default search action
Ueli Maurer
Ueli M. Maurer
Person information
- affiliation: ETH Zurich, Switzerland
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j37]Christian Badertscher, Ueli Maurer, Daniel Tschudi, Vassilis Zikas:
Bitcoin as a Transaction Ledger: A Composable Treatment. J. Cryptol. 37(2): 18 (2024) - [c164]Fabio Banfi, Konstantin Gegier, Martin Hirt, Ueli Maurer, Guilherme Rito:
Anamorphic Encryption, Revisited. EUROCRYPT (2) 2024: 3-32 - 2023
- [c163]Suvradip Chakraborty, Dennis Hofheinz, Ueli Maurer, Guilherme Rito:
Deniable Authentication When Signing Keys Leak. EUROCRYPT (3) 2023: 69-100 - [i79]Suvradip Chakraborty, Dennis Hofheinz, Ueli Maurer, Guilherme Rito:
Deniable Authentication when Signing Keys Leak. IACR Cryptol. ePrint Arch. 2023: 213 (2023) - [i78]Fabio Banfi, Konstantin Gegier, Martin Hirt, Ueli Maurer:
Anamorphic Encryption, Revisited. IACR Cryptol. ePrint Arch. 2023: 249 (2023) - [i77]Fabio Banfi, Ueli Maurer, Silvia Ritsch:
On the Security of Universal Re-Encryption. IACR Cryptol. ePrint Arch. 2023: 1165 (2023) - 2022
- [c162]Chen-Da Liu-Zhang, Christian Matt, Ueli Maurer, Guilherme Rito, Søren Eller Thomsen:
Practical Provably Secure Flooding for Blockchains. ASIACRYPT (1) 2022: 774-805 - [c161]Ueli Maurer, Christopher Portmann, Guilherme Rito:
Multi-Designated Receiver Signed Public Key Encryption. EUROCRYPT (2) 2022: 644-673 - [c160]Fabio Banfi, Ueli Maurer:
Anonymous Authenticated Communication. SCN 2022: 289-312 - [i76]Ueli Maurer, Christopher Portmann, Guilherme Rito:
Multi-Designated Receiver Signed Public Key Encryption. IACR Cryptol. ePrint Arch. 2022: 256 (2022) - [i75]Chen-Da Liu-Zhang, Christian Matt, Ueli Maurer, Guilherme Rito, Søren Eller Thomsen:
Practical Provably Secure Flooding for Blockchains. IACR Cryptol. ePrint Arch. 2022: 608 (2022) - 2021
- [c159]Ueli Maurer, Christopher Portmann, Guilherme Rito:
Giving an Adversary Guarantees (Or: How to Model Designated Verifier Signatures in a Composable Framework). ASIACRYPT (3) 2021: 189-219 - [c158]David A. Basin, Andreas Lochbihler, Ueli Maurer, S. Reza Sefidgar:
Abstract Modeling of System Communication in Constructive Cryptography using CryptHOL. CSF 2021: 1-16 - [c157]Christian Badertscher, Ueli Maurer, Christopher Portmann, Guilherme Rito:
Revisiting (R)CCA Security and Replay Protection. Public Key Cryptography (2) 2021: 173-202 - [c156]Christian Badertscher, Daniel Jost, Ueli Maurer:
Generalized Proofs of Knowledge with Fully Dynamic Setup. TCC (1) 2021: 499-528 - [c155]David Lanzenberger, Ueli Maurer:
Direct Product Hardness Amplification. TCC (2) 2021: 605-625 - [c154]Martin Hirt, Chen-Da Liu-Zhang, Ueli Maurer:
Adaptive Security of Multi-party Protocols, Revisited. TCC (1) 2021: 686-716 - [i74]Onur Günlü, Ueli Maurer, João Ribeiro:
Effects of Quantization on the Multiple-Round Secret-Key Capacity. CoRR abs/2105.01350 (2021) - [i73]Andrés Fábrega, Ueli Maurer, Marta Mularczyk:
A Fresh Approach to Updatable Symmetric Encryption. IACR Cryptol. ePrint Arch. 2021: 559 (2021) - [i72]Onur Günlü, Ueli Maurer, João Ribeiro:
Effects of Quantization on the Multiple-Round Secret-Key Capacity. IACR Cryptol. ePrint Arch. 2021: 584 (2021) - [i71]Martin Hirt, Chen-Da Liu-Zhang, Ueli Maurer:
Adaptive Security of Multi-Party Protocols, Revisited. IACR Cryptol. ePrint Arch. 2021: 1175 (2021) - [i70]Ueli Maurer, Christopher Portmann, Guilherme Rito:
Giving an Adversary Guarantees (Or: How to Model Designated Verifier Signatures in a Composable Framework). IACR Cryptol. ePrint Arch. 2021: 1185 (2021) - [i69]David Lanzenberger, Ueli Maurer:
Direct Product Hardness Amplification. IACR Cryptol. ePrint Arch. 2021: 1229 (2021) - [i68]Fabio Banfi, Ueli Maurer:
Composable Notions for Anonymous and Authenticated Communication. IACR Cryptol. ePrint Arch. 2021: 1581 (2021) - 2020
- [j36]Sandro Coretti, Yevgeniy Dodis, Ueli Maurer, Björn Tackmann, Daniele Venturi:
Non-malleable Encryption: Simpler, Shorter, Stronger. J. Cryptol. 33(4): 1984-2033 (2020) - [c153]Chen-Da Liu-Zhang, Julian Loss, Ueli Maurer, Tal Moran, Daniel Tschudi:
MPC with Synchronous Security and Asynchronous Responsiveness. ASIACRYPT (3) 2020: 92-119 - [c152]Daniel Jost, Ueli Maurer:
Overcoming Impossibility Results in Composable Security Using Interval-Wise Guarantees. CRYPTO (1) 2020: 33-62 - [c151]Chen-Da Liu-Zhang, Varun Maram, Ueli Maurer:
On Broadcast in Generalized Network and Adversarial Models. OPODIS 2020: 25:1-25:16 - [c150]Rio LaVigne, Chen-Da Liu Zhang, Ueli Maurer, Tal Moran, Marta Mularczyk, Daniel Tschudi:
Topology-Hiding Computation for Networks with Unknown Delays. Public Key Cryptography (2) 2020: 215-245 - [c149]Fabio Banfi, Ueli Maurer:
Anonymous Symmetric-Key Communication. SCN 2020: 471-491 - [c148]David Lanzenberger, Ueli Maurer:
Coupling of Random Systems. TCC (3) 2020: 207-240 - [c147]Chen-Da Liu-Zhang, Ueli Maurer:
Synchronous Constructive Cryptography. TCC (2) 2020: 439-472 - [i67]Fabio Banfi, Ueli Maurer:
Anonymous Symmetric-Key Communication. IACR Cryptol. ePrint Arch. 2020: 73 (2020) - [i66]Daniel Jost, Ueli Maurer:
Overcoming Impossibility Results in Composable Security using Interval-Wise Guarantees. IACR Cryptol. ePrint Arch. 2020: 92 (2020) - [i65]Christian Badertscher, Ueli Maurer, Christopher Portmann, Guilherme Rito:
Revisiting (R)CCA Security and Replay Protection. IACR Cryptol. ePrint Arch. 2020: 177 (2020) - [i64]Ueli Maurer, Christopher Portmann, Jiamin Zhu:
Unifying Generic Group Models. IACR Cryptol. ePrint Arch. 2020: 996 (2020) - [i63]David Lanzenberger, Ueli Maurer:
Coupling of Random Systems. IACR Cryptol. ePrint Arch. 2020: 1187 (2020) - [i62]Chen-Da Liu-Zhang, Ueli Maurer:
Synchronous Constructive Cryptography. IACR Cryptol. ePrint Arch. 2020: 1226 (2020) - [i61]Chen-Da Liu-Zhang, Varun Maram, Ueli Maurer:
On Broadcast in Generalized Network and Adversarial Models. IACR Cryptol. ePrint Arch. 2020: 1408 (2020)
2010 – 2019
- 2019
- [j35]Grégory Demay, Peter Gazi, Ueli Maurer, Björn Tackmann:
Per-session security: Password-based cryptography revisited. J. Comput. Secur. 27(1): 75-111 (2019) - [c146]Andreas Lochbihler, S. Reza Sefidgar, David A. Basin, Ueli Maurer:
Formalizing Constructive Cryptography using CryptHOL. CSF 2019: 152-166 - [c145]Daniel Jost, Ueli Maurer, Marta Mularczyk:
Efficient Ratcheting: Almost-Optimal Guarantees for Secure Messaging. EUROCRYPT (1) 2019: 159-188 - [c144]Daniel Jost, Ueli Maurer, Marta Mularczyk:
A Unified and Composable Take on Ratcheting. TCC (2) 2019: 180-210 - [c143]Fabio Banfi, Ueli Maurer, Christopher Portmann, Jiamin Zhu:
Composable and Finite Computational Security of Quantum Message Transmission. TCC (1) 2019: 282-311 - [c142]Chen-Da Liu Zhang, Varun Maram, Ueli Maurer:
Brief Announcement: Towards Byzantine Broadcast in Generalized Communication and Adversarial Models. DISC 2019: 47:1-47:3 - [i60]Fabio Banfi, Ueli Maurer, Christopher Portmann, Jiamin Zhu:
Composable and Finite Computational Security of Quantum Message Transmission. CoRR abs/1908.03436 (2019) - [i59]Chen-Da Liu Zhang, Julian Loss, Ueli Maurer, Tal Moran, Daniel Tschudi:
Robust MPC: Asynchronous Responsiveness yet Synchronous Security. IACR Cryptol. ePrint Arch. 2019: 159 (2019) - [i58]Christian Badertscher, Daniel Jost, Ueli Maurer:
Agree-and-Prove: Generalized Proofs Of Knowledge and Applications. IACR Cryptol. ePrint Arch. 2019: 662 (2019) - [i57]Daniel Jost, Ueli Maurer, Marta Mularczyk:
A Unified and Composable Take on Ratcheting. IACR Cryptol. ePrint Arch. 2019: 694 (2019) - [i56]Fabio Banfi, Ueli Maurer, Christopher Portmann, Jiamin Zhu:
Composable and Finite Computational Security of Quantum Message Transmission. IACR Cryptol. ePrint Arch. 2019: 914 (2019) - [i55]Rio LaVigne, Chen-Da Liu Zhang, Ueli Maurer, Tal Moran, Marta Mularczyk, Daniel Tschudi:
Topology-Hiding Computation for Networks with Unknown Delays. IACR Cryptol. ePrint Arch. 2019: 1211 (2019) - 2018
- [j34]Christian Matt, Ueli Maurer, Christopher Portmann, Renato Renner, Björn Tackmann:
Toward an algebraic theory of systems. Theor. Comput. Sci. 747: 1-25 (2018) - [c141]Christian Badertscher, Ueli Maurer:
Composable and Robust Outsourced Storage. CT-RSA 2018: 354-373 - [c140]Christian Badertscher, Juan A. Garay, Ueli Maurer, Daniel Tschudi, Vassilis Zikas:
But Why Does It Work? A Rational Protocol Design Treatment of Bitcoin. EUROCRYPT (2) 2018: 34-65 - [c139]Christian Badertscher, Ueli Maurer, Björn Tackmann:
On Composable Security for Digital Signatures. Public Key Cryptography (1) 2018: 494-523 - [c138]Daniel Jost, Ueli Maurer:
Security Definitions for Hash Functions: Combining UCE and Indifferentiability. SCN 2018: 83-101 - [c137]Christian Badertscher, Fabio Banfi, Ueli Maurer:
A Constructive Perspective on Signcryption Security. SCN 2018: 102-120 - [c136]Rio LaVigne, Chen-Da Liu Zhang, Ueli Maurer, Tal Moran, Marta Mularczyk, Daniel Tschudi:
Topology-Hiding Computation Beyond Semi-Honest Adversaries. TCC (2) 2018: 3-35 - [c135]Daniel Jost, Ueli Maurer, João L. Ribeiro:
Information-Theoretic Secret-Key Agreement: The Asymptotically Tight Relation Between the Secret-Key Rate and the Channel Quality Ratio. TCC (1) 2018: 345-369 - [c134]Julian Loss, Ueli Maurer, Daniel Tschudi:
Strong Separations Between Broadcast and Authenticated Channels. DISC 2018: 36:1-36:17 - [i54]Christian Badertscher, Ueli Maurer, Björn Tackmann:
On Composable Security for Digital Signatures. IACR Cryptol. ePrint Arch. 2018: 15 (2018) - [i53]Christian Badertscher, Fabio Banfi, Ueli Maurer:
A Constructive Perspective on Signcryption Security. IACR Cryptol. ePrint Arch. 2018: 50 (2018) - [i52]Christian Badertscher, Juan A. Garay, Ueli Maurer, Daniel Tschudi, Vassilis Zikas:
But Why does it Work? A Rational Protocol Design Treatment of Bitcoin. IACR Cryptol. ePrint Arch. 2018: 138 (2018) - [i51]Rio LaVigne, Chen-Da Liu Zhang, Ueli Maurer, Tal Moran, Marta Mularczyk, Daniel Tschudi:
Topology-Hiding Computation Beyond Semi-Honest Adversaries. IACR Cryptol. ePrint Arch. 2018: 255 (2018) - [i50]Daniel Jost, Ueli Maurer, Marta Mularczyk:
Efficient Ratcheting: Almost-Optimal Guarantees for Secure Messaging. IACR Cryptol. ePrint Arch. 2018: 954 (2018) - 2017
- [j33]Christopher Portmann, Christian Matt, Ueli Maurer, Renato Renner, Björn Tackmann:
Causal Boxes: Quantum Information-Processing Systems Closed Under Composition. IEEE Trans. Inf. Theory 63(5): 3277-3305 (2017) - [c133]Christian Badertscher, Christian Matt, Ueli Maurer:
Strengthening Access Control Encryption. ASIACRYPT (1) 2017: 502-532 - [c132]Christian Badertscher, Ueli Maurer, Daniel Tschudi, Vassilis Zikas:
Bitcoin as a Transaction Ledger: A Composable Treatment. CRYPTO (1) 2017: 324-356 - [c131]Grégory Demay, Peter Gazi, Ueli Maurer, Björn Tackmann:
Per-Session Security: Password-Based Cryptography Revisited. ESORICS (1) 2017: 408-426 - [c130]Ueli Maurer:
An information-theoretic approach to hardness amplification. ISIT 2017: 948-952 - [c129]Chen-Da Liu Zhang, Ueli Maurer, Martin Raszyk, Daniel Tschudi:
Witness-hiding proofs of knowledge for cable locks. ISIT 2017: 953-957 - [c128]Christian Badertscher, Sandro Coretti, Chen-Da Liu Zhang, Ueli Maurer:
Efficiency lower bounds for commit-and-prove constructions. ISIT 2017: 1788-1792 - [i49]Christian Badertscher, Ueli Maurer:
Composable and Robust Outsourced Storage. IACR Cryptol. ePrint Arch. 2017: 133 (2017) - [i48]Christian Badertscher, Ueli Maurer, Daniel Tschudi, Vassilis Zikas:
Bitcoin as a Transaction Ledger: A Composable Treatment. IACR Cryptol. ePrint Arch. 2017: 149 (2017) - [i47]Christian Badertscher, Christian Matt, Ueli Maurer:
Strengthening Access Control Encryption. IACR Cryptol. ePrint Arch. 2017: 429 (2017) - [i46]Daniel Jost, Ueli Maurer:
Context-Restricted Indifferentiability: Generalizing UCE and Implications on the Soundness of Hash-Function Constructions. IACR Cryptol. ePrint Arch. 2017: 461 (2017) - [i45]Daniel Jost, Ueli Maurer, João L. Ribeiro:
Information-Theoretic Secret-Key Agreement: The Asymptotically Tight Relation Between the Secret-Key Rate and the Channel Quality Ratio. IACR Cryptol. ePrint Arch. 2017: 1130 (2017) - 2016
- [j32]Divesh Aggarwal, Ueli Maurer:
Breaking RSA Generically Is Equivalent to Factoring. IEEE Trans. Inf. Theory 62(11): 6251-6259 (2016) - [c127]Martin Hirt, Ueli Maurer, Daniel Tschudi, Vassilis Zikas:
Network-Hiding Communication and Applications to Multi-party Protocols. CRYPTO (2) 2016: 335-365 - [c126]Ueli Maurer, João Ribeiro:
New perspectives on weak Oblivious Transfer. ISIT 2016: 790-794 - [c125]Julian Loss, Ueli Maurer, Daniel Tschudi:
Hierarchy of three-party consistency specifications. ISIT 2016: 3048-3052 - [c124]Gregor Seiler, Ueli Maurer:
On the impossibility of information-theoretic composable coin toss extension. ISIT 2016: 3058-3061 - [c123]Jan Camenisch, Robert R. Enderlein, Ueli Maurer:
Memory Erasability Amplification. SCN 2016: 104-125 - [c122]Ueli Maurer, Renato Renner:
From Indifferentiability to Constructive Cryptography (and Back). TCC (B1) 2016: 3-24 - [p2]Ueli Maurer:
Cryptography and Computation after Turing. The Once and Future Turing 2016: 53-77 - [i44]Christian Matt, Ueli Maurer, Christopher Portmann, Renato Renner, Björn Tackmann:
Toward an Algebraic Theory of Systems. CoRR abs/1609.04293 (2016) - [i43]Grégory Demay, Peter Gazi, Ueli Maurer, Björn Tackmann:
Per-Session Security: Password-Based Cryptography Revisited. IACR Cryptol. ePrint Arch. 2016: 166 (2016) - [i42]Martin Hirt, Ueli Maurer, Daniel Tschudi, Vassilis Zikas:
Network-Hiding Communication and Applications to Multi-Party Protocols. IACR Cryptol. ePrint Arch. 2016: 556 (2016) - [i41]Jan Camenisch, Robert R. Enderlein, Ueli Maurer:
Memory Erasability Amplification. IACR Cryptol. ePrint Arch. 2016: 706 (2016) - [i40]Ueli Maurer, Renato Renner:
From Indifferentiability to Constructive Cryptography (and Back). IACR Cryptol. ePrint Arch. 2016: 903 (2016) - 2015
- [j31]Ueli Maurer:
Zero-knowledge proofs of knowledge for group homomorphisms. Des. Codes Cryptogr. 77(2-3): 663-676 (2015) - [c121]Dennis Hofheinz, Christian Matt, Ueli Maurer:
Idealizing Identity-Based Encryption. ASIACRYPT (1) 2015: 495-520 - [c120]Christian Matt, Ueli Maurer:
A Definitional Framework for Functional Encryption. CSF 2015: 217-231 - [c119]Grégory Demay, Peter Gazi, Ueli Maurer, Björn Tackmann:
Query-Complexity Amplification for Random Oracles. ICITS 2015: 159-180 - [c118]Christian Badertscher, Christian Matt, Ueli Maurer, Phillip Rogaway, Björn Tackmann:
Robust Authenticated Encryption and the Limits of Symmetric Cryptography. IMACC 2015: 112-129 - [c117]Markulf Kohlweiss, Ueli Maurer, Cristina Onete, Björn Tackmann, Daniele Venturi:
(De-)Constructing TLS 1.3. INDOCRYPT 2015: 85-102 - [c116]Christian Badertscher, Christian Matt, Ueli Maurer, Phillip Rogaway, Björn Tackmann:
Augmented Secure Channels and the Goal of the TLS 1.3 Record Layer. ProvSec 2015: 85-104 - [c115]Sandro Coretti, Ueli Maurer, Björn Tackmann, Daniele Venturi:
From Single-Bit to Multi-bit Public-Key Encryption via Non-malleable Codes. TCC (1) 2015: 532-560 - [i39]Christopher Portmann, Christian Matt, Ueli Maurer, Renato Renner, Björn Tackmann:
Causal Boxes: Quantum Information-Processing Systems Closed under Composition. CoRR abs/1512.02240 (2015) - [i38]Grégory Demay, Peter Gazi, Ueli Maurer, Björn Tackmann:
Query-Complexity Amplification for Random Oracles. IACR Cryptol. ePrint Arch. 2015: 315 (2015) - [i37]Christian Badertscher, Christian Matt, Ueli Maurer, Phillip Rogaway, Björn Tackmann:
Augmented Secure Channels and the Goal of the TLS 1.3 Record Layer. IACR Cryptol. ePrint Arch. 2015: 394 (2015) - [i36]Dennis Hofheinz, Christian Matt, Ueli Maurer:
Idealizing Identity-Based Encryption. IACR Cryptol. ePrint Arch. 2015: 862 (2015) - [i35]Christian Badertscher, Christian Matt, Ueli Maurer, Phillip Rogaway, Björn Tackmann:
Robust Authenticated Encryption and the Limits of Symmetric Cryptography. IACR Cryptol. ePrint Arch. 2015: 893 (2015) - 2014
- [c114]Grégory Demay, Peter Gazi, Ueli Maurer, Björn Tackmann:
Optimality of non-adaptive strategies: The case of parallel games. ISIT 2014: 1707-1711 - [c113]Joël Alwen, Martin Hirt, Ueli Maurer, Arpita Patra, Pavel Raykov:
Anonymous Authentication with Shared Secrets. LATINCRYPT 2014: 219-236 - [c112]Joël Alwen, Martin Hirt, Ueli Maurer, Arpita Patra, Pavel Raykov:
Key-Indistinguishable Message Authentication Codes. SCN 2014: 476-493 - [c111]Martin Hirt, Ueli Maurer, Pavel Raykov:
Broadcast Amplification. TCC 2014: 419-439 - [i34]Markulf Kohlweiss, Ueli Maurer, Cristina Onete, Björn Tackmann, Daniele Venturi:
(De-)Constructing TLS. IACR Cryptol. ePrint Arch. 2014: 20 (2014) - [i33]Joël Alwen, Martin Hirt, Ueli Maurer, Arpita Patra, Pavel Raykov:
Anonymous Authentication with Shared Secrets. IACR Cryptol. ePrint Arch. 2014: 73 (2014) - [i32]Joël Alwen, Martin Hirt, Ueli Maurer, Arpita Patra, Pavel Raykov:
Key-Indistinguishable Message Authentication Codes. IACR Cryptol. ePrint Arch. 2014: 107 (2014) - [i31]Grégory Demay, Peter Gazi, Ueli Maurer, Björn Tackmann:
Optimality of Non-Adaptive Strategies: The Case of Parallel Games. IACR Cryptol. ePrint Arch. 2014: 299 (2014) - [i30]Sandro Coretti, Ueli Maurer, Björn Tackmann, Daniele Venturi:
From Single-Bit to Multi-Bit Public-Key Encryption via Non-Malleable Codes. IACR Cryptol. ePrint Arch. 2014: 324 (2014) - 2013
- [c110]Sandro Coretti, Ueli Maurer, Björn Tackmann:
Constructing Confidential Channels from Authenticated Channels - Public-Key Encryption Revisited. ASIACRYPT (1) 2013: 134-153 - [c109]Sandro Coretti, Ueli Maurer, Björn Tackmann:
A Constructive Perspective on Key Encapsulation. Number Theory and Cryptography 2013: 226-239 - [c108]Martin Hirt, Christoph Lucas, Ueli Maurer:
A Dynamic Tradeoff between Active and Passive Corruptions in Secure Multi-Party Computation. CRYPTO (2) 2013: 203-219 - [c107]Martin Hirt, Christoph Lucas, Ueli Maurer:
Erratum: A Dynamic Tradeoff between Active and Passive Corruptions in Secure Multi-Party Computation. CRYPTO (2) 2013 - [c106]Grégory Demay, Peter Gazi, Martin Hirt, Ueli Maurer:
Resource-Restricted Indifferentiability. EUROCRYPT 2013: 664-683 - [c105]Juan A. Garay, Jonathan Katz, Ueli Maurer, Björn Tackmann, Vassilis Zikas:
Rational Protocol Design: Cryptography against Incentive-Driven Adversaries. FOCS 2013: 648-657 - [c104]Grégory Demay, Ueli Maurer:
Unfair coin tossing. ISIT 2013: 1556-1560 - [c103]Christian Matt, Ueli Maurer:
The one-time pad revisited. ISIT 2013: 2706-2710 - [c102]Ueli Maurer:
Authentication amplification by synchronization. ISIT 2013: 2711-2714 - [c101]Ueli Maurer:
Conditional equivalence of random systems and indistinguishability proofs. ISIT 2013: 3150-3154 - [c100]Markulf Kohlweiss, Ueli Maurer, Cristina Onete, Björn Tackmann, Daniele Venturi:
Anonymity-Preserving Public-Key Encryption: A Constructive Approach. Privacy Enhancing Technologies 2013: 19-39 - [c99]Jonathan Katz, Ueli Maurer, Björn Tackmann, Vassilis Zikas:
Universally Composable Synchronous Computation. TCC 2013: 477-498 - [p1]Ueli Maurer, Vassilis Zikas:
Information-Theoretic Secure Multiparty Computation. Secure Multi-Party Computation 2013: 168-200 - [i29]Markulf Kohlweiss, Ueli Maurer, Cristina Onete, Björn Tackmann, Daniele Venturi:
Anonymity-preserving Public-Key Encryption: A Constructive Approach. IACR Cryptol. ePrint Arch. 2013: 238 (2013) - [i28]