The following publications are possibly variants of this publication:
- Symmetric Encryption in a Simulatable Dolev-Yao Style Cryptographic LibraryMichael Backes, Birgit Pfitzmann. iacr, 2004:59, 2004. [doi]
- Symmetric authentication in a simulatable Dolev-Yao-style cryptographic libraryMichael Backes, Birgit Pfitzmann, Michael Waidner. ijisec, 4(3):135-154, 2005. [doi]
- Limits of the Cryptographic Realization of Dolev-Yao-Style XORMichael Backes, Birgit Pfitzmann. esorics 2005: 178-196 [doi]
- Limits of the Cryptographic Realization of Dolev-Yao-style XORMichael Backes, Birgit Pfitzmann. iacr, 2005:220, 2005. [doi]
- A Cryptographically Sound Dolev-Yao Style Security Proof of the Otway-Rees ProtocolMichael Backes. esorics 2004: 89-108 [doi]
- A Cryptographically Sound Dolev-Yao Style Security Proof of an Electronic Payment SystemMichael Backes, Markus Dürmuth. csfw 2005: 78-93 [doi]
- Symmetric Authentication within a Simulatable Cryptographic LibraryMichael Backes, Birgit Pfitzmann, Michael Waidner. esorics 2003: 271-290 [doi]
- Symmetric Authentication Within a Simulatable Cryptographic LibraryMichael Backes, Birgit Pfitzmann, Michael Waidner. iacr, 2003:145, 2003. [doi]
- Key-dependent message security under active attacks - BRSIM/UC-soundness of Dolev-Yao-style encryption with key cyclesMichael Backes, Birgit Pfitzmann, Andre Scedrov. jcs, 16(5):497-530, 2008. [doi]
- Limits of the Reactive Simulatability/UC of Dolev-Yao Models with HashesMichael Backes, Birgit Pfitzmann, Michael Waidner. iacr, 2006:68, 2006. [doi]