The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Jürg Wullschleger: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Matthias Fitzi, Stefan Wolf, Jürg Wullschleger
    Pseudo-signatures, Broadcast, and Multi-party Computation from Correlated Randomness. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2004, pp:562-578 [Conf]
  2. Stefan Wolf, Jürg Wullschleger
    New Monotones and Lower Bounds in Unconditional Two-Party Computation. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2005, pp:467-477 [Conf]
  3. Claude Crépeau, George Savvides, Christian Schaffner, Jürg Wullschleger
    Information-Theoretic Conditions for Two-Party Secure Function Evaluation. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2006, pp:538-554 [Conf]
  4. Matthias Fitzi, Martin Hirt, Thomas Holenstein, Jürg Wullschleger
    Two-Threshold Broadcast and Detectable Multi-party Computation. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2003, pp:51-67 [Conf]
  5. Matthias Fitzi, Thomas Holenstein, Jürg Wullschleger
    Multi-party Computation with Hybrid Security. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2004, pp:419-438 [Conf]
  6. Stefan Wolf, Jürg Wullschleger
    Oblivious Transfer Is Symmetric. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2006, pp:222-232 [Conf]
  7. Remo Meier, Bartosz Przydatek, Jürg Wullschleger
    Robuster Combiners for Oblivious Transfer. [Citation Graph (0, 0)][DBLP]
    TCC, 2007, pp:404-418 [Conf]
  8. Jürg Wullschleger
    Zero-error communication over networks [Citation Graph (0, 0)][DBLP]
    CoRR, 2004, v:0, n:, pp:- [Journal]
  9. Jürg Wullschleger
    Oblivious-Transfer Amplification. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2007, pp:555-572 [Conf]
  10. Renato Renner, Stefan Wolf, Jürg Wullschleger
    The single-serving channel capacity [Citation Graph (0, 0)][DBLP]
    CoRR, 2006, v:0, n:, pp:- [Journal]
  11. Jürg Wullschleger
    Oblivious-Transfer Amplification [Citation Graph (0, 0)][DBLP]
    CoRR, 2006, v:0, n:, pp:- [Journal]
  12. Stephanie Wehner, Jürg Wullschleger
    Composable Security in the Bounded-Quantum-Storage Model [Citation Graph (0, 0)][DBLP]
    CoRR, 2007, v:0, n:, pp:- [Journal]

  13. On the Efficiency of Classical and Quantum Oblivious Transfer Reductions. [Citation Graph (, )][DBLP]


  14. Error-Tolerant Combiners for Oblivious Primitives. [Citation Graph (, )][DBLP]


  15. Composable Security in the Bounded-Quantum-Storage Model. [Citation Graph (, )][DBLP]


  16. Oblivious Transfer from Weak Noisy Channels. [Citation Graph (, )][DBLP]


  17. Statistical Security Conditions for Two-Party Secure Function Evaluation. [Citation Graph (, )][DBLP]


  18. Unconditional security from noisy quantum storage [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002