팔로우
Ueli Maurer
Ueli Maurer
Professor of Computer Science, ETH Zurich
inf.ethz.ch의 이메일 확인됨
제목
인용
인용
연도
Secret key agreement by public discussion from common information
UM Maurer
IEEE transactions on information theory 39 (3), 733-742, 1993
24591993
Generalized privacy amplification
CH Bennett, G Brassard, C Crépeau, UM Maurer
IEEE Transactions on Information theory 41 (6), 1915-1923, 1995
19201995
General secure multi-party computation from any linear secret-sharing scheme
R Cramer, I Damgård, U Maurer
International Conference on the Theory and Applications of Cryptographic …, 2000
7522000
Indifferentiability, impossibility results on reductions, and applications to the random oracle methodology
U Maurer, R Renner, C Holenstein
Theory of Cryptography: First Theory of Cryptography Conference, TCC 2004 …, 2004
5842004
Modelling a public-key infrastructure
U Maurer
Computer Security—ESORICS 96: 4th European Symposium on Research in …, 1996
5781996
Information-theoretic key agreement: From weak to strong secrecy for free
U Maurer, S Wolf
International Conference on the Theory and Applications of Cryptographic …, 2000
5602000
A universal statistical test for random bit generators
UM Maurer
Journal of cryptology 5, 89-105, 1992
4331992
Digital payment systems with passive anonymity-revoking trustees
J Camenisch, U Maurer, M Stadler
Journal of Computer Security 5 (1), 69-89, 1997
3521997
Conditionally-perfect secrecy and a provably-secure randomized cipher
UM Maurer
Journal of Cryptology 5, 53-66, 1992
3511992
Unconditionally secure key agreement and the intrinsic conditional information
UM Maurer, S Wolf
IEEE Transactions on Information Theory 45 (2), 499-514, 1999
3461999
Towards the equivalence of breaking the Diffie-Hellman protocol and computing discrete logarithms
UM Maurer
Annual international cryptology conference, 271-281, 1994
3341994
New Public-Key Schemes Based on Elliptic Curves over the Ring Zn
K Koyama, UM Maurer, T Okamoto, SA Vanstone
Annual International Cryptology Conference, 252-266, 1991
3191991
Secret-key agreement over unauthenticated public channels. I. Definitions and a completeness result
U Maurer, S Wolf
IEEE Transactions on Information Theory 49 (4), 822-831, 2003
303*2003
Player simulation and general adversary structures in perfect multiparty computation
M Hirt, U Maurer
Journal of cryptology 13 (1), 31-60, 2000
2852000
Abstract models of computation in cryptography
U Maurer
Cryptography and Coding: 10th IMA International Conference, Cirencester, UK …, 2005
2802005
Non-interactive public-key cryptography
UM Maurer, Y Yacobi
Workshop on the Theory and Application of of Cryptographic Techniques, 498-507, 1991
2601991
Bitcoin as a transaction ledger: A composable treatment
C Badertscher, U Maurer, D Tschudi, V Zikas
Advances in Cryptology–CRYPTO 2017: 37th Annual International Cryptology …, 2017
2562017
Complete characterization of adversaries tolerable in secure multi-party computation
M Hirt, U Maurer
Proceedings of the sixteenth annual ACM symposium on Principles of …, 1997
2501997
Indistinguishability of random systems
U Maurer
Advances in Cryptology—EUROCRYPT 2002: International Conference on the …, 2002
2422002
Constructive cryptography–a new paradigm for security definitions and proofs
U Maurer
Joint Workshop on Theory of Security and Applications, 33-56, 2011
2232011
현재 시스템이 작동되지 않습니다. 나중에 다시 시도해 주세요.
학술자료 1–20