dblp.uni-trier.dewww.uni-trier.de

Stefan Wolf

ETH Zurich

List of publications from the DBLP Bibliography Server - FAQ

other persons with the same name:


Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2008
29EEGilles Brassard, Anne Broadbent, Esther Hänggi, André Allan Méthot, Stefan Wolf: Classical, Quantum and Non-signalling Resources in Bipartite Games. ICQNM 2008: 80-89
28EEStefan Wolf, Jürg Wullschleger: New Monotones and Lower Bounds in Unconditional Two-Party Computation. IEEE Transactions on Information Theory 54(6): 2792-2797 (2008)
27EEHugues Mercier, Pierre McKenzie, Stefan Wolf: Worst Case Nonzero-Error Interactive Communication. IEEE Transactions on Information Theory 54(7): 2857-2867 (2008)
2006
26EEStefan Wolf, Jürg Wullschleger: Oblivious Transfer Is Symmetric. EUROCRYPT 2006: 222-232
25EERenato Renner, Stefan Wolf, Jürg Wullschleger: The single-serving channel capacity CoRR abs/cs/0608018: (2006)
2005
24EERenato Renner, Stefan Wolf: Simple and Tight Bounds for Information Reconciliation and Privacy Amplification. ASIACRYPT 2005: 199-216
23EEStefan Wolf, Jürg Wullschleger: New Monotones and Lower Bounds in Unconditional Two-Party Computation. CRYPTO 2005: 467-477
2004
22EEMatthias Fitzi, Stefan Wolf, Jürg Wullschleger: Pseudo-signatures, Broadcast, and Multi-party Computation from Correlated Randomness. CRYPTO 2004: 562-578
21EERenato Renner, Stefan Wolf: The Exact Price for Unconditionally Secure Asymmetric Cryptography. EUROCRYPT 2004: 109-125
20EEClaude Crépeau, Kirill Morozov, Stefan Wolf: Efficient Unconditional Oblivious Transfer from Almost Any Noisy Channel. SCN 2004: 47-59
2003
19EERenato Renner, Stefan Wolf: Unconditional Authenticity and Privacy from an Arbitrarily Weak Secret. CRYPTO 2003: 78-95
18EERenato Renner, Stefan Wolf: New Bounds in Secret-Key Agreement: The Gap between Formation and Secrecy Extraction. EUROCRYPT 2003: 562-577
17 Ueli M. Maurer, Stefan Wolf: Secret-key agreement over unauthenticated public channels I: Definitions and a completeness result. IEEE Transactions on Information Theory 49(4): 822-831 (2003)
16 Ueli M. Maurer, Stefan Wolf: Secret-key agreement over unauthenticated public channels II: the simulatability condition. IEEE Transactions on Information Theory 49(4): 832-838 (2003)
15 Ueli M. Maurer, Stefan Wolf: Secret-key agreement over unauthenticated public channels III: Privacy amplification. IEEE Transactions on Information Theory 49(4): 839-851 (2003)
14EEGilles Brassard, Claude Crépeau, Stefan Wolf: Oblivious Transfers and Privacy Amplification. J. Cryptology 16(4): 219-237 (2003)
2002
13EENicolas Gisin, Renato Renner, Stefan Wolf: Linking Classical and Quantum Key Agreement: Is There a Classical Analog to Bound Entanglement? Algorithmica 34(4): 389-412 (2002)
2000
12EENicolas Gisin, Stefan Wolf: Linking Classical and Quantum Key Agreement: Is There ``Bound Information''? CRYPTO 2000: 482-500
11EEUeli M. Maurer, Stefan Wolf: Information-Theoretic Key Agreement: From Weak to Strong Secrecy for Free. EUROCRYPT 2000: 351-368
10 Ueli M. Maurer, Stefan Wolf: The Diffie-Hellman Protocol. Des. Codes Cryptography 19(2/3): 147-171 (2000)
1999
9EEAnna Lysyanskaya, Ronald L. Rivest, Amit Sahai, Stefan Wolf: Pseudonym Systems. Selected Areas in Cryptography 1999: 184-199
8 Ueli M. Maurer, Stefan Wolf: Unconditionally Secure Key Agreement and the Intrinsic Conditional Information. IEEE Transactions on Information Theory 45(2): 499-514 (1999)
7 Ueli M. Maurer, Stefan Wolf: The Relationship Between Breaking the Diffie-Hellman Protocol and Computing Discrete Logarithms. SIAM J. Comput. 28(5): 1689-1721 (1999)
1998
6EEStefan Wolf: Strong Security Against Active Attacks in Information-Theoretic Secret-Key Agreement. ASIACRYPT 1998: 405-419
5EEUeli M. Maurer, Stefan Wolf: Lower Bounds on Generic Algorithms in Groups. EUROCRYPT 1998: 72-84
4EEStefan Wolf: Unconditional Security in Cryptography. Lectures on Data Security 1998: 217-250
1997
3EEUeli M. Maurer, Stefan Wolf: Privacy Amplification Secure Against Active Adversaries. CRYPTO 1997: 307-321
1996
2 Ueli M. Maurer, Stefan Wolf: Towards Characterizing When Information-Theoretic Secret Key Agreement Is Possible. ASIACRYPT 1996: 196-209
1EEUeli M. Maurer, Stefan Wolf: Diffie-Hellman Oracles. CRYPTO 1996: 268-282

Coauthor Index

1Gilles Brassard [14] [29]
2Anne Broadbent [29]
3Claude Crépeau [14] [20]
4Matthias Fitzi [22]
5Nicolas Gisin [12] [13]
6Esther Hänggi [29]
7Anna Lysyanskaya [9]
8Ueli M. Maurer [1] [2] [3] [5] [7] [8] [10] [11] [15] [16] [17]
9Pierre McKenzie [27]
10Hugues Mercier [27]
11André Allan Méthot [29]
12Kirill Morozov [20]
13Renato Renner [13] [18] [19] [21] [24] [25]
14Ronald L. Rivest [9]
15Amit Sahai [9]
16Jürg Wullschleger [22] [23] [25] [26] [28]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)