Bogdan Warinschi, Ph.D.
Affiliations: | 2004 | University of California, San Diego, La Jolla, CA |
Area:
Computer ScienceGoogle:
"Bogdan Warinschi"Parents
Sign in to add mentorDaniele Micciancio | grad student | 2004 | UCSD | |
(On the computational soundness of formal analysis of cryptographic protocols.) |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Guilhem CDdS, Fischlin M, Warinschi B. (2020) Authentication in Key-Exchange: Definitions, Relations and Composition Cell Structure and Function. 288-303 |
Cortier V, Lallemand J, Warinschi B. (2020) Fifty Shades of Ballot Privacy: Privacy against a Malicious Board Cell Structure and Function. 17-32 |
Liu J, Jager T, Kakvi SA, et al. (2018) How to build time-lock encryption Designs, Codes and Cryptography. 86: 2549-2586 |
Fischlin M, Günther F, Schmidt B, et al. (2016) 2016 IEEE Symposium on Security and Privacy (S&P 2016) The Institute of Electrical and Electronics Engineers |
Bernhard D, Fischlin M, Warinschi B. (2016) On the hardness of proving CCA-security of signed ElGamal Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9614: 47-69 |
Bernhard D, Cortier V, Galindo D, et al. (2015) SoK: A comprehensive analysis of game-based ballot privacy definitions Proceedings - Ieee Symposium On Security and Privacy. 2015: 499-516 |
Bernhard D, Fischlin M, Warinschi B. (2015) Adaptive proofs of knowledge in the random oracle model Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9020: 629-649 |
Hazay C, Patra A, Warinschi B. (2015) Selective opening security for receivers Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9452: 443-469 |
Groza B, Warinschi B. (2014) Cryptographic puzzles and DoS resilience, revisited Designs, Codes, and Cryptography. 73: 177-207 |
Lee MF, Smart NP, Warinschi B, et al. (2014) Anonymity guarantees of the UMTS/LTE authentication and connection protocol International Journal of Information Security. 13: 513-527 |