Secure Proxy Signatures Schemes for Delegation of Signing Rights
Alexandra Boldyreva, Adriana Palacio, and Bogdan Warinschi Journal of Cryptology
2011
A Composable Computational Soundness Notion
Veronique Cortier and Bogdan Warinschi CCS'11
Composability of Bellare-Rogaway Key Exchange Protocol
Christina Brzuska, Marc Fischlin, Bogdan Warinschi, and Stephen Williams
[ PDF |
BibTex ]
CCS'11
Security of the Enhanced TCG Privacy-CA Solution
Liqun Chen, Ming-Feng Lee, and Bogdan Warinschi Trustworthy Global Computing'11
Adapting Helios for Provable Ballot Secrecy
David Bernhard, Veronique Cortier, Oliver Perreira, Ben Smyth, and Bogdan Warinschi ESORICS'11
Security for Key Management Interfaces
Steve Kremer, Graham Steel, and Bogdan Warinschi CSF'11
Adaptive Pseudo-Free Groups and Applications
[ PDF |
BibTex ]
Dario Catalano, Dario Fiore, and Bogdan Warinschi Eurocrypt'11
Computationally Sound Analysis of Encrypting with Diffie Hellman Keys.
Emmanuel Bresson, Yassine Lacknech, Laurent Mazare, Bogdan Warinschi Chapter in Formal Models and Techniques for Analyzing Security Protocols.
A Survey of Symbolic Methods in Computational Analysis of
Cryptographic Systems.
[ PDF |
BibTex ]
Veronique Cortier, Steve Kremer, and Bogdan Warinschi Journal of Automated Reasoning.
2010
Security of the TCG Privacy CA solution
[ PDF |
BibTex ]
Liqun Chen and Bogdan Warinschi Symposium on Trusted Computing and Communication -- TurstCom'10.
Get Shorty via group signatures without encryption
[ PDF |
BibTex ]
Patrik Bichsel, Jan Camenisch, Gregory Neven, Nigel P. Smart, and Bogdan Warinschi Security and Cryptography for Networks -- SCN'10.
The Fiat--Shamir Transform for Group and Ring Signature Schemes
[ PDF |
BibTex ]
Ming Feng Lee and Nigel Smart and Bogdan Warinschi Security and Cryptography for Networks -- SCN'10.
Guessing Attacks and the Computational Soundness of Static Equivalence
[ PDF |
BibTex ]
Martin Abadi, Mathieu Baudet, and Bogdan Warinschi Journal of Computer Security.
The TLS Handshake Protocol: A Modular Analysis
[ PDF |
BibTex ]
Liqun Chen, Paul Morrissey, Nigel Smart, and Bogdan Warinschi Journal of Cryptology.
Groth-Sahai Proofs Revisited
[ PDF |
BibTex ]
E. Ghadafi, N.P. Smart, and B. Warinschi Conference on Practice and Theory in Public Key Cryptography -- PKC'10.
Robustness Guarantees for Anonymity
[ PDF |
BibTex ]
Gilles Barthe, Alejandro Hevia, Zhengqin Luo, Tamara Rezk, and
Bogdan Warinschi Computer Security Foundations Symposium -- CSF'10.
2009
Security Notions and Generic Constructions for Client Puzzles
[ PDF |
BibTex ]
Liqun Chen, Paul Morrissey, Nigel Smart, and Bogdan Warinschi Asiacrypt 2009.
Foundations of Non-Malleable Hash and One-Way Functions
[ PDF |
BibTex ]
Alexandra Boldyreva, David Cash, Marc Fischlin, and Bogdan Warinschi Asiacrypt 2009.
Practical Zero-Knowledge Proofs for Circuit Evaluation
[ PDF |
BibTex ]
Essam Ghadafi, Nigel Smart, and Bogdan Warinschi Cryptography and Coding 2009.
Identity Based Group Signatures from HIBE
[ PDF
| BibTex
]
Nigel Smart and Bogdan Warinschi Pairings 2009.
Certified Encrytpion Revisited
[ PDF
| BibTex
]
Pooya Farshim and Bogdan Warinschi Africacrypt 2009.
Hash Function Requirements for Schnorr Signatures
[ BibTex ]
Gregory Neven, Nigel Smart, and Bogdan Warinschi Journal of Mathematical Cryptology.
Separating Trace Mapping and Reactive Simulatability Soundness: The Case of Adaptive Corruption
[ PDF |
BibTex ]
Laurent Mazare and Bogdan Warinschi WITS-ARSPA'09.
2008
A modular security analysis of the TLS handshake protocol
[ PDF |
BibTex ]
Paul Morrisey, Nigel Smart, and Bogdan Warinschi ASIACRYPT'08
Security analysis of cryptographically controlled access to XML
documents
[ PDF |
BibTex ]
Martin Abadi and Bogdan Warinschi Journal of the ACM
2007
A Cryptographic Model for Branching Time Security Properties -- the Case of Contract Signing Protocols
[ PDF |
BibTex ]
Veronique Cortier, Ralf Kusters, and Bogdan Warinschi European Symposium Research Computer Security -- ESORICS'07
Synthesizing Secure Protocols
[ PDF |
BibTex ]
Veronique Cortier, Bogdan Warinschi, and Eugen Zalinescu European Symposium Research Computer Security -- ESORICS'07
A Generalization of DDH with Applications to Protocol Analysis and Computational Soundness
[ PDF |
BibTex ]
Emmanuel Bresson, Yassine Lakhnech, Laurent Mazare, and Bogdan Warinschi CRYPTO'07
A Closer Look at PKI: Security and Efficiency
[ PDF |
BibTex ]
Alexandra Boldyreva, Marc Fischlin, and Bogdan Warinschi Public Key Cryptography -- PKC'07
2006
Computationally Sound Symbolic Secrecy in the Presence of Hash Functions
[ PDF |
BibTex ]
Veronique Cortier, Steve Kremer, Ralf Kuesters and Bogdan Warinschi 26th Conference on Foundations of Software Technology and
Theoretical Computer Science -- FSTTCS'06
Explicit Randomness is not Necessary when Modeling Probabilistic Encryption
[ PDF |
BibTex ]
Veronique Cortier, Heinrich Hoerdegen and Bogdan Warinschi Workshop on Information and Computer Security -- ICS'06
Computationally Sound Compositional Logic for Key Exchange Protocols
[ PDF |
BibTex ]
Anupam Datta, Ante Derek, John Mitchell and Bogdan Warinschi Computer Security Foundations Workshop -- CSFW'06
Guessing Attacks and the Computational Soundness of Static
Equivalence
[ PDF |
BibTex ]
Martin Abadi, Mathieu Baudet and Bogdan Warinschi Foundations of Software Science and Computational Structures -- FOSSACS'06
2005
A Computational Analysis of the Needham Schroder Lowe Protocol Bogdan Warinschi Journal of Computer Security;
Password-based Encryption Analyzed
[ PDF |
BibTex ]
Martin Abadi, Bogdan Warinschi Internation Colloqium on Automata, Languages and Programming -- ICALP'05;
Security Analysis of Cryptographically Controlled Access to XML
Documents
[ PDF |
BibTex ]
Martin Abadi, Bogdan Warinschi Symposium on Principles of Database Systems -- PODS'05; (Best newcommer paper award).
Computationally Sound, Automated Proofs for Security Protocols
[ PDF |
BibTex ]
Veronique Cortier, Bogdan Warinschi 14th European Symposium on Programming Languages -- ESOP'05;
2004
Efficient Blind Signatures without Random Oracles
[ PDF |
BibTex ]
Jan Camenisch, Maciej Koprowski, Bogdan Warinschi In Fourth Conference on Security in Communication Networks -- SCN'04,
Amalfi, Itali, September 8-10, 2004
On the Minimal Assumptions for Group Signatures
[ PDF |
BibTex ]
Michel Abdalla, Bogdan Warinschi Internation Conference on Information and Communications Security --
ICICS'04
Completeness Theorems for the Abadi-Rogaway Logic of
Encrypted Expressions
[
PDF | BibTex
]
Daniele Micciancio, Bogdan Warinschi Journal of Computer Security,
Soundness of Formal Encryption in the Presence of Active
Adversaries
[
PDF |
BibTex
]
Daniele Micciancio, Bogdan Warinschi Theory of Cryptography Conference -- TCC'04.
Before 2003
A Computational Analysis of the Needham-Schroeder
protocol
[
PDF |
BibTex
] Bogdan Warinschi Computer Science Foundation Workshop -- CSFW'03.
Foundations for Group Signatures: Simplified Requirements
and a Construction Based on General Assumptions
[
PDF |
BibTex
] Mihir Bellare, Daniele Micciancio, and Bogdan Warinschi ]
EUROCRYPT 2003
Completeness Theorems for the Abadi-Rogaway Logic of Encrypted Expressions
[
PDF | BibTex
] Daniele Micciancio, Bogdan Warinschi Workshop on Issues in the Theory of Security -- WITS'02
A Linear Space Algorithm for Computing the Hermite Normal
Form
[
PDF |
BibTex
] Daniele Micciancio, Bogdan Warinschi International Symposium on Symbolic Algebraic Computation -- ISSAC'01
An Overview of the Tatami Project
[
PDF
]
Joseph Goguen, Kai Lin, Grigore Rosu, Akira Mori, Bogdan
Warinschi In Cafe: An Industrial-Strength Algebraic Formal Method , edited
by Kokichi Futatsugi, Tetsuo Tamai and Ataru Nakagawa, Elsevier,
2000.
Timed Frame Models for Discrete Time Process Algebra
[
PDF
]
Jan Bergstra and Kees
Middelburg ] UNU/IIST Technical Report no. 100.
Secure Proxy Signing for Delegation of Rights
[
PDF ]
Alexandra Boldyreva, Adriana Palacio, Bogdan Warinschi ePrint ACR ePrint Archive 2003/096