Ueli M. Maurer

From MaRDI portal
(Redirected from Person:676921)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
On broadcast in generalized network and adversarial models (edit)2026-03-31Paper
Anamorphic encryption, revisited2024-11-12Paper
Bitcoin as a Transaction Ledger: A Composable Treatment
Journal of Cryptology
2024-04-21Paper
Deniable authentication when signing keys leak
Advances in Cryptology – EUROCRYPT 2023
2023-12-12Paper
Practical provably secure flooding for blockchains
Advances in Cryptology – ASIACRYPT 2022
2023-08-25Paper
Anonymous authenticated communication
Lecture Notes in Computer Science
2023-07-25Paper
Giving an adversary guarantees (or: how to model designated verifier signatures in a composable framework)
Lecture Notes in Computer Science
2023-05-12Paper
Direct product hardness amplification2023-04-13Paper
Generalized proofs of knowledge with fully dynamic setup2023-03-31Paper
Adaptive security of multi-party protocols, revisited2023-03-31Paper
MPC with synchronous security and asynchronous responsiveness2023-03-29Paper
Anonymous symmetric-key communication2022-12-16Paper
Overcoming impossibility results in composable security using interval-wise guarantees2022-11-09Paper
Multi-designated receiver signed public key encryption2022-08-30Paper
Modelling a public-key infrastructure
Computer Security — ESORICS 96
2022-08-16Paper
Strong Separations Between Broadcast and Authenticated Channels2022-07-21Paper
Synchronous constructive cryptography2022-03-23Paper
Coupling of random systems2022-03-23Paper
Revisiting (R)CCA security and replay protection2021-12-21Paper
A calculus for secure channel establishment in open networks2021-12-20Paper
Topology-hiding computation for networks with unknown delays2021-12-01Paper
Effects of Quantization on the Multiple-Round Secret-Key Capacity2021-05-04Paper
Non-malleable encryption: simpler, shorter, stronger
Journal of Cryptology
2020-11-06Paper
Composable and finite computational security of quantum message transmission
(available as arXiv preprint)
2020-04-30Paper
A unified and composable take on ratcheting2020-04-30Paper
Efficient ratcheting: almost-optimal guarantees for secure messaging2020-02-04Paper
Composable and robust outsourced storage2020-01-21Paper
Information-theoretic secret-key agreement: the asymptotically tight relation between the secret-key rate and the channel quality ratio2018-12-11Paper
Topology-hiding computation beyond semi-honest adversaries2018-12-06Paper
A constructive perspective on signcryption security2018-10-17Paper
Security definitions for hash functions: combining UCE and indifferentiability2018-10-17Paper
Toward an algebraic theory of systems
Theoretical Computer Science
2018-09-24Paper
But why does it work? A rational protocol design treatment of bitcoin2018-07-09Paper
On composable security for digital signatures2018-05-16Paper
Strengthening access control encryption2018-04-06Paper
Optimal tree-based one-time digital signature schemes
STACS 96
2017-11-16Paper
A unified and generalized treatment of authentication theory
STACS 96
2017-11-16Paper
Bitcoin as a transaction ledger: a composable treatment2017-11-03Paper
Complete characterization of adversaries tolerable in secure multi-party computation (extended abstract)
Proceedings of the sixteenth annual ACM symposium on Principles of distributed computing - PODC '97
2017-09-29Paper
scientific article; zbMATH DE number 6765508 (Why is no real title available?)
(available as arXiv preprint)
2017-08-25Paper
Breaking RSA Generically Is Equivalent to Factoring
IEEE Transactions on Information Theory
2017-04-28Paper
From Indifferentiability to Constructive Cryptography (and Back)
Theory of Cryptography
2016-12-21Paper
Network-Hiding Communication and Applications to Multi-party Protocols
Advances in Cryptology – CRYPTO 2016
2016-10-27Paper
Memory erasability amplification
Lecture Notes in Computer Science
2016-10-21Paper
Idealizing identity-based encryption
Advances in Cryptology -- ASIACRYPT 2015
2016-06-10Paper
Augmented secure channels and the goal of the TLS 1.3 record layer
Provable Security
2016-01-27Paper
(De-)constructing TLS 1.3
Progress in Cryptology -- INDOCRYPT 2015
2016-01-12Paper
Robust authenticated encryption and the limits of symmetric cryptography
Cryptography and Coding
2016-01-12Paper
Diffie-Hellman Oracles
Advances in Cryptology — CRYPTO ’96
2015-11-11Paper
Zero-knowledge proofs of knowledge for group homomorphisms
Designs, Codes and Cryptography
2015-10-26Paper
Query-complexity amplification for random oracles
Lecture Notes in Computer Science
2015-09-24Paper
Anonymous authentication with shared secrets
Progress in Cryptology - LATINCRYPT 2014
2015-09-17Paper
From single-bit to multi-bit public-key encryption via non-malleable codes
Theory of Cryptography
2015-07-06Paper
Hybrid-secure MPC, trading information-theoretic robustness for computational privacy
Proceedings of the 29th ACM SIGACT-SIGOPS symposium on Principles of distributed computing
2015-03-02Paper
Key-indistinguishable message authentication codes
Lecture Notes in Computer Science
2014-10-14Paper
From partial consistency to global broadcast
Proceedings of the thirty-second annual ACM symposium on Theory of computing
2014-09-26Paper
Broadcast amplification
Theory of Cryptography
2014-02-18Paper
Constructing confidential channels from authenticated channels-public-key encryption revisited
Advances in Cryptology - ASIACRYPT 2013
2013-12-10Paper
A constructive perspective on key encapsulation
Lecture Notes in Computer Science
2013-12-10Paper
A Dynamic Tradeoff between Active and Passive Corruptions in Secure Multi-Party Computation
Advances in Cryptology – CRYPTO 2013
2013-09-17Paper
Resource-restricted indifferentiability
Advances in cryptology -- EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26--30, 2013. Proceedings
2013-05-31Paper
Universally composable synchronous computation
Theory of Cryptography
2013-03-18Paper
Passive corruption in statistical multi-party computation. (Extended abstract)
Lecture Notes in Computer Science
2012-11-06Paper
Collusion-preserving computation
Lecture Notes in Computer Science
2012-09-25Paper
UOWHFs from OWFs: trading regularity for efficiency
Progress in Cryptology – LATINCRYPT 2012
2012-09-21Paper
Constructive cryptography -- a new paradigm for security definitions and proofs
Theory of Security and Applications
2012-08-22Paper
Confidentiality and integrity: a constructive perspective
Theory of Cryptography
2012-06-15Paper
The Leakage-Resilience Limit of a Computational Problem Is Equal to Its Unpredictability Entropy
Lecture Notes in Computer Science
2011-12-02Paper
Graceful degradation in multi-party computation. (Extended abstract)
Lecture Notes in Computer Science
2011-05-19Paper
Free-start distinguishing: combining two types of indistinguishability amplification
Lecture Notes in Computer Science
2010-09-29Paper
Constructive cryptography -- a primer. (Abstract)
Financial Cryptography and Data Security
2010-08-17Paper
Tight security proofs for the bounded-storage model
Proceedings of the thiry-fourth annual ACM symposium on Theory of computing
2010-08-05Paper
A Hardcore Lemma for Computational Indistinguishability: Security Amplification for Arbitrarily Weak PRGs with Optimal Stretch
Theory of Cryptography
2010-02-24Paper
Intrinsic limitations of digital signatures and how to cope with them
Lecture Notes in Computer Science
2010-02-09Paper
Cascade Encryption Revisited
Advances in Cryptology – ASIACRYPT 2009
2009-12-15Paper
Random Systems: Theory and Applications
Lecture Notes in Computer Science
2009-12-03Paper
Computational Indistinguishability Amplification: Tight Product Theorems for System Composition
Advances in Cryptology - CRYPTO 2009
2009-10-20Paper
Unifying Zero-Knowledge Proofs of Knowledge
Progress in Cryptology – AFRICACRYPT 2009
2009-07-07Paper
Theory of Cryptography
Lecture Notes in Computer Science
2009-05-14Paper
Theory of Cryptography
Lecture Notes in Computer Science
2009-05-14Paper
Breaking RSA Generically Is Equivalent to Factoring
Advances in Cryptology - EUROCRYPT 2009
2009-05-12Paper
Domain Extension of Public Random Functions: Beyond the Birthday Barrier
Advances in Cryptology - CRYPTO 2007
2009-03-10Paper
Indistinguishability Amplification
Advances in Cryptology - CRYPTO 2007
2009-03-10Paper
Realistic Failures in Secure Multi-party Computation
Theory of Cryptography
2009-03-03Paper
The Bare Bounded-Storage Model: The Tight Bound on the Storage Requirement for Key Agreement
IEEE Transactions on Information Theory
2009-02-24Paper
Introduction to the Special Issue on Information Theoretic Security
IEEE Transactions on Information Theory
2009-02-24Paper
MPC vs. SFE : Unconditional and Computational Security
Advances in Cryptology - ASIACRYPT 2008
2009-02-10Paper
Basing PRFs on Constant-Query Weak PRFs: Minimizing Assumptions for Efficient Symmetric Cryptography
Advances in Cryptology - ASIACRYPT 2008
2009-02-10Paper
Abstract Storage Devices
Lecture Notes in Computer Science
2009-02-03Paper
Abstract Storage Devices
Lecture Notes in Computer Science
2009-02-03Paper
On the Power of Quantum Memory
IEEE Transactions on Information Theory
2008-12-21Paper
Black-Box Extension Fields and the Inexistence of Field-Homomorphic One-Way Permutations
Advances in Cryptology – ASIACRYPT 2007
2008-05-15Paper
MPC vs. SFE: Perfect Security in a Unified Corruption Model
Theory of Cryptography
2008-03-05Paper
A Fast and Key-Efficient Reduction of Chosen-Ciphertext to Known-Plaintext Security
Advances in Cryptology - EUROCRYPT 2007
2007-11-29Paper
Advances in Cryptology - EUROCRYPT 2004
Lecture Notes in Computer Science
2007-09-25Paper
Luby-Rackoff Ciphers from Weak Round Functions?
Advances in Cryptology - EUROCRYPT 2006
2007-09-24Paper
Cryptography and Coding
Lecture Notes in Computer Science
2006-11-01Paper
Cryptography and Coding
Lecture Notes in Computer Science
2006-11-01Paper
Cryptography and Coding
Lecture Notes in Computer Science
2006-11-01Paper
Byzantine agreement given partial broadcast
Journal of Cryptology
2006-09-12Paper
Secure multi-party computation made simple
Discrete Applied Mathematics
2006-04-28Paper
General secure multi-party computation from any linear secret-sharing scheme2006-03-01Paper
Information-theoretic key agreement: from weak to strong secret for free2006-03-01Paper
Automata, Languages and Programming
Lecture Notes in Computer Science
2006-01-10Paper
Public Key Cryptography - PKC 2005
Lecture Notes in Computer Science
2005-12-07Paper
Advances in Cryptology – CRYPTO 2004
Lecture Notes in Computer Science
2005-08-23Paper
Towards a Theory of Consistency Primitives
Lecture Notes in Computer Science
2005-08-17Paper
Secret-key agreement over unauthenticated public channels-part I: definitions and a completeness result
IEEE Transactions on Information Theory
2005-06-01Paper
Secret-key agreement over unauthenticated public channels-part III: privacy amplification
IEEE Transactions on Information Theory
2005-06-01Paper
Secret-key agreement over unauthenticated public channels-part II: the simulatability condition
IEEE Transactions on Information Theory
2005-06-01Paper
Minimal complete primitives for secure multi-party computation
Journal of Cryptology
2005-05-13Paper
scientific article; zbMATH DE number 2102675 (Why is no real title available?)2004-09-24Paper
Optimal randomizer efficiency in the bounded-storage model
Journal of Cryptology
2004-09-22Paper
scientific article; zbMATH DE number 2086702 (Why is no real title available?)2004-08-11Paper
scientific article; zbMATH DE number 2086726 (Why is no real title available?)2004-08-11Paper
scientific article; zbMATH DE number 2009979 (Why is no real title available?)2003-11-26Paper
scientific article; zbMATH DE number 1952886 (Why is no real title available?)2003-07-24Paper
scientific article; zbMATH DE number 1848306 (Why is no real title available?)2003-07-10Paper
scientific article; zbMATH DE number 1942444 (Why is no real title available?)2003-06-30Paper
scientific article; zbMATH DE number 1759322 (Why is no real title available?)2003-03-07Paper
scientific article; zbMATH DE number 1759326 (Why is no real title available?)2003-01-25Paper
scientific article; zbMATH DE number 1842487 (Why is no real title available?)2002-12-08Paper
Player simulation and general adversary structures in perfect multiparty computation
Journal of Cryptology
2002-06-25Paper
scientific article; zbMATH DE number 1504552 (Why is no real title available?)2002-01-27Paper
scientific article; zbMATH DE number 1440052 (Why is no real title available?)2001-08-20Paper
scientific article; zbMATH DE number 1583776 (Why is no real title available?)2001-07-03Paper
Authentication theory and hypothesis testing
IEEE Transactions on Information Theory
2000-09-07Paper
scientific article; zbMATH DE number 1418286 (Why is no real title available?)2000-07-26Paper
The Diffie-Hellman protocol
Designs, Codes and Cryptography
2000-05-08Paper
scientific article; zbMATH DE number 1406786 (Why is no real title available?)2000-03-01Paper
scientific article; zbMATH DE number 1406769 (Why is no real title available?)2000-03-01Paper
scientific article; zbMATH DE number 1408375 (Why is no real title available?)2000-02-29Paper
Unconditionally secure key agreement and the intrinsic conditional information
IEEE Transactions on Information Theory
1999-11-21Paper
The Relationship Between Breaking the Diffie--Hellman Protocol and Computing Discrete Logarithms
SIAM Journal on Computing
1999-10-28Paper
scientific article; zbMATH DE number 1303114 (Why is no real title available?)1999-09-06Paper
scientific article; zbMATH DE number 1302842 (Why is no real title available?)1999-06-17Paper
scientific article; zbMATH DE number 1088243 (Why is no real title available?)1998-11-03Paper
scientific article; zbMATH DE number 1088921 (Why is no real title available?)1998-01-26Paper
Linking information reconciliation and privacy amplification
Journal of Cryptology
1997-10-20Paper
A non-interactive public-key distribution system
Designs, Codes and Cryptography
1997-10-06Paper
scientific article; zbMATH DE number 820501 (Why is no real title available?)1997-04-28Paper
Cryptology: A new application of mathematics
Elemente der Mathematik
1997-04-28Paper
Generalized privacy amplification
IEEE Transactions on Information Theory
1997-02-25Paper
scientific article; zbMATH DE number 1088242 (Why is no real title available?)1997-01-01Paper
On the oracle complexity of factoring integers
Computational Complexity
1996-11-17Paper
scientific article; zbMATH DE number 708824 (Why is no real title available?)1995-02-16Paper
Fast generation of prime numbers and secure public-key cryptographic parameters.
Journal of Cryptology
1995-01-01Paper
scientific article; zbMATH DE number 503356 (Why is no real title available?)1994-11-09Paper
scientific article; zbMATH DE number 503342 (Why is no real title available?)1994-10-09Paper
scientific article; zbMATH DE number 549857 (Why is no real title available?)1994-09-04Paper
scientific article; zbMATH DE number 503359 (Why is no real title available?)1994-02-22Paper
scientific article; zbMATH DE number 503266 (Why is no real title available?)1994-02-17Paper
Secret key agreement by public discussion from common information
IEEE Transactions on Information Theory
1994-02-07Paper
scientific article; zbMATH DE number 176555 (Why is no real title available?)1993-05-18Paper
scientific article; zbMATH DE number 177614 (Why is no real title available?)1993-05-18Paper
scientific article; zbMATH DE number 177048 (Why is no real title available?)1993-05-18Paper
scientific article; zbMATH DE number 177610 (Why is no real title available?)1993-05-18Paper
Cascade ciphers: The importance of being first
Journal of Cryptology
1993-05-16Paper
A universal statistical test for random bit generators
Journal of Cryptology
1993-01-16Paper
Asymptotically-tight bounds on the number of cycles in generalized de Bruijn-Good graphs
Discrete Applied Mathematics
1993-01-16Paper
scientific article; zbMATH DE number 67086 (Why is no real title available?)1992-09-27Paper
Conditionally-perfect secrecy and a provably-secure randomized cipher
Journal of Cryptology
1992-06-28Paper
Local randomness in pseudorandom sequences
Journal of Cryptology
1992-06-27Paper
scientific article; zbMATH DE number 16481 (Why is no real title available?)1992-06-26Paper
scientific article; zbMATH DE number 4186979 (Why is no real title available?)1990-01-01Paper
scientific article; zbMATH DE number 4057444 (Why is no real title available?)1988-01-01Paper


Research outcomes over time


This page was built for person: Ueli M. Maurer