Bogdan Warinschi
Orcid: 0000-0003-3396-8870
According to our database1,
Bogdan Warinschi
authored at least 95 papers
between 2000 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
Falsifiability, Composability, and Comparability of Game-Based Security Models for Key Exchange Protocols.
Proceedings of the Information Security in a Connected World, 2025
2024
IACR Cryptol. ePrint Arch., 2024
2023
Proceedings of the 2023 USENIX Annual Technical Conference, 2023
2022
Proceedings of the Provable and Practical Security, 2022
Proceedings of the Public-Key Cryptography - PKC 2022, 2022
2021
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021
2020
IACR Cryptol. ePrint Arch., 2020
Proceedings of the 33rd IEEE Computer Security Foundations Symposium, 2020
Proceedings of the 33rd IEEE Computer Security Foundations Symposium, 2020
2019
Efficient Function-Hiding Functional Encryption: From Inner-Products to Orthogonality.
Proceedings of the Topics in Cryptology - CT-RSA 2019, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
Proceedings of the Applied Cryptography and Network Security, 2019
2018
Safe cryptography for all: towards visual metaphor driven cryptography building blocks.
Proceedings of the 1st International Workshop on Security Awareness from Design to Deployment, 2018
Machine-Checked Proofs for Electronic Voting: Privacy and Verifiability for Belenios.
Proceedings of the 31st IEEE Computer Security Foundations Symposium, 2018
2017
Proceedings of the Theory of Cryptography - 15th International Conference, 2017
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017
Proceedings of the Information Security - 20th International Conference, 2017
Proceedings of the Financial Cryptography and Data Security, 2017
Proceedings of the 30th IEEE Computer Security Foundations Symposium, 2017
Proceedings of the Applied Cryptography and Network Security, 2017
2016
Proceedings of the IEEE Symposium on Security and Privacy, 2016
Proceedings of the Security and Cryptography for Networks - 10th International Conference, 2016
Proceedings of the Provable Security, 2016
Proceedings of the Public-Key Cryptography - PKC 2016, 2016
Proceedings of the IEEE European Symposium on Security and Privacy, 2016
Proceedings of the IEEE 29th Computer Security Foundations Symposium, 2016
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016
2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015
Proceedings of the Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30, 2015
Proceedings of the IEEE 28th Computer Security Foundations Symposium, 2015
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015
2014
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014
2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the Foundations of Security Analysis and Design VII, 2013
Proceedings of the 2013 IEEE 26th Computer Security Foundations Symposium, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
2012
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the Public Key Cryptography - PKC 2012, 2012
Proceedings of the Information Security - 15th International Conference, 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
How Not to Prove Yourself: Pitfalls of the Fiat-Shamir Heuristic and Applications to Helios.
Proceedings of the Advances in Cryptology - ASIACRYPT 2012, 2012
2011
J. Autom. Reason., 2011
IACR Cryptol. ePrint Arch., 2011
Proceedings of the Trustworthy Global Computing - 6th International Symposium, 2011
Proceedings of the Advances in Cryptology - EUROCRYPT 2011, 2011
Proceedings of the Computer Security - ESORICS 2011, 2011
Proceedings of the 24th IEEE Computer Security Foundations Symposium, 2011
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
Proceedings of the Formal Models and Techniques for Analyzing Security Protocols, 2011
2010
Proceedings of the Security and Cryptography for Networks, 7th International Conference, 2010
Proceedings of the Security and Cryptography for Networks, 7th International Conference, 2010
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010
Proceedings of the 23rd IEEE Computer Security Foundations Symposium, 2010
2009
Proceedings of the Provable Security, Third International Conference, 2009
Proceedings of the Pairing-Based Cryptography, 2009
Proceedings of the Cryptography and Coding, 2009
Separating Trace Mapping and Reactive Simulatability Soundness: The Case of Adaptive Corruption.
Proceedings of the Foundations and Applications of Security Analysis, 2009
Proceedings of the Advances in Cryptology, 2009
Proceedings of the Advances in Cryptology, 2009
2008
Proceedings of the Advances in Cryptology, 2008
2007
Proceedings of the Public Key Cryptography, 2007
A Cryptographic Model for Branching Time Security Properties - The Case of Contract Signing Protocols.
Proceedings of the Computer Security, 2007
A Generalization of DDH with Applications to Protocol Analysis and Computational Soundness.
Proceedings of the Advances in Cryptology, 2007
2006
IACR Cryptol. ePrint Arch., 2006
Proceedings of the First Workshop in Information and Computer Security, 2006
Proceedings of the FSTTCS 2006: Foundations of Software Technology and Theoretical Computer Science, 2006
Proceedings of the Foundations of Software Science and Computation Structures, 2006
Proceedings of the 19th IEEE Computer Security Foundations Workshop, 2006
2005
Proceedings of the Twenty-fourth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, 2005
Proceedings of the Automata, Languages and Programming, 32nd International Colloquium, 2005
Proceedings of the Programming Languages and Systems, 2005
2004
J. Comput. Secur., 2004
Proceedings of the Theory of Cryptography, First Theory of Cryptography Conference, 2004
Proceedings of the Security in Communication Networks, 4th International Conference, 2004
Proceedings of the Information and Communications Security, 6th International Conference, 2004
2003
IACR Cryptol. ePrint Arch., 2003
Foundations of Group Signatures: Formal Definitions, Simplified Requirements, and a Construction Based on General Assumptions.
Proceedings of the Advances in Cryptology, 2003
Proceedings of the 16th IEEE Computer Security Foundations Workshop (CSFW-16 2003), 30 June, 2003
2001
Proceedings of the 2001 International Symposium on Symbolic and Algebraic Computation, 2001
2000
Electron. Colloquium Comput. Complex., 2000