publications-crystals.bib

@ARTICLE{BRS06,
  AUTHOR = {Bohli, Jens-Matthias and Röhrich, Stefan and Steinwandt, Rainer},
  TITLE = {{Key substitution attacks revisited: Taking into account malicious signers}},
  JOURNAL = {International Journal of Information Security},
  YEAR = 2006,
  VOLUME = 5,
  NUMBER = 1,
  PAGES = {30--36},
  MONTH = APR,
  URL = {http://www.springerlink.com/openurl.asp?genre=article&id=doi:10.1007/s10207-005-0071-2}
}

@INPROCEEDINGS{BMQR05QuitFairness,
  AUTHOR = {Bohli, Jens-Matthias and Müller-Quade, Jörn and Röhrich, Stefan},
  TITLE = {{Fairness and Correctness in Case of a Premature Abort}},
  BOOKTITLE = {Progress in Cryptology -- INDOCRYPT 2005: 6th International Conference on Cryptology in India},
  YEAR = 2005,
  MONTH = DEC,
  URL = {http://dx.doi.org/10.1007/11596219_26},
  EDITOR = {Maitra, Subhamoy and Veni Madhavan, C. E. and Venkatesan, Ramarathnam},
  VOLUME = 3797,
  SERIES = {Lecture Notes in Computer Science},
  PUBLISHER = {Springer},
  PAGES = {322--331}
}

@INPROCEEDINGS{MQ05Awaji,
  AUTHOR = {Müller-Quade, Jörn},
  TITLE = {{Temporary Assumptions---Quantum and Classical}},
  BOOKTITLE = {The 2005 IEEE Information Theory Workshop On Theory and Practice in Information Theoretic Security. Proceedings},
  PAGES = {31-33},
  YEAR = 2005,
  ADDRESS = {Awaji, Japan},
  MONTH = OCT
}

@INPROCEEDINGS{BHMQU05,
  AUTHOR = {Backes, Michael and Hofheinz, Dennis and Müller-Quade, Jörn and Unruh, Dominique},
  TITLE = {{On Fairness in Simulatability-based Cryptographic Systems}},
  BOOKTITLE = {Proceedings of the 2005 ACM Workshop on Formal Methods in Security Engineering},
  PUBLISHER = {ACM Press},
  YEAR = 2005,
  EDITOR = {Küsters, Ralf and Mitchell, John},
  PAGES = {13--22},
  NOTE = {Full version as IACR ePrint 2005/294}
}

@MISC{BMQR05KECI,
  AUTHOR = {Bohli, Jens-Matthias and Müller-Quade, Jörn and Röhrich, Stefan},
  TITLE = {{On Group Key Agreement with Cheater Identification}},
  HOWPUBLISHED = {WEWoRC Western European Workshop on Research in Cryptology 2005, Leuven},
  MONTH = JUL,
  YEAR = 2005
}

@INPROCEEDINGS{HofMueUnr05CSFW,
  AUTHOR = {Hofheinz, Dennis and Müller-Quade, Jörn and Unruh, Dominique},
  TITLE = {{Polynomial Runtime in Simulatability Definitions}},
  BOOKTITLE = {Computer Security Foundations Workshop Proceedings},
  YEAR = 2005
}

@INPROCEEDINGS{HofMueUnr05Moravia,
  TITLE = {{Universally Composable Zero-Knowledge Arguments and Commitments from Signature Cards}},
  AUTHOR = {Hofheinz, Dennis and Müller-Quade, Jörn and Unruh, Dominique},
  BOOKTITLE = {Proceedings of the 5th Central European Conference on Cryptology, MoraviaCrypt 2005},
  MONTH = JUN,
  YEAR = 2005
}

@MISC{MQRU05,
  AUTHOR = {Müller-Quade, Jörn and Röhrich, Stefan and Unruh, Dominique},
  TITLE = {{Oblivious Transfer is Incomplete for Deniable Protocols}},
  HOWPUBLISHED = {Workshop on The Past, Present and Future of Oblivious Transfer, Satellite workshop of the Fifth Haifa Workshop on Interdisciplinary Applications of Graph theory, Combinatorics, and Algorithms, Honoring Michael O. Rabin, Turing Award Winner, Haifa},
  MONTH = MAY,
  YEAR = 2005
}

@ARTICLE{BMQS05,
  AUTHOR = {Beth, Th. and Müller-Quade, Jörn and Steinwandt, Rainer},
  TITLE = {{Cryptanalysis of a Practical Quantum Key Distribution With Polarization-Entangled Photons}},
  JOURNAL = {Quantum Information \& Computation (QIC)},
  VOLUME = 5,
  NUMBER = 3,
  MONTH = MAY,
  YEAR = 2005,
  PAGES = {181-186}
}

@INPROCEEDINGS{BS05,
  AUTHOR = {Bohli, Jens-Matthias and Steinwandt, Rainer},
  TITLE = {{On Subliminal Channels in Deterministic Signature Schemes}},
  BOOKTITLE = {Information Security and Cryptology -- ICISC 2004},
  YEAR = 2005,
  EDITOR = {Park, Choonsik and Chee, Seongtaek},
  VOLUME = 3506,
  SERIES = {Lecture Notes in Computer Science},
  PAGES = {182--194},
  PUBLISHER = {Springer},
  URL = {http://springerlink.metapress.com/openurl.asp?genre=article&id=doi:10.1007/11496618_14}
}

@INPROCEEDINGS{RSMQ05,
  AUTHOR = {Raub, Dominik and Steinwandt, Rainer and Müller-Quade, Jörn},
  TITLE = {{On the Security and Composability of the One Time Pad}},
  BOOKTITLE = {SOFSEM 2005: Theory and Practice of Computer Science: 31st Conference on Current Trends in Theory and Practice of Computer Science},
  PAGES = {288--297},
  MONTH = JAN,
  YEAR = 2005,
  VOLUME = 3381,
  SERIES = {Lecture Notes in Computer Science},
  PUBLISHER = {Springer},
  URL = {http://www.springerlink.com/openurl.asp?genre=article&issn=0302-9743&volume=3381&spage=288}
}

@ARTICLE{HofMueSte06,
  AUTHOR = {Hofheinz, Dennis and Müller-Quade, Jörn and Steinwandt, Rainer},
  TITLE = {{On modeling IND-CCA security in cryptographic protocols}},
  JOURNAL = {Tatra Mountains Mathematical Publications},
  YEAR = {to appear 2006},
  NOTE = {full version of~\cite{HofMueSte04FPKE}}
}

@ARTICLE{BMQS06Buchberger,
  AUTHOR = {Beth, Thomas and Müller-Quade, Jörn and Steinwandt, Rainer},
  TITLE = {{Computing restrictions of ideals in finitely generated $k$-algebras by means of Buchberger's algorithm}},
  JOURNAL = {Journal of Symbolic Computation},
  YEAR = 2006,
  VOLUME = 41,
  NUMBER = {3--4},
  PAGES = {372--380}
}

@INPROCEEDINGS{HofMue04synchronous,
  AUTHOR = {Hofheinz, Dennis and Müller-Quade, Jörn},
  TITLE = {{A Synchronous Model for Multi-Party Computation and the Incompleteness of Oblivious Transfer}},
  BOOKTITLE = {Proceedings of Foundations of Computer Security -- FCS'04, Turku},
  YEAR = 2004
}

@INPROCEEDINGS{HanImaMueNasOtsWin04ACISP,
  AUTHOR = {Hanaoka, G. and Imai, Hideki and Müller-Quade, Jörn and Nascimento, Anderson and Otsuka, A. and Winter, Andreas},
  TITLE = {{Information Theoretically Secure Oblivious Polynomial Evaluation: Model, Bounds, and Constructions}},
  BOOKTITLE = {Proceedings of Information Security and Privacy: 9th Australasian
Conference, ACISP 2004, Sydney, Australia},
  YEAR = 2004,
  VOLUME = 3108,
  SERIES = {Lecture Notes in Computer Science},
  PUBLISHER = {Springer}
}

@INPROCEEDINGS{HofMueSte04FPKE,
  AUTHOR = {Hofheinz, Dennis and Müller-Quade, Jörn and Steinwandt, Rainer},
  TITLE = {{On Modeling IND-CCA Security in Cryptographic Protocols}},
  BOOKTITLE = {Proceedings der 4th Central European Conference on Cryptology, WARTACRYPT '04, Poznan},
  YEAR = 2004,
  MONTH = JUL
}

@INPROCEEDINGS{NasMueOtsHanIma04ACNS,
  AUTHOR = {Nascimento, Anderson and Müller-Quade, Jörn and Otsuka, A. and Hanaoka, G. and Imai, Hideki},
  TITLE = {{Unconditionally Non-interactive Verifiable Secret Sharing Secure
  against Faulty Majorities in the Commodity Based Model}},
  BOOKTITLE = {Proceedings of  ACNS 2004, Yellow Mountain, China},
  YEAR = 2004,
  SERIES = {Lecture Notes in Computer Science},
  MONTH = JUN,
  PUBLISHER = {Springer}
}

@INPROCEEDINGS{NasMueIma04RSA,
  AUTHOR = {Nascimento, Anderson and Müller-Quade, Jörn and Imai, Hideki},
  TITLE = {{Bit String Commitment Reductions with a Non-Zero Rate}},
  BOOKTITLE = {Proceedings of CT-RSA 04},
  YEAR = 2004,
  VOLUME = 2964,
  SERIES = {Lecture Notes in Computer Science}
}

@INPROCEEDINGS{HofMue04TCC,
  AUTHOR = {Hofheinz, Dennis and Müller-Quade, Jörn},
  TITLE = {{Universally Composable Commitments Using Random Oracles}},
  BOOKTITLE = {Proceedings of TCC, Boston},
  YEAR = 2004,
  VOLUME = 2951,
  SERIES = {Lecture Notes in Computer Science},
  ORGANIZATION = {Springer}
}

@INPROCEEDINGS{ImaMueNasWin04ISIT,
  AUTHOR = {Imai, Hideki and Müller-Quade, Jörn and Nascimento, Anderson and Winter, Andreas},
  TITLE = {Rates for bit commitment and coin tossing from noisy correlation},
  BOOKTITLE = {International Symposium on Information Theory, 2004. ISIT 2004. Proceedings},
  PAGES = 47,
  YEAR = 2004,
  ORGANIZATION = {IEEE}
}

@INPROCEEDINGS{ImaMueNasWin04SCIS,
  AUTHOR = {Imai, Hideki and Müller-Quade, Jörn and Nascimento, Anderson and Winter, Andreas},
  TITLE = {{Rates for bit commitment and coin tossing from noisy correlations}},
  BOOKTITLE = {Proceedings of the 2004 Symposium on Cryptography and Information Security (SCIS2004), Iwate, Japan},
  YEAR = 2004,
  MONTH = JAN
}

@ARTICLE{imai04information,
  AUTHOR = {Imai, Hideki and Müller-Quade, Jörn and Nascimento, Anderson and Tuyls, Pim and Winter, Andreas},
  TITLE = {An information theoretical model for quantum secret sharing schemes},
  JOURNAL = {Quantum Information \& Computation (QIC)},
  VOLUME = 5,
  NUMBER = 1,
  MONTH = JAN,
  YEAR = 2004,
  PAGES = {069-080},
  NOTE = {Preprint on quant-ph/0311136},
  URL = {http://www.arxiv.org/abs/quant-ph/0311136}
}

@ARTICLE{MQS03,
  AUTHOR = {Müller-Quade, Jörn and Steinwandt, Rainer},
  TITLE = {{On the problem of authentication in a quantum protocol to detect traffic analysis}},
  JOURNAL = {Quantum Information \& Computation (QIC)},
  YEAR = 2003,
  VOLUME = 3,
  NUMBER = 1,
  PAGES = {48--54}
}

@INPROCEEDINGS{NasMueOtsHanIma03ISC,
  AUTHOR = {Nascimento, Anderson and Müller-Quade, Jörn and Otsuka, A. and Hanaoka, G. and Imai, Hideki},
  TITLE = {{Unconditionally Secure Pre-Distributed Homomorphic Commitments and Secure Two-Party Computations}},
  BOOKTITLE = {Proceedings of ISC 03},
  PAGES = {151--164},
  YEAR = 2003,
  VOLUME = 2851,
  SERIES = {Lecture Notes in Computer Science},
  PUBLISHER = {Springer}
}

@INPROCEEDINGS{HofMueSte03,
  AUTHOR = {Hofheinz, Dennis and Müller-Quade, Jörn and Steinwandt, Rainer},
  TITLE = {{Initiator-Resilient Universally Composable Key Exchange}},
  BOOKTITLE = {8th European Symposium on Research in Computer Security, ESORICS 2003 Proceedings},
  PAGES = {61--84},
  YEAR = 2003,
  EDITOR = {E. Snekkenes und D. Gollmann},
  VOLUME = 2808,
  SERIES = {Lecture Notes in Computer Science},
  PUBLISHER = {Springer}
}

@INPROCEEDINGS{NasOtsMueIma03,
  AUTHOR = {Nascimento, Anderson and Otsuka, A. and Müller-Quade, Jörn and Imai, Hideki},
  TITLE = {{Unconditionally Secure Two-Party Computations}},
  BOOKTITLE = {Proceedings of the 2003 Symposium on Cryptography and Information Security (SCIS2003), Hamamatsu, Japan},
  YEAR = 2003,
  MONTH = JAN
}