Asynchronous MPC with a strict honest majority using non-equivocation M Backes, F Bendun, A Choudhury, A Kate Proceedings of the 2014 ACM symposium on Principles of distributed computing …, 2014 | 30 | 2014 |

Computational soundness of symbolic zero-knowledge proofs: weaker assumptions and mechanized verification M Backes, F Bendun, D Unruh Principles of Security and Trust, 206-225, 2013 | 20 | 2013 |

Symbolic Malleable Zero-Knowledge Proofs M Backes, F Bendun, M Maffei, E Mohammadi, K Pecina Computer Security Foundations Symposium (CSF), 2015 IEEE 28th, 412-426, 2015 | 14 | 2015 |

A Computationally Sound, Symbolic Abstraction for Malleable Zero-knowledge Proofs M Backes, F Bendun, M Maffei, E Mohammadi h ttp://www. infsec. cs. uni-saarland. de/∼ mohammadi/paper/symbolic tzk. pdf, 2013 | 14* | 2013 |

Asynchronous MPC with t< n/2 Using Non-equivocation M Backes, F Bendun, A Choudhury, A Kate Cryptology ePrint Archive, Report 2013/745, 2013 | 10 | 2013 |

Brief announcement: distributed cryptography using trinc M Backes, F Bendun, A Kate Proceedings of the 2012 ACM symposium on Principles of distributed computing …, 2012 | 10 | 2012 |

Towards Composable Computational Soundness for Signatures and Zero-Knowledge Proofs M Backes, F Bendun, E Mohammadi 7th Workshop on Formal and Computational Cryptography (FCC), Cambridge, MA, 2012 | 10 | 2012 |

Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information M Simeonovski, F Bendun, MR Asghar, M Backes, N Marnau, P Druschel arXiv preprint arXiv:1506.06033, 2015 | 9 | 2015 |

PriCL: Creating a Precedent, a Framework for Reasoning about Privacy Case Law M Backes, F Bendun, J Hoffmann, N Marnau Principles of Security and Trust, 344-363, 2015 | 6 | 2015 |

Poster: Forcing the Cloud to Forget by Attesting Data Deletion M Backes, F Bendun | | |