Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
135 | Michael Backes 0001, Dennis Hofheinz, Jörn Müller-Quade, Dominique Unruh |
On fairness in simulatability-based cryptographic systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FMSE ![In: Proceedings of the 2005 ACM workshop on Formal methods in security engineering, FMSE 2005, Fairfax, VA, USA, November 11, 2005, pp. 13-22, 2005, ACM, 1-59593-231-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
scheduling, fairness, cryptographic protocols, simulatability |
126 | Dennis Hofheinz, Dominique Unruh |
Simulatable Security and Polynomially Bounded Concurrent Composability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 2006 IEEE Symposium on Security and Privacy (S&P 2006), 21-24 May 2006, Berkeley, California, USA, pp. 169-183, 2006, IEEE Computer Society, 0-7695-2574-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Reactive Simulatability, Universal Composability, concurrent composition |
103 | Michael Backes 0001, Birgit Pfitzmann, Michael Waidner |
A General Composition Theorem for Secure Reactive Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography, First Theory of Cryptography Conference, TCC 2004, Cambridge, MA, USA, February 19-21, 2004, Proceedings, pp. 336-354, 2004, Springer, 3-540-21000-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
95 | Michael Backes 0001, Markus Dürmuth, Ralf Küsters |
On Simulatability Soundness and Mapping Soundness of Symbolic Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSTTCS ![In: FSTTCS 2007: Foundations of Software Technology and Theoretical Computer Science, 27th International Conference, New Delhi, India, December 12-14, 2007, Proceedings, pp. 108-120, 2007, Springer, 978-3-540-77049-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
84 | Dennis Hofheinz, Jörn Müller-Quade, Dominique Unruh |
Polynomial Runtime in Simulatability Definitions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 18th IEEE Computer Security Foundations Workshop, (CSFW-18 2005), 20-22 June 2005, Aix-en-Provence, France, pp. 156-169, 2005, IEEE Computer Society, 0-7695-2340-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
reactive simulatability, universal composability, multi-party computation |
78 | Laurent Mazaré, Bogdan Warinschi |
Separating Trace Mapping and Reactive Simulatability Soundness: The Case of Adaptive Corruption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARSPA-WITS ![In: Foundations and Applications of Security Analysis, Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, ARSPA-WITS 2009, York, UK, March 28-29, 2009, Revised Selected Papers, pp. 193-210, 2009, Springer, 978-3-642-03458-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
78 | Michael Backes 0001, Markus Dürmuth, Dennis Hofheinz, Ralf Küsters |
Conditional reactive simulatability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 7(2), pp. 155-169, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
78 | Michael Backes 0001, Markus Dürmuth, Dennis Hofheinz, Ralf Küsters |
Conditional Reactive Simulatability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2006, 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings, pp. 424-443, 2006, Springer, 3-540-44601-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
78 | Dennis Hofheinz, Dominique Unruh |
Comparing Two Notions of Simulatability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography, Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12, 2005, Proceedings, pp. 86-103, 2005, Springer, 3-540-24573-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
78 | Dennis Hofheinz, Dominique Unruh |
On the Notion of Statistical Security in Simulatability Definitions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 8th International Conference, ISC 2005, Singapore, September 20-23, 2005, Proceedings, pp. 118-133, 2005, Springer, 3-540-29001-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
68 | Isamu Teranishi, Wakaha Ogata |
Cramer-Shoup Satisfies a Stronger Plaintext Awareness under a Weaker Assumption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks, 6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008. Proceedings, pp. 109-125, 2008, Springer, 978-3-540-85854-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Statistical Plaintext Awareness, Cramer-Shoup Scheme, Standard Model |
63 | Ralf Küsters, Anupam Datta, John C. Mitchell, Ajith Ramanathan |
On the Relationships between Notions of Simulation-Based Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptol. ![In: J. Cryptol. 21(4), pp. 492-546, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Simulation-based security, Reactive Simulatability, Black-Box Simulatability, Universal Composability, Process calculus |
51 | Ivan Damgård, Jesper Buus Nielsen |
Improved Non-committing Encryption Schemes Based on a General Complexity Assumption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2000, 20th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2000, Proceedings, pp. 432-450, 2000, Springer, 3-540-67907-3. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
40 | Michael Backes 0001, Birgit Pfitzmann |
Limits of the BRSIM/UC soundness of Dolev-Yao-style XOR. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 7(1), pp. 33-54, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Dolev-Yao-style, Reactive simulatability/UC, Limitations, XOR, Computational soundness |
40 | Christoph Sprenger 0001, David A. Basin |
Cryptographically-Sound Protocol-Model Abstractions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: Proceedings of the 21st IEEE Computer Security Foundations Symposium, CSF 2008, Pittsburgh, Pennsylvania, USA, 23-25 June 2008, pp. 115-129, 2008, IEEE Computer Society, 978-0-7695-3182-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
cryptographic soundness, formal methods, theorem proving, Cryptographic protocols, simulatability |
40 | Michael Backes 0001, Peeter Laud |
Computationally sound secrecy proofs by mechanized flow analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, Alexandria, VA, USA, October 30 - November 3, 2006, pp. 370-379, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
data flow analysis, simulatability |
40 | Michael Backes 0001, Birgit Pfitzmann |
Relating Symbolic and Cryptographic Secrecy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 2(2), pp. 109-123, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Relations between models, probabilistic computation—cryptography, Dolev-Yao model, secrecy, simulatability |
40 | Michael Backes 0001, Birgit Pfitzmann |
Computational probabilistic noninterference. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 3(1), pp. 42-60, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Security, Cryptography, Information flow, Non-interference, Simulatability |
40 | Michael Backes 0001, Christian Jacobi 0002 |
Cryptographically Sound and Machine-Assisted Verification of Security Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STACS ![In: STACS 2003, 20th Annual Symposium on Theoretical Aspects of Computer Science, Berlin, Germany, February 27 - March 1, 2003, Proceedings, pp. 675-686, 2003, Springer, 3-540-00623-0. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
verification, cryptography, semantics, specification, PVS, simulatability |
40 | Michael Backes 0001, Christian Jacobi 0002, Birgit Pfitzmann |
Deriving Cryptographically Sound Implementations Using Composition and Formally Verified Bisimulation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FME ![In: FME 2002: Formal Methods - Getting IT Right, International Symposium of Formal Methods Europe, Copenhagen, Denmark, July 22-24, 2002, Proceedings, pp. 310-329, 2002, Springer, 3-540-43928-5. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
security, cryptography, formal verification, PVS, simulatability |
34 | Christoph Sprenger 0001, Michael Backes 0001, David A. Basin, Birgit Pfitzmann, Michael Waidner |
Cryptographically Sound Theorem Proving. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 19th IEEE Computer Security Foundations Workshop, (CSFW-19 2006), 5-7 July 2006, Venice, Italy, pp. 153-166, 2006, IEEE Computer Society, 0-7695-2615-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
34 | Michael Backes 0001, Birgit Pfitzmann, Michael Steiner 0001, Michael Waidner |
Polynomial Fairness and Liveness. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 15th IEEE Computer Security Foundations Workshop (CSFW-15 2002), 24-26 June 2002, Cape Breton, Nova Scotia, Canada, pp. 160-174, 2002, IEEE Computer Society, 0-7695-1689-0. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
34 | Michael Backes 0001, Birgit Pfitzmann |
Computational Probabilistic Non-interference. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2002, 7th European Symposium on Research in Computer Security, Zurich, Switzerland, October 14-16, 2002, Proceedings, pp. 1-23, 2002, Springer, 3-540-44345-2. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
27 | Vittorio Zaccaria |
The propagation game: on simulatability, correlation matrices, and probing security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2303.00580, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
27 | Edmund Mills, Shiye Su, Stuart Russell 0001, Scott Emmons |
ALMANACS: A Simulatability Benchmark for Language Model Explainability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2312.12747, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
27 | Jonas Teufel, Luca Torresi, Pascal Friederich |
Quantifying the Intrinsic Usefulness of Attributional Explanations for Graph Neural Networks with Artificial Simulatability Studies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2305.15961, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
27 | Yanda Chen, Ruiqi Zhong, Narutatsu Ri, Chen Zhao, He He 0001, Jacob Steinhardt, Zhou Yu, Kathleen R. McKeown |
Do Models Explain Themselves? Counterfactual Simulatability of Natural Language Explanations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2307.08678, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
27 | Vittorio Zaccaria |
The propagation game: on simulatability, correlation matrices, and probing security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2023, pp. 242, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
27 | Jonas Teufel, Luca Torresi, Pascal Friederich |
Quantifying the Intrinsic Usefulness of Attributional Explanations for Graph Neural Networks with Artificial Simulatability Studies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
xAI (2) ![In: Explainable Artificial Intelligence - First World Conference, xAI 2023, Lisbon, Portugal, July 26-28, 2023, Proceedings, Part II, pp. 361-381, 2023, Springer, 978-3-031-44066-3. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
27 | Aaron Chan, Shaoliang Nie, Liang Tan 0005, Xiaochang Peng, Hamed Firooz, Maziar Sanjabi, Xiang Ren 0001 |
FRAME: Evaluating Simulatability Metrics for Free-Text Rationales. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2207.00779, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
27 | Yehuda Lindell |
Simple Three-Round Multiparty Schnorr Signing with Full Simulatability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2022, pp. 374, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
27 | Peter Hase, Shiyue Zhang, Harry Xie, Mohit Bansal |
Leakage-Adjusted Simulatability: Can Models Generate Non-Trivial Explanations of Their Behavior in Natural Language? ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2010.04119, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
27 | Peter Hase, Shiyue Zhang, Harry Xie, Mohit Bansal |
Leakage-Adjusted Simulatability: Can Models Generate Non-Trivial Explanations of Their Behavior in Natural Language? ![Search on Bibsonomy](Pics/bibsonomy.png) |
EMNLP (Findings) ![In: Findings of the Association for Computational Linguistics: EMNLP 2020, Online Event, 16-20 November 2020., pp. 4351-4367, 2020, Association for Computational Linguistics, 978-1-952148-90-3. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
27 | Bing Zeng |
Analysis Of The Simulatability Of An Oblivious Transfer. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2018, pp. 1151, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
27 | Takahiro Matsuda 0002, Goichiro Hanaoka |
Trading Plaintext-Awareness for Simulatability to Achieve Chosen Ciphertext Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2016, pp. 235, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
27 | Takahiro Matsuda 0002, Goichiro Hanaoka |
Trading Plaintext-Awareness for Simulatability to Achieve Chosen Ciphertext Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (1) ![In: Public-Key Cryptography - PKC 2016 - 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part I, pp. 3-34, 2016, Springer, 978-3-662-49383-0. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
27 | Wenwen Tu, Lifeng Lai |
On the simulatability condition in key generation over a non-authenticated public channel. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISIT ![In: IEEE International Symposium on Information Theory, ISIT 2015, Hong Kong, China, June 14-19, 2015, pp. 720-724, 2015, IEEE, 978-1-4673-7704-1. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
27 | Wenwen Tu, Lifeng Lai |
On the Simulatability Condition in Key Generation Over a Non-authenticated Public Channel. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1409.4064, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
27 | Damian Markham, Elham Kashefi |
Entanglement, Flow and Classical Simulatability in Measurement Based Quantum Computation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Horizons of the Mind ![In: Horizons of the Mind. A Tribute to Prakash Panangaden - Essays Dedicated to Prakash Panangaden on the Occasion of His 60th Birthday, pp. 427-453, 2014, Springer, 978-3-319-06879-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
27 | Charanjit S. Jutla, Arnab Roy 0001 |
Decision Procedures for Simulatability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings, pp. 573-590, 2012, Springer, 978-3-642-33166-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
27 | Yamin Liu, Bao Li 0001, Xianhui Lu, Xiaoying Jia 0002 |
Encryption Simulatability Reconsidered. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience - 7th International Conference, ISPEC 2011, Guangzhou, China, May 30 - June 1, 2011. Proceedings, pp. 14-23, 2011, Springer, 978-3-642-21030-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Dennis Hofheinz, Jörn Müller-Quade, Dominique Unruh |
Polynomial runtime in simulatability definitions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Secur. ![In: J. Comput. Secur. 17(5), pp. 703-735, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
27 | Tadashi Araragi, Olivier Pereira |
Automatic Verification of Simulatability in Security Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proccedings of the Fourth International Conference on Information Assurance and Security, IAS 2008, September 8-10, 2008, Napoli, Italy, pp. 275-280, 2008, IEEE Computer Society, 978-0-7695-3324-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Hu Xiong, Zhiguang Qin, Fagen Li |
Simulatability and Security of Certificateless Threshold Signatures without Random Oracles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS (2) ![In: 2008 International Conference on Computational Intelligence and Security, CIS 2008, 13-17 December 2008, Suzhou, China, Volume 2, Workshop Papers, pp. 308-313, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Licheng Wang, Zhenfu Cao, Xiangxue Li, Haifeng Qian |
Simulatability and security of certificateless threshold signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Sci. ![In: Inf. Sci. 177(6), pp. 1382-1394, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Michael Backes 0001, Markus Dürmuth, Ralf Küsters |
On Simulatability Soundness and Mapping Soundness of Symbolic Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2007, pp. 233, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
27 | Michael Backes 0001, Birgit Pfitzmann, Michael Waidner |
The reactive simulatability (RSIM) framework for asynchronous systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Comput. ![In: Inf. Comput. 205(12), pp. 1685-1720, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Eiichiro Fujisaki |
Plaintext Simulatability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. ![In: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 89-A(1), pp. 55-65, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Michael Backes 0001, Markus Dürmuth, Dennis Hofheinz, Ralf Küsters |
Conditional Reactive Simulatability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2006, pp. 132, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
27 | Michael Backes 0001, Birgit Pfitzmann, Michael Waidner |
Limits of the Reactive Simulatability/UC of Dolev-Yao Models with Hashes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2006, pp. 68, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
27 | Michael Backes 0001 |
Unifying simulatability definitions in cryptographic systems under different timing assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Log. Algebraic Methods Program. ![In: J. Log. Algebraic Methods Program. 64(2), pp. 157-188, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Michael Backes 0001, Dennis Hofheinz, Jörn Müller-Quade, Dominique Unruh |
On Fairness in Simulatability-based Cryptographic Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2005, pp. 294, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
27 | Dennis Hofheinz, Dominique Unruh |
On the Notion of Statistical Security in Simulatability Definitions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2005, pp. 32, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
27 | Michael Backes 0001, Birgit Pfitzmann, Michael Waidner |
The Reactive Simulatability (RSIM) Framework for Asynchronous Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2004, pp. 82, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP BibTeX RDF |
|
27 | Eiichiro Fujisaki |
Plaintext-Simulatability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2004, pp. 218, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP BibTeX RDF |
|
27 | Ueli M. Maurer, Stefan Wolf 0001 |
Secret-key agreement over unauthenticated public channels II: the simulatability condition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Theory ![In: IEEE Trans. Inf. Theory 49(4), pp. 832-838, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
27 | Michael Backes 0001 |
Unifying Simulatability Definitions in Cryptographic Systems under Different Timing Assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2003, pp. 114, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|
27 | Michael Backes 0001 |
Unifying Simulatability Definitions in Cryptographic Systems under Different Timing Assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CONCUR ![In: CONCUR 2003 - Concurrency Theory, 14th International Conference, Marseille, France, September 3-5, 2003, Proceedings, pp. 346-360, 2003, Springer, 3-540-40753-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
23 | Gergely Ács, Levente Buttyán, István Vajda |
Modelling adversaries and security objectives for routing protocols in wireless sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SASN ![In: Proceedings of the 4th ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2006, Alexandria, VA, USA, October 30, 2006, pp. 49-58, 2006, ACM, 1-59593-554-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
sensor networks, routing protocols, provable security, simulatability, adversary model |
23 | Peeter Laud |
Secrecy types for a simulatable cryptographic library. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 12th ACM Conference on Computer and Communications Security, CCS 2005, Alexandria, VA, USA, November 7-11, 2005, pp. 26-35, 2005, ACM, 1-59593-226-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
type systems, simulatability |
23 | Levente Buttyán, István Vajda |
Towards provable security for ad hoc routing protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SASN ![In: Proceedings of the 2nd ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2004, Washington, DC, USA, October 25, 2004, pp. 94-105, 2004, ACM, 1-58113-972-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
on-demand source routing, ad hoc networks, routing protocols, provable security, simulatability |
23 | Michael Backes 0001, Birgit Pfitzmann, Michael Waidner |
A composable cryptographic library with nested operations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003, Washington, DC, USA, October 27-30, 2003, pp. 220-230, 2003, ACM, 1-58113-738-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
cryptographically composable operators, security analysis of protocols, cryptography, simulatability |
23 | Birgit Pfitzmann, Michael Waidner |
Composition and integrity preservation of secure reactive systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: CCS 2000, Proceedings of the 7th ACM Conference on Computer and Communications Security, Athens, Greece, November 1-4, 2000., pp. 245-254, 2000, ACM, 1-58113-203-4. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
cryptography, simulatability |
17 | Ayman Jarrous, Benny Pinkas |
Secure Hamming Distance Based Computation and Its Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, 7th International Conference, ACNS 2009, Paris-Rocquencourt, France, June 2-5, 2009. Proceedings, pp. 107-124, 2009, 978-3-642-01956-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Ilya Mironov, Omkant Pandey, Omer Reingold, Salil P. Vadhan |
Computational Differential Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2009, 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009. Proceedings, pp. 126-142, 2009, Springer, 978-3-642-03355-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Michael Backes 0001, Birgit Pfitzmann, Andre Scedrov |
Key-dependent Message Security under Active Attacks - BRSIM/UC-Soundness of Symbolic Encryption with Key Cycles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: 20th IEEE Computer Security Foundations Symposium, CSF 2007, 6-8 July 2007, Venice, Italy, pp. 112-124, 2007, IEEE Computer Society, 0-7695-2819-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Matthew Green 0001, Susan Hohenberger |
Blind Identity-Based Encryption and Simulatable Oblivious Transfer. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2007, 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings, pp. 265-282, 2007, Springer, 978-3-540-76899-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Jan Camenisch, Gregory Neven, Abhi Shelat |
Simulatable Adaptive Oblivious Transfer. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2007, 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007, Proceedings, pp. 573-590, 2007, Springer, 978-3-540-72539-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Michael Backes 0001, Birgit Pfitzmann, Michael Waidner |
Formal Methods and Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FM ![In: FM 2006: Formal Methods, 14th International Symposium on Formal Methods, Hamilton, Canada, August 21-27, 2006, Proceedings, pp. 612-616, 2006, Springer, 3-540-37215-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Michael Backes 0001, Birgit Pfitzmann, Michael Waidner |
Limits of the BRSIM/UC Soundness of Dolev-Yao Models with Hashes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2006, 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings, pp. 404-423, 2006, Springer, 3-540-44601-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Thomas Santen |
A Formal Framework for Confidentiality-Preserving Refinement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2006, 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings, pp. 225-242, 2006, Springer, 3-540-44601-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Prateek Gupta, Vitaly Shmatikov |
Towards computationally sound symbolic analysis of key exchange protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FMSE ![In: Proceedings of the 2005 ACM workshop on Formal methods in security engineering, FMSE 2005, Fairfax, VA, USA, November 11, 2005, pp. 23-32, 2005, ACM, 1-59593-231-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
protocol logic, cryptographic protocols, symbolic analysis, computational soundness |
17 | Anupam Datta, Ralf Küsters, John C. Mitchell, Ajith Ramanathan |
On the Relationships Between Notions of Simulation-Based Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography, Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12, 2005, Proceedings, pp. 476-494, 2005, Springer, 3-540-24573-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Michael Backes 0001 |
Quantifying Probabilistic Information Flow in Computational Reactive Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2005, 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings, pp. 336-354, 2005, Springer, 3-540-28963-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Michael Backes 0001, Birgit Pfitzmann |
Limits of the Cryptographic Realization of Dolev-Yao-Style XOR. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2005, 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings, pp. 178-196, 2005, Springer, 3-540-28963-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Michael Backes 0001, Birgit Pfitzmann |
Relating Symbolic and Cryptographic Secrecy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 2005 IEEE Symposium on Security and Privacy (S&P 2005), 8-11 May 2005, Oakland, CA, USA, pp. 171-182, 2005, IEEE Computer Society, 0-7695-2339-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Saurabh Sanghvi, Salil P. Vadhan |
The round complexity of two-party random selection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STOC ![In: Proceedings of the 37th Annual ACM Symposium on Theory of Computing, Baltimore, MD, USA, May 22-24, 2005, pp. 338-347, 2005, ACM, 1-58113-960-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
cryptography, distributed computing, coin-flipping |
17 | Michael Backes 0001, Birgit Pfitzmann |
Symmetric Encryption in a Simulatable Dolev-Yao Style Cryptographic Library. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 17th IEEE Computer Security Foundations Workshop, (CSFW-17 2004), 28-30 June 2004, Pacific Grove, CA, USA, pp. 204-218, 2004, IEEE Computer Society, 0-7695-2169-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Michael Backes 0001, Birgit Pfitzmann, Michael Waidner |
Low-Level Ideal Signatures and General Integrity Idealization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 7th International Conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004, Proceedings, pp. 39-51, 2004, Springer, 3-540-23208-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Muxiang Zhang |
Adaptive Protocol for Entity Authentication and Key Agreement in Mobile Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2003, 6th International Conference, Seoul, Korea, November 27-28, 2003, Revised Papers, pp. 166-183, 2003, Springer, 3-540-21376-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
17 | Birgit Pfitzmann, Michael Waidner |
A Model for Asynchronous Reactive Systems and its Application to Secure Message Transmission. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 2001 IEEE Symposium on Security and Privacy, Oakland, California, USA May 14-16, 2001, pp. 184-200, 2001, IEEE Computer Society, 0-7695-1046-9. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|