The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Alexandra Boldyreva: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Mihir Bellare, Alexandra Boldyreva
    The Security of Chaffing and Winnowing. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2000, pp:517-530 [Conf]
  2. Mihir Bellare, Alexandra Boldyreva, Anand Desai, David Pointcheval
    Key-Privacy in Public-Key Encryption. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2001, pp:566-582 [Conf]
  3. Alexandra Boldyreva, Marc Fischlin
    On the Security of OAEP. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2006, pp:210-225 [Conf]
  4. Alexandra Boldyreva, Markus Jakobsson
    Theft-Protected Proprietary Certificates. [Citation Graph (0, 0)][DBLP]
    Digital Rights Management Workshop, 2002, pp:208-220 [Conf]
  5. Mihir Bellare, Alexandra Boldyreva, Lars R. Knudsen, Chanathip Namprempre
    Online Ciphers and the Hash-CBC Construction. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2001, pp:292-309 [Conf]
  6. Alexandra Boldyreva, Marc Fischlin
    Analysis of Random Oracle Instantiation Scenarios for OAEP and Other Practical Schemes. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2005, pp:412-429 [Conf]
  7. Alexandra Boldyreva, Nut Taesombut
    Online Encryption Schemes: New Security Notions and Constructions. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2004, pp:1-14 [Conf]
  8. Mihir Bellare, Alexandra Boldyreva, Silvio Micali
    Public-Key Encryption in a Multi-user Setting: Security Proofs and Improvements. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2000, pp:259-274 [Conf]
  9. Mihir Bellare, Alexandra Boldyreva, Adriana Palacio
    An Uninstantiable Random-Oracle-Model Scheme for a Hybrid-Encryption Problem. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2004, pp:171-188 [Conf]
  10. Weidong Shi, Hsien-Hsin S. Lee, Mrinmoy Ghosh, Chenghuai Lu, Alexandra Boldyreva
    High Efficiency Counter Mode Security Architecture via Prediction and Precomputation. [Citation Graph (0, 0)][DBLP]
    ISCA, 2005, pp:14-24 [Conf]
  11. Mihir Bellare, Alexandra Boldyreva, Jessica Staddon
    Randomness Re-use in Multi-recipient Encryption Schemeas. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2003, pp:85-99 [Conf]
  12. Alexandra Boldyreva
    Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2003, pp:31-46 [Conf]
  13. Alexandra Boldyreva, Virendra Kumar
    Extended Abstract: Provable-Security Analysis of Authenticated Encryption in Kerberos. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2007, pp:92-100 [Conf]
  14. Mihir Bellare, Alexandra Boldyreva, Adam O'Neill
    Deterministic and Efficiently Searchable Encryption. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2007, pp:535-552 [Conf]
  15. Georgios Amanatidis, Alexandra Boldyreva, Adam O'Neill
    Provably-Secure Schemes for Basic Query Support in Outsourced Databases. [Citation Graph (0, 0)][DBLP]
    DBSec, 2007, pp:14-30 [Conf]
  16. Alexandra Boldyreva, Marc Fischlin, Adriana Palacio, Bogdan Warinschi
    A Closer Look at PKI: Security and Efficiency. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2007, pp:458-475 [Conf]

  17. Foundations of Non-malleable Hash and One-Way Functions. [Citation Graph (, )][DBLP]


  18. Ordered multisignatures and identity-based sequential aggregate signatures, with applications to secure routing. [Citation Graph (, )][DBLP]


  19. Identity-based encryption with efficient revocation. [Citation Graph (, )][DBLP]


  20. On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles. [Citation Graph (, )][DBLP]


  21. Strengthening Security of RSA-OAEP. [Citation Graph (, )][DBLP]


  22. Order-Preserving Symmetric Encryption. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002