Secret key agreement by public discussion from common information UM Maurer IEEE transactions on information theory 39 (3), 733-742, 1993 | 2351 | 1993 |
Generalized privacy amplification CH Bennett, G Brassard, C Crépeau, UM Maurer IEEE Transactions on Information theory 41 (6), 1915-1923, 1995 | 1853 | 1995 |
General secure multi-party computation from any linear secret-sharing scheme R Cramer, I Damgård, U Maurer Advances in Cryptology—EUROCRYPT 2000: International Conference on the …, 2000 | 705 | 2000 |
Indifferentiability, impossibility results on reductions, and applications to the random oracle methodology U Maurer, R Renner, C Holenstein Theory of Cryptography: First Theory of Cryptography Conference, TCC 2004 …, 2004 | 555 | 2004 |
Modelling a public-key infrastructure U Maurer Computer Security—ESORICS 96: 4th European Symposium on Research in …, 1996 | 549 | 1996 |
Information-theoretic key agreement: From weak to strong secrecy for free U Maurer, S Wolf Advances in Cryptology—EUROCRYPT 2000: International Conference on the …, 2000 | 541 | 2000 |
A universal statistical test for random bit generators UM Maurer Journal of cryptology 5, 89-105, 1992 | 420 | 1992 |
Digital payment systems with passive anonymity-revoking trustees J Camenisch, U Maurer, M Stadler Journal of Computer Security 5 (1), 69-89, 1997 | 345 | 1997 |
Conditionally-perfect secrecy and a provably-secure randomized cipher UM Maurer Journal of Cryptology 5, 53-66, 1992 | 335 | 1992 |
Unconditionally secure key agreement and the intrinsic conditional information UM Maurer, S Wolf IEEE Transactions on Information Theory 45 (2), 499-514, 1999 | 328 | 1999 |
Towards the equivalence of breaking the Diffie-Hellman protocol and computing discrete logarithms UM Maurer Advances in Cryptology—CRYPTO’94: 14th Annual International Cryptology …, 1994 | 323 | 1994 |
New Public-Key Schemes Based on Elliptic Curves over the Ring Zn K Koyama, UM Maurer, T Okamoto, SA Vanstone Advances in Cryptology—CRYPTO’91: Proceedings 11, 252-266, 1992 | 300 | 1992 |
Secret-key agreement over unauthenticated public channels. I. Definitions and a completeness result U Maurer, S Wolf IEEE Transactions on Information Theory 49 (4), 822-831, 2003 | 293* | 2003 |
Player simulation and general adversary structures in perfect multiparty computation M Hirt, U Maurer Journal of cryptology 13 (1), 31-60, 2000 | 278 | 2000 |
Non-interactive public-key cryptography UM Maurer, Y Yacobi Advances in Cryptology—EUROCRYPT’91: Workshop on the Theory and Application …, 1991 | 258 | 1991 |
Abstract models of computation in cryptography U Maurer Cryptography and Coding: 10th IMA International Conference, Cirencester, UK …, 2005 | 242 | 2005 |
Complete characterization of adversaries tolerable in secure multi-party computation M Hirt, U Maurer Proceedings of the sixteenth annual ACM symposium on Principles of …, 1997 | 242 | 1997 |
Indistinguishability of random systems U Maurer Advances in Cryptology—EUROCRYPT 2002: International Conference on the …, 2002 | 235 | 2002 |
Bitcoin as a transaction ledger: A composable treatment C Badertscher, U Maurer, D Tschudi, V Zikas Advances in Cryptology–CRYPTO 2017: 37th Annual International Cryptology …, 2017 | 229 | 2017 |
Linking information reconciliation and privacy amplification C Cachin, UM Maurer journal of Cryptology 10 (2), 97-110, 1997 | 217 | 1997 |