BibTeX records: Martin Hirt

download as .bib file

@article{DBLP:journals/iacr/BanfiGHM23,
  author       = {Fabio Banfi and
                  Konstantin Gegier and
                  Martin Hirt and
                  Ueli Maurer},
  title        = {Anamorphic Encryption, Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {249},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/249},
  timestamp    = {Tue, 28 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BanfiGHM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gil/GansbergerFBHMH22,
  author       = {Markus Gansberger and
                  Christian Fasching and
                  Christoph Berndl and
                  Martin Hirt and
                  Peter M{\"{u}}llner and
                  Franz Handler},
  editor       = {Markus Gandorfer and
                  Christa Hoffmann and
                  Nadja El Benni and
                  Marianne Cockburn and
                  Thomas Anken and
                  Helga Floto},
  title        = {Innovation Farm - Innovative Technologien f{\"{u}}r die Landwirtschaft
                  erlebbar machen},
  booktitle    = {42. GIL-Jahrestagung, K{\"{u}}nstliche Intelligenz in der Agrar-
                  und Ern{\"{a}}hrungswirtschaft, 21.-22. Februar 2022, Agroscope,
                  T{\"{a}}nikon, Ettenhausen, Schweiz},
  series       = {{LNI}},
  volume       = {{P-317}},
  pages        = {319--322},
  publisher    = {Gesellschaft f{\"{u}}r Informatik e.V.},
  year         = {2022},
  url          = {https://dl.gi.de/handle/20.500.12116/38419},
  timestamp    = {Mon, 08 Apr 2024 17:19:16 +0200},
  biburl       = {https://dblp.org/rec/conf/gil/GansbergerFBHMH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/ChopardHL21,
  author       = {Annick Chopard and
                  Martin Hirt and
                  Chen{-}Da Liu{-}Zhang},
  editor       = {Kobbi Nissim and
                  Brent Waters},
  title        = {On Communication-Efficient Asynchronous {MPC} with Adaptive Security},
  booktitle    = {Theory of Cryptography - 19th International Conference, {TCC} 2021,
                  Raleigh, NC, USA, November 8-11, 2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13043},
  pages        = {35--65},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90453-1\_2},
  doi          = {10.1007/978-3-030-90453-1\_2},
  timestamp    = {Mon, 08 Nov 2021 11:43:29 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/ChopardHL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/DeligiosHL21,
  author       = {Giovanni Deligios and
                  Martin Hirt and
                  Chen{-}Da Liu{-}Zhang},
  editor       = {Kobbi Nissim and
                  Brent Waters},
  title        = {Round-Efficient Byzantine Agreement and Multi-party Computation with
                  Asynchronous Fallback},
  booktitle    = {Theory of Cryptography - 19th International Conference, {TCC} 2021,
                  Raleigh, NC, USA, November 8-11, 2021, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13042},
  pages        = {623--653},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90459-3\_21},
  doi          = {10.1007/978-3-030-90459-3\_21},
  timestamp    = {Wed, 10 Nov 2021 16:16:02 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/DeligiosHL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/HirtLM21,
  author       = {Martin Hirt and
                  Chen{-}Da Liu{-}Zhang and
                  Ueli Maurer},
  editor       = {Kobbi Nissim and
                  Brent Waters},
  title        = {Adaptive Security of Multi-party Protocols, Revisited},
  booktitle    = {Theory of Cryptography - 19th International Conference, {TCC} 2021,
                  Raleigh, NC, USA, November 8-11, 2021, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13042},
  pages        = {686--716},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90459-3\_23},
  doi          = {10.1007/978-3-030-90459-3\_23},
  timestamp    = {Wed, 10 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/HirtLM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DeligiosHL21,
  author       = {Giovanni Deligios and
                  Martin Hirt and
                  Chen{-}Da Liu{-}Zhang},
  title        = {Round-Efficient Byzantine Agreement and Multi-Party Computation with
                  Asynchronous Fallback},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1141},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1141},
  timestamp    = {Mon, 25 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DeligiosHL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChopardHL21,
  author       = {Annick Chopard and
                  Martin Hirt and
                  Chen{-}Da Liu{-}Zhang},
  title        = {On Communication-Efficient Asynchronous {MPC} with Adaptive Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1174},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1174},
  timestamp    = {Mon, 25 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChopardHL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HirtLM21,
  author       = {Martin Hirt and
                  Chen{-}Da Liu{-}Zhang and
                  Ueli Maurer},
  title        = {Adaptive Security of Multi-Party Protocols, Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1175},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1175},
  timestamp    = {Mon, 25 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HirtLM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/HirtM20,
  author       = {Martin Hirt and
                  Marta Mularczyk},
  editor       = {Yael Tauman Kalai and
                  Adam D. Smith and
                  Daniel Wichs},
  title        = {Efficient {MPC} with a Mixed Adversary},
  booktitle    = {1st Conference on Information-Theoretic Cryptography, {ITC} 2020,
                  June 17-19, 2020, Boston, MA, {USA}},
  series       = {LIPIcs},
  volume       = {163},
  pages        = {3:1--3:23},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2020},
  url          = {https://doi.org/10.4230/LIPIcs.ITC.2020.3},
  doi          = {10.4230/LIPICS.ITC.2020.3},
  timestamp    = {Thu, 04 Jun 2020 17:19:53 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/HirtM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/opodis/HirtKL20,
  author       = {Martin Hirt and
                  Ard Kastrati and
                  Chen{-}Da Liu{-}Zhang},
  editor       = {Quentin Bramas and
                  Rotem Oshman and
                  Paolo Romano},
  title        = {Multi-Threshold Asynchronous Reliable Broadcast and Consensus},
  booktitle    = {24th International Conference on Principles of Distributed Systems,
                  {OPODIS} 2020, December 14-16, 2020, Strasbourg, France (Virtual Conference)},
  series       = {LIPIcs},
  volume       = {184},
  pages        = {6:1--6:16},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2020},
  url          = {https://doi.org/10.4230/LIPIcs.OPODIS.2020.6},
  doi          = {10.4230/LIPICS.OPODIS.2020.6},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/opodis/HirtKL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wdag/GhineaHL20,
  author       = {Diana Ghinea and
                  Martin Hirt and
                  Chen{-}Da Liu{-}Zhang},
  editor       = {Hagit Attiya},
  title        = {From Partial to Global Asynchronous Reliable Broadcast},
  booktitle    = {34th International Symposium on Distributed Computing, {DISC} 2020,
                  October 12-16, 2020, Virtual Conference},
  series       = {LIPIcs},
  volume       = {179},
  pages        = {29:1--29:16},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2020},
  url          = {https://doi.org/10.4230/LIPIcs.DISC.2020.29},
  doi          = {10.4230/LIPICS.DISC.2020.29},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wdag/GhineaHL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wdag/HirtKL20,
  author       = {Martin Hirt and
                  Ard Kastrati and
                  Chen{-}Da Liu{-}Zhang},
  editor       = {Hagit Attiya},
  title        = {Brief Announcement: Multi-Threshold Asynchronous Reliable Broadcast
                  and Consensus},
  booktitle    = {34th International Symposium on Distributed Computing, {DISC} 2020,
                  October 12-16, 2020, Virtual Conference},
  series       = {LIPIcs},
  volume       = {179},
  pages        = {48:1--48:3},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2020},
  url          = {https://doi.org/10.4230/LIPIcs.DISC.2020.48},
  doi          = {10.4230/LIPICS.DISC.2020.48},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wdag/HirtKL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HirtM20,
  author       = {Martin Hirt and
                  Marta Mularczyk},
  title        = {Efficient {MPC} with a Mixed Adversary},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {356},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/356},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HirtM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HirtKL20,
  author       = {Martin Hirt and
                  Ard Kastrati and
                  Chen{-}Da Liu{-}Zhang},
  title        = {Multi-Threshold Asynchronous Reliable Broadcast and Consensus},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {958},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/958},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HirtKL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GhineaHL20,
  author       = {Diana Ghinea and
                  Martin Hirt and
                  Chen{-}Da Liu{-}Zhang},
  title        = {From Partial to Global Asynchronous Reliable Broadcast},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {963},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/963},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GhineaHL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BarakHKL18,
  author       = {Assi Barak and
                  Martin Hirt and
                  Lior Koskas and
                  Yehuda Lindell},
  editor       = {David Lie and
                  Mohammad Mannan and
                  Michael Backes and
                  XiaoFeng Wang},
  title        = {An End-to-End System for Large Scale {P2P} MPC-as-a-Service and Low-Bandwidth
                  {MPC} for Weak Participants},
  booktitle    = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2018, Toronto, ON, Canada, October
                  15-19, 2018},
  pages        = {695--712},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3243734.3243801},
  doi          = {10.1145/3243734.3243801},
  timestamp    = {Tue, 10 Nov 2020 20:00:51 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BarakHKL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BarakHKL18,
  author       = {Assi Barak and
                  Martin Hirt and
                  Lior Koskas and
                  Yehuda Lindell},
  title        = {An End-to-End System for Large Scale {P2P} MPC-as-a-Service and Low-Bandwidth
                  {MPC} for Weak Participants},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {751},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/751},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BarakHKL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/CorettiGHZ16,
  author       = {Sandro Coretti and
                  Juan A. Garay and
                  Martin Hirt and
                  Vassilis Zikas},
  editor       = {Jung Hee Cheon and
                  Tsuyoshi Takagi},
  title        = {Constant-Round Asynchronous Multi-Party Computation Based on One-Way
                  Functions},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10032},
  pages        = {998--1021},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53890-6\_33},
  doi          = {10.1007/978-3-662-53890-6\_33},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/CorettiGHZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/HirtMTZ16,
  author       = {Martin Hirt and
                  Ueli Maurer and
                  Daniel Tschudi and
                  Vassilis Zikas},
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {Network-Hiding Communication and Applications to Multi-party Protocols},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9815},
  pages        = {335--365},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53008-5\_12},
  doi          = {10.1007/978-3-662-53008-5\_12},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/HirtMTZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/tcc/2016b1,
  editor       = {Martin Hirt and
                  Adam D. Smith},
  title        = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B,
                  Beijing, China, October 31 - November 3, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9985},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53641-4},
  doi          = {10.1007/978-3-662-53641-4},
  isbn         = {978-3-662-53640-7},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/2016b1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/tcc/2016b2,
  editor       = {Martin Hirt and
                  Adam D. Smith},
  title        = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B,
                  Beijing, China, October 31 - November 3, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9986},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53644-5},
  doi          = {10.1007/978-3-662-53644-5},
  isbn         = {978-3-662-53643-8},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/2016b2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CorettiGHZ16,
  author       = {Sandro Coretti and
                  Juan A. Garay and
                  Martin Hirt and
                  Vassilis Zikas},
  title        = {Constant-Round Asynchronous Multi-Party Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {208},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/208},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CorettiGHZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HirtMTZ16,
  author       = {Martin Hirt and
                  Ueli Maurer and
                  Daniel Tschudi and
                  Vassilis Zikas},
  title        = {Network-Hiding Communication and Applications to Multi-Party Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {556},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/556},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HirtMTZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/HirtR14,
  author       = {Martin Hirt and
                  Pavel Raykov},
  editor       = {Palash Sarkar and
                  Tetsu Iwata},
  title        = {Multi-valued Byzantine Broadcast: The t {\textless} n Case},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2014 - 20th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kaoshiung, Taiwan, R.O.C., December 7-11, 2014, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8874},
  pages        = {448--465},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-45608-8\_24},
  doi          = {10.1007/978-3-662-45608-8\_24},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/HirtR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/latincrypt/AlwenHMPR14,
  author       = {Jo{\"{e}}l Alwen and
                  Martin Hirt and
                  Ueli Maurer and
                  Arpita Patra and
                  Pavel Raykov},
  editor       = {Diego F. Aranha and
                  Alfred Menezes},
  title        = {Anonymous Authentication with Shared Secrets},
  booktitle    = {Progress in Cryptology - {LATINCRYPT} 2014 - Third International Conference
                  on Cryptology and Information Security in Latin America, Florian{\'{o}}polis,
                  Brazil, September 17-19, 2014, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8895},
  pages        = {219--236},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-16295-9\_12},
  doi          = {10.1007/978-3-319-16295-9\_12},
  timestamp    = {Tue, 14 May 2019 10:00:43 +0200},
  biburl       = {https://dblp.org/rec/conf/latincrypt/AlwenHMPR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/AlwenHMPR14,
  author       = {Jo{\"{e}}l Alwen and
                  Martin Hirt and
                  Ueli Maurer and
                  Arpita Patra and
                  Pavel Raykov},
  editor       = {Michel Abdalla and
                  Roberto De Prisco},
  title        = {Key-Indistinguishable Message Authentication Codes},
  booktitle    = {Security and Cryptography for Networks - 9th International Conference,
                  {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8642},
  pages        = {476--493},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10879-7\_27},
  doi          = {10.1007/978-3-319-10879-7\_27},
  timestamp    = {Thu, 23 Jun 2022 19:58:57 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/AlwenHMPR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/HirtMR14,
  author       = {Martin Hirt and
                  Ueli Maurer and
                  Pavel Raykov},
  editor       = {Yehuda Lindell},
  title        = {Broadcast Amplification},
  booktitle    = {Theory of Cryptography - 11th Theory of Cryptography Conference, {TCC}
                  2014, San Diego, CA, USA, February 24-26, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8349},
  pages        = {419--439},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54242-8\_18},
  doi          = {10.1007/978-3-642-54242-8\_18},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/HirtMR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlwenHMPR14,
  author       = {Jo{\"{e}}l Alwen and
                  Martin Hirt and
                  Ueli Maurer and
                  Arpita Patra and
                  Pavel Raykov},
  title        = {Anonymous Authentication with Shared Secrets},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {73},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/073},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlwenHMPR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlwenHMPR14a,
  author       = {Jo{\"{e}}l Alwen and
                  Martin Hirt and
                  Ueli Maurer and
                  Arpita Patra and
                  Pavel Raykov},
  title        = {Key-Indistinguishable Message Authentication Codes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {107},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/107},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlwenHMPR14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/HirtT13,
  author       = {Martin Hirt and
                  Daniel Tschudi},
  editor       = {Kazue Sako and
                  Palash Sarkar},
  title        = {Efficient General-Adversary Multi-Party Computation},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2013 - 19th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Bengaluru, India, December 1-5, 2013, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8270},
  pages        = {181--200},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-42045-0\_10},
  doi          = {10.1007/978-3-642-42045-0\_10},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/HirtT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/HirtML13,
  author       = {Martin Hirt and
                  Christoph Lucas and
                  Ueli Maurer},
  editor       = {Ran Canetti and
                  Juan A. Garay},
  title        = {A Dynamic Tradeoff between Active and Passive Corruptions in Secure
                  Multi-Party Computation},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8043},
  pages        = {203--219},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40084-1\_12},
  doi          = {10.1007/978-3-642-40084-1\_12},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/HirtML13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/HirtML13a,
  author       = {Martin Hirt and
                  Christoph Lucas and
                  Ueli Maurer},
  editor       = {Ran Canetti and
                  Juan A. Garay},
  title        = {Erratum: {A} Dynamic Tradeoff between Active and Passive Corruptions
                  in Secure Multi-Party Computation},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8043},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40084-1\_31},
  doi          = {10.1007/978-3-642-40084-1\_31},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/HirtML13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/DemayGHM13,
  author       = {Gr{\'{e}}gory Demay and
                  Peter Gazi and
                  Martin Hirt and
                  Ueli Maurer},
  editor       = {Thomas Johansson and
                  Phong Q. Nguyen},
  title        = {Resource-Restricted Indifferentiability},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2013, 32nd Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Athens, Greece, May 26-30, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7881},
  pages        = {664--683},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38348-9\_39},
  doi          = {10.1007/978-3-642-38348-9\_39},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/DemayGHM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/HirtR13,
  author       = {Martin Hirt and
                  Pavel Raykov},
  editor       = {Fedor V. Fomin and
                  Rusins Freivalds and
                  Marta Z. Kwiatkowska and
                  David Peleg},
  title        = {On the Complexity of Broadcast Setup},
  booktitle    = {Automata, Languages, and Programming - 40th International Colloquium,
                  {ICALP} 2013, Riga, Latvia, July 8-12, 2013, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {7965},
  pages        = {552--563},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39206-1\_47},
  doi          = {10.1007/978-3-642-39206-1\_47},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/HirtR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wdag/ChoudhuryHP13,
  author       = {Ashish Choudhury and
                  Martin Hirt and
                  Arpita Patra},
  editor       = {Yehuda Afek},
  title        = {Asynchronous Multiparty Computation with Linear Communication Complexity},
  booktitle    = {Distributed Computing - 27th International Symposium, {DISC} 2013,
                  Jerusalem, Israel, October 14-18, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8205},
  pages        = {388--402},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41527-2\_27},
  doi          = {10.1007/978-3-642-41527-2\_27},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wdag/ChoudhuryHP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HirtR13,
  author       = {Martin Hirt and
                  Pavel Raykov},
  title        = {On the Complexity of Broadcast Setup},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {103},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/103},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HirtR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HirtML13,
  author       = {Martin Hirt and
                  Ueli Maurer and
                  Christoph Lucas},
  title        = {A Dynamic Tradeoff Between Active and Passive Corruptions in Secure
                  Multi-Party Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {349},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/349},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HirtML13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HirtR13a,
  author       = {Martin Hirt and
                  Pavel Raykov},
  title        = {Multi-Valued Byzantine Broadcast: the t{\textless}n Case},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {553},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/553},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HirtR13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HirtT13,
  author       = {Martin Hirt and
                  Daniel Tschudi},
  title        = {Efficient General-Adversary Multi-Party Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {571},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/571},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HirtT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HirtMR13,
  author       = {Martin Hirt and
                  Ueli Maurer and
                  Pavel Raykov},
  title        = {Broadcast Amplification},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {769},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/769},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HirtMR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/HirtLMR12,
  author       = {Martin Hirt and
                  Christoph Lucas and
                  Ueli Maurer and
                  Dominik Raub},
  editor       = {Adam D. Smith},
  title        = {Passive Corruption in Statistical Multi-Party Computation - (Extended
                  Abstract)},
  booktitle    = {Information Theoretic Security - 6th International Conference, {ICITS}
                  2012, Montreal, QC, Canada, August 15-17, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7412},
  pages        = {129--146},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32284-6\_8},
  doi          = {10.1007/978-3-642-32284-6\_8},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/HirtLMR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HirtLMR12,
  author       = {Martin Hirt and
                  Christoph Lucas and
                  Ueli Maurer and
                  Dominik Raub},
  title        = {Passive Corruption in Statistical Multi-Party Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {272},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/272},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HirtLMR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChoudhuryHP12,
  author       = {Ashish Choudhury and
                  Martin Hirt and
                  Arpita Patra},
  title        = {Unconditionally Secure Asynchronous Multiparty Computation with Linear
                  Communication Complexity},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {517},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/517},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChoudhuryHP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DemayGHM12,
  author       = {Gr{\'{e}}gory Demay and
                  Peter Gazi and
                  Martin Hirt and
                  Ueli Maurer},
  title        = {Resource-Restricted Indifferentiability},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {613},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/613},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DemayGHM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/HirtZ11,
  author       = {Martin Hirt and
                  Vassilis Zikas},
  editor       = {Luca Aceto and
                  Monika Henzinger and
                  Jir{\'{\i}} Sgall},
  title        = {Player-Centric Byzantine Agreement},
  booktitle    = {Automata, Languages and Programming - 38th International Colloquium,
                  {ICALP} 2011, Zurich, Switzerland, July 4-8, 2011, Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {6755},
  pages        = {281--292},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22006-7\_24},
  doi          = {10.1007/978-3-642-22006-7\_24},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/HirtZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/HirtLMR11,
  author       = {Martin Hirt and
                  Christoph Lucas and
                  Ueli Maurer and
                  Dominik Raub},
  editor       = {Serge Fehr},
  title        = {Graceful Degradation in Multi-Party Computation (Extended Abstract)},
  booktitle    = {Information Theoretic Security - 5th International Conference, {ICITS}
                  2011, Amsterdam, The Netherlands, May 21-24, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6673},
  pages        = {163--180},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-20728-0\_15},
  doi          = {10.1007/978-3-642-20728-0\_15},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/HirtLMR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HirtLMR11,
  author       = {Martin Hirt and
                  Christoph Lucas and
                  Ueli Maurer and
                  Dominik Raub},
  title        = {Graceful Degradation in Multi-Party Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {94},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/094},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HirtLMR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/HirtZ10,
  author       = {Martin Hirt and
                  Vassilis Zikas},
  editor       = {Henri Gilbert},
  title        = {Adaptively Secure Broadcast},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2010, 29th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Monaco / French Riviera, May 30 - June 3, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6110},
  pages        = {466--485},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13190-5\_24},
  doi          = {10.1007/978-3-642-13190-5\_24},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/HirtZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/podc/Beerliova-TrubiniovaHN10,
  author       = {Zuzana Beerliov{\'{a}}{-}Trub{\'{\i}}niov{\'{a}} and
                  Martin Hirt and
                  Jesper Buus Nielsen},
  editor       = {Andr{\'{e}}a W. Richa and
                  Rachid Guerraoui},
  title        = {On the theoretical gap between synchronous and asynchronous {MPC}
                  protocols},
  booktitle    = {Proceedings of the 29th Annual {ACM} Symposium on Principles of Distributed
                  Computing, {PODC} 2010, Zurich, Switzerland, July 25-28, 2010},
  pages        = {211--218},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1835698.1835746},
  doi          = {10.1145/1835698.1835746},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/podc/Beerliova-TrubiniovaHN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wote/Hirt10,
  author       = {Martin Hirt},
  editor       = {David Chaum and
                  Markus Jakobsson and
                  Ronald L. Rivest and
                  Peter Y. A. Ryan and
                  Josh Benaloh and
                  Miroslaw Kutylowski and
                  Ben Adida},
  title        = {Receipt-Free \emph{K}-out-of-\emph{L} Voting Based on ElGamal Encryption},
  booktitle    = {Towards Trustworthy Elections, New Directions in Electronic Voting},
  series       = {Lecture Notes in Computer Science},
  volume       = {6000},
  pages        = {64--82},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12980-3\_3},
  doi          = {10.1007/978-3-642-12980-3\_3},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/wote/Hirt10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HirtZ09,
  author       = {Martin Hirt and
                  Vassilis Zikas},
  title        = {Adaptively Secure Broadcast},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {230},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/230},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HirtZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/HirtMZ08,
  author       = {Martin Hirt and
                  Ueli M. Maurer and
                  Vassilis Zikas},
  editor       = {Josef Pieprzyk},
  title        = {{MPC} vs. {SFE} : Unconditional and Computational Security},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2008, 14th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Melbourne, Australia, December 7-11, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5350},
  pages        = {1--18},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89255-7\_1},
  doi          = {10.1007/978-3-540-89255-7\_1},
  timestamp    = {Sun, 02 Jun 2019 21:16:53 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/HirtMZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/HirtNP08,
  author       = {Martin Hirt and
                  Jesper Buus Nielsen and
                  Bartosz Przydatek},
  editor       = {Luca Aceto and
                  Ivan Damg{\aa}rd and
                  Leslie Ann Goldberg and
                  Magn{\'{u}}s M. Halld{\'{o}}rsson and
                  Anna Ing{\'{o}}lfsd{\'{o}}ttir and
                  Igor Walukiewicz},
  title        = {Asynchronous Multi-Party Computation with Quadratic Communication},
  booktitle    = {Automata, Languages and Programming, 35th International Colloquium,
                  {ICALP} 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part
                  {II} - Track {B:} Logic, Semantics, and Theory of Programming {\&}
                  Track {C:} Security and Cryptography Foundations},
  series       = {Lecture Notes in Computer Science},
  volume       = {5126},
  pages        = {473--485},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70583-3\_39},
  doi          = {10.1007/978-3-540-70583-3\_39},
  timestamp    = {Fri, 27 Mar 2020 09:02:59 +0100},
  biburl       = {https://dblp.org/rec/conf/icalp/HirtNP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/Beerliova-TrubiniovaH08,
  author       = {Zuzana Beerliov{\'{a}}{-}Trub{\'{\i}}niov{\'{a}} and
                  Martin Hirt},
  editor       = {Ran Canetti},
  title        = {Perfectly-Secure {MPC} with Linear Communication Complexity},
  booktitle    = {Theory of Cryptography, Fifth Theory of Cryptography Conference, {TCC}
                  2008, New York, USA, March 19-21, 2008},
  series       = {Lecture Notes in Computer Science},
  volume       = {4948},
  pages        = {213--230},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78524-8\_13},
  doi          = {10.1007/978-3-540-78524-8\_13},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/Beerliova-TrubiniovaH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/Beerliova-TrubiniovaFHMZ08,
  author       = {Zuzana Beerliov{\'{a}}{-}Trub{\'{\i}}niov{\'{a}} and
                  Matthias Fitzi and
                  Martin Hirt and
                  Ueli M. Maurer and
                  Vassilis Zikas},
  editor       = {Ran Canetti},
  title        = {{MPC} vs. {SFE:} Perfect Security in a Unified Corruption Model},
  booktitle    = {Theory of Cryptography, Fifth Theory of Cryptography Conference, {TCC}
                  2008, New York, USA, March 19-21, 2008},
  series       = {Lecture Notes in Computer Science},
  volume       = {4948},
  pages        = {231--250},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78524-8\_14},
  doi          = {10.1007/978-3-540-78524-8\_14},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/Beerliova-TrubiniovaFHMZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Beerliova-TrubiniovaHN08,
  author       = {Zuzana Beerliov{\'{a}}{-}Trub{\'{\i}}niov{\'{a}} and
                  Martin Hirt and
                  Jesper Buus Nielsen},
  title        = {Almost-Asynchronous {MPC} with Faulty Minority},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {416},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/416},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Beerliova-TrubiniovaHN08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/Beerliova-TrubiniovaH07,
  author       = {Zuzana Beerliov{\'{a}}{-}Trub{\'{\i}}niov{\'{a}} and
                  Martin Hirt},
  editor       = {Kaoru Kurosawa},
  title        = {Simple and Efficient Perfectly-Secure Asynchronous {MPC}},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2007, 13th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kuching, Malaysia, December 2-6, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4833},
  pages        = {376--392},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-76900-2\_23},
  doi          = {10.1007/978-3-540-76900-2\_23},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/Beerliova-TrubiniovaH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/Beerliova-TrubiniovaHR07,
  author       = {Zuzana Beerliov{\'{a}}{-}Trub{\'{\i}}niov{\'{a}} and
                  Martin Hirt and
                  Micha Riser},
  editor       = {Kaoru Kurosawa},
  title        = {Efficient Byzantine Agreement with Faulty Minority},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2007, 13th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kuching, Malaysia, December 2-6, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4833},
  pages        = {393--409},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-76900-2\_24},
  doi          = {10.1007/978-3-540-76900-2\_24},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/Beerliova-TrubiniovaHR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Beerliova-TrubiniovaFHMZ07,
  author       = {Zuzana Beerliov{\'{a}}{-}Trub{\'{\i}}niov{\'{a}} and
                  Matthias Fitzi and
                  Martin Hirt and
                  Ueli Maurer and
                  Vassilis Zikas},
  title        = {{MPC} vs. {SFE:} Perfect Security in a Unified Corruption Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {78},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/078},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Beerliova-TrubiniovaFHMZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/HirtN06,
  author       = {Martin Hirt and
                  Jesper Buus Nielsen},
  editor       = {Cynthia Dwork},
  title        = {Robust Multiparty Computation with Linear Communication Complexity},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2006, 26th Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 20-24,
                  2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4117},
  pages        = {463--482},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11818175\_28},
  doi          = {10.1007/11818175\_28},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/HirtN06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/podc/FitziH06,
  author       = {Matthias Fitzi and
                  Martin Hirt},
  editor       = {Eric Ruppert and
                  Dahlia Malkhi},
  title        = {Optimally efficient multi-valued byzantine agreement},
  booktitle    = {Proceedings of the Twenty-Fifth Annual {ACM} Symposium on Principles
                  of Distributed Computing, {PODC} 2006, Denver, CO, USA, July 23-26,
                  2006},
  pages        = {163--168},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1146381.1146407},
  doi          = {10.1145/1146381.1146407},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/podc/FitziH06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/Beerliova-TrubiniovaH06,
  author       = {Zuzana Beerliov{\'{a}}{-}Trub{\'{\i}}niov{\'{a}} and
                  Martin Hirt},
  editor       = {Shai Halevi and
                  Tal Rabin},
  title        = {Efficient Multi-party Computation with Dispute Control},
  booktitle    = {Theory of Cryptography, Third Theory of Cryptography Conference, {TCC}
                  2006, New York, NY, USA, March 4-7, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3876},
  pages        = {305--328},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11681878\_16},
  doi          = {10.1007/11681878\_16},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/Beerliova-TrubiniovaH06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/HirtN05,
  author       = {Martin Hirt and
                  Jesper Buus Nielsen},
  editor       = {Bimal K. Roy},
  title        = {Upper Bounds on the Communication Complexity of Optimally Resilient
                  Cryptographic Multiparty Computation},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2005, 11th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Chennai, India, December 4-8, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3788},
  pages        = {79--99},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11593447\_5},
  doi          = {10.1007/11593447\_5},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/HirtN05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/HirtNP05,
  author       = {Martin Hirt and
                  Jesper Buus Nielsen and
                  Bartosz Przydatek},
  editor       = {Ronald Cramer},
  title        = {Cryptographic Asynchronous Multi-party Computation with Optimal Resilience
                  (Extended Abstract)},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Aarhus, Denmark, May 22-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3494},
  pages        = {322--340},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11426639\_19},
  doi          = {10.1007/11426639\_19},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/HirtNP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HirtN04,
  author       = {Martin Hirt and
                  Jesper Buus Nielsen},
  title        = {Upper Bounds on the Communication Complexity of Optimally Resilient
                  Cryptographic Multiparty Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {318},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/318},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HirtN04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HirtNP04,
  author       = {Martin Hirt and
                  Jesper Buus Nielsen and
                  Bartosz Przydatek},
  title        = {Cryptographic Asynchronous Multi-Party Computation with Optimal Resilience},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {368},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/368},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HirtNP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/FitziHHW03,
  author       = {Matthias Fitzi and
                  Martin Hirt and
                  Thomas Holenstein and
                  J{\"{u}}rg Wullschleger},
  editor       = {Eli Biham},
  title        = {Two-Threshold Broadcast and Detectable Multi-party Computation},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2003, International Conference
                  on the Theory and Applications of Cryptographic Techniques, Warsaw,
                  Poland, May 4-8, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2656},
  pages        = {51--67},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-39200-9\_4},
  doi          = {10.1007/3-540-39200-9\_4},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/FitziHHW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/podc/FitziGHHS02,
  author       = {Matthias Fitzi and
                  Daniel Gottesman and
                  Martin Hirt and
                  Thomas Holenstein and
                  Adam D. Smith},
  editor       = {Aleta Ricciardi},
  title        = {Detectable byzantine agreement secure against faulty majorities},
  booktitle    = {Proceedings of the Twenty-First Annual {ACM} Symposium on Principles
                  of Distributed Computing, {PODC} 2002, Monterey, California, USA,
                  July 21-24, 2002},
  pages        = {118--126},
  publisher    = {{ACM}},
  year         = {2002},
  url          = {https://doi.org/10.1145/571825.571841},
  doi          = {10.1145/571825.571841},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/podc/FitziGHHS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FitziHHW02,
  author       = {Matthias Fitzi and
                  Martin Hirt and
                  Thomas Holenstein and
                  J{\"{u}}rg Wullschleger},
  title        = {Extended Validity and Consistency in Byzantine Agreement},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {53},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/053},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FitziHHW02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/dnb/Hirt01,
  author       = {Martin Hirt},
  title        = {Multi party computation: efficient protocols, general adversaries,
                  and voting},
  school       = {{ETH} Zurich, Z{\"{u}}rich, Switzerland},
  year         = {2001},
  url          = {https://d-nb.info/963266195},
  isbn         = {978-3-89649-747-5},
  timestamp    = {Sat, 17 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/dnb/Hirt01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/HirtM01,
  author       = {Martin Hirt and
                  Ueli M. Maurer},
  editor       = {Joe Kilian},
  title        = {Robustness for Free in Unconditional Multi-party Computation},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2001, 21st Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 19-23,
                  2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2139},
  pages        = {101--118},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44647-8\_6},
  doi          = {10.1007/3-540-44647-8\_6},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/HirtM01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HirtM01,
  author       = {Martin Hirt and
                  Ueli Maurer},
  title        = {Robustness for Free in Unconditional Multi-Party Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {23},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/023},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HirtM01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/HirtM00,
  author       = {Martin Hirt and
                  Ueli M. Maurer},
  title        = {Player Simulation and General Adversary Structures in Perfect Multiparty
                  Computation},
  journal      = {J. Cryptol.},
  volume       = {13},
  number       = {1},
  pages        = {31--60},
  year         = {2000},
  url          = {https://doi.org/10.1007/s001459910003},
  doi          = {10.1007/S001459910003},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/HirtM00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/HirtMP00,
  author       = {Martin Hirt and
                  Ueli M. Maurer and
                  Bartosz Przydatek},
  editor       = {Tatsuaki Okamoto},
  title        = {Efficient Secure Multi-party Computation},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2000, 6th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kyoto, Japan, December 3-7, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1976},
  pages        = {143--161},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44448-3\_12},
  doi          = {10.1007/3-540-44448-3\_12},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/HirtMP00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/HirtS00,
  author       = {Martin Hirt and
                  Kazue Sako},
  editor       = {Bart Preneel},
  title        = {Efficient Receipt-Free Voting Based on Homomorphic Encryption},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2000, International Conference
                  on the Theory and Application of Cryptographic Techniques, Bruges,
                  Belgium, May 14-18, 2000, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1807},
  pages        = {539--556},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-45539-6\_38},
  doi          = {10.1007/3-540-45539-6\_38},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/HirtS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/FitziHM99,
  author       = {Matthias Fitzi and
                  Martin Hirt and
                  Ueli M. Maurer},
  editor       = {Kwok{-}Yan Lam and
                  Eiji Okamoto and
                  Chaoping Xing},
  title        = {General Adversaries in Unconditional Multi-party Computation},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} '99, International Conference
                  on the Theory and Applications of Cryptology and Information Security,
                  Singapore, November 14-18, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1716},
  pages        = {232--246},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/978-3-540-48000-6\_19},
  doi          = {10.1007/978-3-540-48000-6\_19},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/FitziHM99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CramerDDHR99,
  author       = {Ronald Cramer and
                  Ivan Damg{\aa}rd and
                  Stefan Dziembowski and
                  Martin Hirt and
                  Tal Rabin},
  editor       = {Jacques Stern},
  title        = {Efficient Multiparty Computations Secure Against an Adaptive Adversary},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '99, International Conference
                  on the Theory and Application of Cryptographic Techniques, Prague,
                  Czech Republic, May 2-6, 1999, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1592},
  pages        = {311--326},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48910-X\_22},
  doi          = {10.1007/3-540-48910-X\_22},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/CramerDDHR99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/FitziHM98,
  author       = {Matthias Fitzi and
                  Martin Hirt and
                  Ueli M. Maurer},
  editor       = {Hugo Krawczyk},
  title        = {Trading Correctness for Privacy in Unconditional Multi-Party Computation
                  (Extended Abstract)},
  booktitle    = {Advances in Cryptology - {CRYPTO} '98, 18th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 23-27, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1462},
  pages        = {121--136},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0055724},
  doi          = {10.1007/BFB0055724},
  timestamp    = {Tue, 01 Jun 2021 15:21:29 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/FitziHM98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/podc/HirtM97,
  author       = {Martin Hirt and
                  Ueli M. Maurer},
  editor       = {James E. Burns and
                  Hagit Attiya},
  title        = {Complete Characterization of Adversaries Tolerable in Secure Multi-Party
                  Computation (Extended Abstract)},
  booktitle    = {Proceedings of the Sixteenth Annual {ACM} Symposium on Principles
                  of Distributed Computing, Santa Barbara, California, USA, August 21-24,
                  1997},
  pages        = {25--34},
  publisher    = {{ACM}},
  year         = {1997},
  url          = {https://doi.org/10.1145/259380.259412},
  doi          = {10.1145/259380.259412},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/podc/HirtM97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics