Alexandra Boldyreva
Affiliations:- Georgia Tech
According to our database1,
Alexandra Boldyreva
authored at least 53 papers
between 2000 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2024
Provable Security Analysis of Butterfly Key Mechanism Protocol in IEEE 1609.2.1 Standard.
Proc. Priv. Enhancing Technol., 2024
Proc. Priv. Enhancing Technol., 2024
Proceedings of the Security and Cryptography for Networks - 14th International Conference, 2024
2021
Privacy-Preserving Approximate k-Nearest-Neighbors Search that Hides Access, Query and Volume Patterns.
Proc. Priv. Enhancing Technol., 2021
Secure Communication Channel Establishment: TLS 1.3 (over TCP Fast Open) versus QUIC.
J. Cryptol., 2021
Fuzzy Labeled Private Set Intersection with Applications to Private Real-Time Biometric Search.
Proceedings of the 30th USENIX Security Symposium, 2021
2020
2019
IACR Cryptol. ePrint Arch., 2019
2017
IACR Cryptol. ePrint Arch., 2017
2016
Proceedings of the Security and Cryptography for Networks - 10th International Conference, 2016
2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
2014
Mimesis Aegis: A Mimicry Privacy Shield-A System's Approach to Data Privacy on Public Cloud.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014
2013
Provable Security of S-BGP and other Path Vector Protocols: Model, Analysis and Extensions.
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
2012
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
Order-Preserving Encryption Revisited: Improved Security Analysis and Alternative Solutions.
IACR Cryptol. ePrint Arch., 2012
2011
IET Inf. Secur., 2011
2010
Proceedings of the Selected Areas in Cryptography - 17th International Workshop, 2010
2009
IACR Cryptol. ePrint Arch., 2009
2008
ACM Trans. Inf. Syst. Secur., 2008
On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles.
IACR Cryptol. ePrint Arch., 2008
2007
Multirecipient Encryption Schemes: How to Save on Bandwidth and Computation Without Sacrificing Security.
IEEE Trans. Inf. Theory, 2007
Ordered Multisignatures and Identity-Based Sequential Aggregate Signatures, with Applications to Secure Routing.
IACR Cryptol. ePrint Arch., 2007
Extended Abstract: Provable-Security Analysis of Authenticated Encryption in Kerberos.
Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P 2007), 2007
Proceedings of the Public Key Cryptography, 2007
Proceedings of the Data and Applications Security XXI, 2007
2006
IACR Cryptol. ePrint Arch., 2006
Proceedings of the 21st ACM SIGGRAPH/EUROGRAPHICS symposium on Graphics hardware, 2006
2005
High Efficiency Counter Mode Security Architecture via Prediction and Precomputation.
Proceedings of the 32st International Symposium on Computer Architecture (ISCA 2005), 2005
Analysis of Random Oracle Instantiation Scenarios for OAEP and Other Practical Schemes.
Proceedings of the Advances in Cryptology, 2005
2004
Proceedings of the Topics in Cryptology, 2004
2003
IACR Cryptol. ePrint Arch., 2003
Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme.
Proceedings of the Public Key Cryptography, 2003
Proceedings of the Public Key Cryptography, 2003
2002
Efficient threshold signature, multisignature and blind signature schemes based on the Gap-Diffie-Hellman-group signature scheme.
IACR Cryptol. ePrint Arch., 2002
Proceedings of the Security and Privacy in Digital Rights Management, 2002
2001
Proceedings of the Advances in Cryptology, 2001
Proceedings of the Advances in Cryptology, 2001
2000
Proceedings of the Advances in Cryptology, 2000