|
Search the dblp DataBase
Bogdan Warinschi:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Bogdan Warinschi
A Computational Analysis of the Needham-Schröeder-(Lowe) Protocol. [Citation Graph (0, 0)][DBLP] CSFW, 2003, pp:248-0 [Conf]
- Anupam Datta, Ante Derek, John C. Mitchell, Bogdan Warinschi
Computationally Sound Compositional Logic for Key Exchange Protocols. [Citation Graph (0, 0)][DBLP] CSFW, 2006, pp:321-334 [Conf]
- Véronique Cortier, Bogdan Warinschi
Computationally Sound, Automated Proofs for Security Protocols. [Citation Graph (0, 0)][DBLP] ESOP, 2005, pp:157-171 [Conf]
- Mihir Bellare, Daniele Micciancio, Bogdan Warinschi
Foundations of Group Signatures: Formal Definitions, Simplified Requirements, and a Construction Based on General Assumptions. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 2003, pp:614-629 [Conf]
- Martín Abadi, Mathieu Baudet, Bogdan Warinschi
Guessing Attacks and the Computational Soundness of Static Equivalence. [Citation Graph (0, 0)][DBLP] FoSSaCS, 2006, pp:398-412 [Conf]
- Véronique Cortier, Steve Kremer, Ralf Küsters, Bogdan Warinschi
Computationally Sound Symbolic Secrecy in the Presence of Hash Functions. [Citation Graph (0, 0)][DBLP] FSTTCS, 2006, pp:176-187 [Conf]
- Martín Abadi, Bogdan Warinschi
Password-Based Encryption Analyzed. [Citation Graph (0, 0)][DBLP] ICALP, 2005, pp:664-676 [Conf]
- Michel Abdalla, Bogdan Warinschi
On the Minimal Assumptions of Group Signature Schemes. [Citation Graph (0, 0)][DBLP] ICICS, 2004, pp:1-13 [Conf]
- Daniele Micciancio, Bogdan Warinschi
A linear space algorithm for computing the herite normal form. [Citation Graph (0, 0)][DBLP] ISSAC, 2001, pp:231-236 [Conf]
- Martín Abadi, Bogdan Warinschi
Security analysis of cryptographically controlled access to XML documents. [Citation Graph (0, 0)][DBLP] PODS, 2005, pp:108-117 [Conf]
- Jan Camenisch, Maciej Koprowski, Bogdan Warinschi
Efficient Blind Signatures Without Random Oracles. [Citation Graph (0, 0)][DBLP] SCN, 2004, pp:134-148 [Conf]
- Daniele Micciancio, Bogdan Warinschi
Soundness of Formal Encryption in the Presence of Active Adversaries. [Citation Graph (0, 0)][DBLP] TCC, 2004, pp:133-151 [Conf]
- Daniele Micciancio, Bogdan Warinschi
A Linear Space Algorithm for Computing the Hermite Normal Form [Citation Graph (0, 0)][DBLP] Electronic Colloquium on Computational Complexity (ECCC), 2000, v:7, n:74, pp:- [Journal]
- Daniele Micciancio, Bogdan Warinschi
Completeness Theorems for the Abadi-Rogaway Language of Encrypted Expressions. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 2004, v:12, n:1, pp:99-130 [Journal]
- Bogdan Warinschi
A computational analysis of the Needham-Schroeder-(Lowe) protocol. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 2005, v:13, n:3, pp:565-591 [Journal]
- Emmanuel Bresson, Yassine Lakhnech, Laurent Mazaré, Bogdan Warinschi
A Generalization of DDH with Applications to Protocol Analysis and Computational Soundness. [Citation Graph (0, 0)][DBLP] CRYPTO, 2007, pp:482-499 [Conf]
- Véronique Cortier, Ralf Küsters, Bogdan Warinschi
A Cryptographic Model for Branching Time Security Properties - The Case of Contract Signing Protocols. [Citation Graph (0, 0)][DBLP] ESORICS, 2007, pp:422-437 [Conf]
- Véronique Cortier, Bogdan Warinschi, Eugen Zalinescu
Synthesizing Secure Protocols. [Citation Graph (0, 0)][DBLP] ESORICS, 2007, pp:406-421 [Conf]
- Alexandra Boldyreva, Marc Fischlin, Adriana Palacio, Bogdan Warinschi
A Closer Look at PKI: Security and Efficiency. [Citation Graph (0, 0)][DBLP] Public Key Cryptography, 2007, pp:458-475 [Conf]
- Véronique Cortier, Heinrich Hördegen, Bogdan Warinschi
Explicit Randomness is not Necessary when Modeling Probabilistic Encryption [Citation Graph (0, 0)][DBLP] CoRR, 2006, v:0, n:, pp:- [Journal]
- Véronique Cortier, Heinrich Hördegen, Bogdan Warinschi
Explicit Randomness is not Necessary when Modeling Probabilistic Encryption. [Citation Graph (0, 0)][DBLP] Electr. Notes Theor. Comput. Sci., 2007, v:186, n:, pp:49-65 [Journal]
A Modular Security Analysis of the TLS Handshake Protocol. [Citation Graph (, )][DBLP]
Foundations of Non-malleable Hash and One-Way Functions. [Citation Graph (, )][DBLP]
Security Notions and Generic Constructions for Client Puzzles. [Citation Graph (, )][DBLP]
Robustness Guarantees for Anonymity. [Citation Graph (, )][DBLP]
Separating Trace Mapping and Reactive Simulatability Soundness: The Case of Adaptive Corruption. [Citation Graph (, )][DBLP]
Practical Zero-Knowledge Proofs for Circuit Evaluation. [Citation Graph (, )][DBLP]
Groth-Sahai Proofs Revisited. [Citation Graph (, )][DBLP]
The Fiat-Shamir Transform for Group and Ring Signature Schemes. [Citation Graph (, )][DBLP]
Get Shorty via Group Signatures without Encryption. [Citation Graph (, )][DBLP]
Identity Based Group Signatures from Hierarchical Identity-Based Encryption. [Citation Graph (, )][DBLP]
Symbolic Methods for Provable Security. [Citation Graph (, )][DBLP]
Certified Encryption Revisited. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.306secs
|