Skip to content

Professor Bogdan Warinschi

Professor of Computer Science

61 - 70 out of 79Page size: 10
  1. 2007
  2. Published

    A Generalization of DDH with Applications to Protocol Analysis and Computational Soundness

    Bresson, E., Lakhnech, Y., Mazare, L. & Warinschi, B., 2007, Advances in Cryptology - CRYPTO 2007. Springer Berlin Heidelberg, Vol. 4622. p. 482-499

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    Explicit Randomness is not Necessary when Modeling Probabilistic Encryption

    Cortier, V., Hordegen, H. & Warinschi, B., 2007, In : Electr. Notes Theor. Comput. Sci. 186, p. 49-65

    Research output: Contribution to journalArticle

  4. Published

    Synthesizing Secure Protocols

    Cortier, V., Warinschi, B. & Zalinescu, E., 2007, European Symposium On Research In Computer Security - ESORICS 2007. Springer Berlin Heidelberg, Vol. 4734. p. 406-421

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. 2006
  6. Published

    Computationally Sound Compositional Logic for Key Exchange Protocols

    Datta, A., Derek, A., Mitchell, J. & Warinschi, B., 2006, Computer Security Foundations Workshop - CSFW 2006. IEEE Computer Society, Vol. -. p. 321-334

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    Computationally Sound Symbolic Secrecy in the Presence of Hash Functions

    Cortier, V., Kremer, S., Kuesters, R. & Warinschi, B., 2006, Foundations of Software Technology and Theoretical Computer Science - FSTTCS 2006. Springer Berlin Heidelberg, Vol. 4337. p. 176-187

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Explicit Randomness is not Necessary when Modeling Probabilistic Encryption

    Cortier, V., Hoerdegen, H. & Warinschi, B., 2006, Workshop on Information and Computer Security -- ICS 2006.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    Guessing Attacks and the Computational Soundness of Static Equivalence

    Abadi, M., Baudet, M. & Warinschi, B., 2006, Foundations of Software Science and Computational Structures - FOSSACS 2006. Springer Berlin Heidelberg, Vol. 3921. p. 398-412

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. 2005
  11. Published

    A Computational Analysis of the Needham Schroder Lowe Protocol

    Warinschi, B., 2005, In : Journal of Computer Security. 3(13), p. 565-591

    Research output: Contribution to journalArticle

  12. Published

    Computationally Sound, Automated Proofs for Security Protocols

    Cortier, V. & Warinschi, B., 2005, European Symposium on Programming - ESOP 2005. Springer Berlin Heidelberg, Vol. 3444. p. 157-171 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    Password-based Encryption Analyzed

    Abadi, M. & Warinschi, B., 2005, Internation Colloqium on Automata, Languages and Programming - ICALP 2005. Springer Berlin Heidelberg, Vol. 3580. p. 664-676

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

Previous 1...3 4 5 6 7 8 Next