| Publication | Date of Publication | Type |
|---|
| On the Proactive Generation of Unsafe Images From Text-To-Image Models Using Benign Prompts | 2025-01-28 | Dataset |
Adversarial vulnerability bounds for Gaussian process classification Machine Learning | 2023-06-27 | Paper |
| Anonymous RAM | 2022-08-19 | Paper |
Computational soundness for interactive primitives Computer Security -- ESORICS 2015 | 2022-08-19 | Paper |
Quantifying probabilistic information flow in computational reactive systems Computer Security – ESORICS 2005 | 2022-03-09 | Paper |
Secure key-updating for lazy revocation Computer Security – ESORICS 2006 | 2022-03-09 | Paper |
Conditional reactive simulatability Computer Security – ESORICS 2006 | 2022-03-09 | Paper |
Limits of the cryptographic realization of Dolev-Yao-style XOR Computer Security – ESORICS 2005 | 2022-03-09 | Paper |
Cryptographically sound security proofs for basic and public-key Kerberos Computer Security – ESORICS 2006 | 2022-03-09 | Paper |
Limits of the BRSIM/UC soundness of Dolev-Yao models with hashes Computer Security – ESORICS 2006 | 2022-03-09 | Paper |
A cryptographically sound Dolev-Yao style security proof of the Otway-Rees protocol Computer Security – ESORICS 2004 | 2022-03-07 | Paper |
An algebra for composing enterprise privacy policies Computer Security – ESORICS 2004 | 2022-03-07 | Paper |
Symmetric authentication within a simulatable cryptographic library Computer Security – ESORICS 2003 | 2022-02-16 | Paper |
Computational probabilistic non-interference Computer Security — ESORICS 2002 | 2022-02-16 | Paper |
TrollThrottle -- raising the cost of astroturfing (available as arXiv preprint) | 2021-02-23 | Paper |
Periodicity detection in irregularly sampled light curves by robust regression and outlier detection Statistical Analysis and Data Mining: The ASA Data Science Journal | 2020-10-14 | Paper |
| Ring signatures: logarithmic-size, no setup -- from standard assumptions | 2020-02-04 | Paper |
| Efficient non-interactive zero-knowledge proofs in cross-domains without trusted setup | 2020-01-28 | Paper |
Threshold optimization for classification in imbalanced data in a problem of gamma-ray astronomy Advances in Data Analysis and Classification. ADAC | 2019-11-27 | Paper |
| Signatures with flexible public key: introducing equivalence classes for public keys | 2019-01-23 | Paper |
| From zoos to safaris -- from closed-world enforcement to open-world assessment of privacy | 2018-10-17 | Paper |
Quantifying information flow in cryptographic systems Mathematical Structures in Computer Science | 2016-07-27 | Paper |
Delegatable functional signatures Public-Key Cryptography – PKC 2016 | 2016-04-13 | Paper |
Secrecy without perfect randomness: cryptography with (bounded) weak sources Applied Cryptography and Network Security | 2016-03-10 | Paper |
Proactive secure message transmission in asynchronous networks Proceedings of the twenty-second annual symposium on Principles of distributed computing | 2015-09-04 | Paper |
Asynchronous MPC with a strict honest majority using non-equivocation Proceedings of the 2014 ACM symposium on Principles of distributed computing | 2015-09-03 | Paper |
Brief announcement Proceedings of the 2012 ACM symposium on Principles of distributed computing | 2014-12-05 | Paper |
Privacy-preserving accountable computation Lecture Notes in Computer Science | 2014-10-16 | Paper |
BackRef: accountability in anonymous communication networks Applied Cryptography and Network Security | 2014-07-07 | Paper |
Webtrust -- a comprehensive authenticity and integrity framework for HTTP Applied Cryptography and Network Security | 2014-07-07 | Paper |
| Real-or-random key secrecy of the Otway-Rees protocol via a symbolic security proof | 2013-10-08 | Paper |
Computational soundness of symbolic zero-knowledge proofs: weaker assumptions and mechanized verification Lecture Notes in Computer Science | 2013-08-06 | Paper |
Asynchronous computational VSS with reduced communication complexity Topics in Cryptology – CT-RSA 2013 | 2013-03-18 | Paper |
| Computationally sound abstraction and verification of secure multi-party computations | 2012-08-29 | Paper |
G2C: cryptographic protocols from goal-driven specifications Theory of Security and Applications | 2012-08-22 | Paper |
Union and Intersection Types for Secure Protocol Implementations Theory of Security and Applications | 2012-08-22 | Paper |
Computational verifiable secret sharing revisited Lecture Notes in Computer Science | 2011-12-02 | Paper |
Unifying simulatability definitions in cryptographic systems under different timing assumptions (extended abstract) Lecture Notes in Computer Science | 2010-03-30 | Paper |
Reactively secure signature schemes Lecture Notes in Computer Science | 2010-02-09 | Paper |
FST TCS 2003: Foundations of Software Technology and Theoretical Computer Science Lecture Notes in Computer Science | 2009-08-06 | Paper |
Theory of Cryptography Lecture Notes in Computer Science | 2009-05-14 | Paper |
OAEP Is Secure under Key-Dependent Messages Advances in Cryptology - ASIACRYPT 2008 | 2009-02-10 | Paper |
Limits of Constructive Security Proofs Advances in Cryptology - ASIACRYPT 2008 | 2009-02-10 | Paper |
A Formal Language for Cryptographic Pseudocode Logic for Programming, Artificial Intelligence, and Reasoning | 2009-01-27 | Paper |
Formally Bounding the Side-Channel Leakage in Unknown-Message Attacks Computer Security - ESORICS 2008 | 2008-10-27 | Paper |
On Simulatability Soundness and Mapping Soundness of Symbolic Cryptography FSTTCS 2007: Foundations of Software Technology and Theoretical Computer Science | 2008-04-24 | Paper |
The reactive simulatability (RSIM) framework for asynchronous systems Information and Computation | 2007-12-10 | Paper |
On the Necessity of Rewinding in Secure Multiparty Computation Theory of Cryptography | 2007-08-30 | Paper |
Foundations of Software Science and Computation Structures Lecture Notes in Computer Science | 2007-05-02 | Paper |
Compositional analysis of contract-signing protocols Theoretical Computer Science | 2007-01-09 | Paper |
Foundations of Security Analysis and Design III Lecture Notes in Computer Science | 2006-11-01 | Paper |
Information Security Lecture Notes in Computer Science | 2006-10-16 | Paper |
Information Security Lecture Notes in Computer Science | 2006-10-16 | Paper |
Theory of Cryptography Lecture Notes in Computer Science | 2005-12-07 | Paper |
Unifying simulatability definitions in cryptographic systems under different timing assumptions The Journal of Logic and Algebraic Programming | 2005-08-01 | Paper |
| scientific article; zbMATH DE number 2090144 (Why is no real title available?) | 2004-08-12 | Paper |
| scientific article; zbMATH DE number 1962854 (Why is no real title available?) | 2003-08-11 | Paper |