Bogdan Warinschi

From MaRDI portal
Person:421029

Available identifiers

zbMath Open warinschi.bogdanMaRDI QIDQ421029

List of research outcomes

PublicationDate of PublicationType
Lifting standard model reductions to common setup assumptions2023-08-10Paper
Cryptographic role-based access control, reconsidered2023-07-21Paper
Generic forward-secure key agreement without signatures2022-11-02Paper
Adaptive Proofs Have Straightline Extractors (in the Random Oracle Model)2022-07-01Paper
Provable security analysis of FIDO22022-04-22Paper
Masking fuzzy-searchable public databases2020-01-30Paper
Efficient function-hiding functional encryption: from inner-products to orthogonality2020-01-28Paper
How to build time-lock encryption2018-10-10Paper
Multi-key authenticated encryption with corruptions: reductions are lossy2018-01-19Paper
A linear space algorithm for computing the hermite normal form2017-02-03Paper
Universally Composable Cryptographic Role-Based Access Control2017-01-06Paper
A Modular Treatment of Cryptographic APIs: The Symmetric-Key Case2016-11-30Paper
Provably-Secure Remote Memory Attestation for Heap Overflow Protection2016-10-21Paper
Selective Opening Security for Receivers2016-06-10Paper
On the Hardness of Proving CCA-Security of Signed ElGamal2016-04-13Paper
Adaptive Proofs of Knowledge in the Random Oracle Model2015-08-27Paper
Cryptographic Voting — A Gentle Introduction2015-05-27Paper
Homomorphic Signatures with Efficient Verification for Polynomial Functions2014-08-07Paper
Cryptographic puzzles and DoS resilience, revisited2014-08-01Paper
Explicit Randomness is not Necessary when Modeling Probabilistic Encryption2013-12-13Paper
How Not to Prove Yourself: Pitfalls of the Fiat-Shamir Heuristic and Applications to Helios2013-03-19Paper
Efficient Network Coding Signatures in the Standard Model2012-07-20Paper
Secure proxy signature schemes for delegation of signing rights2012-05-23Paper
A survey of symbolic methods in computational analysis of cryptographic systems2011-06-03Paper
Adaptive Pseudo-free Groups and Applications2011-05-27Paper
The Fiat–Shamir Transform for Group and Ring Signature Schemes2010-09-10Paper
Get Shorty via Group Signatures without Encryption2010-09-10Paper
Groth–Sahai Proofs Revisited2010-05-28Paper
The TLS handshake protocol: A modular analysis2010-03-01Paper
Practical Zero-Knowledge Proofs for Circuit Evaluation2010-01-07Paper
Security Notions and Generic Constructions for Client Puzzles2009-12-15Paper
Foundations of Non-malleable Hash and One-Way Functions2009-12-15Paper
Separating Trace Mapping and Reactive Simulatability Soundness: The Case of Adaptive Corruption2009-10-22Paper
Identity Based Group Signatures from Hierarchical Identity-Based Encryption2009-08-18Paper
Certified Encryption Revisited2009-07-07Paper
Hash function requirements for Schnorr signatures2009-06-12Paper
Theory of Cryptography2009-05-14Paper
A Generalization of DDH with Applications to Protocol Analysis and Computational Soundness2009-03-10Paper
A Modular Security Analysis of the TLS Handshake Protocol2009-02-10Paper
Security analysis of cryptographically controlled access to XML documents2008-12-21Paper
Computationally Sound Symbolic Secrecy in the Presence of Hash Functions2008-04-17Paper
A Closer Look at PKI: Security and Efficiency2007-09-04Paper
Foundations of Software Science and Computation Structures2007-05-02Paper
Security in Communication Networks2006-10-10Paper
Automata, Languages and Programming2006-01-10Paper
Programming Languages and Systems2005-09-13Paper
Information and Communications Security2005-08-19Paper
https://portal.mardi4nfdi.de/entity/Q44349022003-11-26Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Bogdan Warinschi