865 results on '"Maurer, Ueli"'
Search Results
202. A Hardcore Lemma for Computational Indistinguishability: Security Amplification for Arbitrarily Weak PRGs with Optimal Stretch
203. Player Simulation and General Adversary Structures in Perfect Multiparty Computation
204. Abstraction in Cryptography
205. Cascade Encryption Revisited
206. Realistic Failures in Secure Multi-party Computation
207. Computational Indistinguishability Amplification: Tight Product Theorems for System Composition
208. Unifying Zero-Knowledge Proofs of Knowledge
209. Breaking RSA Generically Is Equivalent to Factoring
210. Constructive Cryptography – A Primer
211. Basing PRFs on Constant-Query Weak PRFs: Minimizing Assumptions for Efficient Symmetric Cryptography
212. MPC vs. SFE : Unconditional and Computational Security
213. Abstraction in Cryptography
214. A Fast and Key-Efficient Reduction of Chosen-Ciphertext to Known-Plaintext Security
215. Luby-Rackoff Ciphers from Weak Round Functions?
216. Generalized Strong Extractors and Deterministic Privacy Amplification
217. Abstract Models of Computation in Cryptography
218. Domain Expansion of MACs: Alternative Uses of the FIL-MAC
219. Single-Key AIL-MACs from Any FIL-MAC
220. Efficient Proofs of Knowledge of Discrete Logarithms and Representations in Groups with Hidden Order
221. Linking information reconciliation and privacy amplification
222. Indifferentiability, Impossibility Results on Reductions, and Applications to the Random Oracle Methodology
223. Complete Classification of Bilinear Hard-Core Functions
224. Composition of Random Systems: When Two Weak Make One Strong
225. On Generating the Initial Key in the Bounded-Storage Model
226. A non-interactive public-key distribution system
227. Brief Announcement: Towards Byzantine Broadcast in Generalized Communication and Adversarial Models
228. Secure Multi-party Computation Made Simple
229. Fast generation of prime numbers and secure public-key cryptographic parameters
230. On the oracle complexity of factoring integers
231. Indistinguishability of Random Systems
232. Unconditional Byzantine Agreement and Multi-party Computation Secure against Dishonest Minorities from Scratch
233. Robustness for Free in Unconditional Multi-party Computation
234. Minimal Complete Primitives for Secure Multi-party Computation
235. Cascade ciphers: The importance of being first
236. Efficient Secure Multi-party Computation
237. Information-Theoretic Key Agreement: From Weak to Strong Secrecy for Free
238. General Secure Multi-party Computation from any Linear Secret-Sharing Scheme
239. Confidence Valuation in a Public-Key Infrastructure Based on Uncertain Evidence
240. Brief Announcement: Towards Byzantine Broadcast in Generalized Communication and Adversarial Models
241. Brief Announcement: Towards Byzantine Broadcast in Generalized Communication and Adversarial Models
242. Conditionally-perfect secrecy and a provably-secure randomized cipher
243. A universal statistical test for random bit generators
244. Information-Theoretic Cryptography
245. Reasoning about Public-Key Certification: On Bindings between Entities and Public Keys
246. General Adversaries in Unconditional Multi-party Computation
247. Generalized privacy amplification
248. Local randomness in pseudorandom sequences
249. Secret key agreement by public discussion from common information
250. EUROCRYPT ’96
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.