ETH Zurich
List of publications from the DBLP Bibliography Server - FAQother persons with the same name:
2008 | ||
---|---|---|
29 | EE | Gilles Brassard, Anne Broadbent, Esther Hänggi, André Allan Méthot, Stefan Wolf: Classical, Quantum and Non-signalling Resources in Bipartite Games. ICQNM 2008: 80-89 |
28 | EE | Stefan Wolf, Jürg Wullschleger: New Monotones and Lower Bounds in Unconditional Two-Party Computation. IEEE Transactions on Information Theory 54(6): 2792-2797 (2008) |
27 | EE | Hugues Mercier, Pierre McKenzie, Stefan Wolf: Worst Case Nonzero-Error Interactive Communication. IEEE Transactions on Information Theory 54(7): 2857-2867 (2008) |
2006 | ||
26 | EE | Stefan Wolf, Jürg Wullschleger: Oblivious Transfer Is Symmetric. EUROCRYPT 2006: 222-232 |
25 | EE | Renato Renner, Stefan Wolf, Jürg Wullschleger: The single-serving channel capacity CoRR abs/cs/0608018: (2006) |
2005 | ||
24 | EE | Renato Renner, Stefan Wolf: Simple and Tight Bounds for Information Reconciliation and Privacy Amplification. ASIACRYPT 2005: 199-216 |
23 | EE | Stefan Wolf, Jürg Wullschleger: New Monotones and Lower Bounds in Unconditional Two-Party Computation. CRYPTO 2005: 467-477 |
2004 | ||
22 | EE | Matthias Fitzi, Stefan Wolf, Jürg Wullschleger: Pseudo-signatures, Broadcast, and Multi-party Computation from Correlated Randomness. CRYPTO 2004: 562-578 |
21 | EE | Renato Renner, Stefan Wolf: The Exact Price for Unconditionally Secure Asymmetric Cryptography. EUROCRYPT 2004: 109-125 |
20 | EE | Claude Crépeau, Kirill Morozov, Stefan Wolf: Efficient Unconditional Oblivious Transfer from Almost Any Noisy Channel. SCN 2004: 47-59 |
2003 | ||
19 | EE | Renato Renner, Stefan Wolf: Unconditional Authenticity and Privacy from an Arbitrarily Weak Secret. CRYPTO 2003: 78-95 |
18 | EE | Renato Renner, Stefan Wolf: New Bounds in Secret-Key Agreement: The Gap between Formation and Secrecy Extraction. EUROCRYPT 2003: 562-577 |
17 | Ueli M. Maurer, Stefan Wolf: Secret-key agreement over unauthenticated public channels I: Definitions and a completeness result. IEEE Transactions on Information Theory 49(4): 822-831 (2003) | |
16 | Ueli M. Maurer, Stefan Wolf: Secret-key agreement over unauthenticated public channels II: the simulatability condition. IEEE Transactions on Information Theory 49(4): 832-838 (2003) | |
15 | Ueli M. Maurer, Stefan Wolf: Secret-key agreement over unauthenticated public channels III: Privacy amplification. IEEE Transactions on Information Theory 49(4): 839-851 (2003) | |
14 | EE | Gilles Brassard, Claude Crépeau, Stefan Wolf: Oblivious Transfers and Privacy Amplification. J. Cryptology 16(4): 219-237 (2003) |
2002 | ||
13 | EE | Nicolas Gisin, Renato Renner, Stefan Wolf: Linking Classical and Quantum Key Agreement: Is There a Classical Analog to Bound Entanglement? Algorithmica 34(4): 389-412 (2002) |
2000 | ||
12 | EE | Nicolas Gisin, Stefan Wolf: Linking Classical and Quantum Key Agreement: Is There ``Bound Information''? CRYPTO 2000: 482-500 |
11 | EE | Ueli M. Maurer, Stefan Wolf: Information-Theoretic Key Agreement: From Weak to Strong Secrecy for Free. EUROCRYPT 2000: 351-368 |
10 | Ueli M. Maurer, Stefan Wolf: The Diffie-Hellman Protocol. Des. Codes Cryptography 19(2/3): 147-171 (2000) | |
1999 | ||
9 | EE | Anna Lysyanskaya, Ronald L. Rivest, Amit Sahai, Stefan Wolf: Pseudonym Systems. Selected Areas in Cryptography 1999: 184-199 |
8 | Ueli M. Maurer, Stefan Wolf: Unconditionally Secure Key Agreement and the Intrinsic Conditional Information. IEEE Transactions on Information Theory 45(2): 499-514 (1999) | |
7 | Ueli M. Maurer, Stefan Wolf: The Relationship Between Breaking the Diffie-Hellman Protocol and Computing Discrete Logarithms. SIAM J. Comput. 28(5): 1689-1721 (1999) | |
1998 | ||
6 | EE | Stefan Wolf: Strong Security Against Active Attacks in Information-Theoretic Secret-Key Agreement. ASIACRYPT 1998: 405-419 |
5 | EE | Ueli M. Maurer, Stefan Wolf: Lower Bounds on Generic Algorithms in Groups. EUROCRYPT 1998: 72-84 |
4 | EE | Stefan Wolf: Unconditional Security in Cryptography. Lectures on Data Security 1998: 217-250 |
1997 | ||
3 | EE | Ueli M. Maurer, Stefan Wolf: Privacy Amplification Secure Against Active Adversaries. CRYPTO 1997: 307-321 |
1996 | ||
2 | Ueli M. Maurer, Stefan Wolf: Towards Characterizing When Information-Theoretic Secret Key Agreement Is Possible. ASIACRYPT 1996: 196-209 | |
1 | EE | Ueli M. Maurer, Stefan Wolf: Diffie-Hellman Oracles. CRYPTO 1996: 268-282 |
1 | Gilles Brassard | [14] [29] |
2 | Anne Broadbent | [29] |
3 | Claude Crépeau | [14] [20] |
4 | Matthias Fitzi | [22] |
5 | Nicolas Gisin | [12] [13] |
6 | Esther Hänggi | [29] |
7 | Anna Lysyanskaya | [9] |
8 | Ueli M. Maurer | [1] [2] [3] [5] [7] [8] [10] [11] [15] [16] [17] |
9 | Pierre McKenzie | [27] |
10 | Hugues Mercier | [27] |
11 | André Allan Méthot | [29] |
12 | Kirill Morozov | [20] |
13 | Renato Renner | [13] [18] [19] [21] [24] [25] |
14 | Ronald L. Rivest | [9] |
15 | Amit Sahai | [9] |
16 | Jürg Wullschleger | [22] [23] [25] [26] [28] |