Tibor Jager

Tibor Jager
Security Researcher and
Professor of IT Security
at Paderborn University

Contact

My group web site at Paderborn University

E-Mail: tibor.jager(at)upb.de
PGP key

You can use my keybase page to encrypt your e-mail with PGP

Current Research Projects

Publications

Recent

Tibor Jager, Saqib A. Kakvi, Alexander May
On the Security of the PKCS#1 v1.5 Signature Scheme
25th ACM Conference on Computer and Communications Security - ACM CCS 2018

Tibor Jager, Rafael Kurek
Short Digital Signatures and ID-KEMs via Truncation Collision Resistance
24th Annual International Conference on the Theory and Applications of Cryptology and Information Security - ASIACRYPT 2018

Tibor Jager, Rafael Kurek, Jiaxin Pan
Simple and More Efficient PRFs with Tight Security from LWE and Matrix-DDH
24th Annual International Conference on the Theory and Applications of Cryptology and Information Security - ASIACRYPT 2018

Peer-reviewed conference proceedings

Kristian Gjøsteen, Tibor Jager
Practical and Tightly-Secure Digital Signatures and Authenticated Key Exchange
38th International Cryptology Conference - CRYPTO 2018

David Derler, Tibor Jager, Daniel Slamanig, Christoph Striecks
Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange
37th Annual International Conference on the Theory and Applications of Cryptographic Techniques - EUROCRYPT 2018

Tibor Jager, Martijn Stam, Ryan Stanley-Oakes, Bogdan Warinschi
Multi-Key Authenticated Encryption with Corruptions: Reductions are Lossy
Fifteenth IACR Theory of Cryptography Conference - TCC 2017

Britta Hale, Tibor Jager, Sebastian Lauer, Jörg Schwenk
Simple Security Definitions for and Constructions of 0-RTT Key Exchange
15th International Conference on Applied Cryptography and Network Security - ACNS 2017

Felix Günther, Britta Hale, Tibor Jager, Sebastian Lauer
0-RTT Key Exchange with Full Forward Secrecy
36th Annual International Conference on the Theory and Applications of Cryptographic Techniques - EUROCRYPT 2017

Matthias Horst, Martin Grothe, Tibor Jager, and Jörg Schwenk
Breaking PPTP VPNs via RADIUS Encryption
15th International Conference on Cryptology and Network Security - CANS 2016

Dennis Hofheinz, Tibor Jager, Andy Rupp
Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts
Fourteenth IACR Theory of Cryptography Conference - TCC 2016-B

Dennis Hofheinz, Tibor Jager, Dakshita Khurana, Amit Sahai, Brent Waters, Mark Zhandry
How to Generate and use Universal Samplers
22nd Annual International Conference on the Theory and Applications of Cryptology and Information Security - ASIACRYPT 2016

Christoph Bader, Tibor Jager, Yong Li, Sven Schäge
On the Impossibility of Tight Cryptographic Reductions
35th Annual International Conference on the Theory and Applications of Cryptographic Techniques - EUROCRYPT 2016

Dennis Hofheinz, Tibor Jager
Verifiable Random Functions from Standard Assumptions
13th IACR Theory of Cryptography Conference - TCC 2016-A

Tibor Jager, Jörg Schwenk, Juraj Somorovsky
On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption
22nd ACM Conference on Computer and Communications Security - ACM CCS 2015

Tibor Jager, Jörg Schwenk, Juraj Somorovsky
Practical Invalid Curve Attacks on TLS-ECDH
20th European Symposium on Research in Computer Security - ESORICS 2015

Tibor Jager
Verifiable Random Functions from Weaker Assumptions
12th IACR Theory of Cryptography Conference - TCC 2015

Christoph Bader, Dennis Hofheinz, Tibor Jager, Eike Kiltz, Yong Li
Tightly-Secure Authenticated Key Exchange
12th IACR Theory of Cryptography Conference - TCC 2015

Florian Bergsma, Tibor Jager, Jörg Schwenk
One-Round Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model
18th International Conference on Practice and Theory of Public-Key Cryptography - PKC 2015

Felix Heuer, Tibor Jager, Eike Kiltz, Sven Schäge
On the Selective Opening Security of Practical Public-Key Encryption Schemes
18th International Conference on Practice and Theory of Public-Key Cryptography - PKC 2015

Nils Fleischhacker, Tibor Jager, Dominique Schröder
On Tight Security Proofs for Schnorr Signatures
20th Annual International Conference on the Theory and Application of Cryptology and Information Security - ASIACRYPT 2014

Florian Böhl, Dennis Hofheinz, Tibor Jager, Jessica Koch, Jae Hong Seo, Christoph Striecks
Practical Signatures From Standard Assumptions, see also this version
32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques - EUROCRYPT 2013

Tibor Jager, Kenneth G. Paterson, Juraj Somorovsky
One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography
20th Annual Network & Distributed System Security Symposium - NDSS 2013

Tibor Jager, Sebastian Schinzel, Juraj Somorovsky
Bleichenbacher’s attack strikes again: breaking PKCS#1 v1.5 in XML Encryption
17th European Symposium on Research in Computer Security - ESORICS 2012

Dennis Hofheinz and Tibor Jager
Tightly secure signatures and public-key encryption
32nd International Cryptology Conference - CRYPTO 2012

Tibor Jager, Florian Kohlar, Sven Schäge, Jörg Schwenk
On the security of TLS-DHE in the standard model
32nd International Cryptology Conference - CRYPTO 2012

Dennis Hofheinz, Tibor Jager, Edward Knapp
Waters signatures with optimal security reduction
15th International Conference on Practice and Theory of Public-Key Cryptography - PKC 2012

Dennis Hofheinz, Tibor Jager, Eike Kiltz
Short signatures from weaker assumptions
17th International Conference on the Theory and Application of Cryptology and Information Security - ASIACRYPT 2011

Tibor Jager, Juraj Somorovsky
How to break XML Encryption
18th ACM Conference on Computer and Communications Security - ACM CCS 2011

Tibor Jager, Florian Kohlar, Sven Schäge, Jörg Schwenk
Generic compilers for authenticated key exchange
16th Annual International Conference on the Theory and Application of Cryptology and Information Security - ASIACRYPT 2010

Tibor Jager, Andy Rupp
The semi-generic group model and applications to pairing-based cryptography
16th Annual International Conference on the Theory and Application of Cryptology and Information Security - ASIACRYPT 2010

Kristiyan Haralambiev, Tibor Jager, Eike Kiltz, Victor Shoup
Simple and efficient public-key encryption from Computational Diffie-Hellman in the standard model
13th International Conference on Practice and Theory in Public Key Cryptography - PKC 2010

Tibor Jager, Jörg Schwenk
On the analysis of cryptographic assumptions in the generic ring model
15th Annual International Conference on the Theory and Application of Cryptology and Information Security - ASIACRYPT 2009

Tibor Jager, Jörg Schwenk
On the equivalence of generic group models
Second International Conference on Provable Security - ProvSec 2008

Sebastian Gajek, Tibor Jager, Mark Manulis, Jörg Schwenk
A browser-based Kerberos authentication scheme
13th European Symposium on Research in Computer Security - ESORICS 2008

Kristina Altmann, Tibor Jager, Andy Rupp
On black-box ring extraction and integer factorization
35th International Colloquium on Automata, Languages and Programming - ICALP 2008

Journals

Jia Liu, Tibor Jager, Saqib A. Kakvi, Bogdan Warinschi
How to Build Time-Lock Encryption
Designs, Codes and Cryptography, 2018

Tibor Jager, Florian Kohlar, Sven Schäge, Jörg Schwenk
Authenticated Confidential Channel Establishment and the Security of TLS-DHE, see also
Journal of Cryptology, 2017

Felix Heuer, Tibor Jager, Eike Kiltz, Sven Schäge
On the Selective Opening Security of Practical Public-Key Encryption Schemes
Invited to IET Information Security, 2016

Tibor Jager, Andy Rupp
Black-Box Accumulation: Collecting Incentives in a Privacy-Preserving Way
Proceedings on Privacy Enhancing Technologies, 2016

Dennis Hofheinz, Tibor Jager
Tightly Secure Signatures and Public-Key Encryption
Designs, Codes and Cryptography, 2015

Florian Böhl, Dennis Hofheinz, Tibor Jager, Jessica Koch, Christoph Striecks
Confined Guessing: New Signatures From Standard Assumptions
Journal of Cryptology, 2015

Tibor Jager, Jörg Schwenk
On the analysis of cryptographic assumptions in the generic ring model
Journal of Cryptology, 2013

Books and Lecture Notes

Tibor Jager
Black-box models of computation in cryptology
ISBN 978-3-8348-1989-5, Springer Spektrum Verlag, 2012

Tibor Jager
Digitale Signaturen
Textbook-like lecture notes, first version published in 2012, frequently updated