[go: up one dir, main page]

Follow
Alexandra Boldyreva
Alexandra Boldyreva
Professor, School of Cybersecurity and Privacy, Georgia Institute of Technology
Verified email at gatech.edu - Homepage
Title
Cited by
Cited by
Year
Threshold signatures, multisignatures and blind signatures based on the gap-Diffie-Hellman-group signature scheme
A Boldyreva
International Workshop on Public Key Cryptography, 31-46, 2002
15792002
Order-preserving symmetric encryption
A Boldyreva, N Chenette, Y Lee, A O’neill
Annual international conference on the theory and applications of …, 2009
13492009
Deterministic and efficiently searchable encryption
M Bellare, A Boldyreva, A O’Neill
Annual International Cryptology Conference, 535-552, 2007
11672007
Identity-based encryption with efficient revocation
A Boldyreva, V Goyal, V Kumar
Proceedings of the 15th ACM conference on Computer and communications …, 2008
10102008
Order-preserving encryption revisited: Improved security analysis and alternative solutions
A Boldyreva, N Chenette, A O’Neill
Annual cryptology conference, 578-595, 2011
7332011
Public-key encryption in a multi-user setting: Security proofs and improvements
M Bellare, A Boldyreva, S Micali
International conference on the theory and applications of cryptographic …, 2000
7212000
Key-privacy in public-key encryption
M Bellare, A Boldyreva, A Desai, D Pointcheval
International Conference on the Theory and Application of Cryptology and …, 2001
7042001
Secure proxy signature schemes for delegation of signing rights
A Boldyreva, A Palacio, B Warinschi
Journal of Cryptology 25 (1), 57-115, 2012
4472012
An uninstantiable random-oracle-model scheme for a hybrid-encryption problem
M Bellare, A Boldyreva, A Palacio
International Conference on the Theory and Applications of Cryptographic …, 2004
3712004
On notions of security for deterministic encryption, and efficient constructions without random oracles
A Boldyreva, S Fehr, A O’Neill
Annual International Cryptology Conference, 335-359, 2008
2782008
Ordered multisignatures and identity-based sequential aggregate signatures, with applications to secure routing
A Boldyreva, C Gentry, A O'Neill, DH Yum
Proceedings of the 14th ACM conference on Computer and communications …, 2007
2662007
Randomness re-use in multi-recipient encryption schemeas
M Bellare, A Boldyreva, J Staddon
International Workshop on Public Key Cryptography, 85-99, 2002
1892002
High efficiency counter mode security architecture via prediction and precomputation
W Shi, HS Lee, M Ghosh, C Lu, A Boldyreva
32nd International Symposium on Computer Architecture (ISCA'05), 14-24, 2005
1732005
How secure and quick is QUIC? Provable security and performance analyses
R Lychev, S Jero, A Boldyreva, C Nita-Rotaru
2015 IEEE Symposium on Security and Privacy, 214-231, 2015
1492015
Provably-secure schemes for basic query support in outsourced databases
G Amanatidis, A Boldyreva, A O’Neill
IFIP annual conference on data and applications security and privacy, 14-30, 2007
1482007
Efficient fuzzy search on encrypted data
A Boldyreva, N Chenette
International Workshop on Fast Software Encryption, 613-633, 2014
1262014
Online ciphers and the hash-CBC construction
M Bellare, A Boldyreva, L Knudsen, C Namprempre
Annual International Cryptology Conference, 292-309, 2001
1222001
Mimesis Aegis: A Mimicry Privacy {Shield–A}{System’s} Approach to Data Privacy on Public Cloud
B Lau, S Chung, C Song, Y Jang, W Lee, A Boldyreva
23rd usenix security symposium (USENIX Security 14), 33-48, 2014
1092014
A closer look at PKI: Security and efficiency
A Boldyreva, M Fischlin, A Palacio, B Warinschi
International Workshop on Public Key Cryptography, 458-475, 2007
922007
Provable security analysis of FIDO2
M Barbosa, A Boldyreva, S Chen, B Warinschi
Annual International Cryptology Conference, 125-156, 2021
872021
The system can't perform the operation now. Try again later.
Articles 1–20