Joern Mueller-Quade

From MaRDI portal
Person:604631

Available identifiers

zbMath Open muller-quade.jornDBLPm/JMullerQuadeWikidataQ53179372 ScholiaQ53179372MaRDI QIDQ604631

List of research outcomes





PublicationDate of PublicationType
Chosen-ciphertext secure dual-receiver encryption in the standard model based on post-quantum assumptions2024-11-12Paper
Practically efficient private set intersection from trusted hardware with side-channels2024-09-13Paper
Composable long-term security with rewinding2024-08-15Paper
On the correlation complexity of MPC with cheater identification2024-07-17Paper
Universally composable auditable surveillance2024-06-26Paper
Sender-binding key encapsulation2023-11-24Paper
A new security notion for PKC in the standard model: weaker, simpler, and still realizing secure channels2023-08-10Paper
\textit{ConTra corona}: contact tracing against the coronavirus by bridging the centralized-decentralized divide for stronger privacy2023-05-12Paper
Environmentally friendly composable multi-party computation in the plain model from standard (timed) assumptions2023-03-31Paper
Initiator-resilient universally composable key exchange2022-02-16Paper
On the (im-)possibility of extending coin toss2018-11-01Paper
On "A new representation of elements of finite fields GF(2/sup m/) yielding small complexity arithmetic circuits"2018-07-09Paper
Non-malleability vs. CCA-security: the case of commitments2018-05-29Paper
Reusing tamper-proof hardware in UC-secure protocols2018-05-16Paper
A CCA2 Secure Variant of the McEliece Cryptosystem2017-06-08Paper
Synchronous universally composable computer networks2016-04-26Paper
Closing the gap: a universal privacy framework for outsourced data2016-04-26Paper
From stateful hardware to resettable hardware using symmetric assumptions2016-01-27Paper
Weakening the isolation assumption of tamper-proof hardware tokens2015-09-24Paper
Universally composable firewall architectures using trusted hardware2015-09-21Paper
General Statistically Secure Computation with Bounded-Resettable Hardware Tokens2015-07-06Paper
Defining privacy based on distributions of privacy breaches2013-12-10Paper
Polynomial runtime and composability2013-08-01Paper
Lossy codes and a new variant of the learning-with-errors problem2013-05-31Paper
IND-CCA secure cryptography based on a variant of the LPN problem2013-03-19Paper
Implementing resettable UC-functionalities with untrusted tamper-proof hardware-tokens2013-03-18Paper
Universally composable oblivious transfer from lossy encryption and the MceEliece assumptions2012-11-06Paper
Statistically secure linear-rate dimension extension for oblivious affine function evaluation2012-11-06Paper
Completeness theorems with constructive proofs for finite deterministic 2-party functions2011-05-19Paper
Unconditional and composable security using a single stateful Tamper-proof hardware token2011-05-19Paper
Efficient reductions for non-signaling cryptographic primitives2011-05-19Paper
Long-term security and universal composability2010-11-12Paper
Universally composable incoercibility2010-08-24Paper
Unconditionally Secure Homomorphic Pre-distributed Bit Commitment and Secure Two-Party Computations2010-02-09Paper
Theory of Cryptography2009-05-14Paper
Topics in Cryptology – CT-RSA 20042009-05-07Paper
A CCA2 Secure Public Key Encryption Scheme Based on the McEliece Assumptions in the Standard Model2009-04-29Paper
Secure Computability of Functions in the IT Setting with Dishonest Majority and Applications to Long-Term Security2009-03-03Paper
Oblivious Transfer Based on the McEliece Assumptions2009-01-09Paper
Cryptanalysis of a practical quantum key distribution with polarization-entangled photons2008-09-03Paper
An information theoretical model for quantum secret sharing schemes2008-09-03Paper
https://portal.mardi4nfdi.de/entity/Q35224162008-09-03Paper
Fairness and Correctness in Case of a Premature Abort2008-03-17Paper
Universally composable zero-knowledge arguments and commitments from signature cards2008-03-05Paper
Computing restrictions of ideals in finitely generated \(k\)-algebras by means of Buchberger's algorithm2007-10-23Paper
On the (Im-)Possibility of Extending Coin Toss2007-09-24Paper
Long-Term Security and Universal Composability2007-08-30Paper
On the Necessity of Rewinding in Secure Multiparty Computation2007-08-30Paper
On IND-CCA security modeling in cryptographic protocols2007-02-13Paper
SOFSEM 2005: Theory and Practice of Computer Science2005-12-07Paper
Information Security and Privacy2005-09-07Paper
Applied Cryptography and Network Security2005-06-13Paper
https://portal.mardi4nfdi.de/entity/Q44266882003-09-16Paper
Gröbner bases applied to finitely generated field extensions2002-11-11Paper
Recognizing simple subextensions of purely transcendental field extensions2002-06-18Paper
Quantum identification protocol with technologically bounded parties2001-10-14Paper
https://portal.mardi4nfdi.de/entity/Q45026462000-12-21Paper
Separation of orbits under group actions with an application to quantum systems2000-06-21Paper
Basic algorithms for rational function fields2000-05-07Paper
Freeness, linear disjointness, and implicitization -- a classical approach.2000-05-02Paper
Decomposing a matrix into circulant and diagonal factors2000-03-22Paper
https://portal.mardi4nfdi.de/entity/Q42324901999-08-17Paper
https://portal.mardi4nfdi.de/entity/Q43949741999-05-31Paper

Research outcomes over time

This page was built for person: Joern Mueller-Quade