Year |
Citation |
Score |
2015 |
Lychev R, Jero S, Boldyreva A, Nita-Rotaru C. How secure and quick is QUIC? Provable security and performance analyses Proceedings - Ieee Symposium On Security and Privacy. 2015: 214-231. DOI: 10.1109/SP.2015.21 |
0.67 |
|
2015 |
Boldyreva A, Chenette N. Efficient fuzzy search on encrypted data Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8540: 613-633. DOI: 10.1007/978-3-662-46706-0_31 |
0.634 |
|
2014 |
Boldyreva A, Grubbs P. Making encryption work in the cloud Network Security. 2014: 8-10. DOI: 10.1016/S1353-4858(14)70101-1 |
0.59 |
|
2014 |
Boldyreva A, Degabriele JP, Paterson KG, Stam M. On symmetric encryption with distinguishable decryption failures Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8424: 367-390. DOI: 10.1007/978-3-662-43933-3_19 |
0.577 |
|
2014 |
Boldyreva A, Degabriele JP, Paterson KG, Stam M. Fast Sofware Encryption - FSE 2013 Springer Us. DOI: 10.1007/978-3-662-43933-3 |
0.622 |
|
2012 |
Boldyreva A, Lychev R. Provable security of S-BGP and other path vector protocols: Model, analysis and extensions Proceedings of the Acm Conference On Computer and Communications Security. 541-552. DOI: 10.1145/2382196.2382254 |
0.669 |
|
2012 |
Bellare M, Boldyreva A, Knudsen L, Namprempre C. On-line ciphers and the hash-CBC constructions Journal of Cryptology. 25: 640-679. DOI: 10.1007/S00145-011-9106-1 |
0.61 |
|
2012 |
Boldyreva A, Palacio A, Warinschi B. Secure proxy signature schemes for delegation of signing rights Journal of Cryptology. 25: 57-115. DOI: 10.1007/S00145-010-9082-X |
0.693 |
|
2012 |
Boldyreva A, Degabriele JP, Paterson KG, Stam M. Security of symmetric encryption in the presence of ciphertext fragmentation Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7237: 682-699. DOI: 10.1007/978-3-642-29011-4_40 |
0.703 |
|
2011 |
Boldyreva A, Kumar V. Provable-security analysis of authenticated encryption in Kerberos Iet Information Security. 5: 207-219. DOI: 10.1049/Iet-Ifs.2011.0041 |
0.678 |
|
2011 |
Boldyreva A, Chenette N, O'Neill A. Order-preserving encryption revisited: Improved security analysis and alternative solutions Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6841: 578-595. DOI: 10.1007/978-3-642-22792-9_33 |
0.504 |
|
2010 |
Boldyreva A, Imai H, Kobara K. How to strengthen the security of RSA-OAEP Ieee Transactions On Information Theory. 56: 5876-5886. DOI: 10.1109/Tit.2010.2070330 |
0.76 |
|
2009 |
Boldyreva A, Chenette N, Lee Y, O'Neill A. Order-preserving symmetric encryption Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5479: 224-241. DOI: 10.1007/978-3-642-01001-9_13 |
0.368 |
|
2009 |
Boldyreva A. Strengthening security of RSA-OAEP Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5473: 399-413. DOI: 10.1007/978-3-642-00862-7_27 |
0.727 |
|
2008 |
Boldyreva A, Goyal V, Kumart V. Identity-based encryption with efficient revocation Proceedings of the Acm Conference On Computer and Communications Security. 417-426. DOI: 10.1145/1455770.1455823 |
0.504 |
|
2008 |
Boldyreva A, Gentry C, O'Neill A, Yum DH. New multiparty signature schemes for network routing applications Acm Transactions On Information and System Security. 12. DOI: 10.1145/1410234.1410237 |
0.723 |
|
2008 |
Boldyreva A, Fehr S, O'Neill A. On notions of security for deterministic encryption, and efficient constructions without random oracles Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5157: 335-359. DOI: 10.1007/978-3-540-85174-5_19 |
0.626 |
|
2007 |
Boldyreva A, Gentry C, O'Neill A, Yum DH. Ordered multisignatures and identity-based sequential aggregate signatures, with applications to secure routing Proceedings of the Acm Conference On Computer and Communications Security. 276-285. DOI: 10.1145/1315245.1315280 |
0.719 |
|
2007 |
Bellare M, Boldyreva A, Kurosawa K, Staddon J. Multirecipient encryption schemes: How to save on bandwidth and computation without sacrificing security Ieee Transactions On Information Theory. 53: 3927-3943. DOI: 10.1109/Tit.2007.907471 |
0.754 |
|
2007 |
Amanatidis G, Boldyreva A, O'Neill A. Provably-secure schemes for basic query support in outsourced databases Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4602: 14-30. |
0.688 |
|
2007 |
Bellare M, Boldyreva A, O'Neill A. Deterministic and efficiently searchable encryption Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4622: 535-552. |
0.545 |
|
2007 |
Boldyreva A, Fischlin M, Palacio A, Warinschi B. A closer look at PKI: Security and efficiency Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4450: 458-475. |
0.595 |
|
2006 |
Boldyreva A, Fischlin M. On the security of OAEP Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4284: 210-225. DOI: 10.1007/11935230_14 |
0.669 |
|
2006 |
Boldyreva A, Fischlin M. Analysis of random oracle instantiation scenarios for OAEP and other practical schemes Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3621: 412-429. |
0.418 |
|
2005 |
Shi W, Lee HHS, Ghosh M, Lu C, Boldyreva A. High efficiency Counter Mode security architecture via prediction and precomputation Proceedings - International Symposium On Computer Architecture. 14-24. |
0.36 |
|
2004 |
Bellare M, Boldyreva A, Palacio A. An uninstantiable random-oracle-model scheme for a hybrid-encryption problem Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3027: 171-188. |
0.579 |
|
2004 |
Boldyreva A, Taesombut N. Online encryption schemes: New security notions and constructions Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2964: 1-14. |
0.713 |
|
2003 |
Boldyreva A, Jakobsson M. Theft-protected proprietary certificates Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2696: 208-220. |
0.343 |
|
2003 |
Bellare M, Boldyreva A, Staddon J. Randomness re-use in multi-recipient encryption schemes Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2567: 85-99. |
0.661 |
|
2003 |
Boldyreva A. Threshold signatures, multisignatures and blind signatures based on the Gap-Diffie-Hellman-group signature scheme Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2567: 31-46. |
0.576 |
|
2001 |
Bellare M, Boldyreva A, Desai A, Pointcheval D. Key-privacy in public-key encryption Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2248: 566-582. |
0.698 |
|
2001 |
Bellare M, Boldyreva A, Knudsen L, Namprempre C. Online ciphers and the Hash-CBC construction Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2139: 292-309. |
0.742 |
|
2000 |
Bellare M, Boldyreva A, Micali S. Public-key encryption in a multi-user setting: Security proofs and improvements Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1807: 259-274. |
0.665 |
|
2000 |
Bellare M, Boldyreva A. The security of chaffing and winnowing Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1976: 517-530. |
0.748 |
|
Show low-probability matches. |