Sven Schäge

Orcid: 0000-0002-8698-4244

According to our database1, Sven Schäge authored at least 35 papers between 2007 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
New Limits for Homomorphic Encryption.
IACR Cryptol. ePrint Arch., 2025

2024
Report on evaluation of KpqC Round-2 candidates.
IACR Cryptol. ePrint Arch., 2024

New Limits of Provable Security and Applications to ElGamal Encryption.
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024

Protoss: Protocol for Tight Optimal Symmetric Security.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

Tightly-Secure Group Key Exchange with Perfect Forward Secrecy.
Proceedings of the Advances in Cryptology - ASIACRYPT 2024, 2024

2023
Report on evaluation of KpqC candidates.
IACR Cryptol. ePrint Arch., 2023

2021
On the Impossibility of Short Algebraic Signatures.
IACR Cryptol. ePrint Arch., 2021

On the Impossibility of Purely Algebraic Signatures.
Proceedings of the Theory of Cryptography - 19th International Conference, 2021

Tightly-Secure Authenticated Key Exchange, Revisited.
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021

Authenticated Key Exchange and Signatures with Tight Security in the Standard Model.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

2020
Privacy-Preserving Authenticated Key Exchange and the Case of IKEv2.
Proceedings of the Public-Key Cryptography - PKC 2020, 2020

Generic Authenticated Key Exchange in the Quantum Random Oracle Model.
Proceedings of the Public-Key Cryptography - PKC 2020, 2020

2017
Authenticated Confidential Channel Establishment and the Security of TLS-DHE.
J. Cryptol., 2017

No-Match Attacks and Robust Partnering Definitions: Defining Trivial Attacks for Security Protocols is Not Trivial.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
On the Impossibility of Tight Cryptographic Reductions.
Proceedings of the Advances in Cryptology - EUROCRYPT 2016, 2016

2015
Tight Security for Signature Schemes Without Random Oracles.
J. Cryptol., 2015

On the Selective Opening Security of Practical Public-Key Encryption Schemes.
Proceedings of the Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30, 2015

TOPAS: 2-Pass Key Exchange with Full Perfect Forward Secrecy and Optimal Communication Complexity.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
On the Security of the Pre-shared Key Ciphersuites of TLS.
Proceedings of the Public-Key Cryptography - PKC 2014, 2014

New Modular Compilers for Authenticated Key Exchange.
Proceedings of the Applied Cryptography and Network Security, 2014

2013
On the Security of TLS-DH and TLS-RSA in the Standard Model.
IACR Cryptol. ePrint Arch., 2013

2012
Efficient and provably secure signature schemes in the standard model
PhD thesis, 2012

Strong Security from Probabilistic Signature Schemes.
Proceedings of the Public Key Cryptography - PKC 2012, 2012

On the Security of TLS-DHE in the Standard Model.
Proceedings of the Advances in Cryptology - CRYPTO 2012, 2012

2011
A Standard-Model Security Analysis of TLS-DHE.
IACR Cryptol. ePrint Arch., 2011

Tight Proofs for Signature Schemes without Random Oracles.
Proceedings of the Advances in Cryptology - EUROCRYPT 2011, 2011

2010
Generic Compilers for Authenticated Key Exchange (Full Version).
IACR Cryptol. ePrint Arch., 2010

A CDH-Based Ring Signature Scheme with Short Signatures and Public Keys.
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010

Generic Compilers for Authenticated Key Exchange.
Proceedings of the Advances in Cryptology - ASIACRYPT 2010, 2010

A New RSA-Based Signature Scheme.
Proceedings of the Progress in Cryptology, 2010

Towards an Anonymous Access Control and Accountability Scheme for Cloud Computing.
Proceedings of the IEEE International Conference on Cloud Computing, 2010

2009
Twin Signature Schemes, Revisited.
Proceedings of the Provable Security, Third International Conference, 2009

2008
Die Sicherheit von MS CardSpace und verwandten Single-Sign-On-Protokollen - Browser-basierte Protokolle im Sicherheitscheck.
Datenschutz und Datensicherheit, 2008

Code Voting with Linkable Group Signatures.
Proceedings of the 3rd International Conference, 2008

2007
Efficient Hash Collision Search Strategies on Special-Purpose Hardware.
Proceedings of the Research in Cryptology, Second Western European Workshop, 2007


  Loading...