|
The links below point to the abstracts and the full
versions of the papers. Most of the proceedings versions are
available via DBLP
database.
- M. Barbosa and A. Boldyreva and S. Chen and B. Warinschi.
Provable Security Analysis of FIDO2.
Advances in Cryptology – CRYPTO 2021.
- E. Uzun, S. P. Chung, V. Kolesnikov, A. Boldyreva and W. Lee
Fuzzy Labeled Private Set Intersection with Applications to Private Real-Time Biometric Search.
USENIX Security, 2021.
- A. Boldyreva and T. Tang.
Privacy-Preserving Approximate k-Nearest-Neighbors Search that Hides Access, Query and Volume Patterns.
PoPETS, 2021.
- S. Chen, M. Jagielski, S. Jero, A. Boldyreva and C. Nita-Rotaru.
Secure Communication Channel Establishment: TLS 1.3 (over TCP Fast Open) vs. QUIC.
Journal of Cryptology 34(3): 26, 2021
.
- S. Chen, M. Jagielski, S. Jero, A. Boldyreva and C. Nita-Rotaru.
Secure Communication Channel Establishment: TLS 1.3 (over TCP Fast Open) vs. QUIC.
ESORICS, 2019.
- A. Boldyreva, T. Tang and B. Warinschi.
Masking Fuzzy-Searchable Public Databases.
Applied Cryptography and Network Security (ACNS) 2019.
- A. Boldyreva, C. Patton and T. Shrimpton.
Hedging Public-Key Encryption in the Real World.
Advances in Cryptology – CRYPTO 2017 proceedings.
- A. Boldyreva, S. Chen, D. Pointcheval and P.-A. Dupont.
Human Computing for Handling Strong Corruptions in Authenticated Key Exchange.
IEEE Computer Security Foundations Symposium (CSF) 2017.
- A. Boldyreva, T. Kim, R. J. Lipton, and B. Warinschi.
Provably-Secure Remote Memory Attestation for Heap Overflow Protection.
Conference on Security and Cryptography for Networks (SCN) 2016.
- A. Boldyreva, N. Chenette, Y. Lee and A.
O'Neill.
Order-Preserving
Symmetric Encryption.
Advances in Cryptology - Eurocrypt 2009 Proceedings,
Lecture Notes in Computer Science Vol. 5479, pp. 224-241,
A. Joux ed., 2009.
- A. Boldyreva, M. Fischlin, A. Palacio and B.
Warinschi.
A Closer Look at PKI: Security and
Efficiency.
Public Key Cryptography 2007 Proceedings, Lecture Notes in
Computer Science Vol. 4450, pp. 458-475, T. Okamoto, X.
Wang eds, Springer-Verlag, 2007.
- A. Boldyreva and M. Fischlin.
On the Security of OAEP.
Advances in Cryptology - Asiacrypt 2006 Proceedings,
Lecture Notes in Computer Science Vol. 4284, pp. 210-225,
X. Lai ed., 2006.
- A. Boldyreva and M. Jakobsson.
Theft-protected
proprietary certificates.
Security and Privacy in Digital Rights Management (DRM) ACM
Workshop 2002 Proceedings, LNCS Vol. 2696, J. Feigenbaum
ed., Springer-Verlag, 2003.
- M. Bellare, A. Boldyreva, A. Desai and D.
Pointcheval.
Key-Privacy
in Public-Key Encryption.
Advances in Cryptology - Asiacrypt 2001 Proceedings,
Lecture Notes in Computer Science Vol. 2248, pp. 2248,
C.Boyd ed, Springer-Verlag, 2001.
- M. Bellare, A. Boldyreva, L. Knudsen and C.
Namprempre.
On-Line
Ciphers and the Hash-CBC Constructions.
Advances in Cryptology - Crypto 2001 Proceedings, Lecture
Notes in Computer Science Vol. 2139, pp. 292-309, J. Kilian
ed, Springer-Verlag, 2001.
- M. Bellare and A. Boldyreva.
The
Security of Chaffing and Winnowing.
Advances in Cryptology - Asiacrypt 2000 Proceedings,
Lecture Notes in Computer Science Vol. 1976, pp. 517-530,
T. Okamoto ed, Springer-Verlag, 2000.
Manuscripts
|
|