Tibor Jager

From MaRDI portal
Person:300382

Available identifiers

zbMath Open jager.tiborWikidataQ102657102 ScholiaQ102657102MaRDI QIDQ300382

List of research outcomes

PublicationDate of PublicationType
On optimal tightness for key exchange with full forward secrecy via key confirmation2024-02-06Paper
Security analysis of the WhatsApp end-to-end encrypted backup protocol2024-02-06Paper
Simple, fast, efficient, and tightly-secure non-malleable non-interactive timed commitments2023-11-24Paper
Digital Signatures with Memory-Tight Security in the Multi-challenge Setting2023-05-26Paper
Symmetric Key Exchange with Full Forward Security and Robust Synchronization2023-05-26Paper
Practical Invalid Curve Attacks on TLS-ECDH2022-08-19Paper
On fingerprinting attacks and length-hiding encryption2022-07-06Paper
Versatile and sustainable timed-release encryption and sequential time-lock puzzles (extended abstract)2022-06-24Paper
Authenticated key exchange and signatures with tight security in the standard model2022-05-18Paper
Efficient adaptively-secure IB-KEMs and VRFs via near-collision resistance2021-12-21Paper
Subversion-resilient public key encryption with practical watchdogs2021-12-21Paper
More efficient digital signatures with tight multi-user security2021-12-21Paper
Tightly-secure authenticated key exchange, revisited2021-12-08Paper
On the tight security of TLS 1.3: theoretically sound cryptographic parameters for real-world deployments2021-08-10Paper
Session resumption protocols and efficient forward security for TLS 1.3 0-RTT2021-07-30Paper
Bloom filter encryption and applications to efficient forward-secret 0-RTT key exchange2021-06-28Paper
Offline witness encryption with semi-adaptive security2021-02-23Paper
On the real-world instantiability of admissible hash functions and efficient verifiable random functions2020-07-21Paper
Highly efficient key exchange protocols with optimal tightness2020-03-09Paper
Session resumption protocols and efficient forward security for TLS 1.3 0-RTT2020-02-06Paper
On tight security proofs for Schnorr signatures2019-06-20Paper
Short digital signatures and ID-KEMs via truncation collision resistance2019-01-23Paper
Simple and more efficient PRFs with tight security from LWE and matrix-DDH2019-01-23Paper
How to build time-lock encryption2018-10-10Paper
Practical and tightly-secure digital signatures and authenticated key exchange2018-09-26Paper
Bloom filter encryption and applications to efficient forward-secret 0-RTT key exchange2018-07-17Paper
Authenticated confidential channel establishment and the security of TLS-DHE2018-02-15Paper
Multi-key authenticated encryption with corruptions: reductions are lossy2018-01-19Paper
How to Generate and Use Universal Samplers2017-01-06Paper
Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts2016-12-22Paper
On the Impossibility of Tight Cryptographic Reductions2016-07-15Paper
Tightly secure signatures and public-key encryption2016-06-27Paper
Verifiable Random Functions from Standard Assumptions2016-03-23Paper
On the Selective Opening Security of Practical Public-Key Encryption Schemes2015-08-27Paper
One-Round Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model2015-08-27Paper
Tightly-Secure Authenticated Key Exchange2015-07-06Paper
Verifiable Random Functions from Weaker Assumptions2015-07-06Paper
Confined guessing: new signatures from standard assumptions2015-03-25Paper
On Tight Security Proofs for Schnorr Signatures2015-01-16Paper
On the analysis of cryptographic assumptions in the generic ring model2013-06-27Paper
Practical Signatures from Standard Assumptions2013-05-31Paper
On the Security of TLS-DHE in the Standard Model2012-09-25Paper
Tightly Secure Signatures and Public-Key Encryption2012-09-25Paper
Waters Signatures with Optimal Security Reduction2012-07-20Paper
Black-Box Models of Computation in Cryptology2012-07-10Paper
Short Signatures from Weaker Assumptions2011-12-02Paper
Generic Compilers for Authenticated Key Exchange2010-12-07Paper
The Semi-Generic Group Model and Applications to Pairing-Based Cryptography2010-12-07Paper
Simple and Efficient Public-Key Encryption from Computational Diffie-Hellman in the Standard Model2010-05-28Paper
On the Analysis of Cryptographic Assumptions in the Generic Ring Model2009-12-15Paper
On the Equivalence of Generic Group Models2009-01-27Paper
On Black-Box Ring Extraction and Integer Factorization2008-08-19Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Tibor Jager