Tibor Jager

Affiliations:
  • University of Wuppertal, Germany
  • University of Paderborn, Department of Computer Science, Germany
  • Ruhr University Bochum, Horst Görtz Institute, Germany


According to our database1, Tibor Jager authored at least 69 papers between 2008 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2021
On the Tight Security of TLS 1.3: Theoretically Sound Cryptographic Parameters for Real-World Deployments.
J. Cryptol., 2021

Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange.
J. Cryptol., 2021

Session Resumption Protocols and Efficient Forward Security for TLS 1.3 0-RTT.
J. Cryptol., 2021

Efficient Adaptively-Secure IB-KEMs and VRFs via Near-Collision Resistance.
IACR Cryptol. ePrint Arch., 2021

Authenticated Key Exchange and Signatures with Tight Security in the Standard Model.
IACR Cryptol. ePrint Arch., 2021

On Fingerprinting Attacks and Length-Hiding Encryption.
IACR Cryptol. ePrint Arch., 2021

Automated Detection of Side Channels in Cryptographic Protocols: DROWN the ROBOTs!
IACR Cryptol. ePrint Arch., 2021

Digital Signatures with Memory-Tight Security in the Multi-Challenge Setting.
IACR Cryptol. ePrint Arch., 2021

More Efficient Digital Signatures with Tight Multi-User Security.
IACR Cryptol. ePrint Arch., 2021

Symmetric Key Exchange with Full Forward Security and Robust Synchronization.
IACR Cryptol. ePrint Arch., 2021

Subversion-Resilient Public Key Encryption with Practical Watchdogs.
IACR Cryptol. ePrint Arch., 2021

Versatile and Sustainable Timed-Release Encryption and Sequential Time-Lock Puzzles (Extended Abstract).
Proceedings of the Computer Security - ESORICS 2021, 2021

2020
Tightly-Secure Authenticated Key Exchange, Revisited.
IACR Cryptol. ePrint Arch., 2020

Forward-Secure 0-RTT Goes Live: Implementation and Performance Analysis in QUIC.
IACR Cryptol. ePrint Arch., 2020

Generic Constructions of Incremental and Homomorphic Timed-Release Encryption.
IACR Cryptol. ePrint Arch., 2020

2019
On Tight Security Proofs for Schnorr Signatures.
J. Cryptol., 2019

On the Real-World Instantiability of Admissible Hash Functions and Efficient Verifiable Random Functions.
IACR Cryptol. ePrint Arch., 2019

Highly Efficient Key Exchange Protocols with Optimal Tightness - Enabling real-world deployments with theoretically sound parameters.
IACR Cryptol. ePrint Arch., 2019

Offline Witness Encryption with Semi-Adaptive Security.
IACR Cryptol. ePrint Arch., 2019

Highly Efficient Key Exchange Protocols with Optimal Tightness.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019

Encrypted Cloud-based Control using Secret Sharing with One-time Pads.
Proceedings of the 58th IEEE Conference on Decision and Control, 2019

2018
Simple and More Efficient PRFs with Tight Security from LWE and Matrix-DDH.
IACR Cryptol. ePrint Arch., 2018

On the Security of the PKCS#1 v1.5 Signature Scheme.
IACR Cryptol. ePrint Arch., 2018

Practical and Tightly-Secure Digital Signatures and Authenticated Key Exchange.
IACR Cryptol. ePrint Arch., 2018

How to build time-lock encryption.
Des. Codes Cryptogr., 2018

Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange.
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018

Short Digital Signatures and ID-KEMs via Truncation Collision Resistance.
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018

2017
Authenticated Confidential Channel Establishment and the Security of TLS-DHE.
J. Cryptol., 2017

Multi-Key Authenticated Encryption with Corruptions: Reductions are Lossy.
IACR Cryptol. ePrint Arch., 2017

Continuous Collision Resistance and its Applications.
IACR Cryptol. ePrint Arch., 2017

0-RTT Key Exchange with Full Forward Secrecy.
IACR Cryptol. ePrint Arch., 2017

Simple Security Definitions for and Constructions of 0-RTT Key Exchange.
Proceedings of the Applied Cryptography and Network Security, 2017

2016
Black-Box Accumulation: Collecting Incentives in a Privacy-Preserving Way.
Proc. Priv. Enhancing Technol., 2016

Selective opening security of practical public-key encryption schemes.
IET Inf. Secur., 2016

Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts.
IACR Cryptol. ePrint Arch., 2016

Tightly secure signatures and public-key encryption.
Des. Codes Cryptogr., 2016

Breaking PPTP VPNs via RADIUS Encryption.
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016

How to Generate and Use Universal Samplers.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

2015
Confined Guessing: New Signatures From Standard Assumptions.
J. Cryptol., 2015

Verifiable Random Functions from Standard Assumptions.
IACR Cryptol. ePrint Arch., 2015

Speeding: On Low-Latency Key Exchange.
IACR Cryptol. ePrint Arch., 2015

One-Round Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model.
IACR Cryptol. ePrint Arch., 2015

On the Impossibility of Tight Cryptographic Reductions.
IACR Cryptol. ePrint Arch., 2015

Practical Invalid Curve Attacks on TLS-ECDH.
Proceedings of the Computer Security - ESORICS 2015, 2015

On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Verifiable Random Functions from Weaker Assumptions.
IACR Cryptol. ePrint Arch., 2014

Tightly-Secure Authenticated Key Exchange.
IACR Cryptol. ePrint Arch., 2014

Die Zukunft der Kryptographie.
Datenschutz und Datensicherheit, 2014

2013
On the Analysis of Cryptographic Assumptions in the Generic Ring Model.
J. Cryptol., 2013

Unconditional Tightness Bounds for Generic Reductions: The Exact Security of Schnorr Signatures, Revisited.
IACR Cryptol. ePrint Arch., 2013

One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

Practical Signatures from Standard Assumptions.
Proceedings of the Advances in Cryptology, 2013

2012
On black-box models of computation in cryptology.
PhD thesis, 2012

Waters Signatures with Optimal Security Reduction.
Proceedings of the Public Key Cryptography - PKC 2012, 2012

Bleichenbacher's Attack Strikes again: Breaking PKCS#1 v1.5 in XML Encryption.
Proceedings of the Computer Security - ESORICS 2012, 2012

On the Security of TLS-DHE in the Standard Model.
Proceedings of the Advances in Cryptology - CRYPTO 2012, 2012

2011
A Standard-Model Security Analysis of TLS-DHE.
IACR Cryptol. ePrint Arch., 2011

Short Signatures From Weaker Assumptions.
IACR Cryptol. ePrint Arch., 2011

Waters Signatures with Optimal Security Reduction.
IACR Cryptol. ePrint Arch., 2011

How to break XML encryption.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2010
Generic Compilers for Authenticated Key Exchange (Full Version).
IACR Cryptol. ePrint Arch., 2010

Simple and Efficient Public-Key Encryption from Computational Diffie-Hellman in the Standard Model.
IACR Cryptol. ePrint Arch., 2010

The Semi-Generic Group Model and Applications to Pairing-Based Cryptography.
Proceedings of the Advances in Cryptology - ASIACRYPT 2010, 2010

Generic Compilers for Authenticated Key Exchange.
Proceedings of the Advances in Cryptology - ASIACRYPT 2010, 2010

2008
The Generic Hardness of Subset Membership Problems under the Factoring Assumption.
IACR Cryptol. ePrint Arch., 2008

On Black-Box Ring Extraction and Integer Factorization.
IACR Cryptol. ePrint Arch., 2008

Nutzung von selbstsignierten Client-Zertifikaten zur Authentifikation bei SSL/TLS.
Proceedings of the Sicherheit 2008: Sicherheit, 2008

On the Equivalence of Generic Group Models.
Proceedings of the Provable Security, Second International Conference, 2008

A Browser-Based Kerberos Authentication Scheme.
Proceedings of the Computer Security, 2008


  Loading...