Prof. Dr.-Ing. Tibor Jager

  • Ehemalige/r Mitarbeiter/in - Lehrstuhl Netz- und Datensicherheit
E-Mail:
tibor.jager@rub.de PGP Schlüssel
Webseite:
http://tiborjager.de/

Forschung

  • Public key cryptography
  • Analysis of cryptographic assumptions

See http://tiborjager.de/ for a complete list of publications, with references to online versions of papers. Please contact me if you want a copy of any paper not available there.

Veröffentlichungen

2017
Simple Security Definitions for and Constructions of 0-RTT Key Exchange

Britta Hale, Tibor Jager, Sebastian Lauer, Jörg Schwenk - 15th International Conference on Applied Cryptography and Network Security - ACNS 2017

0-RTT Key Exchange with Full Forward Secrecy

Felix Günther, Britta Hale, Tibor Jager, Sebastian Lauer - 36th International Conference on the Theory and Applications of Cryptographic Techniques (Eurocrypt 2017)

2016
Breaking PPTP VPNs via RADIUS Encryption

Matthias Horst, Martin Grothe, Tibor Jager, Jörg Schwenk - 15th International Conference on Cryptology and Network Security (CANS)

2015
On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption

Tibor Jager, Jörg Schwenk, Juraj Somorovsky - ACM CCS 2015

Practical Invalid Curve Attacks on TLS-ECDH

Tibor Jager, Jörg Schwenk, Juraj Somorovsky - ESORICS 2015

Tightly Secure Authenticated Key Exchange

Christoph Bader, Dennis Hofheinz, Tibor Jager, Eike Kiltz, Yong Li - TCC 2015

On the Selective Opening Security of Practical Public-Key Encryption Schemes

Felix Heuer, Tibor Jager, Eike Kiltz, Sven Schäge - PKC 2015

2013
One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography

Tibor Jager, Kenneth G. Paterson, Juraj Somorovsky - In Proceedings of the Network and Distributed System Security Symposium (NDSS), 2013

Practical Signatures From Standard Assumptions

Florian Böhl, Dennis Hofheinz, Tibor Jager, Jessica Koch, Jae Hong Seo, Christoph Striecks - Eurocrypt 2013

On the analysis of cryptographic assumptions in the generic ring model

Tibor Jager, Jörg Schwenk - Journal of Cryptology

2012
Tightly secure signatures and public-key encryption

Dennis Hofheinz, Tibor Jager - CRYPTO 2012

Waters signatures with optimal security reduction

Dennis Hofheinz, Tibor Jager, Edward Knapp - PKC 2012

On the Security of TLS-DHE in the Standard Model

Tibor Jager, Florian Kohlar, Sven Schäge, Jörg Schwenk - In Advances in Cryptology – CRYPTO 2012, Lecture Notes in Computer Science, 2012, Volume 7417/2012, 273-293, DOI: 10.1007/978-3-642-32009-5_17

Bleichenbacher’s Attack Strikes Again: Breaking PKCS#1 v1.5 in XML Encryption

Tibor Jager, Sebastian Schinzel, Juraj Somorovsky - In Proceedings of the 17th European Symposium on Research in Computer Security (ESORICS), 2012, Full Version

2011
Short Signatures from Weaker Assumptions

Dennis Hofheinz, Tibor Jager, Eike Kiltz - Asiacrypt 2011

How To Break XML Encryption

Tibor Jager, Juraj Somorovsky - In Proceedings of the 18th ACM Con­fe­rence on Com­pu­ter and Com­mu­ni­ca­ti­ons Se­cu­ri­ty (CCS), 2011.

2010
Simple and Efficient Public-Key Encryption from Computational Diffie-Hellman in the Standard Model

Kristiyan Haralambiev, Tibor Jager, Eike Kiltz, Vic­tor Shoup - PKC 2010

Generic Compilers for Authenticated Key Exchange

Tibor Jager, Florian Kohlar, Sven Schäge, Jörg Schwenk - In Proceedings of ASIACRYPT 2010, Singapore

2009 2008
A Brow­ser-Ba­sed Ker­be­ros Au­then­ti­ca­ti­on Sche­me

Sebastian Gajek, Tibor Jager, Mark Manulis, Jörg Schwenk - ESORICS 2008

On Black-Box Ring Extraction and Integer Factorization

Kristina Altmann, Tibor Jager, Andy Rupp - ICALP 2008

On the equivalence of generic group models

Tibor Jager, Jörg Schwenk - ProvSec 2008

Nutzung von selbstsignierten Client-Zertifikaten zur Authentifikation bei SSL/TLS

Tibor Jager, Heiko Jäkel, Jörg Schwenk - Sicherheit 2008.