Login / Signup
Gergei Bana
Publication Activity (10 Years)
Years Active: 2005-2022
Publications (10 Years): 9
Top Topics
Voting Schemes
Formal Analysis
Default Reasoning
Trade Off
Top Venues
IACR Cryptol. ePrint Arch.
CCS
CoRR
JSAI-isAI Workshops
</>
Publications
</>
Fatima-Ezzahra El Orche
,
Rémi Géraud-Stewart
,
Peter B. Rønne
,
Gergei Bana
,
David Naccache
,
Peter Y. A. Ryan
,
Marco Biroli
,
Megi Dervishi
,
Hugo Waltsburger
Time, Privacy, Robustness, Accuracy: Trade-Offs for the Open Vote Network Protocol.
E-Vote-ID
(2022)
Gergei Bana
,
Marco Biroli
,
Megi Dervishi
,
Fatima-Ezzahra El Orche
,
Rémi Géraud-Stewart
,
David Naccache
,
Peter B. Rønne
,
Peter Y. A. Ryan
,
Hugo Waltsburger
Time, Privacy, Robustness, Accuracy: Trade Offs for the Open Vote Network Protocol.
IACR Cryptol. ePrint Arch.
2021 (2021)
Gergei Bana
,
Wojciech Jamroga
,
David Naccache
,
Peter Y. A. Ryan
Convergence Voting: From Pairwise Comparisons to Consensus.
CoRR
(2021)
Gergei Bana
,
Rohit Chadha
,
Ajay Kumar Eeralla
,
Mitsuhiro Okada
Verification Methods for the Computationally Complete Symbolic Attacker Based on Indistinguishability.
ACM Trans. Comput. Log.
21 (1) (2020)
Gergei Bana
,
Mitsuhiro Okada
A Semantics for "Typically" in First-Order Default Reasoning.
JSAI-isAI Workshops
(2020)
Gergei Bana
,
Rohit Chadha
,
Ajay Kumar Eeralla
Formal Analysis of Vote Privacy Using Computationally Complete Symbolic Attacker.
ESORICS (2)
(2018)
Gergei Bana
,
Rohit Chadha
,
Ajay Kumar Eeralla
Formal Analysis of Vote Privacy using Computationally Complete Symbolic Attacker.
IACR Cryptol. ePrint Arch.
2018 (2018)
Gergei Bana
,
Mitsuhiro Okada
Semantics for "Enough-Certainty" and Fitting's Embedding of Classical Logic in S4.
CSL
(2016)
Gergei Bana
,
Rohit Chadha
Verification Methods for the Computationally Complete Symbolic Attacker Based on Indistinguishability.
IACR Cryptol. ePrint Arch.
2016 (2016)
Gergei Bana
,
Hubert Comon-Lundh
A Computationally Complete Symbolic Attacker for Equivalence Properties.
CCS
(2014)
Gergei Bana
,
Koji Hasebe
,
Mitsuhiro Okada
Computationally complete symbolic attacker and key exchange.
CCS
(2013)
Gergei Bana
,
Hubert Comon-Lundh
Towards Unconditional Soundness: Computationally Complete Symbolic Attacker.
POST
(2012)
Gergei Bana
,
Pedro Adão
,
Hideki Sakurada
Computationally Sound Verification of the NSL Protocol via Computationally Complete Symbolic Attacker.
IACR Cryptol. ePrint Arch.
2012 (2012)
Gergei Bana
,
Pedro Adão
,
Hideki Sakurada
Computationally Complete Symbolic Attacker in Action.
FSTTCS
(2012)
Gergei Bana
,
Hubert Comon-Lundh
Towards Unconditional Soundness: Computationally Complete Symbolic Attacker.
IACR Cryptol. ePrint Arch.
2012 (2012)
Gergei Bana
,
Koji Hasebe
,
Mitsuhiro Okada
Secrecy-Oriented First-Order Logical Analysis of Cryptographic Protocols.
IACR Cryptol. ePrint Arch.
2010 (2010)
Gergei Bana
,
Koji Hasebe
,
Mitsuhiro Okada
Computational Semantics for First-Order Logical Analysis of Cryptographic Protocols.
Formal to Practical Security
(2009)
Pedro Adão
,
Gergei Bana
,
Jonathan Herzog
,
Andre Scedrov
Soundness and completeness of formal encryption: The cases of key cycles and partial information leakage.
J. Comput. Secur.
17 (5) (2009)
Gergei Bana
,
Koji Hasebe
,
Mitsuhiro Okada
Computational Semantics for Basic Protocol Logic - A Stochastic Approach.
IACR Cryptol. ePrint Arch.
2007 (2007)
Gergei Bana
,
Koji Hasebe
,
Mitsuhiro Okada
Computational Semantics for Basic Protocol Logic - A Stochastic Approach.
ASIAN
(2007)
Gergei Bana
,
Payman Mohassel
,
Till Stegers
Computational Soundness of Formal Indistinguishability and Static Equivalence.
IACR Cryptol. ePrint Arch.
2006 (2006)
Gergei Bana
,
Payman Mohassel
,
Till Stegers
Computational Soundness of Formal Indistinguishability and Static Equivalence.
ASIAN
(2006)
Gergei Bana
Soundness and Completeness of Formal Logics of Symmetric Encryption.
IACR Cryptol. ePrint Arch.
2005 (2005)
Pedro Adão
,
Gergei Bana
,
Jonathan Herzog
,
Andre Scedrov
Soundness of Formal Encryption in the Presence of Key-Cycles.
ESORICS
(2005)
Pedro Adão
,
Gergei Bana
,
Andre Scedrov
Computational and Information-Theoretic Soundness and Completeness of Formal Encryption.
CSFW
(2005)