Alexandra Boldyreva

Affiliations:
  • Georgia Tech


According to our database1, Alexandra Boldyreva authored at least 50 papers between 2000 and 2021.

Collaborative distances:
  • Dijkstra number2 of two.
  • Erdős number3 of three.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2021
Privacy-Preserving Approximate k-Nearest-Neighbors Search that Hides Access, Query and Volume Patterns.
Proc. Priv. Enhancing Technol., 2021

Secure Communication Channel Establishment: TLS 1.3 (over TCP Fast Open) versus QUIC.
J. Cryptol., 2021

Fuzzy Labeled Private Set Intersection with Applications to Private Real-Time Biometric Search.
Proceedings of the 30th USENIX Security Symposium, 2021

2020
Provable Security Analysis of FIDO2.
IACR Cryptol. ePrint Arch., 2020

2019
Secure Communication Channel Establishment: TLS 1.3 (over TCP Fast Open) vs. QUIC.
IACR Cryptol. ePrint Arch., 2019

Masking Fuzzy-Searchable Public Databases.
IACR Cryptol. ePrint Arch., 2019

2017
Hedging Public-Key Encryption in the Real World.
IACR Cryptol. ePrint Arch., 2017

Human Computing for Handling Strong Corruptions in Authenticated Key Exchange.
IACR Cryptol. ePrint Arch., 2017

2016
Provably-Secure Remote Memory Attestation for Heap Overflow Protection.
Proceedings of the Security and Cryptography for Networks - 10th International Conference, 2016

2015
How Secure and Quick is QUIC? Provable Security and Performance Analyses.
IACR Cryptol. ePrint Arch., 2015

Towards Provably-Secure Remote Memory Attestation.
IACR Cryptol. ePrint Arch., 2015

Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation.
IACR Cryptol. ePrint Arch., 2015

2014
Making encryption work in the cloud.
Netw. Secur., 2014

Efficient Fuzzy Search on Encrypted Data.
IACR Cryptol. ePrint Arch., 2014

Mimesis Aegis: A Mimicry Privacy Shield-A System's Approach to Data Privacy on Public Cloud.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

2013
Provable Security of S-BGP and other Path Vector Protocols: Model, Analysis and Extensions.
IACR Cryptol. ePrint Arch., 2013

On Symmetric Encryption with Distinguishable Decryption Failures.
IACR Cryptol. ePrint Arch., 2013

2012
Secure Proxy Signature Schemes for Delegation of Signing Rights.
J. Cryptol., 2012

On-line Ciphers and the Hash-CBC Constructions.
J. Cryptol., 2012

A New Pseudorandom Generator from Collision-Resistant Hash Functions.
IACR Cryptol. ePrint Arch., 2012

Identity-based Encryption with Efficient Revocation.
IACR Cryptol. ePrint Arch., 2012

Order-Preserving Encryption Revisited: Improved Security Analysis and Alternative Solutions.
IACR Cryptol. ePrint Arch., 2012

Order-Preserving Symmetric Encryption.
IACR Cryptol. ePrint Arch., 2012

2011
Provable-security analysis of authenticated encryption in Kerberos.
IET Inf. Secur., 2011

2010
How to Strengthen the Security of RSA-OAEP.
IEEE Trans. Inf. Theory, 2010

Search on Encrypted Data in the Symmetric-Key Setting.
Proceedings of the Selected Areas in Cryptography - 17th International Workshop, 2010

2009
Foundations of Non-Malleable Hash and One-Way Functions.
IACR Cryptol. ePrint Arch., 2009

Strengthening Security of RSA-OAEP.
Proceedings of the Topics in Cryptology, 2009

2008
New Multiparty Signature Schemes for Network Routing Applications.
ACM Trans. Inf. Syst. Secur., 2008

On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles.
IACR Cryptol. ePrint Arch., 2008

2007
Multirecipient Encryption Schemes: How to Save on Bandwidth and Computation Without Sacrificing Security.
IEEE Trans. Inf. Theory, 2007

Ordered Multisignatures and Identity-Based Sequential Aggregate Signatures, with Applications to Secure Routing.
IACR Cryptol. ePrint Arch., 2007

Extended Abstract: Provable-Security Analysis of Authenticated Encryption in Kerberos.
Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P 2007), 2007

A Closer Look at PKI: Security and Efficiency.
Proceedings of the Public Key Cryptography, 2007

Provably-Secure Schemes for Basic Query Support in Outsourced Databases.
Proceedings of the Data and Applications Security XXI, 2007

2006
Deterministic and Efficiently Searchable Encryption.
IACR Cryptol. ePrint Arch., 2006

A Digital Rights Enabled Graphics Processing System.
Proceedings of the 21st ACM SIGGRAPH/EUROGRAPHICS symposium on Graphics hardware, 2006

On the Security of OAEP.
Proceedings of the Advances in Cryptology, 2006

2005
High Efficiency Counter Mode Security Architecture via Prediction and Precomputation.
Proceedings of the 32st International Symposium on Computer Architecture (ISCA 2005), 2005

Analysis of Random Oracle Instantiation Scenarios for OAEP and Other Practical Schemes.
Proceedings of the Advances in Cryptology, 2005

2004
Online Encryption Schemes: New Security Notions and Constructions.
Proceedings of the Topics in Cryptology, 2004

2003
An Uninstantiable Random-Oracle-Model Scheme for a Hybrid Encryption Problem.
IACR Cryptol. ePrint Arch., 2003

Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme.
Proceedings of the Public Key Cryptography, 2003

Randomness Re-use in Multi-recipient Encryption Schemeas.
Proceedings of the Public Key Cryptography, 2003

2002
Efficient threshold signature, multisignature and blind signature schemes based on the Gap-Diffie-Hellman-group signature scheme.
IACR Cryptol. ePrint Arch., 2002

Theft-Protected Proprietary Certificates.
Proceedings of the Security and Privacy in Digital Rights Management, 2002

2001
Online Ciphers and the Hash-CBC Construction.
Proceedings of the Advances in Cryptology, 2001

Key-Privacy in Public-Key Encryption.
Proceedings of the Advances in Cryptology, 2001

2000
The Security of Chaffing and Winnowing.
IACR Cryptol. ePrint Arch., 2000

Public-Key Encryption in a Multi-user Setting: Security Proofs and Improvements.
Proceedings of the Advances in Cryptology, 2000


  Loading...