Ueli M. Maurer

From MaRDI portal
Person:676921

Available identifiers

zbMath Open maurer.ueli-mDBLPm/UMMaurerFactGridQ889315WikidataQ120462 ScholiaQ120462MaRDI QIDQ676921

List of research outcomes





PublicationDate of PublicationType
Anamorphic encryption, revisited2024-11-12Paper
Bitcoin as a Transaction Ledger: A Composable Treatment2024-04-21Paper
Deniable authentication when signing keys leak2023-12-12Paper
Practical provably secure flooding for blockchains2023-08-25Paper
Anonymous authenticated communication2023-07-25Paper
Giving an adversary guarantees (or: how to model designated verifier signatures in a composable framework)2023-05-12Paper
Direct product hardness amplification2023-04-13Paper
Generalized proofs of knowledge with fully dynamic setup2023-03-31Paper
Adaptive security of multi-party protocols, revisited2023-03-31Paper
MPC with synchronous security and asynchronous responsiveness2023-03-29Paper
Anonymous symmetric-key communication2022-12-16Paper
Overcoming impossibility results in composable security using interval-wise guarantees2022-11-09Paper
Multi-designated receiver signed public key encryption2022-08-30Paper
Modelling a public-key infrastructure2022-08-16Paper
Strong Separations Between Broadcast and Authenticated Channels2022-07-21Paper
Synchronous constructive cryptography2022-03-23Paper
Coupling of random systems2022-03-23Paper
Revisiting (R)CCA security and replay protection2021-12-21Paper
A calculus for secure channel establishment in open networks2021-12-20Paper
Topology-hiding computation for networks with unknown delays2021-12-01Paper
Effects of Quantization on the Multiple-Round Secret-Key Capacity2021-05-04Paper
Non-malleable encryption: simpler, shorter, stronger2020-11-06Paper
A unified and composable take on ratcheting2020-04-30Paper
Composable and finite computational security of quantum message transmission2020-04-30Paper
Efficient ratcheting: almost-optimal guarantees for secure messaging2020-02-04Paper
Composable and robust outsourced storage2020-01-21Paper
Information-theoretic secret-key agreement: the asymptotically tight relation between the secret-key rate and the channel quality ratio2018-12-11Paper
Topology-hiding computation beyond semi-honest adversaries2018-12-06Paper
Security definitions for hash functions: combining UCE and indifferentiability2018-10-17Paper
A constructive perspective on signcryption security2018-10-17Paper
Toward an algebraic theory of systems2018-09-24Paper
But why does it work? A rational protocol design treatment of bitcoin2018-07-09Paper
On composable security for digital signatures2018-05-16Paper
Strengthening access control encryption2018-04-06Paper
A unified and generalized treatment of authentication theory2017-11-16Paper
Optimal tree-based one-time digital signature schemes2017-11-16Paper
Bitcoin as a transaction ledger: a composable treatment2017-11-03Paper
Complete characterization of adversaries tolerable in secure multi-party computation (extended abstract)2017-09-29Paper
https://portal.mardi4nfdi.de/entity/Q53479852017-08-25Paper
Breaking RSA Generically Is Equivalent to Factoring2017-04-28Paper
From Indifferentiability to Constructive Cryptography (and Back)2016-12-21Paper
Network-Hiding Communication and Applications to Multi-party Protocols2016-10-27Paper
Memory erasability amplification2016-10-21Paper
Idealizing identity-based encryption2016-06-10Paper
Augmented secure channels and the goal of the TLS 1.3 record layer2016-01-27Paper
Robust authenticated encryption and the limits of symmetric cryptography2016-01-12Paper
(De-)constructing TLS 1.32016-01-12Paper
Diffie-Hellman Oracles2015-11-11Paper
Zero-knowledge proofs of knowledge for group homomorphisms2015-10-26Paper
Query-complexity amplification for random oracles2015-09-24Paper
Anonymous authentication with shared secrets2015-09-17Paper
From single-bit to multi-bit public-key encryption via non-malleable codes2015-07-06Paper
Hybrid-secure MPC, trading information-theoretic robustness for computational privacy2015-03-02Paper
Key-indistinguishable message authentication codes2014-10-14Paper
From partial consistency to global broadcast2014-09-26Paper
Broadcast amplification2014-02-18Paper
Constructing confidential channels from authenticated channels-public-key encryption revisited2013-12-10Paper
A constructive perspective on key encapsulation2013-12-10Paper
A Dynamic Tradeoff between Active and Passive Corruptions in Secure Multi-Party Computation2013-09-17Paper
Resource-restricted indifferentiability2013-05-31Paper
Universally composable synchronous computation2013-03-18Paper
Passive corruption in statistical multi-party computation. (Extended abstract)2012-11-06Paper
Collusion-preserving computation2012-09-25Paper
UOWHFs from OWFs: trading regularity for efficiency2012-09-21Paper
Constructive cryptography -- a new paradigm for security definitions and proofs2012-08-22Paper
Confidentiality and integrity: a constructive perspective2012-06-15Paper
The Leakage-Resilience Limit of a Computational Problem Is Equal to Its Unpredictability Entropy2011-12-02Paper
Graceful degradation in multi-party computation. (Extended abstract)2011-05-19Paper
Free-start distinguishing: combining two types of indistinguishability amplification2010-09-29Paper
Constructive cryptography -- a primer. (Abstract)2010-08-17Paper
Tight security proofs for the bounded-storage model2010-08-05Paper
A Hardcore Lemma for Computational Indistinguishability: Security Amplification for Arbitrarily Weak PRGs with Optimal Stretch2010-02-24Paper
Intrinsic limitations of digital signatures and how to cope with them2010-02-09Paper
Cascade Encryption Revisited2009-12-15Paper
Random Systems: Theory and Applications2009-12-03Paper
Computational Indistinguishability Amplification: Tight Product Theorems for System Composition2009-10-20Paper
Unifying Zero-Knowledge Proofs of Knowledge2009-07-07Paper
Theory of Cryptography2009-05-14Paper
Theory of Cryptography2009-05-14Paper
Breaking RSA Generically Is Equivalent to Factoring2009-05-12Paper
Domain Extension of Public Random Functions: Beyond the Birthday Barrier2009-03-10Paper
Indistinguishability Amplification2009-03-10Paper
Realistic Failures in Secure Multi-party Computation2009-03-03Paper
Introduction to the Special Issue on Information Theoretic Security2009-02-24Paper
The Bare Bounded-Storage Model: The Tight Bound on the Storage Requirement for Key Agreement2009-02-24Paper
MPC vs. SFE : Unconditional and Computational Security2009-02-10Paper
Basing PRFs on Constant-Query Weak PRFs: Minimizing Assumptions for Efficient Symmetric Cryptography2009-02-10Paper
Abstract Storage Devices2009-02-03Paper
On the Power of Quantum Memory2008-12-21Paper
Black-Box Extension Fields and the Inexistence of Field-Homomorphic One-Way Permutations2008-05-15Paper
MPC vs. SFE: Perfect Security in a Unified Corruption Model2008-03-05Paper
A Fast and Key-Efficient Reduction of Chosen-Ciphertext to Known-Plaintext Security2007-11-29Paper
Advances in Cryptology - EUROCRYPT 20042007-09-25Paper
Luby-Rackoff Ciphers from Weak Round Functions?2007-09-24Paper
Cryptography and Coding2006-11-01Paper
Cryptography and Coding2006-11-01Paper
Cryptography and Coding2006-11-01Paper
Byzantine agreement given partial broadcast2006-09-12Paper
Secure multi-party computation made simple2006-04-28Paper
General secure multi-party computation from any linear secret-sharing scheme2006-03-01Paper
Information-theoretic key agreement: from weak to strong secret for free2006-03-01Paper
Automata, Languages and Programming2006-01-10Paper
Public Key Cryptography - PKC 20052005-12-07Paper
Advances in Cryptology – CRYPTO 20042005-08-23Paper
Towards a Theory of Consistency Primitives2005-08-17Paper
Secret-key agreement over unauthenticated public channels-part II: the simulatability condition2005-06-01Paper
Secret-key agreement over unauthenticated public channels-part I: definitions and a completeness result2005-06-01Paper
Secret-key agreement over unauthenticated public channels-part III: privacy amplification2005-06-01Paper
Minimal complete primitives for secure multi-party computation2005-05-13Paper
https://portal.mardi4nfdi.de/entity/Q48175102004-09-24Paper
Optimal randomizer efficiency in the bounded-storage model2004-09-22Paper
https://portal.mardi4nfdi.de/entity/Q47372392004-08-11Paper
https://portal.mardi4nfdi.de/entity/Q47372662004-08-11Paper
https://portal.mardi4nfdi.de/entity/Q44348982003-11-26Paper
https://portal.mardi4nfdi.de/entity/Q44142652003-07-24Paper
https://portal.mardi4nfdi.de/entity/Q47854982003-07-10Paper
https://portal.mardi4nfdi.de/entity/Q44091432003-06-30Paper
https://portal.mardi4nfdi.de/entity/Q45362592003-03-07Paper
https://portal.mardi4nfdi.de/entity/Q45362632003-01-25Paper
https://portal.mardi4nfdi.de/entity/Q47837212002-12-08Paper
Player simulation and general adversary structures in perfect multiparty computation2002-06-25Paper
https://portal.mardi4nfdi.de/entity/Q45025032002-01-27Paper
https://portal.mardi4nfdi.de/entity/Q49500382001-08-20Paper
https://portal.mardi4nfdi.de/entity/Q27074112001-07-03Paper
Authentication theory and hypothesis testing2000-09-07Paper
https://portal.mardi4nfdi.de/entity/Q49418462000-07-26Paper
The Diffie-Hellman protocol2000-05-08Paper
https://portal.mardi4nfdi.de/entity/Q49406832000-03-01Paper
https://portal.mardi4nfdi.de/entity/Q49407022000-03-01Paper
https://portal.mardi4nfdi.de/entity/Q49411902000-02-29Paper
Unconditionally secure key agreement and the intrinsic conditional information1999-11-21Paper
The Relationship Between Breaking the Diffie--Hellman Protocol and Computing Discrete Logarithms1999-10-28Paper
https://portal.mardi4nfdi.de/entity/Q42496291999-09-06Paper
https://portal.mardi4nfdi.de/entity/Q42493251999-06-17Paper
https://portal.mardi4nfdi.de/entity/Q43645601998-11-03Paper
https://portal.mardi4nfdi.de/entity/Q43657461998-01-26Paper
Linking information reconciliation and privacy amplification1997-10-20Paper
A non-interactive public-key distribution system1997-10-06Paper
Cryptology: A new application of mathematics1997-04-28Paper
https://portal.mardi4nfdi.de/entity/Q48572461997-04-28Paper
Generalized privacy amplification1997-02-25Paper
https://portal.mardi4nfdi.de/entity/Q43645591997-01-01Paper
On the oracle complexity of factoring integers1996-11-17Paper
https://portal.mardi4nfdi.de/entity/Q43187151995-02-16Paper
Fast generation of prime numbers and secure public-key cryptographic parameters.1995-01-01Paper
https://portal.mardi4nfdi.de/entity/Q42796951994-11-09Paper
https://portal.mardi4nfdi.de/entity/Q42796811994-10-09Paper
https://portal.mardi4nfdi.de/entity/Q42873611994-09-04Paper
https://portal.mardi4nfdi.de/entity/Q42796981994-02-22Paper
https://portal.mardi4nfdi.de/entity/Q42795911994-02-17Paper
Secret key agreement by public discussion from common information1994-02-07Paper
https://portal.mardi4nfdi.de/entity/Q40357241993-05-18Paper
https://portal.mardi4nfdi.de/entity/Q40374931993-05-18Paper
https://portal.mardi4nfdi.de/entity/Q40368921993-05-18Paper
https://portal.mardi4nfdi.de/entity/Q40374881993-05-18Paper
Cascade ciphers: The importance of being first1993-05-16Paper
A universal statistical test for random bit generators1993-01-16Paper
Asymptotically-tight bounds on the number of cycles in generalized de Bruijn-Good graphs1993-01-16Paper
https://portal.mardi4nfdi.de/entity/Q40117741992-09-27Paper
Conditionally-perfect secrecy and a provably-secure randomized cipher1992-06-28Paper
Local randomness in pseudorandom sequences1992-06-27Paper
https://portal.mardi4nfdi.de/entity/Q39731601992-06-26Paper
https://portal.mardi4nfdi.de/entity/Q57518351990-01-01Paper
https://portal.mardi4nfdi.de/entity/Q37926291988-01-01Paper

Research outcomes over time

This page was built for person: Ueli M. Maurer