| Publication | Date of Publication | Type |
|---|
| On the Proactive Generation of Unsafe Images From Text-To-Image Models Using Benign Prompts | 2025-01-28 | Dataset |
| Adversarial vulnerability bounds for Gaussian process classification | 2023-06-27 | Paper |
| Anonymous RAM | 2022-08-19 | Paper |
| Computational Soundness for Interactive Primitives | 2022-08-19 | Paper |
| Quantifying Probabilistic Information Flow in Computational Reactive Systems | 2022-03-09 | Paper |
| Secure Key-Updating for Lazy Revocation | 2022-03-09 | Paper |
| Conditional Reactive Simulatability | 2022-03-09 | Paper |
| Limits of the Cryptographic Realization of Dolev-Yao-Style XOR | 2022-03-09 | Paper |
| Cryptographically Sound Security Proofs for Basic and Public-Key Kerberos | 2022-03-09 | Paper |
| Limits of the BRSIM/UC Soundness of Dolev-Yao Models with Hashes | 2022-03-09 | Paper |
| A Cryptographically Sound Dolev-Yao Style Security Proof of the Otway-Rees Protocol | 2022-03-07 | Paper |
| An Algebra for Composing Enterprise Privacy Policies | 2022-03-07 | Paper |
| Symmetric Authentication within a Simulatable Cryptographic Library | 2022-02-16 | Paper |
| Computational Probabilistic Non-interference | 2022-02-16 | Paper |
| TrollThrottle -- raising the cost of astroturfing | 2021-02-23 | Paper |
| Periodicity detection in irregularly sampled light curves by robust regression and outlier detection | 2020-10-14 | Paper |
| Ring signatures: logarithmic-size, no setup -- from standard assumptions | 2020-02-04 | Paper |
| Efficient non-interactive zero-knowledge proofs in cross-domains without trusted setup | 2020-01-28 | Paper |
| Threshold optimization for classification in imbalanced data in a problem of gamma-ray astronomy | 2019-11-27 | Paper |
| Signatures with flexible public key: introducing equivalence classes for public keys | 2019-01-23 | Paper |
| From zoos to safaris -- from closed-world enforcement to open-world assessment of privacy | 2018-10-17 | Paper |
| Quantifying information flow in cryptographic systems | 2016-07-27 | Paper |
| Delegatable Functional Signatures | 2016-04-13 | Paper |
| Secrecy Without Perfect Randomness: Cryptography with (Bounded) Weak Sources | 2016-03-10 | Paper |
| Proactive secure message transmission in asynchronous networks | 2015-09-04 | Paper |
| Asynchronous MPC with a strict honest majority using non-equivocation | 2015-09-03 | Paper |
| Brief announcement | 2014-12-05 | Paper |
| Privacy-Preserving Accountable Computation | 2014-10-16 | Paper |
| BackRef: Accountability in Anonymous Communication Networks | 2014-07-07 | Paper |
| WebTrust – A Comprehensive Authenticity and Integrity Framework for HTTP | 2014-07-07 | Paper |
| Real-or-random key secrecy of the Otway-Rees protocol via a symbolic security proof | 2013-10-08 | Paper |
| Computational Soundness of Symbolic Zero-Knowledge Proofs: Weaker Assumptions and Mechanized Verification | 2013-08-06 | Paper |
| Asynchronous Computational VSS with Reduced Communication Complexity | 2013-03-18 | Paper |
| Computationally sound abstraction and verification of secure multi-party computations | 2012-08-29 | Paper |
| G2C: Cryptographic Protocols from Goal-Driven Specifications | 2012-08-22 | Paper |
| Union and Intersection Types for Secure Protocol Implementations | 2012-08-22 | Paper |
| Computational Verifiable Secret Sharing Revisited | 2011-12-02 | Paper |
| CONCUR 2003 - Concurrency Theory | 2010-03-30 | Paper |
| Reactively Secure Signature Schemes | 2010-02-09 | Paper |
| FST TCS 2003: Foundations of Software Technology and Theoretical Computer Science | 2009-08-06 | Paper |
| Theory of Cryptography | 2009-05-14 | Paper |
| OAEP Is Secure under Key-Dependent Messages | 2009-02-10 | Paper |
| Limits of Constructive Security Proofs | 2009-02-10 | Paper |
| A Formal Language for Cryptographic Pseudocode | 2009-01-27 | Paper |
| Formally Bounding the Side-Channel Leakage in Unknown-Message Attacks | 2008-10-27 | Paper |
| On Simulatability Soundness and Mapping Soundness of Symbolic Cryptography | 2008-04-24 | Paper |
| The reactive simulatability (RSIM) framework for asynchronous systems | 2007-12-10 | Paper |
| On the Necessity of Rewinding in Secure Multiparty Computation | 2007-08-30 | Paper |
| Foundations of Software Science and Computation Structures | 2007-05-02 | Paper |
| Compositional analysis of contract-signing protocols | 2007-01-09 | Paper |
| Foundations of Security Analysis and Design III | 2006-11-01 | Paper |
| Information Security | 2006-10-16 | Paper |
| Information Security | 2006-10-16 | Paper |
| Theory of Cryptography | 2005-12-07 | Paper |
| Unifying simulatability definitions in cryptographic systems under different timing assumptions | 2005-08-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4808837 | 2004-08-12 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4418691 | 2003-08-11 | Paper |