Dr.-Ing. Sven Schäge

  • Ehemalige/r Mitarbeiter/in - Lehrstuhl Netz- und Datensicherheit
E-Mail:
sven.schaege@rub.de
Webseite:
http://www.cits.rub.de/personen/schaege

Forschung

Authentikationsverfahren, Privacy, Key Exchange

Projekte

None

Lehrveranstaltungen

Veröffentlichungen

2015
On Locational Privacy in the Absence of Anonymous Payments

Tilman Frosch, Sven Schäge, Martin Goll, Thorsten Holz - Gutwirth, S., Leenes R., P. De Hert and Y. Poullet, Data protection on the Move. Current Developments in ICT and Privacy/Data Protection. Springer (forthcoming, 2015), Dordrecht.

2012
On the Security of TLS-DHE in the Standard Model

Tibor Jager, Florian Kohlar, Sven Schäge, Jörg Schwenk - In Advances in Cryptology – CRYPTO 2012, Lecture Notes in Computer Science, 2012, Volume 7417/2012, 273-293, DOI: 10.1007/978-3-642-32009-5_17

2011
Tight Proofs for Signature Schemes without Random Oracles

Sven Schäge - Accepted for EUROCRYPT 2011, Tallinn, Estonia, May 15th-19th, 2011.

2010
Generic Compilers for Authenticated Key Exchange

Tibor Jager, Florian Kohlar, Sven Schäge, Jörg Schwenk - In Proceedings of ASIACRYPT 2010, Singapore

A New RSA-Based Signature Scheme

Sven Schäge, Jörg Schwenk - AFRICACRYPT 2010, Third International Conference on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010.

Towards an Anonymous Access Control and Accountability Scheme for Cloud Computing

Jörg Schwenk, Sven Schäge, Meiko Jensen, - In Proceedings of the 3rd IEEE International Conference on Cloud Computing (IEEE CLOUD 2010), Miami, FL, USA.

A CDH-Based Ring Signature Scheme with Short Signatures and Public Keys

Jörg Schwenk, Sven Schäge, - Financial Cryptography Fourteenth International Conference, FC 2010, Tenerife, Spain, January 25-28, 2010.

2009
Twin Signatures, Revisited

Sven Schäge, - Provable Security Third International Conference, ProvSec 2009, Guangzhou, China, November 11-13, 2009.

2008
Die Sicherheit von MS CardSpace und verwandten Single-Sign-On-Protokollen

Sebastian Gajek, Sven Schäge, Xuan Chen, Christoph Löhr - Datenschutz und Datensicherheit - DuD. Volume 32, Number 8, Seiten 515-519. Vieweg Verlag, August 2008.

Code Voting with Linkable Group Signatures

Jörg Schwenk, Sven Schäge, Jörg Helbach - 3rd International Conference, Co-organized by Council of Europe, Gesellschaft für Informatik and E-Voting.CC, August 6th-9th, 2008 in Castle Hofen, Bregenz, Austria 2008. In LNI, 2008.

Finding Hash Collisions

Sven Schäge, - VDM Verlag Dr. Müller e.K., 2008. ISBN-13: 978-3639066135.

2007
Efficient Hash Collision Search Strategies on Special-Purpose Hardware

Sven Schäge, Tim Güneysu, Christof Paar - Special-purpose Hardware for Attacking Cryptographic Systems, SHARCS Workshop 2007, September 9-10, 2007, Vienna, Austria.

Efficient Hash Collision Search Strategies on Special-Purpose Hardware

Sven Schäge, Tim Güneysu, Christof Paar - Western European Workshop on Research in Cryptology, WeWORC Workshop 2007, July 4-6, 2007, Bochum, Germany.