Sven Schäge

Orcid: 0000-0002-8698-4244

According to our database1, Sven Schäge authored at least 31 papers between 2007 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
New Limits of Provable Security and Applications to ElGamal Encryption.
IACR Cryptol. ePrint Arch., 2024

2023
Report on evaluation of KpqC candidates.
IACR Cryptol. ePrint Arch., 2023

2021
Authenticated Key Exchange and Signatures with Tight Security in the Standard Model.
IACR Cryptol. ePrint Arch., 2021

On the Impossibility of Short Algebraic Signatures.
IACR Cryptol. ePrint Arch., 2021

On the Impossibility of Purely Algebraic Signatures.
Proceedings of the Theory of Cryptography - 19th International Conference, 2021

2020
Privacy-Preserving Authenticated Key Exchange and the Case of IKEv2.
IACR Cryptol. ePrint Arch., 2020

Tightly-Secure Authenticated Key Exchange, Revisited.
IACR Cryptol. ePrint Arch., 2020

2018
Generic Authenticated Key Exchange in the Quantum Random Oracle Model.
IACR Cryptol. ePrint Arch., 2018

2017
Authenticated Confidential Channel Establishment and the Security of TLS-DHE.
J. Cryptol., 2017

No-Match Attacks and Robust Partnering Definitions - Defining Trivial Attacks for Security Protocols is Not Trivial.
IACR Cryptol. ePrint Arch., 2017

2016
Selective opening security of practical public-key encryption schemes.
IET Inf. Secur., 2016

2015
Tight Security for Signature Schemes Without Random Oracles.
J. Cryptol., 2015

On the Impossibility of Tight Cryptographic Reductions.
IACR Cryptol. ePrint Arch., 2015

TOPAS: 2-Pass Key Exchange with Full Perfect Forward Secrecy and Optimal Communication Complexity.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
On the Security of the Pre-Shared Key Ciphersuites of TLS.
IACR Cryptol. ePrint Arch., 2014

New Modular Compilers for Authenticated Key Exchange.
Proceedings of the Applied Cryptography and Network Security, 2014

2013
On the Security of TLS-DH and TLS-RSA in the Standard Model.
IACR Cryptol. ePrint Arch., 2013

2012
Efficient and provably secure signature schemes in the standard model
PhD thesis, 2012

Strong Security from Probabilistic Signature Schemes.
Proceedings of the Public Key Cryptography - PKC 2012, 2012

On the Security of TLS-DHE in the Standard Model.
Proceedings of the Advances in Cryptology - CRYPTO 2012, 2012

2011
A Standard-Model Security Analysis of TLS-DHE.
IACR Cryptol. ePrint Arch., 2011

Tight Proofs for Signature Schemes without Random Oracles.
Proceedings of the Advances in Cryptology - EUROCRYPT 2011, 2011

2010
Generic Compilers for Authenticated Key Exchange (Full Version).
IACR Cryptol. ePrint Arch., 2010

A CDH-Based Ring Signature Scheme with Short Signatures and Public Keys.
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010

Generic Compilers for Authenticated Key Exchange.
Proceedings of the Advances in Cryptology - ASIACRYPT 2010, 2010

A New RSA-Based Signature Scheme.
Proceedings of the Progress in Cryptology, 2010

Towards an Anonymous Access Control and Accountability Scheme for Cloud Computing.
Proceedings of the IEEE International Conference on Cloud Computing, 2010

2009
Twin Signature Schemes, Revisited.
Proceedings of the Provable Security, Third International Conference, 2009

2008
Die Sicherheit von MS CardSpace und verwandten Single-Sign-On-Protokollen - Browser-basierte Protokolle im Sicherheitscheck.
Datenschutz und Datensicherheit, 2008

Code Voting with Linkable Group Signatures.
Proceedings of the 3rd International Conference, 2008

2007
Efficient Hash Collision Search Strategies on Special-Purpose Hardware.
Proceedings of the Research in Cryptology, Second Western European Workshop, 2007


  Loading...