Follow
Sven Schäge
Title
Cited by
Cited by
Year
On the security of TLS-DHE in the standard model
T Jager, F Kohlar, S Schäge, J Schwenk
Annual Cryptology Conference, 273-293, 2012
2652012
On the security of TLS-DHE in the standard model
T Jager, F Kohlar, S Schäge, J Schwenk
Annual Cryptology Conference, 273-293, 2012
2602012
On the impossibility of tight cryptographic reductions
C Bader, T Jager, Y Li, S Schäge
Annual International Conference on the Theory and Applications of …, 2016
722016
Tight proofs for signature schemes without random oracles
S Schäge
Annual International Conference on the Theory and Applications of …, 2011
542011
On the security of the pre-shared key ciphersuites of TLS
Y Li, S Schäge, Z Yang, F Kohlar, J Schwenk
International Workshop on Public Key Cryptography, 669-684, 2014
472014
Generic authenticated key exchange in the quantum random oracle model
K Hövelmanns, E Kiltz, S Schäge, D Unruh
IACR international conference on public-key cryptography, 389-422, 2020
442020
Towards an anonymous access control and accountability scheme for cloud computing
M Jensen, S Schäge, J Schwenk
2010 IEEE 3rd International Conference on Cloud Computing, 540-541, 2010
412010
On the security of TLS-DH and TLS-RSA in the standard model
F Kohlar, S Schäge, J Schwenk
Cryptology ePrint Archive, 2013
392013
A CDH-based ring signature scheme with short signatures and public keys
S Schäge, J Schwenk
International Conference on Financial Cryptography and Data Security, 129-142, 2010
352010
Generic compilers for authenticated key exchange
T Jager, F Kohlar, S Schäge, J Schwenk
International Conference on the Theory and Application of Cryptology and …, 2010
322010
Code voting with linkable group signatures
J Helbach, J Schwenk, S Schäge
Electronic Voting 2008 (EVOTE08). 3rd International Conference on Electronic …, 2008
252008
Selective opening security of practical public‐key encryption schemes
F Heuer, T Jager, S Schäge, E Kiltz
IET Information Security 10 (6), 304-318, 2016
242016
No-match attacks and robust partnering definitions: defining trivial attacks for security protocols is not trivial
Y Li, S Schäge
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
232017
New modular compilers for authenticated key exchange
Y Li, S Schäge, Z Yang, C Bader, J Schwenk
International Conference on Applied Cryptography and Network Security, 1-18, 2014
162014
Authenticated confidential channel establishment and the security of TLS-DHE
T Jager, F Kohlar, S Schäge, J Schwenk
Journal of Cryptology 30 (4), 1276-1324, 2017
132017
Tightly-secure authenticated key exchange, revisited
T Jager, E Kiltz, D Riepel, S Schäge
Annual International Conference on the Theory and Applications of …, 2021
112021
Authenticated key exchange and signatures with tight security in the standard model
S Han, T Jager, E Kiltz, S Liu, J Pan, D Riepel, S Schäge
Annual International Cryptology Conference, 670-700, 2021
82021
TOPAS: 2-pass key exchange with full perfect forward secrecy and optimal communication complexity
S Schäge
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
72015
Efficient hash collision search strategies on special-purpose hardware
T Güneysu, C Paar, S Schäge
Western European Workshop on Research in Cryptology, 39-51, 2007
62007
On the Impossibility of Short Algebraic Signatures.
N Döttling, D Hartmann, D Hofheinz, E Kiltz, S Schäge, B Ursu
IACR Cryptol. ePrint Arch. 2021, 738, 2021
5*2021
The system can't perform the operation now. Try again later.
Articles 1–20