Bogdan Warinschi
Orcid: 0000-0003-3396-8870
According to our database1,
Bogdan Warinschi
authored at least 95 papers
between 2000 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Proc. Priv. Enhancing Technol., January, 2024
Proc. Priv. Enhancing Technol., 2024
Falsifiability, Composability, and Comparability of Game-based Security Models for Key Exchange Protocols.
IACR Cryptol. ePrint Arch., 2024
2023
Proceedings of the 2023 USENIX Annual Technical Conference, 2023
2022
IACR Cryptol. ePrint Arch., 2022
2021
IACR Cryptol. ePrint Arch., 2021
2020
IACR Cryptol. ePrint Arch., 2020
2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
Efficient Function-Hiding Functional Encryption: From Inner-Products to Orthogonality.
Proceedings of the Topics in Cryptology - CT-RSA 2019, 2019
2018
Safe cryptography for all: towards visual metaphor driven cryptography building blocks.
Proceedings of the 1st International Workshop on Security Awareness from Design to Deployment, 2018
Machine-Checked Proofs for Electronic Voting: Privacy and Verifiability for Belenios.
Proceedings of the 31st IEEE Computer Security Foundations Symposium, 2018
2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017
Proceedings of the 30th IEEE Computer Security Foundations Symposium, 2017
Proceedings of the Applied Cryptography and Network Security, 2017
2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
How not to Prove Yourself: Pitfalls of the Fiat-Shamir Heuristic and Applications to Helios.
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
Proceedings of the IEEE Symposium on Security and Privacy, 2016
Proceedings of the Security and Cryptography for Networks - 10th International Conference, 2016
Proceedings of the IEEE 29th Computer Security Foundations Symposium, 2016
2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015
Proceedings of the IEEE 28th Computer Security Foundations Symposium, 2015
2014
IACR Cryptol. ePrint Arch., 2014
2013
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
2012
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the Information Security - 15th International Conference, 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
2011
J. Autom. Reason., 2011
IACR Cryptol. ePrint Arch., 2011
IACR Cryptol. ePrint Arch., 2011
Proceedings of the Trustworthy Global Computing - 6th International Symposium, 2011
Proceedings of the 24th IEEE Computer Security Foundations Symposium, 2011
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
Proceedings of the Formal Models and Techniques for Analyzing Security Protocols, 2011
2010
J. Comput. Secur., 2010
IACR Cryptol. ePrint Arch., 2010
Proceedings of the Security and Cryptography for Networks, 7th International Conference, 2010
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010
Proceedings of the 23rd IEEE Computer Security Foundations Symposium, 2010
2009
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
Proceedings of the Provable Security, Third International Conference, 2009
Proceedings of the Cryptography and Coding, 2009
Separating Trace Mapping and Reactive Simulatability Soundness: The Case of Adaptive Corruption.
Proceedings of the Foundations and Applications of Security Analysis, 2009
2008
J. ACM, 2008
IACR Cryptol. ePrint Arch., 2008
2007
A Cryptographic Model for Branching Time Security Properties - the Case of Contract Signing Protocols.
IACR Cryptol. ePrint Arch., 2007
Proceedings of the Public Key Cryptography, 2007
A Generalization of DDH with Applications to Protocol Analysis and Computational Soundness.
Proceedings of the Advances in Cryptology, 2007
2006
IACR Cryptol. ePrint Arch., 2006
IACR Cryptol. ePrint Arch., 2006
Proceedings of the First Workshop in Information and Computer Security, 2006
Proceedings of the 19th IEEE Computer Security Foundations Workshop, 2006
2005
J. Comput. Secur., 2005
Proceedings of the Automata, Languages and Programming, 32nd International Colloquium, 2005
Proceedings of the Programming Languages and Systems, 2005
2004
J. Comput. Secur., 2004
Proceedings of the Theory of Cryptography, First Theory of Cryptography Conference, 2004
Proceedings of the Security in Communication Networks, 4th International Conference, 2004
Proceedings of the Information and Communications Security, 6th International Conference, 2004
2003
Foundations of Group Signatures: Formal Definitions, Simplified Requirements, and a Construction Based on General Assumptions.
Proceedings of the Advances in Cryptology, 2003
2001
Proceedings of the 2001 International Symposium on Symbolic and Algebraic Computation, 2001
2000
Electron. Colloquium Comput. Complex., 2000