Professor Bogdan Warinschi

  • BS8 1UB

20012019

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

  • 65 Conference Contribution (Conference Proceeding)
  • 13 Article (Academic Journal)
  • 1 Chapter in a book
  • 1 Conference Paper
2019

Encrypted Databases: New Volume Attacks against Range Queries

Gui, Z., Johnson, O. T. & Warinschi, B., 6 Nov 2019, CCS'19: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery (ACM), p. 361-378 47 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
File
120 Downloads (Pure)
2018

How Do We Ensure Users Engage In Secure Online Behavior? A Psychological Perspective

Williams, E. J., Noyes, J. & Warinschi, B., 29 Jan 2018. 5 p.

Research output: Contribution to conferenceConference Paper

Open Access
File
787 Downloads (Pure)

Machine-checked proofs for electronic voting: Privacy and verifiability for belenios

Cortier, V., Dragan, C. C., Dupressoir, F. & Warinschi, B., Sep 2018, 2018 IEEE 31st Computer Security Foundations Symposium (CSF 2018): Proceedings of a meeting held 9-12 July 2018, Oxford, United Kingdom. Institute of Electrical and Electronics Engineers (IEEE), p. 298-312 15 p. 8429313

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

4 Citations (Scopus)

Safe cryptography for all: towards visual metaphor driven cryptography building blocks

van der Linden, D., Rashid, A., Williams, E. J. & Warinschi, B., 1 Oct 2018, 2018 IEEE/ACM 1st International Workshop on Security Awareness from Design to Deployment (SEAD 2018): Proceedings of a meeting held 27 May - 3 June 2018, Gothenburg, Sweden.. Association for Computing Machinery (ACM), p. 41-44 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
File
1 Citation (Scopus)
37 Downloads (Pure)
2017

Adaptive Proofs Have Straightline Extractors (in the Random Oracle Model)

Bernhard, D., Nguyen, N. K. & Warinschi, B., 26 Jun 2017, Applied Cryptography and Network Security: 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings. Springer, p. 336-353 18 p. (Lecture Notes in Computer Science; vol. 10355).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
File
1 Citation (Scopus)
190 Downloads (Pure)

Generic Forward-Secure Key Agreement Without Signatures

Delpech de Saint Guilhem, C., Smart, N. & Warinschi, B., 20 Sep 2017, Information Security - ISC 2017: 20th International Conference, ISC 2017, Ho Chi Minh City, Vietnam, November 22-24 2017. Proceedings. Springer, Cham, p. 114-133 20 p. (Lecture Notes in Computer Science; vol. 10599).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
2 Citations (Scopus)

Machine-Checked Proofs of Privacy for Electronic Voting Protocols

Cortier, V., Dragan, C. C., Dupressoir, F., Schmidt, B., Strub, P-Y. & Warinschi, B., Jul 2017, 2017 IEEE 38th IEEE Symposium on Security and Privacy (SP 2017): Proceedings of a meeting held 22-26 May 2017, San Jose, California, USA. Institute of Electrical and Electronics Engineers (IEEE), p. 993-1008 17 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
File
7 Citations (Scopus)
387 Downloads (Pure)

Multi-key Authenticated Encryption with Corruptions: Reductions Are Lossy

Jager, T., Stam, M., Stanley-Oakes, R. & Warinschi, B., 5 Nov 2017, Theory of Cryptography: 15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part I. Springer, p. 409-441 33 p. (Lecture Notes in Computer Science; vol. 10677).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
2 Citations (Scopus)

Secure composition of PKIs with public key protocols

Cheval, V., Cortier, V. & Warinschi, B., 28 Sep 2017, 2017 IEEE Computer Security Foundations Symposium. p. 144-158 15 p. (2017 IEEE 30th Computer Security Foundations Symposium (CSF) ).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
File
2 Citations (Scopus)
80 Downloads (Pure)

Secure Multiparty Computation from SGX

Portela, B., Barbosa, M. B. M., Brasser, F., Portela, B., Sadeghi, A-R., Scerri, G. & Warinschi, B., 5 Apr 2017, Financial Cryptography and Data Security 2017: Twenty-First International Conference, April 3–7, 2017, The Palace Hotel, Malta . International Financial Cryptography Association

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
File
181 Downloads (Pure)
2016

Adaptive proofs of knowledge in the random oracle model

Bernhard, D., Fischlin, M. & Warinschi, B., Nov 2016, In : IET Information Security. 10, 6, p. 319-331 13 p.

Research output: Contribution to journalArticle (Academic Journal)

Open Access
File
2 Citations (Scopus)
251 Downloads (Pure)

A Modular Treatment of Cryptographic APIs: The Symmetric-Key Case

Shrimpton, T., Stam, M. & Warinschi, B., 21 Jul 2016, Advances in Cryptology - CRYPTO 2016: 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part I. Springer, p. 277-307 31 p. (Lecture Notes in Computer Science (LNCS); vol. 9814).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
3 Citations (Scopus)

Foundations of Hardware-Based Attested Computation and Application to SGX

Barbosa, M., Portela, B., Scerri, G. & Warinschi, B., Jun 2016, 2016 IEEE European Symposium on Security and Privacy (EuroS&P 2016): Proceedings of a meeting held 21-24 March 2016, Saarbrucken, Germany. Institute of Electrical and Electronics Engineers (IEEE), p. 245-260 16 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
17 Citations (Scopus)

Key Confirmation in Key Exchange Protocols: Formal Definitions and Implications for TLS 1.3

Fischlin, M., Günther, F., Schmidt, B. & Warinschi, B., Aug 2016, 2016 IEEE Symposium on Security and Privacy (S&P 2016): Proceedings of a meeting held 22-26 May 2016, San Jose, California, USA. Institute of Electrical and Electronics Engineers (IEEE), p. 452-469 18 p. (2016 IEEE Symposium on Security and Privacy (SP)).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
10 Citations (Scopus)

On the Hardness of Proving CCA-Security of Signed ElGamal

Bernhard, D., Fischlin, M. & Warinschi, B., 18 Feb 2016, Public-Key Cryptography – PKC 2016: 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part I. Cheng, C-M., Chung, K-M., Persiano, G. & Yang, B-Y. (eds.). Springer, p. 47-69 23 p. (Lecture Notes in Computer Science; vol. 9614).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
File
9 Citations (Scopus)
345 Downloads (Pure)

Provably-Secure Remote Memory Attestation for Heap Overflow Protection

Boldyreva, A., Kim, T., Lipton, R. & Warinschi, B., 30 Aug 2016, Security and Cryptography for Networks: 10th International Conference, SCN 2016, Amalfi, Italy, August 31 – September 2, 2016, Proceedings. Zikas, V. & De Prisco, R. (eds.). Springer, (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
File
238 Downloads (Pure)

Secure Software Licensing: Models, Constructions, and Proofs

Costea, S. & Warinschi, B., Aug 2016, 2016 IEEE 29th Computer Security Foundations Symposium (CSF 2016): Proceedings of a meeting held 27 June - 1 July 2016, Lisbon, Portugal. Institute of Electrical and Electronics Engineers (IEEE), p. 31-44 14 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
File
1 Citation (Scopus)
378 Downloads (Pure)

Universally Composable Cryptographic Role-Based Access Control

Liu, B. & Warinschi, B., 16 Nov 2016, Provable Security - ProvSec 2016: 10th International Conference, ProvSec 2016, Nanjing, China, November 10-11, 2016, Proceedings. Chen, L. & Han, J. (eds.). Springer, p. 61-80 20 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
2015

Adaptive Proofs of Knowledge in the Random Oracle Model

Bernhard, D., Fischlin, M. & Warinschi, B., 2015, Public-Key Cryptography - PKC 2015: 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 -- April 1, 2015, Proceedings. Katz, J. (ed.). Springer, p. 629-649 21 p. (Lecture Notes in Computer Science; vol. 9020).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

12 Citations (Scopus)

Policy Privacy in Cryptographic Access Control

Ferrara, A. L., Fuchsbauer, G., Liu, B. & Warinschi, B., 2015, IEEE 28th Computer Security Foundations Symposium - CSF 2015. Institute of Electrical and Electronics Engineers (IEEE), p. 46-60 15 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

4 Citations (Scopus)

Selective Opening Security for Receivers

Hazay, C., Patra, A. & Warinschi, B., 2015, Advances in Cryptology - ASIACRYPT 2015. Springer, Vol. 9452. p. 443-469 27 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

14 Citations (Scopus)

SoK: A Comprehensive Analysis of Game-Based Ballot Privacy Definitions

Bernhard, D., Cortier, V., Galindo, D., Pereira, O. & Warinschi, B., 2015, 2015 IEEE Symposium on Security and Privacy - S&P 2015. Institute of Electrical and Electronics Engineers (IEEE), p. 499-516 18 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

30 Citations (Scopus)
2014

Anonymity guarantees of the UMTS/LTE authentication and connection protocol

Lee, M-F., Smart, N. P., Warinschi, B. & Watson, G. J., 2014, In : International Journal of Information Security. 13, 6, p. 513-527 15 p.

Research output: Contribution to journalArticle (Academic Journal)

8 Citations (Scopus)

Cryptographic puzzles and DoS resilience, revisited.

Groza, B. & Warinschi, B., 2014, In : Designs, Codes and Cryptography. 73, 1, p. 177-207 31 p.

Research output: Contribution to journalArticle (Academic Journal)

8 Citations (Scopus)

Homomorphic Signatures with Efficient Verification for Polynomial Functions.

Catalano, D., Fiore, D. & Warinschi, B., 2014, Advances in Cryptology - CRYPTO 2014. Springer Berlin Heidelberg, Vol. 8617. p. 371-389 19 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

52 Citations (Scopus)
2013

An Analysis of the EMV Channel Establishment Protocol

Brzuska, C., Smart, N. P., Warinschi, B. & Watson, G., 4 Nov 2013, ACM CCS 2013. Association for Computing Machinery (ACM), p. 373-386

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

18 Citations (Scopus)

Cryptographically Enforced RBAC

Ferrara, A-L., Fuchsbauer, G. & Warinschi, B., 2013, IEEE CSF 2013. Computer Security Foundations Symposium - CSF 2013: IEEE Computer Society, p. 115 129 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

10 Citations (Scopus)

Cryptographic Voting - A Gentle Introduction.

Bernhard, D. & Warinschi, B., 2013, Foundations of Security Analysis and Design VII - FOSAD 2012/2013. Springer, Vol. 8604. p. 167-211 45 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Deduction Soundness: Prove One, Get Five for Free

Bohl, F., Cortier, V. & Warinschi, B., 4 Nov 2013, ACM CCS 2013. Association for Computing Machinery (ACM), p. 1261-1272

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

8 Citations (Scopus)

Less is more: relaxed yet composable security notions for key exchange

Brzuska, C., Fischlin, M., Smart, N. P., Warinschi, B. & Williams, S. C., 2013, In : International Journal of Information Security. 12, p. 267-297

Research output: Contribution to journalArticle (Academic Journal)

22 Citations (Scopus)
2012

Efficient Network Coding Signatures in the Standard Model

Catalano, D., Fiore, D. & Warinschi, B., 2012, Public Key Cryptography - PKC 2012. Springer Berlin Heidelberg, Vol. 7293. p. 680-696 17 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

58 Citations (Scopus)

How Not to Prove Yourself: Pitfalls of Fiat-Shamir and Applications to Helios

Bernhard, D., Warinschi, B. & Pereira, O., 2012, Advances in Cryptology - ASIACRYPT 2012. Springer Verlag, Vol. 7658. p. 626-643 18 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

68 Citations (Scopus)

Measuring Vote Privacy, Revisited

Bernhard, D., Warinschi, B., Cortier, V. & Pereira, O., 2012, Proceedings of the 2012 ACM conference on Computer and communications security. ACM: ACM Press / Sheridan, p. 941--952 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

11 Citations (Scopus)

Revisiting Difficulty Notions for Client Puzzles and DoS Resilience

Groza, B. & Warinschi, B., 2012, Information Security Conference - ISC 2012. Springer Berlin Heidelberg, Vol. 7483. p. 39-54 16 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

5 Citations (Scopus)

Secure Proxy Signatures Schemes for Delegation of Signing Rights

Alexandra, B., Adriana, P. & Warinschi, B., Jan 2012, In : Journal of Cryptology. 25, 1, p. 57-115 59 p.

Research output: Contribution to journalArticle (Academic Journal)

114 Citations (Scopus)
2011

A Composable Computational Soundness Notion

Cortier, V. & Warinschi, B., 2011, Conference on Computer and Communications Security - CCS 2011. Association for Computing Machinery (ACM), Vol. -. p. 63-74 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

13 Citations (Scopus)

Adapting Helios for Provable Ballot Privacy

Bernhard, D., Cortier, V., Pereira, O., Smyth, B. & Warinschi, B., 2011, European Symposium on Research in Computer Security - ESORICS 2011. Springer Berlin Heidelberg, Vol. 6879. p. 335-354 20 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

41 Citations (Scopus)

Adaptive Pseudo-free Groups And Applications

Catalano, D., Fiore, D. & Warinschi, B., 2011, Advances in Cryptology - EUROCRYPT 2011. Paterson, K. (ed.). Springer Berlin Heidelberg, Vol. 6632. p. 207-223

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

44 Citations (Scopus)

A Survey of Symbolic Methods in Computational Analysis of Cryptographic Systems

Cortier, V., Kremer, S. & Warinschi, B., 2011, In : Journal of Automated Reasoning. 46, 3-4, p. 225-259

Research output: Contribution to journalArticle (Academic Journal)

40 Citations (Scopus)

Composability of Bellare-Rogaway Key Exchange Protocols

Brzuska, C., Fischlin, M., Warinschi, B. & Williams, S. C., 2011, Conference on Computer and Communications Security - CCS 2011. Association for Computing Machinery (ACM), Vol. -. p. 51-62 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

30 Citations (Scopus)

Computationally Sound Analysis of Encrypting with Diffie Hellman Keys

Cortier, V., Kremer, S., Bresson, E., Lacknech, Y., Mazare, L. & Warinschi, B., 2011, Formal Models and Techniques for Analyzing Security Protocols. IOS Press, p. 277-303

Research output: Chapter in Book/Report/Conference proceedingChapter in a book

Security for Key Management Interfaces

Kremer, S., Steel, G. & Warinschi, B., 2011, Computer Security Foundations Symposium - CSF 2011 . IEEE Computer Society, Vol. -. p. 266-280 15 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

11 Citations (Scopus)

Security of the Enhanced TCG Privacy-CA Solution

Chen, L., Lee, M-F. & Warinschi, B., 2011, Trustworthy Global Computing - TGC 2011. Springer Berlin Heidelberg, Vol. 7173. p. 121-141 21 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

3 Citations (Scopus)
2010

Get Shorty via Group Signatures without Encryption

Bichsel, P., Camenisch, J., Neven, G., Smart, N. & Warinschi, B., 2010, Security and Cryptography for Networks - SCN 2010. Springer Berlin Heidelberg, Vol. 6280. p. 381-398

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

50 Citations (Scopus)

Groth–Sahai Proofs Revisited

Ghadafi, E., Smart, N. & Warinschi, B., 2010, Public Key Cryptography - PKC 2010. Springer Berlin Heidelberg, Vol. 6056. p. 177-192

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

40 Citations (Scopus)

Guessing Attacks and the Computational Soundness of Static Equivalence

Baudet, M., Warinschi, B. & Abadi, M., 2010, In : Journal of Computer Security. 18, 5, p. 909-968 60 p.

Research output: Contribution to journalArticle (Academic Journal)

6 Citations (Scopus)

Robustness Guarantees for Anonymity

Barthe, G., Hevia, A., Luo, Z., Rezk, T. & Warinschi, B., 2010, IEEE Computer Security Foundations Symposium - CSF 2010. IEEE Computer Society, Vol. -. p. 91-106

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

3 Citations (Scopus)

Security of the TCG Privacy-CA Solution

Chen, L. & Warinschi, B., 2010, Embedded and Ubiquitous Computing - EUC 2010. IEEE Computer Society, Vol. -. p. 609-616 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

12 Citations (Scopus)

The Fiat–Shamir Transform for Group and Ring Signature Schemes

Lee, M-F., Smart, N. & Warinschi, B., 2010, Security and Cryptography for Networks - SCN 2010. Springer Berlin Heidelberg, Vol. 6280. p. 363-380

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

2 Citations (Scopus)

The TLS Handshake Protocol: A Modular Analysis

Morrissey, P., Smart, N. & Warinschi, B., Apr 2010, In : Journal of Cryptology. 23, 2, p. 187-223 37 p.

Research output: Contribution to journalArticle (Academic Journal)

18 Citations (Scopus)