| Threshold signatures, multisignatures and blind signatures based on the gap-Diffie-Hellman-group signature scheme A Boldyreva International Workshop on Public Key Cryptography, 31-46, 2002 | 1579 | 2002 |
| Order-preserving symmetric encryption A Boldyreva, N Chenette, Y Lee, A O’neill Annual international conference on the theory and applications of …, 2009 | 1349 | 2009 |
| Deterministic and efficiently searchable encryption M Bellare, A Boldyreva, A O’Neill Annual International Cryptology Conference, 535-552, 2007 | 1167 | 2007 |
| Identity-based encryption with efficient revocation A Boldyreva, V Goyal, V Kumar Proceedings of the 15th ACM conference on Computer and communications …, 2008 | 1010 | 2008 |
| Order-preserving encryption revisited: Improved security analysis and alternative solutions A Boldyreva, N Chenette, A O’Neill Annual cryptology conference, 578-595, 2011 | 733 | 2011 |
| Public-key encryption in a multi-user setting: Security proofs and improvements M Bellare, A Boldyreva, S Micali International conference on the theory and applications of cryptographic …, 2000 | 721 | 2000 |
| Key-privacy in public-key encryption M Bellare, A Boldyreva, A Desai, D Pointcheval International Conference on the Theory and Application of Cryptology and …, 2001 | 704 | 2001 |
| Secure proxy signature schemes for delegation of signing rights A Boldyreva, A Palacio, B Warinschi Journal of Cryptology 25 (1), 57-115, 2012 | 447 | 2012 |
| An uninstantiable random-oracle-model scheme for a hybrid-encryption problem M Bellare, A Boldyreva, A Palacio International Conference on the Theory and Applications of Cryptographic …, 2004 | 371 | 2004 |
| On notions of security for deterministic encryption, and efficient constructions without random oracles A Boldyreva, S Fehr, A O’Neill Annual International Cryptology Conference, 335-359, 2008 | 278 | 2008 |
| Ordered multisignatures and identity-based sequential aggregate signatures, with applications to secure routing A Boldyreva, C Gentry, A O'Neill, DH Yum Proceedings of the 14th ACM conference on Computer and communications …, 2007 | 266 | 2007 |
| Randomness re-use in multi-recipient encryption schemeas M Bellare, A Boldyreva, J Staddon International Workshop on Public Key Cryptography, 85-99, 2002 | 189 | 2002 |
| High efficiency counter mode security architecture via prediction and precomputation W Shi, HS Lee, M Ghosh, C Lu, A Boldyreva 32nd International Symposium on Computer Architecture (ISCA'05), 14-24, 2005 | 173 | 2005 |
| How secure and quick is QUIC? Provable security and performance analyses R Lychev, S Jero, A Boldyreva, C Nita-Rotaru 2015 IEEE Symposium on Security and Privacy, 214-231, 2015 | 149 | 2015 |
| Provably-secure schemes for basic query support in outsourced databases G Amanatidis, A Boldyreva, A O’Neill IFIP annual conference on data and applications security and privacy, 14-30, 2007 | 148 | 2007 |
| Efficient fuzzy search on encrypted data A Boldyreva, N Chenette International Workshop on Fast Software Encryption, 613-633, 2014 | 126 | 2014 |
| Online ciphers and the hash-CBC construction M Bellare, A Boldyreva, L Knudsen, C Namprempre Annual International Cryptology Conference, 292-309, 2001 | 122 | 2001 |
| Mimesis Aegis: A Mimicry Privacy {Shield–A}{System’s} Approach to Data Privacy on Public Cloud B Lau, S Chung, C Song, Y Jang, W Lee, A Boldyreva 23rd usenix security symposium (USENIX Security 14), 33-48, 2014 | 109 | 2014 |
| A closer look at PKI: Security and efficiency A Boldyreva, M Fischlin, A Palacio, B Warinschi International Workshop on Public Key Cryptography, 458-475, 2007 | 92 | 2007 |
| Provable security analysis of FIDO2 M Barbosa, A Boldyreva, S Chen, B Warinschi Annual International Cryptology Conference, 125-156, 2021 | 87 | 2021 |