Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Martin Hirt
@article{DBLP:journals/iacr/BanfiGHM23, author = {Fabio Banfi and Konstantin Gegier and Martin Hirt and Ueli Maurer}, title = {Anamorphic Encryption, Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {249}, year = {2023}, url = {https://eprint.iacr.org/2023/249}, timestamp = {Tue, 28 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BanfiGHM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gil/GansbergerFBHMH22, author = {Markus Gansberger and Christian Fasching and Christoph Berndl and Martin Hirt and Peter M{\"{u}}llner and Franz Handler}, editor = {Markus Gandorfer and Christa Hoffmann and Nadja El Benni and Marianne Cockburn and Thomas Anken and Helga Floto}, title = {Innovation Farm - Innovative Technologien f{\"{u}}r die Landwirtschaft erlebbar machen}, booktitle = {42. GIL-Jahrestagung, K{\"{u}}nstliche Intelligenz in der Agrar- und Ern{\"{a}}hrungswirtschaft, 21.-22. Februar 2022, Agroscope, T{\"{a}}nikon, Ettenhausen, Schweiz}, series = {{LNI}}, volume = {{P-317}}, pages = {319--322}, publisher = {Gesellschaft f{\"{u}}r Informatik e.V.}, year = {2022}, url = {https://dl.gi.de/handle/20.500.12116/38419}, timestamp = {Mon, 08 Apr 2024 17:19:16 +0200}, biburl = {https://dblp.org/rec/conf/gil/GansbergerFBHMH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/ChopardHL21, author = {Annick Chopard and Martin Hirt and Chen{-}Da Liu{-}Zhang}, editor = {Kobbi Nissim and Brent Waters}, title = {On Communication-Efficient Asynchronous {MPC} with Adaptive Security}, booktitle = {Theory of Cryptography - 19th International Conference, {TCC} 2021, Raleigh, NC, USA, November 8-11, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13043}, pages = {35--65}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90453-1\_2}, doi = {10.1007/978-3-030-90453-1\_2}, timestamp = {Mon, 08 Nov 2021 11:43:29 +0100}, biburl = {https://dblp.org/rec/conf/tcc/ChopardHL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/DeligiosHL21, author = {Giovanni Deligios and Martin Hirt and Chen{-}Da Liu{-}Zhang}, editor = {Kobbi Nissim and Brent Waters}, title = {Round-Efficient Byzantine Agreement and Multi-party Computation with Asynchronous Fallback}, booktitle = {Theory of Cryptography - 19th International Conference, {TCC} 2021, Raleigh, NC, USA, November 8-11, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13042}, pages = {623--653}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90459-3\_21}, doi = {10.1007/978-3-030-90459-3\_21}, timestamp = {Wed, 10 Nov 2021 16:16:02 +0100}, biburl = {https://dblp.org/rec/conf/tcc/DeligiosHL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/HirtLM21, author = {Martin Hirt and Chen{-}Da Liu{-}Zhang and Ueli Maurer}, editor = {Kobbi Nissim and Brent Waters}, title = {Adaptive Security of Multi-party Protocols, Revisited}, booktitle = {Theory of Cryptography - 19th International Conference, {TCC} 2021, Raleigh, NC, USA, November 8-11, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13042}, pages = {686--716}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90459-3\_23}, doi = {10.1007/978-3-030-90459-3\_23}, timestamp = {Wed, 10 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/HirtLM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DeligiosHL21, author = {Giovanni Deligios and Martin Hirt and Chen{-}Da Liu{-}Zhang}, title = {Round-Efficient Byzantine Agreement and Multi-Party Computation with Asynchronous Fallback}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1141}, year = {2021}, url = {https://eprint.iacr.org/2021/1141}, timestamp = {Mon, 25 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DeligiosHL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChopardHL21, author = {Annick Chopard and Martin Hirt and Chen{-}Da Liu{-}Zhang}, title = {On Communication-Efficient Asynchronous {MPC} with Adaptive Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1174}, year = {2021}, url = {https://eprint.iacr.org/2021/1174}, timestamp = {Mon, 25 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChopardHL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HirtLM21, author = {Martin Hirt and Chen{-}Da Liu{-}Zhang and Ueli Maurer}, title = {Adaptive Security of Multi-Party Protocols, Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1175}, year = {2021}, url = {https://eprint.iacr.org/2021/1175}, timestamp = {Mon, 25 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HirtLM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/HirtM20, author = {Martin Hirt and Marta Mularczyk}, editor = {Yael Tauman Kalai and Adam D. Smith and Daniel Wichs}, title = {Efficient {MPC} with a Mixed Adversary}, booktitle = {1st Conference on Information-Theoretic Cryptography, {ITC} 2020, June 17-19, 2020, Boston, MA, {USA}}, series = {LIPIcs}, volume = {163}, pages = {3:1--3:23}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2020}, url = {https://doi.org/10.4230/LIPIcs.ITC.2020.3}, doi = {10.4230/LIPICS.ITC.2020.3}, timestamp = {Thu, 04 Jun 2020 17:19:53 +0200}, biburl = {https://dblp.org/rec/conf/icits/HirtM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/opodis/HirtKL20, author = {Martin Hirt and Ard Kastrati and Chen{-}Da Liu{-}Zhang}, editor = {Quentin Bramas and Rotem Oshman and Paolo Romano}, title = {Multi-Threshold Asynchronous Reliable Broadcast and Consensus}, booktitle = {24th International Conference on Principles of Distributed Systems, {OPODIS} 2020, December 14-16, 2020, Strasbourg, France (Virtual Conference)}, series = {LIPIcs}, volume = {184}, pages = {6:1--6:16}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2020}, url = {https://doi.org/10.4230/LIPIcs.OPODIS.2020.6}, doi = {10.4230/LIPICS.OPODIS.2020.6}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/opodis/HirtKL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wdag/GhineaHL20, author = {Diana Ghinea and Martin Hirt and Chen{-}Da Liu{-}Zhang}, editor = {Hagit Attiya}, title = {From Partial to Global Asynchronous Reliable Broadcast}, booktitle = {34th International Symposium on Distributed Computing, {DISC} 2020, October 12-16, 2020, Virtual Conference}, series = {LIPIcs}, volume = {179}, pages = {29:1--29:16}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2020}, url = {https://doi.org/10.4230/LIPIcs.DISC.2020.29}, doi = {10.4230/LIPICS.DISC.2020.29}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wdag/GhineaHL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wdag/HirtKL20, author = {Martin Hirt and Ard Kastrati and Chen{-}Da Liu{-}Zhang}, editor = {Hagit Attiya}, title = {Brief Announcement: Multi-Threshold Asynchronous Reliable Broadcast and Consensus}, booktitle = {34th International Symposium on Distributed Computing, {DISC} 2020, October 12-16, 2020, Virtual Conference}, series = {LIPIcs}, volume = {179}, pages = {48:1--48:3}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2020}, url = {https://doi.org/10.4230/LIPIcs.DISC.2020.48}, doi = {10.4230/LIPICS.DISC.2020.48}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wdag/HirtKL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HirtM20, author = {Martin Hirt and Marta Mularczyk}, title = {Efficient {MPC} with a Mixed Adversary}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {356}, year = {2020}, url = {https://eprint.iacr.org/2020/356}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HirtM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HirtKL20, author = {Martin Hirt and Ard Kastrati and Chen{-}Da Liu{-}Zhang}, title = {Multi-Threshold Asynchronous Reliable Broadcast and Consensus}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {958}, year = {2020}, url = {https://eprint.iacr.org/2020/958}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HirtKL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GhineaHL20, author = {Diana Ghinea and Martin Hirt and Chen{-}Da Liu{-}Zhang}, title = {From Partial to Global Asynchronous Reliable Broadcast}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {963}, year = {2020}, url = {https://eprint.iacr.org/2020/963}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GhineaHL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BarakHKL18, author = {Assi Barak and Martin Hirt and Lior Koskas and Yehuda Lindell}, editor = {David Lie and Mohammad Mannan and Michael Backes and XiaoFeng Wang}, title = {An End-to-End System for Large Scale {P2P} MPC-as-a-Service and Low-Bandwidth {MPC} for Weak Participants}, booktitle = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2018, Toronto, ON, Canada, October 15-19, 2018}, pages = {695--712}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3243734.3243801}, doi = {10.1145/3243734.3243801}, timestamp = {Tue, 10 Nov 2020 20:00:51 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BarakHKL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BarakHKL18, author = {Assi Barak and Martin Hirt and Lior Koskas and Yehuda Lindell}, title = {An End-to-End System for Large Scale {P2P} MPC-as-a-Service and Low-Bandwidth {MPC} for Weak Participants}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {751}, year = {2018}, url = {https://eprint.iacr.org/2018/751}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BarakHKL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/CorettiGHZ16, author = {Sandro Coretti and Juan A. Garay and Martin Hirt and Vassilis Zikas}, editor = {Jung Hee Cheon and Tsuyoshi Takagi}, title = {Constant-Round Asynchronous Multi-Party Computation Based on One-Way Functions}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10032}, pages = {998--1021}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53890-6\_33}, doi = {10.1007/978-3-662-53890-6\_33}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/CorettiGHZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/HirtMTZ16, author = {Martin Hirt and Ueli Maurer and Daniel Tschudi and Vassilis Zikas}, editor = {Matthew Robshaw and Jonathan Katz}, title = {Network-Hiding Communication and Applications to Multi-party Protocols}, booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9815}, pages = {335--365}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53008-5\_12}, doi = {10.1007/978-3-662-53008-5\_12}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/HirtMTZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/tcc/2016b1, editor = {Martin Hirt and Adam D. Smith}, title = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9985}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53641-4}, doi = {10.1007/978-3-662-53641-4}, isbn = {978-3-662-53640-7}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/2016b1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/tcc/2016b2, editor = {Martin Hirt and Adam D. Smith}, title = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9986}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53644-5}, doi = {10.1007/978-3-662-53644-5}, isbn = {978-3-662-53643-8}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/2016b2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CorettiGHZ16, author = {Sandro Coretti and Juan A. Garay and Martin Hirt and Vassilis Zikas}, title = {Constant-Round Asynchronous Multi-Party Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {208}, year = {2016}, url = {http://eprint.iacr.org/2016/208}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CorettiGHZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HirtMTZ16, author = {Martin Hirt and Ueli Maurer and Daniel Tschudi and Vassilis Zikas}, title = {Network-Hiding Communication and Applications to Multi-Party Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {556}, year = {2016}, url = {http://eprint.iacr.org/2016/556}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HirtMTZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/HirtR14, author = {Martin Hirt and Pavel Raykov}, editor = {Palash Sarkar and Tetsu Iwata}, title = {Multi-valued Byzantine Broadcast: The t {\textless} n Case}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8874}, pages = {448--465}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-45608-8\_24}, doi = {10.1007/978-3-662-45608-8\_24}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/HirtR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/latincrypt/AlwenHMPR14, author = {Jo{\"{e}}l Alwen and Martin Hirt and Ueli Maurer and Arpita Patra and Pavel Raykov}, editor = {Diego F. Aranha and Alfred Menezes}, title = {Anonymous Authentication with Shared Secrets}, booktitle = {Progress in Cryptology - {LATINCRYPT} 2014 - Third International Conference on Cryptology and Information Security in Latin America, Florian{\'{o}}polis, Brazil, September 17-19, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8895}, pages = {219--236}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-16295-9\_12}, doi = {10.1007/978-3-319-16295-9\_12}, timestamp = {Tue, 14 May 2019 10:00:43 +0200}, biburl = {https://dblp.org/rec/conf/latincrypt/AlwenHMPR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/AlwenHMPR14, author = {Jo{\"{e}}l Alwen and Martin Hirt and Ueli Maurer and Arpita Patra and Pavel Raykov}, editor = {Michel Abdalla and Roberto De Prisco}, title = {Key-Indistinguishable Message Authentication Codes}, booktitle = {Security and Cryptography for Networks - 9th International Conference, {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8642}, pages = {476--493}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10879-7\_27}, doi = {10.1007/978-3-319-10879-7\_27}, timestamp = {Thu, 23 Jun 2022 19:58:57 +0200}, biburl = {https://dblp.org/rec/conf/scn/AlwenHMPR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/HirtMR14, author = {Martin Hirt and Ueli Maurer and Pavel Raykov}, editor = {Yehuda Lindell}, title = {Broadcast Amplification}, booktitle = {Theory of Cryptography - 11th Theory of Cryptography Conference, {TCC} 2014, San Diego, CA, USA, February 24-26, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8349}, pages = {419--439}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54242-8\_18}, doi = {10.1007/978-3-642-54242-8\_18}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/HirtMR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlwenHMPR14, author = {Jo{\"{e}}l Alwen and Martin Hirt and Ueli Maurer and Arpita Patra and Pavel Raykov}, title = {Anonymous Authentication with Shared Secrets}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {73}, year = {2014}, url = {http://eprint.iacr.org/2014/073}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlwenHMPR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlwenHMPR14a, author = {Jo{\"{e}}l Alwen and Martin Hirt and Ueli Maurer and Arpita Patra and Pavel Raykov}, title = {Key-Indistinguishable Message Authentication Codes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {107}, year = {2014}, url = {http://eprint.iacr.org/2014/107}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlwenHMPR14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/HirtT13, author = {Martin Hirt and Daniel Tschudi}, editor = {Kazue Sako and Palash Sarkar}, title = {Efficient General-Adversary Multi-Party Computation}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2013 - 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8270}, pages = {181--200}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-42045-0\_10}, doi = {10.1007/978-3-642-42045-0\_10}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/HirtT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/HirtML13, author = {Martin Hirt and Christoph Lucas and Ueli Maurer}, editor = {Ran Canetti and Juan A. Garay}, title = {A Dynamic Tradeoff between Active and Passive Corruptions in Secure Multi-Party Computation}, booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8043}, pages = {203--219}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40084-1\_12}, doi = {10.1007/978-3-642-40084-1\_12}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/HirtML13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/HirtML13a, author = {Martin Hirt and Christoph Lucas and Ueli Maurer}, editor = {Ran Canetti and Juan A. Garay}, title = {Erratum: {A} Dynamic Tradeoff between Active and Passive Corruptions in Secure Multi-Party Computation}, booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8043}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40084-1\_31}, doi = {10.1007/978-3-642-40084-1\_31}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/HirtML13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DemayGHM13, author = {Gr{\'{e}}gory Demay and Peter Gazi and Martin Hirt and Ueli Maurer}, editor = {Thomas Johansson and Phong Q. Nguyen}, title = {Resource-Restricted Indifferentiability}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7881}, pages = {664--683}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38348-9\_39}, doi = {10.1007/978-3-642-38348-9\_39}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DemayGHM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/HirtR13, author = {Martin Hirt and Pavel Raykov}, editor = {Fedor V. Fomin and Rusins Freivalds and Marta Z. Kwiatkowska and David Peleg}, title = {On the Complexity of Broadcast Setup}, booktitle = {Automata, Languages, and Programming - 40th International Colloquium, {ICALP} 2013, Riga, Latvia, July 8-12, 2013, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {7965}, pages = {552--563}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39206-1\_47}, doi = {10.1007/978-3-642-39206-1\_47}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/icalp/HirtR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wdag/ChoudhuryHP13, author = {Ashish Choudhury and Martin Hirt and Arpita Patra}, editor = {Yehuda Afek}, title = {Asynchronous Multiparty Computation with Linear Communication Complexity}, booktitle = {Distributed Computing - 27th International Symposium, {DISC} 2013, Jerusalem, Israel, October 14-18, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8205}, pages = {388--402}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41527-2\_27}, doi = {10.1007/978-3-642-41527-2\_27}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wdag/ChoudhuryHP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HirtR13, author = {Martin Hirt and Pavel Raykov}, title = {On the Complexity of Broadcast Setup}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {103}, year = {2013}, url = {http://eprint.iacr.org/2013/103}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HirtR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HirtML13, author = {Martin Hirt and Ueli Maurer and Christoph Lucas}, title = {A Dynamic Tradeoff Between Active and Passive Corruptions in Secure Multi-Party Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {349}, year = {2013}, url = {http://eprint.iacr.org/2013/349}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HirtML13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HirtR13a, author = {Martin Hirt and Pavel Raykov}, title = {Multi-Valued Byzantine Broadcast: the t{\textless}n Case}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {553}, year = {2013}, url = {http://eprint.iacr.org/2013/553}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HirtR13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HirtT13, author = {Martin Hirt and Daniel Tschudi}, title = {Efficient General-Adversary Multi-Party Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {571}, year = {2013}, url = {http://eprint.iacr.org/2013/571}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HirtT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HirtMR13, author = {Martin Hirt and Ueli Maurer and Pavel Raykov}, title = {Broadcast Amplification}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {769}, year = {2013}, url = {http://eprint.iacr.org/2013/769}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HirtMR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/HirtLMR12, author = {Martin Hirt and Christoph Lucas and Ueli Maurer and Dominik Raub}, editor = {Adam D. Smith}, title = {Passive Corruption in Statistical Multi-Party Computation - (Extended Abstract)}, booktitle = {Information Theoretic Security - 6th International Conference, {ICITS} 2012, Montreal, QC, Canada, August 15-17, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7412}, pages = {129--146}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32284-6\_8}, doi = {10.1007/978-3-642-32284-6\_8}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/icits/HirtLMR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HirtLMR12, author = {Martin Hirt and Christoph Lucas and Ueli Maurer and Dominik Raub}, title = {Passive Corruption in Statistical Multi-Party Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {272}, year = {2012}, url = {http://eprint.iacr.org/2012/272}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HirtLMR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChoudhuryHP12, author = {Ashish Choudhury and Martin Hirt and Arpita Patra}, title = {Unconditionally Secure Asynchronous Multiparty Computation with Linear Communication Complexity}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {517}, year = {2012}, url = {http://eprint.iacr.org/2012/517}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChoudhuryHP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DemayGHM12, author = {Gr{\'{e}}gory Demay and Peter Gazi and Martin Hirt and Ueli Maurer}, title = {Resource-Restricted Indifferentiability}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {613}, year = {2012}, url = {http://eprint.iacr.org/2012/613}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DemayGHM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/HirtZ11, author = {Martin Hirt and Vassilis Zikas}, editor = {Luca Aceto and Monika Henzinger and Jir{\'{\i}} Sgall}, title = {Player-Centric Byzantine Agreement}, booktitle = {Automata, Languages and Programming - 38th International Colloquium, {ICALP} 2011, Zurich, Switzerland, July 4-8, 2011, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {6755}, pages = {281--292}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22006-7\_24}, doi = {10.1007/978-3-642-22006-7\_24}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/icalp/HirtZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/HirtLMR11, author = {Martin Hirt and Christoph Lucas and Ueli Maurer and Dominik Raub}, editor = {Serge Fehr}, title = {Graceful Degradation in Multi-Party Computation (Extended Abstract)}, booktitle = {Information Theoretic Security - 5th International Conference, {ICITS} 2011, Amsterdam, The Netherlands, May 21-24, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6673}, pages = {163--180}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20728-0\_15}, doi = {10.1007/978-3-642-20728-0\_15}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/icits/HirtLMR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HirtLMR11, author = {Martin Hirt and Christoph Lucas and Ueli Maurer and Dominik Raub}, title = {Graceful Degradation in Multi-Party Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {94}, year = {2011}, url = {http://eprint.iacr.org/2011/094}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HirtLMR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/HirtZ10, author = {Martin Hirt and Vassilis Zikas}, editor = {Henri Gilbert}, title = {Adaptively Secure Broadcast}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30 - June 3, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6110}, pages = {466--485}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13190-5\_24}, doi = {10.1007/978-3-642-13190-5\_24}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/HirtZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/podc/Beerliova-TrubiniovaHN10, author = {Zuzana Beerliov{\'{a}}{-}Trub{\'{\i}}niov{\'{a}} and Martin Hirt and Jesper Buus Nielsen}, editor = {Andr{\'{e}}a W. Richa and Rachid Guerraoui}, title = {On the theoretical gap between synchronous and asynchronous {MPC} protocols}, booktitle = {Proceedings of the 29th Annual {ACM} Symposium on Principles of Distributed Computing, {PODC} 2010, Zurich, Switzerland, July 25-28, 2010}, pages = {211--218}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1835698.1835746}, doi = {10.1145/1835698.1835746}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/podc/Beerliova-TrubiniovaHN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wote/Hirt10, author = {Martin Hirt}, editor = {David Chaum and Markus Jakobsson and Ronald L. Rivest and Peter Y. A. Ryan and Josh Benaloh and Miroslaw Kutylowski and Ben Adida}, title = {Receipt-Free \emph{K}-out-of-\emph{L} Voting Based on ElGamal Encryption}, booktitle = {Towards Trustworthy Elections, New Directions in Electronic Voting}, series = {Lecture Notes in Computer Science}, volume = {6000}, pages = {64--82}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12980-3\_3}, doi = {10.1007/978-3-642-12980-3\_3}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/wote/Hirt10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HirtZ09, author = {Martin Hirt and Vassilis Zikas}, title = {Adaptively Secure Broadcast}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {230}, year = {2009}, url = {http://eprint.iacr.org/2009/230}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HirtZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/HirtMZ08, author = {Martin Hirt and Ueli M. Maurer and Vassilis Zikas}, editor = {Josef Pieprzyk}, title = {{MPC} vs. {SFE} : Unconditional and Computational Security}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5350}, pages = {1--18}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-89255-7\_1}, doi = {10.1007/978-3-540-89255-7\_1}, timestamp = {Sun, 02 Jun 2019 21:16:53 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/HirtMZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/HirtNP08, author = {Martin Hirt and Jesper Buus Nielsen and Bartosz Przydatek}, editor = {Luca Aceto and Ivan Damg{\aa}rd and Leslie Ann Goldberg and Magn{\'{u}}s M. Halld{\'{o}}rsson and Anna Ing{\'{o}}lfsd{\'{o}}ttir and Igor Walukiewicz}, title = {Asynchronous Multi-Party Computation with Quadratic Communication}, booktitle = {Automata, Languages and Programming, 35th International Colloquium, {ICALP} 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part {II} - Track {B:} Logic, Semantics, and Theory of Programming {\&} Track {C:} Security and Cryptography Foundations}, series = {Lecture Notes in Computer Science}, volume = {5126}, pages = {473--485}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70583-3\_39}, doi = {10.1007/978-3-540-70583-3\_39}, timestamp = {Fri, 27 Mar 2020 09:02:59 +0100}, biburl = {https://dblp.org/rec/conf/icalp/HirtNP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/Beerliova-TrubiniovaH08, author = {Zuzana Beerliov{\'{a}}{-}Trub{\'{\i}}niov{\'{a}} and Martin Hirt}, editor = {Ran Canetti}, title = {Perfectly-Secure {MPC} with Linear Communication Complexity}, booktitle = {Theory of Cryptography, Fifth Theory of Cryptography Conference, {TCC} 2008, New York, USA, March 19-21, 2008}, series = {Lecture Notes in Computer Science}, volume = {4948}, pages = {213--230}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78524-8\_13}, doi = {10.1007/978-3-540-78524-8\_13}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/Beerliova-TrubiniovaH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/Beerliova-TrubiniovaFHMZ08, author = {Zuzana Beerliov{\'{a}}{-}Trub{\'{\i}}niov{\'{a}} and Matthias Fitzi and Martin Hirt and Ueli M. Maurer and Vassilis Zikas}, editor = {Ran Canetti}, title = {{MPC} vs. {SFE:} Perfect Security in a Unified Corruption Model}, booktitle = {Theory of Cryptography, Fifth Theory of Cryptography Conference, {TCC} 2008, New York, USA, March 19-21, 2008}, series = {Lecture Notes in Computer Science}, volume = {4948}, pages = {231--250}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78524-8\_14}, doi = {10.1007/978-3-540-78524-8\_14}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/Beerliova-TrubiniovaFHMZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Beerliova-TrubiniovaHN08, author = {Zuzana Beerliov{\'{a}}{-}Trub{\'{\i}}niov{\'{a}} and Martin Hirt and Jesper Buus Nielsen}, title = {Almost-Asynchronous {MPC} with Faulty Minority}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {416}, year = {2008}, url = {http://eprint.iacr.org/2008/416}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Beerliova-TrubiniovaHN08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/Beerliova-TrubiniovaH07, author = {Zuzana Beerliov{\'{a}}{-}Trub{\'{\i}}niov{\'{a}} and Martin Hirt}, editor = {Kaoru Kurosawa}, title = {Simple and Efficient Perfectly-Secure Asynchronous {MPC}}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2007, 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4833}, pages = {376--392}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-76900-2\_23}, doi = {10.1007/978-3-540-76900-2\_23}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/Beerliova-TrubiniovaH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/Beerliova-TrubiniovaHR07, author = {Zuzana Beerliov{\'{a}}{-}Trub{\'{\i}}niov{\'{a}} and Martin Hirt and Micha Riser}, editor = {Kaoru Kurosawa}, title = {Efficient Byzantine Agreement with Faulty Minority}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2007, 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4833}, pages = {393--409}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-76900-2\_24}, doi = {10.1007/978-3-540-76900-2\_24}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/Beerliova-TrubiniovaHR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Beerliova-TrubiniovaFHMZ07, author = {Zuzana Beerliov{\'{a}}{-}Trub{\'{\i}}niov{\'{a}} and Matthias Fitzi and Martin Hirt and Ueli Maurer and Vassilis Zikas}, title = {{MPC} vs. {SFE:} Perfect Security in a Unified Corruption Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {78}, year = {2007}, url = {http://eprint.iacr.org/2007/078}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Beerliova-TrubiniovaFHMZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/HirtN06, author = {Martin Hirt and Jesper Buus Nielsen}, editor = {Cynthia Dwork}, title = {Robust Multiparty Computation with Linear Communication Complexity}, booktitle = {Advances in Cryptology - {CRYPTO} 2006, 26th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4117}, pages = {463--482}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11818175\_28}, doi = {10.1007/11818175\_28}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/HirtN06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/podc/FitziH06, author = {Matthias Fitzi and Martin Hirt}, editor = {Eric Ruppert and Dahlia Malkhi}, title = {Optimally efficient multi-valued byzantine agreement}, booktitle = {Proceedings of the Twenty-Fifth Annual {ACM} Symposium on Principles of Distributed Computing, {PODC} 2006, Denver, CO, USA, July 23-26, 2006}, pages = {163--168}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1146381.1146407}, doi = {10.1145/1146381.1146407}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/podc/FitziH06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/Beerliova-TrubiniovaH06, author = {Zuzana Beerliov{\'{a}}{-}Trub{\'{\i}}niov{\'{a}} and Martin Hirt}, editor = {Shai Halevi and Tal Rabin}, title = {Efficient Multi-party Computation with Dispute Control}, booktitle = {Theory of Cryptography, Third Theory of Cryptography Conference, {TCC} 2006, New York, NY, USA, March 4-7, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3876}, pages = {305--328}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11681878\_16}, doi = {10.1007/11681878\_16}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/Beerliova-TrubiniovaH06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/HirtN05, author = {Martin Hirt and Jesper Buus Nielsen}, editor = {Bimal K. Roy}, title = {Upper Bounds on the Communication Complexity of Optimally Resilient Cryptographic Multiparty Computation}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2005, 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3788}, pages = {79--99}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11593447\_5}, doi = {10.1007/11593447\_5}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/HirtN05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/HirtNP05, author = {Martin Hirt and Jesper Buus Nielsen and Bartosz Przydatek}, editor = {Ronald Cramer}, title = {Cryptographic Asynchronous Multi-party Computation with Optimal Resilience (Extended Abstract)}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3494}, pages = {322--340}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11426639\_19}, doi = {10.1007/11426639\_19}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/HirtNP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HirtN04, author = {Martin Hirt and Jesper Buus Nielsen}, title = {Upper Bounds on the Communication Complexity of Optimally Resilient Cryptographic Multiparty Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {318}, year = {2004}, url = {http://eprint.iacr.org/2004/318}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HirtN04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HirtNP04, author = {Martin Hirt and Jesper Buus Nielsen and Bartosz Przydatek}, title = {Cryptographic Asynchronous Multi-Party Computation with Optimal Resilience}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {368}, year = {2004}, url = {http://eprint.iacr.org/2004/368}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HirtNP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/FitziHHW03, author = {Matthias Fitzi and Martin Hirt and Thomas Holenstein and J{\"{u}}rg Wullschleger}, editor = {Eli Biham}, title = {Two-Threshold Broadcast and Detectable Multi-party Computation}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2003, International Conference on the Theory and Applications of Cryptographic Techniques, Warsaw, Poland, May 4-8, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2656}, pages = {51--67}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-39200-9\_4}, doi = {10.1007/3-540-39200-9\_4}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/FitziHHW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/podc/FitziGHHS02, author = {Matthias Fitzi and Daniel Gottesman and Martin Hirt and Thomas Holenstein and Adam D. Smith}, editor = {Aleta Ricciardi}, title = {Detectable byzantine agreement secure against faulty majorities}, booktitle = {Proceedings of the Twenty-First Annual {ACM} Symposium on Principles of Distributed Computing, {PODC} 2002, Monterey, California, USA, July 21-24, 2002}, pages = {118--126}, publisher = {{ACM}}, year = {2002}, url = {https://doi.org/10.1145/571825.571841}, doi = {10.1145/571825.571841}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/podc/FitziGHHS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FitziHHW02, author = {Matthias Fitzi and Martin Hirt and Thomas Holenstein and J{\"{u}}rg Wullschleger}, title = {Extended Validity and Consistency in Byzantine Agreement}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {53}, year = {2002}, url = {http://eprint.iacr.org/2002/053}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FitziHHW02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/dnb/Hirt01, author = {Martin Hirt}, title = {Multi party computation: efficient protocols, general adversaries, and voting}, school = {{ETH} Zurich, Z{\"{u}}rich, Switzerland}, year = {2001}, url = {https://d-nb.info/963266195}, isbn = {978-3-89649-747-5}, timestamp = {Sat, 17 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/dnb/Hirt01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/HirtM01, author = {Martin Hirt and Ueli M. Maurer}, editor = {Joe Kilian}, title = {Robustness for Free in Unconditional Multi-party Computation}, booktitle = {Advances in Cryptology - {CRYPTO} 2001, 21st Annual International Cryptology Conference, Santa Barbara, California, USA, August 19-23, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2139}, pages = {101--118}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44647-8\_6}, doi = {10.1007/3-540-44647-8\_6}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/HirtM01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HirtM01, author = {Martin Hirt and Ueli Maurer}, title = {Robustness for Free in Unconditional Multi-Party Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {23}, year = {2001}, url = {http://eprint.iacr.org/2001/023}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HirtM01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/HirtM00, author = {Martin Hirt and Ueli M. Maurer}, title = {Player Simulation and General Adversary Structures in Perfect Multiparty Computation}, journal = {J. Cryptol.}, volume = {13}, number = {1}, pages = {31--60}, year = {2000}, url = {https://doi.org/10.1007/s001459910003}, doi = {10.1007/S001459910003}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/HirtM00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/HirtMP00, author = {Martin Hirt and Ueli M. Maurer and Bartosz Przydatek}, editor = {Tatsuaki Okamoto}, title = {Efficient Secure Multi-party Computation}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2000, 6th International Conference on the Theory and Application of Cryptology and Information Security, Kyoto, Japan, December 3-7, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1976}, pages = {143--161}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44448-3\_12}, doi = {10.1007/3-540-44448-3\_12}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/HirtMP00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/HirtS00, author = {Martin Hirt and Kazue Sako}, editor = {Bart Preneel}, title = {Efficient Receipt-Free Voting Based on Homomorphic Encryption}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2000, International Conference on the Theory and Application of Cryptographic Techniques, Bruges, Belgium, May 14-18, 2000, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1807}, pages = {539--556}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-45539-6\_38}, doi = {10.1007/3-540-45539-6\_38}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/HirtS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/FitziHM99, author = {Matthias Fitzi and Martin Hirt and Ueli M. Maurer}, editor = {Kwok{-}Yan Lam and Eiji Okamoto and Chaoping Xing}, title = {General Adversaries in Unconditional Multi-party Computation}, booktitle = {Advances in Cryptology - {ASIACRYPT} '99, International Conference on the Theory and Applications of Cryptology and Information Security, Singapore, November 14-18, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1716}, pages = {232--246}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/978-3-540-48000-6\_19}, doi = {10.1007/978-3-540-48000-6\_19}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/FitziHM99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CramerDDHR99, author = {Ronald Cramer and Ivan Damg{\aa}rd and Stefan Dziembowski and Martin Hirt and Tal Rabin}, editor = {Jacques Stern}, title = {Efficient Multiparty Computations Secure Against an Adaptive Adversary}, booktitle = {Advances in Cryptology - {EUROCRYPT} '99, International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, May 2-6, 1999, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1592}, pages = {311--326}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48910-X\_22}, doi = {10.1007/3-540-48910-X\_22}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CramerDDHR99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/FitziHM98, author = {Matthias Fitzi and Martin Hirt and Ueli M. Maurer}, editor = {Hugo Krawczyk}, title = {Trading Correctness for Privacy in Unconditional Multi-Party Computation (Extended Abstract)}, booktitle = {Advances in Cryptology - {CRYPTO} '98, 18th Annual International Cryptology Conference, Santa Barbara, California, USA, August 23-27, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1462}, pages = {121--136}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0055724}, doi = {10.1007/BFB0055724}, timestamp = {Tue, 01 Jun 2021 15:21:29 +0200}, biburl = {https://dblp.org/rec/conf/crypto/FitziHM98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/podc/HirtM97, author = {Martin Hirt and Ueli M. Maurer}, editor = {James E. Burns and Hagit Attiya}, title = {Complete Characterization of Adversaries Tolerable in Secure Multi-Party Computation (Extended Abstract)}, booktitle = {Proceedings of the Sixteenth Annual {ACM} Symposium on Principles of Distributed Computing, Santa Barbara, California, USA, August 21-24, 1997}, pages = {25--34}, publisher = {{ACM}}, year = {1997}, url = {https://doi.org/10.1145/259380.259412}, doi = {10.1145/259380.259412}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/podc/HirtM97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.