Warinschi, Bogdan
102  results:
Search for persons X
?
1

Lifting Standard Model Reductions to Common Setup Assumptio..:

, In: Public-Key Cryptography – PKC 2022; Lecture Notes in Computer Science,
 
?
2

Cryptographic Role-Based Access Control, Reconsidered:

, In: Provable and Practical Security; Lecture Notes in Computer Science,
Liu, Bin ; Michalas, Antonis ; Warinschi, Bogdan - p. 282-289 , 2022
 
?
3

Provable Security Analysis of FIDO2:

, In: Advances in Cryptology – CRYPTO 2021; Lecture Notes in Computer Science,
 
?
4

Fifty Shades of Ballot Privacy: Privacy against a Malicious..:

, In: 2020 IEEE 33rd Computer Security Foundations Symposium (CSF),
 
?
5

Authentication in Key-Exchange: Definitions, Relations and ..:

, In: 2020 IEEE 33rd Computer Security Foundations Symposium (CSF),
 
?
6

Masking Fuzzy-Searchable Public Databases:

, In: Applied Cryptography and Network Security; Lecture Notes in Computer Science,
 
?
7

Efficient Function-Hiding Functional Encryption: From Inner..:

, In: Topics in Cryptology – CT-RSA 2019; Lecture Notes in Computer Science,
 
?
8

Encrypted Databases : New Volume Attacks against Range Q..:

, In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security,
 
?
9

Safe cryptography for all : towards visual metaphor driv..:

, In: Proceedings of the 1st International Workshop on Security Awareness from Design to Deployment,
 
?
10

How to build time-lock encryption:

Liu, Jia ; Jager, Tibor ; Kakvi, Saqib A..
Designs, Codes and Cryptography.  86 (2018)  11 - p. 2549-2586 , 2018
 
?
11

Criteria-Based Encryption:

Phuong, Tran Viet Xuan ; Yang, Guomin ; Susilo, Willy.
The Computer Journal.  61 (2017)  4 - p. 512-525 , 2017
 
?
13

Anonymity guarantees of the UMTS/LTE authentication and con..:

Lee, Ming-Feng ; Smart, Nigel P. ; Warinschi, Bogdan.
International Journal of Information Security.  13 (2014)  6 - p. 513-527 , 2014
 
?
15

Deduction soundness : prove one, get five for free:

, In: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security,
 
1-15