dblp.uni-trier.dewww.uni-trier.de

Ueli M. Maurer Vis

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo
Home Page

*2009
111EEUeli M. Maurer: Unifying Zero-Knowledge Proofs of Knowledge. AFRICACRYPT 2009: 272-286
110EEUeli M. Maurer, Stefano Tessaro: Computational Indistinguishability Amplification: Tight Product Theorems for System Composition. CRYPTO 2009: 355-373
109EEUeli M. Maurer: Abstraction in Cryptography. CRYPTO 2009: 465
108EEDivesh Aggarwal, Ueli M. Maurer: Breaking RSA Generically Is Equivalent to Factoring. EUROCRYPT 2009: 36-53
107EERobert König, Ueli M. Maurer, Stefano Tessaro: Abstract Storage Devices. SOFSEM 2009: 341-352
106EEVassilis Zikas, Sarah Hauser, Ueli M. Maurer: Realistic Failures in Secure Multi-party Computation. TCC 2009: 274-293
2008
105 Johannes Blömer, Dan Boneh, Ronald Cramer, Ueli M. Maurer: Cryptography, 16.09. - 21.09.2007 Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany 2008
104EEMartin Hirt, Ueli M. Maurer, Vassilis Zikas: MPC vs. SFE : Unconditional and Computational Security. ASIACRYPT 2008: 1-18
103EEUeli M. Maurer, Stefano Tessaro: Basing PRFs on Constant-Query Weak PRFs: Minimizing Assumptions for Efficient Symmetric Cryptography. ASIACRYPT 2008: 161-178
102 Ueli M. Maurer: Rethinking Digital Signatures. SECRYPT 2008: 31-33
101EEZuzana Beerliová-Trubíniová, Matthias Fitzi, Martin Hirt, Ueli M. Maurer, Vassilis Zikas: MPC vs. SFE: Perfect Security in a Unified Corruption Model. TCC 2008: 231-250
100EEHideki Imai, Goichiro Hanaoka, Ueli M. Maurer, Yuliang Zheng: Introduction to the Special Issue on Information Theoretic Security. IEEE Transactions on Information Theory 54(6): 2405-2407 (2008)
99EEStefan Dziembowski, Ueli M. Maurer: The Bare Bounded-Storage Model: The Tight Bound on the Storage Requirement for Key Agreement. IEEE Transactions on Information Theory 54(6): 2790-2792 (2008)
2007
98EEUeli M. Maurer, Dominik Raub: Black-Box Extension Fields and the Inexistence of Field-Homomorphic One-Way Permutations. ASIACRYPT 2007: 427-443
97EEUeli M. Maurer, Krzysztof Pietrzak, Renato Renner: Indistinguishability Amplification. CRYPTO 2007: 130-149
96EEUeli M. Maurer, Stefano Tessaro: Domain Extension of Public Random Functions: Beyond the Birthday Barrier. CRYPTO 2007: 187-204
95EEJohannes Blömer, Dan Boneh, Ronald Cramer, Ueli M. Maurer: 07381 Abstracts Collection -- Cryptography. Cryptography 2007
94EEJohannes Blömer, Dan Boneh, Ronald Cramer, Ueli M. Maurer: 07381 Executive Summary - Cryptography. Cryptography 2007
93EEUeli M. Maurer, Johan Sjödin: A Fast and Key-Efficient Reduction of Chosen-Ciphertext to Known-Plaintext Security. EUROCRYPT 2007: 498-516
92EERobert König, Ueli M. Maurer, Stefano Tessaro: Abstract Storage Devices CoRR abs/0706.2746: (2007)
2006
91EEUeli M. Maurer, Yvonne Anne Oswald, Krzysztof Pietrzak, Johan Sjödin: Luby-Rackoff Ciphers from Weak Round Functions? EUROCRYPT 2006: 391-408
90EEUeli M. Maurer: Secure multi-party computation made simple. Discrete Applied Mathematics 154(2): 370-381 (2006)
2005
89EEUeli M. Maurer, Johan Sjödin: Single-Key AIL-MACs from Any FIL-MAC. ICALP 2005: 472-484
88EEUeli M. Maurer: Abstract Models of Computation in Cryptography. IMA Int. Conf. 2005: 1-12
87EEUeli M. Maurer, Johan Sjödin: Domain Expansion of MACs: Alternative Uses of the FIL-MAC. IMA Int. Conf. 2005: 168-185
86EERobert König, Ueli M. Maurer: Generalized Strong Extractors and Deterministic Privacy Amplification. IMA Int. Conf. 2005: 322-339
85EEEndre Bangerter, Jan Camenisch, Ueli M. Maurer: Efficient Proofs of Knowledge of Discrete Logarithms and Representations in Groups with Hidden Order. Public Key Cryptography 2005: 154-171
84EERobert König, Ueli M. Maurer, Renato Renner: On the power of quantum memory. IEEE Transactions on Information Theory 51(7): 2391-2401 (2005)
83EEMatthias Fitzi, Juan A. Garay, Ueli M. Maurer, Rafail Ostrovsky: Minimal Complete Primitives for Secure Multi-Party Computation. J. Cryptology 18(1): 37-61 (2005)
82EEJeffrey Considine, Matthias Fitzi, Matthew K. Franklin, Leonid A. Levin, Ueli M. Maurer, David Metcalf: Byzantine Agreement Given Partial Broadcast. J. Cryptology 18(3): 191-217 (2005)
2004
81EEThomas Holenstein, Ueli M. Maurer, Johan Sjödin: Complete Classification of Bilinear Hard-Core Functions. CRYPTO 2004: 73-91
80EEUeli M. Maurer: Towards a Theory of Consistency Primitives. DISC 2004: 379-389
79EEStefan Dziembowski, Ueli M. Maurer: On Generating the Initial Key in the Bounded-Storage Model. EUROCRYPT 2004: 126-137
78EEUeli M. Maurer: The Role of Cryptography in Database Security. SIGMOD Conference 2004: 5-10
77EEUeli M. Maurer, Renato Renner, Clemens Holenstein: Indifferentiability, Impossibility Results on Reductions, and Applications to the Random Oracle Methodology. TCC 2004: 21-39
76EEUeli M. Maurer, Krzysztof Pietrzak: Composition of Random Systems: When Two Weak Make One Strong. TCC 2004: 410-427
75EEStefan Dziembowski, Ueli M. Maurer: Optimal Randomizer Efficiency in the Bounded-Storage Model. J. Cryptology 17(1): 5-26 (2004)
74 Ueli M. Maurer: New Approaches to Digital Evidence. Proceedings of the IEEE 92(6): 933-947 (2004)
2003
73EEUeli M. Maurer, Krzysztof Pietrzak: The Security of Many-Round Luby-Rackoff Pseudo-Random Permutations. EUROCRYPT 2003: 544-561
72EEUeli M. Maurer: Intrinsic Limitations of Digital Signatures and How to Cope with Them. ISC 2003: 180-192
71 Ueli M. Maurer, Stefan Wolf: Secret-key agreement over unauthenticated public channels I: Definitions and a completeness result. IEEE Transactions on Information Theory 49(4): 822-831 (2003)
70 Ueli M. Maurer, Stefan Wolf: Secret-key agreement over unauthenticated public channels II: the simulatability condition. IEEE Transactions on Information Theory 49(4): 832-838 (2003)
69 Ueli M. Maurer, Stefan Wolf: Secret-key agreement over unauthenticated public channels III: Privacy amplification. IEEE Transactions on Information Theory 49(4): 839-851 (2003)
2002
68EESerge Fehr, Ueli M. Maurer: Linear VSS and Distributed Commitments Based on Secret Sharing and Pairwise Checks. CRYPTO 2002: 565-580
67EEUeli M. Maurer: Indistinguishability of Random Systems. EUROCRYPT 2002: 110-132
66EEMatthias Fitzi, Nicolas Gisin, Ueli M. Maurer, Oliver von Rotz: Unconditional Byzantine Agreement and Multi-party Computation Secure against Dishonest Minorities from Scratch. EUROCRYPT 2002: 482-501
65EEUeli M. Maurer: Secure Multi-party Computation Made Simple. SCN 2002: 14-28
64EEStefan Dziembowski, Ueli M. Maurer: Tight security proofs for the bounded-storage model. STOC 2002: 341-350
2001
63EEMartin Hirt, Ueli M. Maurer: Robustness for Free in Unconditional Multi-party Computation. CRYPTO 2001: 101-118
62EEMatthias Fitzi, Juan A. Garay, Ueli M. Maurer, Rafail Ostrovsky: Minimal Complete Primitives for Secure Multi-party Computation. CRYPTO 2001: 80-100
61EEUeli M. Maurer: Cryptography 2000±10. Informatics 2001: 63-85
2000
60EEMartin Hirt, Ueli M. Maurer, Bartosz Przydatek: Efficient Secure Multi-party Computation. ASIACRYPT 2000: 143-161
59EERonald Cramer, Ivan Damgård, Ueli M. Maurer: General Secure Multi-party Computation from any Linear Secret-Sharing Scheme. EUROCRYPT 2000: 316-334
58EEUeli M. Maurer, Stefan Wolf: Information-Theoretic Key Agreement: From Weak to Strong Secrecy for Free. EUROCRYPT 2000: 351-368
57 Reto Kohlas, Ueli M. Maurer: Confidence Valuation in a Public-Key Infrastructure Based on Uncertain Evidence. Public Key Cryptography 2000: 93-112
56EEMatthias Fitzi, Ueli M. Maurer: From partial consistency to global broadcast. STOC 2000: 494-503
55 Ueli M. Maurer, Stefan Wolf: The Diffie-Hellman Protocol. Des. Codes Cryptography 19(2/3): 147-171 (2000)
54 Ueli M. Maurer: Authentication theory and hypothesis testing. IEEE Transactions on Information Theory 46(4): 1350-1356 (2000)
53EEMartin Hirt, Ueli M. Maurer: Player Simulation and General Adversary Structures in Perfect Multiparty Computation. J. Cryptology 13(1): 31-60 (2000)
1999
52EEMatthias Fitzi, Martin Hirt, Ueli M. Maurer: General Adversaries in Unconditional Multi-party Computation. ASIACRYPT 1999: 232-246
51EEUeli M. Maurer: Information-Theoretic Cryptography. CRYPTO 1999: 47-64
50EEBernd Altmann, Matthias Fitzi, Ueli M. Maurer: Byzantine Agreement Secure against General Adversaries in the Dual Failure Model. DISC 1999: 123-137
49EEReto Kohlas, Ueli M. Maurer: Reasoning about Public-Key Certification: On Bindings between Entities and Public Keys. Financial Cryptography 1999: 86-103
48 Ueli M. Maurer: Kryptographie: Basistechnologie der Informationsgesellschaft (Zusammenfassung). GI Jahrestagung 1999: 15
47 Ueli M. Maurer, Stefan Wolf: Unconditionally Secure Key Agreement and the Intrinsic Conditional Information. IEEE Transactions on Information Theory 45(2): 499-514 (1999)
46 Ueli M. Maurer, Stefan Wolf: The Relationship Between Breaking the Diffie-Hellman Protocol and Computing Discrete Logarithms. SIAM J. Comput. 28(5): 1689-1721 (1999)
1998
45EEMatthias Fitzi, Martin Hirt, Ueli M. Maurer: Trading Correctness for Privacy in Unconditional Multi-Party Computation (Extended Abstract). CRYPTO 1998: 121-136
44EEMatthias Fitzi, Ueli M. Maurer: Efficient Byzantine Agreement Secure Against General Adversaries. DISC 1998: 134-148
43EEUeli M. Maurer, Stefan Wolf: Lower Bounds on Generic Algorithms in Groups. EUROCRYPT 1998: 72-84
1997
42EEChristian Cachin, Ueli M. Maurer: Unconditional Security Against Memory-Bounded Adversaries. CRYPTO 1997: 292-306
41EEUeli M. Maurer, Stefan Wolf: Privacy Amplification Secure Against Active Adversaries. CRYPTO 1997: 307-321
40EEUeli M. Maurer: Information-Theoretically Secure Secret-Key Agreement by NOT Authenticated Public Discussion. EUROCRYPT 1997: 209-225
39 Martin Hirt, Ueli M. Maurer: Complete Characterization of Adversaries Tolerable in Secure Multi-Party Computation (Extended Abstract). PODC 1997: 25-34
38 Christian Cachin, Ueli M. Maurer: Linking Information Reconciliation and Privacy Amplification. J. Cryptology 10(2): 97-110 (1997)
37 Jan Camenisch, Ueli M. Maurer, Markus Stadler: Digital Payment Systems With Passive Anonymity-Revoking Trustees. Journal of Computer Security 5(1): 69-90 (1997)
1996
36 Ueli M. Maurer: Advances in Cryptology - EUROCRYPT '96, International Conference on the Theory and Application of Cryptographic Techniques, Saragossa, Spain, May 12-16, 1996, Proceeding Springer 1996
35EEDaniel Bleichenbacher, Ueli M. Maurer: On the Efficiency of One-Time Digital Signatures. ASIACRYPT 1996: 145-158
34EEUeli M. Maurer, Stefan Wolf: Towards Characterizing When Information-Theoretic Secret Key Agreement Is Possible. ASIACRYPT 1996: 196-209
33EEUeli M. Maurer, Stefan Wolf: Diffie-Hellman Oracles. CRYPTO 1996: 268-282
32EEUeli M. Maurer: Modelling a Public-Key Infrastructure. ESORICS 1996: 325-350
31EEJan Camenisch, Ueli M. Maurer, Markus Stadler: Digital Payment Systems with Passive Anonymity-Revoking Trustees. ESORICS 1996: 33-43
30EEDaniel Bleichenbacher, Ueli M. Maurer: Optimal Tree-Based One-Time Digital Signature Schemes. STACS 1996: 363-374
29EEUeli M. Maurer: A Unified and Generalized Treatment of Authentification Theory. STACS 1996: 387-398
28 Ueli M. Maurer, Yacov Yacobi: A Non-interactive Public-Key Distribution System. Des. Codes Cryptography 9(3): 305-316 (1996)
27 Ueli M. Maurer, Pierre E. Schmid: A Calculus for Security Bootstrapping in Distributed Systems. Journal of Computer Security 4(1): 55-80 (1996)
1995
26 Ueli M. Maurer: On the Oracle Complexity of Factoring Integers. Computational Complexity 5(3/4): 237-247 (1995)
25 Charles H. Bennett, Gilles Brassard, Claude Crépeau, Ueli M. Maurer: Generalized privacy amplification. IEEE Transactions on Information Theory 41(6): 1915-1923 (1995)
24 Ueli M. Maurer: Fast Generation of Prime Numbers and Secure Public-Key Cryptographic Parameters. J. Cryptology 8(3): 123-155 (1995)
1994
23EEUeli M. Maurer: Towards the Equivalence of Breaking the Diffie-Hellman Protocol and Computing Discrete Algorithms CRYPTO 1994: 271-281
22EEDaniel Bleichenbacher, Ueli M. Maurer: Directed Acyclic Graphs, One-way Functions and Digital Signatures. CRYPTO 1994: 75-82
21EEUeli M. Maurer, Pierre E. Schmid: A Calculus for Secure Channel Establishment in Open Networks. ESORICS 1994: 175-192
20EEChristian Cachin, Ueli M. Maurer: Linking Information Reconciliation and Privacy Amplification (Extended Abstract). EUROCRYPT 1994: 266-274
1993
19 Ueli M. Maurer: Secret key agreement by public discussion from common information. IEEE Transactions on Information Theory 39(3): 733-742 (1993)
18 Ueli M. Maurer, James L. Massey: Cascade Ciphers: The Importance of Being First. J. Cryptology 6(1): 55-61 (1993)
1992
17EEUeli M. Maurer: Protocols for Secret Key Agreement by Public Discussion Based on Common Information. CRYPTO 1992: 461-470
16EEUeli M. Maurer: A Simplified and Generalized Treatment of Luby-Rackoff Pseudorandom Permutation Generator. EUROCRYPT 1992: 239-255
15EEUeli M. Maurer: Factoring with an Oracle. EUROCRYPT 1992: 429-436
14EEUeli M. Maurer, Yacov Yacobi: A Remark on a Non-interactive Public-Key Distribution System. EUROCRYPT 1992: 458-460
13EEUeli M. Maurer: Asymptotically-Tight Bounds on the Number of Cycles in Generalized de Bruijn-Good Graphs. Discrete Applied Mathematics 37/38: 421-436 (1992)
12 Ueli M. Maurer: Conditionally-Perfect Secrecy and a Provably-Secure Randomized Cipher. J. Cryptology 5(1): 53-66 (1992)
11 Ueli M. Maurer: A Universal Statistical Test for Random Bit Generators. J. Cryptology 5(2): 89-105 (1992)
1991
10EEKenji Koyama, Ueli M. Maurer, Tatsuaki Okamoto, Scott A. Vanstone: New Public-Key Schemes Based on Elliptic Curves over the Ring Zn. CRYPTO 1991: 252-266
9EEUeli M. Maurer: New Approaches to the Design of Self-Synchronizing Stream Ciphers. EUROCRYPT 1991: 458-471
8EEUeli M. Maurer, Yacov Yacobi: Non-interactive Public-Key Cryptography. EUROCRYPT 1991: 498-507
7 Ueli M. Maurer: Perfect Cryptographic Security from Partially Independent Channels STOC 1991: 561-571
6 Ueli M. Maurer, James L. Massey: Local Randomness in Pseudorandom Sequences. J. Cryptology 4(2): 135-149 (1991)
1990
5EEUeli M. Maurer: A Universal Statistical Test for Random Bit Generators. CRYPTO 1990: 409-420
4EEUeli M. Maurer: A Provably-Secure Strongly-Randomized Cipher. EUROCRYPT 1990: 361-373
1989
3EEUeli M. Maurer, James L. Massey: Perfect Local Randomness in Pseudo-Random Sequences. CRYPTO 1989: 100-112
2EEUeli M. Maurer: Fast Generation of Secure RSA-Moduli with Almost Maximal Diversity. EUROCRYPT 1989: 636-647
1987
1EEJames L. Massey, Ueli M. Maurer, Muzhong Wang: Non-Expanding, Key-Minimal, Robustly-Perfect, Linear and Bilinear Ciphers. EUROCRYPT 1987: 237-247

Coauthor Index

1Divesh Aggarwal [108]
2Bernd Altmann [50]
3Endre Bangerter [85]
4Zuzana Beerliová-Trubíniová [101]
5Charles H. Bennett [25]
6Daniel Bleichenbacher [22] [30] [35]
7Johannes Blömer [94] [95] [105]
8Dan Boneh [94] [95] [105]
9Gilles Brassard [25]
10Christian Cachin [20] [38] [42]
11Jan Camenisch [31] [37] [85]
12Jeffrey Considine [82]
13Ronald Cramer [59] [94] [95] [105]
14Claude Crépeau [25]
15Ivan Damgård [59]
16Stefan Dziembowski [64] [75] [79] [99]
17Serge Fehr [68]
18Matthias Fitzi [44] [45] [50] [52] [56] [62] [66] [82] [83] [101]
19Matthew K. Franklin [82]
20Juan A. Garay [62] [83]
21Nicolas Gisin [66]
22Goichiro Hanaoka [100]
23Sarah Hauser [106]
24Martin Hirt [39] [45] [52] [53] [60] [63] [101] [104]
25Clemens Holenstein [77]
26Thomas Holenstein [81]
27Hideki Imai [100]
28Reto Kohlas [49] [57]
29Robert König [84] [86] [92] [107]
30Kenji Koyama [10]
31Leonid A. Levin [82]
32James L. Massey [1] [3] [6] [18]
33David Metcalf [82]
34Tatsuaki Okamoto [10]
35Rafail Ostrovsky [62] [83]
36Krzysztof Pietrzak [73] [76] [91] [97]
37Yvonne Anne Pignolet (Yvonne Anne Oswald) [91]
38Bartosz Przydatek [60]
39Dominik Raub [98]
40Renato Renner [77] [84] [97]
41Oliver von Rotz [66]
42Pierre E. Schmid [21] [27]
43Johan Sjödin [81] [87] [89] [91] [93]
44Markus Stadler [31] [37]
45Stefano Tessaro [92] [96] [103] [107] [110]
46Scott A. Vanstone [10]
47Muzhong Wang [1]
48Stefan Wolf [33] [34] [41] [43] [46] [47] [55] [58] [69] [70] [71]
49Yacov Yacobi [8] [14] [28]
50Yuliang Zheng [100]
51Vassilis Zikas [101] [104] [106]

Colors in the list of coauthors

Copyright © Tue Nov 3 08:52:44 2009 by Michael Ley (ley@uni-trier.de)