2021
  • Shuai Han, Tibor Jager, Eike Kiltz, Shengli Liu, Jiaxin Pan, Doreen Riepel, Sven Schäge. Authenticated Key Exchange and Signatures with Tight Security in the Standard Model. Proceedings of IACR Crypto 2021.


  • Nico Döttling, Dominik Hartmann, Dennis Hofheinz, Eike Kiltz, Sven Schäge, Bogdan Ursu. On the Impossibility of Short Algebraic Signatures. .
    PDF [pdf]

  • Tibor Jager, Eike Kiltz, Doreen Riepel, Sven Schäge. Tightly-Secure Authenticated Key Exchange, Revisited. Proceedings of IACR EUROCRYPT 2021.
    PDF [pdf]

2020
  • Sven Schäge, Jörg Schwenk, Sebastian Lauer. Privacy-Preserving Authenticated Key Exchange and the Case of IKEv2. Proceedings of IACR PKC 2020.
    PDF [pdf]

  • Kathrin Hövelmanns and Eike Kiltz and Sven Schäge and Dominique Unruh. Generic Authenticated Key Exchange in the Quantum Random Oracle Model. Proceedings of IACR PKC 2020.
    PDF [pdf]

2018
  • Kathrin Hövelmanns and Eike Kiltz and Sven Schäge and Dominique Unruh. Generic Authenticated Key Exchange in the Quantum Random Oracle Model. .
    PDF [pdf] Bibtex [bibtex]

2017
  • Tibor Jager, Florian Kohlar, Sven Schäge, Jörg Schwenk. Authenticated Confidential Channel Establishment and the Security of TLS-DHE. J. Cryptology 30(4): 1276-1324 (2017).
    Springer Link [published version] Bibtex [bibtex]

  • Yong Li, Sven Schäge. No-Match Attacks and Robust Partnering Definitions: Defining Trivial Attacks for Security Protocols is Not Trivial. CCS 2017: 1343-1360.
    Springer Link [published version] Bibtex [bibtex]

2016
  • Christoph Bader, Tibor Jager, Yong Li, Sven Schäge. On the Impossibility of Tight Cryptographic Reductions. IACR Cryptology ePrint Archive 2015: 374 (2015), EUROCRYPT (2) 2016: 273-304.
    PDF [pdf] Springer Link [published version] Bibtex [bibtex]

  • Felix Heuer, Tibor Jager, Sven Schäge, Eike Kiltz. Selective opening security of practical public-key encryption schemes. IET Information Security 10(6): 304-318 .
    PDF [pdf] Bibtex [bibtex]

2015
  • Felix Heuer, Tibor Jager, Eike Kiltz, Sven Schäge. On the Selective Opening Security of Practical Public-Key Encryption Schemes. Public Key Cryptography 2015: 27-511, IACR Cryptology ePrint Archive 2016: 342 (2016).
    PDF [pdf] Springer Link [published version] Bibtex [bibtex]

  • Sven Schäge. TOPAS - 2-Pass Key Exchange with Full Perfect Forward Secrecy and Optimal Communication Complexity. ACM Conference on Computer and Communications Security 2015: 1224-1235.
    URL [url] Bibtex [bibtex]

  • Sven Schäge. Tight Security for Signature Schemes Without Random Oracles. J. Cryptology 28(3): 641-670.
    Springer Link [published version] Bibtex [bibtex]

2014
  • Yong Li, Sven Schäge, Zheng Yang, Christoph Bader, and Jörg Schwenk. New Modular Compilers for Authenticated Key Exchange. ACNS 2014, Applied Cryptography and Network Security, Volume 8479 of the series Lecture Notes in Computer Science pp 1-18.
    Springer Link [published version] Bibtex [bibtex]

  • Yong Li, Sven Schäge, Zheng Yang, Florian Kohlar, Jörg Schwenk. On the Security of the Pre-Shared Key Ciphersuites of TLS. Public Key Cryptography 2014: 669-684.
    PDF [pdf] Springer Link [published version] Bibtex [bibtex]

2013
  • Tilman Frosch, Martin Goll, Thorsten Holz, Sven Schäge. Improving Location Privacy for the Electric Vehicle Masses. Technical Report 2013.
    URL [url]

  • Florian Kohlar, Sven Schäge, Jörg Schwenk. On the Security of TLS-DH and TLS-RSA in the Standard Model. IACR Cryptology ePrint Archive 2013: 367.
    PDF [pdf] Bibtex [bibtex]

2012
  • Tibor Jager, Florian Kohlar, Sven Schäge, Jörg Schwenk. On the Security of TLS-DHE in the Standard Model. CRYPTO 2012: 273-293.
    PDF [pdf] Springer Link [published version] Bibtex [bibtex]

  • Sven Schäge. Strong Security from Probabilistic Signature Schemes. Public Key Cryptography - PKC 2012, Volume 7293 of the series Lecture Notes in Computer Science pp 84-101.
    Springer Link [published version] Bibtex [bibtex]

2011
  • Sven Schäge. Tight Proofs for Signature Schemes without Random Oracles. Advances in Cryptology - EUROCRYPT 2011, Volume 6632 of the series Lecture Notes in Computer Science pp 189-206.
    Springer Link [published version] Bibtex [bibtex]

  • Tibor Jager, Florian Kohlar, Sven Schäge, Jörg Schwenk. A Standard-Model Security Analysis of TLS-DHE. IACR Cryptology ePrint Archive 2011: 219.
    Springer Link [published version] Bibtex [bibtex]

2010
  • Sven Schäge, Jörg Schwenk. A CDH-Based Ring Signature Scheme with Short Signatures and Public Keys. Financial Cryptography 2010: 129-142.
    Springer Link [published version] Bibtex [bibtex]

  • Sven Schäge, Jörg Schwenk. A New RSA-Based Signature Scheme. AFRICACRYPT 2010: 232-249.
    Springer Link [published version] Bibtex [bibtex]

  • Tibor Jager, Florian Kohlar, Sven Schäge, Jörg Schwenk. Generic Compilers for Authenticated Key Exchange. IACR Cryptology ePrint Archive 2010: 621 (2010), ASIACRYPT 2010: 232-249.
    PDF [pdf] Springer Link [published version] Bibtex [bibtex]

  • Meiko Jensen, Sven Schäge, Jörg Schwenk. Towards an Anonymous Access Control and Accountability Scheme for Cloud Computing. IEEE CLOUD 2010: 540-541.
    URL [url] Bibtex [bibtex]

2009
2008
  • Jörg Helbach, Sven Schäge, Jörg Schwenk. Code Voting with Linkable Group Signatures. EVOTE 2008: 209-208.
    PDF [pdf] Bibtex [bibtex]

  • Xuan Chen, Christoph Löhr, Sebastian Gajek, Sven Schäge. Die Sicherheit von MS CardSpace und verwandten Single-Sign-On-Protokollen. Datenschutz und Datensicherheit - DuD, August 2008, Volume 32, Issue 8, pp 515-519.
    Springer Link [published version] Bibtex [bibtex]

2007
  • Tim Güneysu, Christof Paar, Sven Schäge. Efficient Hash Collision Search Strategies on Special-Purpose Hardware. WEWoRC 2007, Research in Cryptology, Volume 4945 of the series Lecture Notes in Computer Science pp 39-51.
    PDF [pdf] Springer Link [published version] Bibtex [bibtex]