What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Jörn Müller-Quade
Google Scholar
44
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/cic
POBA: Privacy-Preserving Operator-Side Bookkeeping and Analytics.
Dennis Faut
Valerie Fetzer
Jörn Müller-Quade
Markus Raiber
Andy Rupp
2025
conf/acns
Protection Against Subversion Corruptions via Reverse Firewalls in the Plain Universal Composability Framework.
Paula Arnold
Sebastian Berndt
Jörn Müller-Quade
Astrid Ottenhues
2024
conf/acisp
Hidden $\varDelta $-Fairness: A Novel Notion for Fair Secure Two-Party Computation.
Saskia Bayreuther
Robin Berger
Felix Dörre
Jeremias Mechler
Jörn Müller-Quade
2024
conf/pkc
Chosen-Ciphertext Secure Dual-Receiver Encryption in the Standard Model Based on Post-quantum Assumptions.
Laurin Benz
Wasilij Beskorovajnov
Sarai Eilebrecht
Roland Gröll
Maximilian Müller
Jörn Müller-Quade
2023
conf/fc
On the Correlation Complexity of MPC with Cheater Identification.
Nicholas Brandt
Sven Maier
Tobias Müller
Jörn Müller-Quade
2023
conf/pkc
Sender-binding Key Encapsulation.
Laurin Benz
Wasilij Beskorovajnov
Sarai Eilebrecht
Jörn Müller-Quade
Astrid Ottenhues
Rebecca Schwerdt
2023
conf/asiacrypt
Universally Composable Auditable Surveillance.
Valerie Fetzer
Michael Klooß
Jörn Müller-Quade
Markus Raiber
Andy Rupp
2023
conf/asiacrypt
Practically Efficient Private Set Intersection from Trusted Hardware with Side-Channels.
Felix Dörre
Jeremias Mechler
Jörn Müller-Quade
2023
conf/tcc
Composable Long-Term Security with Rewinding.
Robin Berger
Brandon Broadnax
Michael Klooß
Jeremias Mechler
Jörn Müller-Quade
Astrid Ottenhues
Markus Raiber
2022
conf/pkc
A New Security Notion for PKC in the Standard Model: Weaker, Simpler, and Still Realizing Secure Channels.
Wasilij Beskorovajnov
Roland Gröll
Jörn Müller-Quade
Astrid Ottenhues
Rebecca Schwerdt
2021
journals/popets
Fortified Multi-Party Computation: Taking Advantage of Simple Secure Hardware Modules.
Brandon Broadnax
Alexander Koch
Jeremias Mechler
Tobias Müller
Jörn Müller-Quade
Matthias Nagel
2021
conf/asiacrypt
ConTra Corona: Contact Tracing against the Coronavirus by Bridging the Centralized-Decentralized Divide for Stronger Privacy.
Wasilij Beskorovajnov
Felix Dörre
Gunnar Hartung
Alexander Koch
Jörn Müller-Quade
Thorsten Strufe
2021
conf/tcc
Environmentally Friendly Composable Multi-party Computation in the Plain Model from Standard (Timed) Assumptions.
Brandon Broadnax
Jeremias Mechler
Jörn Müller-Quade
2019
conf/fc
Your Money or Your Life - Modeling and Analyzing the Security of Electronic Payment in the UC Framework.
Dirk Achenbach
Roland Gröll
Timon Hackenjos
Alexander Koch
Bernhard Löwe
Jeremias Mechler
Jörn Müller-Quade
Jochen Rill
2018
journals/joc
On the (Im-)Possibility of Extending Coin Toss.
Dennis Hofheinz
Jörn Müller-Quade
Dominique Unruh
2018
conf/pkc
Reusing Tamper-Proof Hardware in UC-Secure Protocols.
Jeremias Mechler
Jörn Müller-Quade
Tobias Nilges
2018
conf/pkc
Non-malleability vs. CCA-Security: The Case of Commitments.
Brandon Broadnax
Valerie Fetzer
Jörn Müller-Quade
Andy Rupp
2017
conf/eurocrypt
Concurrently Composable Security with Shielded Super-Polynomial Simulators.
Brandon Broadnax
Nico Döttling
Gunnar Hartung
Jörn Müller-Quade
Matthias Nagel
2016
conf/eurosp
ZeTA-Zero-Trust Authentication: Relying on Innate Human Ability, Not Technology.
Andreas Gutmann
Karen Renaud
Joseph Maguire
Peter Mayer
Melanie Volkamer
Kanta Matsuura
Jörn Müller-Quade
2016
conf/esorics
A Formal Treatment of Privacy in Video Data.
Valerie Fetzer
Jörn Müller-Quade
Tobias Nilges
2015
conf/provsec
From Stateful Hardware to Resettable Hardware Using Symmetric Assumptions.
Nico Döttling
Daniel Kraschewski
Jörn Müller-Quade
Tobias Nilges
2015
conf/tcc
General Statistically Secure Computation with Bounded-Resettable Hardware Tokens.
Nico Döttling
Daniel Kraschewski
Jörn Müller-Quade
Tobias Nilges
2014
conf/wisa
Wireless Key Exchange Using Frequency Impairments.
Jörn Müller-Quade
Antonio Sobreira de Almeida
2013
journals/joc
Polynomial Runtime and Composability.
Dennis Hofheinz
Dominique Unruh
Jörn Müller-Quade
2013
conf/eurocrypt
Lossy Codes and a New Variant of the Learning-With-Errors Problem.
Nico Döttling
Jörn Müller-Quade
2013
conf/tcc
Implementing Resettable UC-Functionalities with Untrusted Tamper-Proof Hardware-Tokens.
Nico Döttling
Thilo Mie
Jörn Müller-Quade
Tobias Nilges
2012
conf/asiacrypt
IND-CCA Secure Cryptography Based on a Variant of the LPN Problem.
Nico Döttling
Jörn Müller-Quade
Anderson C. A. Nascimento
2011
conf/tcc
Completeness Theorems with Constructive Proofs for Finite Deterministic 2-Party Functions.
Daniel Kraschewski
Jörn Müller-Quade
2011
conf/tcc
Unconditional and Composable Security Using a Single Stateful Tamper-Proof Hardware Token.
Nico Döttling
Daniel Kraschewski
Jörn Müller-Quade
2010
journals/joc
Long-Term Security and Universal Composability.
Jörn Müller-Quade
Dominique Unruh
2010
conf/crypto
Universally Composable Incoercibility.
Dominique Unruh
Jörn Müller-Quade
2010
conf/wisa
Vulnerabilities of Wireless Key Exchange Based on Channel Reciprocity.
Nico Döttling
Dejan E. Lazich
Jörn Müller-Quade
Antonio Sobreira de Almeida
2009
journals/tifs
Enhancing electronic voting machines on the example of Bingo voting.
Jens-Matthias Bohli
Christian Henrich
Carmen Kempka
Jörn Müller-Quade
Stefan Röhrich
2009
conf/ctrsa
A CCA2 Secure Public Key Encryption Scheme Based on the McEliece Assumptions in the Standard Model.
Rafael Dowsley
Jörn Müller-Quade
Anderson C. A. Nascimento
2009
conf/tcc
Secure Computability of Functions in the IT Setting with Dishonest Majority and Applications to Long-Term Security.
Robin Künzler
Jörn Müller-Quade
Dominik Raub
2007
conf/tcc
On the Necessity of Rewinding in Secure Multiparty Computation.
Michael Backes
Jörn Müller-Quade
Dominique Unruh
2007
conf/tcc
Long-Term Security and Universal Composability.
Jörn Müller-Quade
Dominique Unruh
2006
conf/eurocrypt
On the (Im-)Possibility of Extending Coin Toss.
Dennis Hofheinz
Jörn Müller-Quade
Dominique Unruh
2005
conf/ccs
On fairness in simulatability-based cryptographic systems.
Michael Backes
Dennis Hofheinz
Jörn Müller-Quade
Dominique Unruh
2004
conf/acisp
Information Theoretically Secure Oblivious Polynomial Evaluation: Model, Bounds, and Constructions.
Goichiro Hanaoka
Hideki Imai
Jörn Müller-Quade
Anderson C. A. Nascimento
Akira Otsuka
Andreas J. Winter
2004
conf/acns
Unconditionally Non-interactive Verifiable Secret Sharing Secure against Faulty Majorities in the Commodity Based Model.
Anderson C. A. Nascimento
Jörn Müller-Quade
Akira Otsuka
Goichiro Hanaoka
Hideki Imai
2004
conf/ctrsa
Bit String Commitment Reductions with a Non-zero Rate.
Anderson C. A. Nascimento
Jörn Müller-Quade
Hideki Imai
2004
conf/tcc
Universally Composable Commitments Using Random Oracles.
Dennis Hofheinz
Jörn Müller-Quade
2003
conf/esorics
Initiator-Resilient Universally Composable Key Exchange.
Dennis Hofheinz
Jörn Müller-Quade
Rainer Steinwandt
Coauthors
Akira Otsuka
(2)
Alexander Koch
(3)
Anderson C. A. Nascimento
(5)
Andreas Gutmann
(1)
Andreas J. Winter
(1)
Andy Rupp
(3)
Antonio Sobreira de Almeida
(2)
Astrid Ottenhues
(4)
Bernhard Löwe
(1)
Brandon Broadnax
(5)
Carmen Kempka
(1)
Christian Henrich
(1)
Daniel Kraschewski
(4)
Dejan E. Lazich
(1)
Dennis Faut
(1)
Dennis Hofheinz
(6)
Dirk Achenbach
(1)
Dominik Raub
(1)
Dominique Unruh
(8)
Felix Dörre
(3)
Goichiro Hanaoka
(2)
Gunnar Hartung
(2)
Hideki Imai
(3)
Jens-Matthias Bohli
(1)
Jeremias Mechler
(7)
Jochen Rill
(1)
Jörn Müller-Quade
(44)
Joseph Maguire
(1)
Kanta Matsuura
(1)
Karen Renaud
(1)
Laurin Benz
(2)
Markus Raiber
(3)
Matthias Nagel
(2)
Maximilian Müller
(1)
Melanie Volkamer
(1)
Michael Backes
(2)
Michael Klooß
(2)
Nicholas Brandt
(1)
Nico Döttling
(8)
Paula Arnold
(1)
Peter Mayer
(1)
Rafael Dowsley
(1)
Rainer Steinwandt
(1)
Rebecca Schwerdt
(2)
Robin Berger
(2)
Robin Künzler
(1)
Roland Gröll
(3)
Sarai Eilebrecht
(2)
Saskia Bayreuther
(1)
Sebastian Berndt
(1)
Stefan Röhrich
(1)
Sven Maier
(1)
Thilo Mie
(1)
Thorsten Strufe
(1)
Timon Hackenjos
(1)
Tobias Müller
(2)
Tobias Nilges
(5)
Valerie Fetzer
(4)
Wasilij Beskorovajnov
(4)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to