2010 | ||
---|---|---|
113 | Ueli M. Maurer, Stefano Tessaro: A Hardcore Lemma for Computational Indistinguishability: Security Amplification for Arbitrarily Weak PRGs with Optimal Stretch. TCC 2010: 237-254 | |
2009 | ||
112 | Ueli M. Maurer: Unifying Zero-Knowledge Proofs of Knowledge. AFRICACRYPT 2009: 272-286 | |
111 | Peter Gazi, Ueli M. Maurer: Cascade Encryption Revisited. ASIACRYPT 2009: 37-51 | |
110 | Ueli M. Maurer, Stefano Tessaro: Computational Indistinguishability Amplification: Tight Product Theorems for System Composition. CRYPTO 2009: 355-373 | |
109 | Ueli M. Maurer: Abstraction in Cryptography. CRYPTO 2009: 465 | |
108 | Divesh Aggarwal, Ueli M. Maurer: Breaking RSA Generically Is Equivalent to Factoring. EUROCRYPT 2009: 36-53 | |
107 | Robert König, Ueli M. Maurer, Stefano Tessaro: Abstract Storage Devices. SOFSEM 2009: 341-352 | |
106 | Vassilis Zikas, Sarah Hauser, Ueli M. Maurer: Realistic Failures in Secure Multi-party Computation. TCC 2009: 274-293 | |
2008 | ||
105 | Johannes Blömer, Dan Boneh, Ronald Cramer, Ueli M. Maurer: Cryptography, 16.09. - 21.09.2007 Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany 2008 | |
104 | Martin Hirt, Ueli M. Maurer, Vassilis Zikas: MPC vs. SFE : Unconditional and Computational Security. ASIACRYPT 2008: 1-18 | |
103 | Ueli M. Maurer, Stefano Tessaro: Basing PRFs on Constant-Query Weak PRFs: Minimizing Assumptions for Efficient Symmetric Cryptography. ASIACRYPT 2008: 161-178 | |
102 | Ueli M. Maurer: Rethinking Digital Signatures. SECRYPT 2008: 31-33 | |
101 | Zuzana Beerliová-Trubíniová, Matthias Fitzi, Martin Hirt, Ueli M. Maurer, Vassilis Zikas: MPC vs. SFE: Perfect Security in a Unified Corruption Model. TCC 2008: 231-250 | |
100 | Hideki Imai, Goichiro Hanaoka, Ueli M. Maurer, Yuliang Zheng: Introduction to the Special Issue on Information Theoretic Security. IEEE Transactions on Information Theory 54(6): 2405-2407 (2008) | |
99 | Stefan Dziembowski, Ueli M. Maurer: The Bare Bounded-Storage Model: The Tight Bound on the Storage Requirement for Key Agreement. IEEE Transactions on Information Theory 54(6): 2790-2792 (2008) | |
2007 | ||
98 | Ueli M. Maurer, Dominik Raub: Black-Box Extension Fields and the Inexistence of Field-Homomorphic One-Way Permutations. ASIACRYPT 2007: 427-443 | |
97 | Ueli M. Maurer, Krzysztof Pietrzak, Renato Renner: Indistinguishability Amplification. CRYPTO 2007: 130-149 | |
96 | Ueli M. Maurer, Stefano Tessaro: Domain Extension of Public Random Functions: Beyond the Birthday Barrier. CRYPTO 2007: 187-204 | |
95 | Johannes Blömer, Dan Boneh, Ronald Cramer, Ueli M. Maurer: 07381 Abstracts Collection -- Cryptography. Cryptography 2007 | |
94 | Johannes Blömer, Dan Boneh, Ronald Cramer, Ueli M. Maurer: 07381 Executive Summary - Cryptography. Cryptography 2007 | |
93 | Ueli M. Maurer, Johan Sjödin: A Fast and Key-Efficient Reduction of Chosen-Ciphertext to Known-Plaintext Security. EUROCRYPT 2007: 498-516 | |
92 | Robert König, Ueli M. Maurer, Stefano Tessaro: Abstract Storage Devices CoRR abs/0706.2746: (2007) | |
2006 | ||
91 | Ueli M. Maurer, Yvonne Anne Oswald, Krzysztof Pietrzak, Johan Sjödin: Luby-Rackoff Ciphers from Weak Round Functions? EUROCRYPT 2006: 391-408 | |
90 | Ueli M. Maurer: Secure multi-party computation made simple. Discrete Applied Mathematics 154(2): 370-381 (2006) | |
2005 | ||
89 | Ueli M. Maurer, Johan Sjödin: Single-Key AIL-MACs from Any FIL-MAC. ICALP 2005: 472-484 | |
88 | Ueli M. Maurer: Abstract Models of Computation in Cryptography. IMA Int. Conf. 2005: 1-12 | |
87 | Ueli M. Maurer, Johan Sjödin: Domain Expansion of MACs: Alternative Uses of the FIL-MAC. IMA Int. Conf. 2005: 168-185 | |
86 | Robert König, Ueli M. Maurer: Generalized Strong Extractors and Deterministic Privacy Amplification. IMA Int. Conf. 2005: 322-339 | |
85 | Endre Bangerter, Jan Camenisch, Ueli M. Maurer: Efficient Proofs of Knowledge of Discrete Logarithms and Representations in Groups with Hidden Order. Public Key Cryptography 2005: 154-171 | |
84 | Robert König, Ueli M. Maurer, Renato Renner: On the power of quantum memory. IEEE Transactions on Information Theory 51(7): 2391-2401 (2005) | |
83 | Matthias Fitzi, Juan A. Garay, Ueli M. Maurer, Rafail Ostrovsky: Minimal Complete Primitives for Secure Multi-Party Computation. J. Cryptology 18(1): 37-61 (2005) | |
82 | Jeffrey Considine, Matthias Fitzi, Matthew K. Franklin, Leonid A. Levin, Ueli M. Maurer, David Metcalf: Byzantine Agreement Given Partial Broadcast. J. Cryptology 18(3): 191-217 (2005) | |
2004 | ||
81 | Thomas Holenstein, Ueli M. Maurer, Johan Sjödin: Complete Classification of Bilinear Hard-Core Functions. CRYPTO 2004: 73-91 | |
80 | Ueli M. Maurer: Towards a Theory of Consistency Primitives. DISC 2004: 379-389 | |
79 | Stefan Dziembowski, Ueli M. Maurer: On Generating the Initial Key in the Bounded-Storage Model. EUROCRYPT 2004: 126-137 | |
78 | Ueli M. Maurer: The Role of Cryptography in Database Security. SIGMOD Conference 2004: 5-10 | |
77 | Ueli M. Maurer, Renato Renner, Clemens Holenstein: Indifferentiability, Impossibility Results on Reductions, and Applications to the Random Oracle Methodology. TCC 2004: 21-39 | |
76 | Ueli M. Maurer, Krzysztof Pietrzak: Composition of Random Systems: When Two Weak Make One Strong. TCC 2004: 410-427 | |
75 | Stefan Dziembowski, Ueli M. Maurer: Optimal Randomizer Efficiency in the Bounded-Storage Model. J. Cryptology 17(1): 5-26 (2004) | |
74 | Ueli M. Maurer: New Approaches to Digital Evidence. Proceedings of the IEEE 92(6): 933-947 (2004) | |
2003 | ||
73 | Ueli M. Maurer, Krzysztof Pietrzak: The Security of Many-Round Luby-Rackoff Pseudo-Random Permutations. EUROCRYPT 2003: 544-561 | |
72 | Ueli M. Maurer: Intrinsic Limitations of Digital Signatures and How to Cope with Them. ISC 2003: 180-192 | |
71 | Ueli M. Maurer, Stefan Wolf: Secret-key agreement over unauthenticated public channels I: Definitions and a completeness result. IEEE Transactions on Information Theory 49(4): 822-831 (2003) | |
70 | Ueli M. Maurer, Stefan Wolf: Secret-key agreement over unauthenticated public channels II: the simulatability condition. IEEE Transactions on Information Theory 49(4): 832-838 (2003) | |
69 | Ueli M. Maurer, Stefan Wolf: Secret-key agreement over unauthenticated public channels III: Privacy amplification. IEEE Transactions on Information Theory 49(4): 839-851 (2003) | |
2002 | ||
68 | Serge Fehr, Ueli M. Maurer: Linear VSS and Distributed Commitments Based on Secret Sharing and Pairwise Checks. CRYPTO 2002: 565-580 | |
67 | Ueli M. Maurer: Indistinguishability of Random Systems. EUROCRYPT 2002: 110-132 | |
66 | Matthias Fitzi, Nicolas Gisin, Ueli M. Maurer, Oliver von Rotz: Unconditional Byzantine Agreement and Multi-party Computation Secure against Dishonest Minorities from Scratch. EUROCRYPT 2002: 482-501 | |
65 | Ueli M. Maurer: Secure Multi-party Computation Made Simple. SCN 2002: 14-28 | |
64 | Stefan Dziembowski, Ueli M. Maurer: Tight security proofs for the bounded-storage model. STOC 2002: 341-350 | |
2001 | ||
63 | Martin Hirt, Ueli M. Maurer: Robustness for Free in Unconditional Multi-party Computation. CRYPTO 2001: 101-118 | |
62 | Matthias Fitzi, Juan A. Garay, Ueli M. Maurer, Rafail Ostrovsky: Minimal Complete Primitives for Secure Multi-party Computation. CRYPTO 2001: 80-100 | |
61 | Ueli M. Maurer: Cryptography 2000±10. Informatics 2001: 63-85 | |
2000 | ||
60 | Martin Hirt, Ueli M. Maurer, Bartosz Przydatek: Efficient Secure Multi-party Computation. ASIACRYPT 2000: 143-161 | |
59 | Ronald Cramer, Ivan Damgård, Ueli M. Maurer: General Secure Multi-party Computation from any Linear Secret-Sharing Scheme. EUROCRYPT 2000: 316-334 | |
58 | Ueli M. Maurer, Stefan Wolf: Information-Theoretic Key Agreement: From Weak to Strong Secrecy for Free. EUROCRYPT 2000: 351-368 | |
57 | Reto Kohlas, Ueli M. Maurer: Confidence Valuation in a Public-Key Infrastructure Based on Uncertain Evidence. Public Key Cryptography 2000: 93-112 | |
56 | Matthias Fitzi, Ueli M. Maurer: From partial consistency to global broadcast. STOC 2000: 494-503 | |
55 | Ueli M. Maurer, Stefan Wolf: The Diffie-Hellman Protocol. Des. Codes Cryptography 19(2/3): 147-171 (2000) | |
54 | Ueli M. Maurer: Authentication theory and hypothesis testing. IEEE Transactions on Information Theory 46(4): 1350-1356 (2000) | |
53 | Martin Hirt, Ueli M. Maurer: Player Simulation and General Adversary Structures in Perfect Multiparty Computation. J. Cryptology 13(1): 31-60 (2000) | |
1999 | ||
52 | Matthias Fitzi, Martin Hirt, Ueli M. Maurer: General Adversaries in Unconditional Multi-party Computation. ASIACRYPT 1999: 232-246 | |
51 | Ueli M. Maurer: Information-Theoretic Cryptography. CRYPTO 1999: 47-64 | |
50 | Bernd Altmann, Matthias Fitzi, Ueli M. Maurer: Byzantine Agreement Secure against General Adversaries in the Dual Failure Model. DISC 1999: 123-137 | |
49 | Reto Kohlas, Ueli M. Maurer: Reasoning about Public-Key Certification: On Bindings between Entities and Public Keys. Financial Cryptography 1999: 86-103 | |
48 | Ueli M. Maurer: Kryptographie: Basistechnologie der Informationsgesellschaft (Zusammenfassung). GI Jahrestagung 1999: 15 | |
47 | Ueli M. Maurer, Stefan Wolf: Unconditionally Secure Key Agreement and the Intrinsic Conditional Information. IEEE Transactions on Information Theory 45(2): 499-514 (1999) | |
46 | Ueli M. Maurer, Stefan Wolf: The Relationship Between Breaking the Diffie-Hellman Protocol and Computing Discrete Logarithms. SIAM J. Comput. 28(5): 1689-1721 (1999) | |
1998 | ||
45 | Matthias Fitzi, Martin Hirt, Ueli M. Maurer: Trading Correctness for Privacy in Unconditional Multi-Party Computation (Extended Abstract). CRYPTO 1998: 121-136 | |
44 | Matthias Fitzi, Ueli M. Maurer: Efficient Byzantine Agreement Secure Against General Adversaries. DISC 1998: 134-148 | |
43 | Ueli M. Maurer, Stefan Wolf: Lower Bounds on Generic Algorithms in Groups. EUROCRYPT 1998: 72-84 | |
1997 | ||
42 | Christian Cachin, Ueli M. Maurer: Unconditional Security Against Memory-Bounded Adversaries. CRYPTO 1997: 292-306 | |
41 | Ueli M. Maurer, Stefan Wolf: Privacy Amplification Secure Against Active Adversaries. CRYPTO 1997: 307-321 | |
40 | Ueli M. Maurer: Information-Theoretically Secure Secret-Key Agreement by NOT Authenticated Public Discussion. EUROCRYPT 1997: 209-225 | |
39 | Martin Hirt, Ueli M. Maurer: Complete Characterization of Adversaries Tolerable in Secure Multi-Party Computation (Extended Abstract). PODC 1997: 25-34 | |
38 | Christian Cachin, Ueli M. Maurer: Linking Information Reconciliation and Privacy Amplification. J. Cryptology 10(2): 97-110 (1997) | |
37 | Jan Camenisch, Ueli M. Maurer, Markus Stadler: Digital Payment Systems With Passive Anonymity-Revoking Trustees. Journal of Computer Security 5(1): 69-90 (1997) | |
1996 | ||
36 | Ueli M. Maurer: Advances in Cryptology - EUROCRYPT '96, International Conference on the Theory and Application of Cryptographic Techniques, Saragossa, Spain, May 12-16, 1996, Proceeding Springer 1996 | |
35 | Daniel Bleichenbacher, Ueli M. Maurer: On the Efficiency of One-Time Digital Signatures. ASIACRYPT 1996: 145-158 | |
34 | Ueli M. Maurer, Stefan Wolf: Towards Characterizing When Information-Theoretic Secret Key Agreement Is Possible. ASIACRYPT 1996: 196-209 | |
33 | Ueli M. Maurer, Stefan Wolf: Diffie-Hellman Oracles. CRYPTO 1996: 268-282 | |
32 | Ueli M. Maurer: Modelling a Public-Key Infrastructure. ESORICS 1996: 325-350 | |
31 | Jan Camenisch, Ueli M. Maurer, Markus Stadler: Digital Payment Systems with Passive Anonymity-Revoking Trustees. ESORICS 1996: 33-43 | |
30 | Daniel Bleichenbacher, Ueli M. Maurer: Optimal Tree-Based One-Time Digital Signature Schemes. STACS 1996: 363-374 | |
29 | Ueli M. Maurer: A Unified and Generalized Treatment of Authentification Theory. STACS 1996: 387-398 | |
28 | Ueli M. Maurer, Yacov Yacobi: A Non-interactive Public-Key Distribution System. Des. Codes Cryptography 9(3): 305-316 (1996) | |
27 | Ueli M. Maurer, Pierre E. Schmid: A Calculus for Security Bootstrapping in Distributed Systems. Journal of Computer Security 4(1): 55-80 (1996) | |
1995 | ||
26 | Ueli M. Maurer: On the Oracle Complexity of Factoring Integers. Computational Complexity 5(3/4): 237-247 (1995) | |
25 | Charles H. Bennett, Gilles Brassard, Claude Crépeau, Ueli M. Maurer: Generalized privacy amplification. IEEE Transactions on Information Theory 41(6): 1915-1923 (1995) | |
24 | Ueli M. Maurer: Fast Generation of Prime Numbers and Secure Public-Key Cryptographic Parameters. J. Cryptology 8(3): 123-155 (1995) | |
1994 | ||
23 | Ueli M. Maurer: Towards the Equivalence of Breaking the Diffie-Hellman Protocol and Computing Discrete Algorithms CRYPTO 1994: 271-281 | |
22 | Daniel Bleichenbacher, Ueli M. Maurer: Directed Acyclic Graphs, One-way Functions and Digital Signatures. CRYPTO 1994: 75-82 | |
21 | Ueli M. Maurer, Pierre E. Schmid: A Calculus for Secure Channel Establishment in Open Networks. ESORICS 1994: 175-192 | |
20 | Christian Cachin, Ueli M. Maurer: Linking Information Reconciliation and Privacy Amplification (Extended Abstract). EUROCRYPT 1994: 266-274 | |
1993 | ||
19 | Ueli M. Maurer: Secret key agreement by public discussion from common information. IEEE Transactions on Information Theory 39(3): 733-742 (1993) | |
18 | Ueli M. Maurer, James L. Massey: Cascade Ciphers: The Importance of Being First. J. Cryptology 6(1): 55-61 (1993) | |
1992 | ||
17 | Ueli M. Maurer: Protocols for Secret Key Agreement by Public Discussion Based on Common Information. CRYPTO 1992: 461-470 | |
16 | Ueli M. Maurer: A Simplified and Generalized Treatment of Luby-Rackoff Pseudorandom Permutation Generator. EUROCRYPT 1992: 239-255 | |
15 | Ueli M. Maurer: Factoring with an Oracle. EUROCRYPT 1992: 429-436 | |
14 | Ueli M. Maurer, Yacov Yacobi: A Remark on a Non-interactive Public-Key Distribution System. EUROCRYPT 1992: 458-460 | |
13 | Ueli M. Maurer: Asymptotically-Tight Bounds on the Number of Cycles in Generalized de Bruijn-Good Graphs. Discrete Applied Mathematics 37/38: 421-436 (1992) | |
12 | Ueli M. Maurer: Conditionally-Perfect Secrecy and a Provably-Secure Randomized Cipher. J. Cryptology 5(1): 53-66 (1992) | |
11 | Ueli M. Maurer: A Universal Statistical Test for Random Bit Generators. J. Cryptology 5(2): 89-105 (1992) | |
1991 | ||
10 | Kenji Koyama, Ueli M. Maurer, Tatsuaki Okamoto, Scott A. Vanstone: New Public-Key Schemes Based on Elliptic Curves over the Ring Zn. CRYPTO 1991: 252-266 | |
9 | Ueli M. Maurer: New Approaches to the Design of Self-Synchronizing Stream Ciphers. EUROCRYPT 1991: 458-471 | |
8 | Ueli M. Maurer, Yacov Yacobi: Non-interactive Public-Key Cryptography. EUROCRYPT 1991: 498-507 | |
7 | Ueli M. Maurer: Perfect Cryptographic Security from Partially Independent Channels STOC 1991: 561-571 | |
6 | Ueli M. Maurer, James L. Massey: Local Randomness in Pseudorandom Sequences. J. Cryptology 4(2): 135-149 (1991) | |
1990 | ||
5 | Ueli M. Maurer: A Universal Statistical Test for Random Bit Generators. CRYPTO 1990: 409-420 | |
4 | Ueli M. Maurer: A Provably-Secure Strongly-Randomized Cipher. EUROCRYPT 1990: 361-373 | |
1989 | ||
3 | Ueli M. Maurer, James L. Massey: Perfect Local Randomness in Pseudo-Random Sequences. CRYPTO 1989: 100-112 | |
2 | Ueli M. Maurer: Fast Generation of Secure RSA-Moduli with Almost Maximal Diversity. EUROCRYPT 1989: 636-647 | |
1987 | ||
1 | James L. Massey, Ueli M. Maurer, Muzhong Wang: Non-Expanding, Key-Minimal, Robustly-Perfect, Linear and Bilinear Ciphers. EUROCRYPT 1987: 237-247 |