Cryptographers' World
 

Stefan Wolf


Author's Web Page Link

17 papers in database with 940 citations StarStar

H-number: 13

Journal Papers

[Sort papers chronologically] [Sort papers by citations count]

 
1. Gilles Brassard,  Claude Crépeau,  Stefan Wolf,  Oblivious Transfers and Privacy Amplification, Journal of Cryptology, Volume 16(4), pp. 219 - 237, Springer, 2003.

[Cited 65 times Red Star]

2. Ueli M. Maurer,  Stefan Wolf,  The Diffie-Hellman Protocol, Designs, Codes and Cryptography, Volume 19(2), pp. 147 - 171, Springer, 2000.

[Electronic Edition][Cited 64 times Red Star]

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Stefan Wolf,  Jürg Wullschleger,  Oblivious Transfer Is Symmetric, pp. 222 - 232, EUROCRYPT 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 30 times ]

2. Renato Renner,  Stefan Wolf,  Simple and Tight Bounds for Information Reconciliation and Privacy Amplification, pp. 199 - 216, ASIACRYPT 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 50 times Red Star]

3. Stefan Wolf,  Jürg Wullschleger,  New Monotones and Lower Bounds in Unconditional Two-Party Computation, pp. 467 - 477, CRYPTO 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 12 times ]

4. Matthias Fitzi,  Stefan Wolf,  Jürg Wullschleger,  Pseudo-signatures, Broadcast, and Multi-party Computation from Correlated Randomness, pp. 562 - 578, CRYPTO 2004.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 18 times ]

5. Renato Renner,  Stefan Wolf,  The Exact Price for Unconditionally Secure Asymmetric Cryptography, pp. 109 - 125, EUROCRYPT 2004.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 13 times ]

6. Renato Renner,  Stefan Wolf,  Unconditional Authenticity and Privacy from an Arbitrarily Weak Secret, pp. 78 - 95, CRYPTO 2003.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 22 times ]

7. Renato Renner,  Stefan Wolf,  New Bounds in Secret-Key Agreement: The Gap between Formation and Secrecy Extraction, pp. 562 - 577, EUROCRYPT 2003.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 53 times Red Star]

8. Nicolas Gisin,  Stefan Wolf,  Linking Classical and Quantum Key Agreement: Is There ``Bound Information''?, pp. 482 - 500, CRYPTO 2000.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 25 times ]

9. Ueli M. Maurer,  Stefan Wolf,  Information-Theoretic Key Agreement: From Weak to Strong Secrecy for Free, pp. 351 - 368, EUROCRYPT 2000.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 153 times Red StarRed Star]

10. Anna Lysyanskaya,  Ronald L. Rivest,  Amit Sahai,  Stefan Wolf,  Pseudonym Systems, pp. 184 - 199, SAC 1999.

[Electronic Edition][Cited 289 times Red StarRed StarRed Star]

11. Stefan Wolf,  Strong Security Against Active Attacks in Information-Theoretic Secret-Key Agreement, pp. 405 - 419, ASIACRYPT 1998.

[Electronic Edition][Cited 12 times ]

12. Ueli M. Maurer,  Stefan Wolf,  Lower Bounds on Generic Algorithms in Groups, pp. 72 - 84, EUROCRYPT 1998.

[Electronic Edition][Cited 67 times Red Star]

13. Ueli M. Maurer,  Stefan Wolf,  Privacy Amplification Secure Against Active Adversaries, pp. 307 - 321, CRYPTO 1997.

[Electronic Edition][Cited 50 times Red Star]

14. Ueli M. Maurer,  Stefan Wolf,  Towards Characterizing When Information-Theoretic Secret Key Agreement Is Possible, pp. 196 - 209, ASIACRYPT 1996.

[Electronic Edition][Cited 15 times ]

15. Ueli M. Maurer,  Stefan Wolf,  Diffie-Hellman Oracles, pp. 268 - 282, CRYPTO 1996.

[Electronic Edition][Cited 67 times Red Star]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...