Search

Your search keyword '"Maurer, Ueli"' showing total 865 results

Search Constraints

Start Over You searched for: Author "Maurer, Ueli" Remove constraint Author: "Maurer, Ueli"
865 results on '"Maurer, Ueli"'

Search Results

1. Anamorphic Encryption, Revisited

3. Effects of Quantization on the Multiple-Round Secret-Key Capacity

4. Deniable Authentication When Signing Keys Leak

5. Composable and Finite Computational Security of Quantum Message Transmission

7. Practical Provably Secure Flooding for Blockchains

8. Anonymous Authenticated Communication

9. Multi-Designated Receiver Signed Public Key Encryption

10. Giving an Adversary Guarantees (Or: How to Model Designated Verifier Signatures in a Composable Framework)

11. Direct Product Hardness Amplification

12. Adaptive Security of Multi-party Protocols, Revisited

13. Generalized Proofs of Knowledge with Fully Dynamic Setup

14. Revisiting (R)CCA Security and Replay Protection

15. MPC with Synchronous Security and Asynchronous Responsiveness

16. Coupling of Random Systems

17. Synchronous Constructive Cryptography

18. Anonymous Symmetric-Key Communication

20. Topology-Hiding Computation for Networks with Unknown Delays

21. Toward an Algebraic Theory of Systems

24. Causal Boxes: Quantum Information-Processing Systems Closed under Composition

25. A Unified and Composable Take on Ratcheting

26. Efficient Ratcheting: Almost-Optimal Guarantees for Secure Messaging

28. Security Definitions for Hash Functions: Combining UCE and Indifferentiability

29. A Constructive Perspective on Signcryption Security

30. But Why Does It Work? A Rational Protocol Design Treatment of Bitcoin

31. Composable and Robust Outsourced Storage

32. On Composable Security for Digital Signatures

33. Topology-Hiding Computation Beyond Semi-Honest Adversaries

34. Information-Theoretic Secret-Key Agreement: The Asymptotically Tight Relation Between the Secret-Key Rate and the Channel Quality Ratio

43. Abstract Storage Devices

44. Strengthening Access Control Encryption

45. Per-Session Security: Password-Based Cryptography Revisited

46. Bitcoin as a Transaction Ledger: A Composable Treatment

47. Locking of accessible information and implications for the security of quantum cryptography

48. On the Power of Quantum Memory

49. A Quantum solution to the Byzantine agreement problem

50. From Indifferentiability to Constructive Cryptography (and Back)

Catalog

Books, media, physical & digital resources