Bogdan Warinschi

From MaRDI portal
(Redirected from Person:421029)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Lifting standard model reductions to common setup assumptions
Public-Key Cryptography – PKC 2022
2023-08-10Paper
Cryptographic role-based access control, reconsidered
Provable and Practical Security
2023-07-21Paper
Generic forward-secure key agreement without signatures2022-11-02Paper
Adaptive proofs have straightline extractors (in the random oracle model)2022-07-01Paper
Provable security analysis of FIDO22022-04-22Paper
Masking fuzzy-searchable public databases2020-01-30Paper
Efficient function-hiding functional encryption: from inner-products to orthogonality2020-01-28Paper
How to build time-lock encryption
Designs, Codes and Cryptography
2018-10-10Paper
Multi-key authenticated encryption with corruptions: reductions are lossy2018-01-19Paper
A linear space algorithm for computing the hermite normal form
Proceedings of the 2001 international symposium on Symbolic and algebraic computation
2017-02-03Paper
Universally composable cryptographic role-based access control
Provable Security
2017-01-06Paper
A modular treatment of cryptographic APIs: the symmetric-key case
Advances in Cryptology – CRYPTO 2016
2016-11-30Paper
Provably-secure remote memory attestation for heap overflow protection
Lecture Notes in Computer Science
2016-10-21Paper
Selective Opening Security for Receivers
Advances in Cryptology -- ASIACRYPT 2015
2016-06-10Paper
On the hardness of proving CCA-security of Signed ElGamal
Public-Key Cryptography – PKC 2016
2016-04-13Paper
Adaptive proofs of knowledge in the random oracle model
Lecture Notes in Computer Science
2015-08-27Paper
Cryptographic voting -- a gentle introduction
Foundations of Security Analysis and Design VII
2015-05-27Paper
Homomorphic signatures with efficient verification for polynomial functions
Advances in Cryptology – CRYPTO 2014
2014-08-07Paper
Cryptographic puzzles and DoS resilience, revisited
Designs, Codes and Cryptography
2014-08-01Paper
Explicit randomness is not necessary when modeling probabilistic encryption
Electronic Notes in Theoretical Computer Science
2013-12-13Paper
How not to prove yourself: pitfalls of the fiat-shamir heuristic and applications to helios
Advances in Cryptology – ASIACRYPT 2012
2013-03-19Paper
Efficient network coding signatures in the standard model
Public Key Cryptography – PKC 2012
2012-07-20Paper
Secure proxy signature schemes for delegation of signing rights
Journal of Cryptology
2012-05-23Paper
A survey of symbolic methods in computational analysis of cryptographic systems
Journal of Automated Reasoning
2011-06-03Paper
Adaptive pseudo-free groups and applications
Advances in Cryptology – EUROCRYPT 2011
2011-05-27Paper
Get shorty via group signatures without encryption
Lecture Notes in Computer Science
2010-09-10Paper
The Fiat-Shamir transform for group and ring signature schemes
Lecture Notes in Computer Science
2010-09-10Paper
Groth–Sahai Proofs Revisited
Public Key Cryptography – PKC 2010
2010-05-28Paper
The TLS handshake protocol: A modular analysis
Journal of Cryptology
2010-03-01Paper
Practical zero-knowledge proofs for circuit evaluation
Cryptography and Coding
2010-01-07Paper
Foundations of non-malleable hash and one-way functions
Advances in Cryptology – ASIACRYPT 2009
2009-12-15Paper
Security Notions and Generic Constructions for Client Puzzles
Advances in Cryptology – ASIACRYPT 2009
2009-12-15Paper
Separating Trace Mapping and Reactive Simulatability Soundness: The Case of Adaptive Corruption
Foundations and Applications of Security Analysis
2009-10-22Paper
Identity Based Group Signatures from Hierarchical Identity-Based Encryption
Pairing-Based Cryptography – Pairing 2009
2009-08-18Paper
Certified Encryption Revisited
Progress in Cryptology – AFRICACRYPT 2009
2009-07-07Paper
Hash function requirements for Schnorr signatures
Journal of Mathematical Cryptology
2009-06-12Paper
Theory of Cryptography
Lecture Notes in Computer Science
2009-05-14Paper
A Generalization of DDH with Applications to Protocol Analysis and Computational Soundness
Advances in Cryptology - CRYPTO 2007
2009-03-10Paper
A Modular Security Analysis of the TLS Handshake Protocol
Advances in Cryptology - ASIACRYPT 2008
2009-02-10Paper
Security analysis of cryptographically controlled access to XML documents
Journal of the ACM
2008-12-21Paper
Computationally Sound Symbolic Secrecy in the Presence of Hash Functions
FSTTCS 2006: Foundations of Software Technology and Theoretical Computer Science
2008-04-17Paper
A Closer Look at PKI: Security and Efficiency
Public Key Cryptography – PKC 2007
2007-09-04Paper
Foundations of Software Science and Computation Structures
Lecture Notes in Computer Science
2007-05-02Paper
Security in Communication Networks
Lecture Notes in Computer Science
2006-10-10Paper
Automata, Languages and Programming
Lecture Notes in Computer Science
2006-01-10Paper
Programming Languages and Systems
Lecture Notes in Computer Science
2005-09-13Paper
Information and Communications Security
Lecture Notes in Computer Science
2005-08-19Paper
scientific article; zbMATH DE number 2009983 (Why is no real title available?)2003-11-26Paper


Research outcomes over time


This page was built for person: Bogdan Warinschi