[go: up one dir, main page]

Follow
Ueli Maurer
Ueli Maurer
Professor of Computer Science, ETH Zurich
Verified email at inf.ethz.ch
Title
Cited by
Cited by
Year
Secret key agreement by public discussion from common information
UM Maurer
IEEE transactions on information theory 39 (3), 733-742, 2002
26542002
Generalized privacy amplification
CH Bennett, G Brassard, C Crépeau, UM Maurer
IEEE Transactions on Information theory 41 (6), 1915-1923, 2002
20982002
General secure multi-party computation from any linear secret-sharing scheme
R Cramer, I Damgård, U Maurer
International Conference on the Theory and Applications of Cryptographic …, 2000
8182000
Indifferentiability, impossibility results on reductions, and applications to the random oracle methodology
U Maurer, R Renner, C Holenstein
Theory of cryptography conference, 21-39, 2004
6512004
Modelling a public-key infrastructure
U Maurer
European Symposium on Research in Computer Security, 325-350, 1996
6041996
Information-theoretic key agreement: From weak to strong secrecy for free
U Maurer, S Wolf
International Conference on the Theory and Applications of Cryptographic …, 2000
5822000
A universal statistical test for random bit generators
UM Maurer
Journal of cryptology 5 (2), 89-105, 1992
4751992
Conditionally-perfect secrecy and a provably-secure randomized cipher
UM Maurer
Journal of Cryptology 5 (1), 53-66, 1992
3761992
Digital payment systems with passive anonymity-revoking trustees
J Camenisch, U Maurer, M Stadler
Journal of Computer Security 5 (1), 69-89, 1997
3741997
Unconditionally secure key agreement and the intrinsic conditional information
UM Maurer, S Wolf
IEEE Transactions on Information Theory 45 (2), 499-514, 2002
3602002
Abstract models of computation in cryptography
U Maurer
IMA International Conference on Cryptography and Coding, 1-12, 2005
3592005
Towards the equivalence of breaking the Diffie-Hellman protocol and computing discrete logarithms
UM Maurer
Annual international cryptology conference, 271-281, 1994
3461994
Bitcoin as a transaction ledger: A composable treatment
C Badertscher, U Maurer, D Tschudi, V Zikas
Journal of Cryptology 37 (2), 18, 2024
3432024
New Public-Key Schemes Based on Elliptic Curves over the Ring Zn
K Koyama, UM Maurer, T Okamoto, SA Vanstone
Annual International Cryptology Conference, 252-266, 1991
3371991
Secret-key agreement over unauthenticated public channels. II. Privacy amplification
U Maurer, S Wolf
IEEE Transactions on Information Theory 49 (4), 839-851, 2003
320*2003
Player simulation and general adversary structures in perfect multiparty computation
M Hirt, U Maurer
Journal of cryptology 13 (1), 31-60, 2000
3142000
Universally composable synchronous computation
J Katz, U Maurer, B Tackmann, V Zikas
Theory of Cryptography Conference, 477-498, 2013
2822013
Non-interactive public-key cryptography
UM Maurer, Y Yacobi
Workshop on the Theory and Application of of Cryptographic Techniques, 498-507, 1991
2691991
Indistinguishability of random systems
U Maurer
International Conference on the Theory and Applications of Cryptographic …, 2002
2672002
Constructive cryptography–a new paradigm for security definitions and proofs
U Maurer
Joint Workshop on Theory of Security and Applications, 33-56, 2011
2602011
The system can't perform the operation now. Try again later.
Articles 1–20