Asynchronous MPC with a strict honest majority using non-equivocation M Backes, F Bendun, A Choudhury, A Kate Proceedings of the 2014 ACM symposium on Principles of distributed computing …, 2014 | 37 | 2014 |
Computational soundness of symbolic zero-knowledge proofs: weaker assumptions and mechanized verification M Backes, F Bendun, D Unruh Principles of Security and Trust, 206-225, 2013 | 22 | 2013 |
Symbolic Malleable Zero-Knowledge Proofs M Backes, F Bendun, M Maffei, E Mohammadi, K Pecina Computer Security Foundations Symposium (CSF), 2015 IEEE 28th, 412-426, 2015 | 15 | 2015 |
Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information M Simeonovski, F Bendun, MR Asghar, M Backes, N Marnau, P Druschel arXiv preprint arXiv:1506.06033, 2015 | 15 | 2015 |
A Computationally Sound, Symbolic Abstraction for Malleable Zero-knowledge Proofs M Backes, F Bendun, M Maffei, E Mohammadi h ttp://www. infsec. cs. uni-saarland. de/∼ mohammadi/paper/symbolic tzk. pdf, 2013 | 15* | 2013 |
Asynchronous MPC with t< n/2 Using Non-equivocation M Backes, F Bendun, A Choudhury, A Kate Cryptology ePrint Archive, Report 2013/745, 2013 | 10 | 2013 |
Brief announcement: distributed cryptography using trinc M Backes, F Bendun, A Kate Proceedings of the 2012 ACM symposium on Principles of distributed computing …, 2012 | 10 | 2012 |
Towards Composable Computational Soundness for Signatures and Zero-Knowledge Proofs M Backes, F Bendun, E Mohammadi 7th Workshop on Formal and Computational Cryptography (FCC), Cambridge, MA, 2012 | 10 | 2012 |
PriCL: Creating a Precedent, a Framework for Reasoning about Privacy Case Law M Backes, F Bendun, J Hoffmann, N Marnau Principles of Security and Trust, 344-363, 2015 | 7 | 2015 |
Poster: Forcing the Cloud to Forget by Attesting Data Deletion M Backes, F Bendun | | |