Joern Mueller-Quade

From MaRDI portal
Person:604631



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Chosen-ciphertext secure dual-receiver encryption in the standard model based on post-quantum assumptions2024-11-12Paper
Practically efficient private set intersection from trusted hardware with side-channels2024-09-13Paper
Composable long-term security with rewinding2024-08-15Paper
On the correlation complexity of MPC with cheater identification2024-07-17Paper
Universally composable auditable surveillance2024-06-26Paper
Sender-binding key encapsulation
Lecture Notes in Computer Science
2023-11-24Paper
A new security notion for PKC in the standard model: weaker, simpler, and still realizing secure channels
Public-Key Cryptography – PKC 2022
2023-08-10Paper
\textit{ConTra corona}: contact tracing against the coronavirus by bridging the centralized-decentralized divide for stronger privacy
Lecture Notes in Computer Science
2023-05-12Paper
Environmentally friendly composable multi-party computation in the plain model from standard (timed) assumptions2023-03-31Paper
Initiator-resilient universally composable key exchange
Computer Security – ESORICS 2003
2022-02-16Paper
On the (im-)possibility of extending coin toss
Journal of Cryptology
2018-11-01Paper
On "A new representation of elements of finite fields GF(2/sup m/) yielding small complexity arithmetic circuits"
IEEE Transactions on Computers
2018-07-09Paper
Non-malleability vs. CCA-security: the case of commitments2018-05-29Paper
Reusing tamper-proof hardware in UC-secure protocols2018-05-16Paper
A CCA2 Secure Variant of the McEliece Cryptosystem
IEEE Transactions on Information Theory
2017-06-08Paper
Synchronous universally composable computer networks
Cryptography and Information Security in the Balkans
2016-04-26Paper
Closing the gap: a universal privacy framework for outsourced data
Cryptography and Information Security in the Balkans
2016-04-26Paper
From stateful hardware to resettable hardware using symmetric assumptions
Provable Security
2016-01-27Paper
Weakening the isolation assumption of tamper-proof hardware tokens
Lecture Notes in Computer Science
2015-09-24Paper
Universally composable firewall architectures using trusted hardware
Cryptography and Information Security in the Balkans
2015-09-21Paper
General Statistically Secure Computation with Bounded-Resettable Hardware Tokens
Theory of Cryptography
2015-07-06Paper
Defining privacy based on distributions of privacy breaches
Lecture Notes in Computer Science
2013-12-10Paper
Polynomial runtime and composability
Journal of Cryptology
2013-08-01Paper
Lossy codes and a new variant of the learning-with-errors problem
Advances in cryptology -- EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26--30, 2013. Proceedings
2013-05-31Paper
IND-CCA secure cryptography based on a variant of the LPN problem
Advances in Cryptology – ASIACRYPT 2012
2013-03-19Paper
Implementing resettable UC-functionalities with untrusted tamper-proof hardware-tokens
Theory of Cryptography
2013-03-18Paper
Universally composable oblivious transfer from lossy encryption and the MceEliece assumptions
Lecture Notes in Computer Science
2012-11-06Paper
Statistically secure linear-rate dimension extension for oblivious affine function evaluation
Lecture Notes in Computer Science
2012-11-06Paper
Completeness theorems with constructive proofs for finite deterministic 2-party functions
Theory of Cryptography
2011-05-19Paper
Unconditional and composable security using a single stateful Tamper-proof hardware token
Theory of Cryptography
2011-05-19Paper
Efficient reductions for non-signaling cryptographic primitives
Lecture Notes in Computer Science
2011-05-19Paper
Long-term security and universal composability
Journal of Cryptology
2010-11-12Paper
Universally composable incoercibility
Advances in Cryptology – CRYPTO 2010
2010-08-24Paper
Unconditionally Secure Homomorphic Pre-distributed Bit Commitment and Secure Two-Party Computations
Lecture Notes in Computer Science
2010-02-09Paper
Theory of Cryptography
Lecture Notes in Computer Science
2009-05-14Paper
Topics in Cryptology – CT-RSA 2004
Lecture Notes in Computer Science
2009-05-07Paper
A CCA2 Secure Public Key Encryption Scheme Based on the McEliece Assumptions in the Standard Model
Topics in Cryptology – CT-RSA 2009
2009-04-29Paper
Secure Computability of Functions in the IT Setting with Dishonest Majority and Applications to Long-Term Security
Theory of Cryptography
2009-03-03Paper
Oblivious Transfer Based on the McEliece Assumptions
Lecture Notes in Computer Science
2009-01-09Paper
Cryptanalysis of a practical quantum key distribution with polarization-entangled photons
(available as arXiv preprint)
2008-09-03Paper
An information theoretical model for quantum secret sharing schemes2008-09-03Paper
scientific article; zbMATH DE number 5320218 (Why is no real title available?)2008-09-03Paper
Fairness and Correctness in Case of a Premature Abort
Progress in Cryptology - INDOCRYPT 2005
2008-03-17Paper
Universally composable zero-knowledge arguments and commitments from signature cards2008-03-05Paper
Computing restrictions of ideals in finitely generated \(k\)-algebras by means of Buchberger's algorithm
Journal of Symbolic Computation
2007-10-23Paper
On the (Im-)Possibility of Extending Coin Toss
Advances in Cryptology - EUROCRYPT 2006
2007-09-24Paper
Long-Term Security and Universal Composability
Theory of Cryptography
2007-08-30Paper
On the Necessity of Rewinding in Secure Multiparty Computation
Theory of Cryptography
2007-08-30Paper
On IND-CCA security modeling in cryptographic protocols2007-02-13Paper
SOFSEM 2005: Theory and Practice of Computer Science
Lecture Notes in Computer Science
2005-12-07Paper
Information Security and Privacy
Lecture Notes in Computer Science
2005-09-07Paper
Applied Cryptography and Network Security
Lecture Notes in Computer Science
2005-06-13Paper
scientific article; zbMATH DE number 1982619 (Why is no real title available?)2003-09-16Paper
Gröbner bases applied to finitely generated field extensions
Journal of Symbolic Computation
2002-11-11Paper
Recognizing simple subextensions of purely transcendental field extensions
Applicable Algebra in Engineering, Communication and Computing
2002-06-18Paper
Quantum identification protocol with technologically bounded parties2001-10-14Paper
scientific article; zbMATH DE number 1504682 (Why is no real title available?)2000-12-21Paper
Separation of orbits under group actions with an application to quantum systems
Applicable Algebra in Engineering, Communication and Computing
2000-06-21Paper
Basic algorithms for rational function fields
Journal of Symbolic Computation
2000-05-07Paper
Freeness, linear disjointness, and implicitization -- a classical approach.
Beiträge zur Algebra und Geometrie
2000-05-02Paper
Freeness, linear disjointness, and implicitization -- a classical approach.
Beiträge zur Algebra und Geometrie
2000-05-02Paper
Decomposing a matrix into circulant and diagonal factors
Linear Algebra and its Applications
2000-03-22Paper
scientific article; zbMATH DE number 1262442 (Why is no real title available?)1999-08-17Paper
scientific article; zbMATH DE number 1163439 (Why is no real title available?)1999-05-31Paper


Research outcomes over time


This page was built for person: Joern Mueller-Quade