Tibor Jager
Title
Cited by
Cited by
Year
On the security of TLS-DHE in the standard model
T Jager, F Kohlar, S Schäge, J Schwenk
Annual Cryptology Conference, 273-293, 2012
1912012
Tightly secure signatures and public-key encryption
D Hofheinz, T Jager
Designs, Codes and Cryptography 80 (1), 29-61, 2016
1242016
On the security of TLS 1.3 and QUIC against weaknesses in PKCS# 1 v1. 5 encryption
T Jager, J Schwenk, J Somorovsky
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
632015
Short signatures from weaker assumptions
D Hofheinz, T Jager, E Kiltz
International Conference on the Theory and Application of Cryptology and …, 2011
612011
How to break XML encryption
T Jager, J Somorovsky
Proceedings of the 18th ACM conference on Computer and communications …, 2011
602011
Simple and efficient public-key encryption from computational diffie-hellman in the standard model
K Haralambiev, T Jager, E Kiltz, V Shoup
International Workshop on Public Key Cryptography, 1-18, 2010
542010
Waters signatures with optimal security reduction
D Hofheinz, T Jager, E Knapp
International Workshop on Public Key Cryptography, 66-83, 2012
492012
Tightly-secure authenticated key exchange
C Bader, D Hofheinz, T Jager, E Kiltz, Y Li
Theory of Cryptography Conference, 629-658, 2015
462015
Bleichenbacher’s attack strikes again: breaking PKCS# 1 v1. 5 in XML Encryption
T Jager, S Schinzel, J Somorovsky
European Symposium on Research in Computer Security, 752-769, 2012
422012
On the impossibility of tight cryptographic reductions
C Bader, T Jager, Y Li, S Schäge
Annual International Conference on the Theory and Applications of …, 2016
402016
Practical signatures from standard assumptions
F Böhl, D Hofheinz, T Jager, J Koch, JH Seo, C Striecks
Annual International Conference on the Theory and Applications of …, 2013
392013
How to generate and use universal samplers
D Hofheinz, T Jager, D Khurana, A Sahai, B Waters, M Zhandry
International Conference on the Theory and Application of Cryptology and …, 2016
362016
Verifiable random functions from weaker assumptions
T Jager
Theory of Cryptography Conference, 121-143, 2015
362015
Practical invalid curve attacks on TLS-ECDH
T Jager, J Schwenk, J Somorovsky
European Symposium on research in computer security, 407-425, 2015
342015
One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography.
T Jager, KG Paterson, J Somorovsky
NDSS, 2013
322013
0-RTT key exchange with full forward secrecy
F Günther, B Hale, T Jager, S Lauer
Annual International Conference on the Theory and Applications of …, 2017
312017
Confined guessing: New signatures from standard assumptions
F Böhl, D Hofheinz, T Jager, J Koch, C Striecks
Journal of Cryptology 28 (1), 176-208, 2015
302015
Generic compilers for authenticated key exchange
T Jager, F Kohlar, S Schäge, J Schwenk
International Conference on the Theory and Application of Cryptology and …, 2010
30*2010
On tight security proofs for Schnorr signatures
N Fleischhacker, T Jager, D Schröder
International Conference on the Theory and Application of Cryptology and …, 2014
262014
How to build time-lock encryption
T Jager
IACR Cryptology ePrint Archive 478, 2015
252015
The system can't perform the operation now. Try again later.
Articles 1–20