| Secret key agreement by public discussion from common information UM Maurer IEEE transactions on information theory 39 (3), 733-742, 2002 | 2654 | 2002 |
| Generalized privacy amplification CH Bennett, G Brassard, C Crépeau, UM Maurer IEEE Transactions on Information theory 41 (6), 1915-1923, 2002 | 2098 | 2002 |
| General secure multi-party computation from any linear secret-sharing scheme R Cramer, I Damgård, U Maurer International Conference on the Theory and Applications of Cryptographic …, 2000 | 818 | 2000 |
| Indifferentiability, impossibility results on reductions, and applications to the random oracle methodology U Maurer, R Renner, C Holenstein Theory of cryptography conference, 21-39, 2004 | 651 | 2004 |
| Modelling a public-key infrastructure U Maurer European Symposium on Research in Computer Security, 325-350, 1996 | 604 | 1996 |
| Information-theoretic key agreement: From weak to strong secrecy for free U Maurer, S Wolf International Conference on the Theory and Applications of Cryptographic …, 2000 | 582 | 2000 |
| A universal statistical test for random bit generators UM Maurer Journal of cryptology 5 (2), 89-105, 1992 | 475 | 1992 |
| Conditionally-perfect secrecy and a provably-secure randomized cipher UM Maurer Journal of Cryptology 5 (1), 53-66, 1992 | 376 | 1992 |
| Digital payment systems with passive anonymity-revoking trustees J Camenisch, U Maurer, M Stadler Journal of Computer Security 5 (1), 69-89, 1997 | 374 | 1997 |
| Unconditionally secure key agreement and the intrinsic conditional information UM Maurer, S Wolf IEEE Transactions on Information Theory 45 (2), 499-514, 2002 | 360 | 2002 |
| Abstract models of computation in cryptography U Maurer IMA International Conference on Cryptography and Coding, 1-12, 2005 | 359 | 2005 |
| Towards the equivalence of breaking the Diffie-Hellman protocol and computing discrete logarithms UM Maurer Annual international cryptology conference, 271-281, 1994 | 346 | 1994 |
| Bitcoin as a transaction ledger: A composable treatment C Badertscher, U Maurer, D Tschudi, V Zikas Journal of Cryptology 37 (2), 18, 2024 | 343 | 2024 |
| New Public-Key Schemes Based on Elliptic Curves over the Ring Zn K Koyama, UM Maurer, T Okamoto, SA Vanstone Annual International Cryptology Conference, 252-266, 1991 | 337 | 1991 |
| Secret-key agreement over unauthenticated public channels. II. Privacy amplification U Maurer, S Wolf IEEE Transactions on Information Theory 49 (4), 839-851, 2003 | 320* | 2003 |
| Player simulation and general adversary structures in perfect multiparty computation M Hirt, U Maurer Journal of cryptology 13 (1), 31-60, 2000 | 314 | 2000 |
| Universally composable synchronous computation J Katz, U Maurer, B Tackmann, V Zikas Theory of Cryptography Conference, 477-498, 2013 | 282 | 2013 |
| Non-interactive public-key cryptography UM Maurer, Y Yacobi Workshop on the Theory and Application of of Cryptographic Techniques, 498-507, 1991 | 269 | 1991 |
| Indistinguishability of random systems U Maurer International Conference on the Theory and Applications of Cryptographic …, 2002 | 267 | 2002 |
| Constructive cryptography–a new paradigm for security definitions and proofs U Maurer Joint Workshop on Theory of Security and Applications, 33-56, 2011 | 260 | 2011 |