| Publication | Date of Publication | Type |
|---|
Unconditional Byzantine agreement for any number of faulty processors (extended abstract) STACS 92 | 2022-08-18 | Paper |
Limits of the cryptographic realization of Dolev-Yao-style XOR Computer Security – ESORICS 2005 | 2022-03-09 | Paper |
Limits of the BRSIM/UC soundness of Dolev-Yao models with hashes Computer Security – ESORICS 2006 | 2022-03-09 | Paper |
Symmetric authentication within a simulatable cryptographic library Computer Security – ESORICS 2003 | 2022-02-16 | Paper |
Computational probabilistic non-interference Computer Security — ESORICS 2002 | 2022-02-16 | Paper |
Optimal efficiency of optimistic contract signing Proceedings of the seventeenth annual ACM symposium on Principles of distributed computing - PODC '98 | 2016-03-02 | Paper |
Asymmetric fingerprinting Advances in Cryptology — EUROCRYPT ’96 | 2014-08-20 | Paper |
| Runtime monitoring of metric first-order temporal properties | 2012-10-19 | Paper |
Reactively secure signature schemes Lecture Notes in Computer Science | 2010-02-09 | Paper |
FST TCS 2003: Foundations of Software Technology and Theoretical Computer Science Lecture Notes in Computer Science | 2009-08-06 | Paper |
Theory of Cryptography Lecture Notes in Computer Science | 2009-05-14 | Paper |
The reactive simulatability (RSIM) framework for asynchronous systems Information and Computation | 2007-12-10 | Paper |
Foundations of Software Science and Computation Structures Lecture Notes in Computer Science | 2007-05-02 | Paper |
Foundations of Security Analysis and Design III Lecture Notes in Computer Science | 2006-11-01 | Paper |
Information Security Lecture Notes in Computer Science | 2006-10-16 | Paper |
| scientific article; zbMATH DE number 2090144 (Why is no real title available?) | 2004-08-12 | Paper |
Optimized Self-Synchronizing Mode of Operation Fast Software Encryption | 2004-08-12 | Paper |
| scientific article; zbMATH DE number 1759346 (Why is no real title available?) | 2002-11-28 | Paper |
| scientific article; zbMATH DE number 1583811 (Why is no real title available?) | 2001-12-18 | Paper |
| scientific article; zbMATH DE number 1676637 (Why is no real title available?) | 2001-11-25 | Paper |
| scientific article; zbMATH DE number 1497864 (Why is no real title available?) | 2001-03-05 | Paper |
| scientific article; zbMATH DE number 1302844 (Why is no real title available?) | 2000-10-17 | Paper |
| scientific article; zbMATH DE number 708797 (Why is no real title available?) | 1999-08-29 | Paper |
On the Performance of Hyperelliptic Cryptosystems Advances in Cryptology — EUROCRYPT ’99 | 1999-06-17 | Paper |
Statistical secrecy and multibit commitments IEEE Transactions on Information Theory | 1998-08-02 | Paper |
| scientific article; zbMATH DE number 1088927 (Why is no real title available?) | 1998-01-26 | Paper |
| scientific article; zbMATH DE number 1024061 (Why is no real title available?) | 1997-11-02 | Paper |
On the existence of statistically hiding bit commitment schemes and fail-stop signatures Journal of Cryptology | 1997-08-28 | Paper |
Fail-Stop Signatures SIAM Journal on Computing | 1997-05-26 | Paper |
| scientific article; zbMATH DE number 883900 (Why is no real title available?) | 1996-12-01 | Paper |
Digital signature schemes: general framework and fail-stop signatures Lecture Notes in Computer Science | 1996-10-06 | Paper |
| scientific article; zbMATH DE number 503335 (Why is no real title available?) | 1994-02-22 | Paper |
| scientific article; zbMATH DE number 176568 (Why is no real title available?) | 1993-05-18 | Paper |
| scientific article; zbMATH DE number 176512 (Why is no real title available?) | 1993-05-18 | Paper |
| scientific article; zbMATH DE number 177054 (Why is no real title available?) | 1993-05-18 | Paper |