Tibor Jager

Contact

Horst Görtz Institute for IT-Security
Chair for Network and Data Security
Ruhr-University Bochum

Building ID, Room E2/463
Universitätsstraße 150
44801 Bochum
Germany
Tel. +49-234/32-26725
Fax +49-234/32-14347
Internet: www.nds.rub.de

tibor.jager(at)rub.de

Here is my GnuPG-key


News



Publications


Recent

Tibor Jager
Tightly-Secure Pseudorandom Functions via Work Factor Partitioning [link]
Cryptology ePrint Archive, Report 2016/121

Britta Hale, Tibor Jager, Sebastian Lauer, Jörg Schwenk
Speeding: On Low-Latency Key Exchange [link]
Cryptology ePrint Archive, Report 2015/1214

Tibor Jager
How to Build Time-Lock Encryption [link]
Cryptology ePrint Archive, Report 2015/478

Peer-reviewed conference proceedings

Dennis Hofheinz, Tibor Jager, Andy Rupp
Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts [link]
Fourteenth IACR Theory of Cryptography Conference - TCC 2016-B

Dennis Hofheinz, Tibor Jager, Dakshita Khurana, Amit Sahai, Brent Waters, Mark Zhandry
How to Generate and use Universal Samplers [link]
22nd Annual International Conference on the Theory and Applications of Cryptology and Information Security - ASIACRYPT 2016

Christoph Bader, Tibor Jager, Yong Li, Sven Schäge
On the Impossibility of Tight Cryptographic Reductions [link]
35th Annual International Conference on the Theory and Applications of Cryptographic Techniques - EUROCRYPT 2016

Dennis Hofheinz, Tibor Jager
Verifiable Random Functions from Standard Assumptions [link]
13th IACR Theory of Cryptography Conference - TCC 2016-A

Tibor Jager, Jörg Schwenk, Juraj Somorovsky
On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption [link]
22nd ACM Conference on Computer and Communications Security - ACM CCS 2015

Tibor Jager, Jörg Schwenk, Juraj Somorovsky
Practical Invalid Curve Attacks on TLS-ECDH [link]
20th European Symposium on Research in Computer Security - ESORICS 2015

Tibor Jager
Verifiable Random Functions from Weaker Assumptions [link]
12th IACR Theory of Cryptography Conference - TCC 2015

Christoph Bader, Dennis Hofheinz, Tibor Jager, Eike Kiltz, Yong Li
Tightly-Secure Authenticated Key Exchange [link]
12th IACR Theory of Cryptography Conference - TCC 2015

Florian Bergsma, Tibor Jager, Jörg Schwenk
One-Round Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model [link]
18th International Conference on Practice and Theory of Public-Key Cryptography - PKC 2015

Felix Heuer, Tibor Jager, Eike Kiltz, Sven Schäge
On the Selective Opening Security of Practical Public-Key Encryption Schemes [link]
18th International Conference on Practice and Theory of Public-Key Cryptography - PKC 2015

Nils Fleischhacker, Tibor Jager, Dominique Schröder
On Tight Security Proofs for Schnorr Signatures [link]
20th Annual International Conference on the Theory and Application of Cryptology and Information Security - ASIACRYPT 2014

Florian Böhl, Dennis Hofheinz, Tibor Jager, Jessica Koch, Jae Hong Seo, Christoph Striecks
Practical Signatures From Standard Assumptions [pdf], see also [link]
32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques - EUROCRYPT 2013

Tibor Jager, Kenneth G. Paterson, Juraj Somorovsky
One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography [link]
20th Annual Network & Distributed System Security Symposium - NDSS 2013

Tibor Jager, Sebastian Schinzel, Juraj Somorovsky
Bleichenbacher's attack strikes again: breaking PKCS#1 v1.5 in XML Encryption[link]
17th European Symposium on Research in Computer Security - ESORICS 2012

Dennis Hofheinz and Tibor Jager
Tightly secure signatures and public-key encryption [link]
32nd International Cryptology Conference - CRYPTO 2012

Tibor Jager, Florian Kohlar, Sven Schäge, Jörg Schwenk
On the security of TLS-DHE in the standard model [link]
32nd International Cryptology Conference - CRYPTO 2012

Dennis Hofheinz, Tibor Jager, Edward Knapp
Waters signatures with optimal security reduction [link]
15th International Conference on Practice and Theory of Public-Key Cryptography - PKC 2012

Dennis Hofheinz, Tibor Jager, Eike Kiltz
Short signatures from weaker assumptions [link]
17th International Conference on the Theory and Application of Cryptology and Information Security - ASIACRYPT 2011

Tibor Jager, Juraj Somorovsky
How to break XML Encryption [link]
18th ACM Conference on Computer and Communications Security - ACM CCS 2011

Tibor Jager, Florian Kohlar, Sven Schäge, Jörg Schwenk
Generic compilers for authenticated key exchange [link]
16th Annual International Conference on the Theory and Application of Cryptology and Information Security - ASIACRYPT 2010

Tibor Jager and Andy Rupp
The semi-generic group model and applications to pairing-based cryptography [pdf]
16th Annual International Conference on the Theory and Application of Cryptology and Information Security - ASIACRYPT 2010

Kristiyan Haralambiev, Tibor Jager, Eike Kiltz, Victor Shoup
Simple and efficient public-key encryption from Computational Diffie-Hellman in the standard model [link]
13th International Conference on Practice and Theory in Public Key Cryptography - PKC 2010

Tibor Jager, Jörg Schwenk
On the analysis of cryptographic assumptions in the generic ring model [link]
15th Annual International Conference on the Theory and Application of Cryptology and Information Security - ASIACRYPT 2009

Tibor Jager, Jörg Schwenk
On the equivalence of generic group models [pdf]
Second International Conference on Provable Security - ProvSec 2008

Sebastian Gajek, Tibor Jager, Mark Manulis, Jörg Schwenk
A browser-based Kerberos authentication scheme [pdf]
13th European Symposium on Research in Computer Security - ESORICS 2008

Kristina Altmann, Tibor Jager, Andy Rupp
On black-box ring extraction and integer factorization [pdf]
35th International Colloquium on Automata, Languages and Programming - ICALP 2008

Journals

Tibor Jager, Florian Kohlar, Sven Schäge, Jörg Schwenk
Authenticated Confidential Channel Establishment and the Security of TLS-DHE [link]
Journal of Cryptology, to appear

Felix Heuer, Tibor Jager, Eike Kiltz, Sven Schäge
On the Selective Opening Security of Practical Public-Key Encryption Schemes [link]
IET Information Security, to appear

Tibor Jager, Andy Rupp
Black-Box Accumulation: Collecting Incentives in a Privacy-Preserving Way [link]
Proceedings on Privacy Enhancing Technologies, 2016

Dennis Hofheinz, Tibor Jager
Tightly Secure Signatures and Public-Key Encryption [link]
Designs, Codes and Cryptography, 2015

Florian Böhl, Dennis Hofheinz, Tibor Jager, Jessica Koch, Christoph Striecks
Confined Guessing: New Signatures From Standard Assumptions [ePrint] [link]
Journal of Cryptology, 2015

Tibor Jager, Jörg Schwenk.
On the analysis of cryptographic assumptions in the generic ring model [ePrint] [link]
Journal of Cryptology, 2013

Books and Lecture Notes

Tibor Jager
Black-box models of computation in cryptology [link (Springer)] [fulltext]
ISBN 978-3-8348-1989-5, Springer Spektrum Verlag, 2012

Tibor Jager
Digitale Signaturen [pdf]
Textbooklike lecture notes, first version published in 2012, frequently updated