IT Security and Cryptography
Prof. Dr.-Ing. Tibor Jager
Suche
News
-
4 Accepted Paper auf der PKC 2021
Vergangene Woche wurden vier Paper zu der 24. International Conference on Practice and Theory of... [more] -
Accepted paper at EUROCRYPT 2021
The paper "Tightly-Secure Authenticated Key Exchange, Revisited" was accepted to EUROCRYPT 2021, one... [more] -
Accepted Paper zum Journal of Cryptology
Die Arbeit "Session Resumption Protocols and Efficient Forward Security for TLS 1.3 0-RTT" von Kai... [more] -
Tibor Jager im Programmkomitee der ESORICS 2021
Tibor Jager wurde in das Programmkomittee der ESORICS 2021 Konferenz eingeladen. [more] -
GDD-Wissenschaftspreis für Kai Gellert
Dr.-Ing. Kai Gellert wurde für seine Dissertation "Construction and Security Analysis of 0-RTT... [more]
Prof. Dr.-Ing. Tibor Jager
![]() | Cryptography and IT Security Researcher tibor.jager{at}uni-wuppertal.de Campus Freudenberg | |
Professional Activities
Program committee memberships
2021
- 41st IEEE Symposium on Security and Privacy
- 26th European Symposium on Research in Computer Security - ESORICS 2021
2020
- 15th ACM Asia Conference on Computer and Communications Security - AsiaCCS 2020
- 40th Annual International Cryptology Conference - CRYPTO 2020
- 23rd Information Security Conference - ISC 2020
2019
- 24th Australasian Conference on Information Security and Privacy - ACISP 2019
- 14th ACM Asia Conference on Computer and Communications Security - AsiaCCS 2019
- 26th ACM Conference on Computer and Communications Security - ACM CCS 2019
- RSA Conference, Cryptographers’ Track - CT-RSA 2019
- 6th International Conference on Cryptology and Information Security in Latin America - LATINCRYPT 2019
- 22nd Internat. Conference on Practice and Theory in Public-Key Cryptography - PKC 2019
- 26th Selected Areas in Cryptography Conference - SAC 2019
- 5th Conference on Security Standardisation Research - SSR 2019
2018
- 13th ACM Asia Conference on Computer and Communications Security - AsiaCCS 2018
- 25th ACM Conference on Computer and Communications Security - ACM CCS 2018
- 16th International Conference on Applied Cryptography and Network Security - ACNS 2018
- RSA Conference, Cryptographers’ Track - CT-RSA 2018
- 21st Information Security Conference - ISC 2018
- 21st Internat. Conference on Practice and Theory in Public-Key Cryptography - PKC 2018
- Sicherheit, Schutz und Zuverlässigkeit, Gesellschaft für Informatik - Sicherheit 2018
- 4th Conference on Security Standardisation Research - SSR 2018
2017
- 12th ACM Asia Conference on Computer and Communications Security - AsiaCCS 2017
- 15th International Conference on Applied Cryptography and Network Security - ACNS 2017
- 20th Internat. Conference on Practice and Theory in Public-Key Cryptography - PKC 2017
- 20th Information Security Conference - ISC 2017
2016
- 23rd ACM Conference on Computer and Communications Security - ACM CCS 2016
- 3rd ACM ASIA Public-Key Cryptography Workshop - AsiaPKC 2016
- 14th International Conference on Applied Cryptography and Network Security - ACNS 2016
- 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques - EUROCRYPT 2016
- Workshop on Security, Privacy, and Identity Management in the Cloud - SECPID 2016
- TLS 1.3 - Ready or Not? Workshop at the Network and Distributed System Security Symposiums (NDSS 2016) - TRON 2016
2013
- 16th Internat. Conference on Practice and Theory in Public-Key Cryptography - PKC 2013
2012
- 2nd Int. Conference on Cryptology and Information Security in Latin America - LATINCRYPT 2012
- Int. Conference on Security, Privacy and Applied Cryptography Engineering - SPACE 2012
Other
- Board member of the Interdisciplinary Center for Machine Learning and Data Analytics (IZMD) at the University of Wuppertal
- Member of the Editorial Board of Applicable Algebra in Engineering, Communication and Computing (AAECC), Springer-Verlag, since 06/2014
- Software Innovation Campus Paderborn, Competence Center Digital Security. Founding director from 01/2017 - 08/2019, external member since 09/2019.
- Member of the Crypto Review Panels der Internet Research Task Force (IRTF), counseling the Internet Engineering Task Force (IETF) on the security of cryptosystems deployed in Internet standards, 10/2016 - 12/2019.
Publications
I am a supporter of open access. If a paper is missing or a link is broken, then please drop me an e-mail, I am happy to provide copies of papers.
Peer-reviewed conference proceedings and journals
2021
- Pascal Bemmann, Rongmao Chen, Tibor Jager
Subversion-Resilient Public Key Encryption with Practical Watchdogs
24th International Conference on Practice and Theory of Public-Key Cryptography - PKC 2021 - Denis Diemert, Kai Gellert, Tibor Jager, Lin Lyu
More Efficient Digital Signatures with Tight Multi-User Security
24th International Conference on Practice and Theory of Public-Key Cryptography - PKC 2021 - Tibor Jager, Rafael Kurek, David Niehues
Efficient Adaptively-Secure IB-KEMs and VRFs via Near-Collision Resistance
24th International Conference on Practice and Theory of Public-Key Cryptography - PKC 2021 - Nimrod Aviram, Kai Gellert, Tibor Jager
Session Resumption Protocols and Efficient Forward Security for TLS 1.3 0-RTT
Journal of Cryptology - Special Issue on TLS 1.3, to appear - Tibor Jager, Eike Kiltz, Doreen Riepel, Sven Schäge
Tightly-Secure Authenticated Key Exchange, Revisited
40th Annual International Conference on the Theory and Applications of Cryptographic Techniques - EUROCRYPT 2021
2020
- Fynn Dallmeier, Jan P. Drees, Kai Gellert, Tobias Handirk, Tibor Jager, Jonas Klauke, Simon Nachtigall, Timo Renzelmann, Rudi Wolf
Forward-Secure 0-RTT Goes Live: Implementation and Performance Analysis in QUIC
19th International Conference on Cryptology and Network Security 2020 - Peter Chvojka, Tibor Jager, Saqib A. Kakvi
Offline Witness Encryption with Semi-Adaptive Security
18th International Conference on Applied Cryptography and Network Security - Denis Diemert, Tibor Jager
On the Tight Security of TLS 1.3: Theoretically-Sound Cryptographic Parameters for Real-World Deployments
Journal of Cryptology - Special Issue on TLS 1.3, 2020, to appear - David Derler, Kai Gellert, Tibor Jager, Daniel Slamanig, Christoph Striecks
Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange
Journal of Cryptology, 2020, to appear
2019
- Moritz Schulze Darup, Tibor Jager
Encrypted Cloud-based Control using Secret Sharing with One-time Pads
58th IEEE Conference on Decision and Control - CDC 2019 - Tibor Jager, David Niehues
On the Real-World Instantiability of Admissible Hash Functions and Efficient Verifiable Random Functions
Selected Areas in Cryptography - SAC 2019 - 26th International Conference - Cas Cremers, Katriel Cohn-Gordon, Kristian Gjøsteen, Håkon Jacobsen, Tibor Jager
Highly Efficient Key Exchange Protocols with Optimal Tightness
39th International Cryptology Conference - CRYPTO 2019 - Nimrod Aviram, Kai Gellert, Tibor Jager
Session Resumption Protocols and Efficient Forward Security for TLS 1.3 0-RTT
38th Annual International Conference on the Theory and Applications of Cryptographic Techniques - EUROCRYPT 2019 - Nils Fleischhacker, Tibor Jager, Dominique Schröder
On Tight Security Proofs for Schnorr Signatures
Journal of Cryptology, 2019, to appear
2018
- Tibor Jager, Saqib A. Kakvi, Alexander May
On the Security of the PKCS#1 v1.5 Signature Scheme
25th ACM Conference on Computer and Communications Security - ACM CCS 2018 - Tibor Jager, Rafael Kurek
Short Digital Signatures and ID-KEMs via Truncation Collision Resistance
24th Annual International Conference on the Theory and Applications of Cryptology and Information Security - ASIACRYPT 2018 - Tibor Jager, Rafael Kurek, Jiaxin Pan
Simple and More Efficient PRFs with Tight Security from LWE and Matrix-DDH
24th Annual International Conference on the Theory and Applications of Cryptology and Information Security - ASIACRYPT 2018 - Kristian Gjøsteen, Tibor Jager
Practical and Tightly-Secure Digital Signatures and Authenticated Key Exchange
38th International Cryptology Conference - CRYPTO 2018 - David Derler, Tibor Jager, Daniel Slamanig, Christoph Striecks
Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange
37th Annual International Conference on the Theory and Applications of Cryptographic Techniques - EUROCRYPT 2018
2017
- Tibor Jager, Florian Kohlar, Sven Schäge, Jörg Schwenk
Authenticated Confidential Channel Establishment and the Security of TLS-DHE, see also
Journal of Cryptology, 2017 - Tibor Jager, Martijn Stam, Ryan Stanley-Oakes, Bogdan Warinschi
Multi-Key Authenticated Encryption with Corruptions: Reductions are Lossy
Fifteenth IACR Theory of Cryptography Conference - TCC 2017 - Britta Hale, Tibor Jager, Sebastian Lauer, Jörg Schwenk
Simple Security Definitions for and Constructions of 0-RTT Key Exchange
15th International Conference on Applied Cryptography and Network Security - ACNS 2017 - Felix Günther, Britta Hale, Tibor Jager, Sebastian Lauer
0-RTT Key Exchange with Full Forward Secrecy
36th Annual International Conference on the Theory and Applications of Cryptographic Techniques - EUROCRYPT 2017
2016
- Matthias Horst, Martin Grothe, Tibor Jager, and Jörg Schwenk
Breaking PPTP VPNs via RADIUS Encryption
15th International Conference on Cryptology and Network Security - CANS 2016 - Dennis Hofheinz, Tibor Jager, Andy Rupp
Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts
Fourteenth IACR Theory of Cryptography Conference - TCC 2016-B - Dennis Hofheinz, Tibor Jager, Dakshita Khurana, Amit Sahai, Brent Waters, Mark Zhandry
How to Generate and use Universal Samplers
22nd Annual International Conference on the Theory and Applications of Cryptology and Information Security - ASIACRYPT 2016 - Christoph Bader, Tibor Jager, Yong Li, Sven Schäge
On the Impossibility of Tight Cryptographic Reductions
35th Annual International Conference on the Theory and Applications of Cryptographic Techniques - EUROCRYPT 2016 - Dennis Hofheinz, Tibor Jager
Verifiable Random Functions from Standard Assumptions
13th IACR Theory of Cryptography Conference - TCC 2016-A - Felix Heuer, Tibor Jager, Eike Kiltz, Sven Schäge
On the Selective Opening Security of Practical Public-Key Encryption Schemes
Invited to IET Information Security, 2016 - Tibor Jager, Andy Rupp
Black-Box Accumulation: Collecting Incentives in a Privacy-Preserving Way
Proceedings on Privacy Enhancing Technologies, 2016
2015
- Tibor Jager, Jörg Schwenk, Juraj Somorovsky
On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption
22nd ACM Conference on Computer and Communications Security - ACM CCS 2015
Received the Best Contribution to the IETF Award for "outstanding research contributions benefitting the IETF TLS working group efforts to develop TLS 1.3" at the IETF TLS 1.3 - Ready or Not? Workshop, February 21, 2016, San Diego, CA, USA. - Tibor Jager, Jörg Schwenk, Juraj Somorovsky
Practical Invalid Curve Attacks on TLS-ECDH
20th European Symposium on Research in Computer Security - ESORICS 2015 - Tibor Jager
Verifiable Random Functions from Weaker Assumptions
12th IACR Theory of Cryptography Conference - TCC 2015 - Christoph Bader, Dennis Hofheinz, Tibor Jager, Eike Kiltz, Yong Li
Tightly-Secure Authenticated Key Exchange
12th IACR Theory of Cryptography Conference - TCC 2015 - Florian Bergsma, Tibor Jager, Jörg Schwenk
One-Round Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model
18th International Conference on Practice and Theory of Public-Key Cryptography - PKC 2015 - Felix Heuer, Tibor Jager, Eike Kiltz, Sven Schäge
On the Selective Opening Security of Practical Public-Key Encryption Schemes
18th International Conference on Practice and Theory of Public-Key Cryptography - PKC 2015 - Dennis Hofheinz, Tibor Jager
Tightly Secure Signatures and Public-Key Encryption
Designs, Codes and Cryptography, 2015 - Florian Böhl, Dennis Hofheinz, Tibor Jager, Jessica Koch, Christoph Striecks
Confined Guessing: New Signatures From Standard Assumptions
Journal of Cryptology, 2015 - Jia Liu, Tibor Jager, Saqib A. Kakvi, Bogdan Warinschi
How to Build Time-Lock Encryption
Designs, Codes and Cryptography, 2018
2014
- Nils Fleischhacker, Tibor Jager, Dominique Schröder
On Tight Security Proofs for Schnorr Signatures
20th Annual International Conference on the Theory and Application of Cryptology and Information Security - ASIACRYPT 2014
2013
- Tibor Jager, Jörg Schwenk
On the analysis of cryptographic assumptions in the generic ring model
Journal of Cryptology, 2013 - Florian Böhl, Dennis Hofheinz, Tibor Jager, Jessica Koch, Jae Hong Seo, Christoph Striecks
Practical Signatures From Standard Assumptions, see also this version
32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques - EUROCRYPT 2013 - Tibor Jager, Kenneth G. Paterson, Juraj Somorovsky
One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography
20th Annual Network & Distributed System Security Symposium - NDSS 2013
2012
- Tibor Jager, Sebastian Schinzel, Juraj Somorovsky
Bleichenbacher's attack strikes again: breaking PKCS#1 v1.5 in XML Encryption
17th European Symposium on Research in Computer Security - ESORICS 2012 - Dennis Hofheinz and Tibor Jager
Tightly secure signatures and public-key encryption
32nd International Cryptology Conference - CRYPTO 2012 - Tibor Jager, Florian Kohlar, Sven Schäge, Jörg Schwenk
On the security of TLS-DHE in the standard model
32nd International Cryptology Conference - CRYPTO 2012 - Dennis Hofheinz, Tibor Jager, Edward Knapp
Waters signatures with optimal security reduction
15th International Conference on Practice and Theory of Public-Key Cryptography - PKC 2012
2011
- Dennis Hofheinz, Tibor Jager, Eike Kiltz
Short signatures from weaker assumptions
17th International Conference on the Theory and Application of Cryptology and Information Security - ASIACRYPT 2011 - Tibor Jager, Juraj Somorovsky
How to break XML Encryption
18th ACM Conference on Computer and Communications Security - ACM CCS 2011
2010
- Tibor Jager, Florian Kohlar, Sven Schäge, Jörg Schwenk
Generic compilers for authenticated key exchange
16th Annual International Conference on the Theory and Application of Cryptology and Information Security - ASIACRYPT 2010 - Tibor Jager, Andy Rupp
The semi-generic group model and applications to pairing-based cryptography
16th Annual International Conference on the Theory and Application of Cryptology and Information Security - ASIACRYPT 2010 - Kristiyan Haralambiev, Tibor Jager, Eike Kiltz, Victor Shoup
Simple and efficient public-key encryption from Computational Diffie-Hellman in the standard model
13th International Conference on Practice and Theory in Public Key Cryptography - PKC 2010
2009
- Tibor Jager, Jörg Schwenk
On the analysis of cryptographic assumptions in the generic ring model
15th Annual International Conference on the Theory and Application of Cryptology and Information Security - ASIACRYPT 2009
2008
- Tibor Jager, Jörg Schwenk
On the equivalence of generic group models
Second International Conference on Provable Security - ProvSec 2008 - Sebastian Gajek, Tibor Jager, Mark Manulis, Jörg Schwenk
A browser-based Kerberos authentication scheme
13th European Symposium on Research in Computer Security - ESORICS 2008 - Kristina Altmann, Tibor Jager, Andy Rupp
On black-box ring extraction and integer factorization
35th International Colloquium on Automata, Languages and Programming - ICALP 2008
Books and Lecture Notes
- Tibor Jager
Black-box models of computation in cryptology
ISBN 978-3-8348-1989-5, Springer Spektrum Verlag, 2012 - Tibor Jager
Digitale Signaturen
Textbook-like lecture notes, first version published in 2012, frequently updated
zuletzt bearbeitet am: 18.02.2021