Bogdan Warinschi, Ph.D.

Affiliations: 
2004 University of California, San Diego, La Jolla, CA 
Area:
Computer Science
Google:
"Bogdan Warinschi"

Parents

Sign in to add mentor
Daniele Micciancio grad student 2004 UCSD
 (On the computational soundness of formal analysis of cryptographic protocols.)
BETA: Related publications

Publications

You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect.

Guilhem CDdS, Fischlin M, Warinschi B. (2020) Authentication in Key-Exchange: Definitions, Relations and Composition Cell Structure and Function. 288-303
Cortier V, Lallemand J, Warinschi B. (2020) Fifty Shades of Ballot Privacy: Privacy against a Malicious Board Cell Structure and Function. 17-32
Liu J, Jager T, Kakvi SA, et al. (2018) How to build time-lock encryption Designs, Codes and Cryptography. 86: 2549-2586
Fischlin M, Günther F, Schmidt B, et al. (2016) 2016 IEEE Symposium on Security and Privacy (S&P 2016) The Institute of Electrical and Electronics Engineers
Bernhard D, Fischlin M, Warinschi B. (2016) On the hardness of proving CCA-security of signed ElGamal Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9614: 47-69
Bernhard D, Cortier V, Galindo D, et al. (2015) SoK: A comprehensive analysis of game-based ballot privacy definitions Proceedings - Ieee Symposium On Security and Privacy. 2015: 499-516
Bernhard D, Fischlin M, Warinschi B. (2015) Adaptive proofs of knowledge in the random oracle model Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9020: 629-649
Hazay C, Patra A, Warinschi B. (2015) Selective opening security for receivers Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9452: 443-469
Groza B, Warinschi B. (2014) Cryptographic puzzles and DoS resilience, revisited Designs, Codes, and Cryptography. 73: 177-207
Lee MF, Smart NP, Warinschi B, et al. (2014) Anonymity guarantees of the UMTS/LTE authentication and connection protocol International Journal of Information Security. 13: 513-527
See more...