Tibor Jager
Orcid: 0000-0002-3205-7699Affiliations:
- University of Wuppertal, Germany
- University of Paderborn, Department of Computer Science, Germany
- Ruhr University Bochum, Horst Görtz Institute, Germany
According to our database1,
Tibor Jager
authored at least 77 papers
between 2008 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on nds.rub.de
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2025
IEEE Trans. Smart Grid, January, 2025
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025
2023
Simple, Fast, Efficient, and Tightly-Secure Non-malleable Non-interactive Timed Commitments.
Proceedings of the Public-Key Cryptography - PKC 2023, 2023
On Optimal Tightness for Key Exchange with Full Forward Secrecy via Key Confirmation.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023
Proceedings of the Applied Cryptography and Network Security, 2023
2022
Automated Information Leakage Detection: A New Method Combining Machine Learning and Hypothesis Testing with an Application to Side-channel Detection in Cryptographic Protocols.
Proceedings of the 14th International Conference on Agents and Artificial Intelligence, 2022
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022
Proceedings of the Topics in Cryptology - CT-RSA 2022, 2022
2021
Proceedings of the Public-Key Cryptography - PKC 2021, 2021
Proceedings of the Public-Key Cryptography - PKC 2021, 2021
Proceedings of the Public-Key Cryptography - PKC 2021, 2021
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021
Versatile and Sustainable Timed-Release Encryption and Sequential Time-Lock Puzzles (Extended Abstract).
Proceedings of the Computer Security - ESORICS 2021, 2021
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021
Proceedings of the AISec@CCS 2021: Proceedings of the 14th ACM Workshop on Artificial Intelligence and Security, 2021
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021
2020
On the Tight Security of TLS 1.3: Theoretically-Sound Cryptographic Parameters for Real-World Deployments.
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
Proceedings of the Cryptology and Network Security - 19th International Conference, 2020
Proceedings of the Applied Cryptography and Network Security, 2020
2019
Highly Efficient Key Exchange Protocols with Optimal Tightness - Enabling real-world deployments with theoretically sound parameters.
IACR Cryptol. ePrint Arch., 2019
On the Real-World Instantiability of Admissible Hash Functions and Efficient Verifiable Random Functions.
Proceedings of the Selected Areas in Cryptography - SAC 2019, 2019
Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019
Proceedings of the 58th IEEE Conference on Decision and Control, 2019
2018
Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange.
IACR Cryptol. ePrint Arch., 2018
Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange.
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018
2017
J. Cryptol., 2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the Theory of Cryptography - 15th International Conference, 2017
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017
Proceedings of the Applied Cryptography and Network Security, 2017
2016
Proc. Priv. Enhancing Technol., 2016
Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts.
Proceedings of the Theory of Cryptography - 14th International Conference, 2016
Proceedings of the Theory of Cryptography - 13th International Conference, 2016
Proceedings of the Advances in Cryptology - EUROCRYPT 2016, 2016
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016
2015
Proceedings of the Theory of Cryptography - 12th Theory of Cryptography Conference, 2015
Proceedings of the Theory of Cryptography - 12th Theory of Cryptography Conference, 2015
Proceedings of the Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30, 2015
One-Round Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model.
Proceedings of the Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30, 2015
Proceedings of the Computer Security - ESORICS 2015, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014
2013
Unconditional Tightness Bounds for Generic Reductions: The Exact Security of Schnorr Signatures, Revisited.
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013
Proceedings of the Advances in Cryptology, 2013
2012
Proceedings of the Public Key Cryptography - PKC 2012, 2012
Proceedings of the Computer Security - ESORICS 2012, 2012
Proceedings of the Advances in Cryptology - CRYPTO 2012, 2012
Proceedings of the Advances in Cryptology - CRYPTO 2012, 2012
2011
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011
2010
IACR Cryptol. ePrint Arch., 2010
Simple and Efficient Public-Key Encryption from Computational Diffie-Hellman in the Standard Model.
Proceedings of the Public Key Cryptography, 2010
Proceedings of the Advances in Cryptology - ASIACRYPT 2010, 2010
Proceedings of the Advances in Cryptology - ASIACRYPT 2010, 2010
2009
Proceedings of the Advances in Cryptology, 2009
2008
IACR Cryptol. ePrint Arch., 2008
Proceedings of the Sicherheit 2008: Sicherheit, 2008
Proceedings of the Provable Security, Second International Conference, 2008
Proceedings of the Automata, Languages and Programming, 35th International Colloquium, 2008
Proceedings of the Computer Security, 2008