Michael Backes

From MaRDI portal
Person:860895

Available identifiers

zbMath Open backes.michaelDBLPb/MichaelBackes1WikidataQ19296289 ScholiaQ19296289MaRDI QIDQ860895

List of research outcomes





PublicationDate of PublicationType
On the Proactive Generation of Unsafe Images From Text-To-Image Models Using Benign Prompts2025-01-28Dataset
Adversarial vulnerability bounds for Gaussian process classification2023-06-27Paper
Anonymous RAM2022-08-19Paper
Computational soundness for interactive primitives2022-08-19Paper
Quantifying probabilistic information flow in computational reactive systems2022-03-09Paper
Secure key-updating for lazy revocation2022-03-09Paper
Conditional reactive simulatability2022-03-09Paper
Limits of the cryptographic realization of Dolev-Yao-style XOR2022-03-09Paper
Cryptographically sound security proofs for basic and public-key Kerberos2022-03-09Paper
Limits of the BRSIM/UC soundness of Dolev-Yao models with hashes2022-03-09Paper
A cryptographically sound Dolev-Yao style security proof of the Otway-Rees protocol2022-03-07Paper
An algebra for composing enterprise privacy policies2022-03-07Paper
Symmetric authentication within a simulatable cryptographic library2022-02-16Paper
Computational probabilistic non-interference2022-02-16Paper
TrollThrottle -- raising the cost of astroturfing2021-02-23Paper
Periodicity detection in irregularly sampled light curves by robust regression and outlier detection2020-10-14Paper
Ring signatures: logarithmic-size, no setup -- from standard assumptions2020-02-04Paper
Efficient non-interactive zero-knowledge proofs in cross-domains without trusted setup2020-01-28Paper
Threshold optimization for classification in imbalanced data in a problem of gamma-ray astronomy2019-11-27Paper
Signatures with flexible public key: introducing equivalence classes for public keys2019-01-23Paper
From zoos to safaris -- from closed-world enforcement to open-world assessment of privacy2018-10-17Paper
Quantifying information flow in cryptographic systems2016-07-27Paper
Delegatable functional signatures2016-04-13Paper
Secrecy without perfect randomness: cryptography with (bounded) weak sources2016-03-10Paper
Proactive secure message transmission in asynchronous networks2015-09-04Paper
Asynchronous MPC with a strict honest majority using non-equivocation2015-09-03Paper
Brief announcement2014-12-05Paper
Privacy-preserving accountable computation2014-10-16Paper
BackRef: accountability in anonymous communication networks2014-07-07Paper
Webtrust -- a comprehensive authenticity and integrity framework for HTTP2014-07-07Paper
Real-or-random key secrecy of the Otway-Rees protocol via a symbolic security proof2013-10-08Paper
Computational soundness of symbolic zero-knowledge proofs: weaker assumptions and mechanized verification2013-08-06Paper
Asynchronous computational VSS with reduced communication complexity2013-03-18Paper
Computationally sound abstraction and verification of secure multi-party computations2012-08-29Paper
G2C: cryptographic protocols from goal-driven specifications2012-08-22Paper
Union and Intersection Types for Secure Protocol Implementations2012-08-22Paper
Computational verifiable secret sharing revisited2011-12-02Paper
Unifying simulatability definitions in cryptographic systems under different timing assumptions (extended abstract)2010-03-30Paper
Reactively secure signature schemes2010-02-09Paper
FST TCS 2003: Foundations of Software Technology and Theoretical Computer Science2009-08-06Paper
Theory of Cryptography2009-05-14Paper
OAEP Is Secure under Key-Dependent Messages2009-02-10Paper
Limits of Constructive Security Proofs2009-02-10Paper
A Formal Language for Cryptographic Pseudocode2009-01-27Paper
Formally Bounding the Side-Channel Leakage in Unknown-Message Attacks2008-10-27Paper
On Simulatability Soundness and Mapping Soundness of Symbolic Cryptography2008-04-24Paper
The reactive simulatability (RSIM) framework for asynchronous systems2007-12-10Paper
On the Necessity of Rewinding in Secure Multiparty Computation2007-08-30Paper
Foundations of Software Science and Computation Structures2007-05-02Paper
Compositional analysis of contract-signing protocols2007-01-09Paper
Foundations of Security Analysis and Design III2006-11-01Paper
Information Security2006-10-16Paper
Information Security2006-10-16Paper
Theory of Cryptography2005-12-07Paper
Unifying simulatability definitions in cryptographic systems under different timing assumptions2005-08-01Paper
https://portal.mardi4nfdi.de/entity/Q48088372004-08-12Paper
https://portal.mardi4nfdi.de/entity/Q44186912003-08-11Paper

Research outcomes over time

This page was built for person: Michael Backes