default search action
BibTeX records: Bogdan Warinschi
@article{DBLP:journals/popets/GuiPPW24, author = {Zichen Gui and Kenneth G. Paterson and Sikhar Patranabis and Bogdan Warinschi}, title = {SWiSSSE: System-Wide Security for Searchable Symmetric Encryption}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2024}, number = {1}, pages = {549--581}, year = {2024}, url = {https://doi.org/10.56553/popets-2024-0032}, doi = {10.56553/POPETS-2024-0032}, timestamp = {Wed, 29 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/popets/GuiPPW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/BoldyrevaGW24, author = {Alexandra Boldyreva and Zichen Gui and Bogdan Warinschi}, title = {Understanding Leakage in Searchable Encryption: a Quantitative Approach}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2024}, number = {4}, pages = {503--524}, year = {2024}, url = {https://doi.org/10.56553/popets-2024-0127}, doi = {10.56553/POPETS-2024-0127}, timestamp = {Thu, 18 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/BoldyrevaGW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrzuskaCJSW24, author = {Chris Brzuska and Cas Cremers and H{\aa}kon Jacobsen and Douglas Stebila and Bogdan Warinschi}, title = {Falsifiability, Composability, and Comparability of Game-based Security Models for Key Exchange Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1215}, year = {2024}, url = {https://eprint.iacr.org/2024/1215}, timestamp = {Sun, 01 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrzuskaCJSW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/usenix/ArutyunyanBBDDE23, author = {Maksym Arutyunyan and Andriy Berestovskyy and Adam Bratschi{-}Kaye and Ulan Degenbaev and Manu Drijvers and Islam El{-}Ashi and Stefan Kaestle and Roman Kashitsyn and Maciej Kot and Yvonne{-}Anne Pignolet and Rostislav Rumenov and Dimitris Sarlis and Alin Sinpalean and Alexandru Uta and Bogdan Warinschi and Alexandra Zapuc}, editor = {Julia Lawall and Dan Williams}, title = {Decentralized and Stateful Serverless Computing on the Internet Computer Blockchain}, booktitle = {Proceedings of the 2023 {USENIX} Annual Technical Conference, {USENIX} {ATC} 2023, Boston, MA, USA, July 10-12, 2023}, pages = {329--343}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/atc23/presentation/arutyunyan}, timestamp = {Tue, 16 Jul 2024 09:12:32 +0200}, biburl = {https://dblp.org/rec/conf/usenix/ArutyunyanBBDDE23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/0001TW22, author = {Ngoc Khanh Nguyen and Eftychios Theodorakis and Bogdan Warinschi}, editor = {Goichiro Hanaoka and Junji Shikata and Yohei Watanabe}, title = {Lifting Standard Model Reductions to Common Setup Assumptions}, booktitle = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Virtual Event, March 8-11, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13178}, pages = {130--160}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-97131-1\_5}, doi = {10.1007/978-3-030-97131-1\_5}, timestamp = {Thu, 10 Mar 2022 11:26:10 +0100}, biburl = {https://dblp.org/rec/conf/pkc/0001TW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/LiuMW22, author = {Bin Liu and Antonis Michalas and Bogdan Warinschi}, editor = {Chunpeng Ge and Fuchun Guo}, title = {Cryptographic Role-Based Access Control, Reconsidered}, booktitle = {Provable and Practical Security - 16th International Conference, ProvSec 2022, Nanjing, China, November 11-12, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13600}, pages = {282--289}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-20917-8\_19}, doi = {10.1007/978-3-031-20917-8\_19}, timestamp = {Sun, 13 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/provsec/LiuMW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuMW22, author = {Bin Liu and Antonis Michalas and Bogdan Warinschi}, title = {Cryptographic Role-Based Access Control, Reconsidered}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1268}, year = {2022}, url = {https://eprint.iacr.org/2022/1268}, timestamp = {Sat, 22 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuMW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BarbosaBCW21, author = {Manuel Barbosa and Alexandra Boldyreva and Shan Chen and Bogdan Warinschi}, editor = {Tal Malkin and Chris Peikert}, title = {Provable Security Analysis of {FIDO2}}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12827}, pages = {125--156}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84252-9\_5}, doi = {10.1007/978-3-030-84252-9\_5}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/BarbosaBCW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NguyenTW21, author = {Ngoc Khanh Nguyen and Eftychios Theodorakis and Bogdan Warinschi}, title = {Lifting Standard Model Reductions to Common Setup Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {888}, year = {2021}, url = {https://eprint.iacr.org/2021/888}, timestamp = {Wed, 07 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NguyenTW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/CortierLW20, author = {V{\'{e}}ronique Cortier and Joseph Lallemand and Bogdan Warinschi}, title = {Fifty Shades of Ballot Privacy: Privacy against a Malicious Board}, booktitle = {33rd {IEEE} Computer Security Foundations Symposium, {CSF} 2020, Boston, MA, USA, June 22-26, 2020}, pages = {17--32}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CSF49147.2020.00010}, doi = {10.1109/CSF49147.2020.00010}, timestamp = {Mon, 10 Aug 2020 18:44:11 +0200}, biburl = {https://dblp.org/rec/conf/csfw/CortierLW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/GuilhemFW20, author = {Cyprien Delpech de Saint Guilhem and Marc Fischlin and Bogdan Warinschi}, title = {Authentication in Key-Exchange: Definitions, Relations and Composition}, booktitle = {33rd {IEEE} Computer Security Foundations Symposium, {CSF} 2020, Boston, MA, USA, June 22-26, 2020}, pages = {288--303}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CSF49147.2020.00028}, doi = {10.1109/CSF49147.2020.00028}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/GuilhemFW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CortierLW20, author = {V{\'{e}}ronique Cortier and Joseph Lallemand and Bogdan Warinschi}, title = {Fifty Shades of Ballot Privacy: Privacy against a Malicious Board}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {127}, year = {2020}, url = {https://eprint.iacr.org/2020/127}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CortierLW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenBBW20, author = {Shan Chen and Manuel Barbosa and Alexandra Boldyreva and Bogdan Warinschi}, title = {Provable Security Analysis of {FIDO2}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {756}, year = {2020}, url = {https://eprint.iacr.org/2020/756}, timestamp = {Tue, 30 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenBBW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GuiPPW20, author = {Zichen Gui and Kenneth G. Paterson and Sikhar Patranabis and Bogdan Warinschi}, title = {SWiSSSE: System-Wide Security for Searchable Symmetric Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1328}, year = {2020}, url = {https://eprint.iacr.org/2020/1328}, timestamp = {Fri, 30 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/GuiPPW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/BoldyrevaTW19, author = {Alexandra Boldyreva and Tianxin Tang and Bogdan Warinschi}, editor = {Robert H. Deng and Val{\'{e}}rie Gauthier{-}Uma{\~{n}}a and Mart{\'{\i}}n Ochoa and Moti Yung}, title = {Masking Fuzzy-Searchable Public Databases}, booktitle = {Applied Cryptography and Network Security - 17th International Conference, {ACNS} 2019, Bogota, Colombia, June 5-7, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11464}, pages = {571--591}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-21568-2\_28}, doi = {10.1007/978-3-030-21568-2\_28}, timestamp = {Wed, 29 May 2019 12:25:55 +0200}, biburl = {https://dblp.org/rec/conf/acns/BoldyrevaTW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GuiJW19, author = {Zichen Gui and Oliver Johnson and Bogdan Warinschi}, editor = {Lorenzo Cavallaro and Johannes Kinder and XiaoFeng Wang and Jonathan Katz}, title = {Encrypted Databases: New Volume Attacks against Range Queries}, booktitle = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2019, London, UK, November 11-15, 2019}, pages = {361--378}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3319535.3363210}, doi = {10.1145/3319535.3363210}, timestamp = {Tue, 10 Nov 2020 20:00:36 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GuiJW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/BarbosaCSW19, author = {Manuel Barbosa and Dario Catalano and Azam Soleimanian and Bogdan Warinschi}, editor = {Mitsuru Matsui}, title = {Efficient Function-Hiding Functional Encryption: From Inner-Products to Orthogonality}, booktitle = {Topics in Cryptology - {CT-RSA} 2019 - The Cryptographers' Track at the {RSA} Conference 2019, San Francisco, CA, USA, March 4-8, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11405}, pages = {127--148}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-12612-4\_7}, doi = {10.1007/978-3-030-12612-4\_7}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/BarbosaCSW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoldyrevaTW19, author = {Alexandra Boldyreva and Tianxin Tang and Bogdan Warinschi}, title = {Masking Fuzzy-Searchable Public Databases}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {434}, year = {2019}, url = {https://eprint.iacr.org/2019/434}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoldyrevaTW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GuiJW19, author = {Zichen Gui and Oliver Johnson and Bogdan Warinschi}, title = {Encrypted Databases: New Volume Attacks against Range Queries}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1198}, year = {2019}, url = {https://eprint.iacr.org/2019/1198}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GuiJW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GuilhemFW19, author = {Cyprien Delpech de Saint Guilhem and Marc Fischlin and Bogdan Warinschi}, title = {Authentication in Key-Exchange: Definitions, Relations and Composition}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1203}, year = {2019}, url = {https://eprint.iacr.org/2019/1203}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GuilhemFW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LiuJKW18, author = {Jia Liu and Tibor Jager and Saqib A. Kakvi and Bogdan Warinschi}, title = {How to build time-lock encryption}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {11}, pages = {2549--2586}, year = {2018}, url = {https://doi.org/10.1007/s10623-018-0461-x}, doi = {10.1007/S10623-018-0461-X}, timestamp = {Thu, 08 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LiuJKW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/CortierDDW18, author = {V{\'{e}}ronique Cortier and Constantin Catalin Dragan and Fran{\c{c}}ois Dupressoir and Bogdan Warinschi}, title = {Machine-Checked Proofs for Electronic Voting: Privacy and Verifiability for Belenios}, booktitle = {31st {IEEE} Computer Security Foundations Symposium, {CSF} 2018, Oxford, United Kingdom, July 9-12, 2018}, pages = {298--312}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/CSF.2018.00029}, doi = {10.1109/CSF.2018.00029}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/CortierDDW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/LindenRWW18, author = {Dirk van der Linden and Awais Rashid and Emma J. Williams and Bogdan Warinschi}, editor = {Mehdi Mirakhorli and Matthias Galster}, title = {Safe cryptography for all: towards visual metaphor driven cryptography building blocks}, booktitle = {Proceedings of the 1st International Workshop on Security Awareness from Design to Deployment, SEAD@ICSE 2018, Gothenburg, Sweden, May 27, 2018}, pages = {41--44}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3194707.3194709}, doi = {10.1145/3194707.3194709}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icse/LindenRWW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernhardCGTW18, author = {David Bernhard and V{\'{e}}ronique Cortier and Pierrick Gaudry and Mathieu Turuani and Bogdan Warinschi}, title = {Verifiability Analysis of CHVote}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1052}, year = {2018}, url = {https://eprint.iacr.org/2018/1052}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernhardCGTW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/BernhardNW17, author = {David Bernhard and Ngoc Khanh Nguyen and Bogdan Warinschi}, editor = {Dieter Gollmann and Atsuko Miyaji and Hiroaki Kikuchi}, title = {Adaptive Proofs Have Straightline Extractors (in the Random Oracle Model)}, booktitle = {Applied Cryptography and Network Security - 15th International Conference, {ACNS} 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10355}, pages = {336--353}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-61204-1\_17}, doi = {10.1007/978-3-319-61204-1\_17}, timestamp = {Tue, 07 May 2024 20:12:06 +0200}, biburl = {https://dblp.org/rec/conf/acns/BernhardNW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/ChevalCW17, author = {Vincent Cheval and V{\'{e}}ronique Cortier and Bogdan Warinschi}, title = {Secure Composition of PKIs with Public Key Protocols}, booktitle = {30th {IEEE} Computer Security Foundations Symposium, {CSF} 2017, Santa Barbara, CA, USA, August 21-25, 2017}, pages = {144--158}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/CSF.2017.28}, doi = {10.1109/CSF.2017.28}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/ChevalCW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/BahmaniBBPSSW17, author = {Raad Bahmani and Manuel Barbosa and Ferdinand Brasser and Bernardo Portela and Ahmad{-}Reza Sadeghi and Guillaume Scerri and Bogdan Warinschi}, editor = {Aggelos Kiayias}, title = {Secure Multiparty Computation from {SGX}}, booktitle = {Financial Cryptography and Data Security - 21st International Conference, {FC} 2017, Sliema, Malta, April 3-7, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10322}, pages = {477--497}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70972-7\_27}, doi = {10.1007/978-3-319-70972-7\_27}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/BahmaniBBPSSW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/GuilhemSW17, author = {Cyprien de Saint Guilhem and Nigel P. Smart and Bogdan Warinschi}, editor = {Phong Q. Nguyen and Jianying Zhou}, title = {Generic Forward-Secure Key Agreement Without Signatures}, booktitle = {Information Security - 20th International Conference, {ISC} 2017, Ho Chi Minh City, Vietnam, November 22-24, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10599}, pages = {114--133}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-69659-1\_7}, doi = {10.1007/978-3-319-69659-1\_7}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/isw/GuilhemSW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/CortierDDSSW17, author = {V{\'{e}}ronique Cortier and Constantin Catalin Dragan and Fran{\c{c}}ois Dupressoir and Benedikt Schmidt and Pierre{-}Yves Strub and Bogdan Warinschi}, title = {Machine-Checked Proofs of Privacy for Electronic Voting Protocols}, booktitle = {2017 {IEEE} Symposium on Security and Privacy, {SP} 2017, San Jose, CA, USA, May 22-26, 2017}, pages = {993--1008}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/SP.2017.28}, doi = {10.1109/SP.2017.28}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/CortierDDSSW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/JagerSSW17, author = {Tibor Jager and Martijn Stam and Ryan Stanley{-}Oakes and Bogdan Warinschi}, editor = {Yael Kalai and Leonid Reyzin}, title = {Multi-key Authenticated Encryption with Corruptions: Reductions Are Lossy}, booktitle = {Theory of Cryptography - 15th International Conference, {TCC} 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10677}, pages = {409--441}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70500-2\_14}, doi = {10.1007/978-3-319-70500-2\_14}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/JagerSSW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JagerSSW17, author = {Tibor Jager and Martijn Stam and Ryan Stanley{-}Oakes and Bogdan Warinschi}, title = {Multi-Key Authenticated Encryption with Corruptions: Reductions are Lossy}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {495}, year = {2017}, url = {http://eprint.iacr.org/2017/495}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JagerSSW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GuilhemSW17, author = {Cyprien de Saint Guilhem and Nigel P. Smart and Bogdan Warinschi}, title = {Generic Forward-Secure Key Agreement Without Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {853}, year = {2017}, url = {http://eprint.iacr.org/2017/853}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GuilhemSW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/BernhardFW16, author = {David Bernhard and Marc Fischlin and Bogdan Warinschi}, title = {Adaptive proofs of knowledge in the random oracle model}, journal = {{IET} Inf. Secur.}, volume = {10}, number = {6}, pages = {319--331}, year = {2016}, url = {https://doi.org/10.1049/iet-ifs.2015.0506}, doi = {10.1049/IET-IFS.2015.0506}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/BernhardFW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ShrimptonSW16, author = {Thomas Shrimpton and Martijn Stam and Bogdan Warinschi}, editor = {Matthew Robshaw and Jonathan Katz}, title = {A Modular Treatment of Cryptographic APIs: The Symmetric-Key Case}, booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9814}, pages = {277--307}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53018-4\_11}, doi = {10.1007/978-3-662-53018-4\_11}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ShrimptonSW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/CosteaW16, author = {Sergiu Costea and Bogdan Warinschi}, title = {Secure Software Licensing: Models, Constructions, and Proofs}, booktitle = {{IEEE} 29th Computer Security Foundations Symposium, {CSF} 2016, Lisbon, Portugal, June 27 - July 1, 2016}, pages = {31--44}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/CSF.2016.10}, doi = {10.1109/CSF.2016.10}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/CosteaW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/BarbosaPSW16, author = {Manuel Barbosa and Bernardo Portela and Guillaume Scerri and Bogdan Warinschi}, title = {Foundations of Hardware-Based Attested Computation and Application to {SGX}}, booktitle = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2016, Saarbr{\"{u}}cken, Germany, March 21-24, 2016}, pages = {245--260}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/EuroSP.2016.28}, doi = {10.1109/EUROSP.2016.28}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/BarbosaPSW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BernhardFW16, author = {David Bernhard and Marc Fischlin and Bogdan Warinschi}, editor = {Chen{-}Mou Cheng and Kai{-}Min Chung and Giuseppe Persiano and Bo{-}Yin Yang}, title = {On the Hardness of Proving CCA-Security of Signed ElGamal}, booktitle = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9614}, pages = {47--69}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49384-7\_3}, doi = {10.1007/978-3-662-49384-7\_3}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BernhardFW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/LiuW16, author = {Bin Liu and Bogdan Warinschi}, editor = {Liqun Chen and Jinguang Han}, title = {Universally Composable Cryptographic Role-Based Access Control}, booktitle = {Provable Security - 10th International Conference, ProvSec 2016, Nanjing, China, November 10-11, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10005}, pages = {61--80}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-47422-9\_4}, doi = {10.1007/978-3-319-47422-9\_4}, timestamp = {Wed, 14 Jul 2021 15:56:25 +0200}, biburl = {https://dblp.org/rec/conf/provsec/LiuW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/BoldyrevaKLW16, author = {Alexandra Boldyreva and Taesoo Kim and Richard J. Lipton and Bogdan Warinschi}, editor = {Vassilis Zikas and Roberto De Prisco}, title = {Provably-Secure Remote Memory Attestation for Heap Overflow Protection}, booktitle = {Security and Cryptography for Networks - 10th International Conference, {SCN} 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9841}, pages = {83--103}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-44618-9\_5}, doi = {10.1007/978-3-319-44618-9\_5}, timestamp = {Thu, 23 Jun 2022 19:58:57 +0200}, biburl = {https://dblp.org/rec/conf/scn/BoldyrevaKLW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/FischlinGSW16, author = {Marc Fischlin and Felix G{\"{u}}nther and Benedikt Schmidt and Bogdan Warinschi}, title = {Key Confirmation in Key Exchange: {A} Formal Treatment and Implications for {TLS} 1.3}, booktitle = {{IEEE} Symposium on Security and Privacy, {SP} 2016, San Jose, CA, USA, May 22-26, 2016}, pages = {452--469}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/SP.2016.34}, doi = {10.1109/SP.2016.34}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/FischlinGSW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BarbosaPSW16, author = {Manuel Barbosa and Bernardo Portela and Guillaume Scerri and Bogdan Warinschi}, title = {Foundations of Hardware-Based Attested Computation and Application to {SGX}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {14}, year = {2016}, url = {http://eprint.iacr.org/2016/014}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BarbosaPSW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ShrimptonSW16, author = {Thomas Shrimpton and Martijn Stam and Bogdan Warinschi}, title = {A Modular Treatment of Cryptographic APIs: The Symmetric-Key Case}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {586}, year = {2016}, url = {http://eprint.iacr.org/2016/586}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ShrimptonSW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernhardCPSW16, author = {David Bernhard and V{\'{e}}ronique Cortier and Olivier Pereira and Ben Smyth and Bogdan Warinschi}, title = {Adapting Helios for provable ballot privacy}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {756}, year = {2016}, url = {http://eprint.iacr.org/2016/756}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernhardCPSW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernhardW16, author = {David Bernhard and Bogdan Warinschi}, title = {Cryptographic Voting - {A} Gentle Introduction}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {765}, year = {2016}, url = {http://eprint.iacr.org/2016/765}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernhardW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernhardPW16, author = {David Bernhard and Olivier Pereira and Bogdan Warinschi}, title = {How not to Prove Yourself: Pitfalls of the Fiat-Shamir Heuristic and Applications to Helios}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {771}, year = {2016}, url = {http://eprint.iacr.org/2016/771}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernhardPW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuW16, author = {Bin Liu and Bogdan Warinschi}, title = {Universally Composable Cryptographic Role-Based Access Control}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {902}, year = {2016}, url = {http://eprint.iacr.org/2016/902}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BahmaniBBPSSW16, author = {Raad Bahmani and Manuel Barbosa and Ferdinand Brasser and Bernardo Portela and Ahmad{-}Reza Sadeghi and Guillaume Scerri and Bogdan Warinschi}, title = {Secure Multiparty Computation from {SGX}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1057}, year = {2016}, url = {http://eprint.iacr.org/2016/1057}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BahmaniBBPSSW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/HazayPW15, author = {Carmit Hazay and Arpita Patra and Bogdan Warinschi}, editor = {Tetsu Iwata and Jung Hee Cheon}, title = {Selective Opening Security for Receivers}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 - December 3, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9452}, pages = {443--469}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48797-6\_19}, doi = {10.1007/978-3-662-48797-6\_19}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/HazayPW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/FerraraFLW15, author = {Anna Lisa Ferrara and Georg Fuchsbauer and Bin Liu and Bogdan Warinschi}, editor = {C{\'{e}}dric Fournet and Michael W. Hicks and Luca Vigan{\`{o}}}, title = {Policy Privacy in Cryptographic Access Control}, booktitle = {{IEEE} 28th Computer Security Foundations Symposium, {CSF} 2015, Verona, Italy, 13-17 July, 2015}, pages = {46--60}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/CSF.2015.11}, doi = {10.1109/CSF.2015.11}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/FerraraFLW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BernhardFW15, author = {David Bernhard and Marc Fischlin and Bogdan Warinschi}, editor = {Jonathan Katz}, title = {Adaptive Proofs of Knowledge in the Random Oracle Model}, booktitle = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9020}, pages = {629--649}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46447-2\_28}, doi = {10.1007/978-3-662-46447-2\_28}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BernhardFW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/BernhardCGPW15, author = {David Bernhard and V{\'{e}}ronique Cortier and David Galindo and Olivier Pereira and Bogdan Warinschi}, title = {SoK: {A} Comprehensive Analysis of Game-Based Ballot Privacy Definitions}, booktitle = {2015 {IEEE} Symposium on Security and Privacy, {SP} 2015, San Jose, CA, USA, May 17-21, 2015}, pages = {499--516}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/SP.2015.37}, doi = {10.1109/SP.2015.37}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/BernhardCGPW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernhardCGPW15, author = {David Bernhard and V{\'{e}}ronique Cortier and David Galindo and Olivier Pereira and Bogdan Warinschi}, title = {A comprehensive analysis of game-based ballot privacy definitions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {255}, year = {2015}, url = {http://eprint.iacr.org/2015/255}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernhardCGPW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuGR15, author = {Jia Liu and Saqib A. Kakvi and Bogdan Warinschi}, title = {Extractable Witness Encryption and Timed-Release Encryption from Bitcoin}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {482}, year = {2015}, url = {http://eprint.iacr.org/2015/482}, timestamp = {Wed, 14 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuGR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernhardFW15, author = {David Bernhard and Marc Fischlin and Bogdan Warinschi}, title = {Adaptive Proofs of Knowledge in the Random Oracle Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {648}, year = {2015}, url = {http://eprint.iacr.org/2015/648}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernhardFW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernhardFW15a, author = {David Bernhard and Marc Fischlin and Bogdan Warinschi}, title = {On the Hardness of Proving CCA-security of Signed ElGamal}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {649}, year = {2015}, url = {http://eprint.iacr.org/2015/649}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernhardFW15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernhardW15, author = {David Bernhard and Bogdan Warinschi}, title = {On Limitations of the Fiat{\-} - Shamir Transformation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {712}, year = {2015}, url = {http://eprint.iacr.org/2015/712}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernhardW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoldyrevaKLW15, author = {Alexandra Boldyreva and Taesoo Kim and Richard J. Lipton and Bogdan Warinschi}, title = {Towards Provably-Secure Remote Memory Attestation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {729}, year = {2015}, url = {http://eprint.iacr.org/2015/729}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoldyrevaKLW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HazayPW15, author = {Carmit Hazay and Arpita Patra and Bogdan Warinschi}, title = {Selective Opening Security for Receivers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {860}, year = {2015}, url = {http://eprint.iacr.org/2015/860}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HazayPW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/GrozaW14, author = {Bogdan Groza and Bogdan Warinschi}, title = {Cryptographic puzzles and DoS resilience, revisited}, journal = {Des. Codes Cryptogr.}, volume = {73}, number = {1}, pages = {177--207}, year = {2014}, url = {https://doi.org/10.1007/s10623-013-9816-5}, doi = {10.1007/S10623-013-9816-5}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/GrozaW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/LeeSWW14, author = {Ming{-}Feng Lee and Nigel P. Smart and Bogdan Warinschi and Gaven J. Watson}, title = {Anonymity guarantees of the {UMTS/LTE} authentication and connection protocol}, journal = {Int. J. Inf. Sec.}, volume = {13}, number = {6}, pages = {513--527}, year = {2014}, url = {https://doi.org/10.1007/s10207-014-0231-3}, doi = {10.1007/S10207-014-0231-3}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/LeeSWW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CatalanoFW14, author = {Dario Catalano and Dario Fiore and Bogdan Warinschi}, editor = {Juan A. Garay and Rosario Gennaro}, title = {Homomorphic Signatures with Efficient Verification for Polynomial Functions}, booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8616}, pages = {371--389}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44371-2\_21}, doi = {10.1007/978-3-662-44371-2\_21}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CatalanoFW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CatalanoFW14, author = {Dario Catalano and Dario Fiore and Bogdan Warinschi}, title = {Homomorphic Signatures with Efficient Verification for Polynomial Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {469}, year = {2014}, url = {http://eprint.iacr.org/2014/469}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CatalanoFW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/BernhardFGSW13, author = {David Bernhard and Georg Fuchsbauer and Essam Ghadafi and Nigel P. Smart and Bogdan Warinschi}, title = {Anonymous attestation with user-controlled linkability}, journal = {Int. J. Inf. Sec.}, volume = {12}, number = {3}, pages = {219--249}, year = {2013}, url = {https://doi.org/10.1007/s10207-013-0191-z}, doi = {10.1007/S10207-013-0191-Z}, timestamp = {Sat, 16 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/BernhardFGSW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/BrzuskaFSWW13, author = {Christina Brzuska and Marc Fischlin and Nigel P. Smart and Bogdan Warinschi and Stephen C. Williams}, title = {Less is more: relaxed yet composable security notions for key exchange}, journal = {Int. J. Inf. Sec.}, volume = {12}, number = {4}, pages = {267--297}, year = {2013}, url = {https://doi.org/10.1007/s10207-013-0192-y}, doi = {10.1007/S10207-013-0192-Y}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/BrzuskaFSWW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BrzuskaSWW13, author = {Christina Brzuska and Nigel P. Smart and Bogdan Warinschi and Gaven J. Watson}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {An analysis of the {EMV} channel establishment protocol}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {373--386}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516748}, doi = {10.1145/2508859.2516748}, timestamp = {Tue, 10 Nov 2020 19:58:06 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BrzuskaSWW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BohlCW13, author = {Florian B{\"{o}}hl and V{\'{e}}ronique Cortier and Bogdan Warinschi}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Deduction soundness: prove one, get five for free}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {1261--1272}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516711}, doi = {10.1145/2508859.2516711}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BohlCW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/FerraraFW13, author = {Anna Lisa Ferrara and Georg Fuchsbauer and Bogdan Warinschi}, title = {Cryptographically Enforced {RBAC}}, booktitle = {2013 {IEEE} 26th Computer Security Foundations Symposium, New Orleans, LA, USA, June 26-28, 2013}, pages = {115--129}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/CSF.2013.15}, doi = {10.1109/CSF.2013.15}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/FerraraFW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fosad/BernhardW13, author = {David Bernhard and Bogdan Warinschi}, editor = {Alessandro Aldini and Javier L{\'{o}}pez and Fabio Martinelli}, title = {Cryptographic Voting - {A} Gentle Introduction}, booktitle = {Foundations of Security Analysis and Design {VII} - {FOSAD} 2012/2013 Tutorial Lectures}, series = {Lecture Notes in Computer Science}, volume = {8604}, pages = {167--211}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-10082-1\_7}, doi = {10.1007/978-3-319-10082-1\_7}, timestamp = {Thu, 29 Aug 2019 08:10:01 +0200}, biburl = {https://dblp.org/rec/conf/fosad/BernhardW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LeeSWW13, author = {Ming{-}Feng Lee and Nigel P. Smart and Bogdan Warinschi and Gaven J. Watson}, title = {Anonymity Guarantees of the {UMTS/LTE} Authentication and Connection Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {27}, year = {2013}, url = {http://eprint.iacr.org/2013/027}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LeeSWW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrzuskaSWW13, author = {Christina Brzuska and Nigel P. Smart and Bogdan Warinschi and Gaven J. Watson}, title = {An Analysis of the {EMV} Channel Establishment Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {31}, year = {2013}, url = {http://eprint.iacr.org/2013/031}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrzuskaSWW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BohlCW13, author = {Florian B{\"{o}}hl and V{\'{e}}ronique Cortier and Bogdan Warinschi}, title = {Deduction Soundness: Prove One, Get Five for Free}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {457}, year = {2013}, url = {http://eprint.iacr.org/2013/457}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BohlCW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FerraraFW13, author = {Anna Lisa Ferrara and Georg Fuchsbauer and Bogdan Warinschi}, title = {Cryptographically Enforced {RBAC}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {492}, year = {2013}, url = {http://eprint.iacr.org/2013/492}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FerraraFW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/BoldyrevaPW12, author = {Alexandra Boldyreva and Adriana Palacio and Bogdan Warinschi}, title = {Secure Proxy Signature Schemes for Delegation of Signing Rights}, journal = {J. Cryptol.}, volume = {25}, number = {1}, pages = {57--115}, year = {2012}, url = {https://doi.org/10.1007/s00145-010-9082-x}, doi = {10.1007/S00145-010-9082-X}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/BoldyrevaPW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BernhardPW12, author = {David Bernhard and Olivier Pereira and Bogdan Warinschi}, editor = {Xiaoyun Wang and Kazue Sako}, title = {How Not to Prove Yourself: Pitfalls of the Fiat-Shamir Heuristic and Applications to Helios}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2012 - 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7658}, pages = {626--643}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34961-4\_38}, doi = {10.1007/978-3-642-34961-4\_38}, timestamp = {Mon, 25 Nov 2019 15:32:14 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/BernhardPW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BernhardCPW12, author = {David Bernhard and V{\'{e}}ronique Cortier and Olivier Pereira and Bogdan Warinschi}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Measuring vote privacy, revisited}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {941--952}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382295}, doi = {10.1145/2382196.2382295}, timestamp = {Tue, 12 Apr 2022 13:28:49 +0200}, biburl = {https://dblp.org/rec/conf/ccs/BernhardCPW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/GrozaW12, author = {Bogdan Groza and Bogdan Warinschi}, editor = {Dieter Gollmann and Felix C. Freiling}, title = {Revisiting Difficulty Notions for Client Puzzles and DoS Resilience}, booktitle = {Information Security - 15th International Conference, {ISC} 2012, Passau, Germany, September 19-21, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7483}, pages = {39--54}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33383-5\_3}, doi = {10.1007/978-3-642-33383-5\_3}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/isw/GrozaW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/CatalanoFW12, author = {Dario Catalano and Dario Fiore and Bogdan Warinschi}, editor = {Marc Fischlin and Johannes Buchmann and Mark Manulis}, title = {Efficient Network Coding Signatures in the Standard Model}, booktitle = {Public Key Cryptography - {PKC} 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7293}, pages = {680--696}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30057-8\_40}, doi = {10.1007/978-3-642-30057-8\_40}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/CatalanoFW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernhardPW12, author = {David Bernhard and Olivier Pereira and Bogdan Warinschi}, title = {On Necessary and Sufficient Conditions for Private Ballot Submission}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {236}, year = {2012}, url = {http://eprint.iacr.org/2012/236}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernhardPW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrzuskaFSWW12, author = {Christina Brzuska and Marc Fischlin and Nigel P. Smart and Bogdan Warinschi and Stephen C. Williams}, title = {Less is More: Relaxed yet Composable Security Notions for Key Exchange}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {242}, year = {2012}, url = {http://eprint.iacr.org/2012/242}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrzuskaFSWW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jar/CortierKW11, author = {V{\'{e}}ronique Cortier and Steve Kremer and Bogdan Warinschi}, title = {A Survey of Symbolic Methods in Computational Analysis of Cryptographic Systems}, journal = {J. Autom. Reason.}, volume = {46}, number = {3-4}, pages = {225--259}, year = {2011}, url = {https://doi.org/10.1007/s10817-010-9187-9}, doi = {10.1007/S10817-010-9187-9}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jar/CortierKW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BrzuskaFWW11, author = {Christina Brzuska and Marc Fischlin and Bogdan Warinschi and Stephen C. Williams}, editor = {Yan Chen and George Danezis and Vitaly Shmatikov}, title = {Composability of bellare-rogaway key exchange protocols}, booktitle = {Proceedings of the 18th {ACM} Conference on Computer and Communications Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011}, pages = {51--62}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2046707.2046716}, doi = {10.1145/2046707.2046716}, timestamp = {Tue, 10 Nov 2020 19:56:39 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BrzuskaFWW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CortierW11, author = {V{\'{e}}ronique Cortier and Bogdan Warinschi}, editor = {Yan Chen and George Danezis and Vitaly Shmatikov}, title = {A composable computational soundness notion}, booktitle = {Proceedings of the 18th {ACM} Conference on Computer and Communications Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011}, pages = {63--74}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2046707.2046717}, doi = {10.1145/2046707.2046717}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/CortierW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/KremerSW11, author = {Steve Kremer and Graham Steel and Bogdan Warinschi}, title = {Security for Key Management Interfaces}, booktitle = {Proceedings of the 24th {IEEE} Computer Security Foundations Symposium, {CSF} 2011, Cernay-la-Ville, France, 27-29 June, 2011}, pages = {266--280}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/CSF.2011.25}, doi = {10.1109/CSF.2011.25}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/KremerSW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/BernhardCPSW11, author = {David Bernhard and V{\'{e}}ronique Cortier and Olivier Pereira and Ben Smyth and Bogdan Warinschi}, editor = {Vijay Atluri and Claudia D{\'{\i}}az}, title = {Adapting Helios for Provable Ballot Privacy}, booktitle = {Computer Security - {ESORICS} 2011 - 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6879}, pages = {335--354}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23822-2\_19}, doi = {10.1007/978-3-642-23822-2\_19}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/BernhardCPSW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CatalanoFW11, author = {Dario Catalano and Dario Fiore and Bogdan Warinschi}, editor = {Kenneth G. Paterson}, title = {Adaptive Pseudo-free Groups and Applications}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6632}, pages = {207--223}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20465-4\_13}, doi = {10.1007/978-3-642-20465-4\_13}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CatalanoFW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tgc/ChenLW11, author = {Liqun Chen and Ming{-}Feng Lee and Bogdan Warinschi}, editor = {Roberto Bruni and Vladimiro Sassone}, title = {Security of the Enhanced {TCG} Privacy-CA Solution}, booktitle = {Trustworthy Global Computing - 6th International Symposium, {TGC} 2011, Aachen, Germany, June 9-10, 2011. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7173}, pages = {121--141}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-30065-3\_8}, doi = {10.1007/978-3-642-30065-3\_8}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tgc/ChenLW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/ios/11/BressonLMW11, author = {Emmanuel Bresson and Yassine Lakhnech and Laurent Mazar{\'{e}} and Bogdan Warinschi}, editor = {V{\'{e}}ronique Cortier and Steve Kremer}, title = {Computational Soundness - The Case of Diffie-Hellman Keys}, booktitle = {Formal Models and Techniques for Analyzing Security Protocols}, series = {Cryptology and Information Security Series}, volume = {5}, pages = {277--302}, publisher = {{IOS} Press}, year = {2011}, url = {https://doi.org/10.3233/978-1-60750-714-7-277}, doi = {10.3233/978-1-60750-714-7-277}, timestamp = {Fri, 15 May 2020 12:11:04 +0200}, biburl = {https://dblp.org/rec/books/ios/11/BressonLMW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CatalanoFW11, author = {Dario Catalano and Dario Fiore and Bogdan Warinschi}, title = {Adaptive Pseudo-Free Groups and Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {53}, year = {2011}, url = {http://eprint.iacr.org/2011/053}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CatalanoFW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernhardFGSW11, author = {David Bernhard and Georg Fuchsbauer and Essam Ghadafi and Nigel P. Smart and Bogdan Warinschi}, title = {Anonymous attestation with user-controlled linkability}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {658}, year = {2011}, url = {http://eprint.iacr.org/2011/658}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernhardFGSW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CatalanoFW11a, author = {Dario Catalano and Dario Fiore and Bogdan Warinschi}, title = {Efficient Network Coding Signatures in the Standard Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {696}, year = {2011}, url = {http://eprint.iacr.org/2011/696}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CatalanoFW11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/BaudetWA10, author = {Mathieu Baudet and Bogdan Warinschi and Mart{\'{\i}}n Abadi}, title = {Guessing attacks and the computational soundness of static equivalence}, journal = {J. Comput. Secur.}, volume = {18}, number = {5}, pages = {909--968}, year = {2010}, url = {https://doi.org/10.3233/JCS-2009-0386}, doi = {10.3233/JCS-2009-0386}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/BaudetWA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/MorrisseySW10, author = {Paul Morrissey and Nigel P. Smart and Bogdan Warinschi}, title = {The {TLS} Handshake Protocol: {A} Modular Analysis}, journal = {J. Cryptol.}, volume = {23}, number = {2}, pages = {187--223}, year = {2010}, url = {https://doi.org/10.1007/s00145-009-9052-3}, doi = {10.1007/S00145-009-9052-3}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/MorrisseySW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/BartheHLRW10, author = {Gilles Barthe and Alejandro Hevia and Zhengqin Luo and Tamara Rezk and Bogdan Warinschi}, title = {Robustness Guarantees for Anonymity}, booktitle = {Proceedings of the 23rd {IEEE} Computer Security Foundations Symposium, {CSF} 2010, Edinburgh, United Kingdom, July 17-19, 2010}, pages = {91--106}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/CSF.2010.14}, doi = {10.1109/CSF.2010.14}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/BartheHLRW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/euc/ChenW10, author = {Liqun Chen and Bogdan Warinschi}, title = {Security of the {TCG} Privacy-CA Solution}, booktitle = {{IEEE/IFIP} 8th International Conference on Embedded and Ubiquitous Computing, {EUC} 2010, Hong Kong, China, 11-13 December 2010}, pages = {609--616}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/EUC.2010.98}, doi = {10.1109/EUC.2010.98}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/euc/ChenW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/GhadafiSW10, author = {Essam Ghadafi and Nigel P. Smart and Bogdan Warinschi}, editor = {Phong Q. Nguyen and David Pointcheval}, title = {Groth-Sahai Proofs Revisited}, booktitle = {Public Key Cryptography - {PKC} 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6056}, pages = {177--192}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13013-7\_11}, doi = {10.1007/978-3-642-13013-7\_11}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/GhadafiSW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/LeeSW10, author = {Ming{-}Feng Lee and Nigel P. Smart and Bogdan Warinschi}, editor = {Juan A. Garay and Roberto De Prisco}, title = {The Fiat-Shamir Transform for Group and Ring Signature Schemes}, booktitle = {Security and Cryptography for Networks, 7th International Conference, {SCN} 2010, Amalfi, Italy, September 13-15, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6280}, pages = {363--380}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15317-4\_23}, doi = {10.1007/978-3-642-15317-4\_23}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/scn/LeeSW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/BichselCNSW10, author = {Patrik Bichsel and Jan Camenisch and Gregory Neven and Nigel P. Smart and Bogdan Warinschi}, editor = {Juan A. Garay and Roberto De Prisco}, title = {Get Shorty via Group Signatures without Encryption}, booktitle = {Security and Cryptography for Networks, 7th International Conference, {SCN} 2010, Amalfi, Italy, September 13-15, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6280}, pages = {381--398}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15317-4\_24}, doi = {10.1007/978-3-642-15317-4\_24}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/BichselCNSW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LeeSW10, author = {Ming{-}Feng Lee and Nigel P. Smart and Bogdan Warinschi}, title = {The Fiat-Shamir Transform for Group and Ring Signature Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {358}, year = {2010}, url = {http://eprint.iacr.org/2010/358}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LeeSW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/NevenSW09, author = {Gregory Neven and Nigel P. Smart and Bogdan Warinschi}, title = {Hash function requirements for Schnorr signatures}, journal = {J. Math. Cryptol.}, volume = {3}, number = {1}, pages = {69--87}, year = {2009}, url = {https://doi.org/10.1515/JMC.2009.004}, doi = {10.1515/JMC.2009.004}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/NevenSW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/FarshimW09, author = {Pooya Farshim and Bogdan Warinschi}, editor = {Bart Preneel}, title = {Certified Encryption Revisited}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2009, Second International Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5580}, pages = {179--197}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02384-2\_12}, doi = {10.1007/978-3-642-02384-2\_12}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/FarshimW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/ChenMSW09, author = {Liqun Chen and Paul Morrissey and Nigel P. Smart and Bogdan Warinschi}, editor = {Mitsuru Matsui}, title = {Security Notions and Generic Constructions for Client Puzzles}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5912}, pages = {505--523}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10366-7\_30}, doi = {10.1007/978-3-642-10366-7\_30}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/ChenMSW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BoldyrevaCFW09, author = {Alexandra Boldyreva and David Cash and Marc Fischlin and Bogdan Warinschi}, editor = {Mitsuru Matsui}, title = {Foundations of Non-malleable Hash and One-Way Functions}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5912}, pages = {524--541}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10366-7\_31}, doi = {10.1007/978-3-642-10366-7\_31}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/BoldyrevaCFW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/MazareW09, author = {Laurent Mazar{\'{e}} and Bogdan Warinschi}, editor = {Pierpaolo Degano and Luca Vigan{\`{o}}}, title = {Separating Trace Mapping and Reactive Simulatability Soundness: The Case of Adaptive Corruption}, booktitle = {Foundations and Applications of Security Analysis, Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, {ARSPA-WITS} 2009, York, UK, March 28-29, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5511}, pages = {193--210}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03459-6\_13}, doi = {10.1007/978-3-642-03459-6\_13}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/MazareW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/GhadafiSW09, author = {Essam Ghadafi and Nigel P. Smart and Bogdan Warinschi}, editor = {Matthew Geoffrey Parker}, title = {Practical Zero-Knowledge Proofs for Circuit Evaluation}, booktitle = {Cryptography and Coding, 12th {IMA} International Conference, Cryptography and Coding 2009, Cirencester, UK, December 15-17, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5921}, pages = {469--494}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10868-6\_28}, doi = {10.1007/978-3-642-10868-6\_28}, timestamp = {Wed, 01 Sep 2021 10:36:08 +0200}, biburl = {https://dblp.org/rec/conf/ima/GhadafiSW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pairing/SmartW09, author = {Nigel P. Smart and Bogdan Warinschi}, editor = {Hovav Shacham and Brent Waters}, title = {Identity Based Group Signatures from Hierarchical Identity-Based Encryption}, booktitle = {Pairing-Based Cryptography - Pairing 2009, Third International Conference, Palo Alto, CA, USA, August 12-14, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5671}, pages = {150--170}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03298-1\_11}, doi = {10.1007/978-3-642-03298-1\_11}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/pairing/SmartW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/Warinschi09, author = {Bogdan Warinschi}, editor = {Josef Pieprzyk and Fangguo Zhang}, title = {Symbolic Methods for Provable Security}, booktitle = {Provable Security, Third International Conference, ProvSec 2009, Guangzhou, China, November 11-13, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5848}, pages = {2}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04642-1\_2}, doi = {10.1007/978-3-642-04642-1\_2}, timestamp = {Sun, 02 Jun 2019 21:26:38 +0200}, biburl = {https://dblp.org/rec/conf/provsec/Warinschi09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoldyrevaCFW09, author = {Alexandra Boldyreva and David Cash and Marc Fischlin and Bogdan Warinschi}, title = {Foundations of Non-Malleable Hash and One-Way Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {65}, year = {2009}, url = {http://eprint.iacr.org/2009/065}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoldyrevaCFW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SmartW09, author = {Nigel P. Smart and Bogdan Warinschi}, title = {Identity Based Group Signatures from Hierarchical Identity-Based Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {313}, year = {2009}, url = {http://eprint.iacr.org/2009/313}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SmartW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenMSW09, author = {Liqun Chen and Paul Morrissey and Nigel P. Smart and Bogdan Warinschi}, title = {Security Notions and Generic Constructions for Client Puzzles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {331}, year = {2009}, url = {http://eprint.iacr.org/2009/331}, timestamp = {Thu, 28 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenMSW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GhadafiSW09, author = {Essam Ghadafi and Nigel P. Smart and Bogdan Warinschi}, title = {Groth-Sahai proofs revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {599}, year = {2009}, url = {http://eprint.iacr.org/2009/599}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GhadafiSW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jacm/AbadiW08, author = {Mart{\'{\i}}n Abadi and Bogdan Warinschi}, title = {Security analysis of cryptographically controlled access to {XML} documents}, journal = {J. {ACM}}, volume = {55}, number = {2}, pages = {6:1--6:29}, year = {2008}, url = {https://doi.org/10.1145/1346330.1346331}, doi = {10.1145/1346330.1346331}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jacm/AbadiW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/MorrisseySW08, author = {Paul Morrissey and Nigel P. Smart and Bogdan Warinschi}, editor = {Josef Pieprzyk}, title = {A Modular Security Analysis of the {TLS} Handshake Protocol}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5350}, pages = {55--73}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-89255-7\_5}, doi = {10.1007/978-3-540-89255-7\_5}, timestamp = {Sun, 02 Jun 2019 21:16:53 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/MorrisseySW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MorrisseySW08, author = {Paul Morrissey and Nigel P. Smart and Bogdan Warinschi}, title = {A Modular Security Analysis of the {TLS} Handshake Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {236}, year = {2008}, url = {http://eprint.iacr.org/2008/236}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MorrisseySW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BressonLMW07, author = {Emmanuel Bresson and Yassine Lakhnech and Laurent Mazar{\'{e}} and Bogdan Warinschi}, editor = {Alfred Menezes}, title = {A Generalization of {DDH} with Applications to Protocol Analysis and Computational Soundness}, booktitle = {Advances in Cryptology - {CRYPTO} 2007, 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4622}, pages = {482--499}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74143-5\_27}, doi = {10.1007/978-3-540-74143-5\_27}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BressonLMW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/CortierWZ07, author = {V{\'{e}}ronique Cortier and Bogdan Warinschi and Eugen Zalinescu}, editor = {Joachim Biskup and Javier L{\'{o}}pez}, title = {Synthesizing Secure Protocols}, booktitle = {Computer Security - {ESORICS} 2007, 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24-26, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4734}, pages = {406--421}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74835-9\_27}, doi = {10.1007/978-3-540-74835-9\_27}, timestamp = {Thu, 29 Aug 2019 08:09:59 +0200}, biburl = {https://dblp.org/rec/conf/esorics/CortierWZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/CortierKW07, author = {V{\'{e}}ronique Cortier and Ralf K{\"{u}}sters and Bogdan Warinschi}, editor = {Joachim Biskup and Javier L{\'{o}}pez}, title = {A Cryptographic Model for Branching Time Security Properties - The Case of Contract Signing Protocols}, booktitle = {Computer Security - {ESORICS} 2007, 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24-26, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4734}, pages = {422--437}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74835-9\_28}, doi = {10.1007/978-3-540-74835-9\_28}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/CortierKW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BoldyrevaFPW07, author = {Alexandra Boldyreva and Marc Fischlin and Adriana Palacio and Bogdan Warinschi}, editor = {Tatsuaki Okamoto and Xiaoyun Wang}, title = {A Closer Look at {PKI:} Security and Efficiency}, booktitle = {Public Key Cryptography - {PKC} 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4450}, pages = {458--475}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-71677-8\_30}, doi = {10.1007/978-3-540-71677-8\_30}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BoldyrevaFPW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CortierKW07, author = {V{\'{e}}ronique Cortier and Ralf K{\"{u}}sters and Bogdan Warinschi}, title = {A Cryptographic Model for Branching Time Security Properties - the Case of Contract Signing Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {251}, year = {2007}, url = {http://eprint.iacr.org/2007/251}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CortierKW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/DattaDMW06, author = {Anupam Datta and Ante Derek and John C. Mitchell and Bogdan Warinschi}, title = {Computationally Sound Compositional Logic for Key Exchange Protocols}, booktitle = {19th {IEEE} Computer Security Foundations Workshop, {(CSFW-19} 2006), 5-7 July 2006, Venice, Italy}, pages = {321--334}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/CSFW.2006.9}, doi = {10.1109/CSFW.2006.9}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/DattaDMW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fossacs/AbadiBW06, author = {Mart{\'{\i}}n Abadi and Mathieu Baudet and Bogdan Warinschi}, editor = {Luca Aceto and Anna Ing{\'{o}}lfsd{\'{o}}ttir}, title = {Guessing Attacks and the Computational Soundness of Static Equivalence}, booktitle = {Foundations of Software Science and Computation Structures, 9th International Conference, {FOSSACS} 2006, Held as Part of the Joint European Conferences on Theory and Practice of Software, {ETAPS} 2006, Vienna, Austria, March 25-31, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3921}, pages = {398--412}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11690634\_27}, doi = {10.1007/11690634\_27}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fossacs/AbadiBW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fsttcs/CortierKKW06, author = {V{\'{e}}ronique Cortier and Steve Kremer and Ralf K{\"{u}}sters and Bogdan Warinschi}, editor = {S. Arun{-}Kumar and Naveen Garg}, title = {Computationally Sound Symbolic Secrecy in the Presence of Hash Functions}, booktitle = {{FSTTCS} 2006: Foundations of Software Technology and Theoretical Computer Science, 26th International Conference, Kolkata, India, December 13-15, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4337}, pages = {176--187}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11944836\_18}, doi = {10.1007/11944836\_18}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/fsttcs/CortierKKW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/CortierHW07, author = {V{\'{e}}ronique Cortier and Heinrich H{\"{o}}rdegen and Bogdan Warinschi}, editor = {Catalin Dima and Marius Minea and Ferucio Laurentiu Tiplea}, title = {Explicit Randomness is not Necessary when Modeling Probabilistic Encryption}, booktitle = {Proceedings of the First Workshop in Information and Computer Security, ICS@SYNASC 2006, Timisoara, Romania, September 30, 2006}, series = {Electronic Notes in Theoretical Computer Science}, volume = {186}, pages = {49--65}, publisher = {Elsevier}, year = {2006}, url = {https://doi.org/10.1016/j.entcs.2006.11.044}, doi = {10.1016/J.ENTCS.2006.11.044}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/entcs/CortierHW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-cs-0606030, author = {V{\'{e}}ronique Cortier and Heinrich H{\"{o}}rdegen and Bogdan Warinschi}, title = {Explicit Randomness is not Necessary when Modeling Probabilistic Encryption}, journal = {CoRR}, volume = {abs/cs/0606030}, year = {2006}, url = {http://arxiv.org/abs/cs/0606030}, eprinttype = {arXiv}, eprint = {cs/0606030}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-cs-0606030.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DattaDMW06, author = {Anupam Datta and Ante Derek and John C. Mitchell and Bogdan Warinschi}, title = {Key Exchange Protocols: Security Definition, Proof Method and Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {56}, year = {2006}, url = {http://eprint.iacr.org/2006/056}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DattaDMW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CortierKKW06, author = {V{\'{e}}ronique Cortier and Steve Kremer and Ralf K{\"{u}}sters and Bogdan Warinschi}, title = {Computationally Sound Symbolic Secrecy in the Presence of Hash Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {218}, year = {2006}, url = {http://eprint.iacr.org/2006/218}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CortierKKW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/Warinschi05, author = {Bogdan Warinschi}, title = {A computational analysis of the Needham-Schroeder-(Lowe) protocol}, journal = {J. Comput. Secur.}, volume = {13}, number = {3}, pages = {565--591}, year = {2005}, url = {https://doi.org/10.3233/jcs-2005-13307}, doi = {10.3233/JCS-2005-13307}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/Warinschi05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esop/CortierW05, author = {V{\'{e}}ronique Cortier and Bogdan Warinschi}, editor = {Shmuel Sagiv}, title = {Computationally Sound, Automated Proofs for Security Protocols}, booktitle = {Programming Languages and Systems, 14th European Symposium on Programming, {ESOP} 2005, Held as Part of the Joint European Conferences on Theory and Practice of Software, {ETAPS} 2005, Edinburgh, UK, April 4-8, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3444}, pages = {157--171}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-31987-0\_12}, doi = {10.1007/978-3-540-31987-0\_12}, timestamp = {Fri, 27 Jan 2023 15:04:25 +0100}, biburl = {https://dblp.org/rec/conf/esop/CortierW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/AbadiW05, author = {Mart{\'{\i}}n Abadi and Bogdan Warinschi}, editor = {Lu{\'{\i}}s Caires and Giuseppe F. Italiano and Lu{\'{\i}}s Monteiro and Catuscia Palamidessi and Moti Yung}, title = {Password-Based Encryption Analyzed}, booktitle = {Automata, Languages and Programming, 32nd International Colloquium, {ICALP} 2005, Lisbon, Portugal, July 11-15, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3580}, pages = {664--676}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11523468\_54}, doi = {10.1007/11523468\_54}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/icalp/AbadiW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pods/AbadiW05, author = {Mart{\'{\i}}n Abadi and Bogdan Warinschi}, editor = {Chen Li}, title = {Security analysis of cryptographically controlled access to {XML} documents}, booktitle = {Proceedings of the Twenty-fourth {ACM} {SIGACT-SIGMOD-SIGART} Symposium on Principles of Database Systems, June 13-15, 2005, Baltimore, Maryland, {USA}}, pages = {108--117}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1065167.1065182}, doi = {10.1145/1065167.1065182}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pods/AbadiW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/MicciancioW04, author = {Daniele Micciancio and Bogdan Warinschi}, title = {Completeness Theorems for the Abadi-Rogaway Language of Encrypted Expressions}, journal = {J. Comput. Secur.}, volume = {12}, number = {1}, pages = {99--130}, year = {2004}, url = {https://doi.org/10.3233/jcs-2004-12105}, doi = {10.3233/JCS-2004-12105}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcs/MicciancioW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/AbdallaW04, author = {Michel Abdalla and Bogdan Warinschi}, editor = {Javier L{\'{o}}pez and Sihan Qing and Eiji Okamoto}, title = {On the Minimal Assumptions of Group Signature Schemes}, booktitle = {Information and Communications Security, 6th International Conference, {ICICS} 2004, Malaga, Spain, October 27-29, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3269}, pages = {1--13}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30191-2\_1}, doi = {10.1007/978-3-540-30191-2\_1}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/AbdallaW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/CamenischKW04, author = {Jan Camenisch and Maciej Koprowski and Bogdan Warinschi}, editor = {Carlo Blundo and Stelvio Cimato}, title = {Efficient Blind Signatures Without Random Oracles}, booktitle = {Security in Communication Networks, 4th International Conference, {SCN} 2004, Amalfi, Italy, September 8-10, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3352}, pages = {134--148}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30598-9\_10}, doi = {10.1007/978-3-540-30598-9\_10}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/scn/CamenischKW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/MicciancioW04, author = {Daniele Micciancio and Bogdan Warinschi}, editor = {Moni Naor}, title = {Soundness of Formal Encryption in the Presence of Active Adversaries}, booktitle = {Theory of Cryptography, First Theory of Cryptography Conference, {TCC} 2004, Cambridge, MA, USA, February 19-21, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2951}, pages = {133--151}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24638-1\_8}, doi = {10.1007/978-3-540-24638-1\_8}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/MicciancioW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/Warinschi03, author = {Bogdan Warinschi}, title = {A Computational Analysis of the Needham-Schr{\"{o}}eder-(Lowe) Protocol}, booktitle = {16th {IEEE} Computer Security Foundations Workshop {(CSFW-16} 2003), 30 June - 2 July 2003, Pacific Grove, CA, {USA}}, pages = {248}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/CSFW.2003.1212717}, doi = {10.1109/CSFW.2003.1212717}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/Warinschi03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BellareMW03, author = {Mihir Bellare and Daniele Micciancio and Bogdan Warinschi}, editor = {Eli Biham}, title = {Foundations of Group Signatures: Formal Definitions, Simplified Requirements, and a Construction Based on General Assumptions}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2003, International Conference on the Theory and Applications of Cryptographic Techniques, Warsaw, Poland, May 4-8, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2656}, pages = {614--629}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-39200-9\_38}, doi = {10.1007/3-540-39200-9\_38}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BellareMW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoldyrevaPW03, author = {Alexandra Boldyreva and Adriana Palacio and Bogdan Warinschi}, title = {Secure Proxy Signature Schemes for Delegation of Signing Rights}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {96}, year = {2003}, url = {http://eprint.iacr.org/2003/096}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoldyrevaPW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issac/MicciancioW01, author = {Daniele Micciancio and Bogdan Warinschi}, editor = {Erich L. Kaltofen and Gilles Villard}, title = {A linear space algorithm for computing the herite normal form}, booktitle = {Proceedings of the 2001 International Symposium on Symbolic and Algebraic Computation, {ISSAC} 2001, {ORCCA} {\&} University of Western Ontario, London, Ontario, Canada, July 22-25, 2001}, pages = {231--236}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/384101.384133}, doi = {10.1145/384101.384133}, timestamp = {Mon, 03 Apr 2023 17:23:32 +0200}, biburl = {https://dblp.org/rec/conf/issac/MicciancioW01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/ECCC-TR00-074, author = {Daniele Micciancio and Bogdan Warinschi}, title = {A Linear Space Algorithm for Computing the Hermite Normal Form}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR00-074}}, year = {2000}, url = {https://eccc.weizmann.ac.il/eccc-reports/2000/TR00-074/index.html}, eprinttype = {ECCC}, eprint = {TR00-074}, timestamp = {Wed, 28 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/ECCC-TR00-074.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.