Bogdan Warinschi

From MaRDI portal
Person:421029

Available identifiers

zbMath Open warinschi.bogdanMaRDI QIDQ421029

List of research outcomes





PublicationDate of PublicationType
Lifting standard model reductions to common setup assumptions2023-08-10Paper
Cryptographic role-based access control, reconsidered2023-07-21Paper
Generic forward-secure key agreement without signatures2022-11-02Paper
Adaptive Proofs Have Straightline Extractors (in the Random Oracle Model)2022-07-01Paper
Provable security analysis of FIDO22022-04-22Paper
Masking fuzzy-searchable public databases2020-01-30Paper
Efficient function-hiding functional encryption: from inner-products to orthogonality2020-01-28Paper
How to build time-lock encryption2018-10-10Paper
Multi-key authenticated encryption with corruptions: reductions are lossy2018-01-19Paper
A linear space algorithm for computing the hermite normal form2017-02-03Paper
Universally Composable Cryptographic Role-Based Access Control2017-01-06Paper
A Modular Treatment of Cryptographic APIs: The Symmetric-Key Case2016-11-30Paper
Provably-Secure Remote Memory Attestation for Heap Overflow Protection2016-10-21Paper
Selective Opening Security for Receivers2016-06-10Paper
On the Hardness of Proving CCA-Security of Signed ElGamal2016-04-13Paper
Adaptive Proofs of Knowledge in the Random Oracle Model2015-08-27Paper
Cryptographic Voting — A Gentle Introduction2015-05-27Paper
Homomorphic Signatures with Efficient Verification for Polynomial Functions2014-08-07Paper
Cryptographic puzzles and DoS resilience, revisited2014-08-01Paper
Explicit randomness is not necessary when modeling probabilistic encryption2013-12-13Paper
How Not to Prove Yourself: Pitfalls of the Fiat-Shamir Heuristic and Applications to Helios2013-03-19Paper
Efficient Network Coding Signatures in the Standard Model2012-07-20Paper
Secure proxy signature schemes for delegation of signing rights2012-05-23Paper
A survey of symbolic methods in computational analysis of cryptographic systems2011-06-03Paper
Adaptive Pseudo-free Groups and Applications2011-05-27Paper
Get Shorty via Group Signatures without Encryption2010-09-10Paper
The Fiat–Shamir Transform for Group and Ring Signature Schemes2010-09-10Paper
Groth–Sahai Proofs Revisited2010-05-28Paper
The TLS handshake protocol: A modular analysis2010-03-01Paper
Practical Zero-Knowledge Proofs for Circuit Evaluation2010-01-07Paper
Foundations of Non-malleable Hash and One-Way Functions2009-12-15Paper
Security Notions and Generic Constructions for Client Puzzles2009-12-15Paper
Separating Trace Mapping and Reactive Simulatability Soundness: The Case of Adaptive Corruption2009-10-22Paper
Identity Based Group Signatures from Hierarchical Identity-Based Encryption2009-08-18Paper
Certified Encryption Revisited2009-07-07Paper
Hash function requirements for Schnorr signatures2009-06-12Paper
Theory of Cryptography2009-05-14Paper
A Generalization of DDH with Applications to Protocol Analysis and Computational Soundness2009-03-10Paper
A Modular Security Analysis of the TLS Handshake Protocol2009-02-10Paper
Security analysis of cryptographically controlled access to XML documents2008-12-21Paper
Computationally Sound Symbolic Secrecy in the Presence of Hash Functions2008-04-17Paper
A Closer Look at PKI: Security and Efficiency2007-09-04Paper
Foundations of Software Science and Computation Structures2007-05-02Paper
Security in Communication Networks2006-10-10Paper
Automata, Languages and Programming2006-01-10Paper
Programming Languages and Systems2005-09-13Paper
Information and Communications Security2005-08-19Paper
https://portal.mardi4nfdi.de/entity/Q44349022003-11-26Paper

Research outcomes over time

This page was built for person: Bogdan Warinschi