Jürg Wullschleger

According to our database1, Jürg Wullschleger authored at least 34 papers between 2002 and 2014.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2014
On the Efficiency of Classical and Quantum Secure Function Evaluation.
IEEE Trans. Inf. Theory, 2014

Single-use ot combiners with near-optimal resilience.
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014

2013
Oblivious transfer and quantum channels as communication resources.
Nat. Comput., 2013

2012
Unconditional Security From Noisy Quantum Storage.
IEEE Trans. Inf. Theory, 2012

2011
Bit Commitment From Nonsignaling Correlations.
IEEE Trans. Inf. Theory, 2011

On the Efficiency of Bit Commitment Reductions.
IACR Cryptol. ePrint Arch., 2011

Bitwise Quantum Min-Entropy Sampling and New Lower Bounds for Random Access Codes.
Proceedings of the Theory of Quantum Computation, Communication, and Cryptography, 2011

Tight Bounds for Classical and Quantum Coin Flipping.
Proceedings of the Theory of Cryptography - 8th Theory of Cryptography Conference, 2011

Constant-Rate Oblivious Transfer from Noisy Channels.
Proceedings of the Advances in Cryptology - CRYPTO 2011, 2011

2009
Efficiently from Semi-honest to Malicious OT via OLFE.
IACR Cryptol. ePrint Arch., 2009

On the Efficiency of Classical and Quantum Oblivious Transfer Reductions.
IACR Cryptol. ePrint Arch., 2009

2008
New Monotones and Lower Bounds in Unconditional Two-Party Computation.
IEEE Trans. Inf. Theory, 2008

Oblivious Transfer from Weak Noisy Channels.
IACR Cryptol. ePrint Arch., 2008

Statistical Security Conditions for Two-Party Secure Function Evaluation.
Proceedings of the Information Theoretic Security, Third International Conference, 2008

Composable Security in the Bounded-Quantum-Storage Model.
Proceedings of the Automata, Languages and Programming, 35th International Colloquium, 2008

Error-Tolerant Combiners for Oblivious Primitives.
Proceedings of the Automata, Languages and Programming, 35th International Colloquium, 2008

Oblivious-transfer amplification.
PhD thesis, 2008

2007
Robuster Combiners for Oblivious Transfer.
Proceedings of the Theory of Cryptography, 4th Theory of Cryptography Conference, 2007

Trade-Offs in Information-Theoretic Multi-party One-Way Key Agreement.
Proceedings of the Information Theoretic Security - Second International Conference, 2007

Oblivious Transfer Amplification - Verstärkung vergesslicher Übertragung.
Proceedings of the Ausgezeichnete Informatikdissertationen 2007, 2007

Oblivious-Transfer Amplification.
Proceedings of the Advances in Cryptology, 2007

2006
Information-Theoretic Conditions for Two-Party Secure Function Evaluation.
IACR Cryptol. ePrint Arch., 2006

Oblivious Transfer and Quantum Channels.
Proceedings of the 2006 IEEE Information Theory Workshop, 2006

The Single-Serving Channel Capacity.
Proceedings of the Proceedings 2006 IEEE International Symposium on Information Theory, 2006

On the Power of Imperfect Broadcast.
Proceedings of the Proceedings 2006 IEEE International Symposium on Information Theory, 2006

2005
Oblivious transfer and quantum non-locality.
Proceedings of the 2005 IEEE International Symposium on Information Theory, 2005

Bit commitment from weak non-locality.
Proceedings of the IEEE Information Theory Workshop on Theory and Practice in Information-Theoretic Security, 2005

2004
Oblivious Transfer Is Symmetric.
IACR Cryptol. ePrint Arch., 2004

Zero-error information and applications in cryptography.
Proceedings of the 2004 IEEE Information Theory Workshop, 2004

Zero-error communication over networks.
Proceedings of the 2004 IEEE International Symposium on Information Theory, 2004

Multi-party Computation with Hybrid Security.
Proceedings of the Advances in Cryptology, 2004

Pseudo-signatures, Broadcast, and Multi-party Computation from Correlated Randomness.
Proceedings of the Advances in Cryptology, 2004

2003
Two-Threshold Broadcast and Detectable Multi-party Computation.
Proceedings of the Advances in Cryptology, 2003

2002
Extended Validity and Consistency in Byzantine Agreement.
IACR Cryptol. ePrint Arch., 2002


  Loading...