BibTeX records: Jürg Wullschleger

download as .bib file

@article{DBLP:journals/tit/WinklerW14,
  author       = {Severin Winkler and
                  J{\"{u}}rg Wullschleger},
  title        = {On the Efficiency of Classical and Quantum Secure Function Evaluation},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {60},
  number       = {6},
  pages        = {3123--3143},
  year         = {2014},
  url          = {https://doi.org/10.1109/TIT.2014.2314467},
  doi          = {10.1109/TIT.2014.2314467},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/WinklerW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/IshaiMSW14,
  author       = {Yuval Ishai and
                  Hemanta K. Maji and
                  Amit Sahai and
                  J{\"{u}}rg Wullschleger},
  title        = {Single-use ot combiners with near-optimal resilience},
  booktitle    = {2014 {IEEE} International Symposium on Information Theory, Honolulu,
                  HI, USA, June 29 - July 4, 2014},
  pages        = {1544--1548},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ISIT.2014.6875092},
  doi          = {10.1109/ISIT.2014.6875092},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/IshaiMSW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nc/GisinPSWW13,
  author       = {Nicolas Gisin and
                  Sandu Popescu and
                  Valerio Scarani and
                  Stefan Wolf and
                  J{\"{u}}rg Wullschleger},
  title        = {Oblivious transfer and quantum channels as communication resources},
  journal      = {Nat. Comput.},
  volume       = {12},
  number       = {1},
  pages        = {13--17},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11047-012-9350-9},
  doi          = {10.1007/S11047-012-9350-9},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/nc/GisinPSWW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/KoenigWW12,
  author       = {Robert Koenig and
                  Stephanie Wehner and
                  J{\"{u}}rg Wullschleger},
  title        = {Unconditional Security From Noisy Quantum Storage},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {58},
  number       = {3},
  pages        = {1962--1984},
  year         = {2012},
  url          = {https://doi.org/10.1109/TIT.2011.2177772},
  doi          = {10.1109/TIT.2011.2177772},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/KoenigWW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1205-5136,
  author       = {Severin Winkler and
                  J{\"{u}}rg Wullschleger},
  title        = {On the Efficiency of Classical and Quantum Secure Function Evaluation},
  journal      = {CoRR},
  volume       = {abs/1205.5136},
  year         = {2012},
  url          = {http://arxiv.org/abs/1205.5136},
  eprinttype    = {arXiv},
  eprint       = {1205.5136},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1205-5136.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/WinklerWW11,
  author       = {Severin Winkler and
                  J{\"{u}}rg Wullschleger and
                  Stefan Wolf},
  title        = {Bit Commitment From Nonsignaling Correlations},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {57},
  number       = {3},
  pages        = {1770--1779},
  year         = {2011},
  url          = {https://doi.org/10.1109/TIT.2011.2104471},
  doi          = {10.1109/TIT.2011.2104471},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tit/WinklerWW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/RanellucciTWW11,
  author       = {Samuel Ranellucci and
                  Alain Tapp and
                  Severin Winkler and
                  J{\"{u}}rg Wullschleger},
  editor       = {Dong Hoon Lee and
                  Xiaoyun Wang},
  title        = {On the Efficiency of Bit Commitment Reductions},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2011 - 17th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Seoul, South Korea, December 4-8, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7073},
  pages        = {520--537},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25385-0\_28},
  doi          = {10.1007/978-3-642-25385-0\_28},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/RanellucciTWW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/IshaiKOPSW11,
  author       = {Yuval Ishai and
                  Eyal Kushilevitz and
                  Rafail Ostrovsky and
                  Manoj Prabhakaran and
                  Amit Sahai and
                  J{\"{u}}rg Wullschleger},
  editor       = {Phillip Rogaway},
  title        = {Constant-Rate Oblivious Transfer from Noisy Channels},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2011 - 31st Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 14-18, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6841},
  pages        = {667--684},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22792-9\_38},
  doi          = {10.1007/978-3-642-22792-9\_38},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/IshaiKOPSW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/HanggiW11,
  author       = {Esther H{\"{a}}nggi and
                  J{\"{u}}rg Wullschleger},
  editor       = {Yuval Ishai},
  title        = {Tight Bounds for Classical and Quantum Coin Flipping},
  booktitle    = {Theory of Cryptography - 8th Theory of Cryptography Conference, {TCC}
                  2011, Providence, RI, USA, March 28-30, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6597},
  pages        = {468--485},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-19571-6\_28},
  doi          = {10.1007/978-3-642-19571-6\_28},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/HanggiW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tqc/Wullschleger11,
  author       = {J{\"{u}}rg Wullschleger},
  editor       = {Dave Bacon and
                  Miguel{-}Angel Martin{-}Delgado and
                  Martin Roetteler},
  title        = {Bitwise Quantum Min-Entropy Sampling and New Lower Bounds for Random
                  Access Codes},
  booktitle    = {Theory of Quantum Computation, Communication, and Cryptography - 6th
                  Conference, {TQC} 2011, Madrid, Spain, May 24-26, 2011, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6745},
  pages        = {164--173},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-54429-3\_11},
  doi          = {10.1007/978-3-642-54429-3\_11},
  timestamp    = {Thu, 14 Oct 2021 09:54:54 +0200},
  biburl       = {https://dblp.org/rec/conf/tqc/Wullschleger11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RanellucciTWW11,
  author       = {Samuel Ranellucci and
                  Alain Tapp and
                  Severin Winkler and
                  J{\"{u}}rg Wullschleger},
  title        = {On the Efficiency of Bit Commitment Reductions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {324},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/324},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RanellucciTWW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/WinklerW10,
  author       = {Severin Winkler and
                  J{\"{u}}rg Wullschleger},
  editor       = {Tal Rabin},
  title        = {On the Efficiency of Classical and Quantum Oblivious Transfer Reductions},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 15-19, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6223},
  pages        = {707--723},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14623-7\_38},
  doi          = {10.1007/978-3-642-14623-7\_38},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/WinklerW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/HanggiW10,
  author       = {Esther H{\"{a}}nggi and
                  J{\"{u}}rg Wullschleger},
  title        = {Tight bounds for classical and quantum coin flipping},
  journal      = {CoRR},
  volume       = {abs/1009.4741},
  year         = {2010},
  url          = {http://arxiv.org/abs/1009.4741},
  eprinttype    = {arXiv},
  eprint       = {1009.4741},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/HanggiW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1012-2291,
  author       = {J{\"{u}}rg Wullschleger},
  title        = {Bitwise Quantum Min-Entropy Sampling and New Lower Bounds for Random
                  Access Codes},
  journal      = {CoRR},
  volume       = {abs/1012.2291},
  year         = {2010},
  url          = {http://arxiv.org/abs/1012.2291},
  eprinttype    = {arXiv},
  eprint       = {1012.2291},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1012-2291.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/Wullschleger09,
  author       = {J{\"{u}}rg Wullschleger},
  editor       = {Omer Reingold},
  title        = {Oblivious Transfer from Weak Noisy Channels},
  booktitle    = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC}
                  2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5444},
  pages        = {332--349},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00457-5\_20},
  doi          = {10.1007/978-3-642-00457-5\_20},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/Wullschleger09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0906-1030,
  author       = {Robert Koenig and
                  Stephanie Wehner and
                  J{\"{u}}rg Wullschleger},
  title        = {Unconditional security from noisy quantum storage},
  journal      = {CoRR},
  volume       = {abs/0906.1030},
  year         = {2009},
  url          = {http://arxiv.org/abs/0906.1030},
  eprinttype    = {arXiv},
  eprint       = {0906.1030},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0906-1030.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Wullschleger09,
  author       = {J{\"{u}}rg Wullschleger},
  title        = {Efficiently from Semi-honest to Malicious {OT} via {OLFE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {428},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/428},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Wullschleger09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WinklerW09,
  author       = {Severin Winkler and
                  J{\"{u}}rg Wullschleger},
  title        = {On the Efficiency of Classical and Quantum Oblivious Transfer Reductions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {508},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/508},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WinklerW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:books/daglib/0020556,
  author       = {J{\"{u}}rg Wullschleger},
  title        = {Oblivious-transfer amplification},
  school       = {Universit{\"{a}}t Z{\"{u}}rich},
  year         = {2008},
  timestamp    = {Wed, 09 Feb 2011 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/books/daglib/0020556.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/WolfW08,
  author       = {Stefan Wolf and
                  J{\"{u}}rg Wullschleger},
  title        = {New Monotones and Lower Bounds in Unconditional Two-Party Computation},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {54},
  number       = {6},
  pages        = {2792--2797},
  year         = {2008},
  url          = {https://doi.org/10.1109/TIT.2008.921674},
  doi          = {10.1109/TIT.2008.921674},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tit/WolfW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/PrzydatekW08,
  author       = {Bartosz Przydatek and
                  J{\"{u}}rg Wullschleger},
  editor       = {Luca Aceto and
                  Ivan Damg{\aa}rd and
                  Leslie Ann Goldberg and
                  Magn{\'{u}}s M. Halld{\'{o}}rsson and
                  Anna Ing{\'{o}}lfsd{\'{o}}ttir and
                  Igor Walukiewicz},
  title        = {Error-Tolerant Combiners for Oblivious Primitives},
  booktitle    = {Automata, Languages and Programming, 35th International Colloquium,
                  {ICALP} 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part
                  {II} - Track {B:} Logic, Semantics, and Theory of Programming {\&}
                  Track {C:} Security and Cryptography Foundations},
  series       = {Lecture Notes in Computer Science},
  volume       = {5126},
  pages        = {461--472},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70583-3\_38},
  doi          = {10.1007/978-3-540-70583-3\_38},
  timestamp    = {Fri, 27 Mar 2020 09:02:59 +0100},
  biburl       = {https://dblp.org/rec/conf/icalp/PrzydatekW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/WehnerW08,
  author       = {Stephanie Wehner and
                  J{\"{u}}rg Wullschleger},
  editor       = {Luca Aceto and
                  Ivan Damg{\aa}rd and
                  Leslie Ann Goldberg and
                  Magn{\'{u}}s M. Halld{\'{o}}rsson and
                  Anna Ing{\'{o}}lfsd{\'{o}}ttir and
                  Igor Walukiewicz},
  title        = {Composable Security in the Bounded-Quantum-Storage Model},
  booktitle    = {Automata, Languages and Programming, 35th International Colloquium,
                  {ICALP} 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part
                  {II} - Track {B:} Logic, Semantics, and Theory of Programming {\&}
                  Track {C:} Security and Cryptography Foundations},
  series       = {Lecture Notes in Computer Science},
  volume       = {5126},
  pages        = {604--615},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70583-3\_49},
  doi          = {10.1007/978-3-540-70583-3\_49},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/WehnerW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/CrepeauW08,
  author       = {Claude Cr{\'{e}}peau and
                  J{\"{u}}rg Wullschleger},
  editor       = {Reihaneh Safavi{-}Naini},
  title        = {Statistical Security Conditions for Two-Party Secure Function Evaluation},
  booktitle    = {Information Theoretic Security, Third International Conference, {ICITS}
                  2008, Calgary, Canada, August 10-13, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5155},
  pages        = {86--99},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85093-9\_9},
  doi          = {10.1007/978-3-540-85093-9\_9},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/CrepeauW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Wullschleger08,
  author       = {J{\"{u}}rg Wullschleger},
  title        = {Oblivious Transfer from Weak Noisy Channels},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {420},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/420},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Wullschleger08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Wullschleger07,
  author       = {J{\"{u}}rg Wullschleger},
  editor       = {Moni Naor},
  title        = {Oblivious-Transfer Amplification},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2007, 26th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Barcelona, Spain, May 20-24, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4515},
  pages        = {555--572},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72540-4\_32},
  doi          = {10.1007/978-3-540-72540-4\_32},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Wullschleger07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/RennerWW07,
  author       = {Renato Renner and
                  Stefan Wolf and
                  J{\"{u}}rg Wullschleger},
  editor       = {Yvo Desmedt},
  title        = {Trade-Offs in Information-Theoretic Multi-party One-Way Key Agreement},
  booktitle    = {Information Theoretic Security - Second International Conference,
                  {ICITS} 2007, Madrid, Spain, May 25-29, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4883},
  pages        = {65--75},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-642-10230-1\_5},
  doi          = {10.1007/978-3-642-10230-1\_5},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/RennerWW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/MeierPW07,
  author       = {Remo Meier and
                  Bartosz Przydatek and
                  J{\"{u}}rg Wullschleger},
  editor       = {Salil P. Vadhan},
  title        = {Robuster Combiners for Oblivious Transfer},
  booktitle    = {Theory of Cryptography, 4th Theory of Cryptography Conference, {TCC}
                  2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4392},
  pages        = {404--418},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-70936-7\_22},
  doi          = {10.1007/978-3-540-70936-7\_22},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/MeierPW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:conf/gi/Wullschleger07,
  author       = {J{\"{u}}rg Wullschleger},
  editor       = {Abraham Bernstein and
                  Thomas Dreier and
                  Steffen H{\"{o}}lldobler and
                  G{\"{u}}nter Hotz and
                  Klaus{-}Peter L{\"{o}}hr and
                  Paul Molitor and
                  Gustaf Neumann and
                  R{\"{u}}diger Reischuk and
                  Dietmar Saupe and
                  Myra Spiliopoulou and
                  Harald St{\"{o}}rrle and
                  Dorothea Wagner},
  title        = {Oblivious Transfer Amplification - Verst{\"{a}}rkung vergesslicher
                  {\"{U}}bertragung},
  booktitle    = {Ausgezeichnete Informatikdissertationen 2007},
  series       = {{LNI}},
  volume       = {{D-8}},
  pages        = {309--318},
  publisher    = {{GI}},
  year         = {2007},
  url          = {https://dl.gi.de/handle/20.500.12116/33648},
  timestamp    = {Tue, 04 Jul 2023 17:43:50 +0200},
  biburl       = {https://dblp.org/rec/conf/gi/Wullschleger07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0709-0492,
  author       = {Stephanie Wehner and
                  J{\"{u}}rg Wullschleger},
  title        = {Composable Security in the Bounded-Quantum-Storage Model},
  journal      = {CoRR},
  volume       = {abs/0709.0492},
  year         = {2007},
  url          = {http://arxiv.org/abs/0709.0492},
  eprinttype    = {arXiv},
  eprint       = {0709.0492},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0709-0492.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/WolfW06,
  author       = {Stefan Wolf and
                  J{\"{u}}rg Wullschleger},
  editor       = {Serge Vaudenay},
  title        = {Oblivious Transfer Is Symmetric},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2006, 25th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  St. Petersburg, Russia, May 28 - June 1, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4004},
  pages        = {222--232},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11761679\_14},
  doi          = {10.1007/11761679\_14},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/WolfW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CrepeauSSW06,
  author       = {Claude Cr{\'{e}}peau and
                  George Savvides and
                  Christian Schaffner and
                  J{\"{u}}rg Wullschleger},
  editor       = {Serge Vaudenay},
  title        = {Information-Theoretic Conditions for Two-Party Secure Function Evaluation},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2006, 25th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  St. Petersburg, Russia, May 28 - June 1, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4004},
  pages        = {538--554},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11761679\_32},
  doi          = {10.1007/11761679\_32},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/CrepeauSSW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/Fitzi0W06,
  author       = {Matthias Fitzi and
                  Stefan Wolf and
                  J{\"{u}}rg Wullschleger},
  title        = {On the Power of Imperfect Broadcast},
  booktitle    = {Proceedings 2006 {IEEE} International Symposium on Information Theory,
                  {ISIT} 2006, The Westin Seattle, Seattle, Washington, USA, July 9-14,
                  2006},
  pages        = {504--505},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/ISIT.2006.261766},
  doi          = {10.1109/ISIT.2006.261766},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/Fitzi0W06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/Renner0W06,
  author       = {Renato Renner and
                  Stefan Wolf and
                  J{\"{u}}rg Wullschleger},
  title        = {The Single-Serving Channel Capacity},
  booktitle    = {Proceedings 2006 {IEEE} International Symposium on Information Theory,
                  {ISIT} 2006, The Westin Seattle, Seattle, Washington, USA, July 9-14,
                  2006},
  pages        = {1424--1427},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/ISIT.2006.262081},
  doi          = {10.1109/ISIT.2006.262081},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/Renner0W06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itw/GisinPS0W06,
  author       = {Nicolas Gisin and
                  Sandu Popescu and
                  Valerio Scarani and
                  Stefan Wolf and
                  J{\"{u}}rg Wullschleger},
  editor       = {Gadiel Seroussi and
                  Alfredo Viola},
  title        = {Oblivious Transfer and Quantum Channels},
  booktitle    = {2006 {IEEE} Information Theory Workshop, {ITW} 2006, Punta del Este,
                  Uruguay, March 13-17, 2006},
  pages        = {24--26},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/ITW.2006.1633774},
  doi          = {10.1109/ITW.2006.1633774},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/itw/GisinPS0W06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-cs-0608018,
  author       = {Renato Renner and
                  Stefan Wolf and
                  J{\"{u}}rg Wullschleger},
  title        = {The single-serving channel capacity},
  journal      = {CoRR},
  volume       = {abs/cs/0608018},
  year         = {2006},
  url          = {http://arxiv.org/abs/cs/0608018},
  eprinttype    = {arXiv},
  eprint       = {cs/0608018},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-cs-0608018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-cs-0608076,
  author       = {J{\"{u}}rg Wullschleger},
  title        = {Oblivious-Transfer Amplification},
  journal      = {CoRR},
  volume       = {abs/cs/0608076},
  year         = {2006},
  url          = {http://arxiv.org/abs/cs/0608076},
  eprinttype    = {arXiv},
  eprint       = {cs/0608076},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-cs-0608076.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CrepeauSSW06,
  author       = {Claude Cr{\'{e}}peau and
                  George Savvides and
                  Christian Schaffner and
                  J{\"{u}}rg Wullschleger},
  title        = {Information-Theoretic Conditions for Two-Party Secure Function Evaluation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {183},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/183},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CrepeauSSW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/WolfW05,
  author       = {Stefan Wolf and
                  J{\"{u}}rg Wullschleger},
  editor       = {Victor Shoup},
  title        = {New Monotones and Lower Bounds in Unconditional Two-Party Computation},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2005: 25th Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 14-18,
                  2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3621},
  pages        = {467--477},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11535218\_28},
  doi          = {10.1007/11535218\_28},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/WolfW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/WolfW05,
  author       = {Stefan Wolf and
                  J{\"{u}}rg Wullschleger},
  title        = {Bit commitment from weak non-locality},
  booktitle    = {{IEEE} Information Theory Workshop on Theory and Practice in Information-Theoretic
                  Security, {ICITS} 2005, Awaji Island, Japan, October 16-19, 2005},
  pages        = {28--30},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/ITWTPI.2005.1543951},
  doi          = {10.1109/ITWTPI.2005.1543951},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/WolfW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/0001W05a,
  author       = {Stefan Wolf and
                  J{\"{u}}rg Wullschleger},
  title        = {Oblivious transfer and quantum non-locality},
  booktitle    = {Proceedings of the 2005 {IEEE} International Symposium on Information
                  Theory, {ISIT} 2005, Adelaide, South Australia, Australia, 4-9 September
                  2005},
  pages        = {1745--1748},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/ISIT.2005.1523644},
  doi          = {10.1109/ISIT.2005.1523644},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/0001W05a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/FitziWW04,
  author       = {Matthias Fitzi and
                  Stefan Wolf and
                  J{\"{u}}rg Wullschleger},
  editor       = {Matthew K. Franklin},
  title        = {Pseudo-signatures, Broadcast, and Multi-party Computation from Correlated
                  Randomness},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2004, 24th Annual International
                  CryptologyConference, Santa Barbara, California, USA, August 15-19,
                  2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3152},
  pages        = {562--578},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-28628-8\_34},
  doi          = {10.1007/978-3-540-28628-8\_34},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/FitziWW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/FitziHW04,
  author       = {Matthias Fitzi and
                  Thomas Holenstein and
                  J{\"{u}}rg Wullschleger},
  editor       = {Christian Cachin and
                  Jan Camenisch},
  title        = {Multi-party Computation with Hybrid Security},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2004, International Conference
                  on the Theory and Applications of Cryptographic Techniques, Interlaken,
                  Switzerland, May 2-6, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3027},
  pages        = {419--438},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24676-3\_25},
  doi          = {10.1007/978-3-540-24676-3\_25},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/FitziHW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/Wullschleger04,
  author       = {J{\"{u}}rg Wullschleger},
  title        = {Zero-error communication over networks},
  booktitle    = {Proceedings of the 2004 {IEEE} International Symposium on Information
                  Theory, {ISIT} 2004, Chicago Downtown Marriott, Chicago, Illinois,
                  USA, June 27 - July 2, 2004},
  pages        = {35},
  publisher    = {{IEEE}},
  year         = {2004},
  url          = {https://doi.org/10.1109/ISIT.2004.1365072},
  doi          = {10.1109/ISIT.2004.1365072},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/Wullschleger04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itw/WolfW04,
  author       = {Stefan Wolf and
                  J{\"{u}}rg Wullschleger},
  title        = {Zero-error information and applications in cryptography},
  booktitle    = {2004 {IEEE} Information Theory Workshop, San Antonio, TX, USA, 24-29
                  October, 2004},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2004},
  url          = {https://doi.org/10.1109/ITW.2004.1405264},
  doi          = {10.1109/ITW.2004.1405264},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/itw/WolfW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/cs-IT-0407004,
  author       = {J{\"{u}}rg Wullschleger},
  title        = {Zero-error communication over networks},
  journal      = {CoRR},
  volume       = {cs.IT/0407004},
  year         = {2004},
  url          = {http://arxiv.org/abs/cs.IT/0407004},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/cs-IT-0407004.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WolfW04,
  author       = {Stefan Wolf and
                  J{\"{u}}rg Wullschleger},
  title        = {Oblivious Transfer Is Symmetric},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {336},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/336},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WolfW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/FitziHHW03,
  author       = {Matthias Fitzi and
                  Martin Hirt and
                  Thomas Holenstein and
                  J{\"{u}}rg Wullschleger},
  editor       = {Eli Biham},
  title        = {Two-Threshold Broadcast and Detectable Multi-party Computation},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2003, International Conference
                  on the Theory and Applications of Cryptographic Techniques, Warsaw,
                  Poland, May 4-8, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2656},
  pages        = {51--67},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-39200-9\_4},
  doi          = {10.1007/3-540-39200-9\_4},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/FitziHHW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FitziHHW02,
  author       = {Matthias Fitzi and
                  Martin Hirt and
                  Thomas Holenstein and
                  J{\"{u}}rg Wullschleger},
  title        = {Extended Validity and Consistency in Byzantine Agreement},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {53},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/053},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FitziHHW02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics