Tibor Jager

Orcid: 0000-0002-3205-7699

Affiliations:
  • University of Wuppertal, Germany
  • University of Paderborn, Department of Computer Science, Germany
  • Ruhr University Bochum, Horst Görtz Institute, Germany


According to our database1, Tibor Jager authored at least 77 papers between 2008 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Privacy-Preserving Power Flow Analysis via Secure Multi-Party Computation.
IEEE Trans. Smart Grid, January, 2025

Rerandomizable Garbling, Revisited.
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025

2023
Simple, Fast, Efficient, and Tightly-Secure Non-malleable Non-interactive Timed Commitments.
Proceedings of the Public-Key Cryptography - PKC 2023, 2023

On Optimal Tightness for Key Exchange with Full Forward Secrecy via Key Confirmation.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023

Security Analysis of the WhatsApp End-to-End Encrypted Backup Protocol.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023

Subversion-Resilient Authenticated Encryption Without Random Oracles.
Proceedings of the Applied Cryptography and Network Security, 2023

2022
Automated Information Leakage Detection: A New Method Combining Machine Learning and Hypothesis Testing with an Application to Side-channel Detection in Cryptographic Protocols.
Proceedings of the 14th International Conference on Agents and Artificial Intelligence, 2022

On the Concrete Security of TLS 1.3 PSK Mode.
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022

On Fingerprinting Attacks and Length-Hiding Encryption.
Proceedings of the Topics in Cryptology - CT-RSA 2022, 2022

2021
Efficient Adaptively-Secure IB-KEMs and VRFs via Near-Collision Resistance.
Proceedings of the Public-Key Cryptography - PKC 2021, 2021

More Efficient Digital Signatures with Tight Multi-user Security.
Proceedings of the Public-Key Cryptography - PKC 2021, 2021

Subversion-Resilient Public Key Encryption with Practical Watchdogs.
Proceedings of the Public-Key Cryptography - PKC 2021, 2021

Tightly-Secure Authenticated Key Exchange, Revisited.
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021

Versatile and Sustainable Timed-Release Encryption and Sequential Time-Lock Puzzles (Extended Abstract).
Proceedings of the Computer Security - ESORICS 2021, 2021

Authenticated Key Exchange and Signatures with Tight Security in the Standard Model.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

Automated Detection of Side Channels in Cryptographic Protocols: DROWN the ROBOTs!
Proceedings of the AISec@CCS 2021: Proceedings of the 14th ACM Workshop on Artificial Intelligence and Security, 2021

Digital Signatures with Memory-Tight Security in the Multi-challenge Setting.
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021

Symmetric Key Exchange with Full Forward Security and Robust Synchronization.
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021

2020
On the Tight Security of TLS 1.3: Theoretically-Sound Cryptographic Parameters for Real-World Deployments.
IACR Cryptol. ePrint Arch., 2020

Generic Constructions of Incremental and Homomorphic Timed-Release Encryption.
IACR Cryptol. ePrint Arch., 2020

Forward-Secure 0-RTT Goes Live: Implementation and Performance Analysis in QUIC.
Proceedings of the Cryptology and Network Security - 19th International Conference, 2020

Offline Witness Encryption with Semi-adaptive Security.
Proceedings of the Applied Cryptography and Network Security, 2020

2019
Highly Efficient Key Exchange Protocols with Optimal Tightness - Enabling real-world deployments with theoretically sound parameters.
IACR Cryptol. ePrint Arch., 2019

On the Real-World Instantiability of Admissible Hash Functions and Efficient Verifiable Random Functions.
Proceedings of the Selected Areas in Cryptography - SAC 2019, 2019

Session Resumption Protocols and Efficient Forward Security for TLS 1.3 0-RTT.
Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019

Highly Efficient Key Exchange Protocols with Optimal Tightness.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019

Encrypted Cloud-based Control using Secret Sharing with One-time Pads.
Proceedings of the 58th IEEE Conference on Decision and Control, 2019

2018
Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange.
IACR Cryptol. ePrint Arch., 2018

How to build time-lock encryption.
Des. Codes Cryptogr., 2018

Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange.
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018

Practical and Tightly-Secure Digital Signatures and Authenticated Key Exchange.
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018

On the Security of the PKCS#1 v1.5 Signature Scheme.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

Simple and More Efficient PRFs with Tight Security from LWE and Matrix-DDH.
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018

Short Digital Signatures and ID-KEMs via Truncation Collision Resistance.
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018

2017
Authenticated Confidential Channel Establishment and the Security of TLS-DHE.
J. Cryptol., 2017

Continuous Collision Resistance and its Applications.
IACR Cryptol. ePrint Arch., 2017

Multi-key Authenticated Encryption with Corruptions: Reductions Are Lossy.
Proceedings of the Theory of Cryptography - 15th International Conference, 2017

0-RTT Key Exchange with Full Forward Secrecy.
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017

Simple Security Definitions for and Constructions of 0-RTT Key Exchange.
Proceedings of the Applied Cryptography and Network Security, 2017

2016
Black-Box Accumulation: Collecting Incentives in a Privacy-Preserving Way.
Proc. Priv. Enhancing Technol., 2016

Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts.
Proceedings of the Theory of Cryptography - 14th International Conference, 2016

Verifiable Random Functions from Standard Assumptions.
Proceedings of the Theory of Cryptography - 13th International Conference, 2016

On the Impossibility of Tight Cryptographic Reductions.
Proceedings of the Advances in Cryptology - EUROCRYPT 2016, 2016

Breaking PPTP VPNs via RADIUS Encryption.
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016

How to Generate and Use Universal Samplers.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

2015
Speeding: On Low-Latency Key Exchange.
IACR Cryptol. ePrint Arch., 2015

Verifiable Random Functions from Weaker Assumptions.
Proceedings of the Theory of Cryptography - 12th Theory of Cryptography Conference, 2015

Tightly-Secure Authenticated Key Exchange.
Proceedings of the Theory of Cryptography - 12th Theory of Cryptography Conference, 2015

On the Selective Opening Security of Practical Public-Key Encryption Schemes.
Proceedings of the Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30, 2015

One-Round Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model.
Proceedings of the Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30, 2015

Practical Invalid Curve Attacks on TLS-ECDH.
Proceedings of the Computer Security - ESORICS 2015, 2015

On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Die Zukunft der Kryptographie.
Datenschutz und Datensicherheit, 2014

On Tight Security Proofs for Schnorr Signatures.
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014

2013
Unconditional Tightness Bounds for Generic Reductions: The Exact Security of Schnorr Signatures, Revisited.
IACR Cryptol. ePrint Arch., 2013

Confined Guessing: New Signatures From Standard Assumptions.
IACR Cryptol. ePrint Arch., 2013

One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

Practical Signatures from Standard Assumptions.
Proceedings of the Advances in Cryptology, 2013

2012
On black-box models of computation in cryptology.
PhD thesis, 2012

Waters Signatures with Optimal Security Reduction.
Proceedings of the Public Key Cryptography - PKC 2012, 2012

Bleichenbacher's Attack Strikes again: Breaking PKCS#1 v1.5 in XML Encryption.
Proceedings of the Computer Security - ESORICS 2012, 2012

On the Security of TLS-DHE in the Standard Model.
Proceedings of the Advances in Cryptology - CRYPTO 2012, 2012

Tightly Secure Signatures and Public-Key Encryption.
Proceedings of the Advances in Cryptology - CRYPTO 2012, 2012

2011
A Standard-Model Security Analysis of TLS-DHE.
IACR Cryptol. ePrint Arch., 2011

Waters Signatures with Optimal Security Reduction.
IACR Cryptol. ePrint Arch., 2011

How to break XML encryption.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

Short Signatures from Weaker Assumptions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011

2010
Generic Compilers for Authenticated Key Exchange (Full Version).
IACR Cryptol. ePrint Arch., 2010

Simple and Efficient Public-Key Encryption from Computational Diffie-Hellman in the Standard Model.
Proceedings of the Public Key Cryptography, 2010

The Semi-Generic Group Model and Applications to Pairing-Based Cryptography.
Proceedings of the Advances in Cryptology - ASIACRYPT 2010, 2010

Generic Compilers for Authenticated Key Exchange.
Proceedings of the Advances in Cryptology - ASIACRYPT 2010, 2010

2009
On the Analysis of Cryptographic Assumptions in the Generic Ring Model.
Proceedings of the Advances in Cryptology, 2009

2008
The Generic Hardness of Subset Membership Problems under the Factoring Assumption.
IACR Cryptol. ePrint Arch., 2008

Nutzung von selbstsignierten Client-Zertifikaten zur Authentifikation bei SSL/TLS.
Proceedings of the Sicherheit 2008: Sicherheit, 2008

On the Equivalence of Generic Group Models.
Proceedings of the Provable Security, Second International Conference, 2008

On Black-Box Ring Extraction and Integer Factorization.
Proceedings of the Automata, Languages and Programming, 35th International Colloquium, 2008

A Browser-Based Kerberos Authentication Scheme.
Proceedings of the Computer Security, 2008


  Loading...