Ueli Maurer
Ueli Maurer
Professor of Computer Science, ETH Zurich
Bestätigte E-Mail-Adresse bei inf.ethz.ch
TitelZitiert vonJahr
Secret key agreement by public discussion from common information
UM Maurer
IEEE transactions on information theory 39 (3), 733-742, 1993
18471993
Generalized privacy amplification
CH Bennett, G Brassard, C Crépeau, UM Maurer
IEEE Transactions on Information Theory 41 (6), 1915-1923, 1995
15331995
General secure multi-party computation from any linear secret-sharing scheme
R Cramer, I Damgård, U Maurer
International Conference on the Theory and Applications of Cryptographic …, 2000
4872000
Modelling a public-key infrastructure
U Maurer
European Symposium on Research in Computer Security, 325-350, 1996
4641996
Information-theoretic key agreement: From weak to strong secrecy for free
U Maurer, S Wolf
International Conference on the Theory and Applications of Cryptographic …, 2000
4522000
Indifferentiability, impossibility results on reductions, and applications to the random oracle methodology
U Maurer, R Renner, C Holenstein
Theory of cryptography conference, 21-39, 2004
4212004
A universal statistical test for random bit generators
UM Maurer
Journal of cryptology 5 (2), 89-105, 1992
3241992
Digital payment systems with passive anonymity-revoking trustees
J Camenisch, U Maurer, M Stadler
Journal of Computer Security 5 (1), 69-89, 1997
2901997
Towards the equivalence of breaking the Diffie-Hellman protocol and computing discrete logarithms
UM Maurer
Annual International Cryptology Conference, 271-281, 1994
2831994
Conditionally-perfect secrecy and a provably-secure randomized cipher
UM Maurer
Journal of Cryptology 5 (1), 53-66, 1992
2821992
Unconditionally secure key agreement and the intrinsic conditional information
UM Maurer, S Wolf
IEEE Transactions on Information Theory 45 (2), 499-514, 1999
2741999
New Public-Key Schemes Based on Elliptic Curves over the Ring Zn
K Koyama, UM Maurer, T Okamoto, SA Vanstone
Annual International Cryptology Conference, 252-266, 1991
2501991
Secret-key agreement over unauthenticated public channels. I. Definitions and a completeness result
U Maurer, S Wolf
IEEE Transactions on Information Theory 49 (4), 822-831, 2003
243*2003
Non-interactive public-key cryptography
UM Maurer, Y Yacobi
Workshop on the Theory and Application of of Cryptographic Techniques, 498-507, 1991
2331991
Player simulation and general adversary structures in perfect multiparty computation
M Hirt, U Maurer
Journal of cryptology 13 (1), 31-60, 2000
2132000
Complete characterization of adversaries tolerable in secure multi-party computation
M Hirt, U Maurer
PODC 97, 25-34, 1997
2111997
Indistinguishability of random systems
U Maurer
International Conference on the Theory and Applications of Cryptographic …, 2002
1952002
The Relationship Between Breaking the Diffie--Hellman Protocol and Computing Discrete Logarithms
UM Maurer, S Wolf
SIAM Journal on Computing 28 (5), 1689-1721, 1999
1871999
Linking information reconciliation and privacy amplification
C Cachin, UM Maurer
journal of Cryptology 10 (2), 97-110, 1997
1791997
Unconditional security against memory-bounded adversaries
C Cachin, U Maurer
Annual International Cryptology Conference, 292-306, 1997
1771997
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20