Paul Baecher
I am a software engineer at GetYourGuide.
My academic background is in theoretical cryptography where I was part of Prof. Dr. Marc Fischlin's research group Cryptography and Complexity Theory at TU Darmstadt from March 2010 to February 2015.
During that I completed a Ph.D. in computer science in October 2014.
Email: pbaecher/gmail.com
PGP: 0xAB2EFE17
Writing
Software
Some of my software is available in GitHub repositories, including the mkbooklet utility to prepare PDF files for booklet printing.
Academic publications and presentations
Also available on DBLP or Google Scholar.
Cryptography
- Cryptographic Reductions: Classification and Applications to Ideal Models
Paul Baecher
tuprints 4000, October 2014 (full PhD thesis, defense presentation slides).
- Simon's Circuit – A Note on Cleverly-Chosen Circuits
Paul Baecher
ePrint 2014/476, May 2014 (full article).
- Notions of Black-Box Reductions, Revisited
Paul Baecher, Christina Brzuska, Marc Fischlin
ASIACRYPT 2013 Part I: pages 296–315 (full article, presentation slides).
- Reset Indifferentiability and its Consequences
Paul Baecher, Christina Brzuska, Arno Mittelbach
ASIACRYPT 2013 Part I: pages 154–173 (full article, presentation slides).
- Ideal-Cipher (Ir)reducibility for Blockcipher-Based Hash Functions
Paul Baecher, Pooya Farshim, Marc Fischlin, Martijn Stam
EUROCRYPT 2013: pages 426–443 (full article, presentation slides).
- Random Oracle Reducibility
Paul Baecher, Marc Fischlin
CRYPTO 2011: pages 21–38 (full article, presentation slides).
- Expedient Non-Malleability Notions for Hash Functions
Paul Baecher, Marc Fischlin, Dominique Schröder
CT-RSA 2011: pages 268–283 (full article, presentation slides).
Security
- Breaking reCAPTCHA: A Holistic Approach via Shape Recognition
Paul Baecher, Niklas Büscher, Marc Fischlin, Benjamin Milde
IFIP SEC 2011: pages 56–67 (full article, presentation slides).
- CAPTCHAs: The Good, the Bad, and the Ugly
Paul Baecher, Marc Fischlin, Lior Gordon, Robert Langenberg, Michael Luetzow, Dominique Schröder
LNI 2010: pages 353–365 (full article, presentation slides).
- PUF-Based Authentication Protocols - Revisited
Heike Busch, Stefan Katzenbeisser, Paul Baecher
WISA 2009: pages 296–308.
- The Nepenthes Platform: An Efficient Approach to Collect Malware
Paul Baecher, Markus Koetter, Thorsten Holz, Maximillian Dornseif, Felix C. Freiling
RAID 2006: pages 165–184 (full article).
Other
- Massively-Parallel Simulation of Biochemical Systems
Jens Ackermann, Paul Baecher, Thorsten Franzel, Michael Goesele, Kay Hamacher
LNI 2009: pages 739–750 (full article).
Last update: 2023-12-25