Skip to content

Professor Bogdan Warinschi

Professor of Computer Science

51 - 60 out of 79Page size: 10
  1. 2009
  2. Published

    Foundations of Non-Malleable Hash and One-Way Functions

    Boldyreva, A., Cash, D., Fischlin, M. & Warinschi, B., 2009, Advances in Cryptology - ASIACRYPT 2009. Springer Berlin Heidelberg, Vol. 5912. p. 524-541

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    Hash Function Requirements for Schnorr Signatures

    Neven, G., Smart, N. & Warinschi, B., 2009, In : Journal of Mathematical Cryptology. 3(1), p. 69-87

    Research output: Contribution to journalArticle

  4. Published

    Identity Based Group Signatures from Hierarchical Identity Based Encryption

    Smart, N. & Warinschi, B., 2009, Pairings 2009. Springer Berlin Heidelberg, Vol. 5671. p. 150-170

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    Practical Zero-Knowledge Proofs for Circuit Evaluation

    Ghadafi, E., Smart, N. & Warinschi, B., 2009, Coding and Cryptography - IMACC 2009. Springer Berlin Heidelberg, Vol. 5921. p. 469-494

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    Security Notions and Generic Constructions for Client Puzzles

    Chen, L., Morrissey, P., Smart, N. & Warinschi, B., 2009, Advances in Cryptology - Asiacrypt 2009. Springer Berlin Heidelberg, Vol. 5912. p. 505-523

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    Separating Trace Mapping and Reactive Simulatability Soundness: The Case of Adaptive Corruption

    Mazaré, L. & Warinschi, B., 2009, ARSPA-WITS. Springer Berlin Heidelberg, Vol. 5511. p. 193-210 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. 2008
  9. Published

    A Modular Security Analysis of the TLS Handshake Protocol

    Morrissey, P., Smart, N. & Warinschi, B., 2008, Advances in Cryptology - Asiacrypt 2008. Springer Berlin Heidelberg, Vol. 5350. p. 55-73

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    Security Analysis of Cryptographically Controlled Access to XML Documents

    Abadi, M. & Warinschi, B., 2008, In : Journal of the ACM. 55, 2, p. 108-117 10 p.

    Research output: Contribution to journalArticle

  11. 2007
  12. Published

    A Closer Look at PKI: Security and Efficiency

    Boldyreva, A., Fischlin, M., Palacio, A. & Warinschi, B., 2007, Public Key Cryptography - PKC 2007. Springer Berlin Heidelberg, Vol. 4450. p. 458-475

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    A Cryptographic Model for Branching Time Security Properties - The Case of Contract Signing Protocols

    Cortier, V., Kuesters, R. & Warinschi, B., 2007, European Symposium On Research In Computer Security - ESORICS 2007. Springer Berlin Heidelberg, Vol. 4734. p. 422-437

    Research output: Chapter in Book/Report/Conference proceedingConference contribution