Achtung:

Sie haben Javascript deaktiviert!
Sie haben versucht eine Funktion zu nutzen, die nur mit Javascript möglich ist. Um sämtliche Funktionalitäten unserer Internetseite zu nutzen, aktivieren Sie bitte Javascript in Ihrem Browser.

IT security group Show image information

IT security group

Publications


Open list in Research Information System

2018

Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange

D. Derler, T. Jager, D. Slamanig, C. Striecks, in: Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part III, 2018, pp. 425--455

DOI

2017

0-RTT Key Exchange with Full Forward Secrecy

F. Günther, B. Hale, T. Jager, S. Lauer, in: Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part III, 2017, pp. 519--548

DOI

Authenticated Confidential Channel Establishment and the Security of TLS-DHE

T. Jager, F. Kohlar, S. Schäge, J. Schwenk, J. Cryptology (2017), pp. 1276--1324

DOI

Multi-key Authenticated Encryption with Corruptions: Reductions Are Lossy

T. Jager, M. Stam, R. Stanley-Oakes, B. Warinschi, in: Theory of Cryptography - 15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part I, 2017, pp. 409--441

DOI

Simple Security Definitions for and Constructions of 0-RTT Key Exchange

B. Hale, T. Jager, S. Lauer, J. Schwenk, in: Applied Cryptography and Network Security - 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings, 2017, pp. 20--38

DOI

2016

On the Impossibility of Tight Cryptographic Reductions

C. Bader, T. Jager, Y. Li, S. Schäge, in: Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II, 2016, pp. 273--304

DOI

Tightly secure signatures and public-key encryption

D. Hofheinz, T. Jager, Des. Codes Cryptography (2016), pp. 29--61

DOI

Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts

D. Hofheinz, T. Jager, A. Rupp, in: Theory of Cryptography - 14th International Conference, TCC 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part II, 2016, pp. 146--168

DOI

Selective opening security of practical public-key encryption schemes

F. Heuer, T. Jager, S. Schäge, E. Kiltz, IET Information Security (2016), pp. 304--318

DOI

Verifiable Random Functions from Standard Assumptions

D. Hofheinz, T. Jager, in: Theory of Cryptography - 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part I, 2016, pp. 336--362

DOI

Max number of publications reached - all publications can be found in our Research Infomation System.

Open list in Research Information System

Further information:
Contact
Phone:
+49 5251 60-6686
Fax:
+49 5251 60-6414
Office:
F2.308

Office hours:

By appointment

Carmen Buschmeyer

Computers and Society – Computing in Contex

Carmen Buschmeyer
Phone:
+49 5251 60-6412
Fax:
+49 5251 60-6414
Office:
F1.426

The University for the Information Society