Alexandra Boldyreva

Affiliations:
  • Georgia Tech


According to our database1, Alexandra Boldyreva authored at least 56 papers between 2000 and 2025.

Collaborative distances:
  • Dijkstra number2 of two.
  • Erdős number3 of three.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Privacy and Security of FIDO2 Revisited.
Proc. Priv. Enhancing Technol., 2025

May the Force itnot Be with you: Brute-Force Resistant Biometric Authentication and Key Reconstruction.
IACR Cryptol. ePrint Arch., 2025

Revisiting the Security and Privacy of FIDO2.
IACR Cryptol. ePrint Arch., 2025

2024
Provable Security Analysis of Butterfly Key Mechanism Protocol in IEEE 1609.2.1 Standard.
IACR Cryptol. ePrint Arch., 2024

Understanding Leakage in Searchable Encryption: a Quantitative Approach.
IACR Cryptol. ePrint Arch., 2024

Encrypted Multi-map that Hides Query, Access, and Volume Patterns.
Proceedings of the Security and Cryptography for Networks - 14th International Conference, 2024

2021
Secure Communication Channel Establishment: TLS 1.3 (over TCP Fast Open) versus QUIC.
J. Cryptol., 2021

Privacy-Preserving Approximate k-Nearest-Neighbors Search that Hides Access, Query and Volume Patterns.
IACR Cryptol. ePrint Arch., 2021

Fuzzy Labeled Private Set Intersection with Applications to Private Real-Time Biometric Search.
Proceedings of the 30th USENIX Security Symposium, 2021

Provable Security Analysis of FIDO2.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

2019
Secure Communication Channel Establishment: TLS 1.3 (over TCP Fast Open) vs. QUIC.
Proceedings of the Computer Security - ESORICS 2019, 2019

Masking Fuzzy-Searchable Public Databases.
Proceedings of the Applied Cryptography and Network Security, 2019

2017
Human Computing for Handling Strong Corruptions in Authenticated Key Exchange.
Proceedings of the 30th IEEE Computer Security Foundations Symposium, 2017

Hedging Public-Key Encryption in the Real World.
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017

2016
Provably-Secure Remote Memory Attestation for Heap Overflow Protection.
Proceedings of the Security and Cryptography for Networks - 10th International Conference, 2016

2015
Towards Provably-Secure Remote Memory Attestation.
IACR Cryptol. ePrint Arch., 2015

How Secure and Quick is QUIC? Provable Security and Performance Analyses.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

2014
Making encryption work in the cloud.
Netw. Secur., 2014

Mimesis Aegis: A Mimicry Privacy Shield-A System's Approach to Data Privacy on Public Cloud.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

Efficient Fuzzy Search on Encrypted Data.
Proceedings of the Fast Software Encryption - 21st International Workshop, 2014

2013
On Symmetric Encryption with Distinguishable Decryption Failures.
Proceedings of the Fast Software Encryption - 20th International Workshop, 2013

2012
Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation.
Proceedings of the Advances in Cryptology - EUROCRYPT 2012, 2012

A New Pseudorandom Generator from Collision-Resistant Hash Functions.
Proceedings of the Topics in Cryptology - CT-RSA 2012 - The Cryptographers' Track at the RSA Conference 2012, San Francisco, CA, USA, February 27, 2012

Provable security of S-BGP and other path vector protocols: model, analysis and extensions.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
Order-Preserving Encryption Revisited: Improved Security Analysis and Alternative Solutions.
Proceedings of the Advances in Cryptology - CRYPTO 2011, 2011

2010
How to Strengthen the Security of RSA-OAEP.
IEEE Trans. Inf. Theory, 2010

Search on Encrypted Data in the Symmetric-Key Setting.
Proceedings of the Selected Areas in Cryptography - 17th International Workshop, 2010

2009
Order-Preserving Symmetric Encryption.
Proceedings of the Advances in Cryptology, 2009

Strengthening Security of RSA-OAEP.
Proceedings of the Topics in Cryptology, 2009

Foundations of Non-malleable Hash and One-Way Functions.
Proceedings of the Advances in Cryptology, 2009

2008
New Multiparty Signature Schemes for Network Routing Applications.
ACM Trans. Inf. Syst. Secur., 2008

On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles.
Proceedings of the Advances in Cryptology, 2008

Identity-based encryption with efficient revocation.
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008

2007
Multirecipient Encryption Schemes: How to Save on Bandwidth and Computation Without Sacrificing Security.
IEEE Trans. Inf. Theory, 2007

Provable-Security Analysis of Authenticated Encryption in Kerberos.
IACR Cryptol. ePrint Arch., 2007

On-Line Ciphers and the Hash-CBC Constructions.
IACR Cryptol. ePrint Arch., 2007

Extended Abstract: Provable-Security Analysis of Authenticated Encryption in Kerberos.
Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P 2007), 2007

A Closer Look at PKI: Security and Efficiency.
Proceedings of the Public Key Cryptography, 2007

Provably-Secure Schemes for Basic Query Support in Outsourced Databases.
Proceedings of the Data and Applications Security XXI, 2007

Deterministic and Efficiently Searchable Encryption.
Proceedings of the Advances in Cryptology, 2007

Ordered multisignatures and identity-based sequential aggregate signatures, with applications to secure routing.
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007

2006
A Digital Rights Enabled Graphics Processing System.
Proceedings of the 21st ACM SIGGRAPH/EUROGRAPHICS symposium on Graphics hardware, 2006

On the Security of OAEP.
Proceedings of the Advances in Cryptology, 2006

2005
High Efficiency Counter Mode Security Architecture via Prediction and Precomputation.
Proceedings of the 32st International Symposium on Computer Architecture (ISCA 2005), 2005

Analysis of Random Oracle Instantiation Scenarios for OAEP and Other Practical Schemes.
Proceedings of the Advances in Cryptology, 2005

2004
An Uninstantiable Random-Oracle-Model Scheme for a Hybrid-Encryption Problem.
Proceedings of the Advances in Cryptology, 2004

Online Encryption Schemes: New Security Notions and Constructions.
Proceedings of the Topics in Cryptology, 2004

2003
Secure Proxy Signature Schemes for Delegation of Signing Rights.
IACR Cryptol. ePrint Arch., 2003

Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme.
Proceedings of the Public Key Cryptography, 2003

Randomness Re-use in Multi-recipient Encryption Schemeas.
Proceedings of the Public Key Cryptography, 2003

2002
Efficient threshold signature, multisignature and blind signature schemes based on the Gap-Diffie-Hellman-group signature scheme.
IACR Cryptol. ePrint Arch., 2002

Theft-Protected Proprietary Certificates.
Proceedings of the Security and Privacy in Digital Rights Management, 2002

2001
Online Ciphers and the Hash-CBC Construction.
Proceedings of the Advances in Cryptology, 2001

Key-Privacy in Public-Key Encryption.
Proceedings of the Advances in Cryptology, 2001

2000
Public-Key Encryption in a Multi-user Setting: Security Proofs and Improvements.
Proceedings of the Advances in Cryptology, 2000

The Security of Chaffing and Winnowing.
Proceedings of the Advances in Cryptology, 2000


  Loading...