Up a level |
(2008) A Formal Language for Cryptographic Pseudocode.
(2008) Conditional Reactive Simulatability.
(2008) Compromising Reflections or How to Read LCD Monitors Around the Corner.
(2008) Gespiegelt / Verräterische Reflexionen: Wie Brillengläser Geheimnisse verraten.
(2008) OAEP is Secure Under Key-dependent Messages.
(2008) Brief Announcement: Anonymous and Censorship-resistant Content-sharing in Unstructured Overlays.
(2008) Automated Verification of Remote Electronic Voting Protocols in the Applied Pi-calculus.
(2008) Formally Bounding the Side-Channel Leakage in Unknown-Message Attacks.
(2008) CASPA: Causality-based Abstraction for Security Protocol Analysis.
(2008) Type-checking zero-knowledge.
(2008) Zero-Knowledge in the Applied Pi-calculus and Automated Verification of the Direct Anonymous Attestation Protocol.
(2008) Limits of the BRSIM/UC soundness of Dolev-Yao-style XOR.
(2008) Key-dependent Message Security under Active Attacks - BRSIM/UC-Soundness of Symbolic Encryption with Key Cycles.
(2008) Computational Soundness of Symbolic Zero-Knowledge Proofs Against Active Attackers.
(2008) Limits of Constructive Security Proofs.
(2008) Formal Specification of the x87 Floating-Point Instruction Set.
(2008) MD5 Collisions on Multimedia Files.
(2008) Efficient Long-term Secure Universally Composable Commitments.
(2008) Quantenbasierte Koordination von Multiagentensystemen.