1. Abadi, M., Rogaway, P.: Reconciling two views of cryptography (the computational soundness of formal encryption). Journal of Cryptology 15(2), 103–127 (2002)
2. Backes, M., Laud, P.: A mechanized, cryptographically sound type inference checker. In: Workshop on Formal and Computational Cryptography (FCC 2006) (July 2006) (to appear)
3. Backes, M., Pfitzmann, B.: Symmetric encryption in a simulatable Dolev-Yao style cryptographic library. In: CSFW 2004, June 2004. IEEE, Los Alamitos (2004)
4. Backes, M., Pfitzmann, B.: Relating symbolic and cryptographic secrecy. In: 26th IEEE Symposium on Security and Privacy, May 2005, pp. 171–182. IEEE, Los Alamitos (2005)
5. Backes, M., Pfitzmann, B., Waidner, M.: A composable cryptographic library with nested operations. In: CCS 2003, October 2003, pp. 220–230. ACM Press, New York (2003)