Alexandra Boldyreva

According to our database1, Alexandra Boldyreva authored at least 46 papers between 2000 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2019
Secure Communication Channel Establishment: TLS 1.3 (over TCP Fast Open) vs. QUIC.
IACR Cryptology ePrint Archive, 2019

Masking Fuzzy-Searchable Public Databases.
IACR Cryptology ePrint Archive, 2019

2017
Hedging Public-Key Encryption in the Real World.
IACR Cryptology ePrint Archive, 2017

Human Computing for Handling Strong Corruptions in Authenticated Key Exchange.
IACR Cryptology ePrint Archive, 2017

2016
Provably-Secure Remote Memory Attestation for Heap Overflow Protection.
Proceedings of the Security and Cryptography for Networks - 10th International Conference, 2016

2015
How Secure and Quick is QUIC? Provable Security and Performance Analyses.
IACR Cryptology ePrint Archive, 2015

Towards Provably-Secure Remote Memory Attestation.
IACR Cryptology ePrint Archive, 2015

Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation.
IACR Cryptology ePrint Archive, 2015

2014
Making encryption work in the cloud.
Netw. Secur., 2014

Efficient Fuzzy Search on Encrypted Data.
IACR Cryptology ePrint Archive, 2014

Mimesis Aegis: A Mimicry Privacy Shield-A System's Approach to Data Privacy on Public Cloud.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

2013
Provable Security of S-BGP and other Path Vector Protocols: Model, Analysis and Extensions.
IACR Cryptology ePrint Archive, 2013

On Symmetric Encryption with Distinguishable Decryption Failures.
IACR Cryptology ePrint Archive, 2013

2012
Secure Proxy Signature Schemes for Delegation of Signing Rights.
J. Cryptology, 2012

On-line Ciphers and the Hash-CBC Constructions.
J. Cryptology, 2012

A New Pseudorandom Generator from Collision-Resistant Hash Functions.
IACR Cryptology ePrint Archive, 2012

Identity-based Encryption with Efficient Revocation.
IACR Cryptology ePrint Archive, 2012

Order-Preserving Encryption Revisited: Improved Security Analysis and Alternative Solutions.
IACR Cryptology ePrint Archive, 2012

Order-Preserving Symmetric Encryption.
IACR Cryptology ePrint Archive, 2012

2011
Provable-security analysis of authenticated encryption in Kerberos.
IET Information Security, 2011

2010
How to Strengthen the Security of RSA-OAEP.
IEEE Trans. Information Theory, 2010

Search on Encrypted Data in the Symmetric-Key Setting.
Proceedings of the Selected Areas in Cryptography - 17th International Workshop, 2010

2009
Foundations of Non-Malleable Hash and One-Way Functions.
IACR Cryptology ePrint Archive, 2009

Strengthening Security of RSA-OAEP.
Proceedings of the Topics in Cryptology, 2009

2008
New Multiparty Signature Schemes for Network Routing Applications.
ACM Trans. Inf. Syst. Secur., 2008

On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles.
IACR Cryptology ePrint Archive, 2008

2007
Multirecipient Encryption Schemes: How to Save on Bandwidth and Computation Without Sacrificing Security.
IEEE Trans. Information Theory, 2007

Ordered Multisignatures and Identity-Based Sequential Aggregate Signatures, with Applications to Secure Routing.
IACR Cryptology ePrint Archive, 2007

Extended Abstract: Provable-Security Analysis of Authenticated Encryption in Kerberos.
Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P 2007), 2007

A Closer Look at PKI: Security and Efficiency.
Proceedings of the Public Key Cryptography, 2007

Provably-Secure Schemes for Basic Query Support in Outsourced Databases.
Proceedings of the Data and Applications Security XXI, 2007

2006
Deterministic and Efficiently Searchable Encryption.
IACR Cryptology ePrint Archive, 2006

A Digital Rights Enabled Graphics Processing System.
Proceedings of the 21st ACM SIGGRAPH/EUROGRAPHICS symposium on Graphics hardware, 2006

On the Security of OAEP.
Proceedings of the Advances in Cryptology, 2006

2005
High Efficiency Counter Mode Security Architecture via Prediction and Precomputation.
Proceedings of the 32st International Symposium on Computer Architecture (ISCA 2005), 2005

Analysis of Random Oracle Instantiation Scenarios for OAEP and Other Practical Schemes.
Proceedings of the Advances in Cryptology, 2005

2004
Online Encryption Schemes: New Security Notions and Constructions.
Proceedings of the Topics in Cryptology, 2004

2003
An Uninstantiable Random-Oracle-Model Scheme for a Hybrid Encryption Problem.
IACR Cryptology ePrint Archive, 2003

Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme.
Proceedings of the Public Key Cryptography, 2003

Randomness Re-use in Multi-recipient Encryption Schemeas.
Proceedings of the Public Key Cryptography, 2003

2002
Efficient threshold signature, multisignature and blind signature schemes based on the Gap-Diffie-Hellman-group signature scheme.
IACR Cryptology ePrint Archive, 2002

Theft-Protected Proprietary Certificates.
Proceedings of the Security and Privacy in Digital Rights Management, 2002

2001
Online Ciphers and the Hash-CBC Construction.
Proceedings of the Advances in Cryptology, 2001

Key-Privacy in Public-Key Encryption.
Proceedings of the Advances in Cryptology, 2001

2000
The Security of Chaffing and Winnowing.
IACR Cryptology ePrint Archive, 2000

Public-Key Encryption in a Multi-user Setting: Security Proofs and Improvements.
Proceedings of the Advances in Cryptology, 2000


  Loading...