Publications
We support open access. If a paper is missing or a link is broken, then please drop us an e-mail, we are happy to provide copies of papers.
Peer-reviewed publications
2024
- Manuel Barbosa, Kai Gellert, Julia Hesse, Stanislaw Jarecki
Bare PAKE: Universally Composable Key Exchange from just Passwords
44th Annual International Cryptology Conference - CRYPTO 2024 - Marloes Venema, Leon Botros
Using Predicate Extension for Predicate Encryption to Generically Obtain Chosen-Ciphertext Security and Signatures
IACR Communications in Cryptology - Pascal Bemmann, Sebastian Berndt, Rongmao Chen
Subversion-Resilient Signatures without Random Oracles
22th International Conference on Applied Cryptography and Network Security - ACNS 2024 - Doreen Riepel, Marloes Venema, Tanya Verma
ISABELLA: Improving Structures of Attribute-Based Encryption Leveraging Linear Algebra
31th ACM Conference on Computer and Communications Security - ACM CCS 2024 - Sebastian Faller, Tobias Handirk, Julia Hesse, Máté Horváth, Anja Lehmann
Password-Protected Key Retrieval with(out) HSM Protection
31th ACM Conference on Computer and Communications Security - ACM CCS 2024 - Jonas von der Heyden, Nils Schlüter, Philip Binfet, Martin Asman, Markus Zdrallek, Tibor Jager, Moritz Schulze Darup
Privacy-Preserving Power Flow Analysis via Secure Multi-Party Computation
IEEE Transactions on Smart Grid
2023
- István András Seres, Máté Horváth, Péter Burcsi
The Legendre Pseudorandom Function as a Multivariate Quadratic Cryptosystem: Security and Applications
Applicable Algebra in Engineering, Communication and Computing - AAECC 2023 - Antonio de la Piedra, Marloes Venema, Greg Alpár
ACABELLA: Automated (Crypt)analysis of Attribute-Based Encryption Leveraging Linear Algebra
30th ACM Conference on Computer and Communications Security - ACM CCS 2023 - Watson Ladd, Tanya Verma, Marloes Venema, Armando Faz-Hernández, Brendan McMillion, Avani Wildani, Nick Sullivan
Portunus: Re-imagining Access Control in Distributed Systems
2023 USENIX Annual Technical Conference - USENIX ATC 2023 - Gareth T. Davies, Sebastian Faller, Kai Gellert, Tobias Handirk, Julia Hesse, Máté Horvath, Tibor Jager
Security Analysis of the WhatsApp End-to-End Encrypted Backup Protocol
43th Annual International Cryptology Conference - CRYPTO 2023 - Kai Gellert, Kristian Gjøsteen, Håkon Jacobsen, Tibor Jager
On Optimal Tightness for Key Exchange with Full Forward Secrecy via Key Confirmation
43th Annual International Cryptology Conference - CRYPTO 2023 - Marc Fischlin, Jonas von der Heyden, Marian Margraf, Frank Morgner, Andreas Wallner, Holger Bock
Post-Quantum Security for the Extended Access Control Protocol
Security Standardisation Research, 8th International Conference - SSR 2023 - Marloes Venema
A Practical Compiler for Attribute-Based Encryption: New Decentralized Constructions and More
RSA Conference, Cryptographers’ Track - CT-RSA 2023 - Peter Chvojka, Tibor Jager
Simple, Fast, Efficient, and Tightly-Secure Non-Malleable Non-Interactive Timed Commitments
26th International Conference on Practice and Theory of Public-Key Cryptography - PKC 2023 - Greg Alpár, Marloes Venema
GLUE: Generalizing Unbounded Attribute-Based Encryption for Flexible Efficiency Trade-Offs
26th International Conference on Practice and Theory of Public-Key Cryptography - PKC 2023 - Pascal Bemmann, Sebastian Berndt, Denis Diemert, Tibor Jager, Thomas Eisenbarth
Subversion-Resilient Authenticated Encryption without Random Oracles
21th International Conference on Applied Cryptography and Network Security - ACNS 2023
2022
- Zhengan Huang, Junzuo Lai, Shuai Han, Lin Lyu, Jian Weng
Anonymous Public Key Encryption under Corruptions
28th Annual International Conference on the Theory and Applications of Cryptology and Information Security - ASIACRYPT 2022 - Gareth T. Davies, Jeroen Pijnenburg
PERKS: Persistent and Distributed Key Acquisition for Secure Storage from Passwords
Selected Areas in Cryptography - SAC 2022 - 29th International Conference - Hannah E. Davis, Denis Diemert, Felix Günther, Tibor Jager
On the Concrete Security of TLS 1.3 PSK Mode
41th Annual International Conference on the Theory and Applications of Cryptographic Techniques - EUROCRYPT 2022 - Pritha Gupta, Arunselvan Ramaswamy, Jan P. Drees, Eyke Hüllermeier, Claudia Priesterjahn, Tibor Jager
Automated Information Leakage Detection: Application to Side-Channel Detection in Cryptographic Protocols
14th International Conference on Agents and Artificial Intelligence - ICAART 2022 - Kai Gellert, Tibor Jager, Lin Lyu, Tom Neuschulten
On Fingerprinting Attacks and Length-Hiding Encryption
RSA Conference, Cryptographers’ Track - CT-RSA 2022
2021
- Jan P. Drees, Pritha Gupta, Eyke Hüllermeier, Tibor Jager, Alexander Konze, Claudia Priesterjahn, Arunselvan Ramaswamy, Juraj Somorowsky
Automated Detection of Side Channels in Cryptographic Protocols: DROWN the ROBOTs
14th ACM Workshop on Artifical Intelligence and Security - AISec 2021 - Denis Diemert, Kai Gellert, Tibor Jager, Lin Lyu
Digital Signatures with Memory-Tight Security in the Multi-Challenge Setting
27th Annual International Conference on the Theory and Applications of Cryptology and Information Security - ASIACRYPT 2021 - Colin Boyd, Gareth T. Davies, Bor de Kock, Kai Gellert, Tibor Jager, Lise Millerjord
Symmetric Key Exchange with Full Forward Security and Robust Synchronization
27th Annual International Conference on the Theory and Applications of Cryptology and Information Security - ASIACRYPT 2021 - Peter Chvojka, Tibor Jager, Daniel Slamanig, Christoph Striecks
Versatile and Sustainable Timed-Release Encryption and Sequential Time-Lock Puzzles
26th European Symposium on Research in Computer Security - ESORICS 2021 - Kai Gellert, Tobias Handirk
A Formal Security Analysis of Session Resumption Across Hostnames
26th European Symposium on Research in Computer Security - ESORICS 2021 - Shuai Han, Tibor Jager, Eike Kiltz, Shengli Liu, Jiaxin Pan, Doreen Riepel, Sven Schäge
Authenticated Key Exchange and Signatures with Tight Security in the Standard Model
41th Annual International Cryptology Conference - CRYPTO 2021 - Pascal Bemmann, Rongmao Chen, Tibor Jager
Subversion-Resilient Public Key Encryption with Practical Watchdogs
24th International Conference on Practice and Theory of Public-Key Cryptography - PKC 2021 - Denis Diemert, Kai Gellert, Tibor Jager, Lin Lyu
More Efficient Digital Signatures with Tight Multi-User Security
24th International Conference on Practice and Theory of Public-Key Cryptography - PKC 2021 - Tibor Jager, Rafael Kurek, David Niehues
Efficient Adaptively-Secure IB-KEMs and VRFs via Near-Collision Resistance
24th International Conference on Practice and Theory of Public-Key Cryptography - PKC 2021 - David Niehues
Verifiable Random Functions with Optimal Tightness
24th International Conference on Practice and Theory of Public-Key Cryptography - PKC 2021 - Nimrod Aviram, Kai Gellert, Tibor Jager
Session Resumption Protocols and Efficient Forward Security for TLS 1.3 0-RTT
Journal of Cryptology - Special Issue on TLS 1.3, 2021 - Tibor Jager, Eike Kiltz, Doreen Riepel, Sven Schäge
Tightly-Secure Authenticated Key Exchange, Revisited
40th Annual International Conference on the Theory and Applications of Cryptographic Techniques - EUROCRYPT 2021 - David Derler, Kai Gellert, Tibor Jager, Daniel Slamanig, Christoph Striecks
Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange
Journal of Cryptology, 2021
Denis Diemert, Tibor Jager
On the Tight Security of TLS 1.3: Theoretically-Sound Cryptographic Parameters for Real-World Deployments
Journal of Cryptology - Special Issue on TLS 1.3, 2021
2020
- Fynn Dallmeier, Jan P. Drees, Kai Gellert, Tobias Handirk, Tibor Jager, Jonas Klauke, Simon Nachtigall, Timo Renzelmann, Rudi Wolf
Forward-Secure 0-RTT Goes Live: Implementation and Performance Analysis in QUIC
19th International Conference on Cryptology and Network Security 2020 - Colin Boyd, Kai Gellert
A Modern View on Forward Security
The Computer Journal, 2020 - Gareth T. Davies, Christian Janson, Daniel P. Martin
Client-oblivious OPRAM
International Conference on Information and Communications Security - ICICS 2020 - Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Yao Jiang
Fast and Secure Updatable Encryption
40th Annual International Cryptology Conference - CRYPTO 2020 - Rafael Kurek
Efficient Forward-Secure Threshold Signatures
15th International Workshop on Security - IWSEC 2020 - Rafael Kurek
Efficient Forward-Secure Threshold Public Key Encryption
25th Australasian Conference on Information Security and Privacy - ACISP 2020 - Gareth T. Davies, Herman Galteland, Kristian Gjøsteen, Yao Jiang
Cloud-assisted Asynchronous Key Transport with Post-Quantum Security
25th Australasian Conference on Information Security and Privacy - ACISP 2020 - Sebastian Lauer, Kai Gellert, Robert Merget, Tobias Handirk, Jörg Schwenk
T0RTT: Non-Interactive Immediate Forward-Secret Single-Pass Circuit Construction
Proceedings on Privacy Enhancing Technologies 2020 - Peter Chvojka, Tibor Jager, Saqib A. Kakvi
Offline Witness Encryption with Semi-Adaptive Security
18th International Conference on Applied Cryptography and Network Security
2019
- Saqib A. Kakvi
On the Security of RSA-PSS in the Wild
5th Security Standardisation Research Conference - SSR 2019 - Moritz Schulze Darup, Tibor Jager
Encrypted Cloud-based Control using Secret Sharing with One-time Pads
58th IEEE Conference on Decision and Control - CDC 2019 - Tibor Jager, David Niehues
On the Real-World Instantiability of Admissible Hash Functions and Efficient Verifiable Random Functions
Selected Areas in Cryptography - SAC 2019 - 26th International Conference - Cas Cremers, Katriel Cohn-Gordon, Kristian Gjøsteen, Håkon Jacobsen, Tibor Jager
Highly Efficient Key Exchange Protocols with Optimal Tightness
39th International Cryptology Conference - CRYPTO 2019 - Nimrod Aviram, Kai Gellert, Tibor Jager
Session Resumption Protocols and Efficient Forward Security for TLS 1.3 0-RTT
38th Annual International Conference on the Theory and Applications of Cryptographic Techniques - EUROCRYPT 2019 - Nils Fleischhacker, Tibor Jager, Dominique Schröder
On Tight Security Proofs for Schnorr Signatures
Journal of Cryptology, 2019
2018
- Tibor Jager, Saqib A. Kakvi, Alexander May
On the Security of the PKCS#1 v1.5 Signature Scheme
25th ACM Conference on Computer and Communications Security - ACM CCS 2018 - Tibor Jager, Rafael Kurek
Short Digital Signatures and ID-KEMs via Truncation Collision Resistance
24th Annual International Conference on the Theory and Applications of Cryptology and Information Security - ASIACRYPT 2018 - Tibor Jager, Rafael Kurek, Jiaxin Pan
Simple and More Efficient PRFs with Tight Security from LWE and Matrix-DDH
24th Annual International Conference on the Theory and Applications of Cryptology and Information Security - ASIACRYPT 2018 - Kristian Gjøsteen, Tibor Jager
Practical and Tightly-Secure Digital Signatures and Authenticated Key Exchange
38th International Cryptology Conference - CRYPTO 2018 - David Derler, Tibor Jager, Daniel Slamanig, Christoph Striecks
Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange
37th Annual International Conference on the Theory and Applications of Cryptographic Techniques - EUROCRYPT 2018 - Jia Liu, Tibor Jager, Saqib A. Kakvi, Bogdan Warinschi
How to Build Time-Lock Encryption
Designs, Codes and Cryptography, 2018
2017
- Tibor Jager, Martijn Stam, Ryan Stanley-Oakes, Bogdan Warinschi
Multi-Key Authenticated Encryption with Corruptions: Reductions are Lossy
Fifteenth IACR Theory of Cryptography Conference - TCC 2017 - Britta Hale, Tibor Jager, Sebastian Lauer, Jörg Schwenk
Simple Security Definitions for and Constructions of 0-RTT Key Exchange
15th International Conference on Applied Cryptography and Network Security - ACNS 2017 - Felix Günther, Britta Hale, Tibor Jager, Sebastian Lauer
0-RTT Key Exchange with Full Forward Secrecy
36th Annual International Conference on the Theory and Applications of Cryptographic Techniques - EUROCRYPT 2017 - Tibor Jager, Florian Kohlar, Sven Schäge, Jörg Schwenk
Authenticated Confidential Channel Establishment and the Security of TLS-DHE, see also
Journal of Cryptology, 2017
2016
- Matthias Horst, Martin Grothe, Tibor Jager, and Jörg Schwenk
Breaking PPTP VPNs via RADIUS Encryption
15th International Conference on Cryptology and Network Security - CANS 2016 - Dennis Hofheinz, Tibor Jager, Andy Rupp
Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts
Fourteenth IACR Theory of Cryptography Conference - TCC 2016-B - Dennis Hofheinz, Tibor Jager, Dakshita Khurana, Amit Sahai, Brent Waters, Mark Zhandry
How to Generate and use Universal Samplers
22nd Annual International Conference on the Theory and Applications of Cryptology and Information Security - ASIACRYPT 2016 - Christoph Bader, Tibor Jager, Yong Li, Sven Schäge
On the Impossibility of Tight Cryptographic Reductions
35th Annual International Conference on the Theory and Applications of Cryptographic Techniques - EUROCRYPT 2016 - Dennis Hofheinz, Tibor Jager
Verifiable Random Functions from Standard Assumptions
13th IACR Theory of Cryptography Conference - TCC 2016-A - Felix Heuer, Tibor Jager, Eike Kiltz, Sven Schäge
On the Selective Opening Security of Practical Public-Key Encryption Schemes
Invited to IET Information Security, 2016 - Tibor Jager, Andy Rupp
Black-Box Accumulation: Collecting Incentives in a Privacy-Preserving Way
Proceedings on Privacy Enhancing Technologies, 2016
2015
- Tibor Jager, Jörg Schwenk, Juraj Somorovsky
On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption
22nd ACM Conference on Computer and Communications Security - ACM CCS 2015
Received the Best Contribution to the IETF Award for "outstanding research contributions benefitting the IETF TLS working group efforts to develop TLS 1.3" at the IETF TLS 1.3 - Ready or Not? Workshop, February 21, 2016, San Diego, CA, USA. - Tibor Jager, Jörg Schwenk, Juraj Somorovsky
Practical Invalid Curve Attacks on TLS-ECDH
20th European Symposium on Research in Computer Security - ESORICS 2015 - Tibor Jager
Verifiable Random Functions from Weaker Assumptions
12th IACR Theory of Cryptography Conference - TCC 2015 - Christoph Bader, Dennis Hofheinz, Tibor Jager, Eike Kiltz, Yong Li
Tightly-Secure Authenticated Key Exchange
12th IACR Theory of Cryptography Conference - TCC 2015 - Florian Bergsma, Tibor Jager, Jörg Schwenk
One-Round Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model
18th International Conference on Practice and Theory of Public-Key Cryptography - PKC 2015 - Felix Heuer, Tibor Jager, Eike Kiltz, Sven Schäge
On the Selective Opening Security of Practical Public-Key Encryption Schemes
18th International Conference on Practice and Theory of Public-Key Cryptography - PKC 2015 - Dennis Hofheinz, Tibor Jager
Tightly Secure Signatures and Public-Key Encryption
Designs, Codes and Cryptography, 2015 - Florian Böhl, Dennis Hofheinz, Tibor Jager, Jessica Koch, Christoph Striecks
Confined Guessing: New Signatures From Standard Assumptions
Journal of Cryptology, 2015
2014
- Nils Fleischhacker, Tibor Jager, Dominique Schröder
On Tight Security Proofs for Schnorr Signatures
20th Annual International Conference on the Theory and Application of Cryptology and Information Security - ASIACRYPT 2014
2013
- Florian Böhl, Dennis Hofheinz, Tibor Jager, Jessica Koch, Jae Hong Seo, Christoph Striecks
Practical Signatures From Standard Assumptions, see also this version
32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques - EUROCRYPT 2013 - Tibor Jager, Kenneth G. Paterson, Juraj Somorovsky
One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography
20th Annual Network & Distributed System Security Symposium - NDSS 2013 - Tibor Jager, Jörg Schwenk
On the analysis of cryptographic assumptions in the generic ring model
Journal of Cryptology, 2013
2012
- Tibor Jager, Sebastian Schinzel, Juraj Somorovsky
Bleichenbacher's attack strikes again: breaking PKCS#1 v1.5 in XML Encryption
17th European Symposium on Research in Computer Security - ESORICS 2012 - Dennis Hofheinz and Tibor Jager
Tightly secure signatures and public-key encryption
32nd International Cryptology Conference - CRYPTO 2012 - Tibor Jager, Florian Kohlar, Sven Schäge, Jörg Schwenk
On the security of TLS-DHE in the standard model
32nd International Cryptology Conference - CRYPTO 2012 - Dennis Hofheinz, Tibor Jager, Edward Knapp
Waters signatures with optimal security reduction
15th International Conference on Practice and Theory of Public-Key Cryptography - PKC 2012
2011
- Dennis Hofheinz, Tibor Jager, Eike Kiltz
Short signatures from weaker assumptions
17th International Conference on the Theory and Application of Cryptology and Information Security - ASIACRYPT 2011 - Tibor Jager, Juraj Somorovsky
How to break XML Encryption
18th ACM Conference on Computer and Communications Security - ACM CCS 2011
2010
- Tibor Jager, Florian Kohlar, Sven Schäge, Jörg Schwenk
Generic compilers for authenticated key exchange
16th Annual International Conference on the Theory and Application of Cryptology and Information Security - ASIACRYPT 2010 - Tibor Jager, Andy Rupp
The semi-generic group model and applications to pairing-based cryptography
16th Annual International Conference on the Theory and Application of Cryptology and Information Security - ASIACRYPT 2010 - Kristiyan Haralambiev, Tibor Jager, Eike Kiltz, Victor Shoup
Simple and efficient public-key encryption from Computational Diffie-Hellman in the standard model
13th International Conference on Practice and Theory in Public Key Cryptography - PKC 2010
2009
- Tibor Jager, Jörg Schwenk
On the analysis of cryptographic assumptions in the generic ring model
15th Annual International Conference on the Theory and Application of Cryptology and Information Security - ASIACRYPT 2009
2008
- Tibor Jager, Jörg Schwenk
On the equivalence of generic group models
Second International Conference on Provable Security - ProvSec 2008 - Sebastian Gajek, Tibor Jager, Mark Manulis, Jörg Schwenk
A browser-based Kerberos authentication scheme
13th European Symposium on Research in Computer Security - ESORICS 2008 - Kristina Altmann, Tibor Jager, Andy Rupp
On black-box ring extraction and integer factorization
35th International Colloquium on Automata, Languages and Programming - ICALP 2008
Books and Lecture Notes
- Tibor Jager
Black-box models of computation in cryptology
ISBN 978-3-8348-1989-5, Springer Spektrum Verlag, 2012 - Tibor Jager
Digitale Signaturen
Textbook-like lecture notes, first version published in 2012, frequently updated