Skip to content

Professor Bogdan Warinschi

Professor of Computer Science

11 - 20 out of 79Page size: 10
  1. 2016
  2. Published

    Adaptive proofs of knowledge in the random oracle model

    Bernhard, D., Fischlin, M. & Warinschi, B., Nov 2016, In : IET Information Security. 10, 6, p. 319-331 13 p.

    Research output: Contribution to journalArticle

  3. Published

    Provably-Secure Remote Memory Attestation for Heap Overflow Protection

    Boldyreva, A., Kim, T., Lipton, R. & Warinschi, B., 30 Aug 2016, Security and Cryptography for Networks: 10th International Conference, SCN 2016, Amalfi, Italy, August 31 – September 2, 2016, Proceedings. Zikas, V. & De Prisco, R. (eds.). Springer, (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    Key Confirmation in Key Exchange Protocols: Formal Definitions and Implications for TLS 1.3

    Fischlin, M., Günther, F., Schmidt, B. & Warinschi, B., Aug 2016, 2016 IEEE Symposium on Security and Privacy (S&P 2016): Proceedings of a meeting held 22-26 May 2016, San Jose, California, USA. Institute of Electrical and Electronics Engineers (IEEE), p. 452-469 18 p. (2016 IEEE Symposium on Security and Privacy (SP)).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    Secure Software Licensing: Models, Constructions, and Proofs

    Costea, S. & Warinschi, B., Aug 2016, 2016 IEEE 29th Computer Security Foundations Symposium (CSF 2016): Proceedings of a meeting held 27 June - 1 July 2016, Lisbon, Portugal. Institute of Electrical and Electronics Engineers (IEEE), p. 31-44 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    A Modular Treatment of Cryptographic APIs: The Symmetric-Key Case

    Shrimpton, T., Stam, M. & Warinschi, B., 21 Jul 2016, Advances in Cryptology - CRYPTO 2016: 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part I. Springer, p. 277-307 31 p. (Lecture Notes in Computer Science (LNCS); vol. 9814).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    Foundations of Hardware-Based Attested Computation and Application to SGX

    Barbosa, M., Portela, B., Scerri, G. & Warinschi, B., Jun 2016, 2016 IEEE European Symposium on Security and Privacy (EuroS&P 2016): Proceedings of a meeting held 21-24 March 2016, Saarbrucken, Germany. Institute of Electrical and Electronics Engineers (IEEE), p. 245-260 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    On the Hardness of Proving CCA-Security of Signed ElGamal

    Bernhard, D., Fischlin, M. & Warinschi, B., 18 Feb 2016, Public-Key Cryptography – PKC 2016: 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part I. Cheng, C-M., Chung, K-M., Persiano, G. & Yang, B-Y. (eds.). Springer, p. 47-69 23 p. (Lecture Notes in Computer Science; vol. 9614).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. 2015
  10. Published

    Adaptive Proofs of Knowledge in the Random Oracle Model

    Bernhard, D., Fischlin, M. & Warinschi, B., 2015, Public-Key Cryptography - PKC 2015: 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 -- April 1, 2015, Proceedings. Katz, J. (ed.). Springer, p. 629-649 21 p. (Lecture Notes in Computer Science; vol. 9020).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    Policy Privacy in Cryptographic Access Control

    Ferrara, A. L., Fuchsbauer, G., Liu, B. & Warinschi, B., 2015, IEEE 28th Computer Security Foundations Symposium - CSF 2015. Institute of Electrical and Electronics Engineers (IEEE), p. 46-60 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    Selective Opening Security for Receivers

    Hazay, C., Patra, A. & Warinschi, B., 2015, Advances in Cryptology - ASIACRYPT 2015. Springer, Vol. 9452. p. 443-469 27 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution