Jörn Müller-Quade
Affiliations:- Karlsruhe Institute of Technology, Germany
According to our database1,
Jörn Müller-Quade
authored at least 120 papers
between 1998 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on d-nb.info
On csauthors.net:
Bibliography
2024
Chosen-Ciphertext Secure Dual-Receiver Encryption in the Standard Model Based on Post-Quantum Assumptions.
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024
2023
Protection Against Subversion Corruptions via Reverse Firewalls in the plain Universal Composability Framework.
IACR Cryptol. ePrint Arch., 2023
Proceedings of the Financial Cryptography and Data Security, 2023
Practically Efficient Private Set Intersection from Trusted Hardware with Side-Channels.
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023
2022
Security Against Honorific Adversaries: Efficient MPC with Server-aided Public Verifiability.
IACR Cryptol. ePrint Arch., 2022
Hardening the Security of Server-Aided MPC Using Remotely Unhackable Hardware Modules.
Proceedings of the Sicherheit, 2022
Proceedings of the Sicherheit, 2022
2021
Fortified Multi-Party Computation: Taking Advantage of Simple Secure Hardware Modules.
Proc. Priv. Enhancing Technol., 2021
And Paper-Based is Better? Towards Comparability of Classic and Cryptographic Voting Schemes.
IACR Cryptol. ePrint Arch., 2021
Environmentally Friendly Composable Multi-Party Computation in the Plain Model from Standard (Timed) Assumptions.
IACR Cryptol. ePrint Arch., 2021
A New Security Notion for PKC in the Standard Model: Weaker, Simpler, and Still Realizing Secure Channels.
IACR Cryptol. ePrint Arch., 2021
Proceedings of the Third International Conference on Blockchain Computing and Applications, 2021
2020
IACR Cryptol. ePrint Arch., 2020
ConTra Corona: Contact Tracing against the Coronavirus by Bridging the Centralized - Decentralized Divide for Stronger Privacy.
IACR Cryptol. ePrint Arch., 2020
Entropy, 2020
Proceedings of the 50. Jahrestagung der Gesellschaft für Informatik, INFORMATIK 2020 - Back to the Future, Karlsruhe, Germany, 28. September, 2020
2019
Your Money or Your Life - Modeling and Analyzing the Security of Electronic Payment in the UC Framework.
IACR Cryptol. ePrint Arch., 2019
2018
Fortified Universal Composability: Taking Advantage of Simple Secure Hardware Modules.
IACR Cryptol. ePrint Arch., 2018
Datenschutz und Datensicherheit, 2018
Proceedings of the Public-Key Cryptography - PKC 2018, 2018
Towards Efficient Software Protection Obeying Kerckhoffs's Principle using Tamper-proof Hardware.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018
Proceedings of the 21st International Conference on Information Fusion, 2018
2017
A Novel Cryptographic Framework for Cloud File Systems and CryFS, a Provably-Secure Construction.
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
2016
Universally Composable (Non-Interactive) Two-Party Computation from Untrusted Reusable Hardware Tokens.
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016
Proceedings of the E-Business and Telecommunications - 13th International Joint Conference, 2016
Proceedings of the IEEE European Symposium on Security and Privacy, 2016
Proceedings of the Computer Security - ESORICS 2016, 2016
2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Datenschutz und Datensicherheit, 2015
Proceedings of the Cryptography and Information Security in the Balkans, 2015
Proceedings of the Cryptography and Information Security in the Balkans, 2015
2014
IACR Cryptol. ePrint Arch., 2014
Proceedings of the Information Security Applications - 15th International Workshop, 2014
A Provably Privacy Preserving Video Surveillance Architecture for an Assisted Living Community.
Proceedings of the 44. Jahrestagung der Gesellschaft für Informatik, Big Data, 2014
2013
Implementing Resettable UC-Functionalities with Untrusted Tamper-Proof Hardware-Tokens.
Proceedings of the Theory of Cryptography - 10th Theory of Cryptography Conference, 2013
Proceedings of the Sicherheit 2014: Sicherheit, 2013
Symmetric Searchable Encryption for Exact Pattern Matching using Directed Acyclic Word Graphs.
Proceedings of the SECRYPT 2013, 2013
Proceedings of the Advances in Cryptology, 2013
Proceedings of the Number Theory and Cryptography, 2013
2012
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012
David & Goliath Oblivious Affine Function Evaluation - Asymptotically Optimal Building Blocks for Universally Composable Two-Party Computation from a Single Untrusted Stateful Tamper-Proof Hardware Token.
IACR Cryptol. ePrint Arch., 2012
Statistically Secure Linear-Rate Dimension Extension for Oblivious Affine Function Evaluation.
Proceedings of the Information Theoretic Security - 6th International Conference, 2012
Universally Composable Oblivious Transfer from Lossy Encryption and the McEliece Assumptions.
Proceedings of the Information Theoretic Security - 6th International Conference, 2012
Proceedings of the Advances in Cryptology - ASIACRYPT 2012, 2012
2011
it Inf. Technol., 2011
it Inf. Technol., 2011
Universally Composable and Statistically Secure Verifiable Secret Sharing Scheme Based on Pre-Distributed Data.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011
IACR Cryptol. ePrint Arch., 2011
Completeness Theorems with Constructive Proofs for Finite Deterministic 2-Party Functions.
Proceedings of the Theory of Cryptography - 8th Theory of Cryptography Conference, 2011
Unconditional and Composable Security Using a Single Stateful Tamper-Proof Hardware Token.
Proceedings of the Theory of Cryptography - 8th Theory of Cryptography Conference, 2011
Proceedings of the Software Engineering 2011: Fachtagung des GI-Fachbereichs Softwaretechnik, 2011
Proceedings of the Information Theoretic Security - 5th International Conference, 2011
Proceedings of the 41. Jahrestagung der Gesellschaft für Informatik, 2011
Proceedings of the 41. Jahrestagung der Gesellschaft für Informatik, 2011
2010
Completeness Theorems with Constructive Proofs for Finite Deterministic 2-Party Functions (full version).
IACR Cryptol. ePrint Arch., 2010
Proceedings of the Information Security Applications - 11th International Workshop, 2010
Proceedings of the Research and Advanced Technology for Digital Libraries, 2010
2009
IEEE Trans. Inf. Forensics Secur., 2009
Information-Theoretically Secure Oblivious Polynomial Evaluation in the Commodity-Based Model.
IACR Cryptol. ePrint Arch., 2009
Datenschutz und Datensicherheit, 2009
Proceedings of the Stabilization, 2009
2008
Secure Computability of Functions in the IT setting with Dishonest Majority and Applications to Long-Term Security.
IACR Cryptol. ePrint Arch., 2008
A CCA2 Secure Public Key Encryption Scheme Based on the McEliece Assumptions in the Standard Model.
IACR Cryptol. ePrint Arch., 2008
IACR Cryptol. ePrint Arch., 2008
2007
Bingo Voting: Secure and coercion-free voting using a trusted random number generator.
IACR Cryptol. ePrint Arch., 2007
2006
Computing restrictions of ideals in finitely generated <i>k</i>-algebras by means of Buchberger's algorithm.
J. Symb. Comput., 2006
IACR Cryptol. ePrint Arch., 2006
2005
Quantum Inf. Comput., 2005
Cryptanalysis of a practical quantum key distribution with polarization-entangled photons.
Quantum Inf. Comput., 2005
IACR Cryptol. ePrint Arch., 2005
Proceedings of the Progress in Cryptology, 2005
Proceedings of the IEEE Information Theory Workshop on Theory and Practice in Information-Theoretic Security, 2005
2004
IACR Cryptol. ePrint Arch., 2004
A Synchronous Model for Multi-Party Computation and the Incompleteness of Oblivious Transfer.
IACR Cryptol. ePrint Arch., 2004
Proceedings of the Theory of Cryptography, First Theory of Cryptography Conference, 2004
Proceedings of the 2004 IEEE International Symposium on Information Theory, 2004
Proceedings of the Topics in Cryptology, 2004
Unconditionally Non-interactive Verifiable Secret Sharing Secure against Faulty Majorities in the Commodity Based Model.
Proceedings of the Applied Cryptography and Network Security, 2004
Information Theoretically Secure Oblivious Polynomial Evaluation: Model, Bounds, and Constructions.
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004
2003
Quantum Inf. Comput., 2003
IACR Cryptol. ePrint Arch., 2003
IACR Cryptol. ePrint Arch., 2003
Unconditionally Secure Homomorphic Pre-distributed Bit Commitment and Secure Two-Party Computations.
Proceedings of the Information Security, 6th International Conference, 2003
Proceedings of the Applied Algebra, 2003
2002
On "A New Representation of Elements of Finite Fields GF (2<sup>m</sup>) Yielding Small Complexity Arithmetic Circuits".
IEEE Trans. Computers, 2002
Über Quantencomputer und Quantenkryptographie.
Datenschutz und Datensicherheit, 2002
2001
Electron. Notes Discret. Math., 2001
2000
Appl. Algebra Eng. Commun. Comput., 2000
Appl. Algebra Eng. Commun. Comput., 2000
1999
Proceedings of the Applied Algebra, 1999
1998
Proceedings of the 1998 International Symposium on Symbolic and Algebraic Computation, 1998
Algorithmen zur Dekomposition rationaler Abbildungen.
PhD thesis, 1998