Alexandra Boldyreva
Affiliations:- Georgia Tech
According to our database1,
Alexandra Boldyreva
authored at least 56 papers
between 2000 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2025
May the Force itnot Be with you: Brute-Force Resistant Biometric Authentication and Key Reconstruction.
IACR Cryptol. ePrint Arch., 2025
2024
Provable Security Analysis of Butterfly Key Mechanism Protocol in IEEE 1609.2.1 Standard.
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
Proceedings of the Security and Cryptography for Networks - 14th International Conference, 2024
2021
Secure Communication Channel Establishment: TLS 1.3 (over TCP Fast Open) versus QUIC.
J. Cryptol., 2021
Privacy-Preserving Approximate k-Nearest-Neighbors Search that Hides Access, Query and Volume Patterns.
IACR Cryptol. ePrint Arch., 2021
Fuzzy Labeled Private Set Intersection with Applications to Private Real-Time Biometric Search.
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021
2019
Proceedings of the Computer Security - ESORICS 2019, 2019
Proceedings of the Applied Cryptography and Network Security, 2019
2017
Proceedings of the 30th IEEE Computer Security Foundations Symposium, 2017
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017
2016
Proceedings of the Security and Cryptography for Networks - 10th International Conference, 2016
2015
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015
2014
Mimesis Aegis: A Mimicry Privacy Shield-A System's Approach to Data Privacy on Public Cloud.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014
Proceedings of the Fast Software Encryption - 21st International Workshop, 2014
2013
Proceedings of the Fast Software Encryption - 20th International Workshop, 2013
2012
Proceedings of the Advances in Cryptology - EUROCRYPT 2012, 2012
Proceedings of the Topics in Cryptology - CT-RSA 2012 - The Cryptographers' Track at the RSA Conference 2012, San Francisco, CA, USA, February 27, 2012
Provable security of S-BGP and other path vector protocols: model, analysis and extensions.
Proceedings of the ACM Conference on Computer and Communications Security, 2012
2011
Order-Preserving Encryption Revisited: Improved Security Analysis and Alternative Solutions.
Proceedings of the Advances in Cryptology - CRYPTO 2011, 2011
2010
Proceedings of the Selected Areas in Cryptography - 17th International Workshop, 2010
2009
Proceedings of the Advances in Cryptology, 2009
Proceedings of the Advances in Cryptology, 2009
2008
ACM Trans. Inf. Syst. Secur., 2008
On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles.
Proceedings of the Advances in Cryptology, 2008
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008
2007
Multirecipient Encryption Schemes: How to Save on Bandwidth and Computation Without Sacrificing Security.
IEEE Trans. Inf. Theory, 2007
IACR Cryptol. ePrint Arch., 2007
Extended Abstract: Provable-Security Analysis of Authenticated Encryption in Kerberos.
Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P 2007), 2007
Proceedings of the Public Key Cryptography, 2007
Proceedings of the Data and Applications Security XXI, 2007
Proceedings of the Advances in Cryptology, 2007
Ordered multisignatures and identity-based sequential aggregate signatures, with applications to secure routing.
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007
2006
Proceedings of the 21st ACM SIGGRAPH/EUROGRAPHICS symposium on Graphics hardware, 2006
2005
High Efficiency Counter Mode Security Architecture via Prediction and Precomputation.
Proceedings of the 32st International Symposium on Computer Architecture (ISCA 2005), 2005
Analysis of Random Oracle Instantiation Scenarios for OAEP and Other Practical Schemes.
Proceedings of the Advances in Cryptology, 2005
2004
Proceedings of the Advances in Cryptology, 2004
Proceedings of the Topics in Cryptology, 2004
2003
IACR Cryptol. ePrint Arch., 2003
Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme.
Proceedings of the Public Key Cryptography, 2003
Proceedings of the Public Key Cryptography, 2003
2002
Efficient threshold signature, multisignature and blind signature schemes based on the Gap-Diffie-Hellman-group signature scheme.
IACR Cryptol. ePrint Arch., 2002
Proceedings of the Security and Privacy in Digital Rights Management, 2002
2001
Proceedings of the Advances in Cryptology, 2001
Proceedings of the Advances in Cryptology, 2001
2000
Proceedings of the Advances in Cryptology, 2000
Proceedings of the Advances in Cryptology, 2000