Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Jürg Wullschleger
@article{DBLP:journals/tit/WinklerW14, author = {Severin Winkler and J{\"{u}}rg Wullschleger}, title = {On the Efficiency of Classical and Quantum Secure Function Evaluation}, journal = {{IEEE} Trans. Inf. Theory}, volume = {60}, number = {6}, pages = {3123--3143}, year = {2014}, url = {https://doi.org/10.1109/TIT.2014.2314467}, doi = {10.1109/TIT.2014.2314467}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/WinklerW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/IshaiMSW14, author = {Yuval Ishai and Hemanta K. Maji and Amit Sahai and J{\"{u}}rg Wullschleger}, title = {Single-use ot combiners with near-optimal resilience}, booktitle = {2014 {IEEE} International Symposium on Information Theory, Honolulu, HI, USA, June 29 - July 4, 2014}, pages = {1544--1548}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ISIT.2014.6875092}, doi = {10.1109/ISIT.2014.6875092}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/isit/IshaiMSW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nc/GisinPSWW13, author = {Nicolas Gisin and Sandu Popescu and Valerio Scarani and Stefan Wolf and J{\"{u}}rg Wullschleger}, title = {Oblivious transfer and quantum channels as communication resources}, journal = {Nat. Comput.}, volume = {12}, number = {1}, pages = {13--17}, year = {2013}, url = {https://doi.org/10.1007/s11047-012-9350-9}, doi = {10.1007/S11047-012-9350-9}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/nc/GisinPSWW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/KoenigWW12, author = {Robert Koenig and Stephanie Wehner and J{\"{u}}rg Wullschleger}, title = {Unconditional Security From Noisy Quantum Storage}, journal = {{IEEE} Trans. Inf. Theory}, volume = {58}, number = {3}, pages = {1962--1984}, year = {2012}, url = {https://doi.org/10.1109/TIT.2011.2177772}, doi = {10.1109/TIT.2011.2177772}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/KoenigWW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1205-5136, author = {Severin Winkler and J{\"{u}}rg Wullschleger}, title = {On the Efficiency of Classical and Quantum Secure Function Evaluation}, journal = {CoRR}, volume = {abs/1205.5136}, year = {2012}, url = {http://arxiv.org/abs/1205.5136}, eprinttype = {arXiv}, eprint = {1205.5136}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1205-5136.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/WinklerWW11, author = {Severin Winkler and J{\"{u}}rg Wullschleger and Stefan Wolf}, title = {Bit Commitment From Nonsignaling Correlations}, journal = {{IEEE} Trans. Inf. Theory}, volume = {57}, number = {3}, pages = {1770--1779}, year = {2011}, url = {https://doi.org/10.1109/TIT.2011.2104471}, doi = {10.1109/TIT.2011.2104471}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tit/WinklerWW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/RanellucciTWW11, author = {Samuel Ranellucci and Alain Tapp and Severin Winkler and J{\"{u}}rg Wullschleger}, editor = {Dong Hoon Lee and Xiaoyun Wang}, title = {On the Efficiency of Bit Commitment Reductions}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2011 - 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7073}, pages = {520--537}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25385-0\_28}, doi = {10.1007/978-3-642-25385-0\_28}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/RanellucciTWW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/IshaiKOPSW11, author = {Yuval Ishai and Eyal Kushilevitz and Rafail Ostrovsky and Manoj Prabhakaran and Amit Sahai and J{\"{u}}rg Wullschleger}, editor = {Phillip Rogaway}, title = {Constant-Rate Oblivious Transfer from Noisy Channels}, booktitle = {Advances in Cryptology - {CRYPTO} 2011 - 31st Annual Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6841}, pages = {667--684}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22792-9\_38}, doi = {10.1007/978-3-642-22792-9\_38}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/IshaiKOPSW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/HanggiW11, author = {Esther H{\"{a}}nggi and J{\"{u}}rg Wullschleger}, editor = {Yuval Ishai}, title = {Tight Bounds for Classical and Quantum Coin Flipping}, booktitle = {Theory of Cryptography - 8th Theory of Cryptography Conference, {TCC} 2011, Providence, RI, USA, March 28-30, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6597}, pages = {468--485}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-19571-6\_28}, doi = {10.1007/978-3-642-19571-6\_28}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/HanggiW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tqc/Wullschleger11, author = {J{\"{u}}rg Wullschleger}, editor = {Dave Bacon and Miguel{-}Angel Martin{-}Delgado and Martin Roetteler}, title = {Bitwise Quantum Min-Entropy Sampling and New Lower Bounds for Random Access Codes}, booktitle = {Theory of Quantum Computation, Communication, and Cryptography - 6th Conference, {TQC} 2011, Madrid, Spain, May 24-26, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6745}, pages = {164--173}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-54429-3\_11}, doi = {10.1007/978-3-642-54429-3\_11}, timestamp = {Thu, 14 Oct 2021 09:54:54 +0200}, biburl = {https://dblp.org/rec/conf/tqc/Wullschleger11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RanellucciTWW11, author = {Samuel Ranellucci and Alain Tapp and Severin Winkler and J{\"{u}}rg Wullschleger}, title = {On the Efficiency of Bit Commitment Reductions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {324}, year = {2011}, url = {http://eprint.iacr.org/2011/324}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RanellucciTWW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/WinklerW10, author = {Severin Winkler and J{\"{u}}rg Wullschleger}, editor = {Tal Rabin}, title = {On the Efficiency of Classical and Quantum Oblivious Transfer Reductions}, booktitle = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6223}, pages = {707--723}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14623-7\_38}, doi = {10.1007/978-3-642-14623-7\_38}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/WinklerW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/HanggiW10, author = {Esther H{\"{a}}nggi and J{\"{u}}rg Wullschleger}, title = {Tight bounds for classical and quantum coin flipping}, journal = {CoRR}, volume = {abs/1009.4741}, year = {2010}, url = {http://arxiv.org/abs/1009.4741}, eprinttype = {arXiv}, eprint = {1009.4741}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/HanggiW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1012-2291, author = {J{\"{u}}rg Wullschleger}, title = {Bitwise Quantum Min-Entropy Sampling and New Lower Bounds for Random Access Codes}, journal = {CoRR}, volume = {abs/1012.2291}, year = {2010}, url = {http://arxiv.org/abs/1012.2291}, eprinttype = {arXiv}, eprint = {1012.2291}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1012-2291.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/Wullschleger09, author = {J{\"{u}}rg Wullschleger}, editor = {Omer Reingold}, title = {Oblivious Transfer from Weak Noisy Channels}, booktitle = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC} 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5444}, pages = {332--349}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00457-5\_20}, doi = {10.1007/978-3-642-00457-5\_20}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/Wullschleger09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0906-1030, author = {Robert Koenig and Stephanie Wehner and J{\"{u}}rg Wullschleger}, title = {Unconditional security from noisy quantum storage}, journal = {CoRR}, volume = {abs/0906.1030}, year = {2009}, url = {http://arxiv.org/abs/0906.1030}, eprinttype = {arXiv}, eprint = {0906.1030}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0906-1030.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Wullschleger09, author = {J{\"{u}}rg Wullschleger}, title = {Efficiently from Semi-honest to Malicious {OT} via {OLFE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {428}, year = {2009}, url = {http://eprint.iacr.org/2009/428}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Wullschleger09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WinklerW09, author = {Severin Winkler and J{\"{u}}rg Wullschleger}, title = {On the Efficiency of Classical and Quantum Oblivious Transfer Reductions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {508}, year = {2009}, url = {http://eprint.iacr.org/2009/508}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WinklerW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:books/daglib/0020556, author = {J{\"{u}}rg Wullschleger}, title = {Oblivious-transfer amplification}, school = {Universit{\"{a}}t Z{\"{u}}rich}, year = {2008}, timestamp = {Wed, 09 Feb 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/daglib/0020556.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/WolfW08, author = {Stefan Wolf and J{\"{u}}rg Wullschleger}, title = {New Monotones and Lower Bounds in Unconditional Two-Party Computation}, journal = {{IEEE} Trans. Inf. Theory}, volume = {54}, number = {6}, pages = {2792--2797}, year = {2008}, url = {https://doi.org/10.1109/TIT.2008.921674}, doi = {10.1109/TIT.2008.921674}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tit/WolfW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/PrzydatekW08, author = {Bartosz Przydatek and J{\"{u}}rg Wullschleger}, editor = {Luca Aceto and Ivan Damg{\aa}rd and Leslie Ann Goldberg and Magn{\'{u}}s M. Halld{\'{o}}rsson and Anna Ing{\'{o}}lfsd{\'{o}}ttir and Igor Walukiewicz}, title = {Error-Tolerant Combiners for Oblivious Primitives}, booktitle = {Automata, Languages and Programming, 35th International Colloquium, {ICALP} 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part {II} - Track {B:} Logic, Semantics, and Theory of Programming {\&} Track {C:} Security and Cryptography Foundations}, series = {Lecture Notes in Computer Science}, volume = {5126}, pages = {461--472}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70583-3\_38}, doi = {10.1007/978-3-540-70583-3\_38}, timestamp = {Fri, 27 Mar 2020 09:02:59 +0100}, biburl = {https://dblp.org/rec/conf/icalp/PrzydatekW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/WehnerW08, author = {Stephanie Wehner and J{\"{u}}rg Wullschleger}, editor = {Luca Aceto and Ivan Damg{\aa}rd and Leslie Ann Goldberg and Magn{\'{u}}s M. Halld{\'{o}}rsson and Anna Ing{\'{o}}lfsd{\'{o}}ttir and Igor Walukiewicz}, title = {Composable Security in the Bounded-Quantum-Storage Model}, booktitle = {Automata, Languages and Programming, 35th International Colloquium, {ICALP} 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part {II} - Track {B:} Logic, Semantics, and Theory of Programming {\&} Track {C:} Security and Cryptography Foundations}, series = {Lecture Notes in Computer Science}, volume = {5126}, pages = {604--615}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70583-3\_49}, doi = {10.1007/978-3-540-70583-3\_49}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icalp/WehnerW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/CrepeauW08, author = {Claude Cr{\'{e}}peau and J{\"{u}}rg Wullschleger}, editor = {Reihaneh Safavi{-}Naini}, title = {Statistical Security Conditions for Two-Party Secure Function Evaluation}, booktitle = {Information Theoretic Security, Third International Conference, {ICITS} 2008, Calgary, Canada, August 10-13, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5155}, pages = {86--99}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85093-9\_9}, doi = {10.1007/978-3-540-85093-9\_9}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/icits/CrepeauW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Wullschleger08, author = {J{\"{u}}rg Wullschleger}, title = {Oblivious Transfer from Weak Noisy Channels}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {420}, year = {2008}, url = {http://eprint.iacr.org/2008/420}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Wullschleger08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Wullschleger07, author = {J{\"{u}}rg Wullschleger}, editor = {Moni Naor}, title = {Oblivious-Transfer Amplification}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2007, 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4515}, pages = {555--572}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72540-4\_32}, doi = {10.1007/978-3-540-72540-4\_32}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Wullschleger07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/RennerWW07, author = {Renato Renner and Stefan Wolf and J{\"{u}}rg Wullschleger}, editor = {Yvo Desmedt}, title = {Trade-Offs in Information-Theoretic Multi-party One-Way Key Agreement}, booktitle = {Information Theoretic Security - Second International Conference, {ICITS} 2007, Madrid, Spain, May 25-29, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4883}, pages = {65--75}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-642-10230-1\_5}, doi = {10.1007/978-3-642-10230-1\_5}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/RennerWW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/MeierPW07, author = {Remo Meier and Bartosz Przydatek and J{\"{u}}rg Wullschleger}, editor = {Salil P. Vadhan}, title = {Robuster Combiners for Oblivious Transfer}, booktitle = {Theory of Cryptography, 4th Theory of Cryptography Conference, {TCC} 2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4392}, pages = {404--418}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-70936-7\_22}, doi = {10.1007/978-3-540-70936-7\_22}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/MeierPW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:conf/gi/Wullschleger07, author = {J{\"{u}}rg Wullschleger}, editor = {Abraham Bernstein and Thomas Dreier and Steffen H{\"{o}}lldobler and G{\"{u}}nter Hotz and Klaus{-}Peter L{\"{o}}hr and Paul Molitor and Gustaf Neumann and R{\"{u}}diger Reischuk and Dietmar Saupe and Myra Spiliopoulou and Harald St{\"{o}}rrle and Dorothea Wagner}, title = {Oblivious Transfer Amplification - Verst{\"{a}}rkung vergesslicher {\"{U}}bertragung}, booktitle = {Ausgezeichnete Informatikdissertationen 2007}, series = {{LNI}}, volume = {{D-8}}, pages = {309--318}, publisher = {{GI}}, year = {2007}, url = {https://dl.gi.de/handle/20.500.12116/33648}, timestamp = {Tue, 04 Jul 2023 17:43:50 +0200}, biburl = {https://dblp.org/rec/conf/gi/Wullschleger07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0709-0492, author = {Stephanie Wehner and J{\"{u}}rg Wullschleger}, title = {Composable Security in the Bounded-Quantum-Storage Model}, journal = {CoRR}, volume = {abs/0709.0492}, year = {2007}, url = {http://arxiv.org/abs/0709.0492}, eprinttype = {arXiv}, eprint = {0709.0492}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0709-0492.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/WolfW06, author = {Stefan Wolf and J{\"{u}}rg Wullschleger}, editor = {Serge Vaudenay}, title = {Oblivious Transfer Is Symmetric}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28 - June 1, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4004}, pages = {222--232}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11761679\_14}, doi = {10.1007/11761679\_14}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/WolfW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CrepeauSSW06, author = {Claude Cr{\'{e}}peau and George Savvides and Christian Schaffner and J{\"{u}}rg Wullschleger}, editor = {Serge Vaudenay}, title = {Information-Theoretic Conditions for Two-Party Secure Function Evaluation}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28 - June 1, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4004}, pages = {538--554}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11761679\_32}, doi = {10.1007/11761679\_32}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CrepeauSSW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/Fitzi0W06, author = {Matthias Fitzi and Stefan Wolf and J{\"{u}}rg Wullschleger}, title = {On the Power of Imperfect Broadcast}, booktitle = {Proceedings 2006 {IEEE} International Symposium on Information Theory, {ISIT} 2006, The Westin Seattle, Seattle, Washington, USA, July 9-14, 2006}, pages = {504--505}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/ISIT.2006.261766}, doi = {10.1109/ISIT.2006.261766}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isit/Fitzi0W06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/Renner0W06, author = {Renato Renner and Stefan Wolf and J{\"{u}}rg Wullschleger}, title = {The Single-Serving Channel Capacity}, booktitle = {Proceedings 2006 {IEEE} International Symposium on Information Theory, {ISIT} 2006, The Westin Seattle, Seattle, Washington, USA, July 9-14, 2006}, pages = {1424--1427}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/ISIT.2006.262081}, doi = {10.1109/ISIT.2006.262081}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isit/Renner0W06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itw/GisinPS0W06, author = {Nicolas Gisin and Sandu Popescu and Valerio Scarani and Stefan Wolf and J{\"{u}}rg Wullschleger}, editor = {Gadiel Seroussi and Alfredo Viola}, title = {Oblivious Transfer and Quantum Channels}, booktitle = {2006 {IEEE} Information Theory Workshop, {ITW} 2006, Punta del Este, Uruguay, March 13-17, 2006}, pages = {24--26}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/ITW.2006.1633774}, doi = {10.1109/ITW.2006.1633774}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/itw/GisinPS0W06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-cs-0608018, author = {Renato Renner and Stefan Wolf and J{\"{u}}rg Wullschleger}, title = {The single-serving channel capacity}, journal = {CoRR}, volume = {abs/cs/0608018}, year = {2006}, url = {http://arxiv.org/abs/cs/0608018}, eprinttype = {arXiv}, eprint = {cs/0608018}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-cs-0608018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-cs-0608076, author = {J{\"{u}}rg Wullschleger}, title = {Oblivious-Transfer Amplification}, journal = {CoRR}, volume = {abs/cs/0608076}, year = {2006}, url = {http://arxiv.org/abs/cs/0608076}, eprinttype = {arXiv}, eprint = {cs/0608076}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-cs-0608076.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CrepeauSSW06, author = {Claude Cr{\'{e}}peau and George Savvides and Christian Schaffner and J{\"{u}}rg Wullschleger}, title = {Information-Theoretic Conditions for Two-Party Secure Function Evaluation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {183}, year = {2006}, url = {http://eprint.iacr.org/2006/183}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CrepeauSSW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/WolfW05, author = {Stefan Wolf and J{\"{u}}rg Wullschleger}, editor = {Victor Shoup}, title = {New Monotones and Lower Bounds in Unconditional Two-Party Computation}, booktitle = {Advances in Cryptology - {CRYPTO} 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3621}, pages = {467--477}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11535218\_28}, doi = {10.1007/11535218\_28}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/WolfW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/WolfW05, author = {Stefan Wolf and J{\"{u}}rg Wullschleger}, title = {Bit commitment from weak non-locality}, booktitle = {{IEEE} Information Theory Workshop on Theory and Practice in Information-Theoretic Security, {ICITS} 2005, Awaji Island, Japan, October 16-19, 2005}, pages = {28--30}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/ITWTPI.2005.1543951}, doi = {10.1109/ITWTPI.2005.1543951}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/WolfW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/0001W05a, author = {Stefan Wolf and J{\"{u}}rg Wullschleger}, title = {Oblivious transfer and quantum non-locality}, booktitle = {Proceedings of the 2005 {IEEE} International Symposium on Information Theory, {ISIT} 2005, Adelaide, South Australia, Australia, 4-9 September 2005}, pages = {1745--1748}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/ISIT.2005.1523644}, doi = {10.1109/ISIT.2005.1523644}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isit/0001W05a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/FitziWW04, author = {Matthias Fitzi and Stefan Wolf and J{\"{u}}rg Wullschleger}, editor = {Matthew K. Franklin}, title = {Pseudo-signatures, Broadcast, and Multi-party Computation from Correlated Randomness}, booktitle = {Advances in Cryptology - {CRYPTO} 2004, 24th Annual International CryptologyConference, Santa Barbara, California, USA, August 15-19, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3152}, pages = {562--578}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-28628-8\_34}, doi = {10.1007/978-3-540-28628-8\_34}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/FitziWW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/FitziHW04, author = {Matthias Fitzi and Thomas Holenstein and J{\"{u}}rg Wullschleger}, editor = {Christian Cachin and Jan Camenisch}, title = {Multi-party Computation with Hybrid Security}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2004, International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3027}, pages = {419--438}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24676-3\_25}, doi = {10.1007/978-3-540-24676-3\_25}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/FitziHW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/Wullschleger04, author = {J{\"{u}}rg Wullschleger}, title = {Zero-error communication over networks}, booktitle = {Proceedings of the 2004 {IEEE} International Symposium on Information Theory, {ISIT} 2004, Chicago Downtown Marriott, Chicago, Illinois, USA, June 27 - July 2, 2004}, pages = {35}, publisher = {{IEEE}}, year = {2004}, url = {https://doi.org/10.1109/ISIT.2004.1365072}, doi = {10.1109/ISIT.2004.1365072}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/isit/Wullschleger04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itw/WolfW04, author = {Stefan Wolf and J{\"{u}}rg Wullschleger}, title = {Zero-error information and applications in cryptography}, booktitle = {2004 {IEEE} Information Theory Workshop, San Antonio, TX, USA, 24-29 October, 2004}, pages = {1--6}, publisher = {{IEEE}}, year = {2004}, url = {https://doi.org/10.1109/ITW.2004.1405264}, doi = {10.1109/ITW.2004.1405264}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/itw/WolfW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/cs-IT-0407004, author = {J{\"{u}}rg Wullschleger}, title = {Zero-error communication over networks}, journal = {CoRR}, volume = {cs.IT/0407004}, year = {2004}, url = {http://arxiv.org/abs/cs.IT/0407004}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/cs-IT-0407004.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WolfW04, author = {Stefan Wolf and J{\"{u}}rg Wullschleger}, title = {Oblivious Transfer Is Symmetric}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {336}, year = {2004}, url = {http://eprint.iacr.org/2004/336}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WolfW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/FitziHHW03, author = {Matthias Fitzi and Martin Hirt and Thomas Holenstein and J{\"{u}}rg Wullschleger}, editor = {Eli Biham}, title = {Two-Threshold Broadcast and Detectable Multi-party Computation}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2003, International Conference on the Theory and Applications of Cryptographic Techniques, Warsaw, Poland, May 4-8, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2656}, pages = {51--67}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-39200-9\_4}, doi = {10.1007/3-540-39200-9\_4}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/FitziHHW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FitziHHW02, author = {Matthias Fitzi and Martin Hirt and Thomas Holenstein and J{\"{u}}rg Wullschleger}, title = {Extended Validity and Consistency in Byzantine Agreement}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {53}, year = {2002}, url = {http://eprint.iacr.org/2002/053}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FitziHHW02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.