Martin Hirt

From MaRDI portal
Person:1976003



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Multi-threshold asynchronous reliable broadcast and consensus2026-03-31Paper
Anamorphic encryption, revisited2024-11-12Paper
Efficient MPC with a Mixed Adversary2023-11-02Paper
From partial to global asynchronous reliable broadcast2023-11-02Paper
Brief announcement: Multi-threshold asynchronous reliable broadcast and consensus2023-11-02Paper
On communication-efficient asynchronous MPC with adaptive security2023-04-13Paper
Round-efficient Byzantine agreement and multi-party computation with asynchronous fallback2023-03-31Paper
Adaptive security of multi-party protocols, revisited2023-03-31Paper
Complete characterization of adversaries tolerable in secure multi-party computation (extended abstract)
Proceedings of the sixteenth annual ACM symposium on Principles of distributed computing - PODC '97
2017-09-29Paper
Constant-round asynchronous multi-party computation based on one-way functions
Advances in Cryptology – ASIACRYPT 2016
2017-01-06Paper
Network-Hiding Communication and Applications to Multi-party Protocols
Advances in Cryptology – CRYPTO 2016
2016-10-27Paper
Anonymous authentication with shared secrets
Progress in Cryptology - LATINCRYPT 2014
2015-09-17Paper
Optimally efficient multi-valued byzantine agreement
Proceedings of the twenty-fifth annual ACM symposium on Principles of distributed computing
2015-03-10Paper
On the theoretical gap between synchronous and asynchronous MPC protocols
Proceedings of the 29th ACM SIGACT-SIGOPS symposium on Principles of distributed computing
2015-03-02Paper
Multi-valued Byzantine broadcast: the \(t < n\) case
Lecture Notes in Computer Science
2015-01-06Paper
Key-indistinguishable message authentication codes
Lecture Notes in Computer Science
2014-10-14Paper
Broadcast amplification
Theory of Cryptography
2014-02-18Paper
Efficient general-adversary multi-party computation
Advances in Cryptology - ASIACRYPT 2013
2013-12-10Paper
A Dynamic Tradeoff between Active and Passive Corruptions in Secure Multi-Party Computation
Advances in Cryptology – CRYPTO 2013
2013-09-17Paper
On the complexity of broadcast setup
Automata, Languages, and Programming
2013-08-06Paper
Resource-restricted indifferentiability
Advances in cryptology -- EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26--30, 2013. Proceedings
2013-05-31Paper
Passive corruption in statistical multi-party computation. (Extended abstract)
Lecture Notes in Computer Science
2012-11-06Paper
Player-centric Byzantine agreement
Automata, Languages and Programming
2011-07-06Paper
Graceful degradation in multi-party computation. (Extended abstract)
Lecture Notes in Computer Science
2011-05-19Paper
Receipt-Free K-out-of-L Voting Based on ElGamal Encryption
Towards Trustworthy Elections
2010-06-17Paper
Adaptively secure broadcast
Advances in Cryptology – EUROCRYPT 2010
2010-06-01Paper
MPC vs. SFE : Unconditional and Computational Security
Advances in Cryptology - ASIACRYPT 2008
2009-02-10Paper
Asynchronous Multi-Party Computation with Quadratic Communication
Automata, Languages and Programming
2008-08-19Paper
Efficient Byzantine Agreement with Faulty Minority
Advances in Cryptology – ASIACRYPT 2007
2008-05-15Paper
Simple and Efficient Perfectly-Secure Asynchronous MPC
Advances in Cryptology – ASIACRYPT 2007
2008-05-15Paper
Cryptographic Asynchronous Multi-party Computation with Optimal Resilience
Lecture Notes in Computer Science
2008-05-06Paper
Upper Bounds on the Communication Complexity of Optimally Resilient Cryptographic Multiparty Computation
Lecture Notes in Computer Science
2008-03-18Paper
Perfectly-Secure MPC with Linear Communication Complexity
Theory of Cryptography
2008-03-05Paper
MPC vs. SFE: Perfect Security in a Unified Corruption Model
Theory of Cryptography
2008-03-05Paper
Robust Multiparty Computation with Linear Communication Complexity
Lecture Notes in Computer Science
2007-09-04Paper
Theory of Cryptography
Lecture Notes in Computer Science
2007-02-12Paper
Efficent receipt-free voting based on homomorphic encryption2006-03-01Paper
scientific article; zbMATH DE number 2009948 (Why is no real title available?)2003-11-26Paper
scientific article; zbMATH DE number 1842487 (Why is no real title available?)2002-12-08Paper
Player simulation and general adversary structures in perfect multiparty computation
Journal of Cryptology
2002-06-25Paper
scientific article; zbMATH DE number 1504552 (Why is no real title available?)2002-01-27Paper
scientific article; zbMATH DE number 1583776 (Why is no real title available?)2001-07-03Paper
scientific article; zbMATH DE number 1304080 (Why is no real title available?)1999-06-17Paper
scientific article; zbMATH DE number 1302842 (Why is no real title available?)1999-06-17Paper


Research outcomes over time


This page was built for person: Martin Hirt