Search

Your search keyword '"Jager, Tibor"' showing total 191 results

Search Constraints

Start Over You searched for: Author "Jager, Tibor" Remove constraint Author: "Jager, Tibor"
191 results on '"Jager, Tibor"'

Search Results

1. Privacy-Preserving Power Flow Analysis via Secure Multi-Party Computation

Catalog

Books, media, physical & digital resources

3. Security Analysis of the WhatsApp End-to-End Encrypted Backup Protocol

4. Subversion-Resilient Authenticated Encryption Without Random Oracles

6. On the Concrete Security of TLS 1.3 PSK Mode

7. On Fingerprinting Attacks and Length-Hiding Encryption

11. Symmetric Key Exchange with Full Forward Security and Robust Synchronization

12. Digital Signatures with Memory-Tight Security in the Multi-challenge Setting

13. Versatile and Sustainable Timed-Release Encryption and Sequential Time-Lock Puzzles (Extended Abstract)

14. Authenticated Key Exchange and Signatures with Tight Security in the Standard Model

15. Tightly-Secure Authenticated Key Exchange, Revisited

16. More Efficient Digital Signatures with Tight Multi-user Security

18. Subversion-Resilient Public Key Encryption with Practical Watchdogs

19. Privacy-Preserving Power Flow Analysis via Secure Multi-Party Computation

22. Forward-Secure 0-RTT Goes Live: Implementation and Performance Analysis in QUIC

23. Offline Witness Encryption with Semi-adaptive Security

24. On the Real-World Instantiability of Admissible Hash Functions and Efficient Verifiable Random Functions

25. Highly Efficient Key Exchange Protocols with Optimal Tightness

26. Session Resumption Protocols and Efficient Forward Security for TLS 1.3 0-RTT

32. Practical and Tightly-Secure Digital Signatures and Authenticated Key Exchange

33. Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange

34. Simple and More Efficient PRFs with Tight Security from LWE and Matrix-DDH

35. Short Digital Signatures and ID-KEMs via Truncation Collision Resistance

40. Multi-key Authenticated Encryption with Corruptions: Reductions Are Lossy

41. Simple Security Definitions for and Constructions of 0-RTT Key Exchange

42. 0-RTT Key Exchange with Full Forward Secrecy

45. How to Generate and Use Universal Samplers

46. Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts

47. On the Impossibility of Tight Cryptographic Reductions

48. Verifiable Random Functions from Standard Assumptions

49. Breaking PPTP VPNs via RADIUS Encryption