Publications

Deniable encryption with negligible detection probability: An interactive construction

2011 - Markus Dürmuth, David Mandell Freeman

Proceedings Advances in Cryptology (EUROCRYPT 11), Springer, 2011

Acoustic Side-Channel Attacks on Printers

2010 - Michael Backes, Markus Dürmuth, Sebastian Gerling, Manfred Pinkal, Caroline Sporleder

Proceedings USENIX Security Symposium, 2010.

Speaker Recognition in Encrypted Voice Streams

2010 - Michael Backes, Goran Doychev, Markus Dürmuth, Boris Köpf

Proceedings European Symposium on Research in Computer Security (ESORICS), 2010. (Preliminary version appeared in the Grande Region Security and Reliability Day, Saarbrücken, 2010.)

A Provably Secure and Efficient Countermeasure against Timing Attacks

2009 - Boris Köpf, Markus Dürmuth

Proceedings of the 22nd IEEE Computer Security Foundations Symposium (CSF), 2009.

Tempest in a Teapot: Compromising Reflections Revisited

2009 - Michael Backes, Tongbo Chen, Markus Dürmuth, Hendrik P. A. Lensch, Martin Welk

Proceedings of the IEEE Symposium on Security and Privacy (SSP '09), Mai 2009.

Compromising Reflections - or - How to Read LCD Monitors Around the Corner

2008 - Michael Backes, Markus Dürmuth, Dominique Unruh

Proceedings of the IEEE Symposium on Security and Privacy (SSP '08), Mai 2008.

OAEP is Secure Under Key-dependent Messages

2008 - Michael Backes, Markus Dürmuth, Dominique Unruh

Proceedings of ASIACRYPT, December 2008.

Information Flow in the Peer-Reviewing Process (Extended Abstract)

2007 - Michael Backes, Markus Dürmuth, Dominique Unruh

Proceedings of 28th IEEE Symposium on Security and Privacy (SSP '07), May 2007.

On Simulatability Soundness and Mapping Soundness of Symbolic Cryptography

2007 - Michael Backes, Markus Dürmuth, Ralf Küsters

Proceedings of 27th International Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS), December 2007.

Conditional Reactive Simulatability

2006 - Michael Backes, Markus Dürmuth, Dennis Hofheinz, Ralf Küsters

Proceedings of 11th European Symposium on Research in Computer Security (ESORICS '06), September 2006.
Page: