Volgen
Ueli Maurer
Ueli Maurer
Professor of Computer Science, ETH Zurich
Geverifieerd e-mailadres voor inf.ethz.ch
Titel
Geciteerd door
Geciteerd door
Jaar
Secret key agreement by public discussion from common information
UM Maurer
IEEE transactions on information theory 39 (3), 733-742, 1993
25361993
Generalized privacy amplification
CH Bennett, G Brassard, C Crépeau, UM Maurer
IEEE Transactions on Information theory 41 (6), 1915-1923, 1995
19781995
General secure multi-party computation from any linear secret-sharing scheme
R Cramer, I Damgård, U Maurer
International Conference on the Theory and Applications of Cryptographic …, 2000
7712000
Indifferentiability, impossibility results on reductions, and applications to the random oracle methodology
U Maurer, R Renner, C Holenstein
Theory of Cryptography: First Theory of Cryptography Conference, TCC 2004 …, 2004
6012004
Modelling a public-key infrastructure
U Maurer
Computer Security—ESORICS 96: 4th European Symposium on Research in …, 1996
5931996
Information-theoretic key agreement: From weak to strong secrecy for free
U Maurer, S Wolf
International Conference on the Theory and Applications of Cryptographic …, 2000
5722000
A universal statistical test for random bit generators
UM Maurer
Journal of cryptology 5, 89-105, 1992
4511992
Digital payment systems with passive anonymity-revoking trustees
J Camenisch, U Maurer, M Stadler
Journal of Computer Security 5 (1), 69-89, 1997
3661997
Conditionally-perfect secrecy and a provably-secure randomized cipher
UM Maurer
Journal of Cryptology 5, 53-66, 1992
3591992
Unconditionally secure key agreement and the intrinsic conditional information
UM Maurer, S Wolf
IEEE Transactions on Information Theory 45 (2), 499-514, 1999
3491999
Towards the equivalence of breaking the Diffie-Hellman protocol and computing discrete logarithms
UM Maurer
Annual international cryptology conference, 271-281, 1994
3391994
New Public-Key Schemes Based on Elliptic Curves over the Ring Zn
K Koyama, UM Maurer, T Okamoto, SA Vanstone
Annual International Cryptology Conference, 252-266, 1991
3211991
Secret-key agreement over unauthenticated public channels. II. Privacy amplification
U Maurer, S Wolf
IEEE Transactions on Information Theory 49 (4), 839-851, 2003
311*2003
Abstract models of computation in cryptography
U Maurer
Cryptography and Coding: 10th IMA International Conference, Cirencester, UK …, 2005
3062005
Player simulation and general adversary structures in perfect multiparty computation
M Hirt, U Maurer
Journal of cryptology 13 (1), 31-60, 2000
2932000
Bitcoin as a transaction ledger: A composable treatment
C Badertscher, U Maurer, D Tschudi, V Zikas
Journal of Cryptology 37 (2), 18, 2024
2702024
Abstraction in Cryptography.
UM Maurer
CRYPTO 5677, 465, 2009
2662009
Non-interactive public-key cryptography
UM Maurer, Y Yacobi
Workshop on the Theory and Application of of Cryptographic Techniques, 498-507, 1991
2601991
Complete characterization of adversaries tolerable in secure multi-party computation
M Hirt, U Maurer
Proceedings of the sixteenth annual ACM symposium on Principles of …, 1997
2521997
Indistinguishability of random systems
U Maurer
Advances in Cryptology—EUROCRYPT 2002: International Conference on the …, 2002
2492002
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20