The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Stefan Wolf: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Stefan Wolf
    Unconditional Security in Cryptography. [Citation Graph (0, 0)][DBLP]
    Lectures on Data Security, 1998, pp:217-250 [Conf]
  2. Ueli M. Maurer, Stefan Wolf
    Towards Characterizing When Information-Theoretic Secret Key Agreement Is Possible. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1996, pp:196-209 [Conf]
  3. Renato Renner, Stefan Wolf
    Simple and Tight Bounds for Information Reconciliation and Privacy Amplification. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2005, pp:199-216 [Conf]
  4. Stefan Wolf
    Strong Security Against Active Attacks in Information-Theoretic Secret-Key Agreement. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1998, pp:405-419 [Conf]
  5. Matthias Fitzi, Stefan Wolf, Jürg Wullschleger
    Pseudo-signatures, Broadcast, and Multi-party Computation from Correlated Randomness. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2004, pp:562-578 [Conf]
  6. Nicolas Gisin, Stefan Wolf
    Linking Classical and Quantum Key Agreement: Is There ``Bound Information''? [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2000, pp:482-500 [Conf]
  7. Ueli M. Maurer, Stefan Wolf
    Diffie-Hellman Oracles. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1996, pp:268-282 [Conf]
  8. Ueli M. Maurer, Stefan Wolf
    Privacy Amplification Secure Against Active Adversaries. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1997, pp:307-321 [Conf]
  9. Renato Renner, Stefan Wolf
    Unconditional Authenticity and Privacy from an Arbitrarily Weak Secret. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2003, pp:78-95 [Conf]
  10. Stefan Wolf, Jürg Wullschleger
    New Monotones and Lower Bounds in Unconditional Two-Party Computation. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2005, pp:467-477 [Conf]
  11. Ueli M. Maurer, Stefan Wolf
    Information-Theoretic Key Agreement: From Weak to Strong Secrecy for Free. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2000, pp:351-368 [Conf]
  12. Ueli M. Maurer, Stefan Wolf
    Lower Bounds on Generic Algorithms in Groups. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1998, pp:72-84 [Conf]
  13. Renato Renner, Stefan Wolf
    New Bounds in Secret-Key Agreement: The Gap between Formation and Secrecy Extraction. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2003, pp:562-577 [Conf]
  14. Renato Renner, Stefan Wolf
    The Exact Price for Unconditionally Secure Asymmetric Cryptography. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2004, pp:109-125 [Conf]
  15. Stefan Wolf, Jürg Wullschleger
    Oblivious Transfer Is Symmetric. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2006, pp:222-232 [Conf]
  16. Anna Lysyanskaya, Ronald L. Rivest, Amit Sahai, Stefan Wolf
    Pseudonym Systems. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 1999, pp:184-199 [Conf]
  17. Claude Crépeau, Kirill Morozov, Stefan Wolf
    Efficient Unconditional Oblivious Transfer from Almost Any Noisy Channel. [Citation Graph (0, 0)][DBLP]
    SCN, 2004, pp:47-59 [Conf]
  18. Nicolas Gisin, Renato Renner, Stefan Wolf
    Linking Classical and Quantum Key Agreement: Is There a Classical Analog to Bound Entanglement? [Citation Graph (0, 0)][DBLP]
    Algorithmica, 2002, v:34, n:4, pp:389-412 [Journal]
  19. Ueli M. Maurer, Stefan Wolf
    The Diffie-Hellman Protocol. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2000, v:19, n:2/3, pp:147-171 [Journal]
  20. Gilles Brassard, Claude Crépeau, Stefan Wolf
    Oblivious Transfers and Privacy Amplification. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 2003, v:16, n:4, pp:219-237 [Journal]
  21. Ueli M. Maurer, Stefan Wolf
    The Relationship Between Breaking the Diffie-Hellman Protocol and Computing Discrete Logarithms. [Citation Graph (0, 0)][DBLP]
    SIAM J. Comput., 1999, v:28, n:5, pp:1689-1721 [Journal]
  22. Ueli M. Maurer, Stefan Wolf
    Secret-key agreement over unauthenticated public channels I: Definitions and a completeness result. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2003, v:49, n:4, pp:822-831 [Journal]
  23. Ueli M. Maurer, Stefan Wolf
    Secret-key agreement over unauthenticated public channels II: the simulatability condition. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2003, v:49, n:4, pp:832-838 [Journal]
  24. Ueli M. Maurer, Stefan Wolf
    Secret-key agreement over unauthenticated public channels III: Privacy amplification. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2003, v:49, n:4, pp:839-851 [Journal]
  25. Ueli M. Maurer, Stefan Wolf
    Unconditionally Secure Key Agreement and the Intrinsic Conditional Information. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1999, v:45, n:2, pp:499-514 [Journal]
  26. Renato Renner, Stefan Wolf, Jürg Wullschleger
    The single-serving channel capacity [Citation Graph (0, 0)][DBLP]
    CoRR, 2006, v:0, n:, pp:- [Journal]

  27. Efficient Device-Independent Quantum Key Distribution. [Citation Graph (, )][DBLP]


  28. Classical, Quantum and Non-signalling Resources in Bipartite Games. [Citation Graph (, )][DBLP]


Search in 0.838secs, Finished in 0.839secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002