheme with short signatures and public keys S Schäge, J Schwenk Financial Cryptography and Data Security: 14th International Conference, FC …, 2010 | 39 | 2010 |
Generic Compilers for Authenticated Key Exchange. T Jager, F Kohlar, S Schäge, J Schwenk ASIACRYPT 6477, 232-249, 2010 | 34 | 2010 |
Selective opening security of practical public‐key encryption schemes F Heuer, T Jager, S Schäge, E Kiltz IET Information Security 10 (6), 304-318, 2016 | 28 | 2016 |
Code voting with linkable group signatures J Helbach, J Schwenk, S Schäge Electronic Voting 2008 (EVOTE08). 3rd International Conference on Electronic …, 2008 | 26 | 2008 |
No-match attacks and robust partnering definitions: defining trivial attacks for security protocols is not trivial Y Li, S Schäge Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 24 | 2017 |
New modular compilers for authenticated key exchange Y Li, S Schäge, Z Yang, C Bader, J Schwenk Applied Cryptography and Network Security: 12th International Conference …, 2014 | 17 | 2014 |
Authenticated confidential channel establishment and the security of TLS-DHE T Jager, F Kohlar, S Schäge, J Schwenk Journal of Cryptology 30, 1276-1324, 2017 | 16 | 2017 |
Tightly-secure authenticated key exchange, revisited T Jager, E Kiltz, D Riepel, S Schäge Advances in Cryptology–EUROCRYPT 2021: 40th Annual International Conference …, 2021 | 11 | 2021 |
Authenticated key exchange and signatures with tight security in the standard model S Han, T Jager, E Kiltz, S Liu, J Pan, D Riepel, S Schäge Advances in Cryptology–CRYPTO 2021: 41st Annual International Cryptology …, 2021 | 9 | 2021 |
Privacy-preserving authenticated key exchange and the case of IKEv2 S Schäge, J Schwenk, S Lauer Public-Key Cryptography–PKC 2020: 23rd IACR International Conference on …, 2020 | 7 | 2020 |
TOPAS: 2-pass key exchange with full perfect forward secrecy and optimal communication complexity S Schäge Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 7 | 2015 |
On the Impossibility of Short Algebraic Signatures. N Döttling, D Hartmann, D Hofheinz, E Kiltz, S Schäge, B Ursu IACR Cryptol. ePrint Arch. 2021, 738, 2021 | 6* | 2021 |