Jörn Müller-Quade

From MaRDI portal
Person:604631

Available identifiers

zbMath Open muller-quade.jornWikidataQ53179372 ScholiaQ53179372MaRDI QIDQ604631

List of research outcomes

PublicationDate of PublicationType
Sender-binding key encapsulation2023-11-24Paper
A new security notion for PKC in the standard model: weaker, simpler, and still realizing secure channels2023-08-10Paper
\textit{ConTra corona}: contact tracing against the coronavirus by bridging the centralized-decentralized divide for stronger privacy2023-05-12Paper
Environmentally friendly composable multi-party computation in the plain model from standard (timed) assumptions2023-03-31Paper
Initiator-Resilient Universally Composable Key Exchange2022-02-16Paper
On the (im-)possibility of extending coin toss2018-11-01Paper
On "A new representation of elements of finite fields GF(2/sup m/) yielding small complexity arithmetic circuits"2018-07-09Paper
Non-malleability vs. CCA-security: the case of commitments2018-05-29Paper
Reusing tamper-proof hardware in UC-secure protocols2018-05-16Paper
A CCA2 Secure Variant of the McEliece Cryptosystem2017-06-08Paper
Synchronous Universally Composable Computer Networks2016-04-26Paper
Closing the Gap: A Universal Privacy Framework for Outsourced Data2016-04-26Paper
From Stateful Hardware to Resettable Hardware Using Symmetric Assumptions2016-01-27Paper
Weakening the Isolation Assumption of Tamper-Proof Hardware Tokens2015-09-24Paper
Universally Composable Firewall Architectures Using Trusted Hardware2015-09-21Paper
General Statistically Secure Computation with Bounded-Resettable Hardware Tokens2015-07-06Paper
Defining Privacy Based on Distributions of Privacy Breaches2013-12-10Paper
Polynomial runtime and composability2013-08-01Paper
Lossy Codes and a New Variant of the Learning-With-Errors Problem2013-05-31Paper
IND-CCA Secure Cryptography Based on a Variant of the LPN Problem2013-03-19Paper
Implementing Resettable UC-Functionalities with Untrusted Tamper-Proof Hardware-Tokens2013-03-18Paper
Universally Composable Oblivious Transfer from Lossy Encryption and the McEliece Assumptions2012-11-06Paper
Statistically Secure Linear-Rate Dimension Extension for Oblivious Affine Function Evaluation2012-11-06Paper
Unconditional and Composable Security Using a Single Stateful Tamper-Proof Hardware Token2011-05-19Paper
Completeness Theorems with Constructive Proofs for Finite Deterministic 2-Party Functions2011-05-19Paper
Efficient Reductions for Non-signaling Cryptographic Primitives2011-05-19Paper
Long-term security and universal composability2010-11-12Paper
Universally Composable Incoercibility2010-08-24Paper
Unconditionally Secure Homomorphic Pre-distributed Bit Commitment and Secure Two-Party Computations2010-02-09Paper
Theory of Cryptography2009-05-14Paper
Topics in Cryptology – CT-RSA 20042009-05-07Paper
A CCA2 Secure Public Key Encryption Scheme Based on the McEliece Assumptions in the Standard Model2009-04-29Paper
Secure Computability of Functions in the IT Setting with Dishonest Majority and Applications to Long-Term Security2009-03-03Paper
Oblivious Transfer Based on the McEliece Assumptions2009-01-09Paper
https://portal.mardi4nfdi.de/entity/Q35224162008-09-03Paper
https://portal.mardi4nfdi.de/entity/Q35225102008-09-03Paper
https://portal.mardi4nfdi.de/entity/Q35225212008-09-03Paper
Fairness and Correctness in Case of a Premature Abort2008-03-17Paper
https://portal.mardi4nfdi.de/entity/Q54454912008-03-05Paper
Computing restrictions of ideals in finitely generated \(k\)-algebras by means of Buchberger's algorithm2007-10-23Paper
On the (Im-)Possibility of Extending Coin Toss2007-09-24Paper
Long-Term Security and Universal Composability2007-08-30Paper
On the Necessity of Rewinding in Secure Multiparty Computation2007-08-30Paper
https://portal.mardi4nfdi.de/entity/Q34214662007-02-13Paper
SOFSEM 2005: Theory and Practice of Computer Science2005-12-07Paper
Information Security and Privacy2005-09-07Paper
Applied Cryptography and Network Security2005-06-13Paper
https://portal.mardi4nfdi.de/entity/Q44266882003-09-16Paper
Gröbner bases applied to finitely generated field extensions2002-11-11Paper
Recognizing simple subextensions of purely transcendental field extensions2002-06-18Paper
https://portal.mardi4nfdi.de/entity/Q27413912001-10-14Paper
https://portal.mardi4nfdi.de/entity/Q45026462000-12-21Paper
Separation of orbits under group actions with an application to quantum systems2000-06-21Paper
Basic algorithms for rational function fields2000-05-07Paper
Freeness, linear disjointness, and implicitization -- a classical approach.2000-05-02Paper
Decomposing a matrix into circulant and diagonal factors2000-03-22Paper
https://portal.mardi4nfdi.de/entity/Q42324901999-08-17Paper
https://portal.mardi4nfdi.de/entity/Q43949741999-05-31Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Jörn Müller-Quade