865 results on '"Maurer, Ueli"'
Search Results
2. Bitcoin as a Transaction Ledger: A Composable Treatment
3. Effects of Quantization on the Multiple-Round Secret-Key Capacity
4. Deniable Authentication When Signing Keys Leak
5. Composable and Finite Computational Security of Quantum Message Transmission
6. Deniable Authentication When Signing Keys Leak
7. Practical Provably Secure Flooding for Blockchains
8. Anonymous Authenticated Communication
9. Multi-Designated Receiver Signed Public Key Encryption
10. Giving an Adversary Guarantees (Or: How to Model Designated Verifier Signatures in a Composable Framework)
11. Direct Product Hardness Amplification
12. Adaptive Security of Multi-party Protocols, Revisited
13. Generalized Proofs of Knowledge with Fully Dynamic Setup
14. Revisiting (R)CCA Security and Replay Protection
15. MPC with Synchronous Security and Asynchronous Responsiveness
16. Coupling of Random Systems
17. Synchronous Constructive Cryptography
18. Anonymous Symmetric-Key Communication
19. Overcoming Impossibility Results in Composable Security Using Interval-Wise Guarantees
20. Topology-Hiding Computation for Networks with Unknown Delays
21. Toward an Algebraic Theory of Systems
22. Multi-Designated Receiver Signed Public Key Encryption
23. Practical Provably Secure Flooding for Blockchains
24. Causal Boxes: Quantum Information-Processing Systems Closed under Composition
25. A Unified and Composable Take on Ratcheting
26. Efficient Ratcheting: Almost-Optimal Guarantees for Secure Messaging
27. Non-malleable Encryption: Simpler, Shorter, Stronger
28. Security Definitions for Hash Functions: Combining UCE and Indifferentiability
29. A Constructive Perspective on Signcryption Security
30. But Why Does It Work? A Rational Protocol Design Treatment of Bitcoin
31. Composable and Robust Outsourced Storage
32. On Composable Security for Digital Signatures
33. Topology-Hiding Computation Beyond Semi-Honest Adversaries
34. Information-Theoretic Secret-Key Agreement: The Asymptotically Tight Relation Between the Secret-Key Rate and the Channel Quality Ratio
35. Direct Product Hardness Amplification
36. Revisiting (R)CCA Security and Replay Protection
37. Generalized Proofs of Knowledge with Fully Dynamic Setup
38. Adaptive Security of Multi-party Protocols, Revisited
39. MPC with Synchronous Security and Asynchronous Responsiveness
40. Synchronous Constructive Cryptography
41. Overcoming Impossibility Results in Composable Security Using Interval-Wise Guarantees
42. Coupling of Random Systems
43. Abstract Storage Devices
44. Strengthening Access Control Encryption
45. Per-Session Security: Password-Based Cryptography Revisited
46. Bitcoin as a Transaction Ledger: A Composable Treatment
47. Locking of accessible information and implications for the security of quantum cryptography
48. On the Power of Quantum Memory
49. A Quantum solution to the Byzantine agreement problem
50. From Indifferentiability to Constructive Cryptography (and Back)
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.