BibTeX records: Bogdan Warinschi

download as .bib file

@article{DBLP:journals/popets/GuiPPW24,
  author       = {Zichen Gui and
                  Kenneth G. Paterson and
                  Sikhar Patranabis and
                  Bogdan Warinschi},
  title        = {SWiSSSE: System-Wide Security for Searchable Symmetric Encryption},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2024},
  number       = {1},
  pages        = {549--581},
  year         = {2024},
  url          = {https://doi.org/10.56553/popets-2024-0032},
  doi          = {10.56553/POPETS-2024-0032},
  timestamp    = {Wed, 29 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/popets/GuiPPW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/usenix/ArutyunyanBBDDE23,
  author       = {Maksym Arutyunyan and
                  Andriy Berestovskyy and
                  Adam Bratschi{-}Kaye and
                  Ulan Degenbaev and
                  Manu Drijvers and
                  Islam El{-}Ashi and
                  Stefan Kaestle and
                  Roman Kashitsyn and
                  Maciej Kot and
                  Yvonne{-}Anne Pignolet and
                  Rostislav Rumenov and
                  Dimitris Sarlis and
                  Alin Sinpalean and
                  Alexandru Uta and
                  Bogdan Warinschi and
                  Alexandra Zapuc},
  editor       = {Julia Lawall and
                  Dan Williams},
  title        = {Decentralized and Stateful Serverless Computing on the Internet Computer
                  Blockchain},
  booktitle    = {2023 {USENIX} Annual Technical Conference, {USENIX} {ATC} 2023, Boston,
                  MA, USA, July 10-12, 2023},
  pages        = {329--343},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/atc23/presentation/arutyunyan},
  timestamp    = {Sat, 15 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/usenix/ArutyunyanBBDDE23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/0001TW22,
  author       = {Ngoc Khanh Nguyen and
                  Eftychios Theodorakis and
                  Bogdan Warinschi},
  editor       = {Goichiro Hanaoka and
                  Junji Shikata and
                  Yohei Watanabe},
  title        = {Lifting Standard Model Reductions to Common Setup Assumptions},
  booktitle    = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Virtual Event,
                  March 8-11, 2022, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13178},
  pages        = {130--160},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-97131-1\_5},
  doi          = {10.1007/978-3-030-97131-1\_5},
  timestamp    = {Thu, 10 Mar 2022 11:26:10 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/0001TW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/LiuMW22,
  author       = {Bin Liu and
                  Antonis Michalas and
                  Bogdan Warinschi},
  editor       = {Chunpeng Ge and
                  Fuchun Guo},
  title        = {Cryptographic Role-Based Access Control, Reconsidered},
  booktitle    = {Provable and Practical Security - 16th International Conference, ProvSec
                  2022, Nanjing, China, November 11-12, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13600},
  pages        = {282--289},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-20917-8\_19},
  doi          = {10.1007/978-3-031-20917-8\_19},
  timestamp    = {Sun, 13 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/provsec/LiuMW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuMW22,
  author       = {Bin Liu and
                  Antonis Michalas and
                  Bogdan Warinschi},
  title        = {Cryptographic Role-Based Access Control, Reconsidered},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1268},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1268},
  timestamp    = {Sat, 22 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuMW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BarbosaBCW21,
  author       = {Manuel Barbosa and
                  Alexandra Boldyreva and
                  Shan Chen and
                  Bogdan Warinschi},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Provable Security Analysis of {FIDO2}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12827},
  pages        = {125--156},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84252-9\_5},
  doi          = {10.1007/978-3-030-84252-9\_5},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/BarbosaBCW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NguyenTW21,
  author       = {Ngoc Khanh Nguyen and
                  Eftychios Theodorakis and
                  Bogdan Warinschi},
  title        = {Lifting Standard Model Reductions to Common Setup Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {888},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/888},
  timestamp    = {Wed, 07 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NguyenTW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/CortierLW20,
  author       = {V{\'{e}}ronique Cortier and
                  Joseph Lallemand and
                  Bogdan Warinschi},
  title        = {Fifty Shades of Ballot Privacy: Privacy against a Malicious Board},
  booktitle    = {33rd {IEEE} Computer Security Foundations Symposium, {CSF} 2020, Boston,
                  MA, USA, June 22-26, 2020},
  pages        = {17--32},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CSF49147.2020.00010},
  doi          = {10.1109/CSF49147.2020.00010},
  timestamp    = {Mon, 10 Aug 2020 18:44:11 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/CortierLW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/GuilhemFW20,
  author       = {Cyprien Delpech de Saint Guilhem and
                  Marc Fischlin and
                  Bogdan Warinschi},
  title        = {Authentication in Key-Exchange: Definitions, Relations and Composition},
  booktitle    = {33rd {IEEE} Computer Security Foundations Symposium, {CSF} 2020, Boston,
                  MA, USA, June 22-26, 2020},
  pages        = {288--303},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CSF49147.2020.00028},
  doi          = {10.1109/CSF49147.2020.00028},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/GuilhemFW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CortierLW20,
  author       = {V{\'{e}}ronique Cortier and
                  Joseph Lallemand and
                  Bogdan Warinschi},
  title        = {Fifty Shades of Ballot Privacy: Privacy against a Malicious Board},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {127},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/127},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CortierLW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenBBW20,
  author       = {Shan Chen and
                  Manuel Barbosa and
                  Alexandra Boldyreva and
                  Bogdan Warinschi},
  title        = {Provable Security Analysis of {FIDO2}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {756},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/756},
  timestamp    = {Tue, 30 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenBBW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuiPPW20,
  author       = {Zichen Gui and
                  Kenneth G. Paterson and
                  Sikhar Patranabis and
                  Bogdan Warinschi},
  title        = {SWiSSSE: System-Wide Security for Searchable Symmetric Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1328},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1328},
  timestamp    = {Fri, 30 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/GuiPPW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/BoldyrevaTW19,
  author       = {Alexandra Boldyreva and
                  Tianxin Tang and
                  Bogdan Warinschi},
  editor       = {Robert H. Deng and
                  Val{\'{e}}rie Gauthier{-}Uma{\~{n}}a and
                  Mart{\'{\i}}n Ochoa and
                  Moti Yung},
  title        = {Masking Fuzzy-Searchable Public Databases},
  booktitle    = {Applied Cryptography and Network Security - 17th International Conference,
                  {ACNS} 2019, Bogota, Colombia, June 5-7, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11464},
  pages        = {571--591},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-21568-2\_28},
  doi          = {10.1007/978-3-030-21568-2\_28},
  timestamp    = {Wed, 29 May 2019 12:25:55 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/BoldyrevaTW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GuiJW19,
  author       = {Zichen Gui and
                  Oliver Johnson and
                  Bogdan Warinschi},
  editor       = {Lorenzo Cavallaro and
                  Johannes Kinder and
                  XiaoFeng Wang and
                  Jonathan Katz},
  title        = {Encrypted Databases: New Volume Attacks against Range Queries},
  booktitle    = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2019, London, UK, November 11-15, 2019},
  pages        = {361--378},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3319535.3363210},
  doi          = {10.1145/3319535.3363210},
  timestamp    = {Tue, 10 Nov 2020 20:00:36 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/GuiJW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/BarbosaCSW19,
  author       = {Manuel Barbosa and
                  Dario Catalano and
                  Azam Soleimanian and
                  Bogdan Warinschi},
  editor       = {Mitsuru Matsui},
  title        = {Efficient Function-Hiding Functional Encryption: From Inner-Products
                  to Orthogonality},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2019 - The Cryptographers' Track at
                  the {RSA} Conference 2019, San Francisco, CA, USA, March 4-8, 2019,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11405},
  pages        = {127--148},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-12612-4\_7},
  doi          = {10.1007/978-3-030-12612-4\_7},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/BarbosaCSW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoldyrevaTW19,
  author       = {Alexandra Boldyreva and
                  Tianxin Tang and
                  Bogdan Warinschi},
  title        = {Masking Fuzzy-Searchable Public Databases},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {434},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/434},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoldyrevaTW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuiJW19,
  author       = {Zichen Gui and
                  Oliver Johnson and
                  Bogdan Warinschi},
  title        = {Encrypted Databases: New Volume Attacks against Range Queries},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1198},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1198},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GuiJW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuilhemFW19,
  author       = {Cyprien Delpech de Saint Guilhem and
                  Marc Fischlin and
                  Bogdan Warinschi},
  title        = {Authentication in Key-Exchange: Definitions, Relations and Composition},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1203},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1203},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GuilhemFW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LiuJKW18,
  author       = {Jia Liu and
                  Tibor Jager and
                  Saqib A. Kakvi and
                  Bogdan Warinschi},
  title        = {How to build time-lock encryption},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {11},
  pages        = {2549--2586},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-018-0461-x},
  doi          = {10.1007/S10623-018-0461-X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LiuJKW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/CortierDDW18,
  author       = {V{\'{e}}ronique Cortier and
                  Constantin Catalin Dragan and
                  Fran{\c{c}}ois Dupressoir and
                  Bogdan Warinschi},
  title        = {Machine-Checked Proofs for Electronic Voting: Privacy and Verifiability
                  for Belenios},
  booktitle    = {31st {IEEE} Computer Security Foundations Symposium, {CSF} 2018, Oxford,
                  United Kingdom, July 9-12, 2018},
  pages        = {298--312},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/CSF.2018.00029},
  doi          = {10.1109/CSF.2018.00029},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/CortierDDW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/LindenRWW18,
  author       = {Dirk van der Linden and
                  Awais Rashid and
                  Emma J. Williams and
                  Bogdan Warinschi},
  editor       = {Mehdi Mirakhorli and
                  Matthias Galster},
  title        = {Safe cryptography for all: towards visual metaphor driven cryptography
                  building blocks},
  booktitle    = {Proceedings of the 1st International Workshop on Security Awareness
                  from Design to Deployment, SEAD@ICSE 2018, Gothenburg, Sweden, May
                  27, 2018},
  pages        = {41--44},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3194707.3194709},
  doi          = {10.1145/3194707.3194709},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icse/LindenRWW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernhardCGTW18,
  author       = {David Bernhard and
                  V{\'{e}}ronique Cortier and
                  Pierrick Gaudry and
                  Mathieu Turuani and
                  Bogdan Warinschi},
  title        = {Verifiability Analysis of CHVote},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1052},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1052},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernhardCGTW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/BernhardNW17,
  author       = {David Bernhard and
                  Ngoc Khanh Nguyen and
                  Bogdan Warinschi},
  editor       = {Dieter Gollmann and
                  Atsuko Miyaji and
                  Hiroaki Kikuchi},
  title        = {Adaptive Proofs Have Straightline Extractors (in the Random Oracle
                  Model)},
  booktitle    = {Applied Cryptography and Network Security - 15th International Conference,
                  {ACNS} 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10355},
  pages        = {336--353},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-61204-1\_17},
  doi          = {10.1007/978-3-319-61204-1\_17},
  timestamp    = {Tue, 07 May 2024 20:12:06 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/BernhardNW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/ChevalCW17,
  author       = {Vincent Cheval and
                  V{\'{e}}ronique Cortier and
                  Bogdan Warinschi},
  title        = {Secure Composition of PKIs with Public Key Protocols},
  booktitle    = {30th {IEEE} Computer Security Foundations Symposium, {CSF} 2017, Santa
                  Barbara, CA, USA, August 21-25, 2017},
  pages        = {144--158},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/CSF.2017.28},
  doi          = {10.1109/CSF.2017.28},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/ChevalCW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/BahmaniBBPSSW17,
  author       = {Raad Bahmani and
                  Manuel Barbosa and
                  Ferdinand Brasser and
                  Bernardo Portela and
                  Ahmad{-}Reza Sadeghi and
                  Guillaume Scerri and
                  Bogdan Warinschi},
  editor       = {Aggelos Kiayias},
  title        = {Secure Multiparty Computation from {SGX}},
  booktitle    = {Financial Cryptography and Data Security - 21st International Conference,
                  {FC} 2017, Sliema, Malta, April 3-7, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10322},
  pages        = {477--497},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70972-7\_27},
  doi          = {10.1007/978-3-319-70972-7\_27},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/BahmaniBBPSSW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/GuilhemSW17,
  author       = {Cyprien de Saint Guilhem and
                  Nigel P. Smart and
                  Bogdan Warinschi},
  editor       = {Phong Q. Nguyen and
                  Jianying Zhou},
  title        = {Generic Forward-Secure Key Agreement Without Signatures},
  booktitle    = {Information Security - 20th International Conference, {ISC} 2017,
                  Ho Chi Minh City, Vietnam, November 22-24, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10599},
  pages        = {114--133},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-69659-1\_7},
  doi          = {10.1007/978-3-319-69659-1\_7},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/GuilhemSW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/CortierDDSSW17,
  author       = {V{\'{e}}ronique Cortier and
                  Constantin Catalin Dragan and
                  Fran{\c{c}}ois Dupressoir and
                  Benedikt Schmidt and
                  Pierre{-}Yves Strub and
                  Bogdan Warinschi},
  title        = {Machine-Checked Proofs of Privacy for Electronic Voting Protocols},
  booktitle    = {2017 {IEEE} Symposium on Security and Privacy, {SP} 2017, San Jose,
                  CA, USA, May 22-26, 2017},
  pages        = {993--1008},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/SP.2017.28},
  doi          = {10.1109/SP.2017.28},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/CortierDDSSW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/JagerSSW17,
  author       = {Tibor Jager and
                  Martijn Stam and
                  Ryan Stanley{-}Oakes and
                  Bogdan Warinschi},
  editor       = {Yael Kalai and
                  Leonid Reyzin},
  title        = {Multi-key Authenticated Encryption with Corruptions: Reductions Are
                  Lossy},
  booktitle    = {Theory of Cryptography - 15th International Conference, {TCC} 2017,
                  Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10677},
  pages        = {409--441},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70500-2\_14},
  doi          = {10.1007/978-3-319-70500-2\_14},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/JagerSSW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JagerSSW17,
  author       = {Tibor Jager and
                  Martijn Stam and
                  Ryan Stanley{-}Oakes and
                  Bogdan Warinschi},
  title        = {Multi-Key Authenticated Encryption with Corruptions: Reductions are
                  Lossy},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {495},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/495},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JagerSSW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuilhemSW17,
  author       = {Cyprien de Saint Guilhem and
                  Nigel P. Smart and
                  Bogdan Warinschi},
  title        = {Generic Forward-Secure Key Agreement Without Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {853},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/853},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GuilhemSW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/BernhardFW16,
  author       = {David Bernhard and
                  Marc Fischlin and
                  Bogdan Warinschi},
  title        = {Adaptive proofs of knowledge in the random oracle model},
  journal      = {{IET} Inf. Secur.},
  volume       = {10},
  number       = {6},
  pages        = {319--331},
  year         = {2016},
  url          = {https://doi.org/10.1049/iet-ifs.2015.0506},
  doi          = {10.1049/IET-IFS.2015.0506},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/BernhardFW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ShrimptonSW16,
  author       = {Thomas Shrimpton and
                  Martijn Stam and
                  Bogdan Warinschi},
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {A Modular Treatment of Cryptographic APIs: The Symmetric-Key Case},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9814},
  pages        = {277--307},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53018-4\_11},
  doi          = {10.1007/978-3-662-53018-4\_11},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/ShrimptonSW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/CosteaW16,
  author       = {Sergiu Costea and
                  Bogdan Warinschi},
  title        = {Secure Software Licensing: Models, Constructions, and Proofs},
  booktitle    = {{IEEE} 29th Computer Security Foundations Symposium, {CSF} 2016, Lisbon,
                  Portugal, June 27 - July 1, 2016},
  pages        = {31--44},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/CSF.2016.10},
  doi          = {10.1109/CSF.2016.10},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/CosteaW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/BarbosaPSW16,
  author       = {Manuel Barbosa and
                  Bernardo Portela and
                  Guillaume Scerri and
                  Bogdan Warinschi},
  title        = {Foundations of Hardware-Based Attested Computation and Application
                  to {SGX}},
  booktitle    = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2016, Saarbr{\"{u}}cken, Germany, March 21-24, 2016},
  pages        = {245--260},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/EuroSP.2016.28},
  doi          = {10.1109/EUROSP.2016.28},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/BarbosaPSW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BernhardFW16,
  author       = {David Bernhard and
                  Marc Fischlin and
                  Bogdan Warinschi},
  editor       = {Chen{-}Mou Cheng and
                  Kai{-}Min Chung and
                  Giuseppe Persiano and
                  Bo{-}Yin Yang},
  title        = {On the Hardness of Proving CCA-Security of Signed ElGamal},
  booktitle    = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan,
                  March 6-9, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9614},
  pages        = {47--69},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49384-7\_3},
  doi          = {10.1007/978-3-662-49384-7\_3},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/BernhardFW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/LiuW16,
  author       = {Bin Liu and
                  Bogdan Warinschi},
  editor       = {Liqun Chen and
                  Jinguang Han},
  title        = {Universally Composable Cryptographic Role-Based Access Control},
  booktitle    = {Provable Security - 10th International Conference, ProvSec 2016, Nanjing,
                  China, November 10-11, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10005},
  pages        = {61--80},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-47422-9\_4},
  doi          = {10.1007/978-3-319-47422-9\_4},
  timestamp    = {Wed, 14 Jul 2021 15:56:25 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/LiuW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/BoldyrevaKLW16,
  author       = {Alexandra Boldyreva and
                  Taesoo Kim and
                  Richard J. Lipton and
                  Bogdan Warinschi},
  editor       = {Vassilis Zikas and
                  Roberto De Prisco},
  title        = {Provably-Secure Remote Memory Attestation for Heap Overflow Protection},
  booktitle    = {Security and Cryptography for Networks - 10th International Conference,
                  {SCN} 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9841},
  pages        = {83--103},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-44618-9\_5},
  doi          = {10.1007/978-3-319-44618-9\_5},
  timestamp    = {Thu, 23 Jun 2022 19:58:57 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/BoldyrevaKLW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/FischlinGSW16,
  author       = {Marc Fischlin and
                  Felix G{\"{u}}nther and
                  Benedikt Schmidt and
                  Bogdan Warinschi},
  title        = {Key Confirmation in Key Exchange: {A} Formal Treatment and Implications
                  for {TLS} 1.3},
  booktitle    = {{IEEE} Symposium on Security and Privacy, {SP} 2016, San Jose, CA,
                  USA, May 22-26, 2016},
  pages        = {452--469},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SP.2016.34},
  doi          = {10.1109/SP.2016.34},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/FischlinGSW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BarbosaPSW16,
  author       = {Manuel Barbosa and
                  Bernardo Portela and
                  Guillaume Scerri and
                  Bogdan Warinschi},
  title        = {Foundations of Hardware-Based Attested Computation and Application
                  to {SGX}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {14},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/014},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BarbosaPSW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ShrimptonSW16,
  author       = {Thomas Shrimpton and
                  Martijn Stam and
                  Bogdan Warinschi},
  title        = {A Modular Treatment of Cryptographic APIs: The Symmetric-Key Case},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {586},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/586},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ShrimptonSW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernhardCPSW16,
  author       = {David Bernhard and
                  V{\'{e}}ronique Cortier and
                  Olivier Pereira and
                  Ben Smyth and
                  Bogdan Warinschi},
  title        = {Adapting Helios for provable ballot privacy},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {756},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/756},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernhardCPSW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernhardW16,
  author       = {David Bernhard and
                  Bogdan Warinschi},
  title        = {Cryptographic Voting - {A} Gentle Introduction},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {765},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/765},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernhardW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernhardPW16,
  author       = {David Bernhard and
                  Olivier Pereira and
                  Bogdan Warinschi},
  title        = {How not to Prove Yourself: Pitfalls of the Fiat-Shamir Heuristic and
                  Applications to Helios},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {771},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/771},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernhardPW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuW16,
  author       = {Bin Liu and
                  Bogdan Warinschi},
  title        = {Universally Composable Cryptographic Role-Based Access Control},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {902},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/902},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BahmaniBBPSSW16,
  author       = {Raad Bahmani and
                  Manuel Barbosa and
                  Ferdinand Brasser and
                  Bernardo Portela and
                  Ahmad{-}Reza Sadeghi and
                  Guillaume Scerri and
                  Bogdan Warinschi},
  title        = {Secure Multiparty Computation from {SGX}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1057},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1057},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BahmaniBBPSSW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/HazayPW15,
  author       = {Carmit Hazay and
                  Arpita Patra and
                  Bogdan Warinschi},
  editor       = {Tetsu Iwata and
                  Jung Hee Cheon},
  title        = {Selective Opening Security for Receivers},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Auckland, New Zealand, November 29 - December 3, 2015, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9452},
  pages        = {443--469},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48797-6\_19},
  doi          = {10.1007/978-3-662-48797-6\_19},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/HazayPW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/FerraraFLW15,
  author       = {Anna Lisa Ferrara and
                  Georg Fuchsbauer and
                  Bin Liu and
                  Bogdan Warinschi},
  editor       = {C{\'{e}}dric Fournet and
                  Michael W. Hicks and
                  Luca Vigan{\`{o}}},
  title        = {Policy Privacy in Cryptographic Access Control},
  booktitle    = {{IEEE} 28th Computer Security Foundations Symposium, {CSF} 2015, Verona,
                  Italy, 13-17 July, 2015},
  pages        = {46--60},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/CSF.2015.11},
  doi          = {10.1109/CSF.2015.11},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/FerraraFLW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BernhardFW15,
  author       = {David Bernhard and
                  Marc Fischlin and
                  Bogdan Warinschi},
  editor       = {Jonathan Katz},
  title        = {Adaptive Proofs of Knowledge in the Random Oracle Model},
  booktitle    = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD,
                  USA, March 30 - April 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9020},
  pages        = {629--649},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46447-2\_28},
  doi          = {10.1007/978-3-662-46447-2\_28},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/BernhardFW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/BernhardCGPW15,
  author       = {David Bernhard and
                  V{\'{e}}ronique Cortier and
                  David Galindo and
                  Olivier Pereira and
                  Bogdan Warinschi},
  title        = {SoK: {A} Comprehensive Analysis of Game-Based Ballot Privacy Definitions},
  booktitle    = {2015 {IEEE} Symposium on Security and Privacy, {SP} 2015, San Jose,
                  CA, USA, May 17-21, 2015},
  pages        = {499--516},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/SP.2015.37},
  doi          = {10.1109/SP.2015.37},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/BernhardCGPW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernhardCGPW15,
  author       = {David Bernhard and
                  V{\'{e}}ronique Cortier and
                  David Galindo and
                  Olivier Pereira and
                  Bogdan Warinschi},
  title        = {A comprehensive analysis of game-based ballot privacy definitions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {255},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/255},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernhardCGPW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuGR15,
  author       = {Jia Liu and
                  Saqib A. Kakvi and
                  Bogdan Warinschi},
  title        = {Extractable Witness Encryption and Timed-Release Encryption from Bitcoin},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {482},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/482},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuGR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernhardFW15,
  author       = {David Bernhard and
                  Marc Fischlin and
                  Bogdan Warinschi},
  title        = {Adaptive Proofs of Knowledge in the Random Oracle Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {648},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/648},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernhardFW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernhardFW15a,
  author       = {David Bernhard and
                  Marc Fischlin and
                  Bogdan Warinschi},
  title        = {On the Hardness of Proving CCA-security of Signed ElGamal},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {649},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/649},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernhardFW15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernhardW15,
  author       = {David Bernhard and
                  Bogdan Warinschi},
  title        = {On Limitations of the Fiat{\-} - Shamir Transformation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {712},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/712},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernhardW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoldyrevaKLW15,
  author       = {Alexandra Boldyreva and
                  Taesoo Kim and
                  Richard J. Lipton and
                  Bogdan Warinschi},
  title        = {Towards Provably-Secure Remote Memory Attestation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {729},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/729},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoldyrevaKLW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HazayPW15,
  author       = {Carmit Hazay and
                  Arpita Patra and
                  Bogdan Warinschi},
  title        = {Selective Opening Security for Receivers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {860},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/860},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HazayPW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/GrozaW14,
  author       = {Bogdan Groza and
                  Bogdan Warinschi},
  title        = {Cryptographic puzzles and DoS resilience, revisited},
  journal      = {Des. Codes Cryptogr.},
  volume       = {73},
  number       = {1},
  pages        = {177--207},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10623-013-9816-5},
  doi          = {10.1007/S10623-013-9816-5},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/GrozaW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/LeeSWW14,
  author       = {Ming{-}Feng Lee and
                  Nigel P. Smart and
                  Bogdan Warinschi and
                  Gaven J. Watson},
  title        = {Anonymity guarantees of the {UMTS/LTE} authentication and connection
                  protocol},
  journal      = {Int. J. Inf. Sec.},
  volume       = {13},
  number       = {6},
  pages        = {513--527},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10207-014-0231-3},
  doi          = {10.1007/S10207-014-0231-3},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/LeeSWW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CatalanoFW14,
  author       = {Dario Catalano and
                  Dario Fiore and
                  Bogdan Warinschi},
  editor       = {Juan A. Garay and
                  Rosario Gennaro},
  title        = {Homomorphic Signatures with Efficient Verification for Polynomial
                  Functions},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8616},
  pages        = {371--389},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44371-2\_21},
  doi          = {10.1007/978-3-662-44371-2\_21},
  timestamp    = {Thu, 06 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CatalanoFW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CatalanoFW14,
  author       = {Dario Catalano and
                  Dario Fiore and
                  Bogdan Warinschi},
  title        = {Homomorphic Signatures with Efficient Verification for Polynomial
                  Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {469},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/469},
  timestamp    = {Thu, 06 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CatalanoFW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/BernhardFGSW13,
  author       = {David Bernhard and
                  Georg Fuchsbauer and
                  Essam Ghadafi and
                  Nigel P. Smart and
                  Bogdan Warinschi},
  title        = {Anonymous attestation with user-controlled linkability},
  journal      = {Int. J. Inf. Sec.},
  volume       = {12},
  number       = {3},
  pages        = {219--249},
  year         = {2013},
  url          = {https://doi.org/10.1007/s10207-013-0191-z},
  doi          = {10.1007/S10207-013-0191-Z},
  timestamp    = {Sat, 16 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/BernhardFGSW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/BrzuskaFSWW13,
  author       = {Christina Brzuska and
                  Marc Fischlin and
                  Nigel P. Smart and
                  Bogdan Warinschi and
                  Stephen C. Williams},
  title        = {Less is more: relaxed yet composable security notions for key exchange},
  journal      = {Int. J. Inf. Sec.},
  volume       = {12},
  number       = {4},
  pages        = {267--297},
  year         = {2013},
  url          = {https://doi.org/10.1007/s10207-013-0192-y},
  doi          = {10.1007/S10207-013-0192-Y},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/BrzuskaFSWW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BrzuskaSWW13,
  author       = {Christina Brzuska and
                  Nigel P. Smart and
                  Bogdan Warinschi and
                  Gaven J. Watson},
  editor       = {Ahmad{-}Reza Sadeghi and
                  Virgil D. Gligor and
                  Moti Yung},
  title        = {An analysis of the {EMV} channel establishment protocol},
  booktitle    = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security,
                  CCS'13, Berlin, Germany, November 4-8, 2013},
  pages        = {373--386},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2508859.2516748},
  doi          = {10.1145/2508859.2516748},
  timestamp    = {Tue, 10 Nov 2020 19:58:06 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BrzuskaSWW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BohlCW13,
  author       = {Florian B{\"{o}}hl and
                  V{\'{e}}ronique Cortier and
                  Bogdan Warinschi},
  editor       = {Ahmad{-}Reza Sadeghi and
                  Virgil D. Gligor and
                  Moti Yung},
  title        = {Deduction soundness: prove one, get five for free},
  booktitle    = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security,
                  CCS'13, Berlin, Germany, November 4-8, 2013},
  pages        = {1261--1272},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2508859.2516711},
  doi          = {10.1145/2508859.2516711},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BohlCW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/FerraraFW13,
  author       = {Anna Lisa Ferrara and
                  Georg Fuchsbauer and
                  Bogdan Warinschi},
  title        = {Cryptographically Enforced {RBAC}},
  booktitle    = {2013 {IEEE} 26th Computer Security Foundations Symposium, New Orleans,
                  LA, USA, June 26-28, 2013},
  pages        = {115--129},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/CSF.2013.15},
  doi          = {10.1109/CSF.2013.15},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/FerraraFW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fosad/BernhardW13,
  author       = {David Bernhard and
                  Bogdan Warinschi},
  editor       = {Alessandro Aldini and
                  Javier L{\'{o}}pez and
                  Fabio Martinelli},
  title        = {Cryptographic Voting - {A} Gentle Introduction},
  booktitle    = {Foundations of Security Analysis and Design {VII} - {FOSAD} 2012/2013
                  Tutorial Lectures},
  series       = {Lecture Notes in Computer Science},
  volume       = {8604},
  pages        = {167--211},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-10082-1\_7},
  doi          = {10.1007/978-3-319-10082-1\_7},
  timestamp    = {Thu, 29 Aug 2019 08:10:01 +0200},
  biburl       = {https://dblp.org/rec/conf/fosad/BernhardW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeeSWW13,
  author       = {Ming{-}Feng Lee and
                  Nigel P. Smart and
                  Bogdan Warinschi and
                  Gaven J. Watson},
  title        = {Anonymity Guarantees of the {UMTS/LTE} Authentication and Connection
                  Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {27},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/027},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LeeSWW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrzuskaSWW13,
  author       = {Christina Brzuska and
                  Nigel P. Smart and
                  Bogdan Warinschi and
                  Gaven J. Watson},
  title        = {An Analysis of the {EMV} Channel Establishment Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {31},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/031},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrzuskaSWW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BohlCW13,
  author       = {Florian B{\"{o}}hl and
                  V{\'{e}}ronique Cortier and
                  Bogdan Warinschi},
  title        = {Deduction Soundness: Prove One, Get Five for Free},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {457},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/457},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BohlCW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FerraraFW13,
  author       = {Anna Lisa Ferrara and
                  Georg Fuchsbauer and
                  Bogdan Warinschi},
  title        = {Cryptographically Enforced {RBAC}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {492},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/492},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FerraraFW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/BoldyrevaPW12,
  author       = {Alexandra Boldyreva and
                  Adriana Palacio and
                  Bogdan Warinschi},
  title        = {Secure Proxy Signature Schemes for Delegation of Signing Rights},
  journal      = {J. Cryptol.},
  volume       = {25},
  number       = {1},
  pages        = {57--115},
  year         = {2012},
  url          = {https://doi.org/10.1007/s00145-010-9082-x},
  doi          = {10.1007/S00145-010-9082-X},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/BoldyrevaPW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BernhardPW12,
  author       = {David Bernhard and
                  Olivier Pereira and
                  Bogdan Warinschi},
  editor       = {Xiaoyun Wang and
                  Kazue Sako},
  title        = {How Not to Prove Yourself: Pitfalls of the Fiat-Shamir Heuristic and
                  Applications to Helios},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2012 - 18th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Beijing, China, December 2-6, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7658},
  pages        = {626--643},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34961-4\_38},
  doi          = {10.1007/978-3-642-34961-4\_38},
  timestamp    = {Mon, 25 Nov 2019 15:32:14 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BernhardPW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BernhardCPW12,
  author       = {David Bernhard and
                  V{\'{e}}ronique Cortier and
                  Olivier Pereira and
                  Bogdan Warinschi},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Measuring vote privacy, revisited},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {941--952},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382295},
  doi          = {10.1145/2382196.2382295},
  timestamp    = {Tue, 12 Apr 2022 13:28:49 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/BernhardCPW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/GrozaW12,
  author       = {Bogdan Groza and
                  Bogdan Warinschi},
  editor       = {Dieter Gollmann and
                  Felix C. Freiling},
  title        = {Revisiting Difficulty Notions for Client Puzzles and DoS Resilience},
  booktitle    = {Information Security - 15th International Conference, {ISC} 2012,
                  Passau, Germany, September 19-21, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7483},
  pages        = {39--54},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33383-5\_3},
  doi          = {10.1007/978-3-642-33383-5\_3},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/GrozaW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/CatalanoFW12,
  author       = {Dario Catalano and
                  Dario Fiore and
                  Bogdan Warinschi},
  editor       = {Marc Fischlin and
                  Johannes Buchmann and
                  Mark Manulis},
  title        = {Efficient Network Coding Signatures in the Standard Model},
  booktitle    = {Public Key Cryptography - {PKC} 2012 - 15th International Conference
                  on Practice and Theory in Public Key Cryptography, Darmstadt, Germany,
                  May 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7293},
  pages        = {680--696},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30057-8\_40},
  doi          = {10.1007/978-3-642-30057-8\_40},
  timestamp    = {Thu, 06 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/CatalanoFW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernhardPW12,
  author       = {David Bernhard and
                  Olivier Pereira and
                  Bogdan Warinschi},
  title        = {On Necessary and Sufficient Conditions for Private Ballot Submission},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {236},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/236},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernhardPW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrzuskaFSWW12,
  author       = {Christina Brzuska and
                  Marc Fischlin and
                  Nigel P. Smart and
                  Bogdan Warinschi and
                  Stephen C. Williams},
  title        = {Less is More: Relaxed yet Composable Security Notions for Key Exchange},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {242},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/242},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrzuskaFSWW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jar/CortierKW11,
  author       = {V{\'{e}}ronique Cortier and
                  Steve Kremer and
                  Bogdan Warinschi},
  title        = {A Survey of Symbolic Methods in Computational Analysis of Cryptographic
                  Systems},
  journal      = {J. Autom. Reason.},
  volume       = {46},
  number       = {3-4},
  pages        = {225--259},
  year         = {2011},
  url          = {https://doi.org/10.1007/s10817-010-9187-9},
  doi          = {10.1007/S10817-010-9187-9},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jar/CortierKW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BrzuskaFWW11,
  author       = {Christina Brzuska and
                  Marc Fischlin and
                  Bogdan Warinschi and
                  Stephen C. Williams},
  editor       = {Yan Chen and
                  George Danezis and
                  Vitaly Shmatikov},
  title        = {Composability of bellare-rogaway key exchange protocols},
  booktitle    = {Proceedings of the 18th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011},
  pages        = {51--62},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2046707.2046716},
  doi          = {10.1145/2046707.2046716},
  timestamp    = {Tue, 10 Nov 2020 19:56:39 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BrzuskaFWW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CortierW11,
  author       = {V{\'{e}}ronique Cortier and
                  Bogdan Warinschi},
  editor       = {Yan Chen and
                  George Danezis and
                  Vitaly Shmatikov},
  title        = {A composable computational soundness notion},
  booktitle    = {Proceedings of the 18th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011},
  pages        = {63--74},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2046707.2046717},
  doi          = {10.1145/2046707.2046717},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/CortierW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/KremerSW11,
  author       = {Steve Kremer and
                  Graham Steel and
                  Bogdan Warinschi},
  title        = {Security for Key Management Interfaces},
  booktitle    = {Proceedings of the 24th {IEEE} Computer Security Foundations Symposium,
                  {CSF} 2011, Cernay-la-Ville, France, 27-29 June, 2011},
  pages        = {266--280},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/CSF.2011.25},
  doi          = {10.1109/CSF.2011.25},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/KremerSW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/BernhardCPSW11,
  author       = {David Bernhard and
                  V{\'{e}}ronique Cortier and
                  Olivier Pereira and
                  Ben Smyth and
                  Bogdan Warinschi},
  editor       = {Vijay Atluri and
                  Claudia D{\'{\i}}az},
  title        = {Adapting Helios for Provable Ballot Privacy},
  booktitle    = {Computer Security - {ESORICS} 2011 - 16th European Symposium on Research
                  in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6879},
  pages        = {335--354},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23822-2\_19},
  doi          = {10.1007/978-3-642-23822-2\_19},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/BernhardCPSW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CatalanoFW11,
  author       = {Dario Catalano and
                  Dario Fiore and
                  Bogdan Warinschi},
  editor       = {Kenneth G. Paterson},
  title        = {Adaptive Pseudo-free Groups and Applications},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Tallinn, Estonia, May 15-19, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6632},
  pages        = {207--223},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-20465-4\_13},
  doi          = {10.1007/978-3-642-20465-4\_13},
  timestamp    = {Thu, 06 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/CatalanoFW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tgc/ChenLW11,
  author       = {Liqun Chen and
                  Ming{-}Feng Lee and
                  Bogdan Warinschi},
  editor       = {Roberto Bruni and
                  Vladimiro Sassone},
  title        = {Security of the Enhanced {TCG} Privacy-CA Solution},
  booktitle    = {Trustworthy Global Computing - 6th International Symposium, {TGC}
                  2011, Aachen, Germany, June 9-10, 2011. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7173},
  pages        = {121--141},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-30065-3\_8},
  doi          = {10.1007/978-3-642-30065-3\_8},
  timestamp    = {Mon, 25 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tgc/ChenLW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/ios/11/BressonLMW11,
  author       = {Emmanuel Bresson and
                  Yassine Lakhnech and
                  Laurent Mazar{\'{e}} and
                  Bogdan Warinschi},
  editor       = {V{\'{e}}ronique Cortier and
                  Steve Kremer},
  title        = {Computational Soundness - The Case of Diffie-Hellman Keys},
  booktitle    = {Formal Models and Techniques for Analyzing Security Protocols},
  series       = {Cryptology and Information Security Series},
  volume       = {5},
  pages        = {277--302},
  publisher    = {{IOS} Press},
  year         = {2011},
  url          = {https://doi.org/10.3233/978-1-60750-714-7-277},
  doi          = {10.3233/978-1-60750-714-7-277},
  timestamp    = {Fri, 15 May 2020 12:11:04 +0200},
  biburl       = {https://dblp.org/rec/books/ios/11/BressonLMW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CatalanoFW11,
  author       = {Dario Catalano and
                  Dario Fiore and
                  Bogdan Warinschi},
  title        = {Adaptive Pseudo-Free Groups and Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {53},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/053},
  timestamp    = {Thu, 06 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CatalanoFW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BernhardFGSW11,
  author       = {David Bernhard and
                  Georg Fuchsbauer and
                  Essam Ghadafi and
                  Nigel P. Smart and
                  Bogdan Warinschi},
  title        = {Anonymous attestation with user-controlled linkability},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {658},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/658},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BernhardFGSW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CatalanoFW11a,
  author       = {Dario Catalano and
                  Dario Fiore and
                  Bogdan Warinschi},
  title        = {Efficient Network Coding Signatures in the Standard Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {696},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/696},
  timestamp    = {Thu, 06 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CatalanoFW11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/BaudetWA10,
  author       = {Mathieu Baudet and
                  Bogdan Warinschi and
                  Mart{\'{\i}}n Abadi},
  title        = {Guessing attacks and the computational soundness of static equivalence},
  journal      = {J. Comput. Secur.},
  volume       = {18},
  number       = {5},
  pages        = {909--968},
  year         = {2010},
  url          = {https://doi.org/10.3233/JCS-2009-0386},
  doi          = {10.3233/JCS-2009-0386},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/BaudetWA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/MorrisseySW10,
  author       = {Paul Morrissey and
                  Nigel P. Smart and
                  Bogdan Warinschi},
  title        = {The {TLS} Handshake Protocol: {A} Modular Analysis},
  journal      = {J. Cryptol.},
  volume       = {23},
  number       = {2},
  pages        = {187--223},
  year         = {2010},
  url          = {https://doi.org/10.1007/s00145-009-9052-3},
  doi          = {10.1007/S00145-009-9052-3},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/MorrisseySW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/BartheHLRW10,
  author       = {Gilles Barthe and
                  Alejandro Hevia and
                  Zhengqin Luo and
                  Tamara Rezk and
                  Bogdan Warinschi},
  title        = {Robustness Guarantees for Anonymity},
  booktitle    = {Proceedings of the 23rd {IEEE} Computer Security Foundations Symposium,
                  {CSF} 2010, Edinburgh, United Kingdom, July 17-19, 2010},
  pages        = {91--106},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CSF.2010.14},
  doi          = {10.1109/CSF.2010.14},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/BartheHLRW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/euc/ChenW10,
  author       = {Liqun Chen and
                  Bogdan Warinschi},
  title        = {Security of the {TCG} Privacy-CA Solution},
  booktitle    = {{IEEE/IFIP} 8th International Conference on Embedded and Ubiquitous
                  Computing, {EUC} 2010, Hong Kong, China, 11-13 December 2010},
  pages        = {609--616},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/EUC.2010.98},
  doi          = {10.1109/EUC.2010.98},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/euc/ChenW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/GhadafiSW10,
  author       = {Essam Ghadafi and
                  Nigel P. Smart and
                  Bogdan Warinschi},
  editor       = {Phong Q. Nguyen and
                  David Pointcheval},
  title        = {Groth-Sahai Proofs Revisited},
  booktitle    = {Public Key Cryptography - {PKC} 2010, 13th International Conference
                  on Practice and Theory in Public Key Cryptography, Paris, France,
                  May 26-28, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6056},
  pages        = {177--192},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13013-7\_11},
  doi          = {10.1007/978-3-642-13013-7\_11},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/GhadafiSW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/LeeSW10,
  author       = {Ming{-}Feng Lee and
                  Nigel P. Smart and
                  Bogdan Warinschi},
  editor       = {Juan A. Garay and
                  Roberto De Prisco},
  title        = {The Fiat-Shamir Transform for Group and Ring Signature Schemes},
  booktitle    = {Security and Cryptography for Networks, 7th International Conference,
                  {SCN} 2010, Amalfi, Italy, September 13-15, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6280},
  pages        = {363--380},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15317-4\_23},
  doi          = {10.1007/978-3-642-15317-4\_23},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/LeeSW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/BichselCNSW10,
  author       = {Patrik Bichsel and
                  Jan Camenisch and
                  Gregory Neven and
                  Nigel P. Smart and
                  Bogdan Warinschi},
  editor       = {Juan A. Garay and
                  Roberto De Prisco},
  title        = {Get Shorty via Group Signatures without Encryption},
  booktitle    = {Security and Cryptography for Networks, 7th International Conference,
                  {SCN} 2010, Amalfi, Italy, September 13-15, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6280},
  pages        = {381--398},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15317-4\_24},
  doi          = {10.1007/978-3-642-15317-4\_24},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/BichselCNSW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeeSW10,
  author       = {Ming{-}Feng Lee and
                  Nigel P. Smart and
                  Bogdan Warinschi},
  title        = {The Fiat-Shamir Transform for Group and Ring Signature Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {358},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/358},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LeeSW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/NevenSW09,
  author       = {Gregory Neven and
                  Nigel P. Smart and
                  Bogdan Warinschi},
  title        = {Hash function requirements for Schnorr signatures},
  journal      = {J. Math. Cryptol.},
  volume       = {3},
  number       = {1},
  pages        = {69--87},
  year         = {2009},
  url          = {https://doi.org/10.1515/JMC.2009.004},
  doi          = {10.1515/JMC.2009.004},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/NevenSW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/FarshimW09,
  author       = {Pooya Farshim and
                  Bogdan Warinschi},
  editor       = {Bart Preneel},
  title        = {Certified Encryption Revisited},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2009, Second International
                  Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25,
                  2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5580},
  pages        = {179--197},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02384-2\_12},
  doi          = {10.1007/978-3-642-02384-2\_12},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/FarshimW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/ChenMSW09,
  author       = {Liqun Chen and
                  Paul Morrissey and
                  Nigel P. Smart and
                  Bogdan Warinschi},
  editor       = {Mitsuru Matsui},
  title        = {Security Notions and Generic Constructions for Client Puzzles},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Tokyo, Japan, December 6-10, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5912},
  pages        = {505--523},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10366-7\_30},
  doi          = {10.1007/978-3-642-10366-7\_30},
  timestamp    = {Mon, 25 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/ChenMSW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BoldyrevaCFW09,
  author       = {Alexandra Boldyreva and
                  David Cash and
                  Marc Fischlin and
                  Bogdan Warinschi},
  editor       = {Mitsuru Matsui},
  title        = {Foundations of Non-malleable Hash and One-Way Functions},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Tokyo, Japan, December 6-10, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5912},
  pages        = {524--541},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10366-7\_31},
  doi          = {10.1007/978-3-642-10366-7\_31},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BoldyrevaCFW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/MazareW09,
  author       = {Laurent Mazar{\'{e}} and
                  Bogdan Warinschi},
  editor       = {Pierpaolo Degano and
                  Luca Vigan{\`{o}}},
  title        = {Separating Trace Mapping and Reactive Simulatability Soundness: The
                  Case of Adaptive Corruption},
  booktitle    = {Foundations and Applications of Security Analysis, Joint Workshop
                  on Automated Reasoning for Security Protocol Analysis and Issues in
                  the Theory of Security, {ARSPA-WITS} 2009, York, UK, March 28-29,
                  2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5511},
  pages        = {193--210},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03459-6\_13},
  doi          = {10.1007/978-3-642-03459-6\_13},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/MazareW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/GhadafiSW09,
  author       = {Essam Ghadafi and
                  Nigel P. Smart and
                  Bogdan Warinschi},
  editor       = {Matthew Geoffrey Parker},
  title        = {Practical Zero-Knowledge Proofs for Circuit Evaluation},
  booktitle    = {Cryptography and Coding, 12th {IMA} International Conference, Cryptography
                  and Coding 2009, Cirencester, UK, December 15-17, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5921},
  pages        = {469--494},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10868-6\_28},
  doi          = {10.1007/978-3-642-10868-6\_28},
  timestamp    = {Wed, 01 Sep 2021 10:36:08 +0200},
  biburl       = {https://dblp.org/rec/conf/ima/GhadafiSW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pairing/SmartW09,
  author       = {Nigel P. Smart and
                  Bogdan Warinschi},
  editor       = {Hovav Shacham and
                  Brent Waters},
  title        = {Identity Based Group Signatures from Hierarchical Identity-Based Encryption},
  booktitle    = {Pairing-Based Cryptography - Pairing 2009, Third International Conference,
                  Palo Alto, CA, USA, August 12-14, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5671},
  pages        = {150--170},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03298-1\_11},
  doi          = {10.1007/978-3-642-03298-1\_11},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/pairing/SmartW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/Warinschi09,
  author       = {Bogdan Warinschi},
  editor       = {Josef Pieprzyk and
                  Fangguo Zhang},
  title        = {Symbolic Methods for Provable Security},
  booktitle    = {Provable Security, Third International Conference, ProvSec 2009, Guangzhou,
                  China, November 11-13, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5848},
  pages        = {2},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04642-1\_2},
  doi          = {10.1007/978-3-642-04642-1\_2},
  timestamp    = {Sun, 02 Jun 2019 21:26:38 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/Warinschi09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoldyrevaCFW09,
  author       = {Alexandra Boldyreva and
                  David Cash and
                  Marc Fischlin and
                  Bogdan Warinschi},
  title        = {Foundations of Non-Malleable Hash and One-Way Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {65},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/065},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoldyrevaCFW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SmartW09,
  author       = {Nigel P. Smart and
                  Bogdan Warinschi},
  title        = {Identity Based Group Signatures from Hierarchical Identity-Based Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {313},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/313},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SmartW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenMSW09,
  author       = {Liqun Chen and
                  Paul Morrissey and
                  Nigel P. Smart and
                  Bogdan Warinschi},
  title        = {Security Notions and Generic Constructions for Client Puzzles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {331},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/331},
  timestamp    = {Thu, 28 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenMSW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GhadafiSW09,
  author       = {Essam Ghadafi and
                  Nigel P. Smart and
                  Bogdan Warinschi},
  title        = {Groth-Sahai proofs revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {599},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/599},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GhadafiSW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jacm/AbadiW08,
  author       = {Mart{\'{\i}}n Abadi and
                  Bogdan Warinschi},
  title        = {Security analysis of cryptographically controlled access to {XML}
                  documents},
  journal      = {J. {ACM}},
  volume       = {55},
  number       = {2},
  pages        = {6:1--6:29},
  year         = {2008},
  url          = {https://doi.org/10.1145/1346330.1346331},
  doi          = {10.1145/1346330.1346331},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jacm/AbadiW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/MorrisseySW08,
  author       = {Paul Morrissey and
                  Nigel P. Smart and
                  Bogdan Warinschi},
  editor       = {Josef Pieprzyk},
  title        = {A Modular Security Analysis of the {TLS} Handshake Protocol},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2008, 14th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Melbourne, Australia, December 7-11, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5350},
  pages        = {55--73},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89255-7\_5},
  doi          = {10.1007/978-3-540-89255-7\_5},
  timestamp    = {Sun, 02 Jun 2019 21:16:53 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/MorrisseySW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MorrisseySW08,
  author       = {Paul Morrissey and
                  Nigel P. Smart and
                  Bogdan Warinschi},
  title        = {A Modular Security Analysis of the {TLS} Handshake Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {236},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/236},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MorrisseySW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BressonLMW07,
  author       = {Emmanuel Bresson and
                  Yassine Lakhnech and
                  Laurent Mazar{\'{e}} and
                  Bogdan Warinschi},
  editor       = {Alfred Menezes},
  title        = {A Generalization of {DDH} with Applications to Protocol Analysis and
                  Computational Soundness},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2007, 27th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4622},
  pages        = {482--499},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74143-5\_27},
  doi          = {10.1007/978-3-540-74143-5\_27},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BressonLMW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/CortierWZ07,
  author       = {V{\'{e}}ronique Cortier and
                  Bogdan Warinschi and
                  Eugen Zalinescu},
  editor       = {Joachim Biskup and
                  Javier L{\'{o}}pez},
  title        = {Synthesizing Secure Protocols},
  booktitle    = {Computer Security - {ESORICS} 2007, 12th European Symposium On Research
                  In Computer Security, Dresden, Germany, September 24-26, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4734},
  pages        = {406--421},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74835-9\_27},
  doi          = {10.1007/978-3-540-74835-9\_27},
  timestamp    = {Thu, 29 Aug 2019 08:09:59 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/CortierWZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/CortierKW07,
  author       = {V{\'{e}}ronique Cortier and
                  Ralf K{\"{u}}sters and
                  Bogdan Warinschi},
  editor       = {Joachim Biskup and
                  Javier L{\'{o}}pez},
  title        = {A Cryptographic Model for Branching Time Security Properties - The
                  Case of Contract Signing Protocols},
  booktitle    = {Computer Security - {ESORICS} 2007, 12th European Symposium On Research
                  In Computer Security, Dresden, Germany, September 24-26, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4734},
  pages        = {422--437},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74835-9\_28},
  doi          = {10.1007/978-3-540-74835-9\_28},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/CortierKW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BoldyrevaFPW07,
  author       = {Alexandra Boldyreva and
                  Marc Fischlin and
                  Adriana Palacio and
                  Bogdan Warinschi},
  editor       = {Tatsuaki Okamoto and
                  Xiaoyun Wang},
  title        = {A Closer Look at {PKI:} Security and Efficiency},
  booktitle    = {Public Key Cryptography - {PKC} 2007, 10th International Conference
                  on Practice and Theory in Public-Key Cryptography, Beijing, China,
                  April 16-20, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4450},
  pages        = {458--475},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-71677-8\_30},
  doi          = {10.1007/978-3-540-71677-8\_30},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/BoldyrevaFPW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CortierKW07,
  author       = {V{\'{e}}ronique Cortier and
                  Ralf K{\"{u}}sters and
                  Bogdan Warinschi},
  title        = {A Cryptographic Model for Branching Time Security Properties - the
                  Case of Contract Signing Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {251},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/251},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CortierKW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/DattaDMW06,
  author       = {Anupam Datta and
                  Ante Derek and
                  John C. Mitchell and
                  Bogdan Warinschi},
  title        = {Computationally Sound Compositional Logic for Key Exchange Protocols},
  booktitle    = {19th {IEEE} Computer Security Foundations Workshop, {(CSFW-19} 2006),
                  5-7 July 2006, Venice, Italy},
  pages        = {321--334},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/CSFW.2006.9},
  doi          = {10.1109/CSFW.2006.9},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/DattaDMW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fossacs/AbadiBW06,
  author       = {Mart{\'{\i}}n Abadi and
                  Mathieu Baudet and
                  Bogdan Warinschi},
  editor       = {Luca Aceto and
                  Anna Ing{\'{o}}lfsd{\'{o}}ttir},
  title        = {Guessing Attacks and the Computational Soundness of Static Equivalence},
  booktitle    = {Foundations of Software Science and Computation Structures, 9th International
                  Conference, {FOSSACS} 2006, Held as Part of the Joint European Conferences
                  on Theory and Practice of Software, {ETAPS} 2006, Vienna, Austria,
                  March 25-31, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3921},
  pages        = {398--412},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11690634\_27},
  doi          = {10.1007/11690634\_27},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fossacs/AbadiBW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fsttcs/CortierKKW06,
  author       = {V{\'{e}}ronique Cortier and
                  Steve Kremer and
                  Ralf K{\"{u}}sters and
                  Bogdan Warinschi},
  editor       = {S. Arun{-}Kumar and
                  Naveen Garg},
  title        = {Computationally Sound Symbolic Secrecy in the Presence of Hash Functions},
  booktitle    = {{FSTTCS} 2006: Foundations of Software Technology and Theoretical
                  Computer Science, 26th International Conference, Kolkata, India, December
                  13-15, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4337},
  pages        = {176--187},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11944836\_18},
  doi          = {10.1007/11944836\_18},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/fsttcs/CortierKKW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/CortierHW07,
  author       = {V{\'{e}}ronique Cortier and
                  Heinrich H{\"{o}}rdegen and
                  Bogdan Warinschi},
  editor       = {Catalin Dima and
                  Marius Minea and
                  Ferucio Laurentiu Tiplea},
  title        = {Explicit Randomness is not Necessary when Modeling Probabilistic Encryption},
  booktitle    = {Proceedings of the First Workshop in Information and Computer Security,
                  ICS@SYNASC 2006, Timisoara, Romania, September 30, 2006},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {186},
  pages        = {49--65},
  publisher    = {Elsevier},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.entcs.2006.11.044},
  doi          = {10.1016/J.ENTCS.2006.11.044},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/entcs/CortierHW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-cs-0606030,
  author       = {V{\'{e}}ronique Cortier and
                  Heinrich H{\"{o}}rdegen and
                  Bogdan Warinschi},
  title        = {Explicit Randomness is not Necessary when Modeling Probabilistic Encryption},
  journal      = {CoRR},
  volume       = {abs/cs/0606030},
  year         = {2006},
  url          = {http://arxiv.org/abs/cs/0606030},
  eprinttype    = {arXiv},
  eprint       = {cs/0606030},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-cs-0606030.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DattaDMW06,
  author       = {Anupam Datta and
                  Ante Derek and
                  John C. Mitchell and
                  Bogdan Warinschi},
  title        = {Key Exchange Protocols: Security Definition, Proof Method and Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {56},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/056},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DattaDMW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CortierKKW06,
  author       = {V{\'{e}}ronique Cortier and
                  Steve Kremer and
                  Ralf K{\"{u}}sters and
                  Bogdan Warinschi},
  title        = {Computationally Sound Symbolic Secrecy in the Presence of Hash Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {218},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/218},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CortierKKW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/Warinschi05,
  author       = {Bogdan Warinschi},
  title        = {A computational analysis of the Needham-Schroeder-(Lowe) protocol},
  journal      = {J. Comput. Secur.},
  volume       = {13},
  number       = {3},
  pages        = {565--591},
  year         = {2005},
  url          = {https://doi.org/10.3233/jcs-2005-13307},
  doi          = {10.3233/JCS-2005-13307},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/Warinschi05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esop/CortierW05,
  author       = {V{\'{e}}ronique Cortier and
                  Bogdan Warinschi},
  editor       = {Shmuel Sagiv},
  title        = {Computationally Sound, Automated Proofs for Security Protocols},
  booktitle    = {Programming Languages and Systems, 14th European Symposium on Programming,
                  {ESOP} 2005, Held as Part of the Joint European Conferences on Theory
                  and Practice of Software, {ETAPS} 2005, Edinburgh, UK, April 4-8,
                  2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3444},
  pages        = {157--171},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-31987-0\_12},
  doi          = {10.1007/978-3-540-31987-0\_12},
  timestamp    = {Fri, 27 Jan 2023 15:04:25 +0100},
  biburl       = {https://dblp.org/rec/conf/esop/CortierW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/AbadiW05,
  author       = {Mart{\'{\i}}n Abadi and
                  Bogdan Warinschi},
  editor       = {Lu{\'{\i}}s Caires and
                  Giuseppe F. Italiano and
                  Lu{\'{\i}}s Monteiro and
                  Catuscia Palamidessi and
                  Moti Yung},
  title        = {Password-Based Encryption Analyzed},
  booktitle    = {Automata, Languages and Programming, 32nd International Colloquium,
                  {ICALP} 2005, Lisbon, Portugal, July 11-15, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3580},
  pages        = {664--676},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11523468\_54},
  doi          = {10.1007/11523468\_54},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/AbadiW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pods/AbadiW05,
  author       = {Mart{\'{\i}}n Abadi and
                  Bogdan Warinschi},
  editor       = {Chen Li},
  title        = {Security analysis of cryptographically controlled access to {XML}
                  documents},
  booktitle    = {Proceedings of the Twenty-fourth {ACM} {SIGACT-SIGMOD-SIGART} Symposium
                  on Principles of Database Systems, June 13-15, 2005, Baltimore, Maryland,
                  {USA}},
  pages        = {108--117},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1065167.1065182},
  doi          = {10.1145/1065167.1065182},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pods/AbadiW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/MicciancioW04,
  author       = {Daniele Micciancio and
                  Bogdan Warinschi},
  title        = {Completeness Theorems for the Abadi-Rogaway Language of Encrypted
                  Expressions},
  journal      = {J. Comput. Secur.},
  volume       = {12},
  number       = {1},
  pages        = {99--130},
  year         = {2004},
  url          = {https://doi.org/10.3233/jcs-2004-12105},
  doi          = {10.3233/JCS-2004-12105},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcs/MicciancioW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/AbdallaW04,
  author       = {Michel Abdalla and
                  Bogdan Warinschi},
  editor       = {Javier L{\'{o}}pez and
                  Sihan Qing and
                  Eiji Okamoto},
  title        = {On the Minimal Assumptions of Group Signature Schemes},
  booktitle    = {Information and Communications Security, 6th International Conference,
                  {ICICS} 2004, Malaga, Spain, October 27-29, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3269},
  pages        = {1--13},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30191-2\_1},
  doi          = {10.1007/978-3-540-30191-2\_1},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/AbdallaW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/CamenischKW04,
  author       = {Jan Camenisch and
                  Maciej Koprowski and
                  Bogdan Warinschi},
  editor       = {Carlo Blundo and
                  Stelvio Cimato},
  title        = {Efficient Blind Signatures Without Random Oracles},
  booktitle    = {Security in Communication Networks, 4th International Conference,
                  {SCN} 2004, Amalfi, Italy, September 8-10, 2004, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3352},
  pages        = {134--148},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30598-9\_10},
  doi          = {10.1007/978-3-540-30598-9\_10},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/CamenischKW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/MicciancioW04,
  author       = {Daniele Micciancio and
                  Bogdan Warinschi},
  editor       = {Moni Naor},
  title        = {Soundness of Formal Encryption in the Presence of Active Adversaries},
  booktitle    = {Theory of Cryptography, First Theory of Cryptography Conference, {TCC}
                  2004, Cambridge, MA, USA, February 19-21, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2951},
  pages        = {133--151},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24638-1\_8},
  doi          = {10.1007/978-3-540-24638-1\_8},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/MicciancioW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/Warinschi03,
  author       = {Bogdan Warinschi},
  title        = {A Computational Analysis of the Needham-Schr{\"{o}}eder-(Lowe)
                  Protocol},
  booktitle    = {16th {IEEE} Computer Security Foundations Workshop {(CSFW-16} 2003),
                  30 June - 2 July 2003, Pacific Grove, CA, {USA}},
  pages        = {248},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/CSFW.2003.1212717},
  doi          = {10.1109/CSFW.2003.1212717},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/Warinschi03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BellareMW03,
  author       = {Mihir Bellare and
                  Daniele Micciancio and
                  Bogdan Warinschi},
  editor       = {Eli Biham},
  title        = {Foundations of Group Signatures: Formal Definitions, Simplified Requirements,
                  and a Construction Based on General Assumptions},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2003, International Conference
                  on the Theory and Applications of Cryptographic Techniques, Warsaw,
                  Poland, May 4-8, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2656},
  pages        = {614--629},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-39200-9\_38},
  doi          = {10.1007/3-540-39200-9\_38},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BellareMW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoldyrevaPW03,
  author       = {Alexandra Boldyreva and
                  Adriana Palacio and
                  Bogdan Warinschi},
  title        = {Secure Proxy Signature Schemes for Delegation of Signing Rights},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {96},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/096},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoldyrevaPW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issac/MicciancioW01,
  author       = {Daniele Micciancio and
                  Bogdan Warinschi},
  editor       = {Erich L. Kaltofen and
                  Gilles Villard},
  title        = {A linear space algorithm for computing the herite normal form},
  booktitle    = {Proceedings of the 2001 International Symposium on Symbolic and Algebraic
                  Computation, {ISSAC} 2001, {ORCCA} {\&} University of Western
                  Ontario, London, Ontario, Canada, July 22-25, 2001},
  pages        = {231--236},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/384101.384133},
  doi          = {10.1145/384101.384133},
  timestamp    = {Mon, 03 Apr 2023 17:23:32 +0200},
  biburl       = {https://dblp.org/rec/conf/issac/MicciancioW01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/ECCC-TR00-074,
  author       = {Daniele Micciancio and
                  Bogdan Warinschi},
  title        = {A Linear Space Algorithm for Computing the Hermite Normal Form},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR00-074}},
  year         = {2000},
  url          = {https://eccc.weizmann.ac.il/eccc-reports/2000/TR00-074/index.html},
  eprinttype    = {ECCC},
  eprint       = {TR00-074},
  timestamp    = {Wed, 28 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/ECCC-TR00-074.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics