Gergei Bana

According to our database1, Gergei Bana authored at least 20 papers between 2005 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Time, Privacy, Robustness, Accuracy: Trade Offs for the Open Vote Network Protocol.
IACR Cryptol. ePrint Arch., 2021

Convergence Voting: From Pairwise Comparisons to Consensus.
CoRR, 2021

2020
Verification Methods for the Computationally Complete Symbolic Attacker Based on Indistinguishability.
ACM Trans. Comput. Log., 2020

A Semantics for "Typically" in First-Order Default Reasoning.
Proceedings of the New Frontiers in Artificial Intelligence, 2020

2018
Formal Analysis of Vote Privacy using Computationally Complete Symbolic Attacker.
IACR Cryptol. ePrint Arch., 2018

2016
Verification Methods for the Computationally Complete Symbolic Attacker Based on Indistinguishability.
IACR Cryptol. ePrint Arch., 2016

Semantics for "Enough-Certainty" and Fitting's Embedding of Classical Logic in S4.
Proceedings of the 25th EACSL Annual Conference on Computer Science Logic, 2016

2014
A Computationally Complete Symbolic Attacker for Equivalence Properties.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Computationally complete symbolic attacker and key exchange.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Towards Unconditional Soundness: Computationally Complete Symbolic Attacker.
IACR Cryptol. ePrint Arch., 2012

Computationally Sound Verification of the NSL Protocol via Computationally Complete Symbolic Attacker.
IACR Cryptol. ePrint Arch., 2012

Computationally Complete Symbolic Attacker in Action.
Proceedings of the IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science, 2012

2010
Secrecy-Oriented First-Order Logical Analysis of Cryptographic Protocols.
IACR Cryptol. ePrint Arch., 2010

2009
Soundness and completeness of formal encryption: The cases of key cycles and partial information leakage.
J. Comput. Secur., 2009

Computational Semantics for First-Order Logical Analysis of Cryptographic Protocols.
Proceedings of the Formal to Practical Security, 2009

2007
Computational Semantics for Basic Protocol Logic - A Stochastic Approach.
IACR Cryptol. ePrint Arch., 2007

2006
Computational Soundness of Formal Indistinguishability and Static Equivalence.
IACR Cryptol. ePrint Arch., 2006

2005
Soundness and Completeness of Formal Logics of Symmetric Encryption.
IACR Cryptol. ePrint Arch., 2005

Soundness of Formal Encryption in the Presence of Key-Cycles.
Proceedings of the Computer Security, 2005

Computational and Information-Theoretic Soundness and Completeness of Formal Encryption.
Proceedings of the 18th IEEE Computer Security Foundations Workshop, 2005


  Loading...