Michael Backes, Birgit Pfitzmann, et al.
Int. J. Inf. Secur.
We present the first idealized cryptographic library that can be used like the Dolev-Yao model for automated proofs of cryptographic protocols that use nested cryptographic operations, while coming with a cryptographic implementation that is provably secure under active attacks. Copyright 2003 ACM.
Michael Backes, Birgit Pfitzmann, et al.
Int. J. Inf. Secur.
Nikolai Joukov, Birgit Pfitzmann, et al.
SCC 2009
Carl E. Abrams, Juerg von Känel, et al.
IBM Systems Journal
Birgit Pfitzmann, Nikolai Joukov
SCC 2011