What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Ueli M. Maurer
Google Scholar
69
publications in security and cryptology related venues
Year
Venue
Title
2010
conf/tcc
A Hardcore Lemma for Computational Indistinguishability: Security Amplification for Arbitrarily Weak PRGs with Optimal Stretch.
Ueli M. Maurer
Stefano Tessaro
2009
conf/crypto
Computational Indistinguishability Amplification: Tight Product Theorems for System Composition.
Ueli M. Maurer
Stefano Tessaro
2009
conf/crypto
Abstraction in Cryptography.
Ueli M. Maurer
2009
conf/eurocrypt
Breaking RSA Generically Is Equivalent to Factoring.
Divesh Aggarwal
Ueli M. Maurer
2009
conf/asiacrypt
Cascade Encryption Revisited.
Peter Gazi
Ueli M. Maurer
2009
conf/africacrypt
Unifying Zero-Knowledge Proofs of Knowledge.
Ueli M. Maurer
2009
conf/tcc
Realistic Failures in Secure Multi-party Computation.
Vassilis Zikas
Sarah Hauser
Ueli M. Maurer
2008
conf/asiacrypt
MPC vs. SFE : Unconditional and Computational Security.
Martin Hirt
Ueli M. Maurer
Vassilis Zikas
2008
conf/asiacrypt
Basing PRFs on Constant-Query Weak PRFs: Minimizing Assumptions for Efficient Symmetric Cryptography.
Ueli M. Maurer
Stefano Tessaro
2008
conf/tcc
MPC vs. SFE: Perfect Security in a Unified Corruption Model.
Zuzana Beerliová-Trubíniová
Matthias Fitzi
Martin Hirt
Ueli M. Maurer
Vassilis Zikas
2007
conf/crypto
Domain Extension of Public Random Functions: Beyond the Birthday Barrier.
Ueli M. Maurer
Stefano Tessaro
2007
conf/crypto
Indistinguishability Amplification.
Ueli M. Maurer
Krzysztof Pietrzak
Renato Renner
2007
conf/eurocrypt
A Fast and Key-Efficient Reduction of Chosen-Ciphertext to Known-Plaintext Security.
Ueli M. Maurer
Johan Sjödin
2007
conf/asiacrypt
Black-Box Extension Fields and the Inexistence of Field-Homomorphic One-Way Permutations.
Ueli M. Maurer
Dominik Raub
2006
conf/eurocrypt
Luby-Rackoff Ciphers from Weak Round Functions?
Ueli M. Maurer
Yvonne Anne Oswald
Krzysztof Pietrzak
Johan Sjödin
2005
journals/joc
Minimal Complete Primitives for Secure Multi-Party Computation.
Matthias Fitzi
Juan A. Garay
Ueli M. Maurer
Rafail Ostrovsky
2005
journals/joc
Byzantine Agreement Given Partial Broadcast.
Jeffrey Considine
Matthias Fitzi
Matthew K. Franklin
Leonid A. Levin
Ueli M. Maurer
David Metcalf
2005
conf/pkc
Efficient Proofs of Knowledge of Discrete Logarithms and Representations in Groups with Hidden Order.
Endre Bangerter
Jan Camenisch
Ueli M. Maurer
2004
journals/joc
Optimal Randomizer Efficiency in the Bounded-Storage Model.
Stefan Dziembowski
Ueli M. Maurer
2004
conf/crypto
Complete Classification of Bilinear Hard-Core Functions.
Thomas Holenstein
Ueli M. Maurer
Johan Sjödin
2004
conf/eurocrypt
On Generating the Initial Key in the Bounded-Storage Model.
Stefan Dziembowski
Ueli M. Maurer
2004
conf/tcc
Indifferentiability, Impossibility Results on Reductions, and Applications to the Random Oracle Methodology.
Ueli M. Maurer
Renato Renner
Clemens Holenstein
2004
conf/tcc
Composition of Random Systems: When Two Weak Make One Strong.
Ueli M. Maurer
Krzysztof Pietrzak
2003
conf/eurocrypt
The Security of Many-Round Luby-Rackoff Pseudo-Random Permutations.
Ueli M. Maurer
Krzysztof Pietrzak
2002
conf/crypto
Linear VSS and Distributed Commitments Based on Secret Sharing and Pairwise Checks.
Serge Fehr
Ueli M. Maurer
2002
conf/eurocrypt
Indistinguishability of Random Systems.
Ueli M. Maurer
2002
conf/eurocrypt
Unconditional Byzantine Agreement and Multi-party Computation Secure against Dishonest Minorities from Scratch.
Matthias Fitzi
Nicolas Gisin
Ueli M. Maurer
Oliver von Rotz
2001
conf/crypto
Minimal Complete Primitives for Secure Multi-party Computation.
Matthias Fitzi
Juan A. Garay
Ueli M. Maurer
Rafail Ostrovsky
2001
conf/crypto
Robustness for Free in Unconditional Multi-party Computation.
Martin Hirt
Ueli M. Maurer
2000
journals/joc
Player Simulation and General Adversary Structures in Perfect Multiparty Computation.
Martin Hirt
Ueli M. Maurer
2000
conf/pkc
Confidence Valuation in a Public-Key Infrastructure Based on Uncertain Evidence.
Reto Kohlas
Ueli M. Maurer
2000
conf/eurocrypt
General Secure Multi-party Computation from any Linear Secret-Sharing Scheme.
Ronald Cramer
Ivan Damgård
Ueli M. Maurer
2000
conf/eurocrypt
Information-Theoretic Key Agreement: From Weak to Strong Secrecy for Free.
Ueli M. Maurer
Stefan Wolf
2000
conf/asiacrypt
Efficient Secure Multi-party Computation.
Martin Hirt
Ueli M. Maurer
Bartosz Przydatek
1999
conf/crypto
Information-Theoretic Cryptography.
Ueli M. Maurer
1999
conf/fc
Reasoning about Public-Key Certification: On Bindings between Entities and Public Keys.
Reto Kohlas
Ueli M. Maurer
1999
conf/asiacrypt
General Adversaries in Unconditional Multi-party Computation.
Matthias Fitzi
Martin Hirt
Ueli M. Maurer
1998
conf/crypto
Trading Correctness for Privacy in Unconditional Multi-Party Computation (Extended Abstract).
Matthias Fitzi
Martin Hirt
Ueli M. Maurer
1998
conf/eurocrypt
Lower Bounds on Generic Algorithms in Groups.
Ueli M. Maurer
Stefan Wolf
1997
journals/joc
Linking Information Reconciliation and Privacy Amplification.
Christian Cachin
Ueli M. Maurer
1997
conf/crypto
Privacy Amplification Secure Against Active Adversaries.
Ueli M. Maurer
Stefan Wolf
1997
conf/crypto
Unconditional Security Against Memory-Bounded Adversaries.
Christian Cachin
Ueli M. Maurer
1997
conf/eurocrypt
Information-Theoretically Secure Secret-Key Agreement by NOT Authenticated Public Discussion.
Ueli M. Maurer
1996
conf/crypto
Diffie-Hellman Oracles.
Ueli M. Maurer
Stefan Wolf
1996
conf/esorics
Digital Payment Systems with Passive Anonymity-Revoking Trustees.
Jan Camenisch
Ueli M. Maurer
Markus Stadler
1996
conf/esorics
Modelling a Public-Key Infrastructure.
Ueli M. Maurer
1996
conf/asiacrypt
Towards Characterizing When Information-Theoretic Secret Key Agreement Is Possible.
Ueli M. Maurer
Stefan Wolf
1996
conf/asiacrypt
On the Efficiency of One-Time Digital Signatures.
Daniel Bleichenbacher
Ueli M. Maurer
1995
journals/joc
Fast Generation of Prime Numbers and Secure Public-Key Cryptographic Parameters.
Ueli M. Maurer
1994
conf/crypto
Directed Acyclic Graphs, One-way Functions and Digital Signatures.
Daniel Bleichenbacher
Ueli M. Maurer
1994
conf/crypto
Towards the Equivalence of Breaking the Diffie-Hellman Protocol and Computing Discrete Logarithms
Ueli M. Maurer
1994
conf/esorics
A Calculus for Secure Channel Establishment in Open Networks.
Ueli M. Maurer
Pierre E. Schmid
1994
conf/eurocrypt
Linking Information Reconciliation and Privacy Amplification (Extended Abstract).
Christian Cachin
Ueli M. Maurer
1993
journals/joc
Cascade Ciphers: The Importance of Being First.
Ueli M. Maurer
James L. Massey
1992
journals/joc
A Universal Statistical Test for Random Bit Generators.
Ueli M. Maurer
1992
journals/joc
Conditionally-Perfect Secrecy and a Provably-Secure Randomized Cipher.
Ueli M. Maurer
1992
conf/crypto
Protocols for Secret Key Agreement by Public Discussion Based on Common Information.
Ueli M. Maurer
1992
conf/eurocrypt
Factoring with an Oracle.
Ueli M. Maurer
1992
conf/eurocrypt
A Simplified and Generalized Treatment of Luby-Rackoff Pseudorandom Permutation Generator.
Ueli M. Maurer
1992
conf/eurocrypt
A Remark on a Non-interactive Public-Key Distribution System.
Ueli M. Maurer
Yacov Yacobi
1991
journals/joc
Local Randomness in Pseudorandom Sequences.
Ueli M. Maurer
James L. Massey
1991
conf/crypto
New Public-Key Schemes Based on Elliptic Curves over the Ring Z<sub>n</sub>.
Kenji Koyama
Ueli M. Maurer
Tatsuaki Okamoto
Scott A. Vanstone
1991
conf/eurocrypt
New Approaches to the Design of Self-Synchronizing Stream Ciphers.
Ueli M. Maurer
1991
conf/eurocrypt
Non-interactive Public-Key Cryptography.
Ueli M. Maurer
Yacov Yacobi
1990
conf/crypto
A Universal Statistical Test for Random Bit Generators.
Ueli M. Maurer
1990
conf/eurocrypt
A Provably-Secure Strongly-Randomized Cipher.
Ueli M. Maurer
1989
conf/crypto
Perfect Local Randomness in Pseudo-Random Sequences.
Ueli M. Maurer
James L. Massey
1989
conf/eurocrypt
Fast Generation of Secure RSA-Moduli with Almost Maximal Diversity.
Ueli M. Maurer
1987
conf/eurocrypt
Non-Expanding, Key-Minimal, Robustly-Perfect, Linear and Bilinear Ciphers.
James L. Massey
Ueli M. Maurer
Muzhong Wang
Coauthors
Bartosz Przydatek
(1)
Christian Cachin
(3)
Clemens Holenstein
(1)
Daniel Bleichenbacher
(2)
David Metcalf
(1)
Divesh Aggarwal
(1)
Dominik Raub
(1)
Endre Bangerter
(1)
Ivan Damgård
(1)
James L. Massey
(4)
Jan Camenisch
(2)
Jeffrey Considine
(1)
Johan Sjödin
(3)
Juan A. Garay
(2)
Kenji Koyama
(1)
Krzysztof Pietrzak
(4)
Leonid A. Levin
(1)
Markus Stadler
(1)
Martin Hirt
(7)
Matthew K. Franklin
(1)
Matthias Fitzi
(7)
Muzhong Wang
(1)
Nicolas Gisin
(1)
Oliver von Rotz
(1)
Peter Gazi
(1)
Pierre E. Schmid
(1)
Rafail Ostrovsky
(2)
Renato Renner
(2)
Reto Kohlas
(2)
Ronald Cramer
(1)
Sarah Hauser
(1)
Scott A. Vanstone
(1)
Serge Fehr
(1)
Stefan Dziembowski
(2)
Stefan Wolf
(5)
Stefano Tessaro
(4)
Tatsuaki Okamoto
(1)
Thomas Holenstein
(1)
Ueli M. Maurer
(69)
Vassilis Zikas
(3)
Yacov Yacobi
(2)
Yvonne Anne Oswald
(1)
Zuzana Beerliová-Trubíniová
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to