Alexandra Boldyreva

From MaRDI portal


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Encrypted multi-map that hides query, access, and volume patterns
 
2025-01-10Paper
Provable security analysis of FIDO2
 
2022-04-22Paper
Secure communication channel establishment: TLS 1.3 (over TCP Fast Open) versus QUIC
Journal of Cryptology
2021-07-30Paper
Masking fuzzy-searchable public databases
 
2020-01-30Paper
Hedging public-key encryption in the real world
 
2017-10-27Paper
How to Strengthen the Security of RSA-OAEP
IEEE Transactions on Information Theory
2017-07-27Paper
Provably-secure remote memory attestation for heap overflow protection
Lecture Notes in Computer Science
2016-10-21Paper
On symmetric encryption with distinguishable decryption failures
Fast Software Encryption
2015-09-18Paper
Efficient Fuzzy Search on Encrypted Data
Fast Software Encryption
2015-09-18Paper
On-line ciphers and the Hash-CBC constructions
Journal of Cryptology
2013-01-04Paper
Security of symmetric encryption in the presence of ciphertext fragmentation
Advances in Cryptology – EUROCRYPT 2012
2012-06-29Paper
A new pseudorandom generator from collision-resistant hash functions
Lecture Notes in Computer Science
2012-06-08Paper
Secure proxy signature schemes for delegation of signing rights
Journal of Cryptology
2012-05-23Paper
Order-preserving encryption revisited: improved security analysis and alternative solutions
Advances in Cryptology – CRYPTO 2011
2011-08-12Paper
Theft-protected proprietary certificates
Lecture Notes in Computer Science
2011-03-18Paper
Search on encrypted data in the symmetric-key setting
Selected Areas in Cryptography
2011-03-15Paper
Foundations of non-malleable hash and one-way functions
Advances in Cryptology – ASIACRYPT 2009
2009-12-15Paper
Order-Preserving Symmetric Encryption
Advances in Cryptology - EUROCRYPT 2009
2009-05-12Paper
Topics in Cryptology – CT-RSA 2004
Lecture Notes in Computer Science
2009-05-07Paper
Strengthening Security of RSA-OAEP
Topics in Cryptology – CT-RSA 2009
2009-04-29Paper
Deterministic and Efficiently Searchable Encryption
Advances in Cryptology - CRYPTO 2007
2009-03-10Paper
New Multiparty Signature Schemes for Network Routing Applications
ACM Transactions on Information and System Security
2009-02-24Paper
On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles
Lecture Notes in Computer Science
2009-02-10Paper
Multirecipient Encryption Schemes: How to Save on Bandwidth and Computation Without Sacrificing Security
IEEE Transactions on Information Theory
2008-12-21Paper
On the Security of OAEP
Advances in Cryptology – ASIACRYPT 2006
2008-04-24Paper
Analysis of Random Oracle Instantiation Scenarios for OAEP and Other Practical Schemes
Advances in Cryptology – CRYPTO 2005
2008-03-17Paper
Advances in Cryptology - EUROCRYPT 2004
Lecture Notes in Computer Science
2007-09-25Paper
A Closer Look at PKI: Security and Efficiency
Public Key Cryptography – PKC 2007
2007-09-04Paper
scientific article; zbMATH DE number 5009203 (Why is no real title available?)
 
2006-03-01Paper
scientific article; zbMATH DE number 2081087 (Why is no real title available?)
 
2004-08-04Paper
Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme
Public Key Cryptography — PKC 2003
2003-07-27Paper
Randomness Re-use in Multi-recipient Encryption Schemeas
Public Key Cryptography — PKC 2003
2003-07-27Paper
scientific article; zbMATH DE number 1842498 (Why is no real title available?)
 
2002-12-08Paper
scientific article; zbMATH DE number 1583803 (Why is no real title available?)
 
2001-04-03Paper


Research outcomes over time


This page was built for person: Alexandra Boldyreva