default search action
Jürg Wullschleger
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2014
- [j5]Severin Winkler, Jürg Wullschleger:
On the Efficiency of Classical and Quantum Secure Function Evaluation. IEEE Trans. Inf. Theory 60(6): 3123-3143 (2014) - [c26]Yuval Ishai, Hemanta K. Maji, Amit Sahai, Jürg Wullschleger:
Single-use ot combiners with near-optimal resilience. ISIT 2014: 1544-1548 - 2013
- [j4]Nicolas Gisin, Sandu Popescu, Valerio Scarani, Stefan Wolf, Jürg Wullschleger:
Oblivious transfer and quantum channels as communication resources. Nat. Comput. 12(1): 13-17 (2013) - 2012
- [j3]Robert Koenig, Stephanie Wehner, Jürg Wullschleger:
Unconditional Security From Noisy Quantum Storage. IEEE Trans. Inf. Theory 58(3): 1962-1984 (2012) - [i15]Severin Winkler, Jürg Wullschleger:
On the Efficiency of Classical and Quantum Secure Function Evaluation. CoRR abs/1205.5136 (2012) - 2011
- [j2]Severin Winkler, Jürg Wullschleger, Stefan Wolf:
Bit Commitment From Nonsignaling Correlations. IEEE Trans. Inf. Theory 57(3): 1770-1779 (2011) - [c25]Samuel Ranellucci, Alain Tapp, Severin Winkler, Jürg Wullschleger:
On the Efficiency of Bit Commitment Reductions. ASIACRYPT 2011: 520-537 - [c24]Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky, Manoj Prabhakaran, Amit Sahai, Jürg Wullschleger:
Constant-Rate Oblivious Transfer from Noisy Channels. CRYPTO 2011: 667-684 - [c23]Esther Hänggi, Jürg Wullschleger:
Tight Bounds for Classical and Quantum Coin Flipping. TCC 2011: 468-485 - [c22]Jürg Wullschleger:
Bitwise Quantum Min-Entropy Sampling and New Lower Bounds for Random Access Codes. TQC 2011: 164-173 - [i14]Samuel Ranellucci, Alain Tapp, Severin Winkler, Jürg Wullschleger:
On the Efficiency of Bit Commitment Reductions. IACR Cryptol. ePrint Arch. 2011: 324 (2011) - 2010
- [c21]Severin Winkler, Jürg Wullschleger:
On the Efficiency of Classical and Quantum Oblivious Transfer Reductions. CRYPTO 2010: 707-723 - [i13]Esther Hänggi, Jürg Wullschleger:
Tight bounds for classical and quantum coin flipping. CoRR abs/1009.4741 (2010) - [i12]Jürg Wullschleger:
Bitwise Quantum Min-Entropy Sampling and New Lower Bounds for Random Access Codes. CoRR abs/1012.2291 (2010)
2000 – 2009
- 2009
- [c20]Jürg Wullschleger:
Oblivious Transfer from Weak Noisy Channels. TCC 2009: 332-349 - [i11]Robert Koenig, Stephanie Wehner, Jürg Wullschleger:
Unconditional security from noisy quantum storage. CoRR abs/0906.1030 (2009) - [i10]Jürg Wullschleger:
Efficiently from Semi-honest to Malicious OT via OLFE. IACR Cryptol. ePrint Arch. 2009: 428 (2009) - [i9]Severin Winkler, Jürg Wullschleger:
On the Efficiency of Classical and Quantum Oblivious Transfer Reductions. IACR Cryptol. ePrint Arch. 2009: 508 (2009) - 2008
- [b1]Jürg Wullschleger:
Oblivious-transfer amplification. Universität Zürich, 2008, pp. I-XII, 1-113 - [j1]Stefan Wolf, Jürg Wullschleger:
New Monotones and Lower Bounds in Unconditional Two-Party Computation. IEEE Trans. Inf. Theory 54(6): 2792-2797 (2008) - [c19]Bartosz Przydatek, Jürg Wullschleger:
Error-Tolerant Combiners for Oblivious Primitives. ICALP (2) 2008: 461-472 - [c18]Stephanie Wehner, Jürg Wullschleger:
Composable Security in the Bounded-Quantum-Storage Model. ICALP (2) 2008: 604-615 - [c17]Claude Crépeau, Jürg Wullschleger:
Statistical Security Conditions for Two-Party Secure Function Evaluation. ICITS 2008: 86-99 - [i8]Jürg Wullschleger:
Oblivious Transfer from Weak Noisy Channels. IACR Cryptol. ePrint Arch. 2008: 420 (2008) - 2007
- [c16]Jürg Wullschleger:
Oblivious-Transfer Amplification. EUROCRYPT 2007: 555-572 - [c15]Renato Renner, Stefan Wolf, Jürg Wullschleger:
Trade-Offs in Information-Theoretic Multi-party One-Way Key Agreement. ICITS 2007: 65-75 - [c14]Remo Meier, Bartosz Przydatek, Jürg Wullschleger:
Robuster Combiners for Oblivious Transfer. TCC 2007: 404-418 - [p1]Jürg Wullschleger:
Oblivious Transfer Amplification - Verstärkung vergesslicher Übertragung. Ausgezeichnete Informatikdissertationen 2007: 309-318 - [i7]Stephanie Wehner, Jürg Wullschleger:
Composable Security in the Bounded-Quantum-Storage Model. CoRR abs/0709.0492 (2007) - 2006
- [c13]Stefan Wolf, Jürg Wullschleger:
Oblivious Transfer Is Symmetric. EUROCRYPT 2006: 222-232 - [c12]Claude Crépeau, George Savvides, Christian Schaffner, Jürg Wullschleger:
Information-Theoretic Conditions for Two-Party Secure Function Evaluation. EUROCRYPT 2006: 538-554 - [c11]Matthias Fitzi, Stefan Wolf, Jürg Wullschleger:
On the Power of Imperfect Broadcast. ISIT 2006: 504-505 - [c10]Renato Renner, Stefan Wolf, Jürg Wullschleger:
The Single-Serving Channel Capacity. ISIT 2006: 1424-1427 - [c9]Nicolas Gisin, Sandu Popescu, Valerio Scarani, Stefan Wolf, Jürg Wullschleger:
Oblivious Transfer and Quantum Channels. ITW 2006: 24-26 - [i6]Renato Renner, Stefan Wolf, Jürg Wullschleger:
The single-serving channel capacity. CoRR abs/cs/0608018 (2006) - [i5]Jürg Wullschleger:
Oblivious-Transfer Amplification. CoRR abs/cs/0608076 (2006) - [i4]Claude Crépeau, George Savvides, Christian Schaffner, Jürg Wullschleger:
Information-Theoretic Conditions for Two-Party Secure Function Evaluation. IACR Cryptol. ePrint Arch. 2006: 183 (2006) - 2005
- [c8]Stefan Wolf, Jürg Wullschleger:
New Monotones and Lower Bounds in Unconditional Two-Party Computation. CRYPTO 2005: 467-477 - [c7]Stefan Wolf, Jürg Wullschleger:
Bit commitment from weak non-locality. ICITS 2005: 28-30 - [c6]Stefan Wolf, Jürg Wullschleger:
Oblivious transfer and quantum non-locality. ISIT 2005: 1745-1748 - 2004
- [c5]Matthias Fitzi, Stefan Wolf, Jürg Wullschleger:
Pseudo-signatures, Broadcast, and Multi-party Computation from Correlated Randomness. CRYPTO 2004: 562-578 - [c4]Matthias Fitzi, Thomas Holenstein, Jürg Wullschleger:
Multi-party Computation with Hybrid Security. EUROCRYPT 2004: 419-438 - [c3]Jürg Wullschleger:
Zero-error communication over networks. ISIT 2004: 35 - [c2]Stefan Wolf, Jürg Wullschleger:
Zero-error information and applications in cryptography. ITW 2004: 1-6 - [i3]Jürg Wullschleger:
Zero-error communication over networks. CoRR cs.IT/0407004 (2004) - [i2]Stefan Wolf, Jürg Wullschleger:
Oblivious Transfer Is Symmetric. IACR Cryptol. ePrint Arch. 2004: 336 (2004) - 2003
- [c1]Matthias Fitzi, Martin Hirt, Thomas Holenstein, Jürg Wullschleger:
Two-Threshold Broadcast and Detectable Multi-party Computation. EUROCRYPT 2003: 51-67 - 2002
- [i1]Matthias Fitzi, Martin Hirt, Thomas Holenstein, Jürg Wullschleger:
Extended Validity and Consistency in Byzantine Agreement. IACR Cryptol. ePrint Arch. 2002: 53 (2002)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:48 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint