What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Tibor Jager
Google Scholar
63
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/crypto
Rerandomizable Garbling, Revisited.
Raphael Heitjohann
Jonas von der Heyden
Tibor Jager
2023
conf/crypto
Security Analysis of the WhatsApp End-to-End Encrypted Backup Protocol.
Gareth T. Davies
Sebastian H. Faller
Kai Gellert
Tobias Handirk
Julia Hesse
Máté Horváth
Tibor Jager
2023
conf/crypto
On Optimal Tightness for Key Exchange with Full Forward Secrecy via Key Confirmation.
Kai Gellert
Kristian Gjøsteen
Håkon Jacobsen
Tibor Jager
2023
conf/acns
Subversion-Resilient Authenticated Encryption Without Random Oracles.
Pascal Bemmann
Sebastian Berndt
Denis Diemert
Thomas Eisenbarth
Tibor Jager
2023
conf/pkc
Simple, Fast, Efficient, and Tightly-Secure Non-malleable Non-interactive Timed Commitments.
Peter Chvojka
Tibor Jager
2022
conf/ctrsa
On Fingerprinting Attacks and Length-Hiding Encryption.
Kai Gellert
Tibor Jager
Lin Lyu
Tom Neuschulten
2022
conf/eurocrypt
On the Concrete Security of TLS 1.3 PSK Mode.
Hannah Davis
Denis Diemert
Felix Günther
Tibor Jager
2021
journals/joc
Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange.
David Derler
Kai Gellert
Tibor Jager
Daniel Slamanig
Christoph Striecks
2021
journals/joc
Session Resumption Protocols and Efficient Forward Security for TLS 1.3 0-RTT.
Nimrod Aviram
Kai Gellert
Tibor Jager
2021
journals/joc
On the Tight Security of TLS 1.3: Theoretically Sound Cryptographic Parameters for Real-World Deployments.
Denis Diemert
Tibor Jager
2021
conf/ccs
Automated Detection of Side Channels in Cryptographic Protocols: DROWN the ROBOTs!
Jan Peter Drees
Pritha Gupta
Eyke Hüllermeier
Tibor Jager
Alexander Konze
Claudia Priesterjahn
Arunselvan Ramaswamy
Juraj Somorovsky
2021
conf/crypto
Authenticated Key Exchange and Signatures with Tight Security in the Standard Model.
Shuai Han
Tibor Jager
Eike Kiltz
Shengli Liu
Jiaxin Pan
Doreen Riepel
Sven Schäge
2021
conf/esorics
Versatile and Sustainable Timed-Release Encryption and Sequential Time-Lock Puzzles (Extended Abstract).
Peter Chvojka
Tibor Jager
Daniel Slamanig
Christoph Striecks
2021
conf/pkc
More Efficient Digital Signatures with Tight Multi-user Security.
Denis Diemert
Kai Gellert
Tibor Jager
Lin Lyu
2021
conf/pkc
Efficient Adaptively-Secure IB-KEMs and VRFs via Near-Collision Resistance.
Tibor Jager
Rafael Kurek
David Niehues
2021
conf/pkc
Subversion-Resilient Public Key Encryption with Practical Watchdogs.
Pascal Bemmann
Rongmao Chen
Tibor Jager
2021
conf/eurocrypt
Tightly-Secure Authenticated Key Exchange, Revisited.
Tibor Jager
Eike Kiltz
Doreen Riepel
Sven Schäge
2021
conf/asiacrypt
Symmetric Key Exchange with Full Forward Security and Robust Synchronization.
Colin Boyd
Gareth T. Davies
Bor de Kock
Kai Gellert
Tibor Jager
Lise Millerjord
2021
conf/asiacrypt
Digital Signatures with Memory-Tight Security in the Multi-challenge Setting.
Denis Diemert
Kai Gellert
Tibor Jager
Lin Lyu
2020
conf/acns
Offline Witness Encryption with Semi-adaptive Security.
Peter Chvojka
Tibor Jager
Saqib A. Kakvi
2020
conf/cans
Forward-Secure 0-RTT Goes Live: Implementation and Performance Analysis in QUIC.
Fynn Dallmeier
Jan Peter Drees
Kai Gellert
Tobias Handirk
Tibor Jager
Jonas Klauke
Simon Nachtigall
Timo Renzelmann
Rudi Wolf
2019
journals/joc
On Tight Security Proofs for Schnorr Signatures.
Nils Fleischhacker
Tibor Jager
Dominique Schröder
2019
conf/crypto
Highly Efficient Key Exchange Protocols with Optimal Tightness.
Katriel Cohn-Gordon
Cas Cremers
Kristian Gjøsteen
Håkon Jacobsen
Tibor Jager
2019
conf/eurocrypt
Session Resumption Protocols and Efficient Forward Security for TLS 1.3 0-RTT.
Nimrod Aviram
Kai Gellert
Tibor Jager
2019
conf/sacrypt
On the Real-World Instantiability of Admissible Hash Functions and Efficient Verifiable Random Functions.
Tibor Jager
David Niehues
2018
conf/ccs
On the Security of the PKCS#1 v1.5 Signature Scheme.
Tibor Jager
Saqib A. Kakvi
Alexander May
2018
conf/crypto
Practical and Tightly-Secure Digital Signatures and Authenticated Key Exchange.
Kristian Gjøsteen
Tibor Jager
2018
conf/eurocrypt
Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange.
David Derler
Tibor Jager
Daniel Slamanig
Christoph Striecks
2018
conf/asiacrypt
Short Digital Signatures and ID-KEMs via Truncation Collision Resistance.
Tibor Jager
Rafael Kurek
2018
conf/asiacrypt
Simple and More Efficient PRFs with Tight Security from LWE and Matrix-DDH.
Tibor Jager
Rafael Kurek
Jiaxin Pan
2017
journals/joc
Authenticated Confidential Channel Establishment and the Security of TLS-DHE.
Tibor Jager
Florian Kohlar
Sven Schäge
Jörg Schwenk
2017
conf/acns
Simple Security Definitions for and Constructions of 0-RTT Key Exchange.
Britta Hale
Tibor Jager
Sebastian Lauer
Jörg Schwenk
2017
conf/eurocrypt
0-RTT Key Exchange with Full Forward Secrecy.
Felix Günther
Britta Hale
Tibor Jager
Sebastian Lauer
2017
conf/tcc
Multi-key Authenticated Encryption with Corruptions: Reductions Are Lossy.
Tibor Jager
Martijn Stam
Ryan Stanley-Oakes
Bogdan Warinschi
2016
journals/popets
Black-Box Accumulation: Collecting Incentives in a Privacy-Preserving Way.
Tibor Jager
Andy Rupp
2016
conf/eurocrypt
On the Impossibility of Tight Cryptographic Reductions.
Christoph Bader
Tibor Jager
Yong Li
Sven Schäge
2016
conf/asiacrypt
How to Generate and Use Universal Samplers.
Dennis Hofheinz
Tibor Jager
Dakshita Khurana
Amit Sahai
Brent Waters
Mark Zhandry
2016
conf/tcc
Verifiable Random Functions from Standard Assumptions.
Dennis Hofheinz
Tibor Jager
2016
conf/tcc
Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts.
Dennis Hofheinz
Tibor Jager
Andy Rupp
2016
conf/cans
Breaking PPTP VPNs via RADIUS Encryption.
Matthias Horst
Martin Grothe
Tibor Jager
Jörg Schwenk
2015
journals/joc
Confined Guessing: New Signatures From Standard Assumptions.
Florian Böhl
Dennis Hofheinz
Tibor Jager
Jessica Koch
Christoph Striecks
2015
conf/ccs
On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption.
Tibor Jager
Jörg Schwenk
Juraj Somorovsky
2015
conf/esorics
Practical Invalid Curve Attacks on TLS-ECDH.
Tibor Jager
Jörg Schwenk
Juraj Somorovsky
2015
conf/pkc
One-Round Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model.
Florian Bergsma
Tibor Jager
Jörg Schwenk
2015
conf/pkc
On the Selective Opening Security of Practical Public-Key Encryption Schemes.
Felix Heuer
Tibor Jager
Eike Kiltz
Sven Schäge
2015
conf/tcc
Verifiable Random Functions from Weaker Assumptions.
Tibor Jager
2015
conf/tcc
Tightly-Secure Authenticated Key Exchange.
Christoph Bader
Dennis Hofheinz
Tibor Jager
Eike Kiltz
Yong Li
2014
conf/asiacrypt
On Tight Security Proofs for Schnorr Signatures.
Nils Fleischhacker
Tibor Jager
Dominique Schröder
2013
journals/joc
On the Analysis of Cryptographic Assumptions in the Generic Ring Model.
Tibor Jager
Jörg Schwenk
2013
conf/ndss
One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography.
Tibor Jager
Kenneth G. Paterson
Juraj Somorovsky
2013
conf/eurocrypt
Practical Signatures from Standard Assumptions.
Florian Böhl
Dennis Hofheinz
Tibor Jager
Jessica Koch
Jae Hong Seo
Christoph Striecks
2012
conf/crypto
On the Security of TLS-DHE in the Standard Model.
Tibor Jager
Florian Kohlar
Sven Schäge
Jörg Schwenk
2012
conf/crypto
Tightly Secure Signatures and Public-Key Encryption.
Dennis Hofheinz
Tibor Jager
2012
conf/esorics
Bleichenbacher's Attack Strikes again: Breaking PKCS#1 v1.5 in XML Encryption.
Tibor Jager
Sebastian Schinzel
Juraj Somorovsky
2012
conf/pkc
Waters Signatures with Optimal Security Reduction.
Dennis Hofheinz
Tibor Jager
Edward Knapp
2011
conf/ccs
How to break XML encryption.
Tibor Jager
Juraj Somorovsky
2011
conf/asiacrypt
Short Signatures from Weaker Assumptions.
Dennis Hofheinz
Tibor Jager
Eike Kiltz
2010
conf/pkc
Simple and Efficient Public-Key Encryption from Computational Diffie-Hellman in the Standard Model.
Kristiyan Haralambiev
Tibor Jager
Eike Kiltz
Victor Shoup
2010
conf/asiacrypt
The Semi-Generic Group Model and Applications to Pairing-Based Cryptography.
Tibor Jager
Andy Rupp
2010
conf/asiacrypt
Generic Compilers for Authenticated Key Exchange.
Tibor Jager
Florian Kohlar
Sven Schäge
Jörg Schwenk
2009
conf/asiacrypt
On the Analysis of Cryptographic Assumptions in the Generic Ring Model.
Tibor Jager
Jörg Schwenk
2008
conf/provsec
On the Equivalence of Generic Group Models.
Tibor Jager
Jörg Schwenk
2008
conf/esorics
A Browser-Based Kerberos Authentication Scheme.
Sebastian Gajek
Tibor Jager
Mark Manulis
Jörg Schwenk
Coauthors
Alexander Konze
(1)
Alexander May
(1)
Amit Sahai
(1)
Andy Rupp
(3)
Arunselvan Ramaswamy
(1)
Bogdan Warinschi
(1)
Bor de Kock
(1)
Brent Waters
(1)
Britta Hale
(2)
Cas Cremers
(1)
Christoph Bader
(2)
Christoph Striecks
(5)
Claudia Priesterjahn
(1)
Colin Boyd
(1)
Dakshita Khurana
(1)
Daniel Slamanig
(3)
David Derler
(2)
David Niehues
(2)
Denis Diemert
(5)
Dennis Hofheinz
(9)
Dominique Schröder
(2)
Doreen Riepel
(2)
Edward Knapp
(1)
Eike Kiltz
(6)
Eyke Hüllermeier
(1)
Felix Günther
(2)
Felix Heuer
(1)
Florian Bergsma
(1)
Florian Böhl
(2)
Florian Kohlar
(3)
Fynn Dallmeier
(1)
Gareth T. Davies
(2)
Håkon Jacobsen
(2)
Hannah Davis
(1)
Jae Hong Seo
(1)
Jan Peter Drees
(2)
Jessica Koch
(2)
Jiaxin Pan
(2)
Jonas Klauke
(1)
Jonas von der Heyden
(1)
Jörg Schwenk
(12)
Julia Hesse
(1)
Juraj Somorovsky
(6)
Kai Gellert
(10)
Katriel Cohn-Gordon
(1)
Kenneth G. Paterson
(1)
Kristian Gjøsteen
(3)
Kristiyan Haralambiev
(1)
Lin Lyu
(3)
Lise Millerjord
(1)
Mark Manulis
(1)
Mark Zhandry
(1)
Martijn Stam
(1)
Martin Grothe
(1)
Máté Horváth
(1)
Matthias Horst
(1)
Nils Fleischhacker
(2)
Nimrod Aviram
(2)
Pascal Bemmann
(2)
Peter Chvojka
(3)
Pritha Gupta
(1)
Rafael Kurek
(3)
Raphael Heitjohann
(1)
Rongmao Chen
(1)
Rudi Wolf
(1)
Ryan Stanley-Oakes
(1)
Saqib A. Kakvi
(2)
Sebastian Berndt
(1)
Sebastian Gajek
(1)
Sebastian H. Faller
(1)
Sebastian Lauer
(2)
Sebastian Schinzel
(1)
Shengli Liu
(1)
Shuai Han
(1)
Simon Nachtigall
(1)
Sven Schäge
(7)
Thomas Eisenbarth
(1)
Tibor Jager
(63)
Timo Renzelmann
(1)
Tobias Handirk
(2)
Tom Neuschulten
(1)
Victor Shoup
(1)
Yong Li
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to