Achtung:

Sie haben Javascript deaktiviert!
Sie haben versucht eine Funktion zu nutzen, die nur mit Javascript möglich ist. Um sämtliche Funktionalitäten unserer Internetseite zu nutzen, aktivieren Sie bitte Javascript in Ihrem Browser.

Fachgruppe IT-Sicherheit Bildinformationen anzeigen

Fachgruppe IT-Sicherheit

Publikationen

Konferenz-Proceedings

Felix Günther, Britta Hale, Tibor Jager, Sebastian Lauer
0-RTT Key Exchange with Full Forward Secrecy [link]
36th Annual International Conference on the Theory and Applications of Cryptographic Techniques - EUROCRYPT 2017

Matthias Horst, Martin Grothe, Tibor Jager, and Jörg Schwenk
Breaking PPTP VPNs via RADIUS Encryption [link]
15th International Conference on Cryptology and Network Security - CANS 2016

Dennis Hofheinz, Tibor Jager, Andy Rupp
Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts [link]
Fourteenth IACR Theory of Cryptography Conference - TCC 2016-B

Dennis Hofheinz, Tibor Jager, Dakshita Khurana, Amit Sahai, Brent Waters, Mark Zhandry
How to Generate and use Universal Samplers [link]
22nd Annual International Conference on the Theory and Applications of Cryptology and Information Security - ASIACRYPT 2016

Christoph Bader, Tibor Jager, Yong Li, Sven Schäge
On the Impossibility of Tight Cryptographic Reductions [link]
35th Annual International Conference on the Theory and Applications of Cryptographic Techniques - EUROCRYPT 2016

Dennis Hofheinz, Tibor Jager
Verifiable Random Functions from Standard Assumptions [link]
13th IACR Theory of Cryptography Conference - TCC 2016-A

Tibor Jager, Jörg Schwenk, Juraj Somorovsky
On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption [link]
22nd ACM Conference on Computer and Communications Security - ACM CCS 2015

Tibor Jager, Jörg Schwenk, Juraj Somorovsky
Practical Invalid Curve Attacks on TLS-ECDH [link]
20th European Symposium on Research in Computer Security - ESORICS 2015

Tibor Jager
Verifiable Random Functions from Weaker Assumptions [link]
12th IACR Theory of Cryptography Conference - TCC 2015

Christoph Bader, Dennis Hofheinz, Tibor Jager, Eike Kiltz, Yong Li
Tightly-Secure Authenticated Key Exchange [link]
12th IACR Theory of Cryptography Conference - TCC 2015

Florian Bergsma, Tibor Jager, Jörg Schwenk
One-Round Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model [link]
18th International Conference on Practice and Theory of Public-Key Cryptography - PKC 2015

Felix Heuer, Tibor Jager, Eike Kiltz, Sven Schäge
On the Selective Opening Security of Practical Public-Key Encryption Schemes [link]
18th International Conference on Practice and Theory of Public-Key Cryptography - PKC 2015

Nils Fleischhacker, Tibor Jager, Dominique Schröder
On Tight Security Proofs for Schnorr Signatures [link]
20th Annual International Conference on the Theory and Application of Cryptology and Information Security - ASIACRYPT 2014

Florian Böhl, Dennis Hofheinz, Tibor Jager, Jessica Koch, Jae Hong Seo, Christoph Striecks
Practical Signatures From Standard Assumptions [pdf], see also [link]
32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques - EUROCRYPT 2013

Tibor Jager, Kenneth G. Paterson, Juraj Somorovsky
One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography [link]
20th Annual Network & Distributed System Security Symposium - NDSS 2013

Tibor Jager, Sebastian Schinzel, Juraj Somorovsky
Bleichenbacher's attack strikes again: breaking PKCS#1 v1.5 in XML Encryption[link]
17th European Symposium on Research in Computer Security - ESORICS 2012

Dennis Hofheinz and Tibor Jager
Tightly secure signatures and public-key encryption [link]
32nd International Cryptology Conference - CRYPTO 2012

Tibor Jager, Florian Kohlar, Sven Schäge, Jörg Schwenk
On the security of TLS-DHE in the standard model [link]
32nd International Cryptology Conference - CRYPTO 2012

Dennis Hofheinz, Tibor Jager, Edward Knapp
Waters signatures with optimal security reduction [link]
15th International Conference on Practice and Theory of Public-Key Cryptography - PKC 2012

Dennis Hofheinz, Tibor Jager, Eike Kiltz
Short signatures from weaker assumptions [link]
17th International Conference on the Theory and Application of Cryptology and Information Security - ASIACRYPT 2011

Tibor Jager, Juraj Somorovsky
How to break XML Encryption [link]
18th ACM Conference on Computer and Communications Security - ACM CCS 2011

Tibor Jager, Florian Kohlar, Sven Schäge, Jörg Schwenk
Generic compilers for authenticated key exchange [link]
16th Annual International Conference on the Theory and Application of Cryptology and Information Security - ASIACRYPT 2010

Tibor Jager and Andy Rupp
The semi-generic group model and applications to pairing-based cryptography [pdf]
16th Annual International Conference on the Theory and Application of Cryptology and Information Security - ASIACRYPT 2010

Kristiyan Haralambiev, Tibor Jager, Eike Kiltz, Victor Shoup
Simple and efficient public-key encryption from Computational Diffie-Hellman in the standard model [link]
13th International Conference on Practice and Theory in Public Key Cryptography - PKC 2010

Tibor Jager, Jörg Schwenk
On the analysis of cryptographic assumptions in the generic ring model [link]
15th Annual International Conference on the Theory and Application of Cryptology and Information Security - ASIACRYPT 2009

Tibor Jager, Jörg Schwenk
On the equivalence of generic group models [pdf]
Second International Conference on Provable Security - ProvSec 2008

Sebastian Gajek, Tibor Jager, Mark Manulis, Jörg Schwenk
A browser-based Kerberos authentication scheme [pdf]
13th European Symposium on Research in Computer Security - ESORICS 2008

Kristina Altmann, Tibor Jager, Andy Rupp
On black-box ring extraction and integer factorization [pdf]
35th International Colloquium on Automata, Languages and Programming - ICALP 2008

Journals

Tibor Jager, Florian Kohlar, Sven Schäge, Jörg Schwenk

Authenticated Confidential Channel Establishment and the Security of TLS-DHE [link]
Journal of Cryptology, to appear

Felix Heuer, Tibor Jager, Eike Kiltz, Sven Schäge
On the Selective Opening Security of Practical Public-Key Encryption Schemes [link]
IET Information Security, to appear

Tibor Jager, Andy Rupp
Black-Box Accumulation: Collecting Incentives in a Privacy-Preserving Way [link]
Proceedings on Privacy Enhancing Technologies, 2016

Dennis Hofheinz, Tibor Jager
Tightly Secure Signatures and Public-Key Encryption [link]
Designs, Codes and Cryptography, 2015

Florian Böhl, Dennis Hofheinz, Tibor Jager, Jessica Koch, Christoph Striecks
Confined Guessing: New Signatures From Standard Assumptions [ePrint] [link]
Journal of Cryptology, 2015

Tibor Jager, Jörg Schwenk.
On the analysis of cryptographic assumptions in the generic ring model [ePrint] [link]
Journal of Cryptology, 2013

Bücher und Vorlesungsskripte

Tibor Jager
Black-box models of computation in cryptology [link (Springer)] [fulltext]
ISBN 978-3-8348-1989-5, Springer Spektrum Verlag, 2012

Tibor Jager
Digitale Signaturen [pdf]
Textbooklike lecture notes, first version published in 2012, frequently updated

Sie interessieren sich für:
Ansprechpartner
Telefon:
+49 5251 60-6686
Fax:
+49 5251 60-6414
Büro:
F2.308

Sprechzeiten:

Nach Vereinbarung

Carmen Buschmeyer

Kontextuelle Informatik / Heinz Nixdorf Institut

Telefon:
+49 5251 60-6412
Fax:
+49 5251 60-6414
Büro:
F1.426

Die Universität der Informationsgesellschaft