Ueli M. Maurer

From MaRDI portal
Person:676921

Available identifiers

zbMath Open maurer.ueli-mWikidataQ120462 ScholiaQ120462MaRDI QIDQ676921

List of research outcomes

PublicationDate of PublicationType
Deniable authentication when signing keys leak2023-12-12Paper
Practical provably secure flooding for blockchains2023-08-25Paper
Anonymous authenticated communication2023-07-25Paper
Giving an adversary guarantees (or: how to model designated verifier signatures in a composable framework)2023-05-12Paper
Direct product hardness amplification2023-04-13Paper
Generalized proofs of knowledge with fully dynamic setup2023-03-31Paper
Adaptive security of multi-party protocols, revisited2023-03-31Paper
MPC with synchronous security and asynchronous responsiveness2023-03-29Paper
Anonymous symmetric-key communication2022-12-16Paper
Overcoming impossibility results in composable security using interval-wise guarantees2022-11-09Paper
Multi-designated receiver signed public key encryption2022-08-30Paper
Modelling a public-key infrastructure2022-08-16Paper
Strong Separations Between Broadcast and Authenticated Channels2022-07-21Paper
Synchronous constructive cryptography2022-03-23Paper
Coupling of random systems2022-03-23Paper
Revisiting (R)CCA security and replay protection2021-12-21Paper
A calculus for secure channel establishment in open networks2021-12-20Paper
Topology-hiding computation for networks with unknown delays2021-12-01Paper
Effects of Quantization on the Multiple-Round Secret-Key Capacity2021-05-04Paper
Non-malleable encryption: simpler, shorter, stronger2020-11-06Paper
Composable and finite computational security of quantum message transmission2020-04-30Paper
A unified and composable take on ratcheting2020-04-30Paper
Efficient ratcheting: almost-optimal guarantees for secure messaging2020-02-04Paper
Composable and robust outsourced storage2020-01-21Paper
Information-theoretic secret-key agreement: the asymptotically tight relation between the secret-key rate and the channel quality ratio2018-12-11Paper
Topology-hiding computation beyond semi-honest adversaries2018-12-06Paper
Security definitions for hash functions: combining UCE and indifferentiability2018-10-17Paper
A constructive perspective on signcryption security2018-10-17Paper
Toward an algebraic theory of systems2018-09-24Paper
But why does it work? A rational protocol design treatment of bitcoin2018-07-09Paper
On composable security for digital signatures2018-05-16Paper
Strengthening access control encryption2018-04-06Paper
Optimal tree-based one-time digital signature schemes2017-11-16Paper
A unified and generalized treatment of authentication theory2017-11-16Paper
Bitcoin as a transaction ledger: a composable treatment2017-11-03Paper
Complete characterization of adversaries tolerable in secure multi-party computation (extended abstract)2017-09-29Paper
https://portal.mardi4nfdi.de/entity/Q53479852017-08-25Paper
Breaking RSA Generically Is Equivalent to Factoring2017-04-28Paper
From Indifferentiability to Constructive Cryptography (and Back)2016-12-21Paper
Network-Hiding Communication and Applications to Multi-party Protocols2016-10-27Paper
Memory Erasability Amplification2016-10-21Paper
Idealizing Identity-Based Encryption2016-06-10Paper
Augmented Secure Channels and the Goal of the TLS 1.3 Record Layer2016-01-27Paper
Robust Authenticated Encryption and the Limits of Symmetric Cryptography2016-01-12Paper
(De-)Constructing TLS 1.32016-01-12Paper
Diffie-Hellman Oracles2015-11-11Paper
Zero-knowledge proofs of knowledge for group homomorphisms2015-10-26Paper
Query-Complexity Amplification for Random Oracles2015-09-24Paper
Anonymous Authentication with Shared Secrets2015-09-17Paper
From Single-Bit to Multi-bit Public-Key Encryption via Non-malleable Codes2015-07-06Paper
Hybrid-secure MPC2015-03-02Paper
Key-Indistinguishable Message Authentication Codes2014-10-14Paper
From partial consistency to global broadcast2014-09-26Paper
Broadcast Amplification2014-02-18Paper
Constructing Confidential Channels from Authenticated Channels—Public-Key Encryption Revisited2013-12-10Paper
A Constructive Perspective on Key Encapsulation2013-12-10Paper
A Dynamic Tradeoff between Active and Passive Corruptions in Secure Multi-Party Computation2013-09-17Paper
Resource-Restricted Indifferentiability2013-05-31Paper
Universally Composable Synchronous Computation2013-03-18Paper
Passive Corruption in Statistical Multi-Party Computation2012-11-06Paper
Collusion-Preserving Computation2012-09-25Paper
UOWHFs from OWFs: Trading Regularity for Efficiency2012-09-21Paper
Constructive Cryptography – A New Paradigm for Security Definitions and Proofs2012-08-22Paper
Confidentiality and Integrity: A Constructive Perspective2012-06-15Paper
The Leakage-Resilience Limit of a Computational Problem Is Equal to Its Unpredictability Entropy2011-12-02Paper
Graceful Degradation in Multi-Party Computation (Extended Abstract)2011-05-19Paper
Free-Start Distinguishing: Combining Two Types of Indistinguishability Amplification2010-09-29Paper
Constructive Cryptography – A Primer2010-08-17Paper
Tight security proofs for the bounded-storage model2010-08-05Paper
A Hardcore Lemma for Computational Indistinguishability: Security Amplification for Arbitrarily Weak PRGs with Optimal Stretch2010-02-24Paper
Intrinsic Limitations of Digital Signatures and How to Cope with Them2010-02-09Paper
Cascade Encryption Revisited2009-12-15Paper
Random Systems: Theory and Applications2009-12-03Paper
Computational Indistinguishability Amplification: Tight Product Theorems for System Composition2009-10-20Paper
Unifying Zero-Knowledge Proofs of Knowledge2009-07-07Paper
Theory of Cryptography2009-05-14Paper
Theory of Cryptography2009-05-14Paper
Breaking RSA Generically Is Equivalent to Factoring2009-05-12Paper
Indistinguishability Amplification2009-03-10Paper
Domain Extension of Public Random Functions: Beyond the Birthday Barrier2009-03-10Paper
Realistic Failures in Secure Multi-party Computation2009-03-03Paper
Introduction to the Special Issue on Information Theoretic Security2009-02-24Paper
The Bare Bounded-Storage Model: The Tight Bound on the Storage Requirement for Key Agreement2009-02-24Paper
MPC vs. SFE : Unconditional and Computational Security2009-02-10Paper
Basing PRFs on Constant-Query Weak PRFs: Minimizing Assumptions for Efficient Symmetric Cryptography2009-02-10Paper
Abstract Storage Devices2009-02-03Paper
On the Power of Quantum Memory2008-12-21Paper
Black-Box Extension Fields and the Inexistence of Field-Homomorphic One-Way Permutations2008-05-15Paper
MPC vs. SFE: Perfect Security in a Unified Corruption Model2008-03-05Paper
A Fast and Key-Efficient Reduction of Chosen-Ciphertext to Known-Plaintext Security2007-11-29Paper
Advances in Cryptology - EUROCRYPT 20042007-09-25Paper
Luby-Rackoff Ciphers from Weak Round Functions?2007-09-24Paper
Cryptography and Coding2006-11-01Paper
Cryptography and Coding2006-11-01Paper
Cryptography and Coding2006-11-01Paper
Byzantine agreement given partial broadcast2006-09-12Paper
Secure multi-party computation made simple2006-04-28Paper
https://portal.mardi4nfdi.de/entity/Q33749182006-03-01Paper
https://portal.mardi4nfdi.de/entity/Q33749202006-03-01Paper
Automata, Languages and Programming2006-01-10Paper
Public Key Cryptography - PKC 20052005-12-07Paper
Advances in Cryptology – CRYPTO 20042005-08-23Paper
Towards a Theory of Consistency Primitives2005-08-17Paper
Secret-key agreement over unauthenticated public channels-part I: definitions and a completeness result2005-06-01Paper
Secret-key agreement over unauthenticated public channels-part II: the simulatability condition2005-06-01Paper
Secret-key agreement over unauthenticated public channels-part III: privacy amplification2005-06-01Paper
Minimal complete primitives for secure multi-party computation2005-05-13Paper
https://portal.mardi4nfdi.de/entity/Q48175102004-09-24Paper
Optimal randomizer efficiency in the bounded-storage model2004-09-22Paper
https://portal.mardi4nfdi.de/entity/Q47372392004-08-11Paper
https://portal.mardi4nfdi.de/entity/Q47372662004-08-11Paper
https://portal.mardi4nfdi.de/entity/Q44348982003-11-26Paper
https://portal.mardi4nfdi.de/entity/Q44142652003-07-24Paper
https://portal.mardi4nfdi.de/entity/Q47854982003-07-10Paper
https://portal.mardi4nfdi.de/entity/Q44091432003-06-30Paper
https://portal.mardi4nfdi.de/entity/Q45362592003-03-07Paper
https://portal.mardi4nfdi.de/entity/Q45362632003-01-25Paper
https://portal.mardi4nfdi.de/entity/Q47837212002-12-08Paper
Player simulation and general adversary structures in perfect multiparty computation2002-06-25Paper
https://portal.mardi4nfdi.de/entity/Q45025032002-01-27Paper
https://portal.mardi4nfdi.de/entity/Q49500382001-08-20Paper
https://portal.mardi4nfdi.de/entity/Q27074112001-07-03Paper
Authentication theory and hypothesis testing2000-09-07Paper
https://portal.mardi4nfdi.de/entity/Q49418462000-07-26Paper
The Diffie-Hellman protocol2000-05-08Paper
https://portal.mardi4nfdi.de/entity/Q49406832000-03-01Paper
https://portal.mardi4nfdi.de/entity/Q49407022000-03-01Paper
https://portal.mardi4nfdi.de/entity/Q49411902000-02-29Paper
Unconditionally secure key agreement and the intrinsic conditional information1999-11-21Paper
The Relationship Between Breaking the Diffie--Hellman Protocol and Computing Discrete Logarithms1999-10-28Paper
https://portal.mardi4nfdi.de/entity/Q42496291999-09-06Paper
https://portal.mardi4nfdi.de/entity/Q42493251999-06-17Paper
https://portal.mardi4nfdi.de/entity/Q43645601998-11-03Paper
https://portal.mardi4nfdi.de/entity/Q43657461998-01-26Paper
Linking information reconciliation and privacy amplification1997-10-20Paper
A non-interactive public-key distribution system1997-10-06Paper
https://portal.mardi4nfdi.de/entity/Q48572461997-04-28Paper
Cryptology: A new application of mathematics1997-04-28Paper
Generalized privacy amplification1997-02-25Paper
https://portal.mardi4nfdi.de/entity/Q43645591997-01-01Paper
On the oracle complexity of factoring integers1996-11-17Paper
https://portal.mardi4nfdi.de/entity/Q43187151995-02-16Paper
Fast generation of prime numbers and secure public-key cryptographic parameters.1995-01-01Paper
https://portal.mardi4nfdi.de/entity/Q42796951994-11-09Paper
https://portal.mardi4nfdi.de/entity/Q42796811994-10-09Paper
https://portal.mardi4nfdi.de/entity/Q42873611994-09-04Paper
https://portal.mardi4nfdi.de/entity/Q42796981994-02-22Paper
https://portal.mardi4nfdi.de/entity/Q42795911994-02-17Paper
Secret key agreement by public discussion from common information1994-02-07Paper
https://portal.mardi4nfdi.de/entity/Q40357241993-05-18Paper
https://portal.mardi4nfdi.de/entity/Q40368921993-05-18Paper
https://portal.mardi4nfdi.de/entity/Q40374881993-05-18Paper
https://portal.mardi4nfdi.de/entity/Q40374931993-05-18Paper
Cascade ciphers: The importance of being first1993-05-16Paper
A universal statistical test for random bit generators1993-01-16Paper
Asymptotically-tight bounds on the number of cycles in generalized de Bruijn-Good graphs1993-01-16Paper
https://portal.mardi4nfdi.de/entity/Q40117741992-09-27Paper
Conditionally-perfect secrecy and a provably-secure randomized cipher1992-06-28Paper
Local randomness in pseudorandom sequences1992-06-27Paper
https://portal.mardi4nfdi.de/entity/Q39731601992-06-26Paper
https://portal.mardi4nfdi.de/entity/Q57518351990-01-01Paper
https://portal.mardi4nfdi.de/entity/Q37926291988-01-01Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Ueli M. Maurer