Tibor Jager

From MaRDI portal
Person:300382



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
On optimal tightness for key exchange with full forward secrecy via key confirmation
Advances in Cryptology – CRYPTO 2023
2024-02-06Paper
Security analysis of the WhatsApp end-to-end encrypted backup protocol
Advances in Cryptology – CRYPTO 2023
2024-02-06Paper
Simple, fast, efficient, and tightly-secure non-malleable non-interactive timed commitments
Lecture Notes in Computer Science
2023-11-24Paper
Subversion-resilient authenticated encryption without random oracles2023-11-10Paper
Symmetric Key Exchange with Full Forward Security and Robust Synchronization
Lecture Notes in Computer Science
2023-05-26Paper
Digital Signatures with Memory-Tight Security in the Multi-challenge Setting
Lecture Notes in Computer Science
2023-05-26Paper
Practical invalid curve attacks on TLS-ECDH
Computer Security -- ESORICS 2015
2022-08-19Paper
On fingerprinting attacks and length-hiding encryption2022-07-06Paper
Simple Security Definitions for and Constructions of 0-RTT Key Exchange2022-07-01Paper
Versatile and sustainable timed-release encryption and sequential time-lock puzzles (extended abstract)2022-06-24Paper
Authenticated key exchange and signatures with tight security in the standard model2022-05-18Paper
More efficient digital signatures with tight multi-user security2021-12-21Paper
Subversion-resilient public key encryption with practical watchdogs2021-12-21Paper
Efficient adaptively-secure IB-KEMs and VRFs via near-collision resistance2021-12-21Paper
Tightly-secure authenticated key exchange, revisited2021-12-08Paper
On the tight security of TLS 1.3: theoretically sound cryptographic parameters for real-world deployments
Journal of Cryptology
2021-08-10Paper
Session resumption protocols and efficient forward security for TLS 1.3 0-RTT
Journal of Cryptology
2021-07-30Paper
Bloom filter encryption and applications to efficient forward-secret 0-RTT key exchange
Journal of Cryptology
2021-06-28Paper
Offline witness encryption with semi-adaptive security2021-02-23Paper
On the real-world instantiability of admissible hash functions and efficient verifiable random functions2020-07-21Paper
Highly efficient key exchange protocols with optimal tightness2020-03-09Paper
Session resumption protocols and efficient forward security for TLS 1.3 0-RTT
Advances in Cryptology – EUROCRYPT 2019
2020-02-06Paper
On tight security proofs for Schnorr signatures
Journal of Cryptology
2019-06-20Paper
Short digital signatures and ID-KEMs via truncation collision resistance2019-01-23Paper
Simple and more efficient PRFs with tight security from LWE and matrix-DDH2019-01-23Paper
How to build time-lock encryption
Designs, Codes and Cryptography
2018-10-10Paper
Practical and tightly-secure digital signatures and authenticated key exchange2018-09-26Paper
Bloom filter encryption and applications to efficient forward-secret 0-RTT key exchange
Advances in Cryptology – EUROCRYPT 2018
2018-07-17Paper
Authenticated confidential channel establishment and the security of TLS-DHE
Journal of Cryptology
2018-02-15Paper
Multi-key authenticated encryption with corruptions: reductions are lossy2018-01-19Paper
How to Generate and Use Universal Samplers
Advances in Cryptology – ASIACRYPT 2016
2017-01-06Paper
Public-key encryption with simulation-based selective-opening security and compact ciphertexts
Theory of Cryptography
2016-12-22Paper
On the impossibility of tight cryptographic reductions
Advances in Cryptology – EUROCRYPT 2016
2016-07-15Paper
Tightly secure signatures and public-key encryption
Designs, Codes and Cryptography
2016-06-27Paper
Verifiable random functions from standard assumptions
Theory of Cryptography
2016-03-23Paper
On the selective opening security of practical public-key encryption schemes
Lecture Notes in Computer Science
2015-08-27Paper
One-round key exchange with strong security: an efficient and generic construction in the standard model
Lecture Notes in Computer Science
2015-08-27Paper
Tightly-secure authenticated key exchange
Theory of Cryptography
2015-07-06Paper
Verifiable random functions from weaker assumptions
Theory of Cryptography
2015-07-06Paper
Confined guessing: new signatures from standard assumptions
Journal of Cryptology
2015-03-25Paper
On tight security proofs for Schnorr signatures
Lecture Notes in Computer Science
2015-01-16Paper
On the analysis of cryptographic assumptions in the generic ring model
Journal of Cryptology
2013-06-27Paper
Practical signatures from standard assumptions
Advances in cryptology -- EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26--30, 2013. Proceedings
2013-05-31Paper
Tightly Secure Signatures and Public-Key Encryption
Lecture Notes in Computer Science
2012-09-25Paper
On the security of TLS-DHE in the standard model
Lecture Notes in Computer Science
2012-09-25Paper
Waters signatures with optimal security reduction
Public Key Cryptography – PKC 2012
2012-07-20Paper
Black-box models of computation in cryptology.2012-07-10Paper
Short signatures from weaker assumptions
Lecture Notes in Computer Science
2011-12-02Paper
The Semi-Generic Group Model and Applications to Pairing-Based Cryptography
Advances in Cryptology - ASIACRYPT 2010
2010-12-07Paper
Generic Compilers for Authenticated Key Exchange
Advances in Cryptology - ASIACRYPT 2010
2010-12-07Paper
Simple and Efficient Public-Key Encryption from Computational Diffie-Hellman in the Standard Model
Public Key Cryptography – PKC 2010
2010-05-28Paper
On the analysis of cryptographic assumptions in the generic ring model
Advances in Cryptology – ASIACRYPT 2009
2009-12-15Paper
On the Equivalence of Generic Group Models
Provable Security
2009-01-27Paper
On Black-Box Ring Extraction and Integer Factorization
Automata, Languages and Programming
2008-08-19Paper


Research outcomes over time


This page was built for person: Tibor Jager