Ueli Maurer
Affiliations:- ETH Zurich, Switzerland
According to our database1,
Ueli Maurer
authored at least 212 papers
between 1987 and 2024.
Collaborative distances:
Collaborative distances:
Awards
ACM Fellow
ACM Fellow 2015, "For contributions to cryptography and information security.".
IEEE Fellow
IEEE Fellow 2003, "For contributions to the theory and practice of cryptography.".
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on id.loc.gov
-
on d-nb.info
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024
2023
2022
IACR Cryptol. ePrint Arch., 2022
Proceedings of the Security and Cryptography for Networks - 13th International Conference, 2022
2021
Giving an Adversary Guarantees (Or: How to Model Designated Verifier Signatures in a Composable Framework).
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
Proceedings of the Theory of Cryptography - 19th International Conference, 2021
Abstract Modeling of System Communication in Constructive Cryptography using CryptHOL.
Proceedings of the 34th IEEE Computer Security Foundations Symposium, 2021
2020
IACR Cryptol. ePrint Arch., 2020
Overcoming Impossibility Results in Composable Security using Interval-Wise Guarantees.
IACR Cryptol. ePrint Arch., 2020
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020
2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
Brief Announcement: Towards Byzantine Broadcast in Generalized Communication and Adversarial Models.
Proceedings of the 33rd International Symposium on Distributed Computing, 2019
Proceedings of the 32nd IEEE Computer Security Foundations Symposium, 2019
2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
Proceedings of the 32nd International Symposium on Distributed Computing, 2018
Proceedings of the Security and Cryptography for Networks - 11th International Conference, 2018
2017
IEEE Trans. Inf. Theory, 2017
Information-Theoretic Secret-Key Agreement: The Asymptotically Tight Relation Between the Secret-Key Rate and the Channel Quality Ratio.
IACR Cryptol. ePrint Arch., 2017
Context-Restricted Indifferentiability: Generalizing UCE and Implications on the Soundness of Hash-Function Constructions.
IACR Cryptol. ePrint Arch., 2017
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017
2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
Proceedings of the IEEE International Symposium on Information Theory, 2016
Proceedings of the IEEE International Symposium on Information Theory, 2016
Proceedings of the IEEE International Symposium on Information Theory, 2016
Proceedings of the Once and Future Turing: Computing the World, 2016
2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Des. Codes Cryptogr., 2015
Proceedings of the Progress in Cryptology - INDOCRYPT 2015, 2015
Proceedings of the IEEE 28th Computer Security Foundations Symposium, 2015
2014
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
2013
Proceedings of the Secure Multi-Party Computation, 2013
Key Exchange with Unilateral Authentication: Composable Security Definition and Modular Protocol Design.
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
A Dynamic Tradeoff Between Active and Passive Corruptions in Secure Multi-Party Computation.
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
Constructing Confidential Channels from Authenticated Channels - Public-Key Encryption Revisited.
IACR Cryptol. ePrint Arch., 2013
Proceedings of the 2013 IEEE International Symposium on Information Theory, 2013
Proceedings of the 2013 IEEE International Symposium on Information Theory, 2013
Proceedings of the 2013 IEEE International Symposium on Information Theory, 2013
Proceedings of the 2013 IEEE International Symposium on Information Theory, 2013
Erratum: A Dynamic Tradeoff between Active and Passive Corruptions in Secure Multi-Party Computation.
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013
Proceedings of the Number Theory and Cryptography, 2013
2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the Theory of Cryptography - 9th Theory of Cryptography Conference, 2012
Proceedings of the Progress in Cryptology - LATINCRYPT 2012, 2012
Proceedings of the 2012 IEEE Information Theory Workshop, 2012
Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012
Proceedings of the Information Theoretic Security - 6th International Conference, 2012
2011
Proceedings of the Theory of Security and Applications - Joint Workshop, 2011
Proceedings of the Information Theoretic Security - 5th International Conference, 2011
Proceedings of the 3rd ACM Cloud Computing Security Workshop, 2011
The Leakage-Resilience Limit of a Computational Problem Is Equal to Its Unpredictability Entropy.
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011
2010
A Hardcore Lemma for Computational Indistinguishability: Security Amplification for Arbitrarily Weak PRGs with Optimal Stretch.
Proceedings of the Theory of Cryptography, 7th Theory of Cryptography Conference, 2010
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010
On the soundness of authenticate-then-encrypt: formalizing the malleability of symmetric encryption.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
2009
Computational Indistinguishability Amplification: Tight Product Theorems for System Composition.
IACR Cryptol. ePrint Arch., 2009
Hybrid-Secure MPC: Trading Information-Theoretic Robustness for Computational Privacy.
IACR Cryptol. ePrint Arch., 2009
Proceedings of the Theory of Cryptography, 6th Theory of Cryptography Conference, 2009
Proceedings of the SOFSEM 2009: Theory and Practice of Computer Science, 2009
Free-Start Distinguishing: Combining Two Types of Indistinguishability Amplification.
Proceedings of the Information Theoretic Security, 4th International Conference, 2009
Proceedings of the Progress in Cryptology, 2009
2008
IEEE Trans. Inf. Theory, 2008
The Bare Bounded-Storage Model: The Tight Bound on the Storage Requirement for Key Agreement.
IEEE Trans. Inf. Theory, 2008
Rethinking Digital Signatures.
Proceedings of the SECRYPT 2008, 2008
Basing PRFs on Constant-Query Weak PRFs: Minimizing Assumptions for Efficient Symmetric Cryptography.
Proceedings of the Advances in Cryptology, 2008
Proceedings of the Advances in Cryptology, 2008
2007
IACR Cryptol. ePrint Arch., 2007
Black-Box Extension Fields and the Inexistence of Field-Homomorphic One-Way Permutations.
IACR Cryptol. ePrint Arch., 2007
IACR Cryptol. ePrint Arch., 2007
Proceedings of the Information Theoretic Security - Second International Conference, 2007
Proceedings of the Cryptography, 16.09. - 21.09.2007, 2007
Proceedings of the Cryptography, 16.09. - 21.09.2007, 2007
2006
A Fast and Key-Efficient Reduction of Chosen- Ciphertext to Known-Plaintext Security.
IACR Cryptol. ePrint Arch., 2006
2005
Efficient Proofs of Knowledge of Discrete Logarithms and Representations in Groups with Hidden Order.
Proceedings of the Public Key Cryptography, 2005
Proceedings of the Cryptography and Coding, 2005
Proceedings of the Cryptography and Coding, 2005
Proceedings of the Cryptography and Coding, 2005
Proceedings of the Automata, Languages and Programming, 32nd International Colloquium, 2005
2004
Proceedings of the Distributed Computing, 18th International Conference, 2004
Proceedings of the Theory of Cryptography, First Theory of Cryptography Conference, 2004
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2004
Proceedings of the 2004 IEEE International Symposium on Information Theory, 2004
Proceedings of the 2004 IEEE International Symposium on Information Theory, 2004
Proceedings of the Advances in Cryptology, 2004
Proceedings of the Advances in Cryptology, 2004
2003
Secret-key agreement over unauthenticated public channels III: Privacy amplification.
IEEE Trans. Inf. Theory, 2003
Secret-key agreement over unauthenticated public channels II: the simulatability condition.
IEEE Trans. Inf. Theory, 2003
Secret-key agreement over unauthenticated public channels I: Definitions and a completeness result.
IEEE Trans. Inf. Theory, 2003
Indifferentiability, Impossibility Results on Reductions, and Applications to the Random Oracle Methodology.
IACR Cryptol. ePrint Arch., 2003
Proceedings of the Information Security, 6th International Conference, 2003
Proceedings of the Advances in Cryptology, 2003
2002
Proceedings of the Proceedings on 34th Annual ACM Symposium on Theory of Computing, 2002
Proceedings of the Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28, 2002
Unconditional Byzantine Agreement and Multi-party Computation Secure against Dishonest Minorities from Scratch.
Proceedings of the Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28, 2002
Proceedings of the Advances in Cryptology, 2002
2001
IACR Cryptol. ePrint Arch., 2001
Proceedings of the Informatics - 10 Years Back. 10 Years Ahead., 2001
2000
Reasoning about public-key certification: on bindings between entities and public keys.
IEEE J. Sel. Areas Commun., 2000
Player Simulation and General Adversary Structures in Perfect Multiparty Computation.
J. Cryptol., 2000
IACR Cryptol. ePrint Arch., 2000
Proceedings of the Thirty-Second Annual ACM Symposium on Theory of Computing, 2000
Proceedings of the Public Key Cryptography, 2000
Proceedings of the Advances in Cryptology, 2000
Proceedings of the Advances in Cryptology, 2000
1999
IEEE Trans. Inf. Theory, 1999
The Relationship Between Breaking the Diffie-Hellman Protocol and Computing Discrete Logarithms.
SIAM J. Comput., 1999
Proceedings of the Distributed Computing, 1999
Proceedings of the Informatik '99, 1999
Proceedings of the Advances in Cryptology, 1999
1998
Proceedings of the Distributed Computing, 12th International Symposium, 1998
Proceedings of the Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31, 1998
Trading Correctness for Privacy in Unconditional Multi-Party Computation (Extended Abstract).
Proceedings of the Advances in Cryptology, 1998
1997
J. Comput. Secur., 1997
Complete Characterization of Adversaries Tolerable in Secure Multi-Party Computation (Extended Abstract).
Proceedings of the Sixteenth Annual ACM Symposium on Principles of Distributed Computing, 1997
Information-Theoretically Secure Secret-Key Agreement by NOT Authenticated Public Discussion.
Proceedings of the Advances in Cryptology, 1997
Proceedings of the Advances in Cryptology, 1997
Proceedings of the Advances in Cryptology, 1997
1996
J. Comput. Secur., 1996
Proceedings of the STACS 96, 1996
Proceedings of the STACS 96, 1996
Proceedings of the Advances in Cryptology, 1996
Proceedings of the Advances in Cryptology, 1996
1995
J. Cryptol., 1995
1994
Proceedings of the Advances in Cryptology, 1994
Proceedings of the Computer Security, 1994
Towards the Equivalence of Breaking the Diffie-Hellman Protocol and Computing Discrete Logarithms
Proceedings of the Advances in Cryptology, 1994
Proceedings of the Advances in Cryptology, 1994
1993
IEEE Trans. Inf. Theory, 1993
1992
J. Cryptol., 1992
Asymptotically-Tight Bounds on the Number of Cycles in Generalized de Bruijn-Good Graphs.
Discret. Appl. Math., 1992
Proceedings of the Advances in Cryptology, 1992
A Simplified and Generalized Treatment of Luby-Rackoff Pseudorandom Permutation Generator.
Proceedings of the Advances in Cryptology, 1992
Proceedings of the Advances in Cryptology, 1992
1991
Proceedings of the 23rd Annual ACM Symposium on Theory of Computing, 1991
Proceedings of the Advances in Cryptology, 1991
Proceedings of the Advances in Cryptology, 1991
Proceedings of the Advances in Cryptology, 1991
1990
Proceedings of the Advances in Cryptology, 1990
Proceedings of the Advances In Computational Complexity Theory, 1990
1989
Proceedings of the Advances in Cryptology, 1989
Proceedings of the Advances in Cryptology, 1989
1987
Proceedings of the Advances in Cryptology, 1987