Search
International Association for Cryptologic Research
What's new
Archive
Best Papers
Videos
Authors
Coauthors
By year
By conference
All Committees
Most Committees
Report errors
Maps
About
Birgit Pfitzmann
Search web for home page
Program Committees
1
2004
TCC
pc
2
2001
Eurocrypt
pc chair
3
1998
Eurocrypt
pc
4
1995
Eurocrypt
pc
5
1993
Crypto
pc
Publications
year
title
booktitle
pages
1
2010
Composable Security Analysis of OS Services
eprint
online
2
2006
Reactively Simulatable Certified Mail
eprint
online
3
2006
Cryptographically Sound Theorem Proving
eprint
online
4
2006
Symbolic and Cryptographic Analysis of the Secure WS-ReliableMessaging Scenario
eprint
online
5
2006
Limits of the Reactive Simulatability/UC of Dolev-Yao Models with Hashes
eprint
online
6
2005
Limits of the Cryptographic Realization of Dolev-Yao-style XOR
eprint
online
7
2005
Browser Model for Security Analysis of Browser-Based Protocols
eprint
online
8
2005
Key-dependent Message Security under Active Attacks -- BRSIM/UC-Soundness of Symbolic Encryption with Key Cycles
eprint
online
9
2004
Symmetric Encryption in a Simulatable Dolev-Yao Style Cryptographic Library
eprint
online
10
2004
A General Composition Theorem for Secure Reactive Systems
tcc
336-354
11
2004
The Reactive Simulatability (RSIM) Framework for Asynchronous Systems
eprint
online
12
2004
Relating Symbolic and Cryptographic Secrecy
eprint
online
13
2003
A Cryptographically Sound Security Proof of the Needham-Schroeder-Lowe Public-Key Protocol
eprint
online
14
2003
Symmetric Authentication Within a Simulatable Cryptographic Library
eprint
online
15
2003
A Universally Composable Cryptographic Library
eprint
online
16
2001
Optimized Self-Synchronizing Mode of Operation
fse
78-91
17
2000
Anonymous Fingerprinting with Direct Non-Repudiation
eprint
online
18
2000
Anonymous Fingerprinting with Direct Non-repudiation
asiacrypt
401-414
19
2000
A Model for Asynchronous Reactive Systems and its Application to Secure Message Transmission
eprint
online
20
1999
Coin-Based Anonymous Fingerprinting
eurocrypt
150-164
21
1998
Self-Delegation with Controlled Propagation - or - What If You Lose Your Laptop
crypto
153-168
22
1997
Self-Delegation with Controlled Propagation - or - What If You Lose Your Laptop
eprint
online
23
1997
On the Existence of Statistically Hiding Bit Commitment Schemes and Fail-Stop Signatures
jofc
163-194
24
1997
Anonymous Fingerprinting
eurocrypt
88-102
25
1997
Collision-Free Accumulators and Fail-Stop Signature Schemes Without Trees
eurocrypt
480-494
26
1996
Asymmetric Fingerprinting (Extended Abstract)
eurocrypt
84-95
27
1995
How to Break Another Provably Secure Payment System
eurocrypt
121-132
28
1994
Breaking Efficient Anonymous Channel
eurocrypt
332-340
29
1993
On the Existence of Statistically Hiding Bit Commitment Schemes and Fail-Stop Signatures
crypto
250-265
30
1992
New Constructions of Fail-Stop Signatures and Lower Bounds (Extended Abstract)
crypto
15-30
31
1992
Attacks on Protocols for Server-Aided RSA Computation
eurocrypt
153-162
32
1991
Cryptographically Strong Undeniable Signatures, Unconditionally Secure for the Signer
crypto
470-484
33
1991
How To Break and Repair A "Provably Secure" Untraceable Payment System
crypto
338-350
34
1990
A Remark on a Signature Scheme Where Forgery Can Be Proved
eurocrypt
441-445
35
1989
The Dining Cryptographers in the Disco - Underconditional Sender and Recipient Untraceability with Computationally Secure Serviceability (Abstract)
eurocrypt
690
36
1989
How to Break the Direct RSA-Implementation of Mixes
eurocrypt
373-381
Coauthors of Birgit Pfitzmann
Ammar Alkassar
Michael Backes
Niko Bari
David Basin
Gerrit Bleumer
Ran Canetti
Suresh Chari
David Chaum
Ivan Damgård
Alexander Geraldy
Oded Goldreich
Thomas Groß
Shai Halevi
Eugène van Heijst
Sebastian Mödersheim
Torben P. Pedersen
Andreas Pfitzmann
Ronald L. Rivest
Arnab Roy
Ahmad-Reza Sadeghi
Andre Scedrov
Matthias Schunter
Christoph Sprenger
Michael Steiner
Wietse Venema
Luca Viganò
Michael Waidner