Alexandra Boldyreva, Ph.D. - Publications

Affiliations: 
2004 University of California, San Diego, La Jolla, CA 
Area:
Computer Science

34 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2015 Lychev R, Jero S, Boldyreva A, Nita-Rotaru C. How secure and quick is QUIC? Provable security and performance analyses Proceedings - Ieee Symposium On Security and Privacy. 2015: 214-231. DOI: 10.1109/SP.2015.21  0.67
2015 Boldyreva A, Chenette N. Efficient fuzzy search on encrypted data Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8540: 613-633. DOI: 10.1007/978-3-662-46706-0_31  0.634
2014 Boldyreva A, Grubbs P. Making encryption work in the cloud Network Security. 2014: 8-10. DOI: 10.1016/S1353-4858(14)70101-1  0.59
2014 Boldyreva A, Degabriele JP, Paterson KG, Stam M. On symmetric encryption with distinguishable decryption failures Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8424: 367-390. DOI: 10.1007/978-3-662-43933-3_19  0.577
2014 Boldyreva A, Degabriele JP, Paterson KG, Stam M. Fast Sofware Encryption - FSE 2013 Springer Us. DOI: 10.1007/978-3-662-43933-3  0.622
2012 Boldyreva A, Lychev R. Provable security of S-BGP and other path vector protocols: Model, analysis and extensions Proceedings of the Acm Conference On Computer and Communications Security. 541-552. DOI: 10.1145/2382196.2382254  0.669
2012 Bellare M, Boldyreva A, Knudsen L, Namprempre C. On-line ciphers and the hash-CBC constructions Journal of Cryptology. 25: 640-679. DOI: 10.1007/S00145-011-9106-1  0.61
2012 Boldyreva A, Palacio A, Warinschi B. Secure proxy signature schemes for delegation of signing rights Journal of Cryptology. 25: 57-115. DOI: 10.1007/S00145-010-9082-X  0.693
2012 Boldyreva A, Degabriele JP, Paterson KG, Stam M. Security of symmetric encryption in the presence of ciphertext fragmentation Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7237: 682-699. DOI: 10.1007/978-3-642-29011-4_40  0.703
2011 Boldyreva A, Kumar V. Provable-security analysis of authenticated encryption in Kerberos Iet Information Security. 5: 207-219. DOI: 10.1049/Iet-Ifs.2011.0041  0.678
2011 Boldyreva A, Chenette N, O'Neill A. Order-preserving encryption revisited: Improved security analysis and alternative solutions Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6841: 578-595. DOI: 10.1007/978-3-642-22792-9_33  0.504
2010 Boldyreva A, Imai H, Kobara K. How to strengthen the security of RSA-OAEP Ieee Transactions On Information Theory. 56: 5876-5886. DOI: 10.1109/Tit.2010.2070330  0.76
2009 Boldyreva A, Chenette N, Lee Y, O'Neill A. Order-preserving symmetric encryption Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5479: 224-241. DOI: 10.1007/978-3-642-01001-9_13  0.368
2009 Boldyreva A. Strengthening security of RSA-OAEP Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5473: 399-413. DOI: 10.1007/978-3-642-00862-7_27  0.727
2008 Boldyreva A, Goyal V, Kumart V. Identity-based encryption with efficient revocation Proceedings of the Acm Conference On Computer and Communications Security. 417-426. DOI: 10.1145/1455770.1455823  0.504
2008 Boldyreva A, Gentry C, O'Neill A, Yum DH. New multiparty signature schemes for network routing applications Acm Transactions On Information and System Security. 12. DOI: 10.1145/1410234.1410237  0.723
2008 Boldyreva A, Fehr S, O'Neill A. On notions of security for deterministic encryption, and efficient constructions without random oracles Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5157: 335-359. DOI: 10.1007/978-3-540-85174-5_19  0.626
2007 Boldyreva A, Gentry C, O'Neill A, Yum DH. Ordered multisignatures and identity-based sequential aggregate signatures, with applications to secure routing Proceedings of the Acm Conference On Computer and Communications Security. 276-285. DOI: 10.1145/1315245.1315280  0.719
2007 Bellare M, Boldyreva A, Kurosawa K, Staddon J. Multirecipient encryption schemes: How to save on bandwidth and computation without sacrificing security Ieee Transactions On Information Theory. 53: 3927-3943. DOI: 10.1109/Tit.2007.907471  0.754
2007 Amanatidis G, Boldyreva A, O'Neill A. Provably-secure schemes for basic query support in outsourced databases Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4602: 14-30.  0.688
2007 Bellare M, Boldyreva A, O'Neill A. Deterministic and efficiently searchable encryption Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4622: 535-552.  0.545
2007 Boldyreva A, Fischlin M, Palacio A, Warinschi B. A closer look at PKI: Security and efficiency Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4450: 458-475.  0.595
2006 Boldyreva A, Fischlin M. On the security of OAEP Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4284: 210-225. DOI: 10.1007/11935230_14  0.669
2006 Boldyreva A, Fischlin M. Analysis of random oracle instantiation scenarios for OAEP and other practical schemes Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3621: 412-429.  0.418
2005 Shi W, Lee HHS, Ghosh M, Lu C, Boldyreva A. High efficiency Counter Mode security architecture via prediction and precomputation Proceedings - International Symposium On Computer Architecture. 14-24.  0.36
2004 Bellare M, Boldyreva A, Palacio A. An uninstantiable random-oracle-model scheme for a hybrid-encryption problem Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3027: 171-188.  0.579
2004 Boldyreva A, Taesombut N. Online encryption schemes: New security notions and constructions Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2964: 1-14.  0.713
2003 Boldyreva A, Jakobsson M. Theft-protected proprietary certificates Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2696: 208-220.  0.343
2003 Bellare M, Boldyreva A, Staddon J. Randomness re-use in multi-recipient encryption schemes Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2567: 85-99.  0.661
2003 Boldyreva A. Threshold signatures, multisignatures and blind signatures based on the Gap-Diffie-Hellman-group signature scheme Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2567: 31-46.  0.576
2001 Bellare M, Boldyreva A, Desai A, Pointcheval D. Key-privacy in public-key encryption Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2248: 566-582.  0.698
2001 Bellare M, Boldyreva A, Knudsen L, Namprempre C. Online ciphers and the Hash-CBC construction Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2139: 292-309.  0.742
2000 Bellare M, Boldyreva A, Micali S. Public-key encryption in a multi-user setting: Security proofs and improvements Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1807: 259-274.  0.665
2000 Bellare M, Boldyreva A. The security of chaffing and winnowing Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1976: 517-530.  0.748
Show low-probability matches.