On the security of TLS-DHE in the standard model T Jager, F Kohlar, S Schäge, J Schwenk Advances in Cryptology–CRYPTO 2012: 32nd Annual Cryptology Conference, Santa …, 2012 | 295 | 2012 |
Tightly secure signatures and public-key encryption D Hofheinz, T Jager Designs, Codes and Cryptography 80, 29-61, 2016 | 203 | 2016 |
On the security of TLS 1.3 and QUIC against weaknesses in PKCS# 1 v1. 5 encryption T Jager, J Schwenk, J Somorovsky Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 118 | 2015 |
Tightly-secure authenticated key exchange C Bader, D Hofheinz, T Jager, E Kiltz, Y Li Theory of Cryptography: 12th Theory of Cryptography Conference, TCC 2015 …, 2015 | 114 | 2015 |
How to build time-lock encryption J Liu, T Jager, SA Kakvi, B Warinschi Designs, Codes and Cryptography 86, 2549-2586, 2018 | 102 | 2018 |
0-RTT key exchange with full forward secrecy F Günther, B Hale, T Jager, S Lauer Advances in Cryptology–EUROCRYPT 2017: 36th Annual International Conference …, 2017 | 102 | 2017 |
On the impossibility of tight cryptographic reductions C Bader, T Jager, Y Li, S Schäge Advances in Cryptology–EUROCRYPT 2016: 35th Annual International Conference …, 2016 | 100 | 2016 |
Bloom filter encryption and applications to efficient forward-secret 0-RTT key exchange D Derler, K Gellert, T Jager, D Slamanig, C Striecks Journal of Cryptology 34, 1-59, 2021 | 92 | 2021 |
Short signatures from weaker assumptions D Hofheinz, T Jager, E Kiltz Advances in Cryptology–ASIACRYPT 2011: 17th International Conference on the …, 2011 | 82 | 2011 |
Waters signatures with optimal security reduction D Hofheinz, T Jager, E Knapp Public Key Cryptography–PKC 2012: 15th International Conference on Practice …, 2012 | 79 | 2012 |
How to break XML encryption T Jager, J Somorovsky Proceedings of the 18th ACM conference on Computer and communications …, 2011 | 77 | 2011 |
Practical and tightly-secure digital signatures and authenticated key exchange K Gjøsteen, T Jager Advances in Cryptology–CRYPTO 2018: 38th Annual International Cryptology …, 2018 | 75 | 2018 |
Verifiable random functions from weaker assumptions T Jager Theory of Cryptography: 12th Theory of Cryptography Conference, TCC 2015 …, 2015 | 71 | 2015 |
Practical invalid curve attacks on TLS-ECDH T Jager, J Schwenk, J Somorovsky European Symposium on research in computer security, 407-425, 2015 | 65 | 2015 |
Simple and efficient public-key encryption from computational Diffie-Hellman in the standard model K Haralambiev, T Jager, E Kiltz, V Shoup International Workshop on Public Key Cryptography, 1-18, 2010 | 64 | 2010 |
Bleichenbacher’s attack strikes again: Breaking PKCS# 1 v1. 5 in XML encryption T Jager, S Schinzel, J Somorovsky Computer Security–ESORICS 2012: 17th European Symposium on Research in …, 2012 | 63 | 2012 |
Session resumption protocols and efficient forward security for TLS 1.3 0-RTT N Aviram, K Gellert, T Jager Journal of Cryptology 34 (3), 20, 2021 | 62 | 2021 |
Practical signatures from standard assumptions F Böhl, D Hofheinz, T Jager, J Koch, JH Seo, C Striecks Advances in Cryptology–EUROCRYPT 2013: 32nd Annual International Conference …, 2013 | 60 | 2013 |
How to generate and use universal samplers D Hofheinz, T Jager, D Khurana, A Sahai, B Waters, M Zhandry International Conference on the Theory and Application of Cryptology and …, 2016 | 54 | 2016 |
On tight security proofs for Schnorr signatures N Fleischhacker, T Jager, D Schröder Advances in Cryptology–ASIACRYPT 2014: 20th International Conference on the …, 2014 | 52 | 2014 |