Tibor Jager

From MaRDI portal
Person:300382

Available identifiers

zbMath Open jager.tiborWikidataQ102657102 ScholiaQ102657102MaRDI QIDQ300382

List of research outcomes





PublicationDate of PublicationType
On optimal tightness for key exchange with full forward secrecy via key confirmation2024-02-06Paper
Security analysis of the WhatsApp end-to-end encrypted backup protocol2024-02-06Paper
Simple, fast, efficient, and tightly-secure non-malleable non-interactive timed commitments2023-11-24Paper
Subversion-resilient authenticated encryption without random oracles2023-11-10Paper
Symmetric Key Exchange with Full Forward Security and Robust Synchronization2023-05-26Paper
Digital Signatures with Memory-Tight Security in the Multi-challenge Setting2023-05-26Paper
Practical Invalid Curve Attacks on TLS-ECDH2022-08-19Paper
On fingerprinting attacks and length-hiding encryption2022-07-06Paper
Simple Security Definitions for and Constructions of 0-RTT Key Exchange2022-07-01Paper
Versatile and sustainable timed-release encryption and sequential time-lock puzzles (extended abstract)2022-06-24Paper
Authenticated key exchange and signatures with tight security in the standard model2022-05-18Paper
More efficient digital signatures with tight multi-user security2021-12-21Paper
Subversion-resilient public key encryption with practical watchdogs2021-12-21Paper
Efficient adaptively-secure IB-KEMs and VRFs via near-collision resistance2021-12-21Paper
Tightly-secure authenticated key exchange, revisited2021-12-08Paper
On the tight security of TLS 1.3: theoretically sound cryptographic parameters for real-world deployments2021-08-10Paper
Session resumption protocols and efficient forward security for TLS 1.3 0-RTT2021-07-30Paper
Bloom filter encryption and applications to efficient forward-secret 0-RTT key exchange2021-06-28Paper
Offline witness encryption with semi-adaptive security2021-02-23Paper
On the real-world instantiability of admissible hash functions and efficient verifiable random functions2020-07-21Paper
Highly efficient key exchange protocols with optimal tightness2020-03-09Paper
Session resumption protocols and efficient forward security for TLS 1.3 0-RTT2020-02-06Paper
On tight security proofs for Schnorr signatures2019-06-20Paper
Short digital signatures and ID-KEMs via truncation collision resistance2019-01-23Paper
Simple and more efficient PRFs with tight security from LWE and matrix-DDH2019-01-23Paper
How to build time-lock encryption2018-10-10Paper
Practical and tightly-secure digital signatures and authenticated key exchange2018-09-26Paper
Bloom filter encryption and applications to efficient forward-secret 0-RTT key exchange2018-07-17Paper
Authenticated confidential channel establishment and the security of TLS-DHE2018-02-15Paper
Multi-key authenticated encryption with corruptions: reductions are lossy2018-01-19Paper
How to Generate and Use Universal Samplers2017-01-06Paper
Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts2016-12-22Paper
On the Impossibility of Tight Cryptographic Reductions2016-07-15Paper
Tightly secure signatures and public-key encryption2016-06-27Paper
Verifiable Random Functions from Standard Assumptions2016-03-23Paper
On the Selective Opening Security of Practical Public-Key Encryption Schemes2015-08-27Paper
One-Round Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model2015-08-27Paper
Tightly-Secure Authenticated Key Exchange2015-07-06Paper
Verifiable Random Functions from Weaker Assumptions2015-07-06Paper
Confined guessing: new signatures from standard assumptions2015-03-25Paper
On Tight Security Proofs for Schnorr Signatures2015-01-16Paper
On the analysis of cryptographic assumptions in the generic ring model2013-06-27Paper
Practical Signatures from Standard Assumptions2013-05-31Paper
Tightly Secure Signatures and Public-Key Encryption2012-09-25Paper
On the Security of TLS-DHE in the Standard Model2012-09-25Paper
Waters Signatures with Optimal Security Reduction2012-07-20Paper
Black-Box Models of Computation in Cryptology2012-07-10Paper
Short Signatures from Weaker Assumptions2011-12-02Paper
The Semi-Generic Group Model and Applications to Pairing-Based Cryptography2010-12-07Paper
Generic Compilers for Authenticated Key Exchange2010-12-07Paper
Simple and Efficient Public-Key Encryption from Computational Diffie-Hellman in the Standard Model2010-05-28Paper
On the analysis of cryptographic assumptions in the generic ring model2009-12-15Paper
On the Equivalence of Generic Group Models2009-01-27Paper
On Black-Box Ring Extraction and Integer Factorization2008-08-19Paper

Research outcomes over time

This page was built for person: Tibor Jager