Skip to content

Professor Bogdan Warinschi

Professor of Computer Science

31 - 40 out of 79Page size: 10
  1. 2012
  2. Published

    Efficient Network Coding Signatures in the Standard Model

    Catalano, D., Fiore, D. & Warinschi, B., 2012, Public Key Cryptography - PKC 2012. Springer Berlin Heidelberg, Vol. 7293. p. 680-696 17 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    How Not to Prove Yourself: Pitfalls of Fiat-Shamir and Applications to Helios

    Bernhard, D., Warinschi, B. & Pereira, O., 2012, Advances in Cryptology - ASIACRYPT 2012. Springer Verlag, Vol. 7658. p. 626-643 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    Measuring Vote Privacy, Revisited

    Bernhard, D., Warinschi, B., Cortier, V. & Pereira, O., 2012, Proceedings of the 2012 ACM conference on Computer and communications security. ACM: ACM Press / Sheridan, p. 941--952 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    Revisiting Difficulty Notions for Client Puzzles and DoS Resilience

    Groza, B. & Warinschi, B., 2012, Information Security Conference - ISC 2012. Springer Berlin Heidelberg, Vol. 7483. p. 39-54 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. 2011
  7. Published

    A Composable Computational Soundness Notion

    Cortier, V. & Warinschi, B., 2011, Conference on Computer and Communications Security - CCS 2011. Association for Computing Machinery (ACM), Vol. -. p. 63-74 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    A Survey of Symbolic Methods in Computational Analysis of Cryptographic Systems

    Cortier, V., Kremer, S. & Warinschi, B., 2011, In : Journal of Automated Reasoning. 46, 3-4, p. 225-259

    Research output: Contribution to journalArticle

  9. Published

    Adapting Helios for Provable Ballot Privacy

    Bernhard, D., Cortier, V., Pereira, O., Smyth, B. & Warinschi, B., 2011, European Symposium on Research in Computer Security - ESORICS 2011. Springer Berlin Heidelberg, Vol. 6879. p. 335-354 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    Adaptive Pseudo-free Groups And Applications

    Catalano, D., Fiore, D. & Warinschi, B., 2011, Advances in Cryptology - EUROCRYPT 2011. Paterson, K. (ed.). Springer Berlin Heidelberg, Vol. 6632. p. 207-223

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    Composability of Bellare-Rogaway Key Exchange Protocols

    Brzuska, C., Fischlin, M., Warinschi, B. & Williams, S. C., 2011, Conference on Computer and Communications Security - CCS 2011. Association for Computing Machinery (ACM), Vol. -. p. 51-62 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    Computationally Sound Analysis of Encrypting with Diffie Hellman Keys

    Cortier, V., Kremer, S., Bresson, E., Lacknech, Y., Mazare, L. & Warinschi, B., 2011, Formal Models and Techniques for Analyzing Security Protocols. IOS Press, p. 277-303

    Research output: Chapter in Book/Report/Conference proceedingChapter in a book