default search action
Martin Hirt
Person information
- affiliation: ETH Zurich, Switzerland
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c48]Fabio Banfi, Konstantin Gegier, Martin Hirt, Ueli Maurer, Guilherme Rito:
Anamorphic Encryption, Revisited. EUROCRYPT (2) 2024: 3-32 - 2023
- [i28]Fabio Banfi, Konstantin Gegier, Martin Hirt, Ueli Maurer:
Anamorphic Encryption, Revisited. IACR Cryptol. ePrint Arch. 2023: 249 (2023) - 2022
- [c47]Markus Gansberger, Christian Fasching, Christoph Berndl, Martin Hirt, Peter Müllner, Franz Handler:
Innovation Farm - Innovative Technologien für die Landwirtschaft erlebbar machen. GIL Jahrestagung 2022: 319-322 - 2021
- [c46]Annick Chopard, Martin Hirt, Chen-Da Liu-Zhang:
On Communication-Efficient Asynchronous MPC with Adaptive Security. TCC (2) 2021: 35-65 - [c45]Giovanni Deligios, Martin Hirt, Chen-Da Liu-Zhang:
Round-Efficient Byzantine Agreement and Multi-party Computation with Asynchronous Fallback. TCC (1) 2021: 623-653 - [c44]Martin Hirt, Chen-Da Liu-Zhang, Ueli Maurer:
Adaptive Security of Multi-party Protocols, Revisited. TCC (1) 2021: 686-716 - [i27]Giovanni Deligios, Martin Hirt, Chen-Da Liu-Zhang:
Round-Efficient Byzantine Agreement and Multi-Party Computation with Asynchronous Fallback. IACR Cryptol. ePrint Arch. 2021: 1141 (2021) - [i26]Annick Chopard, Martin Hirt, Chen-Da Liu-Zhang:
On Communication-Efficient Asynchronous MPC with Adaptive Security. IACR Cryptol. ePrint Arch. 2021: 1174 (2021) - [i25]Martin Hirt, Chen-Da Liu-Zhang, Ueli Maurer:
Adaptive Security of Multi-Party Protocols, Revisited. IACR Cryptol. ePrint Arch. 2021: 1175 (2021) - 2020
- [c43]Martin Hirt, Marta Mularczyk:
Efficient MPC with a Mixed Adversary. ITC 2020: 3:1-3:23 - [c42]Martin Hirt, Ard Kastrati, Chen-Da Liu-Zhang:
Multi-Threshold Asynchronous Reliable Broadcast and Consensus. OPODIS 2020: 6:1-6:16 - [c41]Diana Ghinea, Martin Hirt, Chen-Da Liu-Zhang:
From Partial to Global Asynchronous Reliable Broadcast. DISC 2020: 29:1-29:16 - [c40]Martin Hirt, Ard Kastrati, Chen-Da Liu-Zhang:
Brief Announcement: Multi-Threshold Asynchronous Reliable Broadcast and Consensus. DISC 2020: 48:1-48:3 - [i24]Martin Hirt, Marta Mularczyk:
Efficient MPC with a Mixed Adversary. IACR Cryptol. ePrint Arch. 2020: 356 (2020) - [i23]Martin Hirt, Ard Kastrati, Chen-Da Liu-Zhang:
Multi-Threshold Asynchronous Reliable Broadcast and Consensus. IACR Cryptol. ePrint Arch. 2020: 958 (2020) - [i22]Diana Ghinea, Martin Hirt, Chen-Da Liu-Zhang:
From Partial to Global Asynchronous Reliable Broadcast. IACR Cryptol. ePrint Arch. 2020: 963 (2020)
2010 – 2019
- 2018
- [c39]Assi Barak, Martin Hirt, Lior Koskas, Yehuda Lindell:
An End-to-End System for Large Scale P2P MPC-as-a-Service and Low-Bandwidth MPC for Weak Participants. CCS 2018: 695-712 - [i21]Assi Barak, Martin Hirt, Lior Koskas, Yehuda Lindell:
An End-to-End System for Large Scale P2P MPC-as-a-Service and Low-Bandwidth MPC for Weak Participants. IACR Cryptol. ePrint Arch. 2018: 751 (2018) - 2016
- [c38]Sandro Coretti, Juan A. Garay, Martin Hirt, Vassilis Zikas:
Constant-Round Asynchronous Multi-Party Computation Based on One-Way Functions. ASIACRYPT (2) 2016: 998-1021 - [c37]Martin Hirt, Ueli Maurer, Daniel Tschudi, Vassilis Zikas:
Network-Hiding Communication and Applications to Multi-party Protocols. CRYPTO (2) 2016: 335-365 - [e2]Martin Hirt, Adam D. Smith:
Theory of Cryptography - 14th International Conference, TCC 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part I. Lecture Notes in Computer Science 9985, 2016, ISBN 978-3-662-53640-7 [contents] - [e1]Martin Hirt, Adam D. Smith:
Theory of Cryptography - 14th International Conference, TCC 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part II. Lecture Notes in Computer Science 9986, 2016, ISBN 978-3-662-53643-8 [contents] - [i20]Sandro Coretti, Juan A. Garay, Martin Hirt, Vassilis Zikas:
Constant-Round Asynchronous Multi-Party Computation. IACR Cryptol. ePrint Arch. 2016: 208 (2016) - [i19]Martin Hirt, Ueli Maurer, Daniel Tschudi, Vassilis Zikas:
Network-Hiding Communication and Applications to Multi-Party Protocols. IACR Cryptol. ePrint Arch. 2016: 556 (2016) - 2014
- [c36]Martin Hirt, Pavel Raykov:
Multi-valued Byzantine Broadcast: The t < n Case. ASIACRYPT (2) 2014: 448-465 - [c35]Joël Alwen, Martin Hirt, Ueli Maurer, Arpita Patra, Pavel Raykov:
Anonymous Authentication with Shared Secrets. LATINCRYPT 2014: 219-236 - [c34]Joël Alwen, Martin Hirt, Ueli Maurer, Arpita Patra, Pavel Raykov:
Key-Indistinguishable Message Authentication Codes. SCN 2014: 476-493 - [c33]Martin Hirt, Ueli Maurer, Pavel Raykov:
Broadcast Amplification. TCC 2014: 419-439 - [i18]Joël Alwen, Martin Hirt, Ueli Maurer, Arpita Patra, Pavel Raykov:
Anonymous Authentication with Shared Secrets. IACR Cryptol. ePrint Arch. 2014: 73 (2014) - [i17]Joël Alwen, Martin Hirt, Ueli Maurer, Arpita Patra, Pavel Raykov:
Key-Indistinguishable Message Authentication Codes. IACR Cryptol. ePrint Arch. 2014: 107 (2014) - 2013
- [c32]Martin Hirt, Daniel Tschudi:
Efficient General-Adversary Multi-Party Computation. ASIACRYPT (2) 2013: 181-200 - [c31]Martin Hirt, Christoph Lucas, Ueli Maurer:
A Dynamic Tradeoff between Active and Passive Corruptions in Secure Multi-Party Computation. CRYPTO (2) 2013: 203-219 - [c30]Martin Hirt, Christoph Lucas, Ueli Maurer:
Erratum: A Dynamic Tradeoff between Active and Passive Corruptions in Secure Multi-Party Computation. CRYPTO (2) 2013 - [c29]Grégory Demay, Peter Gazi, Martin Hirt, Ueli Maurer:
Resource-Restricted Indifferentiability. EUROCRYPT 2013: 664-683 - [c28]Martin Hirt, Pavel Raykov:
On the Complexity of Broadcast Setup. ICALP (1) 2013: 552-563 - [c27]Ashish Choudhury, Martin Hirt, Arpita Patra:
Asynchronous Multiparty Computation with Linear Communication Complexity. DISC 2013: 388-402 - [i16]Martin Hirt, Pavel Raykov:
On the Complexity of Broadcast Setup. IACR Cryptol. ePrint Arch. 2013: 103 (2013) - [i15]Martin Hirt, Ueli Maurer, Christoph Lucas:
A Dynamic Tradeoff Between Active and Passive Corruptions in Secure Multi-Party Computation. IACR Cryptol. ePrint Arch. 2013: 349 (2013) - [i14]Martin Hirt, Pavel Raykov:
Multi-Valued Byzantine Broadcast: the t<n Case. IACR Cryptol. ePrint Arch. 2013: 553 (2013) - [i13]Martin Hirt, Daniel Tschudi:
Efficient General-Adversary Multi-Party Computation. IACR Cryptol. ePrint Arch. 2013: 571 (2013) - [i12]Martin Hirt, Ueli Maurer, Pavel Raykov:
Broadcast Amplification. IACR Cryptol. ePrint Arch. 2013: 769 (2013) - 2012
- [c26]Martin Hirt, Christoph Lucas, Ueli Maurer, Dominik Raub:
Passive Corruption in Statistical Multi-Party Computation - (Extended Abstract). ICITS 2012: 129-146 - [i11]Martin Hirt, Christoph Lucas, Ueli Maurer, Dominik Raub:
Passive Corruption in Statistical Multi-Party Computation. IACR Cryptol. ePrint Arch. 2012: 272 (2012) - [i10]Ashish Choudhury, Martin Hirt, Arpita Patra:
Unconditionally Secure Asynchronous Multiparty Computation with Linear Communication Complexity. IACR Cryptol. ePrint Arch. 2012: 517 (2012) - [i9]Grégory Demay, Peter Gazi, Martin Hirt, Ueli Maurer:
Resource-Restricted Indifferentiability. IACR Cryptol. ePrint Arch. 2012: 613 (2012) - 2011
- [c25]Martin Hirt, Vassilis Zikas:
Player-Centric Byzantine Agreement. ICALP (1) 2011: 281-292 - [c24]Martin Hirt, Christoph Lucas, Ueli Maurer, Dominik Raub:
Graceful Degradation in Multi-Party Computation (Extended Abstract). ICITS 2011: 163-180 - [i8]Martin Hirt, Christoph Lucas, Ueli Maurer, Dominik Raub:
Graceful Degradation in Multi-Party Computation. IACR Cryptol. ePrint Arch. 2011: 94 (2011) - 2010
- [c23]Martin Hirt, Vassilis Zikas:
Adaptively Secure Broadcast. EUROCRYPT 2010: 466-485 - [c22]Zuzana Beerliová-Trubíniová, Martin Hirt, Jesper Buus Nielsen:
On the theoretical gap between synchronous and asynchronous MPC protocols. PODC 2010: 211-218 - [c21]Martin Hirt:
Receipt-Free K-out-of-L Voting Based on ElGamal Encryption. Towards Trustworthy Elections 2010: 64-82
2000 – 2009
- 2009
- [i7]Martin Hirt, Vassilis Zikas:
Adaptively Secure Broadcast. IACR Cryptol. ePrint Arch. 2009: 230 (2009) - 2008
- [c20]Martin Hirt, Ueli M. Maurer, Vassilis Zikas:
MPC vs. SFE : Unconditional and Computational Security. ASIACRYPT 2008: 1-18 - [c19]Martin Hirt, Jesper Buus Nielsen, Bartosz Przydatek:
Asynchronous Multi-Party Computation with Quadratic Communication. ICALP (2) 2008: 473-485 - [c18]Zuzana Beerliová-Trubíniová, Martin Hirt:
Perfectly-Secure MPC with Linear Communication Complexity. TCC 2008: 213-230 - [c17]Zuzana Beerliová-Trubíniová, Matthias Fitzi, Martin Hirt, Ueli M. Maurer, Vassilis Zikas:
MPC vs. SFE: Perfect Security in a Unified Corruption Model. TCC 2008: 231-250 - [i6]Zuzana Beerliová-Trubíniová, Martin Hirt, Jesper Buus Nielsen:
Almost-Asynchronous MPC with Faulty Minority. IACR Cryptol. ePrint Arch. 2008: 416 (2008) - 2007
- [c16]Zuzana Beerliová-Trubíniová, Martin Hirt:
Simple and Efficient Perfectly-Secure Asynchronous MPC. ASIACRYPT 2007: 376-392 - [c15]Zuzana Beerliová-Trubíniová, Martin Hirt, Micha Riser:
Efficient Byzantine Agreement with Faulty Minority. ASIACRYPT 2007: 393-409 - [i5]Zuzana Beerliová-Trubíniová, Matthias Fitzi, Martin Hirt, Ueli Maurer, Vassilis Zikas:
MPC vs. SFE: Perfect Security in a Unified Corruption Model. IACR Cryptol. ePrint Arch. 2007: 78 (2007) - 2006
- [c14]Martin Hirt, Jesper Buus Nielsen:
Robust Multiparty Computation with Linear Communication Complexity. CRYPTO 2006: 463-482 - [c13]Matthias Fitzi, Martin Hirt:
Optimally efficient multi-valued byzantine agreement. PODC 2006: 163-168 - [c12]Zuzana Beerliová-Trubíniová, Martin Hirt:
Efficient Multi-party Computation with Dispute Control. TCC 2006: 305-328 - 2005
- [c11]Martin Hirt, Jesper Buus Nielsen:
Upper Bounds on the Communication Complexity of Optimally Resilient Cryptographic Multiparty Computation. ASIACRYPT 2005: 79-99 - [c10]Martin Hirt, Jesper Buus Nielsen, Bartosz Przydatek:
Cryptographic Asynchronous Multi-party Computation with Optimal Resilience (Extended Abstract). EUROCRYPT 2005: 322-340 - 2004
- [i4]Martin Hirt, Jesper Buus Nielsen:
Upper Bounds on the Communication Complexity of Optimally Resilient Cryptographic Multiparty Computation. IACR Cryptol. ePrint Arch. 2004: 318 (2004) - [i3]Martin Hirt, Jesper Buus Nielsen, Bartosz Przydatek:
Cryptographic Asynchronous Multi-Party Computation with Optimal Resilience. IACR Cryptol. ePrint Arch. 2004: 368 (2004) - 2003
- [c9]Matthias Fitzi, Martin Hirt, Thomas Holenstein, Jürg Wullschleger:
Two-Threshold Broadcast and Detectable Multi-party Computation. EUROCRYPT 2003: 51-67 - 2002
- [c8]Matthias Fitzi, Daniel Gottesman, Martin Hirt, Thomas Holenstein, Adam D. Smith:
Detectable byzantine agreement secure against faulty majorities. PODC 2002: 118-126 - [i2]Matthias Fitzi, Martin Hirt, Thomas Holenstein, Jürg Wullschleger:
Extended Validity and Consistency in Byzantine Agreement. IACR Cryptol. ePrint Arch. 2002: 53 (2002) - 2001
- [b1]Martin Hirt:
Multi party computation: efficient protocols, general adversaries, and voting. ETH Zurich, Zürich, Switzerland, Hartung-Gorre 2001, ISBN 978-3-89649-747-5, pp. 1-174 - [c7]Martin Hirt, Ueli M. Maurer:
Robustness for Free in Unconditional Multi-party Computation. CRYPTO 2001: 101-118 - [i1]Martin Hirt, Ueli Maurer:
Robustness for Free in Unconditional Multi-Party Computation. IACR Cryptol. ePrint Arch. 2001: 23 (2001) - 2000
- [j1]Martin Hirt, Ueli M. Maurer:
Player Simulation and General Adversary Structures in Perfect Multiparty Computation. J. Cryptol. 13(1): 31-60 (2000) - [c6]Martin Hirt, Ueli M. Maurer, Bartosz Przydatek:
Efficient Secure Multi-party Computation. ASIACRYPT 2000: 143-161 - [c5]Martin Hirt, Kazue Sako:
Efficient Receipt-Free Voting Based on Homomorphic Encryption. EUROCRYPT 2000: 539-556
1990 – 1999
- 1999
- [c4]Matthias Fitzi, Martin Hirt, Ueli M. Maurer:
General Adversaries in Unconditional Multi-party Computation. ASIACRYPT 1999: 232-246 - [c3]Ronald Cramer, Ivan Damgård, Stefan Dziembowski, Martin Hirt, Tal Rabin:
Efficient Multiparty Computations Secure Against an Adaptive Adversary. EUROCRYPT 1999: 311-326 - 1998
- [c2]Matthias Fitzi, Martin Hirt, Ueli M. Maurer:
Trading Correctness for Privacy in Unconditional Multi-Party Computation (Extended Abstract). CRYPTO 1998: 121-136 - 1997
- [c1]Martin Hirt, Ueli M. Maurer:
Complete Characterization of Adversaries Tolerable in Secure Multi-Party Computation (Extended Abstract). PODC 1997: 25-34
Coauthor Index
aka: Ueli M. Maurer
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-21 21:30 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint