Cryptographers' World
 

Martin Hirt


Author's Web Page Link

17 papers in database with 867 citations StarStar

H-number: 12

Journal Papers

[Sort papers chronologically] [Sort papers by citations count]

 
1. Martin Hirt,  Ueli M. Maurer,  Player Simulation and General Adversary Structures in Perfect Multiparty Computation, Journal of Cryptology, Volume 13(1), pp. 31 - 60, Springer, 2000.

[Cited 107 times Red StarRed Star]

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Martin Hirt,  Ueli M. Maurer,  Vassilis Zikas,  MPC vs. SFE : Unconditional and Computational Security, pp. 1 - 18, ASIACRYPT 2008.

[Electronic Edition][Cited 4 times ]

2. Zuzana Beerliová-TrubĂ­niová,  Martin Hirt,  Perfectly-Secure MPC with Linear Communication Complexity, pp. 213 - 230, TCC 2008.

[Electronic Edition][Cited 29 times ]

3. Zuzana Beerliová-TrubĂ­niová,  Matthias Fitzi,  Martin Hirt,  Ueli M. Maurer,  Vassilis Zikas,  MPC vs. SFE: Perfect Security in a Unified Corruption Model, pp. 231 - 250, TCC 2008.

[Electronic Edition][Cited 5 times ]

4. Zuzana Beerliová-TrubĂ­niová,  Martin Hirt,  Simple and Efficient Perfectly-Secure Asynchronous MPC, pp. 376 - 392, ASIACRYPT 2007.

[Electronic Edition][Cited 12 times ]

5. Zuzana Beerliová-TrubĂ­niová,  Martin Hirt,  Micha Riser,  Efficient Byzantine Agreement with Faulty Minority, pp. 393 - 409, ASIACRYPT 2007.

[Electronic Edition][Cited 4 times ]

6. Zuzana Beerliová-TrubĂ­niová,  Martin Hirt,  Efficient Multi-party Computation with Dispute Control, pp. 305 - 328, TCC 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 32 times ]

7. Martin Hirt,  Jesper Buus Nielsen,  Robust Multiparty Computation with Linear Communication Complexity, pp. 463 - 482, CRYPTO 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 18 times ]

8. Martin Hirt,  Jesper Buus Nielsen,  Upper Bounds on the Communication Complexity of Optimally Resilient Cryptographic Multiparty Computation, pp. 79 - 99, ASIACRYPT 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 11 times ]

9. Martin Hirt,  Jesper Buus Nielsen,  Bartosz Przydatek,  Cryptographic Asynchronous Multi-party Computation with Optimal Resilience (Extended Abstract), pp. 322 - 340, EUROCRYPT 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 20 times ]

10. Matthias Fitzi,  Martin Hirt,  Thomas Holenstein,  JĂĽrg Wullschleger,  Two-Threshold Broadcast and Detectable Multi-party Computation, pp. 51 - 67, EUROCRYPT 2003.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 14 times ]

11. Martin Hirt,  Ueli M. Maurer,  Robustness for Free in Unconditional Multi-party Computation, pp. 101 - 118, CRYPTO 2001.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 57 times Red Star]

12. Martin Hirt,  Ueli M. Maurer,  Bartosz Przydatek,  Efficient Secure Multi-party Computation, pp. 143 - 161, ASIACRYPT 2000.

[Electronic Edition][Cited 77 times Red Star]

13. Martin Hirt,  Kazue Sako,  Efficient Receipt-Free Voting Based on Homomorphic Encryption, pp. 539 - 556, EUROCRYPT 2000.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 296 times Red StarRed StarRed Star]

14. Matthias Fitzi,  Martin Hirt,  Ueli M. Maurer,  General Adversaries in Unconditional Multi-party Computation, pp. 232 - 246, ASIACRYPT 1999.

[Electronic Edition][Cited 34 times ]

15. Ronald Cramer,  Ivan Damgard,  Stefan Dziembowski,  Martin Hirt,  Tal Rabin,  Efficient Multiparty Computations Secure Against an Adaptive Adversary, pp. 311 - 326, EUROCRYPT 1999.

[Electronic Edition][Cited 108 times Red StarRed Star]

16. Matthias Fitzi,  Martin Hirt,  Ueli M. Maurer,  Trading Correctness for Privacy in Unconditional Multi-Party Computation (Extended Abstract), pp. 121 - 136, CRYPTO 1998.

[Electronic Edition][Cited 39 times ]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...