Search
International Association for Cryptologic Research
What's new
Archive
Best Papers
Videos
Authors
Coauthors
By year
By conference
All Committees
Most Committees
Report errors
Maps
About
Michael Backes
Search web for home page
Program Committees
1
2011
Crypto
pc
2
2010
TCC
pc
3
2005
Eurocrypt
pc
4
2004
Asiacrypt
pc
Publications
year
title
booktitle
pages
1
2011
Computational Verifiable Secret Sharing Revisited
asiacrypt
590-609
2
2010
Computationally Sound Verification of Source Code
eprint
online
3
2009
A general framework for computational soundness proofs - or - The computational soundness of the applied pi-calculus
eprint
online
4
2008
OAEP Is Secure under Key-Dependent Messages
asiacrypt
506-523
5
2008
Limits of Constructive Security Proofs
asiacrypt
290-307
6
2008
Computational Soundness of Symbolic Zero-Knowledge Proofs Against Active Attackers
eprint
online
7
2008
Formally Bounding the Side-Channel Leakage in Unknown-Message Attacks
eprint
online
8
2007
Zero-Knowledge in the Applied Pi-calculus and Automated Verification of the Direct Anonymous Attestation Protocol
eprint
online
9
2007
On the Necessity of Rewinding in Secure Multiparty Computation
tcc
157-173
10
2007
On the Security of Protocols with Logarithmic Communication Complexity
eprint
online
11
2007
On Simulatability Soundness and Mapping Soundness of Symbolic Cryptography
eprint
online
12
2006
Cryptographically Sound Theorem Proving
eprint
online
13
2006
On the Necessity of Rewinding in Secure Multiparty Computation
eprint
online
14
2006
Symbolic and Cryptographic Analysis of the Secure WS-ReliableMessaging Scenario
eprint
online
15
2006
Limits of the Reactive Simulatability/UC of Dolev-Yao Models with Hashes
eprint
online
16
2006
Conditional Reactive Simulatability
eprint
online
17
2006
Cryptographically Sound Security Proofs for Basic and Public-Key Kerberos
eprint
online
18
2006
Computationally Sound Secrecy Proofs by Mechanized Flow Analysis
eprint
online
19
2005
Public-Key Steganography with Active Attacks
tcc
online
20
2005
Limits of the Cryptographic Realization of Dolev-Yao-style XOR
eprint
online
21
2005
On Fairness in Simulatability-based Cryptographic Systems
eprint
online
22
2005
Secure Key-Updating for Lazy Revocation
eprint
online
23
2005
Key-dependent Message Security under Active Attacks -- BRSIM/UC-Soundness of Symbolic Encryption with Key Cycles
eprint
online
24
2004
Symmetric Encryption in a Simulatable Dolev-Yao Style Cryptographic Library
eprint
online
25
2004
A General Composition Theorem for Secure Reactive Systems
tcc
336-354
26
2004
The Reactive Simulatability (RSIM) Framework for Asynchronous Systems
eprint
online
27
2004
Relating Symbolic and Cryptographic Secrecy
eprint
online
28
2003
Unifying Simulatability Definitions in Cryptographic Systems under Different Timing Assumptions
eprint
online
29
2003
A Cryptographically Sound Security Proof of the Needham-Schroeder-Lowe Public-Key Protocol
eprint
online
30
2003
Symmetric Authentication Within a Simulatable Cryptographic Library
eprint
online
31
2003
Public-Key Steganography with Active Attacks
eprint
online
32
2003
How to Break and Repair a Universally Composable Signature Functionality
eprint
online
33
2003
A Universally Composable Cryptographic Library
eprint
online
Coauthors of Michael Backes
David Basin
Christian Cachin
Iliano Cervesato
Markus Duermuth
Markus Dürmuth
Dennis Hofheinz
Aaron D. Jaggard
Aniket Kate
Boris Köpf
Ralf Küsters
Peeter Laud
Matteo Maffei
Sebastian Mödersheim
Jörn Müller-Quade
Alina Oprea
Arpita Patra
Birgit Pfitzmann
Andre Scedrov
Christoph Sprenger
Joe-Kay Tsay
Dominique Unruh
Luca Viganò
Michael Waidner