Skip to main content
Go to the home page of the European Commission (opens in new window)
English English
CORDIS - EU research results
CORDIS

Theoretically-Sound Real-World Cryptography

CORDIS provides links to public deliverables and publications of HORIZON projects.

Links to deliverables and publications from FP7 projects, as well as links to some specific result types such as dataset and software, are dynamically retrieved from OpenAIRE .

Publications

Tightly-Secure Authenticated Key Exchange, Revisited (opens in new window)

Author(s): Tibor Jager, Eike Kiltz, Doreen Riepel, Sven Schäge
Published in: Advances in Cryptology – EUROCRYPT 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17–21, 2021, Proceedings, Part I, Issue 12696, 2021, Page(s) 117-146, ISBN 978-3-030-77869-9
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-77870-5_5

Highly Efficient Key Exchange Protocols with Optimal Tightness (opens in new window)

Author(s): Katriel Cohn-Gordon, Cas Cremers, Kristian Gjøsteen, Håkon Jacobsen, Tibor Jager
Published in: Advances in Cryptology – CRYPTO 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18–22, 2019, Proceedings, Part III, Issue 11694, 2019, Page(s) 767-797, ISBN 978-3-030-26953-1
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-26954-8_25

More Efficient Digital Signatures with Tight Multi-user Security (opens in new window)

Author(s): Denis Diemert, Kai Gellert, Tibor Jager, Lin Lyu
Published in: Public-Key Cryptography – PKC 2021 - 24th IACR International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10–13, 2021, Proceedings, Part II, Issue 12711, 2021, Page(s) 1-31, ISBN 978-3-030-75247-7
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-75248-4_1

Authenticated Key Exchange and Signatures with Tight Security in the Standard Model (opens in new window)

Author(s): Shuai Han, Tibor Jager, Eike Kiltz, Shengli Liu, Jiaxin Pan, Doreen Riepel, Sven Schäge
Published in: Advances in Cryptology – CRYPTO 2021 - 41st Annual International Cryptology Conference, CRYPTO 2021, Virtual Event, August 16–20, 2021, Proceedings, Part IV, Issue 12828, 2021, Page(s) 670-700, ISBN 978-3-030-84258-1
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-84259-8_23

Offline Witness Encryption with Semi-adaptive Security (opens in new window)

Author(s): Peter Chvojka, Tibor Jager, Saqib A. Kakvi
Published in: Applied Cryptography and Network Security - 18th International Conference, ACNS 2020, Rome, Italy, October 19–22, 2020, Proceedings, Part I, Issue 12146, 2020, Page(s) 231-250, ISBN 978-3-030-57807-7
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-57808-4_12

Fast and Secure Updatable Encryption (opens in new window)

Author(s): Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Yao Jiang
Published in: Advances in Cryptology – CRYPTO 2020 - 40th Annual International Cryptology Conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17–21, 2020, Proceedings, Part I, Issue 12170, 2020, Page(s) 464-493, ISBN 978-3-030-56783-5
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-56784-2_16

Forward-Secure 0-RTT Goes Live: Implementation and Performance Analysis in QUIC (opens in new window)

Author(s): Fynn Dallmeier, Jan P. Drees, Kai Gellert, Tobias Handirk, Tibor Jager, Jonas Klauke, Simon Nachtigall, Timo Renzelmann, Rudi Wolf
Published in: Cryptology and Network Security - 19th International Conference, CANS 2020, Vienna, Austria, December 14–16, 2020, Proceedings, Issue 12579, 2020, Page(s) 211-231, ISBN 978-3-030-65410-8
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-65411-5_11

Cloud-Assisted Asynchronous Key Transport with Post-Quantum Security (opens in new window)

Author(s): Gareth T. Davies, Herman Galteland, Kristian Gjøsteen, Yao Jiang
Published in: Information Security and Privacy - 25th Australasian Conference, ACISP 2020, Perth, WA, Australia, November 30 – December 2, 2020, Proceedings, Issue 12248, 2020, Page(s) 82-101, ISBN 978-3-030-55303-6
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-55304-3_5

Client-Oblivious OPRAM (opens in new window)

Author(s): Gareth T. Davies, Christian Janson, Daniel P. Martin
Published in: Information and Communications Security - 22nd International Conference, ICICS 2020, Copenhagen, Denmark, August 24–26, 2020, Proceedings, Issue 12282, 2020, Page(s) 312-330, ISBN 978-3-030-61077-7
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-61078-4_18

On the Real-World Instantiability of Admissible Hash Functions and Efficient Verifiable Random Functions (opens in new window)

Author(s): Tibor Jager, David Niehues
Published in: Selected Areas in Cryptography – SAC 2019 - 26th International Conference, Waterloo, ON, Canada, August 12–16, 2019, Revised Selected Papers, Issue 11959, 2020, Page(s) 303-332, ISBN 978-3-030-38470-8
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-38471-5_13

On Optimal Tightness for Key Exchange with Full Forward Secrecy via Key Confirmation (opens in new window)

Author(s): Kai Gellert, Kristian Gjøsteen, Håkon Jacobsen, Tibor Jager
Published in: 43rd Annual International Cryptology Conference - CRYPTO 2023, 2023
Publisher: Springer
DOI: 10.1007/978-3-031-38551-3_10

Subversion-Resilient Signatures without Random Oracles (opens in new window)

Author(s): Pascal Bemmann, Sebastian Berndt, Rongmao Chen
Published in: 22nd International Conference on Applied Cryptography and Network Security - ACNS 2024, 2024
Publisher: ACM
DOI: 10.1007/978-3-031-54770-6_14

Security Analysis of the WhatsApp End-to-End Encrypted Backup Protocol (opens in new window)

Author(s): Gareth T. Davies, Sebastian Faller, Kai Gellert, Tobias Handirk, Julia Hesse, Máté Horvath, Tibor Jager
Published in: 43rd Annual International Cryptology Conference - CRYPTO 2023, 2023
Publisher: Springer
DOI: 10.1007/978-3-031-38551-3_11

On the Concrete Security of TLS 1.3 PSK Mode (opens in new window)

Author(s): Hannah E. Davis, Denis Diemert, Felix Günther, Tibor Jager
Published in: 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques - EUROCRYPT 2022, 2022
Publisher: ACM
DOI: 10.1007/978-3-031-07085-3_30

Subversion-Resilient Authenticated Encryption without Random Oracles (opens in new window)

Author(s): Pascal Bemmann, Sebastian Berndt, Denis Diemert, Tibor Jager, Thomas Eisenbarth
Published in: 21st International Conference on Applied Cryptography and Network Security - ACNS 2023, 2023
Publisher: Springer
DOI: 10.1007/978-3-031-33491-7_17

Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange (opens in new window)

Author(s): David Derler, Kai Gellert, Tibor Jager, Daniel Slamanig, Christoph Striecks
Published in: Journal of Cryptology, Issue 34/2, 2021, ISSN 0933-2790
Publisher: Springer Verlag
DOI: 10.1007/s00145-021-09374-3

Session Resumption Protocols and Efficient Forward Security for TLS 1.3 0-RTT (opens in new window)

Author(s): Nimrod Aviram, Kai Gellert, Tibor Jager
Published in: Journal of Cryptology, Issue 34/3, 2021, ISSN 0933-2790
Publisher: Springer Verlag
DOI: 10.1007/s00145-021-09385-0

On the Tight Security of TLS 1.3: Theoretically Sound Cryptographic Parameters for Real-World Deployments (opens in new window)

Author(s): Denis Diemert, Tibor Jager
Published in: Journal of Cryptology, Issue 34/3, 2021, ISSN 0933-2790
Publisher: Springer Verlag
DOI: 10.1007/s00145-021-09388-x

Searching for OpenAIRE data...

There was an error trying to search data from OpenAIRE

No results available

My booklet 0 0