Cryptographers' World
 

Ueli M. Maurer


Author's Web Page Link

67 papers in database with 3549 citations StarStarStar

Editor of 1 conference proceedings book

H-number: 34

Conference Proceedings

 
1. Ueli M. Maurer, editor, Advances in Cryptology - EUROCRYPT '96, International Conference on the Theory and Application of Cryptographic Techniques, Saragossa, Spain, May 12-16, 1996, Proceeding. Springer, 1996. ISBN 3-540-61186-X.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

Journal Papers

[Sort papers chronologically] [Sort papers by citations count]

 
1. Jeffrey Considine,  Matthias Fitzi,  Matthew K. Franklin,  Leonid A. Levin,  Ueli M. Maurer,  David Metcalf,  Byzantine Agreement Given Partial Broadcast, Journal of Cryptology, Volume 18(3), pp. 191 - 217, Springer, 2005.

[Cited 7 times ]

2. Matthias Fitzi,  Juan A. Garay,  Ueli M. Maurer,  Rafail Ostrovsky,  Minimal Complete Primitives for Secure Multi-Party Computation, Journal of Cryptology, Volume 18(1), pp. 37 - 61, Springer, 2005.

[Cited 15 times ]

3. Stefan Dziembowski,  Ueli M. Maurer,  Optimal Randomizer Efficiency in the Bounded-Storage Model, Journal of Cryptology, Volume 17(1), pp. 5 - 26, Springer, 2004.

[Cited 27 times ]

4. Ueli M. Maurer,  Stefan Wolf,  The Diffie-Hellman Protocol, Designs, Codes and Cryptography, Volume 19(2), pp. 147 - 171, Springer, 2000.

[Electronic Edition][Cited 64 times Red Star]

5. Martin Hirt,  Ueli M. Maurer,  Player Simulation and General Adversary Structures in Perfect Multiparty Computation, Journal of Cryptology, Volume 13(1), pp. 31 - 60, Springer, 2000.

[Cited 107 times Red StarRed Star]

6. Christian Cachin,  Ueli M. Maurer,  Linking Information Reconciliation and Privacy Amplification, Journal of Cryptology, Volume 10(2), pp. 97 - 110, Springer, 1997.

[Cited 62 times Red Star]

7. Ueli M. Maurer,  Yacov Yacobi,  A Non-interactive Public-Key Distribution System, Designs, Codes and Cryptography, Volume 9(3), pp. 305 - 316, Springer, 1996.

[Electronic Edition][Cited 41 times ]

8. Ueli M. Maurer,  Fast Generation of Prime Numbers and Secure Public-Key Cryptographic Parameters, Journal of Cryptology, Volume 8(3), pp. 123 - 155, Springer, 1995.

[Cited 81 times Red Star]

9. Ueli M. Maurer,  Secret Key Agreement by Public Discussion from Common Information, IEEE Transactions on Information Theory, Volume 39(3), pp. 733 - 742, IEEE Information Theory Society, 1993.

[Cited 398 times Red StarRed StarRed Star]

10. Ueli M. Maurer,  James L. Massey,  Cascade Ciphers: The Importance of Being First, Journal of Cryptology, Volume 6(1), pp. 55 - 61, Springer, 1993.

[Cited 55 times Red Star]

11. Ueli M. Maurer,  A Universal Statistical Test for Random Bit Generators, Journal of Cryptology, Volume 5(2), pp. 89 - 105, Springer, 1992.

[Cited 154 times Red StarRed Star]

12. Ueli M. Maurer,  Conditionally-Perfect Secrecy and a Provably-Secure Randomized Cipher, Journal of Cryptology, Volume 5(1), pp. 53 - 66, Springer, 1992.

[Cited 94 times Red Star]

13. Ueli M. Maurer,  James L. Massey,  Local Randomness in Pseudorandom Sequences, Journal of Cryptology, Volume 4(2), pp. 135 - 149, Springer, 1991.

[Cited 27 times ]

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Peter Gazi,  Ueli M. Maurer,  Cascade Encryption Revisited, pp. 37 - 51, ASIACRYPT 2009.

[Electronic Edition][Cited 2 times ]

2. Ueli M. Maurer,  Abstraction in Cryptography, pp. 465 - 465, CRYPTO 2009.

[Electronic Edition][Cited 1 times ]

3. Ueli M. Maurer,  Stefano Tessaro,  Computational Indistinguishability Amplification: Tight Product Theorems for System Composition, pp. 355 - 373, CRYPTO 2009.

[Electronic Edition][Cited 10 times ]

4. Divesh Aggarwal,  Ueli M. Maurer,  Breaking RSA Generically Is Equivalent to Factoring, pp. 36 - 53, EUROCRYPT 2009.

[Electronic Edition][Cited 15 times ]

5. Vassilis Zikas,  Sarah Hauser,  Ueli M. Maurer,  Realistic Failures in Secure Multi-party Computation, pp. 274 - 293, TCC 2009.

[Electronic Edition][Cited 2 times ]

6. Martin Hirt,  Ueli M. Maurer,  Vassilis Zikas,  MPC vs. SFE : Unconditional and Computational Security, pp. 1 - 18, ASIACRYPT 2008.

[Electronic Edition][Cited 4 times ]

7. Ueli M. Maurer,  Stefano Tessaro,  Basing PRFs on Constant-Query Weak PRFs: Minimizing Assumptions for Efficient Symmetric Cryptography, pp. 161 - 178, ASIACRYPT 2008.

[Electronic Edition][Cited 2 times ]

8. Zuzana Beerliov√°-Trub√≠niov√°,  Matthias Fitzi,  Martin Hirt,  Ueli M. Maurer,  Vassilis Zikas,  MPC vs. SFE: Perfect Security in a Unified Corruption Model, pp. 231 - 250, TCC 2008.

[Electronic Edition][Cited 5 times ]

9. Ueli M. Maurer,  Dominik Raub,  Black-Box Extension Fields and the Inexistence of Field-Homomorphic One-Way Permutations, pp. 427 - 443, ASIACRYPT 2007.

[Electronic Edition][Cited 7 times ]

10. Ueli M. Maurer,  Stefano Tessaro,  Domain Extension of Public Random Functions: Beyond the Birthday Barrier, pp. 187 - 204, CRYPTO 2007.

[Electronic Edition][Cited 21 times ]

11. Ueli M. Maurer,  Krzysztof Pietrzak,  Renato Renner,  Indistinguishability Amplification, pp. 130 - 149, CRYPTO 2007.

[Electronic Edition][Cited 13 times ]

12. Ueli M. Maurer,  Johan Sj√∂din,  A Fast and Key-Efficient Reduction of Chosen-Ciphertext to Known-Plaintext Security, pp. 498 - 516, EUROCRYPT 2007.

[Electronic Edition][Cited 9 times ]

13. Ueli M. Maurer,  Yvonne Anne Oswald,  Krzysztof Pietrzak,  Johan Sj√∂din,  Luby-Rackoff Ciphers from Weak Round Functions?, pp. 391 - 408, EUROCRYPT 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 16 times ]

14. Endre Bangerter,  Jan Camenisch,  Ueli M. Maurer,  Efficient Proofs of Knowledge of Discrete Logarithms and Representations in Groups with Hidden Order, pp. 154 - 171, PKC 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 23 times ]

15. Thomas Holenstein,  Ueli M. Maurer,  Johan Sj√∂din,  Complete Classification of Bilinear Hard-Core Functions, pp. 73 - 91, CRYPTO 2004.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 4 times ]

16. Stefan Dziembowski,  Ueli M. Maurer,  On Generating the Initial Key in the Bounded-Storage Model, pp. 126 - 137, EUROCRYPT 2004.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 27 times ]

17. Ueli M. Maurer,  Renato Renner,  Clemens Holenstein,  Indifferentiability, Impossibility Results on Reductions, and Applications to the Random Oracle Methodology, pp. 21 - 39, TCC 2004.

[Electronic Edition][Cited 128 times Red StarRed Star]

18. Ueli M. Maurer,  Krzysztof Pietrzak,  Composition of Random Systems: When Two Weak Make One Strong, pp. 410 - 427, TCC 2004.

[Electronic Edition][Cited 25 times ]

19. Ueli M. Maurer,  Krzysztof Pietrzak,  The Security of Many-Round Luby-Rackoff Pseudo-Random Permutations, pp. 544 - 561, EUROCRYPT 2003.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 35 times ]

20. Serge Fehr,  Ueli M. Maurer,  Linear VSS and Distributed Commitments Based on Secret Sharing and Pairwise Checks, pp. 565 - 580, CRYPTO 2002.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 22 times ]

21. Matthias Fitzi,  Nicolas Gisin,  Ueli M. Maurer,  Oliver von Rotz,  Unconditional Byzantine Agreement and Multi-party Computation Secure against Dishonest Minorities from Scratch, pp. 482 - 501, EUROCRYPT 2002.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 24 times ]

22. Ueli M. Maurer,  Indistinguishability of Random Systems, pp. 110 - 132, EUROCRYPT 2002.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 70 times Red Star]

23. Martin Hirt,  Ueli M. Maurer,  Robustness for Free in Unconditional Multi-party Computation, pp. 101 - 118, CRYPTO 2001.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 57 times Red Star]

24. Matthias Fitzi,  Juan A. Garay,  Ueli M. Maurer,  Rafail Ostrovsky,  Minimal Complete Primitives for Secure Multi-party Computation, pp. 80 - 100, CRYPTO 2001.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 20 times ]

25. Martin Hirt,  Ueli M. Maurer,  Bartosz Przydatek,  Efficient Secure Multi-party Computation, pp. 143 - 161, ASIACRYPT 2000.

[Electronic Edition][Cited 77 times Red Star]

26. Ronald Cramer,  Ivan Damgard,  Ueli M. Maurer,  General Secure Multi-party Computation from any Linear Secret-Sharing Scheme, pp. 316 - 334, EUROCRYPT 2000.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 190 times Red StarRed Star]

27. Ueli M. Maurer,  Stefan Wolf,  Information-Theoretic Key Agreement: From Weak to Strong Secrecy for Free, pp. 351 - 368, EUROCRYPT 2000.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 153 times Red StarRed Star]

28. Reto Kohlas,  Ueli M. Maurer,  Confidence Valuation in a Public-Key Infrastructure Based on Uncertain Evidence, pp. 93 - 112, PKC 2000.

[Electronic Edition][Cited 76 times Red Star]

29. Matthias Fitzi,  Martin Hirt,  Ueli M. Maurer,  General Adversaries in Unconditional Multi-party Computation, pp. 232 - 246, ASIACRYPT 1999.

[Electronic Edition][Cited 34 times ]

30. Ueli M. Maurer,  Information-Theoretic Cryptography, pp. 47 - 64, CRYPTO 1999.

[Electronic Edition][Cited 37 times ]

31. Reto Kohlas,  Ueli M. Maurer,  Reasoning about Public-Key Certification: On Bindings between Entities and Public Keys, pp. 86 - 103, FC 1999.

[Electronic Edition][Cited 19 times ]

32. Matthias Fitzi,  Martin Hirt,  Ueli M. Maurer,  Trading Correctness for Privacy in Unconditional Multi-Party Computation (Extended Abstract), pp. 121 - 136, CRYPTO 1998.

[Electronic Edition][Cited 39 times ]

33. Ueli M. Maurer,  Stefan Wolf,  Lower Bounds on Generic Algorithms in Groups, pp. 72 - 84, EUROCRYPT 1998.

[Electronic Edition][Cited 67 times Red Star]

34. Ueli M. Maurer,  Stefan Wolf,  Privacy Amplification Secure Against Active Adversaries, pp. 307 - 321, CRYPTO 1997.

[Electronic Edition][Cited 50 times Red Star]

35. Christian Cachin,  Ueli M. Maurer,  Unconditional Security Against Memory-Bounded Adversaries, pp. 292 - 306, CRYPTO 1997.

[Electronic Edition][Cited 79 times Red Star]

36. Ueli M. Maurer,  Information-Theoretically Secure Secret-Key Agreement by NOT Authenticated Public Discussion, pp. 209 - 225, EUROCRYPT 1997.

[Electronic Edition][Cited 47 times ]

37. Daniel Bleichenbacher,  Ueli M. Maurer,  On the Efficiency of One-Time Digital Signatures, pp. 145 - 158, ASIACRYPT 1996.

[Electronic Edition][Cited 49 times ]

38. Ueli M. Maurer,  Stefan Wolf,  Towards Characterizing When Information-Theoretic Secret Key Agreement Is Possible, pp. 196 - 209, ASIACRYPT 1996.

[Electronic Edition][Cited 15 times ]

39. Ueli M. Maurer,  Stefan Wolf,  Diffie-Hellman Oracles, pp. 268 - 282, CRYPTO 1996.

[Electronic Edition][Cited 67 times Red Star]

40. Ueli M. Maurer,  Towards the Equivalence of Breaking the Diffie-Hellman Protocol and Computing Discrete Logarithms, pp. 271 - 281, CRYPTO 1994.

[Electronic Edition][Cited 147 times Red StarRed Star]

41. Daniel Bleichenbacher,  Ueli M. Maurer,  Directed Acyclic Graphs, One-way Functions and Digital Signatures, pp. 75 - 82, CRYPTO 1994.

[Electronic Edition][Cited 48 times ]

42. Christian Cachin,  Ueli M. Maurer,  Linking Information Reconciliation and Privacy Amplification (Extended Abstract), pp. 266 - 274, EUROCRYPT 1994.

[Electronic Edition][Cited 76 times Red Star]

43. Ueli M. Maurer,  A Simplified and Generalized Treatment of Luby-Rackoff Pseudorandom Permutation Generator, pp. 239 - 255, EUROCRYPT 1992.

[Electronic Edition][Cited 81 times Red Star]

44. Ueli M. Maurer,  Factoring with an Oracle, pp. 429 - 436, EUROCRYPT 1992.

[Electronic Edition][Cited 10 times ]

45. Ueli M. Maurer,  Yacov Yacobi,  A Remark on a Non-interactive Public-Key Distribution System, pp. 458 - 460, EUROCRYPT 1992.

[Electronic Edition][Cited 27 times ]

46. Ueli M. Maurer,  Protocols for Secret Key Agreement by Public Discussion Based on Common Information, pp. 461 - 470, CRYPTO 1992.

[Electronic Edition][Cited 27 times ]

47. Kenji Koyama,  Ueli M. Maurer,  Tatsuaki Okamoto,  Scott A. Vanstone,  New Public-Key Schemes Based on Elliptic Curves over the Ring Z, pp. 252 - 266, CRYPTO 1991.

[Electronic Edition][Cited 145 times Red StarRed Star]

48. Ueli M. Maurer,  New Approaches to the Design of Self-Synchronizing Stream Ciphers, pp. 458 - 471, EUROCRYPT 1991.

[Electronic Edition][Cited 59 times Red Star]

49. Ueli M. Maurer,  Yacov Yacobi,  Non-interactive Public-Key Cryptography, pp. 498 - 507, EUROCRYPT 1991.

[Electronic Edition][Cited 128 times Red StarRed Star]

50. Ueli M. Maurer,  A Provably-Secure Strongly-Randomized Cipher, pp. 361 - 373, EUROCRYPT 1990.

[Electronic Edition][Cited 38 times ]

51. Ueli M. Maurer,  A Universal Statistical Test for Random Bit Generators, pp. 409 - 420, CRYPTO 1990.

[Electronic Edition][Cited 204 times Red StarRed Star]

52. Ueli M. Maurer,  James L. Massey,  Perfect Local Randomness in Pseudo-Random Sequences, pp. 100 - 112, CRYPTO 1989.

[Electronic Edition][Cited 25 times ]

53. Ueli M. Maurer,  Fast Generation of Secure RSA-Moduli with Almost Maximal Diversity, pp. 636 - 647, EUROCRYPT 1989.

[Electronic Edition][Cited 26 times ]

54. James L. Massey,  Ueli M. Maurer,  Muzhong Wang,  Non-Expanding, Key-Minimal, Robustly-Perfect, Linear and Bilinear Ciphers, pp. 237 - 247, EUROCRYPT 1987.

[Electronic Edition][Cited 4 times ]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...