| 2009 |
| 29 | EE | Xavier Boyen:
Hidden credential retrieval from a reusable password.
ASIACCS 2009: 228-238 |
| 28 | EE | Michel Abdalla,
Xavier Boyen,
Céline Chevalier,
David Pointcheval:
Distributed Public-Key Cryptography from Weak Secrets.
Public Key Cryptography 2009: 139-159 |
| 2008 |
| 27 | EE | Xavier Boyen:
New Paradigms for Password Security.
ACISP 2008: 1-5 |
| 26 | EE | Xavier Boyen:
The Uber-Assumption Family.
Pairing 2008: 39-56 |
| 25 | EE | Xavier Boyen,
Cécile Delerablée:
Expressive Subgroup Signatures.
SCN 2008: 185-200 |
| 24 | EE | Xavier Boyen:
A tapestry of identity-based encryption: practical frameworks compared.
IJACT 1(1): 3-21 (2008) |
| 23 | EE | Dan Boneh,
Xavier Boyen:
Short Signatures Without Random Oracles and the SDH Assumption in Bilinear Groups.
J. Cryptology 21(2): 149-177 (2008) |
| 2007 |
| 22 | EE | Xavier Boyen:
Miniature CCA2 PK Encryption: Tight Security Without Redundancy.
ASIACRYPT 2007: 485-501 |
| 21 | EE | Xavier Boyen:
Mesh Signatures.
EUROCRYPT 2007: 210-227 |
| 20 | EE | Xavier Boyen:
General Ad Hoc Encryption from Exponent Inversion IBE.
EUROCRYPT 2007: 394-411 |
| 19 | EE | Xavier Boyen,
Brent Waters:
Full-Domain Subgroup Hiding and Constant-Size Group Signatures.
Public Key Cryptography 2007: 1-15 |
| 2006 |
| 18 | EE | Xavier Boyen,
Hovav Shacham,
Emily Shen,
Brent Waters:
Forward-secure signatures with untrusted update.
ACM Conference on Computer and Communications Security 2006: 191-200 |
| 17 | EE | Xavier Boyen,
Brent Waters:
Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles).
CRYPTO 2006: 290-307 |
| 16 | EE | Dan Boneh,
Xavier Boyen:
On the Impossibility of Efficiently Combining Collision Resistant Hash Functions.
CRYPTO 2006: 570-583 |
| 15 | EE | Dan Boneh,
Xavier Boyen,
Shai Halevi:
Chosen Ciphertext Secure Public Key Threshold Encryption Without Random Oracles.
CT-RSA 2006: 226-243 |
| 14 | EE | Xavier Boyen,
Brent Waters:
Compact Group Signatures Without Random Oracles.
EUROCRYPT 2006: 427-444 |
| 2005 |
| 13 | EE | Xavier Boyen,
Qixiang Mei,
Brent Waters:
Direct chosen ciphertext security from identity-based techniques.
ACM Conference on Computer and Communications Security 2005: 320-329 |
| 12 | EE | Xavier Boyen,
Yevgeniy Dodis,
Jonathan Katz,
Rafail Ostrovsky,
Adam Smith:
Secure Remote Authentication Using Biometric Data.
EUROCRYPT 2005: 147-163 |
| 11 | EE | Dan Boneh,
Xavier Boyen,
Eu-Jin Goh:
Hierarchical Identity Based Encryption with Constant Size Ciphertext.
EUROCRYPT 2005: 440-456 |
| 2004 |
| 10 | EE | Xavier Boyen:
Reusable cryptographic fuzzy extractors.
ACM Conference on Computer and Communications Security 2004: 82-91 |
| 9 | EE | Dan Boneh,
Xavier Boyen,
Hovav Shacham:
Short Group Signatures.
CRYPTO 2004: 41-55 |
| 8 | EE | Dan Boneh,
Xavier Boyen:
Secure Identity Based Encryption Without Random Oracles.
CRYPTO 2004: 443-459 |
| 7 | EE | Dan Boneh,
Xavier Boyen:
Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles.
EUROCRYPT 2004: 223-238 |
| 6 | EE | Dan Boneh,
Xavier Boyen:
Short Signatures Without Random Oracles.
EUROCRYPT 2004: 56-73 |
| 2003 |
| 5 | EE | Xavier Boyen:
Multipurpose Identity-Based Signcryption (A Swiss Army Knife for Identity-Based Cryptography).
CRYPTO 2003: 383-399 |
| 1999 |
| 4 | | Xavier Boyen,
Daphne Koller:
Exploiting the Architecture of Dynamic Systems.
AAAI/IAAI 1999: 313-320 |
| 3 | EE | Xavier Boyen,
Nir Friedman,
Daphne Koller:
Discovering the Hidden Structure of Complex Dynamic Systems.
UAI 1999: 91-100 |
| 1998 |
| 2 | EE | Xavier Boyen,
Daphne Koller:
Approximate Learning of Dynamic Models.
NIPS 1998: 396-402 |
| 1 | EE | Xavier Boyen,
Daphne Koller:
Tractable Inference for Complex Stochastic Processes.
UAI 1998: 33-42 |