Search the dblp DataBase
Alexandra Boldyreva :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Mihir Bellare , Alexandra Boldyreva The Security of Chaffing and Winnowing. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2000, pp:517-530 [Conf ] Mihir Bellare , Alexandra Boldyreva , Anand Desai , David Pointcheval Key-Privacy in Public-Key Encryption. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2001, pp:566-582 [Conf ] Alexandra Boldyreva , Marc Fischlin On the Security of OAEP. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2006, pp:210-225 [Conf ] Alexandra Boldyreva , Markus Jakobsson Theft-Protected Proprietary Certificates. [Citation Graph (0, 0)][DBLP ] Digital Rights Management Workshop, 2002, pp:208-220 [Conf ] Mihir Bellare , Alexandra Boldyreva , Lars R. Knudsen , Chanathip Namprempre Online Ciphers and the Hash-CBC Construction. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2001, pp:292-309 [Conf ] Alexandra Boldyreva , Marc Fischlin Analysis of Random Oracle Instantiation Scenarios for OAEP and Other Practical Schemes. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2005, pp:412-429 [Conf ] Alexandra Boldyreva , Nut Taesombut Online Encryption Schemes: New Security Notions and Constructions. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2004, pp:1-14 [Conf ] Mihir Bellare , Alexandra Boldyreva , Silvio Micali Public-Key Encryption in a Multi-user Setting: Security Proofs and Improvements. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2000, pp:259-274 [Conf ] Mihir Bellare , Alexandra Boldyreva , Adriana Palacio An Uninstantiable Random-Oracle-Model Scheme for a Hybrid-Encryption Problem. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2004, pp:171-188 [Conf ] Weidong Shi , Hsien-Hsin S. Lee , Mrinmoy Ghosh , Chenghuai Lu , Alexandra Boldyreva High Efficiency Counter Mode Security Architecture via Prediction and Precomputation. [Citation Graph (0, 0)][DBLP ] ISCA, 2005, pp:14-24 [Conf ] Mihir Bellare , Alexandra Boldyreva , Jessica Staddon Randomness Re-use in Multi-recipient Encryption Schemeas. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2003, pp:85-99 [Conf ] Alexandra Boldyreva Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2003, pp:31-46 [Conf ] Alexandra Boldyreva , Virendra Kumar Extended Abstract: Provable-Security Analysis of Authenticated Encryption in Kerberos. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2007, pp:92-100 [Conf ] Mihir Bellare , Alexandra Boldyreva , Adam O'Neill Deterministic and Efficiently Searchable Encryption. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2007, pp:535-552 [Conf ] Georgios Amanatidis , Alexandra Boldyreva , Adam O'Neill Provably-Secure Schemes for Basic Query Support in Outsourced Databases. [Citation Graph (0, 0)][DBLP ] DBSec, 2007, pp:14-30 [Conf ] Alexandra Boldyreva , Marc Fischlin , Adriana Palacio , Bogdan Warinschi A Closer Look at PKI: Security and Efficiency. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2007, pp:458-475 [Conf ] Foundations of Non-malleable Hash and One-Way Functions. [Citation Graph (, )][DBLP ] Ordered multisignatures and identity-based sequential aggregate signatures, with applications to secure routing. [Citation Graph (, )][DBLP ] Identity-based encryption with efficient revocation. [Citation Graph (, )][DBLP ] On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles. [Citation Graph (, )][DBLP ] Strengthening Security of RSA-OAEP. [Citation Graph (, )][DBLP ] Order-Preserving Symmetric Encryption. [Citation Graph (, )][DBLP ] Search in 0.031secs, Finished in 0.032secs