BibTeX records: Dan Boneh

download as .bib file

@inproceedings{DBLP:conf/acns/NikolaenkoRBB24,
  author       = {Valeria Nikolaenko and
                  Sam Ragsdale and
                  Joseph Bonneau and
                  Dan Boneh},
  title        = {Powers-of-Tau to the People: Decentralizing Setup Ceremonies},
  booktitle    = {{ACNS} {(3)}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14585},
  pages        = {105--134},
  publisher    = {Springer},
  year         = {2024}
}
@article{DBLP:journals/corr/abs-2402-12572,
  author       = {Chhavi Yadav and
                  Amrita Roy Chowdhury and
                  Dan Boneh and
                  Kamalika Chaudhuri},
  title        = {FairProof : Confidential and Certifiable Fairness for Neural Networks},
  journal      = {CoRR},
  volume       = {abs/2402.12572},
  year         = {2024}
}
@article{DBLP:journals/corr/abs-2403-09603,
  author       = {Megha Srivastava and
                  Simran Arora and
                  Dan Boneh},
  title        = {Optimistic Verifiable Training by Controlling Hardware Nondeterminism},
  journal      = {CoRR},
  volume       = {abs/2403.09603},
  year         = {2024}
}
@article{DBLP:journals/iacr/BonehC24,
  author       = {Dan Boneh and
                  Binyi Chen},
  title        = {LatticeFold: {A} Lattice-based Folding Scheme and its Applications
                  to Succinct Proof Systems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {257},
  year         = {2024}
}
@article{DBLP:journals/iacr/LauferOB24,
  author       = {Evan Laufer and
                  Alex Ozdemir and
                  Dan Boneh},
  title        = {zkPi: Proving Lean Theorems in Zero-Knowledge},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {267},
  year         = {2024}
}
@article{DBLP:journals/iacr/BonehHL24,
  author       = {Dan Boneh and
                  Iftach Haitner and
                  Yehuda Lindell},
  title        = {Exponent-VRFs and Their Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {397},
  year         = {2024}
}
@article{DBLP:journals/iacr/BonehPR24,
  author       = {Dan Boneh and
                  Aditi Partap and
                  Lior Rotem},
  title        = {Traceable Secret Sharing: Strong Security and Efficient Constructions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {405},
  year         = {2024}
}
@article{DBLP:journals/iacr/NguyenDCTB24,
  author       = {Wilson D. Nguyen and
                  Trisha Datta and
                  Binyi Chen and
                  Nirvan Tyagi and
                  Dan Boneh},
  title        = {Mangrove: {A} Scalable Framework for Folding-based SNARKs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {416},
  year         = {2024}
}
@inproceedings{DBLP:conf/aft/NguyenBS23,
  author       = {Wilson D. Nguyen and
                  Dan Boneh and
                  Srinath T. V. Setty},
  title        = {Revisiting the Nova Proof System on a Cycle of Curves},
  booktitle    = {{AFT}},
  series       = {LIPIcs},
  volume       = {282},
  pages        = {18:1--18:22},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2023}
}
@inproceedings{DBLP:conf/aft/BonehPR23,
  author       = {Dan Boneh and
                  Aditi Partap and
                  Lior Rotem},
  title        = {Post-Quantum Single Secret Leader Election {(SSLE)} from Publicly
                  Re-Randomizable Commitments},
  booktitle    = {{AFT}},
  series       = {LIPIcs},
  volume       = {282},
  pages        = {26:1--26:23},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2023}
}
@inproceedings{DBLP:conf/aft/TasB23,
  author       = {Ertem Nusret Tas and
                  Dan Boneh},
  title        = {Vector Commitments with Efficient Updates},
  booktitle    = {{AFT}},
  series       = {LIPIcs},
  volume       = {282},
  pages        = {29:1--29:23},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2023}
}
@inproceedings{DBLP:conf/ccs/PerryS0B23,
  author       = {Neil Perry and
                  Megha Srivastava and
                  Deepak Kumar and
                  Dan Boneh},
  title        = {Do Users Write More Insecure Code with {AI} Assistants?},
  booktitle    = {{CCS}},
  pages        = {2785--2799},
  publisher    = {{ACM}},
  year         = {2023}
}
@inproceedings{DBLP:conf/crypto/BonehBCGI23,
  author       = {Dan Boneh and
                  Elette Boyle and
                  Henry Corrigan{-}Gibbs and
                  Niv Gilboa and
                  Yuval Ishai},
  title        = {Arithmetic Sketching},
  booktitle    = {{CRYPTO} {(1)}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14081},
  pages        = {171--202},
  publisher    = {Springer},
  year         = {2023}
}
@inproceedings{DBLP:conf/defi/WangWCB23,
  author       = {Kaili Wang and
                  Qinchen Wang and
                  Calvin Cai and
                  Dan Boneh},
  title        = {R-Pool and Settlement Markets for Recoverable {ERC-20R} Tokens},
  booktitle    = {DeFi@CCS},
  pages        = {49--54},
  publisher    = {{ACM}},
  year         = {2023}
}
@inproceedings{DBLP:conf/eurocrypt/ChenBBZ23,
  author       = {Binyi Chen and
                  Benedikt B{\"{u}}nz and
                  Dan Boneh and
                  Zhenfei Zhang},
  title        = {HyperPlonk: Plonk with Linear-Time Prover and High-Degree Custom Gates},
  booktitle    = {{EUROCRYPT} {(2)}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14005},
  pages        = {499--530},
  publisher    = {Springer},
  year         = {2023}
}
@inproceedings{DBLP:conf/eurocrypt/BonehGZ23,
  author       = {Dan Boneh and
                  Jiaxin Guan and
                  Mark Zhandry},
  title        = {A Lower Bound on the Length of Signatures Based on Group Actions and
                  Generic Isogenies},
  booktitle    = {{EUROCRYPT} {(5)}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14008},
  pages        = {507--531},
  publisher    = {Springer},
  year         = {2023}
}
@inproceedings{DBLP:conf/fc/TasB23,
  author       = {Ertem Nusret Tas and
                  Dan Boneh},
  title        = {Cryptoeconomic Security for Data Availability Committees},
  booktitle    = {{FC}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13951},
  pages        = {310--326},
  publisher    = {Springer},
  year         = {2023}
}
@article{DBLP:journals/corr/abs-2307-04085,
  author       = {Ertem Nusret Tas and
                  Dan Boneh},
  title        = {Vector Commitments with Efficient Updates},
  journal      = {CoRR},
  volume       = {abs/2307.04085},
  year         = {2023}
}
@article{DBLP:journals/corr/abs-2310-19201,
  author       = {Joshua Z. Tan and
                  Tara Merk and
                  Sarah Hubbard and
                  Eliza R. Oak and
                  Joni Pirovich and
                  Ellie Rennie and
                  Rolf Hoefer and
                  Michael Zargham and
                  Jason Potts and
                  Chris Berg and
                  Reuben Youngblom and
                  Primavera De Filippi and
                  Seth Frey and
                  Jeff Strnad and
                  Morshed Mannan and
                  Kelsie Nabben and
                  Silke Noa Elrifai and
                  Jake Hartnell and
                  Benjamin Mako Hill and
                  Alexia Maddox and
                  Woojin Lim and
                  Tobin South and
                  Ari Juels and
                  Dan Boneh},
  title        = {Open Problems in DAOs},
  journal      = {CoRR},
  volume       = {abs/2310.19201},
  year         = {2023}
}
@article{DBLP:journals/corr/abs-2312-14375,
  author       = {Kaili Wang and
                  Qinchen Wang and
                  Calvin Cai and
                  Dan Boneh},
  title        = {R-Pool and Settlement Markets for Recoverable {ERC-20R} Tokens},
  journal      = {CoRR},
  volume       = {abs/2312.14375},
  year         = {2023}
}
@article{DBLP:journals/iacr/BonehGZ23,
  author       = {Dan Boneh and
                  Jiaxin Guan and
                  Mark Zhandry},
  title        = {A Lower Bound on the Length of Signatures Based on Group Actions and
                  Generic Isogenies},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {250},
  year         = {2023}
}
@article{DBLP:journals/iacr/NguyenBS23,
  author       = {Wilson D. Nguyen and
                  Dan Boneh and
                  Srinath T. V. Setty},
  title        = {Revisiting the Nova Proof System on a Cycle of Curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {969},
  year         = {2023}
}
@article{DBLP:journals/iacr/BonehBCGI23,
  author       = {Dan Boneh and
                  Elette Boyle and
                  Henry Corrigan{-}Gibbs and
                  Niv Gilboa and
                  Yuval Ishai},
  title        = {Arithmetic Sketching},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1012},
  year         = {2023}
}
@article{DBLP:journals/iacr/BonehPR23,
  author       = {Dan Boneh and
                  Aditi Partap and
                  Lior Rotem},
  title        = {Post-Quantum Single Secret Leader Election {(SSLE)} From Publicly
                  Re-randomizable Commitments},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1241},
  year         = {2023}
}
@article{DBLP:journals/iacr/BonehPR23a,
  author       = {Dan Boneh and
                  Aditi Partap and
                  Lior Rotem},
  title        = {Traitor Tracing for Threshold Decryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1724},
  year         = {2023}
}
@article{DBLP:journals/iacr/BonehPW23,
  author       = {Dan Boneh and
                  Aditi Partap and
                  Brent Waters},
  title        = {Accountable Multi-Signatures with Constant Size Public Keys},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1793},
  year         = {2023}
}
@article{DBLP:journals/iacr/TasB23,
  author       = {Ertem Nusret Tas and
                  Dan Boneh},
  title        = {Vector Commitments with Efficient Updates},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1830},
  year         = {2023}
}
@inproceedings{DBLP:conf/ccs/XieZCZ0JBS22,
  author       = {Tiancheng Xie and
                  Jiaheng Zhang and
                  Zerui Cheng and
                  Fan Zhang and
                  Yupeng Zhang and
                  Yongzheng Jia and
                  Dan Boneh and
                  Dawn Song},
  title        = {zkBridge: Trustless Cross-chain Bridges Made Practical},
  booktitle    = {{CCS}},
  pages        = {3003--3017},
  publisher    = {{ACM}},
  year         = {2022}
}
@inproceedings{DBLP:conf/crypto/BonehK22,
  author       = {Dan Boneh and
                  Chelsea Komlo},
  title        = {Threshold Signatures with Private Accountability},
  booktitle    = {{CRYPTO} {(4)}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13510},
  pages        = {551--581},
  publisher    = {Springer},
  year         = {2022}
}
@inproceedings{DBLP:conf/ndss/EskandarianB22,
  author       = {Saba Eskandarian and
                  Dan Boneh},
  title        = {Clarion: Anonymous Communication from Multiparty Shuffling Protocols},
  booktitle    = {{NDSS}},
  publisher    = {The Internet Society},
  year         = {2022}
}
@inproceedings{DBLP:conf/uss/OzdemirB22,
  author       = {Alex Ozdemir and
                  Dan Boneh},
  title        = {Experimenting with Collaborative zk-SNARKs: Zero-Knowledge Proofs
                  for Distributed Secrets},
  booktitle    = {{USENIX} Security Symposium},
  pages        = {4291--4308},
  publisher    = {{USENIX} Association},
  year         = {2022}
}
@article{DBLP:journals/corr/abs-2207-04145,
  author       = {Neil Perry and
                  Bruce Spang and
                  Saba Eskandarian and
                  Dan Boneh},
  title        = {Strong Anonymity for Mesh Messaging},
  journal      = {CoRR},
  volume       = {abs/2207.04145},
  year         = {2022}
}
@article{DBLP:journals/corr/abs-2208-00543,
  author       = {Kaili Wang and
                  Qinchen Wang and
                  Dan Boneh},
  title        = {{ERC-20R} and {ERC-721R:} Reversible Transactions on Ethereum},
  journal      = {CoRR},
  volume       = {abs/2208.00543},
  year         = {2022}
}
@article{DBLP:journals/corr/abs-2208-02999,
  author       = {Ertem Nusret Tas and
                  Dan Boneh},
  title        = {Cryptoeconomic Security for Data Availability Committees},
  journal      = {CoRR},
  volume       = {abs/2208.02999},
  year         = {2022}
}
@article{DBLP:journals/corr/abs-2209-00307,
  author       = {Aditi Partap and
                  Dan Boneh},
  title        = {Memory Tagging: {A} Memory Efficient Design},
  journal      = {CoRR},
  volume       = {abs/2209.00307},
  year         = {2022}
}
@article{DBLP:journals/corr/abs-2210-00264,
  author       = {Tiancheng Xie and
                  Jiaheng Zhang and
                  Zerui Cheng and
                  Fan Zhang and
                  Yupeng Zhang and
                  Yongzheng Jia and
                  Dan Boneh and
                  Dawn Song},
  title        = {zkBridge: Trustless Cross-chain Bridges Made Practical},
  journal      = {CoRR},
  volume       = {abs/2210.00264},
  year         = {2022}
}
@article{DBLP:journals/corr/abs-2211-03622,
  author       = {Neil Perry and
                  Megha Srivastava and
                  Deepak Kumar and
                  Dan Boneh},
  title        = {Do Users Write More Insecure Code with {AI} Assistants?},
  journal      = {CoRR},
  volume       = {abs/2211.03622},
  year         = {2022}
}
@article{DBLP:journals/iacr/ChenBBZ22,
  author       = {Binyi Chen and
                  Benedikt B{\"{u}}nz and
                  Dan Boneh and
                  Zhenfei Zhang},
  title        = {HyperPlonk: Plonk with Linear-Time Prover and High-Degree Custom Gates},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1355},
  year         = {2022}
}
@article{DBLP:journals/iacr/NikolaenkoRBB22,
  author       = {Valeria Nikolaenko and
                  Sam Ragsdale and
                  Joseph Bonneau and
                  Dan Boneh},
  title        = {Powers-of-Tau to the People: Decentralizing Setup Ceremonies},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1592},
  year         = {2022}
}
@article{DBLP:journals/iacr/BonehK22,
  author       = {Dan Boneh and
                  Chelsea Komlo},
  title        = {Threshold Signatures with Private Accountability},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1636},
  year         = {2022}
}
@article{DBLP:journals/iacr/BonehPR22,
  author       = {Dan Boneh and
                  Aditi Partap and
                  Lior Rotem},
  title        = {Accountable Threshold Signatures with Proactive Refresh},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1656},
  year         = {2022}
}
@inproceedings{DBLP:conf/ccs/PealeEB21,
  author       = {Charlotte Peale and
                  Saba Eskandarian and
                  Dan Boneh},
  title        = {Secure Complaint-Enabled Source-Tracking for Encrypted Messaging},
  booktitle    = {{CCS}},
  pages        = {1484--1506},
  publisher    = {{ACM}},
  year         = {2021}
}
@inproceedings{DBLP:conf/crypto/BonehDFG21,
  author       = {Dan Boneh and
                  Justin Drake and
                  Ben Fisch and
                  Ariel Gabizon},
  title        = {Halo Infinite: Proof-Carrying Data from Additive Polynomial Commitments},
  booktitle    = {{CRYPTO} {(1)}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12825},
  pages        = {649--680},
  publisher    = {Springer},
  year         = {2021}
}
@inproceedings{DBLP:conf/iclr/TramerB21,
  author       = {Florian Tram{\`{e}}r and
                  Dan Boneh},
  title        = {Differentially Private Learning Needs Better Features (or Much More
                  Data)},
  booktitle    = {{ICLR}},
  publisher    = {OpenReview.net},
  year         = {2021}
}
@inproceedings{DBLP:conf/sp/ThomasABBBCDDKK21,
  author       = {Kurt Thomas and
                  Devdatta Akhawe and
                  Michael D. Bailey and
                  Dan Boneh and
                  Elie Bursztein and
                  Sunny Consolvo and
                  Nicola Dell and
                  Zakir Durumeric and
                  Patrick Gage Kelley and
                  Deepak Kumar and
                  Damon McCoy and
                  Sarah Meiklejohn and
                  Thomas Ristenpart and
                  Gianluca Stringhini},
  title        = {SoK: Hate, Harassment, and the Changing Landscape of Online Abuse},
  booktitle    = {{SP}},
  pages        = {247--267},
  publisher    = {{IEEE}},
  year         = {2021}
}
@inproceedings{DBLP:conf/sp/BonehBCGI21,
  author       = {Dan Boneh and
                  Elette Boyle and
                  Henry Corrigan{-}Gibbs and
                  Niv Gilboa and
                  Yuval Ishai},
  title        = {Lightweight Techniques for Private Heavy Hitters},
  booktitle    = {{SP}},
  pages        = {762--776},
  publisher    = {{IEEE}},
  year         = {2021}
}
@inproceedings{DBLP:conf/uss/EskandarianCZB21,
  author       = {Saba Eskandarian and
                  Henry Corrigan{-}Gibbs and
                  Matei Zaharia and
                  Dan Boneh},
  title        = {Express: Lowering the Cost of Metadata-hiding Communication with Cryptographic
                  Privacy},
  booktitle    = {{USENIX} Security Symposium},
  pages        = {1775--1792},
  publisher    = {{USENIX} Association},
  year         = {2021}
}
@inproceedings{DBLP:conf/wpes/SyversonFEB21,
  author       = {Paul Syverson and
                  Matthew Finkel and
                  Saba Eskandarian and
                  Dan Boneh},
  title        = {Attacks on Onion Discovery and Remedies via Self-Authenticating Traditional
                  Addresses},
  booktitle    = {WPES@CCS},
  pages        = {45--52},
  publisher    = {{ACM}},
  year         = {2021}
}
@article{DBLP:journals/corr/abs-2110-03168,
  author       = {Paul Syverson and
                  Matthew Finkel and
                  Saba Eskandarian and
                  Dan Boneh},
  title        = {Attacks on Onion Discovery and Remedies via Self-Authenticating Traditional
                  Addresses},
  journal      = {CoRR},
  volume       = {abs/2110.03168},
  year         = {2021}
}
@article{DBLP:journals/iacr/BonehBCGI21,
  author       = {Dan Boneh and
                  Elette Boyle and
                  Henry Corrigan{-}Gibbs and
                  Niv Gilboa and
                  Yuval Ishai},
  title        = {Lightweight Techniques for Private Heavy Hitters},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {17},
  year         = {2021}
}
@article{DBLP:journals/iacr/BonehNO21,
  author       = {Dan Boneh and
                  Wilson D. Nguyen and
                  Alex Ozdemir},
  title        = {Efficient Functional Commitments: How to Commit to Private Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1342},
  year         = {2021}
}
@article{DBLP:journals/iacr/EskandarianB21,
  author       = {Saba Eskandarian and
                  Dan Boneh},
  title        = {Clarion: Anonymous Communication from Multiparty Shuffling Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1514},
  year         = {2021}
}
@article{DBLP:journals/iacr/OzdemirB21,
  author       = {Alex Ozdemir and
                  Dan Boneh},
  title        = {Experimenting with Collaborative zk-SNARKs: Zero-Knowledge Proofs
                  for Distributed Secrets},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1530},
  year         = {2021}
}
@article{DBLP:journals/jmc/BonehGKLSSTZ20,
  author       = {Dan Boneh and
                  Darren B. Glass and
                  Daniel Krashen and
                  Kristin E. Lauter and
                  Shahed Sharif and
                  Alice Silverberg and
                  Mehdi Tibouchi and
                  Mark Zhandry},
  title        = {Multiparty Non-Interactive Key Exchange and More From Isogenies on
                  Elliptic Curves},
  journal      = {J. Math. Cryptol.},
  volume       = {14},
  number       = {1},
  pages        = {5--14},
  year         = {2020}
}
@inproceedings{DBLP:conf/aft/BonehEHG20,
  author       = {Dan Boneh and
                  Saba Eskandarian and
                  Lucjan Hanzlik and
                  Nicola Greco},
  title        = {Single Secret Leader Election},
  booktitle    = {{AFT}},
  pages        = {12--24},
  publisher    = {{ACM}},
  year         = {2020}
}
@inproceedings{DBLP:conf/asiacrypt/BonehKW20,
  author       = {Dan Boneh and
                  Dmitry Kogan and
                  Katharine Woo},
  title        = {Oblivious Pseudorandom Functions from Isogenies},
  booktitle    = {{ASIACRYPT} {(2)}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12492},
  pages        = {520--550},
  publisher    = {Springer},
  year         = {2020}
}
@inproceedings{DBLP:conf/asiacrypt/BonehEKS20,
  author       = {Dan Boneh and
                  Saba Eskandarian and
                  Sam Kim and
                  Maurice Shih},
  title        = {Improving Speed and Security in Updatable Encryption Schemes},
  booktitle    = {{ASIACRYPT} {(3)}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12493},
  pages        = {559--589},
  publisher    = {Springer},
  year         = {2020}
}
@inproceedings{DBLP:conf/fc/BunzAZB20,
  author       = {Benedikt B{\"{u}}nz and
                  Shashank Agrawal and
                  Mahdi Zamani and
                  Dan Boneh},
  title        = {Zether: Towards Privacy in a Smart Contract World},
  booktitle    = {Financial Cryptography},
  series       = {Lecture Notes in Computer Science},
  volume       = {12059},
  pages        = {423--443},
  publisher    = {Springer},
  year         = {2020}
}
@inproceedings{DBLP:conf/fc/WahbyBJP20,
  author       = {Riad S. Wahby and
                  Dan Boneh and
                  Christopher Jeffrey and
                  Joseph Poon},
  title        = {An Airdrop that Preserves Recipient Privacy},
  booktitle    = {Financial Cryptography},
  series       = {Lecture Notes in Computer Science},
  volume       = {12059},
  pages        = {444--463},
  publisher    = {Springer},
  year         = {2020}
}
@inproceedings{DBLP:conf/uss/OzdemirWWB20,
  author       = {Alex Ozdemir and
                  Riad S. Wahby and
                  Barry Whitehat and
                  Dan Boneh},
  title        = {Scaling Verifiable Computation Using Efficient Set Accumulators},
  booktitle    = {{USENIX} Security Symposium},
  pages        = {2075--2092},
  publisher    = {{USENIX} Association},
  year         = {2020}
}
@inproceedings{DBLP:conf/uss/TramerBP20,
  author       = {Florian Tram{\`{e}}r and
                  Dan Boneh and
                  Kenny Paterson},
  title        = {Remote Side-Channel Attacks on Anonymous Transactions},
  booktitle    = {{USENIX} Security Symposium},
  pages        = {2739--2756},
  publisher    = {{USENIX} Association},
  year         = {2020}
}
@article{DBLP:journals/corr/abs-2011-11660,
  author       = {Florian Tram{\`{e}}r and
                  Dan Boneh},
  title        = {Differentially Private Learning Needs Better Features (or Much More
                  Data)},
  journal      = {CoRR},
  volume       = {abs/2011.11660},
  year         = {2020}
}
@article{DBLP:journals/corr/abs-2012-14884,
  author       = {Dan Boneh and
                  Elette Boyle and
                  Henry Corrigan{-}Gibbs and
                  Niv Gilboa and
                  Yuval Ishai},
  title        = {Lightweight Techniques for Private Heavy Hitters},
  journal      = {CoRR},
  volume       = {abs/2012.14884},
  year         = {2020}
}
@article{DBLP:journals/iacr/BonehEHG20,
  author       = {Dan Boneh and
                  Saba Eskandarian and
                  Lucjan Hanzlik and
                  Nicola Greco},
  title        = {Single Secret Leader Election},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {25},
  year         = {2020}
}
@article{DBLP:journals/iacr/BonehDFG20,
  author       = {Dan Boneh and
                  Justin Drake and
                  Ben Fisch and
                  Ariel Gabizon},
  title        = {Efficient polynomial commitment schemes for multiple points and polynomials},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {81},
  year         = {2020}
}
@article{DBLP:journals/iacr/TramerBP20,
  author       = {Florian Tram{\`{e}}r and
                  Dan Boneh and
                  Kenneth G. Paterson},
  title        = {Remote Side-Channel Attacks on Anonymous Transactions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {220},
  year         = {2020}
}
@article{DBLP:journals/iacr/BonehEKS20,
  author       = {Dan Boneh and
                  Saba Eskandarian and
                  Sam Kim and
                  Maurice Shih},
  title        = {Improving Speed and Security in Updatable Encryption Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {222},
  year         = {2020}
}
@article{DBLP:journals/iacr/WahbyBJP20,
  author       = {Riad S. Wahby and
                  Dan Boneh and
                  Christopher Jeffrey and
                  Joseph Poon},
  title        = {An airdrop that preserves recipient privacy},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {676},
  year         = {2020}
}
@article{DBLP:journals/iacr/BonehKW20,
  author       = {Dan Boneh and
                  Dmitry Kogan and
                  Katharine Woo},
  title        = {Oblivious Pseudorandom Functions from Isogenies},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1532},
  year         = {2020}
}
@article{DBLP:journals/iacr/BonehDFG20a,
  author       = {Dan Boneh and
                  Justin Drake and
                  Ben Fisch and
                  Ariel Gabizon},
  title        = {Halo Infinite: Recursive zk-SNARKs from any Additive Polynomial Commitment
                  Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1536},
  year         = {2020}
}
@article{DBLP:journals/cacm/Boneh19,
  author       = {Dan Boneh},
  title        = {Technical perspective: Attacking cryptographic key exchange with precomputation},
  journal      = {Commun. {ACM}},
  volume       = {62},
  number       = {1},
  pages        = {105},
  year         = {2019}
}
@article{DBLP:journals/ieeesp/BonehGMP19,
  author       = {Dan Boneh and
                  Andrew J. Grotto and
                  Patrick D. McDaniel and
                  Nicolas Papernot},
  title        = {How Relevant Is the Turing Test in the Age of Sophisbots?},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {17},
  number       = {6},
  pages        = {64--71},
  year         = {2019}
}
@article{DBLP:journals/tches/WahbyB19,
  author       = {Riad S. Wahby and
                  Dan Boneh},
  title        = {Fast and simple constant-time hashing to the {BLS12-381} elliptic
                  curve},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2019},
  number       = {4},
  pages        = {154--179},
  year         = {2019}
}
@inproceedings{DBLP:conf/ccs/TramerDRPB19,
  author       = {Florian Tram{\`{e}}r and
                  Pascal Dupr{\'{e}} and
                  Gili Rusak and
                  Giancarlo Pellegrino and
                  Dan Boneh},
  title        = {AdVersarial: Perceptual Ad Blocking meets Adversarial Machine Learning},
  booktitle    = {{CCS}},
  pages        = {2005--2021},
  publisher    = {{ACM}},
  year         = {2019}
}
@inproceedings{DBLP:conf/crypto/BonehBCGI19,
  author       = {Dan Boneh and
                  Elette Boyle and
                  Henry Corrigan{-}Gibbs and
                  Niv Gilboa and
                  Yuval Ishai},
  title        = {Zero-Knowledge Proofs on Secret-Shared Data via Fully Linear PCPs},
  booktitle    = {{CRYPTO} {(3)}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11694},
  pages        = {67--97},
  publisher    = {Springer},
  year         = {2019}
}
@inproceedings{DBLP:conf/crypto/BonehBF19,
  author       = {Dan Boneh and
                  Benedikt B{\"{u}}nz and
                  Ben Fisch},
  title        = {Batching Techniques for Accumulators with Applications to IOPs and
                  Stateless Blockchains},
  booktitle    = {{CRYPTO} {(1)}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11692},
  pages        = {561--586},
  publisher    = {Springer},
  year         = {2019}
}
@inproceedings{DBLP:conf/ctrsa/BonehEF19,
  author       = {Dan Boneh and
                  Saba Eskandarian and
                  Ben Fisch},
  title        = {Post-quantum {EPID} Signatures from Symmetric Primitives},
  booktitle    = {{CT-RSA}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11405},
  pages        = {251--271},
  publisher    = {Springer},
  year         = {2019}
}
@inproceedings{DBLP:conf/iclr/TramerB19,
  author       = {Florian Tram{\`{e}}r and
                  Dan Boneh},
  title        = {Slalom: Fast, Verifiable and Private Execution of Neural Networks
                  in Trusted Hardware},
  booktitle    = {{ICLR}},
  publisher    = {OpenReview.net},
  year         = {2019}
}
@inproceedings{DBLP:conf/mass/KininghamLABHS19,
  author       = {Kevin Kiningham and
                  Philip Alexander Levis and
                  Mark Anderson and
                  Dan Boneh and
                  Mark Horowitz and
                  Maurice Shih},
  title        = {Falcon - {A} Flexible Architecture For Accelerating Cryptography},
  booktitle    = {{MASS}},
  pages        = {136--144},
  publisher    = {{IEEE}},
  year         = {2019}
}
@inproceedings{DBLP:conf/nips/TramerB19,
  author       = {Florian Tram{\`{e}}r and
                  Dan Boneh},
  title        = {Adversarial Training and Robustness for Multiple Perturbations},
  booktitle    = {NeurIPS},
  pages        = {5858--5868},
  year         = {2019}
}
@inproceedings{DBLP:conf/sp/EskandarianCBBF19,
  author       = {Saba Eskandarian and
                  Jonathan Cogan and
                  Sawyer Birnbaum and
                  Peh Chang Wei Brandon and
                  Dillon Franke and
                  Forest Fraser and
                  Gaspar Garcia Jr. and
                  Eric Gong and
                  Hung T. Nguyen and
                  Taresh K. Sethi and
                  Vishal Subbiah and
                  Michael Backes and
                  Giancarlo Pellegrino and
                  Dan Boneh},
  title        = {Fidelius: Protecting User Secrets from Compromised Browsers},
  booktitle    = {{IEEE} Symposium on Security and Privacy},
  pages        = {264--280},
  publisher    = {{IEEE}},
  year         = {2019}
}
@inproceedings{DBLP:conf/sp/DautermanCMBR19,
  author       = {Emma Dauterman and
                  Henry Corrigan{-}Gibbs and
                  David Mazi{\`{e}}res and
                  Dan Boneh and
                  Dominic Rizzo},
  title        = {True2F: Backdoor-Resistant Authentication Tokens},
  booktitle    = {{IEEE} Symposium on Security and Privacy},
  pages        = {398--416},
  publisher    = {{IEEE}},
  year         = {2019}
}
@inproceedings{DBLP:conf/uss/ThomasPYRKIBPPB19,
  author       = {Kurt Thomas and
                  Jennifer Pullman and
                  Kevin Yeo and
                  Ananth Raghunathan and
                  Patrick Gage Kelley and
                  Luca Invernizzi and
                  Borbala Benko and
                  Tadek Pietraszek and
                  Sarvar Patel and
                  Dan Boneh and
                  Elie Bursztein},
  title        = {Protecting accounts from credential stuffing with password breach
                  alerting},
  booktitle    = {{USENIX} Security Symposium},
  pages        = {1556--1571},
  publisher    = {{USENIX} Association},
  year         = {2019}
}
@article{DBLP:journals/corr/abs-1904-13000,
  author       = {Florian Tram{\`{e}}r and
                  Dan Boneh},
  title        = {Adversarial Training and Robustness for Multiple Perturbations},
  journal      = {CoRR},
  volume       = {abs/1904.13000},
  year         = {2019}
}
@article{DBLP:journals/corr/abs-1908-03999,
  author       = {Jason Teutsch and
                  Michael Straka and
                  Dan Boneh},
  title        = {Retrofitting a two-way peg between blockchains},
  journal      = {CoRR},
  volume       = {abs/1908.03999},
  year         = {2019}
}
@article{DBLP:journals/corr/abs-1909-00056,
  author       = {Dan Boneh and
                  Andrew J. Grotto and
                  Patrick D. McDaniel and
                  Nicolas Papernot},
  title        = {How Relevant is the Turing Test in the Age of Sophisbots?},
  journal      = {CoRR},
  volume       = {abs/1909.00056},
  year         = {2019}
}
@article{DBLP:journals/corr/abs-1910-03180,
  author       = {Jonathan Love and
                  Dan Boneh},
  title        = {Supersingular Curves With Small Non-integer Endomorphisms},
  journal      = {CoRR},
  volume       = {abs/1910.03180},
  year         = {2019}
}
@article{DBLP:journals/corr/abs-1911-09215,
  author       = {Saba Eskandarian and
                  Henry Corrigan{-}Gibbs and
                  Matei Zaharia and
                  Dan Boneh},
  title        = {Express: Lowering the Cost of Metadata-hiding Communication with Cryptographic
                  Privacy},
  journal      = {CoRR},
  volume       = {abs/1911.09215},
  year         = {2019}
}
@article{DBLP:journals/iacr/BonehBCGI19,
  author       = {Dan Boneh and
                  Elette Boyle and
                  Henry Corrigan{-}Gibbs and
                  Niv Gilboa and
                  Yuval Ishai},
  title        = {How to Prove a Secret: Zero-Knowledge Proofs on Distributed Data via
                  Fully Linear PCPs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {188},
  year         = {2019}
}
@article{DBLP:journals/iacr/BunzAZB19,
  author       = {Benedikt B{\"{u}}nz and
                  Shashank Agrawal and
                  Mahdi Zamani and
                  Dan Boneh},
  title        = {Zether: Towards Privacy in a Smart Contract World},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {191},
  year         = {2019}
}
@article{DBLP:journals/iacr/WahbyB19,
  author       = {Riad S. Wahby and
                  Dan Boneh},
  title        = {Fast and simple constant-time hashing to the {BLS12-381} elliptic
                  curve},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {403},
  year         = {2019}
}
@article{DBLP:journals/iacr/OzdemirWB19,
  author       = {Alex Ozdemir and
                  Riad S. Wahby and
                  Dan Boneh},
  title        = {Scaling Verifiable Computation Using Efficient Set Accumulators},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1494},
  year         = {2019}
}
@inproceedings{DBLP:conf/asiacrypt/BonehDN18,
  author       = {Dan Boneh and
                  Manu Drijvers and
                  Gregory Neven},
  title        = {Compact Multi-signatures for Smaller Blockchains},
  booktitle    = {{ASIACRYPT} {(2)}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11273},
  pages        = {435--464},
  publisher    = {Springer},
  year         = {2018}
}
@inproceedings{DBLP:conf/crypto/BonehGGJKRS18,
  author       = {Dan Boneh and
                  Rosario Gennaro and
                  Steven Goldfeder and
                  Aayush Jain and
                  Sam Kim and
                  Peter M. R. Rasmussen and
                  Amit Sahai},
  title        = {Threshold Cryptosystems from Threshold Fully Homomorphic Encryption},
  booktitle    = {{CRYPTO} {(1)}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10991},
  pages        = {565--596},
  publisher    = {Springer},
  year         = {2018}
}
@inproceedings{DBLP:conf/crypto/BonehBBF18,
  author       = {Dan Boneh and
                  Joseph Bonneau and
                  Benedikt B{\"{u}}nz and
                  Ben Fisch},
  title        = {Verifiable Delay Functions},
  booktitle    = {{CRYPTO} {(1)}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10991},
  pages        = {757--788},
  publisher    = {Springer},
  year         = {2018}
}
@inproceedings{DBLP:conf/dev/RajanQABLV18,
  author       = {Anjana Rajan and
                  Lucy Qin and
                  David W. Archer and
                  Dan Boneh and
                  Tancr{\`{e}}de Lepoint and
                  Mayank Varia},
  title        = {Callisto: {A} Cryptographic Approach to Detecting Serial Perpetrators
                  of Sexual Misconduct},
  booktitle    = {{COMPASS}},
  pages        = {49:1--49:4},
  publisher    = {{ACM}},
  year         = {2018}
}
@inproceedings{DBLP:conf/eurocrypt/BonehISW18,
  author       = {Dan Boneh and
                  Yuval Ishai and
                  Amit Sahai and
                  David J. Wu},
  title        = {Quasi-Optimal SNARGs via Linear Multi-Prover Interactive Proofs},
  booktitle    = {{EUROCRYPT} {(3)}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10822},
  pages        = {222--255},
  publisher    = {Springer},
  year         = {2018}
}
@inproceedings{DBLP:conf/iclr/TramerKPGBM18,
  author       = {Florian Tram{\`{e}}r and
                  Alexey Kurakin and
                  Nicolas Papernot and
                  Ian J. Goodfellow and
                  Dan Boneh and
                  Patrick D. McDaniel},
  title        = {Ensemble Adversarial Training: Attacks and Defenses},
  booktitle    = {{ICLR} (Poster)},
  publisher    = {OpenReview.net},
  year         = {2018}
}
@inproceedings{DBLP:conf/sp/BunzBBPWM18,
  author       = {Benedikt B{\"{u}}nz and
                  Jonathan Bootle and
                  Dan Boneh and
                  Andrew Poelstra and
                  Pieter Wuille and
                  Gregory Maxwell},
  title        = {Bulletproofs: Short Proofs for Confidential Transactions and More},
  booktitle    = {{IEEE} Symposium on Security and Privacy},
  pages        = {315--334},
  publisher    = {{IEEE} Computer Society},
  year         = {2018}
}
@inproceedings{DBLP:conf/tcc/BonehIPSW18,
  author       = {Dan Boneh and
                  Yuval Ishai and
                  Alain Passel{\`{e}}gue and
                  Amit Sahai and
                  David J. Wu},
  title        = {Exploring Crypto Dark Matter: - New Simple {PRF} Candidates and Their
                  Applications},
  booktitle    = {{TCC} {(2)}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11240},
  pages        = {699--729},
  publisher    = {Springer},
  year         = {2018}
}
@article{DBLP:journals/corr/abs-1806-03287,
  author       = {Florian Tram{\`{e}}r and
                  Dan Boneh},
  title        = {Slalom: Fast, Verifiable and Private Execution of Neural Networks
                  in Trusted Hardware},
  journal      = {CoRR},
  volume       = {abs/1806.03287},
  year         = {2018}
}
@article{DBLP:journals/corr/abs-1807-03038,
  author       = {Dan Boneh and
                  Darren B. Glass and
                  Daniel Krashen and
                  Kristin E. Lauter and
                  Shahed Sharif and
                  Alice Silverberg and
                  Mehdi Tibouchi and
                  Mark Zhandry},
  title        = {Multiparty Non-Interactive Key Exchange and More From Isogenies on
                  Elliptic Curves},
  journal      = {CoRR},
  volume       = {abs/1807.03038},
  year         = {2018}
}
@article{DBLP:journals/corr/abs-1809-04774,
  author       = {Saba Eskandarian and
                  Jonathan Cogan and
                  Sawyer Birnbaum and
                  Peh Chang Wei Brandon and
                  Dillon Franke and
                  Forest Fraser and
                  Gaspar Garcia Jr. and
                  Eric Gong and
                  Hung T. Nguyen and
                  Taresh K. Sethi and
                  Vishal Subbiah and
                  Michael Backes and
                  Giancarlo Pellegrino and
                  Dan Boneh},
  title        = {Fidelius: Protecting User Secrets from Compromised Browsers},
  journal      = {CoRR},
  volume       = {abs/1809.04774},
  year         = {2018}
}
@article{DBLP:journals/corr/abs-1810-04660,
  author       = {Emma Dauterman and
                  Henry Corrigan{-}Gibbs and
                  David Mazi{\`{e}}res and
                  Dan Boneh and
                  Dominic Rizzo},
  title        = {True2F: Backdoor-resistant authentication tokens},
  journal      = {CoRR},
  volume       = {abs/1810.04660},
  year         = {2018}
}
@article{DBLP:journals/corr/abs-1811-03194,
  author       = {Florian Tram{\`{e}}r and
                  Pascal Dupr{\'{e}} and
                  Gili Rusak and
                  Giancarlo Pellegrino and
                  Dan Boneh},
  title        = {Ad-versarial: Defeating Perceptual Ad-Blocking},
  journal      = {CoRR},
  volume       = {abs/1811.03194},
  year         = {2018}
}
@article{DBLP:journals/corr/abs-1812-00292,
  author       = {Edward Chou and
                  Florian Tram{\`{e}}r and
                  Giancarlo Pellegrino and
                  Dan Boneh},
  title        = {SentiNet: Detecting Physical Attacks Against Deep Learning Systems},
  journal      = {CoRR},
  volume       = {abs/1812.00292},
  year         = {2018}
}
@article{DBLP:journals/iacr/BonehISW18,
  author       = {Dan Boneh and
                  Yuval Ishai and
                  Amit Sahai and
                  David J. Wu},
  title        = {Quasi-Optimal SNARGs via Linear Multi-Prover Interactive Proofs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {133},
  year         = {2018}
}
@article{DBLP:journals/iacr/BonehEF18,
  author       = {Dan Boneh and
                  Saba Eskandarian and
                  Ben Fisch},
  title        = {Post-Quantum Group Signatures from Symmetric Primitives},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {261},
  year         = {2018}
}
@article{DBLP:journals/iacr/BonehDN18,
  author       = {Dan Boneh and
                  Manu Drijvers and
                  Gregory Neven},
  title        = {Compact Multi-Signatures for Smaller Blockchains},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {483},
  year         = {2018}
}
@article{DBLP:journals/iacr/BonehBBF18,
  author       = {Dan Boneh and
                  Joseph Bonneau and
                  Benedikt B{\"{u}}nz and
                  Ben Fisch},
  title        = {Verifiable Delay Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {601},
  year         = {2018}
}
@article{DBLP:journals/iacr/BonehGKLSSTZ18,
  author       = {Dan Boneh and
                  Darren B. Glass and
                  Daniel Krashen and
                  Kristin E. Lauter and
                  Shahed Sharif and
                  Alice Silverberg and
                  Mehdi Tibouchi and
                  Mark Zhandry},
  title        = {Multiparty Non-Interactive Key Exchange and More From Isogenies on
                  Elliptic Curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {665},
  year         = {2018}
}
@article{DBLP:journals/iacr/BonehBF18,
  author       = {Dan Boneh and
                  Benedikt B{\"{u}}nz and
                  Ben Fisch},
  title        = {A Survey of Two Verifiable Delay Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {712},
  year         = {2018}
}
@article{DBLP:journals/iacr/BonehBF18a,
  author       = {Dan Boneh and
                  Benedikt B{\"{u}}nz and
                  Ben Fisch},
  title        = {Batching Techniques for Accumulators with Applications to IOPs and
                  Stateless Blockchains},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1188},
  year         = {2018}
}
@article{DBLP:journals/iacr/BonehIPSW18,
  author       = {Dan Boneh and
                  Yuval Ishai and
                  Alain Passel{\`{e}}gue and
                  Amit Sahai and
                  David J. Wu},
  title        = {Exploring Crypto Dark Matter: New Simple {PRF} Candidates and Their
                  Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1218},
  year         = {2018}
}
@article{DBLP:journals/algorithmica/BonehZ17,
  author       = {Dan Boneh and
                  Mark Zhandry},
  title        = {Multiparty Key Exchange, Efficient Traitor Tracing, and More from
                  Indistinguishability Obfuscation},
  journal      = {Algorithmica},
  volume       = {79},
  number       = {4},
  pages        = {1233--1285},
  year         = {2017}
}
@article{DBLP:journals/popets/EskandarianMBB17,
  author       = {Saba Eskandarian and
                  Eran Messeri and
                  Joseph Bonneau and
                  Dan Boneh},
  title        = {Certificate Transparency with Privacy},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2017},
  number       = {4},
  pages        = {329--344},
  year         = {2017}
}
@inproceedings{DBLP:conf/acns/BonehKN17,
  author       = {Dan Boneh and
                  Sam Kim and
                  Valeria Nikolaenko},
  title        = {Lattice-Based {DAPS} and Generalizations: Self-enforcement in Signature
                  Schemes},
  booktitle    = {{ACNS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10355},
  pages        = {457--477},
  publisher    = {Springer},
  year         = {2017}
}
@inproceedings{DBLP:conf/ccs/FischVBG17,
  author       = {Ben Fisch and
                  Dhinakaran Vinayagamurthy and
                  Dan Boneh and
                  Sergey Gorbunov},
  title        = {{IRON:} Functional Encryption using Intel {SGX}},
  booktitle    = {{CCS}},
  pages        = {765--782},
  publisher    = {{ACM}},
  year         = {2017}
}
@inproceedings{DBLP:conf/ccs/KoganMB17,
  author       = {Dmitry Kogan and
                  Nathan Manohar and
                  Dan Boneh},
  title        = {T/Key: Second-Factor Authentication From Secure Hash Chains},
  booktitle    = {{CCS}},
  pages        = {983--999},
  publisher    = {{ACM}},
  year         = {2017}
}
@inproceedings{DBLP:conf/ctrsa/BonehG17,
  author       = {Dan Boneh and
                  Shay Gueron},
  title        = {Surnaming Schemes, Fast Verification, and Applications to {SGX} Technology},
  booktitle    = {{CT-RSA}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10159},
  pages        = {149--164},
  publisher    = {Springer},
  year         = {2017}
}
@inproceedings{DBLP:conf/eurocrypt/BonehISW17,
  author       = {Dan Boneh and
                  Yuval Ishai and
                  Amit Sahai and
                  David J. Wu},
  title        = {Lattice-Based SNARGs and Their Application to More Efficient Obfuscation},
  booktitle    = {{EUROCRYPT} {(3)}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10212},
  pages        = {247--277},
  year         = {2017}
}
@inproceedings{DBLP:conf/eurocrypt/BonehKM17,
  author       = {Dan Boneh and
                  Sam Kim and
                  Hart William Montgomery},
  title        = {Private Puncturable PRFs from Standard Lattice Assumptions},
  booktitle    = {{EUROCRYPT} {(1)}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10210},
  pages        = {415--445},
  year         = {2017}
}
@inproceedings{DBLP:conf/hotos/Corrigan-GibbsW17,
  author       = {Henry Corrigan{-}Gibbs and
                  David J. Wu and
                  Dan Boneh},
  title        = {Quantum Operating Systems},
  booktitle    = {HotOS},
  pages        = {76--81},
  publisher    = {{ACM}},
  year         = {2017}
}
@inproceedings{DBLP:conf/latincrypt/BonehGG17,
  author       = {Dan Boneh and
                  Rosario Gennaro and
                  Steven Goldfeder},
  title        = {Using Level-1 Homomorphic Encryption to Improve Threshold {DSA} Signatures
                  for Bitcoin Wallet Security},
  booktitle    = {{LATINCRYPT}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11368},
  pages        = {352--377},
  publisher    = {Springer},
  year         = {2017}
}
@inproceedings{DBLP:conf/mobisys/WilsonWCBLW17,
  author       = {Judson Wilson and
                  Riad S. Wahby and
                  Henry Corrigan{-}Gibbs and
                  Dan Boneh and
                  Philip Alexander Levis and
                  Keith Winstein},
  title        = {Trust but Verify: Auditing the Secure Internet of Things},
  booktitle    = {MobiSys},
  pages        = {464--474},
  publisher    = {{ACM}},
  year         = {2017}
}
@inproceedings{DBLP:conf/nsdi/Corrigan-GibbsB17,
  author       = {Henry Corrigan{-}Gibbs and
                  Dan Boneh},
  title        = {Prio: Private, Robust, and Scalable Computation of Aggregate Statistics},
  booktitle    = {{NSDI}},
  pages        = {259--282},
  publisher    = {{USENIX} Association},
  year         = {2017}
}
@inproceedings{DBLP:conf/pkc/BonehLW17,
  author       = {Dan Boneh and
                  Kevin Lewi and
                  David J. Wu},
  title        = {Constraining Pseudorandom Functions Privately},
  booktitle    = {Public Key Cryptography {(2)}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10175},
  pages        = {494--524},
  publisher    = {Springer},
  year         = {2017}
}
@inproceedings{DBLP:conf/tcc/BonehKW17,
  author       = {Dan Boneh and
                  Sam Kim and
                  David J. Wu},
  title        = {Constrained Keys for Invertible Pseudorandom Functions},
  booktitle    = {{TCC} {(1)}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10677},
  pages        = {237--263},
  publisher    = {Springer},
  year         = {2017}
}
@article{DBLP:journals/corr/EskandarianMBB17,
  author       = {Saba Eskandarian and
                  Eran Messeri and
                  Joseph Bonneau and
                  Dan Boneh},
  title        = {Certificate Transparency with Privacy},
  journal      = {CoRR},
  volume       = {abs/1703.02209},
  year         = {2017}
}
@article{DBLP:journals/corr/Corrigan-GibbsB17,
  author       = {Henry Corrigan{-}Gibbs and
                  Dan Boneh},
  title        = {Prio: Private, Robust, and Scalable Computation of Aggregate Statistics},
  journal      = {CoRR},
  volume       = {abs/1703.06255},
  year         = {2017}
}
@article{DBLP:journals/corr/TramerPGBM17,
  author       = {Florian Tram{\`{e}}r and
                  Nicolas Papernot and
                  Ian J. Goodfellow and
                  Dan Boneh and
                  Patrick D. McDaniel},
  title        = {The Space of Transferable Adversarial Examples},
  journal      = {CoRR},
  volume       = {abs/1704.03453},
  year         = {2017}
}
@article{DBLP:journals/corr/TramerKPBM17,
  author       = {Florian Tram{\`{e}}r and
                  Alexey Kurakin and
                  Nicolas Papernot and
                  Dan Boneh and
                  Patrick D. McDaniel},
  title        = {Ensemble Adversarial Training: Attacks and Defenses},
  journal      = {CoRR},
  volume       = {abs/1705.07204},
  year         = {2017}
}
@article{DBLP:journals/corr/abs-1708-08424,
  author       = {Dmitry Kogan and
                  Nathan Manohar and
                  Dan Boneh},
  title        = {T/Key: Second-Factor Authentication From Secure Hash Chains},
  journal      = {CoRR},
  volume       = {abs/1708.08424},
  year         = {2017}
}
@article{DBLP:journals/iacr/BonehKM17,
  author       = {Dan Boneh and
                  Sam Kim and
                  Hart William Montgomery},
  title        = {Private Puncturable PRFs From Standard Lattice Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {100},
  year         = {2017}
}
@article{DBLP:journals/iacr/BonehISW17,
  author       = {Dan Boneh and
                  Yuval Ishai and
                  Amit Sahai and
                  David J. Wu},
  title        = {Lattice-Based SNARGs and Their Application to More Efficient Obfuscation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {240},
  year         = {2017}
}
@article{DBLP:journals/iacr/BonehGGK17,
  author       = {Dan Boneh and
                  Rosario Gennaro and
                  Steven Goldfeder and
                  Sam Kim},
  title        = {A Lattice-Based Universal Thresholdizer for Cryptographic Systems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {251},
  year         = {2017}
}
@article{DBLP:journals/iacr/BonehKW17,
  author       = {Dan Boneh and
                  Sam Kim and
                  David J. Wu},
  title        = {Constrained Keys for Invertible Pseudorandom Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {477},
  year         = {2017}
}
@article{DBLP:journals/iacr/BonehGGJKRS17,
  author       = {Dan Boneh and
                  Rosario Gennaro and
                  Steven Goldfeder and
                  Aayush Jain and
                  Sam Kim and
                  Peter M. R. Rasmussen and
                  Amit Sahai},
  title        = {Threshold Cryptosystems From Threshold Fully Homomorphic Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {956},
  year         = {2017}
}
@article{DBLP:journals/iacr/BunzBBPWM17,
  author       = {Benedikt B{\"{u}}nz and
                  Jonathan Bootle and
                  Dan Boneh and
                  Andrew Poelstra and
                  Pieter Wuille and
                  Gregory Maxwell},
  title        = {Bulletproofs: Short Proofs for Confidential Transactions and More},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1066},
  year         = {2017}
}
@article{DBLP:journals/ieeesp/LevyCB16,
  author       = {Amit Levy and
                  Henry Corrigan{-}Gibbs and
                  Dan Boneh},
  title        = {Stickler: Defending against Malicious Content Distribution Networks
                  in an Unmodified Browser},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {14},
  number       = {2},
  pages        = {22--28},
  year         = {2016}
}
@article{DBLP:journals/ieeesp/BonehPS16,
  author       = {Dan Boneh and
                  Kenny Paterson and
                  Nigel P. Smart},
  title        = {Building a Community of Real-World Cryptographers},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {14},
  number       = {6},
  pages        = {7--9},
  year         = {2016}
}
@inproceedings{DBLP:conf/asiacrypt/BonehCS16,
  author       = {Dan Boneh and
                  Henry Corrigan{-}Gibbs and
                  Stuart E. Schechter},
  title        = {Balloon Hashing: {A} Memory-Hard Function Providing Provable Protection
                  Against Sequential Attacks},
  booktitle    = {{ASIACRYPT} {(1)}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10031},
  pages        = {220--248},
  year         = {2016}
}
@inproceedings{DBLP:conf/ccs/LewiMACFWABK016,
  author       = {Kevin Lewi and
                  Alex J. Malozemoff and
                  Daniel Apon and
                  Brent Carmer and
                  Adam Foltzer and
                  Daniel Wagner and
                  David W. Archer and
                  Dan Boneh and
                  Jonathan Katz and
                  Mariana Raykova},
  title        = {5Gen: {A} Framework for Prototyping Applications Using Multilinear
                  Maps and Matrix Branching Programs},
  booktitle    = {{CCS}},
  pages        = {981--992},
  publisher    = {{ACM}},
  year         = {2016}
}
@inproceedings{DBLP:conf/esorics/WuTSB16,
  author       = {David J. Wu and
                  Ankur Taly and
                  Asim Shankar and
                  Dan Boneh},
  title        = {Privacy, Discovery, and Authentication for the Internet of Things},
  booktitle    = {{ESORICS} {(2)}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9879},
  pages        = {301--319},
  publisher    = {Springer},
  year         = {2016}
}
@inproceedings{DBLP:conf/ewsn/KininghamHLB16,
  author       = {Kevin Kiningham and
                  Mark Horowitz and
                  Philip Alexander Levis and
                  Dan Boneh},
  title        = {{CESEL:} Securing a Mote for 20 Years},
  booktitle    = {{EWSN}},
  pages        = {307--312},
  publisher    = {Junction Publishing, Canada / {ACM}},
  year         = {2016}
}
@inproceedings{DBLP:conf/fc/SchrijversBBR16,
  author       = {Okke Schrijvers and
                  Joseph Bonneau and
                  Dan Boneh and
                  Tim Roughgarden},
  title        = {Incentive Compatibility of Bitcoin Mining Pool Reward Functions},
  booktitle    = {Financial Cryptography},
  series       = {Lecture Notes in Computer Science},
  volume       = {9603},
  pages        = {477--498},
  publisher    = {Springer},
  year         = {2016}
}
@article{DBLP:journals/corr/WuTSB16,
  author       = {David J. Wu and
                  Ankur Taly and
                  Asim Shankar and
                  Dan Boneh},
  title        = {Privacy, Discovery, and Authentication for the Internet of Things},
  journal      = {CoRR},
  volume       = {abs/1604.06959},
  year         = {2016}
}
@article{DBLP:journals/iacr/Corrigan-GibbsB16,
  author       = {Henry Corrigan{-}Gibbs and
                  Dan Boneh and
                  Stuart E. Schechter},
  title        = {Balloon Hashing: Provably Space-Hard Hash Functions with Data-Independent
                  Access Patterns},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {27},
  year         = {2016}
}
@article{DBLP:journals/iacr/LewiMACFWABK016,
  author       = {Kevin Lewi and
                  Alex J. Malozemoff and
                  Daniel Apon and
                  Brent Carmer and
                  Adam Foltzer and
                  Daniel Wagner and
                  David W. Archer and
                  Dan Boneh and
                  Jonathan Katz and
                  Mariana Raykova},
  title        = {5Gen: {A} Framework for Prototyping Applications Using Multilinear
                  Maps and Matrix Branching Programs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {619},
  year         = {2016}
}
@article{DBLP:journals/joc/AhnBCHSW15,
  author       = {Jae Hyun Ahn and
                  Dan Boneh and
                  Jan Camenisch and
                  Susan Hohenberger and
                  Abhi Shelat and
                  Brent Waters},
  title        = {Computing on Authenticated Data},
  journal      = {J. Cryptol.},
  volume       = {28},
  number       = {2},
  pages        = {351--395},
  year         = {2015}
}
@inproceedings{DBLP:conf/ccs/DagherBBCB15,
  author       = {Gaby G. Dagher and
                  Benedikt B{\"{u}}nz and
                  Joseph Bonneau and
                  Jeremy Clark and
                  Dan Boneh},
  title        = {Provisions: Privacy-preserving Proofs of Solvency for Bitcoin Exchanges},
  booktitle    = {{CCS}},
  pages        = {720--731},
  publisher    = {{ACM}},
  year         = {2015}
}
@inproceedings{DBLP:conf/ccs/MashtizadehBBM15,
  author       = {Ali Jos{\'{e}} Mashtizadeh and
                  Andrea Bittau and
                  Dan Boneh and
                  David Mazi{\`{e}}res},
  title        = {{CCFI:} Cryptographically Enforced Control Flow Integrity},
  booktitle    = {{CCS}},
  pages        = {941--951},
  publisher    = {{ACM}},
  year         = {2015}
}
@inproceedings{DBLP:conf/eurocrypt/Boneh0MS15,
  author       = {Dan Boneh and
                  Divya Gupta and
                  Ilya Mironov and
                  Amit Sahai},
  title        = {Hosting Services on an Untrusted Cloud},
  booktitle    = {{EUROCRYPT} {(2)}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9057},
  pages        = {404--436},
  publisher    = {Springer},
  year         = {2015}
}
@inproceedings{DBLP:conf/eurocrypt/BonehL0SZZ15,
  author       = {Dan Boneh and
                  Kevin Lewi and
                  Mariana Raykova and
                  Amit Sahai and
                  Mark Zhandry and
                  Joe Zimmerman},
  title        = {Semantically Secure Order-Revealing Encryption: Multi-input Functional
                  Encryption Without Obfuscation},
  booktitle    = {{EUROCRYPT} {(2)}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9057},
  pages        = {563--594},
  publisher    = {Springer},
  year         = {2015}
}
@inproceedings{DBLP:conf/sp/Corrigan-GibbsB15,
  author       = {Henry Corrigan{-}Gibbs and
                  Dan Boneh and
                  David Mazi{\`{e}}res},
  title        = {Riposte: An Anonymous Messaging System Handling Millions of Users},
  booktitle    = {{IEEE} Symposium on Security and Privacy},
  pages        = {321--338},
  publisher    = {{IEEE} Computer Society},
  year         = {2015}
}
@inproceedings{DBLP:conf/uss/MichalevskySVBN15,
  author       = {Yan Michalevsky and
                  Aaron Schulman and
                  Gunaa Arumugam Veerapandian and
                  Dan Boneh and
                  Gabi Nakibly},
  title        = {PowerSpy: Location Tracking Using Mobile Device Power Analysis},
  booktitle    = {{USENIX} Security Symposium},
  pages        = {785--800},
  publisher    = {{USENIX} Association},
  year         = {2015}
}
@article{DBLP:journals/corr/MichalevskyNSB15,
  author       = {Yan Michalevsky and
                  Gabi Nakibly and
                  Aaron Schulman and
                  Dan Boneh},
  title        = {PowerSpy: Location Tracking using Mobile Device Power Analysis},
  journal      = {CoRR},
  volume       = {abs/1502.03182},
  year         = {2015}
}
@article{DBLP:journals/corr/Corrigan-GibbsB15,
  author       = {Henry Corrigan{-}Gibbs and
                  Dan Boneh and
                  David Mazi{\`{e}}res},
  title        = {Riposte: An Anonymous Messaging System Handling Millions of Users},
  journal      = {CoRR},
  volume       = {abs/1503.06115},
  year         = {2015}
}
@article{DBLP:journals/corr/BraunJB15,
  author       = {Benjamin A. Braun and
                  Suman Jana and
                  Dan Boneh},
  title        = {Robust and Efficient Elimination of Cache and Timing Side Channels},
  journal      = {CoRR},
  volume       = {abs/1506.00189},
  year         = {2015}
}
@article{DBLP:journals/corr/LevyCB15,
  author       = {Amit Levy and
                  Henry Corrigan{-}Gibbs and
                  Dan Boneh},
  title        = {Stickler: Defending Against Malicious CDNs in an Unmodified Browser},
  journal      = {CoRR},
  volume       = {abs/1506.04110},
  year         = {2015}
}
@article{DBLP:journals/iacr/BonehLMR15,
  author       = {Dan Boneh and
                  Kevin Lewi and
                  Hart William Montgomery and
                  Ananth Raghunathan},
  title        = {Key Homomorphic PRFs and Their Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {220},
  year         = {2015}
}
@article{DBLP:journals/iacr/AbadiBMRS15,
  author       = {Mart{\'{\i}}n Abadi and
                  Dan Boneh and
                  Ilya Mironov and
                  Ananth Raghunathan and
                  Gil Segev},
  title        = {Message-Locked Encryption for Lock-Dependent Messages},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {440},
  year         = {2015}
}
@article{DBLP:journals/iacr/DagherBBCB15,
  author       = {Gaby G. Dagher and
                  Benedikt B{\"{u}}nz and
                  Joseph Bonneau and
                  Jeremy Clark and
                  Dan Boneh},
  title        = {Provisions: Privacy-preserving proofs of solvency for Bitcoin exchanges},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1008},
  year         = {2015}
}
@article{DBLP:journals/iacr/BonehLW15,
  author       = {Dan Boneh and
                  Kevin Lewi and
                  David J. Wu},
  title        = {Constraining Pseudorandom Functions Privately},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1167},
  year         = {2015}
}
@article{DBLP:journals/cacm/BojinovSRBL14,
  author       = {Hristo Bojinov and
                  Daniel S{\'{a}}nchez and
                  Paul J. Reber and
                  Dan Boneh and
                  Patrick Lincoln},
  title        = {Neuroscience meets cryptography: crypto primitives secure against
                  rubber hose attacks},
  journal      = {Commun. {ACM}},
  volume       = {57},
  number       = {5},
  pages        = {110--118},
  year         = {2014}
}
@article{DBLP:journals/internet/HuangABJ14,
  author       = {Lin{-}Shung Huang and
                  Shrikant Adhikarla and
                  Dan Boneh and
                  Collin Jackson},
  title        = {An Experimental Study of {TLS} Forward Secrecy Deployments},
  journal      = {{IEEE} Internet Comput.},
  volume       = {18},
  number       = {6},
  pages        = {43--51},
  year         = {2014}
}
@inproceedings{DBLP:conf/asiacrypt/BonehC14,
  author       = {Dan Boneh and
                  Henry Corrigan{-}Gibbs},
  title        = {Bivariate Polynomials Modulo Composites and Their Applications},
  booktitle    = {{ASIACRYPT} {(1)}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8873},
  pages        = {42--62},
  publisher    = {Springer},
  year         = {2014}
}
@inproceedings{DBLP:conf/crypto/BonehWZ14,
  author       = {Dan Boneh and
                  Brent Waters and
                  Mark Zhandry},
  title        = {Low Overhead Broadcast Encryption from Multilinear Maps},
  booktitle    = {{CRYPTO} {(1)}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8616},
  pages        = {206--223},
  publisher    = {Springer},
  year         = {2014}
}
@inproceedings{DBLP:conf/crypto/BonehZ14,
  author       = {Dan Boneh and
                  Mark Zhandry},
  title        = {Multiparty Key Exchange, Efficient Traitor Tracing, and More from
                  Indistinguishability Obfuscation},
  booktitle    = {{CRYPTO} {(1)}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8616},
  pages        = {480--499},
  publisher    = {Springer},
  year         = {2014}
}
@inproceedings{DBLP:conf/eurocrypt/BonehGGHNSVV14,
  author       = {Dan Boneh and
                  Craig Gentry and
                  Sergey Gorbunov and
                  Shai Halevi and
                  Valeria Nikolaenko and
                  Gil Segev and
                  Vinod Vaikuntanathan and
                  Dhinakaran Vinayagamurthy},
  title        = {Fully Key-Homomorphic Encryption, Arithmetic Circuit {ABE} and Compact
                  Garbled Circuits},
  booktitle    = {{EUROCRYPT}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8441},
  pages        = {533--556},
  publisher    = {Springer},
  year         = {2014}
}
@inproceedings{DBLP:conf/sp/BittauBMMB14,
  author       = {Andrea Bittau and
                  Adam Belay and
                  Ali Jos{\'{e}} Mashtizadeh and
                  David Mazi{\`{e}}res and
                  Dan Boneh},
  title        = {Hacking Blind},
  booktitle    = {{IEEE} Symposium on Security and Privacy},
  pages        = {227--242},
  publisher    = {{IEEE} Computer Society},
  year         = {2014}
}
@inproceedings{DBLP:conf/uss/SilverJBCJ14,
  author       = {David Silver and
                  Suman Jana and
                  Dan Boneh and
                  Eric Yawei Chen and
                  Collin Jackson},
  title        = {Password Managers: Attacks and Defenses},
  booktitle    = {{USENIX} Security Symposium},
  pages        = {449--464},
  publisher    = {{USENIX} Association},
  year         = {2014}
}
@inproceedings{DBLP:conf/uss/MichalevskyBN14,
  author       = {Yan Michalevsky and
                  Dan Boneh and
                  Gabi Nakibly},
  title        = {Gyrophone: Recognizing Speech from Gyroscope Signals},
  booktitle    = {{USENIX} Security Symposium},
  pages        = {1053--1067},
  publisher    = {{USENIX} Association},
  year         = {2014}
}
@inproceedings{DBLP:conf/woot/HoBBP14,
  author       = {Grant Ho and
                  Dan Boneh and
                  Lucas Ballard and
                  Niels Provos},
  title        = {Tick Tock: Building Browser Red Pills from Timing Side Channels},
  booktitle    = {{WOOT}},
  publisher    = {{USENIX} Association},
  year         = {2014}
}
@article{DBLP:journals/corr/BojinovMNB14,
  author       = {Hristo Bojinov and
                  Yan Michalevsky and
                  Gabi Nakibly and
                  Dan Boneh},
  title        = {Mobile Device Identification via Sensor Fingerprinting},
  journal      = {CoRR},
  volume       = {abs/1408.1416},
  year         = {2014}
}
@article{DBLP:journals/corr/MashtizadehBMB14,
  author       = {Ali Jos{\'{e}} Mashtizadeh and
                  Andrea Bittau and
                  David Mazi{\`{e}}res and
                  Dan Boneh},
  title        = {Cryptographically Enforced Control Flow Integrity},
  journal      = {CoRR},
  volume       = {abs/1408.1451},
  year         = {2014}
}
@article{DBLP:journals/iacr/BonehWZ14,
  author       = {Dan Boneh and
                  Brent Waters and
                  Mark Zhandry},
  title        = {Low Overhead Broadcast Encryption from Multilinear Maps},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {195},
  year         = {2014}
}
@article{DBLP:journals/iacr/BonehGGHNSVV14,
  author       = {Dan Boneh and
                  Craig Gentry and
                  Sergey Gorbunov and
                  Shai Halevi and
                  Valeria Nikolaenko and
                  Gil Segev and
                  Vinod Vaikuntanathan and
                  Dhinakaran Vinayagamurthy},
  title        = {Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE, and Compact
                  Garbled Circuits},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {356},
  year         = {2014}
}
@article{DBLP:journals/iacr/BonehC14,
  author       = {Dan Boneh and
                  Henry Corrigan{-}Gibbs},
  title        = {Bivariate Polynomials Modulo Composites and their Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {719},
  year         = {2014}
}
@article{DBLP:journals/iacr/BonehLRSZZ14,
  author       = {Dan Boneh and
                  Kevin Lewi and
                  Mariana Raykova and
                  Amit Sahai and
                  Mark Zhandry and
                  Joe Zimmerman},
  title        = {Semantically Secure Order-Revealing Encryption: Multi-Input Functional
                  Encryption Without Obfuscation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {834},
  year         = {2014}
}
@article{DBLP:journals/iacr/BonehWZ14a,
  author       = {Dan Boneh and
                  David J. Wu and
                  Joe Zimmerman},
  title        = {Immunizing Multilinear Maps Against Zeroizing Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {930},
  year         = {2014}
}
@inproceedings{DBLP:conf/acns/BonehGHWW13,
  author       = {Dan Boneh and
                  Craig Gentry and
                  Shai Halevi and
                  Frank Wang and
                  David J. Wu},
  title        = {Private Database Queries Using Somewhat Homomorphic Encryption},
  booktitle    = {{ACNS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {7954},
  pages        = {102--118},
  publisher    = {Springer},
  year         = {2013}
}
@inproceedings{DBLP:conf/asiacrypt/BonehRS13,
  author       = {Dan Boneh and
                  Ananth Raghunathan and
                  Gil Segev},
  title        = {Function-Private Subspace-Membership Encryption and Its Applications},
  booktitle    = {{ASIACRYPT} {(1)}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8269},
  pages        = {255--275},
  publisher    = {Springer},
  year         = {2013}
}
@inproceedings{DBLP:conf/asiacrypt/BonehW13,
  author       = {Dan Boneh and
                  Brent Waters},
  title        = {Constrained Pseudorandom Functions and Their Applications},
  booktitle    = {{ASIACRYPT} {(2)}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8270},
  pages        = {280--300},
  publisher    = {Springer},
  year         = {2013}
}
@inproceedings{DBLP:conf/ccs/Corrigan-GibbsMBF13,
  author       = {Henry Corrigan{-}Gibbs and
                  Wendy Mu and
                  Dan Boneh and
                  Bryan Ford},
  title        = {Ensuring high-quality randomness in cryptographic key generation},
  booktitle    = {{CCS}},
  pages        = {685--696},
  publisher    = {{ACM}},
  year         = {2013}
}
@inproceedings{DBLP:conf/ccs/NikolaenkoIWJTB13,
  author       = {Valeria Nikolaenko and
                  Stratis Ioannidis and
                  Udi Weinsberg and
                  Marc Joye and
                  Nina Taft and
                  Dan Boneh},
  title        = {Privacy-preserving matrix factorization},
  booktitle    = {{CCS}},
  pages        = {801--812},
  publisher    = {{ACM}},
  year         = {2013}
}
@inproceedings{DBLP:conf/crypto/BonehZ13,
  author       = {Dan Boneh and
                  Mark Zhandry},
  title        = {Secure Signatures and Chosen Ciphertext Security in a Quantum Computing
                  World},
  booktitle    = {{CRYPTO} {(2)}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8043},
  pages        = {361--379},
  publisher    = {Springer},
  year         = {2013}
}
@inproceedings{DBLP:conf/crypto/AbadiBMRS13,
  author       = {Mart{\'{\i}}n Abadi and
                  Dan Boneh and
                  Ilya Mironov and
                  Ananth Raghunathan and
                  Gil Segev},
  title        = {Message-Locked Encryption for Lock-Dependent Messages},
  booktitle    = {{CRYPTO} {(1)}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8042},
  pages        = {374--391},
  publisher    = {Springer},
  year         = {2013}
}
@inproceedings{DBLP:conf/crypto/BonehLMR13,
  author       = {Dan Boneh and
                  Kevin Lewi and
                  Hart William Montgomery and
                  Ananth Raghunathan},
  title        = {Key Homomorphic PRFs and Their Applications},
  booktitle    = {{CRYPTO} {(1)}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8042},
  pages        = {410--428},
  publisher    = {Springer},
  year         = {2013}
}
@inproceedings{DBLP:conf/crypto/BonehRS13,
  author       = {Dan Boneh and
                  Ananth Raghunathan and
                  Gil Segev},
  title        = {Function-Private Identity-Based Encryption: Hiding the Function in
                  Functional Encryption},
  booktitle    = {{CRYPTO} {(2)}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8043},
  pages        = {461--478},
  publisher    = {Springer},
  year         = {2013}
}
@inproceedings{DBLP:conf/eurocrypt/BonehZ13,
  author       = {Dan Boneh and
                  Mark Zhandry},
  title        = {Quantum-Secure Message Authentication Codes},
  booktitle    = {{EUROCRYPT}},
  series       = {Lecture Notes in Computer Science},
  volume       = {7881},
  pages        = {592--608},
  publisher    = {Springer},
  year         = {2013}
}
@inproceedings{DBLP:conf/pet/FifieldNB13,
  author       = {David Fifield and
                  Gabi Nakibly and
                  Dan Boneh},
  title        = {{OSS:} Using Online Scanning Services for Censorship Circumvention},
  booktitle    = {Privacy Enhancing Technologies},
  series       = {Lecture Notes in Computer Science},
  volume       = {7981},
  pages        = {185--204},
  publisher    = {Springer},
  year         = {2013}
}
@inproceedings{DBLP:conf/sp/NikolaenkoWIJBT13,
  author       = {Valeria Nikolaenko and
                  Udi Weinsberg and
                  Stratis Ioannidis and
                  Marc Joye and
                  Dan Boneh and
                  Nina Taft},
  title        = {Privacy-Preserving Ridge Regression on Hundreds of Millions of Records},
  booktitle    = {{IEEE} Symposium on Security and Privacy},
  pages        = {334--348},
  publisher    = {{IEEE} Computer Society},
  year         = {2013}
}
@proceedings{DBLP:conf/stoc/2013,
  editor       = {Dan Boneh and
                  Tim Roughgarden and
                  Joan Feigenbaum},
  title        = {Symposium on Theory of Computing Conference, STOC'13, Palo Alto, CA,
                  USA, June 1-4, 2013},
  publisher    = {{ACM}},
  year         = {2013}
}
@article{DBLP:journals/corr/Corrigan-GibbsMBF13,
  author       = {Henry Corrigan{-}Gibbs and
                  Wendy Mu and
                  Dan Boneh and
                  Bryan Ford},
  title        = {Ensuring High-Quality Randomness in Cryptographic Key Generation},
  journal      = {CoRR},
  volume       = {abs/1309.7366},
  year         = {2013}
}
@article{DBLP:journals/iacr/BonehZ13,
  author       = {Dan Boneh and
                  Mark Zhandry},
  title        = {Secure Signatures and Chosen Ciphertext Security in a Post-Quantum
                  World},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {88},
  year         = {2013}
}
@article{DBLP:journals/iacr/BonehRS13,
  author       = {Dan Boneh and
                  Ananth Raghunathan and
                  Gil Segev},
  title        = {Function-Private Identity-Based Encryption: Hiding the Function in
                  Functional Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {283},
  year         = {2013}
}
@article{DBLP:journals/iacr/BonehW13,
  author       = {Dan Boneh and
                  Brent Waters},
  title        = {Constrained Pseudorandom Functions and Their Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {352},
  year         = {2013}
}
@article{DBLP:journals/iacr/BonehRS13a,
  author       = {Dan Boneh and
                  Ananth Raghunathan and
                  Gil Segev},
  title        = {Function-Private Subspace-Membership Encryption and Its Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {403},
  year         = {2013}
}
@article{DBLP:journals/iacr/BonehGHWW13,
  author       = {Dan Boneh and
                  Craig Gentry and
                  Shai Halevi and
                  Frank Wang and
                  David J. Wu},
  title        = {Private Database Queries Using Somewhat Homomorphic Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {422},
  year         = {2013}
}
@article{DBLP:journals/iacr/BonehZ13a,
  author       = {Dan Boneh and
                  Mark Zhandry},
  title        = {Multiparty Key Exchange, Efficient Traitor Tracing, and More from
                  Indistinguishability Obfuscation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {642},
  year         = {2013}
}
@article{DBLP:journals/iacr/BonehNS13,
  author       = {Dan Boneh and
                  Valeria Nikolaenko and
                  Gil Segev},
  title        = {Attribute-Based Encryption for Arithmetic Circuits},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {669},
  year         = {2013}
}
@article{DBLP:journals/iacr/AnanthBGSZ13,
  author       = {Prabhanjan Ananth and
                  Dan Boneh and
                  Sanjam Garg and
                  Amit Sahai and
                  Mark Zhandry},
  title        = {Differing-Inputs Obfuscation and Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {689},
  year         = {2013}
}
@article{DBLP:journals/cacm/BonehSW12,
  author       = {Dan Boneh and
                  Amit Sahai and
                  Brent Waters},
  title        = {Functional encryption: a new vision for public-key cryptography},
  journal      = {Commun. {ACM}},
  volume       = {55},
  number       = {11},
  pages        = {56--64},
  year         = {2012}
}
@article{DBLP:journals/pieee/LandwehrBMBLL12,
  author       = {Carl E. Landwehr and
                  Dan Boneh and
                  John C. Mitchell and
                  Steven M. Bellovin and
                  Susan Landau and
                  Michael E. Lesk},
  title        = {Privacy and Cybersecurity: The Next 100 Years},
  journal      = {Proc. {IEEE}},
  volume       = {100},
  number       = {Centennial-Issue},
  pages        = {1659--1673},
  year         = {2012}
}
@inproceedings{DBLP:conf/asiacrypt/Boneh12,
  author       = {Dan Boneh},
  title        = {Pairing-Based Cryptography: Past, Present, and Future},
  booktitle    = {{ASIACRYPT}},
  series       = {Lecture Notes in Computer Science},
  volume       = {7658},
  pages        = {1},
  publisher    = {Springer},
  year         = {2012}
}
@inproceedings{DBLP:conf/ccs/GeorgievIJABS12,
  author       = {Martin Georgiev and
                  Subodh Iyengar and
                  Suman Jana and
                  Rishita Anubhai and
                  Dan Boneh and
                  Vitaly Shmatikov},
  title        = {The most dangerous code in the world: validating {SSL} certificates
                  in non-browser software},
  booktitle    = {{CCS}},
  pages        = {38--49},
  publisher    = {{ACM}},
  year         = {2012}
}
@inproceedings{DBLP:conf/ccs/WeinbergWYBCWB12,
  author       = {Zachary Weinberg and
                  Jeffrey Wang and
                  Vinod Yegneswaran and
                  Linda Briesemeister and
                  Steven Cheung and
                  Frank Wang and
                  Dan Boneh},
  title        = {StegoTorus: a camouflage proxy for the Tor anonymity system},
  booktitle    = {{CCS}},
  pages        = {109--120},
  publisher    = {{ACM}},
  year         = {2012}
}
@inproceedings{DBLP:conf/innovations/BonehSW12,
  author       = {Dan Boneh and
                  Gil Segev and
                  Brent Waters},
  title        = {Targeted malleability: homomorphic encryption for restricted computations},
  booktitle    = {{ITCS}},
  pages        = {350--366},
  publisher    = {{ACM}},
  year         = {2012}
}
@inproceedings{DBLP:conf/ndss/NakiblyKGB12,
  author       = {Gabi Nakibly and
                  Alex Kirshon and
                  Dima Gonikman and
                  Dan Boneh},
  title        = {Persistent {OSPF} Attacks},
  booktitle    = {{NDSS}},
  publisher    = {The Internet Society},
  year         = {2012}
}
@inproceedings{DBLP:conf/ndss/StarkHIJB12,
  author       = {Emily Stark and
                  Lin{-}Shung Huang and
                  Dinesh Israni and
                  Collin Jackson and
                  Dan Boneh},
  title        = {The Case for Prefetching and Prevalidating {TLS} Server Certificates},
  booktitle    = {{NDSS}},
  publisher    = {The Internet Society},
  year         = {2012}
}
@inproceedings{DBLP:conf/pet/FifieldHESBDP12,
  author       = {David Fifield and
                  Nate Hardison and
                  Jonathan D. Ellithorpe and
                  Emily Stark and
                  Dan Boneh and
                  Roger Dingledine and
                  Phillip A. Porras},
  title        = {Evading Censorship with Browser-Based Proxies},
  booktitle    = {Privacy Enhancing Technologies},
  series       = {Lecture Notes in Computer Science},
  volume       = {7384},
  pages        = {239--258},
  publisher    = {Springer},
  year         = {2012}
}
@inproceedings{DBLP:conf/tcc/AhnBCHSW12,
  author       = {Jae Hyun Ahn and
                  Dan Boneh and
                  Jan Camenisch and
                  Susan Hohenberger and
                  Abhi Shelat and
                  Brent Waters},
  title        = {Computing on Authenticated Data},
  booktitle    = {{TCC}},
  series       = {Lecture Notes in Computer Science},
  volume       = {7194},
  pages        = {1--20},
  publisher    = {Springer},
  year         = {2012}
}
@inproceedings{DBLP:conf/uss/BojinovSRBL12,
  author       = {Hristo Bojinov and
                  Daniel S{\'{a}}nchez and
                  Paul J. Reber and
                  Dan Boneh and
                  Patrick Lincoln},
  title        = {Neuroscience Meets Cryptography: Designing Crypto Primitives Secure
                  Against Rubber Hose Attacks},
  booktitle    = {{USENIX} Security Symposium},
  pages        = {129--141},
  publisher    = {{USENIX} Association},
  year         = {2012}
}
@inproceedings{DBLP:conf/uss/LincolnMPYWMSVB12,
  author       = {Patrick Lincoln and
                  Ian Mason and
                  Phillip A. Porras and
                  Vinod Yegneswaran and
                  Zachary Weinberg and
                  Jeroen Massar and
                  William Allen Simpson and
                  Paul Vixie and
                  Dan Boneh},
  title        = {Bootstrapping Communications into an Anti-Censorship System},
  booktitle    = {{FOCI}},
  publisher    = {{USENIX} Association},
  year         = {2012}
}
@inproceedings{DBLP:conf/www/ThiagarajanANBS12,
  author       = {Narendran Thiagarajan and
                  Gaurav Aggarwal and
                  Angela Nicoara and
                  Dan Boneh and
                  Jatinder Pal Singh},
  title        = {Who killed my battery?: analyzing mobile browser energy consumption},
  booktitle    = {{WWW}},
  pages        = {41--50},
  publisher    = {{ACM}},
  year         = {2012}
}
@inproceedings{DBLP:conf/www/BurszteinSBM12,
  author       = {Elie Bursztein and
                  Chinmay Soman and
                  Dan Boneh and
                  John C. Mitchell},
  title        = {SessionJuggler: secure web login from an untrusted terminal using
                  session hijacking},
  booktitle    = {{WWW}},
  pages        = {321--330},
  publisher    = {{ACM}},
  year         = {2012}
}
@article{DBLP:journals/corr/abs-1202-4503,
  author       = {Arvind Narayanan and
                  Vincent Toubiana and
                  Solon Barocas and
                  Helen Nissenbaum and
                  Dan Boneh},
  title        = {A Critical Look at Decentralized Personal Data Architectures},
  journal      = {CoRR},
  volume       = {abs/1202.4503},
  year         = {2012}
}
@article{DBLP:journals/eccc/BonehZ12,
  author       = {Dan Boneh and
                  Mark Zhandry},
  title        = {Quantum-Secure Message Authentication Codes},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR12-136}},
  year         = {2012}
}
@article{DBLP:journals/iacr/BonehZ12,
  author       = {Dan Boneh and
                  Mark Zhandry},
  title        = {Quantum-Secure Message Authentication Codes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {606},
  year         = {2012}
}
@article{DBLP:journals/crossroads/Boneh11,
  author       = {Dan Boneh},
  title        = {Recent ideas for circumventing internet filtering},
  journal      = {{XRDS}},
  volume       = {18},
  number       = {2},
  pages        = {36--40},
  year         = {2011}
}
@article{DBLP:journals/joc/BonehB11,
  author       = {Dan Boneh and
                  Xavier Boyen},
  title        = {Efficient Selective Identity-Based Encryption Without Random Oracles},
  journal      = {J. Cryptol.},
  volume       = {24},
  number       = {4},
  pages        = {659--693},
  year         = {2011}
}
@inproceedings{DBLP:conf/asiacrypt/BonehDFLSZ11,
  author       = {Dan Boneh and
                  {\"{O}}zg{\"{u}}r Dagdelen and
                  Marc Fischlin and
                  Anja Lehmann and
                  Christian Schaffner and
                  Mark Zhandry},
  title        = {Random Oracles in a Quantum World},
  booktitle    = {{ASIACRYPT}},
  series       = {Lecture Notes in Computer Science},
  volume       = {7073},
  pages        = {41--69},
  publisher    = {Springer},
  year         = {2011}
}
@inproceedings{DBLP:conf/eurocrypt/BonehF11,
  author       = {Dan Boneh and
                  David Mandell Freeman},
  title        = {Homomorphic Signatures for Polynomial Functions},
  booktitle    = {{EUROCRYPT}},
  series       = {Lecture Notes in Computer Science},
  volume       = {6632},
  pages        = {149--168},
  publisher    = {Springer},
  year         = {2011}
}
@inproceedings{DBLP:conf/ndss/NarayananTLHB11,
  author       = {Arvind Narayanan and
                  Narendran Thiagarajan and
                  Mugdha Lakhani and
                  Michael Hamburg and
                  Dan Boneh},
  title        = {Location Privacy via Private Proximity Testing},
  booktitle    = {{NDSS}},
  publisher    = {The Internet Society},
  year         = {2011}
}
@inproceedings{DBLP:conf/pkc/BonehF11,
  author       = {Dan Boneh and
                  David Mandell Freeman},
  title        = {Linearly Homomorphic Signatures over Binary Fields and New Tools for
                  Lattice-Based Signatures},
  booktitle    = {Public Key Cryptography},
  series       = {Lecture Notes in Computer Science},
  volume       = {6571},
  pages        = {1--16},
  publisher    = {Springer},
  year         = {2011}
}
@inproceedings{DBLP:conf/sp/BurszteinHLB11,
  author       = {Elie Bursztein and
                  Mike Hamburg and
                  Jocelyn Lagarenne and
                  Dan Boneh},
  title        = {OpenConflict: Preventing Real Time Map Hacks in Online Games},
  booktitle    = {{IEEE} Symposium on Security and Privacy},
  pages        = {506--520},
  publisher    = {{IEEE} Computer Society},
  year         = {2011}
}
@inproceedings{DBLP:conf/tcc/BonehSW11,
  author       = {Dan Boneh and
                  Amit Sahai and
                  Brent Waters},
  title        = {Functional Encryption: Definitions and Challenges},
  booktitle    = {{TCC}},
  series       = {Lecture Notes in Computer Science},
  volume       = {6597},
  pages        = {253--273},
  publisher    = {Springer},
  year         = {2011}
}
@inproceedings{DBLP:conf/wisec/BojinovBCM11,
  author       = {Hristo Bojinov and
                  Dan Boneh and
                  Rich Cannings and
                  Iliyan Malchev},
  title        = {Address space randomization for mobile devices},
  booktitle    = {{WISEC}},
  pages        = {127--138},
  publisher    = {{ACM}},
  year         = {2011}
}
@inproceedings{DBLP:conf/wmcsa/BojinovB11,
  author       = {Hristo Bojinov and
                  Dan Boneh},
  title        = {Mobile token-based authentication on a budget},
  booktitle    = {HotMobile},
  pages        = {14--19},
  publisher    = {{ACM}},
  year         = {2011}
}
@incollection{DBLP:reference/crypt/Boneh11,
  author       = {Dan Boneh},
  title        = {Aggregate Signatures},
  booktitle    = {Encyclopedia of Cryptography and Security (2nd Ed.)},
  pages        = {27},
  publisher    = {Springer},
  year         = {2011}
}
@incollection{DBLP:reference/crypt/Boneh11a,
  author       = {Dan Boneh},
  title        = {{BLS} Short Digital Signatures},
  booktitle    = {Encyclopedia of Cryptography and Security (2nd Ed.)},
  pages        = {158--159},
  publisher    = {Springer},
  year         = {2011}
}
@incollection{DBLP:reference/crypt/Boneh11b,
  author       = {Dan Boneh},
  title        = {Blum-Blum-Shub Pseudorandom Bit Generator},
  booktitle    = {Encyclopedia of Cryptography and Security (2nd Ed.)},
  pages        = {160--161},
  publisher    = {Springer},
  year         = {2011}
}
@incollection{DBLP:reference/crypt/Boneh11c,
  author       = {Dan Boneh},
  title        = {Blum-Goldwasser Public Key Encryption System},
  booktitle    = {Encyclopedia of Cryptography and Security (2nd Ed.)},
  pages        = {161--162},
  publisher    = {Springer},
  year         = {2011}
}
@incollection{DBLP:reference/crypt/Boneh11d,
  author       = {Dan Boneh},
  title        = {Cramer-Shoup Public-Key System},
  booktitle    = {Encyclopedia of Cryptography and Security (2nd Ed.)},
  pages        = {269--270},
  publisher    = {Springer},
  year         = {2011}
}
@incollection{DBLP:reference/crypt/Boneh11e,
  author       = {Dan Boneh},
  title        = {Digital Signature Standard},
  booktitle    = {Encyclopedia of Cryptography and Security (2nd Ed.)},
  pages        = {347},
  publisher    = {Springer},
  year         = {2011}
}
@incollection{DBLP:reference/crypt/Boneh11f,
  author       = {Dan Boneh},
  title        = {ElGamal Digital Signature Scheme},
  booktitle    = {Encyclopedia of Cryptography and Security (2nd Ed.)},
  pages        = {395--396},
  publisher    = {Springer},
  year         = {2011}
}
@incollection{DBLP:reference/crypt/Boneh11g,
  author       = {Dan Boneh},
  title        = {Rabin Digital Signature Scheme},
  booktitle    = {Encyclopedia of Cryptography and Security (2nd Ed.)},
  pages        = {1014--1015},
  publisher    = {Springer},
  year         = {2011}
}
@incollection{DBLP:reference/crypt/Boneh11h,
  author       = {Dan Boneh},
  title        = {Schnorr Digital Signature Scheme},
  booktitle    = {Encyclopedia of Cryptography and Security (2nd Ed.)},
  pages        = {1082--1083},
  publisher    = {Springer},
  year         = {2011}
}
@incollection{DBLP:reference/crypt/Boneh11i,
  author       = {Dan Boneh},
  title        = {Secure Signatures from the "Strong RSA" Assumption},
  booktitle    = {Encyclopedia of Cryptography and Security (2nd Ed.)},
  pages        = {1134--1135},
  publisher    = {Springer},
  year         = {2011}
}
@incollection{DBLP:reference/crypt/Boneh11j,
  author       = {Dan Boneh},
  title        = {Strong {RSA} Assumption},
  booktitle    = {Encyclopedia of Cryptography and Security (2nd Ed.)},
  pages        = {1266},
  publisher    = {Springer},
  year         = {2011}
}
@article{DBLP:journals/iacr/BonehF11,
  author       = {Dan Boneh and
                  David Mandell Freeman},
  title        = {Homomorphic Signatures for Polynomial Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {18},
  year         = {2011}
}
@article{DBLP:journals/iacr/AhnBCHSW11,
  author       = {Jae Hyun Ahn and
                  Dan Boneh and
                  Jan Camenisch and
                  Susan Hohenberger and
                  Abhi Shelat and
                  Brent Waters},
  title        = {Computing on Authenticated Data},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {96},
  year         = {2011}
}
@article{DBLP:journals/iacr/BonehSW11,
  author       = {Dan Boneh and
                  Gil Segev and
                  Brent Waters},
  title        = {Targeted Malleability: Homomorphic Encryption for Restricted Computations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {311},
  year         = {2011}
}
@article{DBLP:journals/cacm/BojinovBB10,
  author       = {Hristo Bojinov and
                  Elie Bursztein and
                  Dan Boneh},
  title        = {The emergence of cross channel scripting},
  journal      = {Commun. {ACM}},
  volume       = {53},
  number       = {8},
  pages        = {105--113},
  year         = {2010}
}
@article{DBLP:journals/sensors/QiuBLE10,
  author       = {Di Qiu and
                  Dan Boneh and
                  Sherman C. Lo and
                  Per K. Enge},
  title        = {Reliable Location-Based Services from Radio Navigation Systems},
  journal      = {Sensors},
  volume       = {10},
  number       = {12},
  pages        = {11369--11389},
  year         = {2010}
}
@inproceedings{DBLP:conf/ccs/BonehMR10,
  author       = {Dan Boneh and
                  Hart William Montgomery and
                  Ananth Raghunathan},
  title        = {Algebraic pseudorandom functions with improved efficiency from the
                  augmented cascade},
  booktitle    = {{CCS}},
  pages        = {131--140},
  publisher    = {{ACM}},
  year         = {2010}
}
@inproceedings{DBLP:conf/crypto/AgrawalBB10,
  author       = {Shweta Agrawal and
                  Dan Boneh and
                  Xavier Boyen},
  title        = {Lattice Basis Delegation in Fixed Dimension and Shorter-Ciphertext
                  Hierarchical {IBE}},
  booktitle    = {{CRYPTO}},
  series       = {Lecture Notes in Computer Science},
  volume       = {6223},
  pages        = {98--115},
  publisher    = {Springer},
  year         = {2010}
}
@inproceedings{DBLP:conf/drm/BonehKM10,
  author       = {Dan Boneh and
                  Aggelos Kiayias and
                  Hart William Montgomery},
  title        = {Robust fingerprinting codes: a near optimal construction},
  booktitle    = {Digital Rights Management Workshop},
  pages        = {3--12},
  publisher    = {{ACM}},
  year         = {2010}
}
@inproceedings{DBLP:conf/esorics/BojinovBBB10,
  author       = {Hristo Bojinov and
                  Elie Bursztein and
                  Xavier Boyen and
                  Dan Boneh},
  title        = {Kamouflage: Loss-Resistant Password Management},
  booktitle    = {{ESORICS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {6345},
  pages        = {286--302},
  publisher    = {Springer},
  year         = {2010}
}
@inproceedings{DBLP:conf/eurocrypt/AgrawalBB10,
  author       = {Shweta Agrawal and
                  Dan Boneh and
                  Xavier Boyen},
  title        = {Efficient Lattice {(H)IBE} in the Standard Model},
  booktitle    = {{EUROCRYPT}},
  series       = {Lecture Notes in Computer Science},
  volume       = {6110},
  pages        = {553--572},
  publisher    = {Springer},
  year         = {2010}
}
@inproceedings{DBLP:conf/mobicase/DodsonSBL10,
  author       = {Ben Dodson and
                  Debangsu Sengupta and
                  Dan Boneh and
                  Monica S. Lam},
  title        = {Secure, Consumer-Friendly Web Authentication and Payments with a Phone},
  booktitle    = {MobiCASE},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {76},
  pages        = {17--38},
  publisher    = {Springer},
  year         = {2010}
}
@inproceedings{DBLP:conf/ndss/ToubianaNBNB10,
  author       = {Vincent Toubiana and
                  Arvind Narayanan and
                  Dan Boneh and
                  Helen Nissenbaum and
                  Solon Barocas},
  title        = {Adnostic: Privacy Preserving Targeted Advertising},
  booktitle    = {{NDSS}},
  publisher    = {The Internet Society},
  year         = {2010}
}
@inproceedings{DBLP:conf/pkc/AgrawalBBF10,
  author       = {Shweta Agrawal and
                  Dan Boneh and
                  Xavier Boyen and
                  David Mandell Freeman},
  title        = {Preventing Pollution Attacks in Multi-source Network Coding},
  booktitle    = {Public Key Cryptography},
  series       = {Lecture Notes in Computer Science},
  volume       = {6056},
  pages        = {161--176},
  publisher    = {Springer},
  year         = {2010}
}
@inproceedings{DBLP:conf/uss/AggarwalBJB10,
  author       = {Gaurav Aggarwal and
                  Elie Bursztein and
                  Collin Jackson and
                  Dan Boneh},
  title        = {An Analysis of Private Browsing Modes in Modern Browsers},
  booktitle    = {{USENIX} Security Symposium},
  pages        = {79--94},
  publisher    = {{USENIX} Association},
  year         = {2010}
}
@inproceedings{DBLP:conf/uss/BittauHHMB10,
  author       = {Andrea Bittau and
                  Michael Hamburg and
                  Mark Handley and
                  David Mazi{\`{e}}res and
                  Dan Boneh},
  title        = {The Case for Ubiquitous Transport-Level Encryption},
  booktitle    = {{USENIX} Security Symposium},
  pages        = {403--418},
  publisher    = {{USENIX} Association},
  year         = {2010}
}
@inproceedings{DBLP:conf/uss/BurszteinGFBRBBM10,
  author       = {Elie Bursztein and
                  Baptiste Gourdin and
                  Celine Fabry and
                  Jason Bau and
                  Gustav Rydstedt and
                  Hristo Bojinov and
                  Dan Boneh and
                  John C. Mitchell},
  title        = {Webseclab Security Education Workbench},
  booktitle    = {{CSET}},
  publisher    = {{USENIX} Association},
  year         = {2010}
}
@article{DBLP:journals/iacr/AgrawalBBF10,
  author       = {Shweta Agrawal and
                  Dan Boneh and
                  Xavier Boyen and
                  David Mandell Freeman},
  title        = {Preventing Pollution Attacks in Multi-Source Network Coding},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {183},
  year         = {2010}
}
@article{DBLP:journals/iacr/BonehDFLSZ10,
  author       = {Dan Boneh and
                  {\"{O}}zg{\"{u}}r Dagdelen and
                  Marc Fischlin and
                  Anja Lehmann and
                  Christian Schaffner and
                  Mark Zhandry},
  title        = {Random Oracles in a Quantum World},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {428},
  year         = {2010}
}
@article{DBLP:journals/iacr/BonehMR10,
  author       = {Dan Boneh and
                  Hart William Montgomery and
                  Ananth Raghunathan},
  title        = {Algebraic Pseudorandom Functions with Improved Efficiency from the
                  Augmented Cascade},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {442},
  year         = {2010}
}
@article{DBLP:journals/iacr/BonehF10,
  author       = {Dan Boneh and
                  David Mandell Freeman},
  title        = {Linearly Homomorphic Signatures over Binary Fields and New Tools for
                  Lattice-Based Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {453},
  year         = {2010}
}
@article{DBLP:journals/iacr/BonehSW10,
  author       = {Dan Boneh and
                  Amit Sahai and
                  Brent Waters},
  title        = {Functional Encryption: Definitions and Challenges},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {543},
  year         = {2010}
}
@article{DBLP:journals/tweb/JacksonBBSB09,
  author       = {Collin Jackson and
                  Adam Barth and
                  Andrew Bortz and
                  Weidong Shao and
                  Dan Boneh},
  title        = {Protecting browsers from {DNS} rebinding attacks},
  journal      = {{ACM} Trans. Web},
  volume       = {3},
  number       = {1},
  pages        = {2:1--2:26},
  year         = {2009}
}
@inproceedings{DBLP:conf/acns/AgrawalB09,
  author       = {Shweta Agrawal and
                  Dan Boneh},
  title        = {Homomorphic MACs: MAC-Based Integrity for Network Coding},
  booktitle    = {{ACNS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {5536},
  pages        = {292--305},
  year         = {2009}
}
@inproceedings{DBLP:conf/acsac/StarkHB09,
  author       = {Emily Stark and
                  Michael Hamburg and
                  Dan Boneh},
  title        = {Symmetric Cryptography in Javascript},
  booktitle    = {{ACSAC}},
  pages        = {373--381},
  publisher    = {{IEEE} Computer Society},
  year         = {2009}
}
@inproceedings{DBLP:conf/ccs/BojinovBB09,
  author       = {Hristo Bojinov and
                  Elie Bursztein and
                  Dan Boneh},
  title        = {{XCS:} cross channel scripting and its impact on web applications},
  booktitle    = {{CCS}},
  pages        = {420--431},
  publisher    = {{ACM}},
  year         = {2009}
}
@inproceedings{DBLP:conf/pkc/BonehFKW09,
  author       = {Dan Boneh and
                  David Mandell Freeman and
                  Jonathan Katz and
                  Brent Waters},
  title        = {Signing a Linear Subspace: Signature Schemes for Network Coding},
  booktitle    = {Public Key Cryptography},
  series       = {Lecture Notes in Computer Science},
  volume       = {5443},
  pages        = {68--87},
  publisher    = {Springer},
  year         = {2009}
}
@proceedings{DBLP:conf/dagstuhl/2009P9141,
  editor       = {Dan Boneh and
                  {\'{U}}lfar Erlingsson and
                  Martin Johns and
                  Benjamin Livshits},
  title        = {Web Application Security, 29.03. - 03.04.2009},
  series       = {Dagstuhl Seminar Proceedings},
  volume       = {09141},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, Germany},
  year         = {2009}
}
@proceedings{DBLP:conf/woot/2009,
  editor       = {Dan Boneh and
                  Alexander Sotirov},
  title        = {3rd {USENIX} Workshop on Offensive Technologies, {WOOT} 2009, Montreal,
                  Canada, August 10, 2009},
  publisher    = {{USENIX} Association},
  year         = {2009}
}
@inproceedings{DBLP:conf/dagstuhl/BonehEJL09,
  author       = {Dan Boneh and
                  {\'{U}}lfar Erlingsson and
                  Martin Johns and
                  Benjamin Livshits},
  title        = {09141 Abstracts Collection - Web Application Security},
  booktitle    = {Web Application Security},
  series       = {Dagstuhl Seminar Proceedings},
  volume       = {09141},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, Germany},
  year         = {2009}
}
@inproceedings{DBLP:conf/dagstuhl/BonehEJL09a,
  author       = {Dan Boneh and
                  {\'{U}}lfar Erlingsson and
                  Martin Johns and
                  Benjamin Livshits},
  title        = {09141 Executive Summary - Web Application Security},
  booktitle    = {Web Application Security},
  series       = {Dagstuhl Seminar Proceedings},
  volume       = {09141},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, Germany},
  year         = {2009}
}
@article{DBLP:journals/iacr/BonehRS09,
  author       = {Dan Boneh and
                  Karl Rubin and
                  Alice Silverberg},
  title        = {Finding composite order ordinary elliptic curves using the Cocks-Pinch
                  method},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {533},
  year         = {2009}
}
@article{DBLP:journals/joc/BonehB08,
  author       = {Dan Boneh and
                  Xavier Boyen},
  title        = {Short Signatures Without Random Oracles and the {SDH} Assumption in
                  Bilinear Groups},
  journal      = {J. Cryptol.},
  volume       = {21},
  number       = {2},
  pages        = {149--177},
  year         = {2008}
}
@inproceedings{DBLP:conf/asiacrypt/BonehH08,
  author       = {Dan Boneh and
                  Michael Hamburg},
  title        = {Generalized Identity Based and Broadcast Encryption Schemes},
  booktitle    = {{ASIACRYPT}},
  series       = {Lecture Notes in Computer Science},
  volume       = {5350},
  pages        = {455--470},
  publisher    = {Springer},
  year         = {2008}
}
@inproceedings{DBLP:conf/asplos/ChenGLSWBDP08,
  author       = {Xiaoxin Chen and
                  Tal Garfinkel and
                  E. Christopher Lewis and
                  Pratap Subrahmanyam and
                  Carl A. Waldspurger and
                  Dan Boneh and
                  Jeffrey S. Dwoskin and
                  Dan R. K. Ports},
  title        = {Overshadow: a virtualization-based approach to retrofitting protection
                  in commodity operating systems},
  booktitle    = {{ASPLOS}},
  pages        = {2--13},
  publisher    = {{ACM}},
  year         = {2008}
}
@inproceedings{DBLP:conf/ccs/BonehN08,
  author       = {Dan Boneh and
                  Moni Naor},
  title        = {Traitor tracing with constant size ciphertext},
  booktitle    = {{CCS}},
  pages        = {501--510},
  publisher    = {{ACM}},
  year         = {2008}
}
@inproceedings{DBLP:conf/crypto/BonehHHO08,
  author       = {Dan Boneh and
                  Shai Halevi and
                  Michael Hamburg and
                  Rafail Ostrovsky},
  title        = {Circular-Secure Encryption from Decision Diffie-Hellman},
  booktitle    = {{CRYPTO}},
  series       = {Lecture Notes in Computer Science},
  volume       = {5157},
  pages        = {108--125},
  publisher    = {Springer},
  year         = {2008}
}
@inproceedings{DBLP:conf/focs/BonehPRVW08,
  author       = {Dan Boneh and
                  Periklis A. Papakonstantinou and
                  Charles Rackoff and
                  Yevgeniy Vahlis and
                  Brent Waters},
  title        = {On the Impossibility of Basing Identity Based Encryption on Trapdoor
                  Permutations},
  booktitle    = {{FOCS}},
  pages        = {283--292},
  publisher    = {{IEEE} Computer Society},
  year         = {2008}
}
@proceedings{DBLP:conf/dagstuhl/2007P7381,
  editor       = {Johannes Bl{\"{o}}mer and
                  Dan Boneh and
                  Ronald Cramer and
                  Ueli M. Maurer},
  title        = {Cryptography, 16.09. - 21.09.2007},
  series       = {Dagstuhl Seminar Proceedings},
  volume       = {07381},
  publisher    = {Internationales Begegnungs- und Forschungszentrum fuer Informatik
                  (IBFI), Schloss Dagstuhl, Germany},
  year         = {2008}
}
@proceedings{DBLP:conf/uss/2008woot,
  editor       = {Dan Boneh and
                  Tal Garfinkel and
                  Dug Song},
  title        = {2nd {USENIX} Workshop on Offensive Technologies, WOOT'08, San Jose,
                  CA, USA, July 28, 2008, Proceedings},
  publisher    = {{USENIX} Association},
  year         = {2008}
}
@article{DBLP:journals/iacr/BonehFKW08,
  author       = {Dan Boneh and
                  David Mandell Freeman and
                  Jonathan Katz and
                  Brent Waters},
  title        = {Signing a Linear Subspace: Signature Schemes for Network Coding},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {316},
  year         = {2008}
}
@article{DBLP:journals/siamcomp/BonehCHK07,
  author       = {Dan Boneh and
                  Ran Canetti and
                  Shai Halevi and
                  Jonathan Katz},
  title        = {Chosen-Ciphertext Security from Identity-Based Encryption},
  journal      = {{SIAM} J. Comput.},
  volume       = {36},
  number       = {5},
  pages        = {1301--1328},
  year         = {2007}
}
@inproceedings{DBLP:conf/ccs/BaileyBGJ07,
  author       = {Daniel V. Bailey and
                  Dan Boneh and
                  Eu{-}Jin Goh and
                  Ari Juels},
  title        = {Covert channels in privacy-preserving identification systems},
  booktitle    = {{CCS}},
  pages        = {297--306},
  publisher    = {{ACM}},
  year         = {2007}
}
@inproceedings{DBLP:conf/ccs/JacksonBBSB07,
  author       = {Collin Jackson and
                  Adam Barth and
                  Andrew Bortz and
                  Weidong Shao and
                  Dan Boneh},
  title        = {Protecting browsers from dns rebinding attacks},
  booktitle    = {{CCS}},
  pages        = {421--431},
  publisher    = {{ACM}},
  year         = {2007}
}
@inproceedings{DBLP:conf/crypto/BonehKOS07,
  author       = {Dan Boneh and
                  Eyal Kushilevitz and
                  Rafail Ostrovsky and
                  William E. Skeith III},
  title        = {Public Key Encryption That Allows {PIR} Queries},
  booktitle    = {{CRYPTO}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4622},
  pages        = {50--67},
  publisher    = {Springer},
  year         = {2007}
}
@inproceedings{DBLP:conf/focs/Boneh07,
  author       = {Dan Boneh},
  title        = {A Brief Look at Pairings Based Cryptography},
  booktitle    = {{FOCS}},
  pages        = {19--26},
  publisher    = {{IEEE} Computer Society},
  year         = {2007}
}
@inproceedings{DBLP:conf/focs/BonehGH07,
  author       = {Dan Boneh and
                  Craig Gentry and
                  Michael Hamburg},
  title        = {Space-Efficient Identity Based Encryption Without Pairings},
  booktitle    = {{FOCS}},
  pages        = {647--657},
  publisher    = {{IEEE} Computer Society},
  year         = {2007}
}
@inproceedings{DBLP:conf/ndss/BethencourtBW07,
  author       = {John Bethencourt and
                  Dan Boneh and
                  Brent Waters},
  title        = {Cryptographic Methods for Storing Ballots on a Voting Machine},
  booktitle    = {{NDSS}},
  publisher    = {The Internet Society},
  year         = {2007}
}
@inproceedings{DBLP:conf/pairing/Boneh07,
  author       = {Dan Boneh},
  title        = {Bilinear Groups of Composite Order},
  booktitle    = {Pairing},
  series       = {Lecture Notes in Computer Science},
  volume       = {4575},
  pages        = {1},
  publisher    = {Springer},
  year         = {2007}
}
@inproceedings{DBLP:conf/soups/KumarGBW07,
  author       = {Manu Kumar and
                  Tal Garfinkel and
                  Dan Boneh and
                  Terry Winograd},
  title        = {Reducing shoulder-surfing by using gaze-based password entry},
  booktitle    = {{SOUPS}},
  series       = {{ACM} International Conference Proceeding Series},
  volume       = {229},
  pages        = {13--19},
  publisher    = {{ACM}},
  year         = {2007}
}
@inproceedings{DBLP:conf/tcc/BonehW07,
  author       = {Dan Boneh and
                  Brent Waters},
  title        = {Conjunctive, Subset, and Range Queries on Encrypted Data},
  booktitle    = {{TCC}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4392},
  pages        = {535--554},
  publisher    = {Springer},
  year         = {2007}
}
@inproceedings{DBLP:conf/uss/JacksonBM07,
  author       = {Collin Jackson and
                  Dan Boneh and
                  John C. Mitchell},
  title        = {Transaction Generators: Root Kits for Web},
  booktitle    = {HotSec},
  publisher    = {{USENIX} Association},
  year         = {2007}
}
@inproceedings{DBLP:conf/wpes/Saint-JeanJBF07,
  author       = {Felipe Saint{-}Jean and
                  Aaron Johnson and
                  Dan Boneh and
                  Joan Feigenbaum},
  title        = {Private web search},
  booktitle    = {{WPES}},
  pages        = {84--90},
  publisher    = {{ACM}},
  year         = {2007}
}
@inproceedings{DBLP:conf/www/BortzB07,
  author       = {Andrew Bortz and
                  Dan Boneh},
  title        = {Exposing private information by timing web applications},
  booktitle    = {{WWW}},
  pages        = {621--628},
  publisher    = {{ACM}},
  year         = {2007}
}
@proceedings{DBLP:conf/woot/2007,
  editor       = {Dan Boneh and
                  Tal Garfinkel and
                  Dug Song},
  title        = {First {USENIX} Workshop on Offensive Technologies, {WOOT} '07, Boston,
                  MA, USA, August 6, 2007},
  publisher    = {{USENIX} Association},
  year         = {2007}
}
@inproceedings{DBLP:conf/dagstuhl/BlomerBCM07,
  author       = {Johannes Bl{\"{o}}mer and
                  Dan Boneh and
                  Ronald Cramer and
                  Ueli M. Maurer},
  title        = {07381 Executive Summary - Cryptography},
  booktitle    = {Cryptography},
  series       = {Dagstuhl Seminar Proceedings},
  volume       = {07381},
  publisher    = {Internationales Begegnungs- und Forschungszentrum fuer Informatik
                  (IBFI), Schloss Dagstuhl, Germany},
  year         = {2007}
}
@inproceedings{DBLP:conf/dagstuhl/BlomerBCM07a,
  author       = {Johannes Bl{\"{o}}mer and
                  Dan Boneh and
                  Ronald Cramer and
                  Ueli M. Maurer},
  title        = {07381 Abstracts Collection -- Cryptography},
  booktitle    = {Cryptography},
  series       = {Dagstuhl Seminar Proceedings},
  volume       = {07381},
  publisher    = {Internationales Begegnungs- und Forschungszentrum fuer Informatik
                  (IBFI), Schloss Dagstuhl, Germany},
  year         = {2007}
}
@article{DBLP:journals/iacr/BonehKOS07,
  author       = {Dan Boneh and
                  Eyal Kushilevitz and
                  Rafail Ostrovsky and
                  William E. Skeith III},
  title        = {Public Key Encryption that Allows {PIR} Queries},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {73},
  year         = {2007}
}
@article{DBLP:journals/iacr/BonehGH07,
  author       = {Dan Boneh and
                  Craig Gentry and
                  Michael Hamburg},
  title        = {Space-Efficient Identity Based Encryption Without Pairings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {177},
  year         = {2007}
}
@inproceedings{DBLP:conf/ccs/BonehW06,
  author       = {Dan Boneh and
                  Brent Waters},
  title        = {A fully collusion resistant broadcast, trace, and revoke system},
  booktitle    = {{CCS}},
  pages        = {211--220},
  publisher    = {{ACM}},
  year         = {2006}
}
@inproceedings{DBLP:conf/ccs/KrugerJGB06,
  author       = {Louis Kruger and
                  Somesh Jha and
                  Eu{-}Jin Goh and
                  Dan Boneh},
  title        = {Secure function evaluation with ordered binary decision diagrams},
  booktitle    = {{CCS}},
  pages        = {410--420},
  publisher    = {{ACM}},
  year         = {2006}
}
@inproceedings{DBLP:conf/crypto/BonehB06,
  author       = {Dan Boneh and
                  Xavier Boyen},
  title        = {On the Impossibility of Efficiently Combining Collision Resistant
                  Hash Functions},
  booktitle    = {{CRYPTO}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4117},
  pages        = {570--583},
  publisher    = {Springer},
  year         = {2006}
}
@inproceedings{DBLP:conf/ctrsa/BonehBH06,
  author       = {Dan Boneh and
                  Xavier Boyen and
                  Shai Halevi},
  title        = {Chosen Ciphertext Secure Public Key Threshold Encryption Without Random
                  Oracles},
  booktitle    = {{CT-RSA}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3860},
  pages        = {226--243},
  publisher    = {Springer},
  year         = {2006}
}
@inproceedings{DBLP:conf/eurocrypt/BonehSW06,
  author       = {Dan Boneh and
                  Amit Sahai and
                  Brent Waters},
  title        = {Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and
                  Private Keys},
  booktitle    = {{EUROCRYPT}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4004},
  pages        = {573--592},
  publisher    = {Springer},
  year         = {2006}
}
@inproceedings{DBLP:conf/fc/BarthBW06,
  author       = {Adam Barth and
                  Dan Boneh and
                  Brent Waters},
  title        = {Privacy in Encrypted Content Distribution Using Private Broadcast
                  Encryption},
  booktitle    = {Financial Cryptography},
  series       = {Lecture Notes in Computer Science},
  volume       = {4107},
  pages        = {52--64},
  publisher    = {Springer},
  year         = {2006}
}
@inproceedings{DBLP:conf/pkc/BonehSW06,
  author       = {Dan Boneh and
                  Emily Shen and
                  Brent Waters},
  title        = {Strongly Unforgeable Signatures Based on Computational Diffie-Hellman},
  booktitle    = {Public Key Cryptography},
  series       = {Lecture Notes in Computer Science},
  volume       = {3958},
  pages        = {229--240},
  publisher    = {Springer},
  year         = {2006}
}
@inproceedings{DBLP:conf/uss/CasadoGAFBM06,
  author       = {Mart{\'{\i}}n Casado and
                  Tal Garfinkel and
                  Aditya Akella and
                  Michael J. Freedman and
                  Dan Boneh and
                  Nick McKeown},
  title        = {{SANE:} {A} Protection Architecture for Enterprise Networks},
  booktitle    = {{USENIX} Security Symposium},
  publisher    = {{USENIX} Association},
  year         = {2006}
}
@inproceedings{DBLP:conf/www/JacksonBBM06a,
  author       = {Collin Jackson and
                  Andrew Bortz and
                  Dan Boneh and
                  John C. Mitchell},
  title        = {Protecting browser state from web privacy attacks},
  booktitle    = {{WWW}},
  pages        = {737--744},
  publisher    = {{ACM}},
  year         = {2006}
}
@article{DBLP:journals/iacr/BonehSW06,
  author       = {Dan Boneh and
                  Amit Sahai and
                  Brent Waters},
  title        = {Fully Collusion Resistant Traitor Tracing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {45},
  year         = {2006}
}
@article{DBLP:journals/iacr/BonehW06,
  author       = {Dan Boneh and
                  Brent Waters},
  title        = {Conjunctive, Subset, and Range Queries on Encrypted Data},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {287},
  year         = {2006}
}
@article{DBLP:journals/iacr/BonehW06a,
  author       = {Dan Boneh and
                  Brent Waters},
  title        = {A Fully Collusion Resistant Broadcast, Trace, and Revoke System},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {298},
  year         = {2006}
}
@article{DBLP:journals/cn/BrumleyB05,
  author       = {David Brumley and
                  Dan Boneh},
  title        = {Remote timing attacks are practical},
  journal      = {Comput. Networks},
  volume       = {48},
  number       = {5},
  pages        = {701--716},
  year         = {2005}
}
@article{DBLP:journals/dc/LiDB05,
  author       = {Ninghui Li and
                  Wenliang Du and
                  Dan Boneh},
  title        = {Oblivious signature-based envelope},
  journal      = {Distributed Comput.},
  volume       = {17},
  number       = {4},
  pages        = {293--302},
  year         = {2005}
}
@inproceedings{DBLP:conf/crypto/BonehGW05,
  author       = {Dan Boneh and
                  Craig Gentry and
                  Brent Waters},
  title        = {Collusion Resistant Broadcast Encryption with Short Ciphertexts and
                  Private Keys},
  booktitle    = {{CRYPTO}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3621},
  pages        = {258--275},
  publisher    = {Springer},
  year         = {2005}
}
@inproceedings{DBLP:conf/ctrsa/BonehK05,
  author       = {Dan Boneh and
                  Jonathan Katz},
  title        = {Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity-Based
                  Encryption},
  booktitle    = {{CT-RSA}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3376},
  pages        = {87--103},
  publisher    = {Springer},
  year         = {2005}
}
@inproceedings{DBLP:conf/eurocrypt/BonehBG05,
  author       = {Dan Boneh and
                  Xavier Boyen and
                  Eu{-}Jin Goh},
  title        = {Hierarchical Identity Based Encryption with Constant Size Ciphertext},
  booktitle    = {{EUROCRYPT}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3494},
  pages        = {440--456},
  publisher    = {Springer},
  year         = {2005}
}
@inproceedings{DBLP:conf/tcc/BonehGN05,
  author       = {Dan Boneh and
                  Eu{-}Jin Goh and
                  Kobbi Nissim},
  title        = {Evaluating 2-DNF Formulas on Ciphertexts},
  booktitle    = {{TCC}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3378},
  pages        = {325--341},
  publisher    = {Springer},
  year         = {2005}
}
@inproceedings{DBLP:conf/uss/RossJMBM05,
  author       = {Blake Ross and
                  Collin Jackson and
                  Nick Miyake and
                  Dan Boneh and
                  John C. Mitchell},
  title        = {Stronger Password Authentication Using Browser Extensions},
  booktitle    = {{USENIX} Security Symposium},
  publisher    = {{USENIX} Association},
  year         = {2005}
}
@incollection{DBLP:reference/crypt/Boneh05,
  author       = {Dan Boneh},
  title        = {{BLS} Short Digital Signatures},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005}
}
@incollection{DBLP:reference/crypt/Boneh05a,
  author       = {Dan Boneh},
  title        = {Blum-Blum-Shub Pseudorandom Bit Generator},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005}
}
@incollection{DBLP:reference/crypt/Boneh05b,
  author       = {Dan Boneh},
  title        = {Blum-Goldwasser Public Key Encryption System},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005}
}
@incollection{DBLP:reference/crypt/Boneh05c,
  author       = {Dan Boneh},
  title        = {Cramer-Shoup Public Key System},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005}
}
@incollection{DBLP:reference/crypt/Boneh05d,
  author       = {Dan Boneh},
  title        = {Digital Signature Standard},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005}
}
@incollection{DBLP:reference/crypt/Boneh05e,
  author       = {Dan Boneh},
  title        = {Elgamal Digital Signature Scheme},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005}
}
@incollection{DBLP:reference/crypt/Boneh05f,
  author       = {Dan Boneh},
  title        = {Rabin Digital Signature Scheme},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005}
}
@incollection{DBLP:reference/crypt/Boneh05g,
  author       = {Dan Boneh},
  title        = {Schnorr Digital Signature Scheme},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005}
}
@incollection{DBLP:reference/crypt/Boneh05h,
  author       = {Dan Boneh},
  title        = {Secure signatures from the "strong RSA" assumption},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005}
}
@incollection{DBLP:reference/crypt/Boneh05i,
  author       = {Dan Boneh},
  title        = {Strong {RSA} Assumption},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005}
}
@article{DBLP:journals/iacr/BonehBG05,
  author       = {Dan Boneh and
                  Xavier Boyen and
                  Eu{-}Jin Goh},
  title        = {Hierarchical Identity Based Encryption with Constant Size Ciphertext},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {15},
  year         = {2005}
}
@article{DBLP:journals/iacr/BonehGW05,
  author       = {Dan Boneh and
                  Craig Gentry and
                  Brent Waters},
  title        = {Collusion Resistant Broadcast Encryption With Short Ciphertexts and
                  Private Keys},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {18},
  year         = {2005}
}
@article{DBLP:journals/debu/BonehFSW04,
  author       = {Dan Boneh and
                  Joan Feigenbaum and
                  Abraham Silberschatz and
                  Rebecca N. Wright},
  title        = {{PORTIA:} Privacy, Obligations, and Rights in Technologies of Information
                  Assessment},
  journal      = {{IEEE} Data Eng. Bull.},
  volume       = {27},
  number       = {1},
  pages        = {10--18},
  year         = {2004}
}
@article{DBLP:journals/joc/BonehLS04,
  author       = {Dan Boneh and
                  Ben Lynn and
                  Hovav Shacham},
  title        = {Short Signatures from the Weil Pairing},
  journal      = {J. Cryptol.},
  volume       = {17},
  number       = {4},
  pages        = {297--319},
  year         = {2004}
}
@article{DBLP:journals/tissec/ShachamBR04,
  author       = {Hovav Shacham and
                  Dan Boneh and
                  Eric Rescorla},
  title        = {Client-side caching for {TLS}},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {7},
  number       = {4},
  pages        = {553--575},
  year         = {2004}
}
@article{DBLP:journals/toit/BonehDT04,
  author       = {Dan Boneh and
                  Xuhua Ding and
                  Gene Tsudik},
  title        = {Fine-grained control of security capabilities},
  journal      = {{ACM} Trans. Internet Techn.},
  volume       = {4},
  number       = {1},
  pages        = {60--82},
  year         = {2004}
}
@inproceedings{DBLP:conf/ccs/BonehS04,
  author       = {Dan Boneh and
                  Hovav Shacham},
  title        = {Group signatures with verifier-local revocation},
  booktitle    = {{CCS}},
  pages        = {168--177},
  publisher    = {{ACM}},
  year         = {2004}
}
@inproceedings{DBLP:conf/ccs/ShachamPPGMB04,
  author       = {Hovav Shacham and
                  Matthew Page and
                  Ben Pfaff and
                  Eu{-}Jin Goh and
                  Nagendra Modadugu and
                  Dan Boneh},
  title        = {On the effectiveness of address-space randomization},
  booktitle    = {{CCS}},
  pages        = {298--307},
  publisher    = {{ACM}},
  year         = {2004}
}
@inproceedings{DBLP:conf/crypto/BonehBS04,
  author       = {Dan Boneh and
                  Xavier Boyen and
                  Hovav Shacham},
  title        = {Short Group Signatures},
  booktitle    = {{CRYPTO}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3152},
  pages        = {41--55},
  publisher    = {Springer},
  year         = {2004}
}
@inproceedings{DBLP:conf/crypto/BonehB04,
  author       = {Dan Boneh and
                  Xavier Boyen},
  title        = {Secure Identity Based Encryption Without Random Oracles},
  booktitle    = {{CRYPTO}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3152},
  pages        = {443--459},
  publisher    = {Springer},
  year         = {2004}
}
@inproceedings{DBLP:conf/eurocrypt/BonehB04,
  author       = {Dan Boneh and
                  Xavier Boyen},
  title        = {Short Signatures Without Random Oracles},
  booktitle    = {{EUROCRYPT}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3027},
  pages        = {56--73},
  publisher    = {Springer},
  year         = {2004}
}
@inproceedings{DBLP:conf/eurocrypt/BonehB04a,
  author       = {Dan Boneh and
                  Xavier Boyen},
  title        = {Efficient Selective-ID Secure Identity-Based Encryption Without Random
                  Oracles},
  booktitle    = {{EUROCRYPT}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3027},
  pages        = {223--238},
  publisher    = {Springer},
  year         = {2004}
}
@inproceedings{DBLP:conf/eurocrypt/BonehCOP04,
  author       = {Dan Boneh and
                  Giovanni Di Crescenzo and
                  Rafail Ostrovsky and
                  Giuseppe Persiano},
  title        = {Public Key Encryption with Keyword Search},
  booktitle    = {{EUROCRYPT}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3027},
  pages        = {506--522},
  publisher    = {Springer},
  year         = {2004}
}
@article{DBLP:journals/iacr/BonehB04,
  author       = {Dan Boneh and
                  Xavier Boyen},
  title        = {Short Signatures Without Random Oracles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {171},
  year         = {2004}
}
@article{DBLP:journals/iacr/BonehB04a,
  author       = {Dan Boneh and
                  Xavier Boyen},
  title        = {Efficient Selective-ID Secure Identity Based Encryption Without Random
                  Oracles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {172},
  year         = {2004}
}
@article{DBLP:journals/iacr/BonehB04b,
  author       = {Dan Boneh and
                  Xavier Boyen},
  title        = {Secure Identity Based Encryption Without Random Oracles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {173},
  year         = {2004}
}
@article{DBLP:journals/iacr/BonehBS04,
  author       = {Dan Boneh and
                  Xavier Boyen and
                  Hovav Shacham},
  title        = {Short Group Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {174},
  year         = {2004}
}
@article{DBLP:journals/iacr/BonehK04,
  author       = {Dan Boneh and
                  Jonathan Katz},
  title        = {Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity-Based
                  Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {261},
  year         = {2004}
}
@article{DBLP:journals/siamcomp/BonehF03,
  author       = {Dan Boneh and
                  Matthew K. Franklin},
  title        = {Identity-Based Encryption from the Weil Pairing},
  journal      = {{SIAM} J. Comput.},
  volume       = {32},
  number       = {3},
  pages        = {586--615},
  year         = {2003}
}
@inproceedings{DBLP:conf/ctrsa/BonehMS03,
  author       = {Dan Boneh and
                  Ilya Mironov and
                  Victor Shoup},
  title        = {A Secure Signature Scheme from Bilinear Maps},
  booktitle    = {{CT-RSA}},
  series       = {Lecture Notes in Computer Science},
  volume       = {2612},
  pages        = {98--110},
  publisher    = {Springer},
  year         = {2003}
}
@inproceedings{DBLP:conf/eurocrypt/BonehGLS03,
  author       = {Dan Boneh and
                  Craig Gentry and
                  Ben Lynn and
                  Hovav Shacham},
  title        = {Aggregate and Verifiably Encrypted Signatures from Bilinear Maps},
  booktitle    = {{EUROCRYPT}},
  series       = {Lecture Notes in Computer Science},
  volume       = {2656},
  pages        = {416--432},
  publisher    = {Springer},
  year         = {2003}
}
@inproceedings{DBLP:conf/hotos/GarfinkelRB03,
  author       = {Tal Garfinkel and
                  Mendel Rosenblum and
                  Dan Boneh},
  title        = {Flexible {OS} Support and Applications for Trusted Computing},
  booktitle    = {HotOS},
  pages        = {145--150},
  publisher    = {{USENIX}},
  year         = {2003}
}
@inproceedings{DBLP:conf/isw/GohBPG03,
  author       = {Eu{-}Jin Goh and
                  Dan Boneh and
                  Benny Pinkas and
                  Philippe Golle},
  title        = {The Design and Implementation of Protocol-Based Hidden Key Recovery},
  booktitle    = {{ISC}},
  series       = {Lecture Notes in Computer Science},
  volume       = {2851},
  pages        = {165--179},
  publisher    = {Springer},
  year         = {2003}
}
@inproceedings{DBLP:conf/ndss/GohSMB03,
  author       = {Eu{-}Jin Goh and
                  Hovav Shacham and
                  Nagendra Modadugu and
                  Dan Boneh},
  title        = {SiRiUS: Securing Remote Untrusted Storage},
  booktitle    = {{NDSS}},
  publisher    = {The Internet Society},
  year         = {2003}
}
@inproceedings{DBLP:conf/podc/LiDB03,
  author       = {Ninghui Li and
                  Wenliang Du and
                  Dan Boneh},
  title        = {Oblivious signature-based envelope},
  booktitle    = {{PODC}},
  pages        = {182--189},
  publisher    = {{ACM}},
  year         = {2003}
}
@inproceedings{DBLP:conf/sosp/GarfinkelPCRB03,
  author       = {Tal Garfinkel and
                  Ben Pfaff and
                  Jim Chow and
                  Mendel Rosenblum and
                  Dan Boneh},
  title        = {Terra: a virtual machine-based platform for trusted computing},
  booktitle    = {{SOSP}},
  pages        = {193--206},
  publisher    = {{ACM}},
  year         = {2003}
}
@inproceedings{DBLP:conf/uss/BrumleyB03,
  author       = {David Brumley and
                  Dan Boneh},
  title        = {Remote Timing Attacks Are Practical},
  booktitle    = {{USENIX} Security Symposium},
  publisher    = {{USENIX} Association},
  year         = {2003}
}
@proceedings{DBLP:conf/crypto/2003,
  editor       = {Dan Boneh},
  title        = {Advances in Cryptology - {CRYPTO} 2003, 23rd Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 17-21,
                  2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2729},
  publisher    = {Springer},
  year         = {2003}
}
@article{DBLP:journals/iacr/BonehCOP03,
  author       = {Dan Boneh and
                  Giovanni Di Crescenzo and
                  Rafail Ostrovsky and
                  Giuseppe Persiano},
  title        = {Public Key Encryption with keyword Search},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {195},
  year         = {2003}
}
@article{DBLP:journals/jcss/Boneh02,
  author       = {Dan Boneh},
  title        = {Finding Smooth Integers in Short Intervals Using {CRT} Decoding},
  journal      = {J. Comput. Syst. Sci.},
  volume       = {64},
  number       = {4},
  pages        = {768--784},
  year         = {2002}
}
@inproceedings{DBLP:conf/asiacrypt/GolleZBJJ02,
  author       = {Philippe Golle and
                  Sheng Zhong and
                  Dan Boneh and
                  Markus Jakobsson and
                  Ari Juels},
  title        = {Optimistic Mixing for Exit-Polls},
  booktitle    = {{ASIACRYPT}},
  series       = {Lecture Notes in Computer Science},
  volume       = {2501},
  pages        = {451--465},
  publisher    = {Springer},
  year         = {2002}
}
@inproceedings{DBLP:conf/ccs/JacobBF02,
  author       = {Matthias Jacob and
                  Dan Boneh and
                  Edward W. Felten},
  title        = {Attacking an Obfuscated Cipher by Injecting Faults},
  booktitle    = {Digital Rights Management Workshop},
  series       = {Lecture Notes in Computer Science},
  volume       = {2696},
  pages        = {16--31},
  publisher    = {Springer},
  year         = {2002}
}
@inproceedings{DBLP:conf/ccs/BonehG02,
  author       = {Dan Boneh and
                  Philippe Golle},
  title        = {Almost entirely correct mixing with applications to voting},
  booktitle    = {{CCS}},
  pages        = {68--77},
  publisher    = {{ACM}},
  year         = {2002}
}
@inproceedings{DBLP:conf/ndss/ShachamB02,
  author       = {Hovav Shacham and
                  Dan Boneh},
  title        = {Fast-Track Session Establishment for {TLS}},
  booktitle    = {{NDSS}},
  publisher    = {The Internet Society},
  year         = {2002}
}
@proceedings{DBLP:conf/uss/2002,
  editor       = {Dan Boneh},
  title        = {Proceedings of the 11th {USENIX} Security Symposium, San Francisco,
                  CA, USA, August 5-9, 2002},
  publisher    = {{USENIX}},
  year         = {2002}
}
@article{DBLP:journals/iacr/BonehS02,
  author       = {Dan Boneh and
                  Alice Silverberg},
  title        = {Applications of Multilinear Forms to Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {80},
  year         = {2002}
}
@article{DBLP:journals/iacr/BonehGLS02,
  author       = {Dan Boneh and
                  Craig Gentry and
                  Ben Lynn and
                  Hovav Shacham},
  title        = {Aggregate and Verifiably Encrypted Signatures from Bilinear Maps},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {175},
  year         = {2002}
}
@article{DBLP:journals/ec/BaumBG01,
  author       = {Eric B. Baum and
                  Dan Boneh and
                  Charles Garrett},
  title        = {Where Genetic Algorithms Excel},
  journal      = {Evol. Comput.},
  volume       = {9},
  number       = {1},
  pages        = {93--124},
  year         = {2001}
}
@article{DBLP:journals/jacm/BonehF01,
  author       = {Dan Boneh and
                  Matthew K. Franklin},
  title        = {Efficient generation of shared {RSA} keys},
  journal      = {J. {ACM}},
  volume       = {48},
  number       = {4},
  pages        = {702--722},
  year         = {2001}
}
@article{DBLP:journals/joc/BonehDL01,
  author       = {Dan Boneh and
                  Richard A. DeMillo and
                  Richard J. Lipton},
  title        = {On the Importance of Eliminating Errors in Cryptographic Computations},
  journal      = {J. Cryptol.},
  volume       = {14},
  number       = {2},
  pages        = {101--119},
  year         = {2001}
}
@inproceedings{DBLP:conf/asiacrypt/BonehHH01,
  author       = {Dan Boneh and
                  Shai Halevi and
                  Nick Howgrave{-}Graham},
  title        = {The Modular Inversion Hidden Number Problem},
  booktitle    = {{ASIACRYPT}},
  series       = {Lecture Notes in Computer Science},
  volume       = {2248},
  pages        = {36--51},
  publisher    = {Springer},
  year         = {2001}
}
@inproceedings{DBLP:conf/asiacrypt/BonehLS01,
  author       = {Dan Boneh and
                  Ben Lynn and
                  Hovav Shacham},
  title        = {Short Signatures from the Weil Pairing},
  booktitle    = {{ASIACRYPT}},
  series       = {Lecture Notes in Computer Science},
  volume       = {2248},
  pages        = {514--532},
  publisher    = {Springer},
  year         = {2001}
}
@inproceedings{DBLP:conf/crypto/BonehS01,
  author       = {Dan Boneh and
                  Igor E. Shparlinski},
  title        = {On the Unpredictability of Bits of the Elliptic Curve Diffie--Hellman
                  Scheme},
  booktitle    = {{CRYPTO}},
  series       = {Lecture Notes in Computer Science},
  volume       = {2139},
  pages        = {201--212},
  publisher    = {Springer},
  year         = {2001}
}
@inproceedings{DBLP:conf/crypto/BonehF01,
  author       = {Dan Boneh and
                  Matthew K. Franklin},
  title        = {Identity-Based Encryption from the Weil Pairing},
  booktitle    = {{CRYPTO}},
  series       = {Lecture Notes in Computer Science},
  volume       = {2139},
  pages        = {213--229},
  publisher    = {Springer},
  year         = {2001}
}
@inproceedings{DBLP:conf/crypto/Boneh01,
  author       = {Dan Boneh},
  title        = {Simplified {OAEP} for the {RSA} and Rabin Functions},
  booktitle    = {{CRYPTO}},
  series       = {Lecture Notes in Computer Science},
  volume       = {2139},
  pages        = {275--291},
  publisher    = {Springer},
  year         = {2001}
}
@inproceedings{DBLP:conf/ctrsa/ShachamB01,
  author       = {Hovav Shacham and
                  Dan Boneh},
  title        = {Improving {SSL} Handshake Performance via Batching},
  booktitle    = {{CT-RSA}},
  series       = {Lecture Notes in Computer Science},
  volume       = {2020},
  pages        = {28--43},
  publisher    = {Springer},
  year         = {2001}
}
@inproceedings{DBLP:conf/eurocrypt/BonehDF01,
  author       = {Dan Boneh and
                  Glenn Durfee and
                  Matthew K. Franklin},
  title        = {Lower Bounds for Multicast Message Authentication},
  booktitle    = {{EUROCRYPT}},
  series       = {Lecture Notes in Computer Science},
  volume       = {2045},
  pages        = {437--452},
  publisher    = {Springer},
  year         = {2001}
}
@inproceedings{DBLP:conf/uss/BonehDTW01,
  author       = {Dan Boneh and
                  Xuhua Ding and
                  Gene Tsudik and
                  Chi{-}Ming Wong},
  title        = {A Method for Fast Revocation of Public Key Certificates and Security
                  Capabilities},
  booktitle    = {{USENIX} Security Symposium},
  publisher    = {{USENIX}},
  year         = {2001}
}
@article{DBLP:journals/iacr/BonehF01,
  author       = {Dan Boneh and
                  Matthew K. Franklin},
  title        = {Identity Based Encryption From the Weil Pairing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {90},
  year         = {2001}
}
@article{DBLP:journals/tit/BonehD00,
  author       = {Dan Boneh and
                  Glenn Durfee},
  title        = {Cryptanalysis of {RSA} with private key d less than N\({}^{\mbox{0.292}}\)},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {46},
  number       = {4},
  pages        = {1339--1349},
  year         = {2000}
}
@inproceedings{DBLP:conf/asiacrypt/BonehJN00,
  author       = {Dan Boneh and
                  Antoine Joux and
                  Phong Q. Nguyen},
  title        = {Why Textbook ElGamal and {RSA} Encryption Are Insecure},
  booktitle    = {{ASIACRYPT}},
  series       = {Lecture Notes in Computer Science},
  volume       = {1976},
  pages        = {30--43},
  publisher    = {Springer},
  year         = {2000}
}
@inproceedings{DBLP:conf/asplos/LieTMLBMH00,
  author       = {David Lie and
                  Chandramohan A. Thekkath and
                  Mark Mitchell and
                  Patrick Lincoln and
                  Dan Boneh and
                  John C. Mitchell and
                  Mark Horowitz},
  title        = {Architectural Support for Copy and Tamper Resistant Software},
  booktitle    = {{ASPLOS}},
  pages        = {168--177},
  publisher    = {{ACM} Press},
  year         = {2000}
}
@inproceedings{DBLP:conf/crypto/BonehN00,
  author       = {Dan Boneh and
                  Moni Naor},
  title        = {Timed Commitments},
  booktitle    = {{CRYPTO}},
  series       = {Lecture Notes in Computer Science},
  volume       = {1880},
  pages        = {236--254},
  publisher    = {Springer},
  year         = {2000}
}
@inproceedings{DBLP:conf/indocrypt/BonehMK00,
  author       = {Dan Boneh and
                  Nagendra Modadugu and
                  Michael Kim},
  title        = {Generating {RSA} Keys on a Handheld Using an Untrusted Server},
  booktitle    = {{INDOCRYPT}},
  series       = {Lecture Notes in Computer Science},
  volume       = {1977},
  pages        = {271--282},
  publisher    = {Springer},
  year         = {2000}
}
@inproceedings{DBLP:conf/stoc/Boneh00,
  author       = {Dan Boneh},
  title        = {Finding smooth integers in short intervals using {CRT} decoding},
  booktitle    = {{STOC}},
  pages        = {265--272},
  publisher    = {{ACM}},
  year         = {2000}
}
@article{DBLP:journals/ipl/BihamBR99,
  author       = {Eli Biham and
                  Dan Boneh and
                  Omer Reingold},
  title        = {Breaking Generalized Diffie-Hellmann Modulo a Composite is no Easier
                  Than Factoring},
  journal      = {Inf. Process. Lett.},
  volume       = {70},
  number       = {2},
  pages        = {83--87},
  year         = {1999}
}
@inproceedings{DBLP:conf/ccs/BonehF99,
  author       = {Dan Boneh and
                  Matthew K. Franklin},
  title        = {Anonymous Authentication with Subset Queries (extended abstract)},
  booktitle    = {{CCS}},
  pages        = {113--119},
  publisher    = {{ACM}},
  year         = {1999}
}
@inproceedings{DBLP:conf/crypto/BonehDH99,
  author       = {Dan Boneh and
                  Glenn Durfee and
                  Nick Howgrave{-}Graham},
  title        = {Factoring {N} = p\({}^{\mbox{r}}\)q for Large r},
  booktitle    = {{CRYPTO}},
  series       = {Lecture Notes in Computer Science},
  volume       = {1666},
  pages        = {326--337},
  publisher    = {Springer},
  year         = {1999}
}
@inproceedings{DBLP:conf/crypto/BonehF99,
  author       = {Dan Boneh and
                  Matthew K. Franklin},
  title        = {An Efficient Public Key Traitor Tracing Scheme},
  booktitle    = {{CRYPTO}},
  series       = {Lecture Notes in Computer Science},
  volume       = {1666},
  pages        = {338--353},
  publisher    = {Springer},
  year         = {1999}
}
@inproceedings{DBLP:conf/eurocrypt/BonehD99,
  author       = {Dan Boneh and
                  Glenn Durfee},
  title        = {Cryptanalysis of {RSA} with Private Key \emph{d} Less than \emph{N}\({}^{\mbox{0.292}}\)},
  booktitle    = {{EUROCRYPT}},
  series       = {Lecture Notes in Computer Science},
  volume       = {1592},
  pages        = {1--11},
  publisher    = {Springer},
  year         = {1999}
}
@inproceedings{DBLP:conf/fc/DaswaniB99,
  author       = {Neil Daswani and
                  Dan Boneh},
  title        = {Experimenting with Electronic Commerce on the PalmPilot},
  booktitle    = {Financial Cryptography},
  series       = {Lecture Notes in Computer Science},
  volume       = {1648},
  pages        = {1--16},
  publisher    = {Springer},
  year         = {1999}
}
@inproceedings{DBLP:conf/ndss/MalkinWB99,
  author       = {Michael Malkin and
                  Thomas D. Wu and
                  Dan Boneh},
  title        = {Experimenting with Shared Generation of {RSA} Keys},
  booktitle    = {{NDSS}},
  publisher    = {The Internet Society},
  year         = {1999}
}
@inproceedings{DBLP:conf/uss/WuMB99,
  author       = {Thomas D. Wu and
                  Michael Malkin and
                  Dan Boneh},
  title        = {Building Intrusion-Tolerant Applications},
  booktitle    = {{USENIX} Security Symposium},
  publisher    = {{USENIX} Association},
  year         = {1999}
}
@article{DBLP:journals/tit/BonehS98,
  author       = {Dan Boneh and
                  James Shaw},
  title        = {Collusion-Secure Fingerprinting for Digital Data},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {44},
  number       = {5},
  pages        = {1897--1905},
  year         = {1998}
}
@inproceedings{DBLP:conf/ants/Boneh98,
  author       = {Dan Boneh},
  title        = {The Decision Diffie-Hellman Problem},
  booktitle    = {{ANTS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {1423},
  pages        = {48--63},
  publisher    = {Springer},
  year         = {1998}
}
@inproceedings{DBLP:conf/ants/BonehH98,
  author       = {Dan Boneh and
                  Jeremy Horwitz},
  title        = {Generating a Product of Three Primes with an Unknown Factorization},
  booktitle    = {{ANTS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {1423},
  pages        = {237--251},
  publisher    = {Springer},
  year         = {1998}
}
@inproceedings{DBLP:conf/asiacrypt/BonehDF98,
  author       = {Dan Boneh and
                  Glenn Durfee and
                  Yair Frankel},
  title        = {An Attack on {RSA} Given a Small Fraction of the Private Key Bits},
  booktitle    = {{ASIACRYPT}},
  series       = {Lecture Notes in Computer Science},
  volume       = {1514},
  pages        = {25--34},
  publisher    = {Springer},
  year         = {1998}
}
@inproceedings{DBLP:conf/eurocrypt/BonehV98,
  author       = {Dan Boneh and
                  Ramarathnam Venkatesan},
  title        = {Breaking {RSA} May Not Be Equivalent to Factoring},
  booktitle    = {{EUROCRYPT}},
  series       = {Lecture Notes in Computer Science},
  volume       = {1403},
  pages        = {59--71},
  publisher    = {Springer},
  year         = {1998}
}
@inproceedings{DBLP:conf/uwec/DaswaniBGKP98,
  author       = {Neil Daswani and
                  Dan Boneh and
                  Hector Garcia{-}Molina and
                  Steven P. Ketchpel and
                  Andreas Paepcke},
  title        = {{SWAPEROO:} {A} Simple Wallet Architecture for Payments, Exchanges,
                  Refunds, and Other Operations},
  booktitle    = {{USENIX} Workshop on Electronic Commerce},
  publisher    = {{USENIX} Association},
  year         = {1998}
}
@inproceedings{DBLP:conf/acisp/RubinBF97,
  author       = {Aviel D. Rubin and
                  Dan Boneh and
                  Kevin Fu},
  title        = {Revocation of Unread E-mail in an Untrusted Network},
  booktitle    = {{ACISP}},
  series       = {Lecture Notes in Computer Science},
  volume       = {1270},
  pages        = {62--75},
  publisher    = {Springer},
  year         = {1997}
}
@inproceedings{DBLP:conf/crypto/BonehF97,
  author       = {Dan Boneh and
                  Matthew K. Franklin},
  title        = {Efficient Generation of Shared {RSA} Keys (Extended Abstract)},
  booktitle    = {{CRYPTO}},
  series       = {Lecture Notes in Computer Science},
  volume       = {1294},
  pages        = {425--439},
  publisher    = {Springer},
  year         = {1997}
}
@inproceedings{DBLP:conf/eurocrypt/BonehDL97,
  author       = {Dan Boneh and
                  Richard A. DeMillo and
                  Richard J. Lipton},
  title        = {On the Importance of Checking Cryptographic Protocols for Faults (Extended
                  Abstract)},
  booktitle    = {{EUROCRYPT}},
  series       = {Lecture Notes in Computer Science},
  volume       = {1233},
  pages        = {37--51},
  publisher    = {Springer},
  year         = {1997}
}
@inproceedings{DBLP:conf/istcs/BonehL97,
  author       = {Dan Boneh and
                  Richard J. Lipton},
  title        = {Effect of Operators on Straight Line Complexity},
  booktitle    = {{ISTCS}},
  pages        = {1--5},
  publisher    = {{IEEE} Computer Society},
  year         = {1997}
}
@inproceedings{DBLP:conf/soda/BonehV97,
  author       = {Dan Boneh and
                  Ramarathnam Venkatesan},
  title        = {Rounding in Lattices and its Cryptographic Applications},
  booktitle    = {{SODA}},
  pages        = {675--681},
  publisher    = {{ACM/SIAM}},
  year         = {1997}
}
@article{DBLP:journals/eccc/ECCC-TR97-061,
  author       = {Eli Biham and
                  Dan Boneh and
                  Omer Reingold},
  title        = {Generalized Diffie-Hellman Modulo a Composite is not Weaker than Factoring},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR97-061}},
  year         = {1997}
}
@article{DBLP:journals/iacr/BihamBR97,
  author       = {Eli Biham and
                  Dan Boneh and
                  Omer Reingold},
  title        = {Generalized Diffie-Hellman Modulo a Composite is not Weaker than Factoring},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {14},
  year         = {1997}
}
@article{DBLP:journals/dam/BonehDLS96,
  author       = {Dan Boneh and
                  Christopher Dunworth and
                  Richard J. Lipton and
                  Jir{\'{\i}} Sgall},
  title        = {On the Computational Power of {DNA}},
  journal      = {Discret. Appl. Math.},
  volume       = {71},
  number       = {1-3},
  pages        = {79--94},
  year         = {1996}
}
@inproceedings{DBLP:conf/crypto/BonehV96,
  author       = {Dan Boneh and
                  Ramarathnam Venkatesan},
  title        = {Hardness of Computing the Most Significant Bits of Secret Keys in
                  Diffie-Hellman and Related Schemes},
  booktitle    = {{CRYPTO}},
  series       = {Lecture Notes in Computer Science},
  volume       = {1109},
  pages        = {129--142},
  publisher    = {Springer},
  year         = {1996}
}
@inproceedings{DBLP:conf/crypto/BonehL96,
  author       = {Dan Boneh and
                  Richard J. Lipton},
  title        = {Algorithms for Black-Box Fields and their Application to Cryptography
                  (Extended Abstract)},
  booktitle    = {{CRYPTO}},
  series       = {Lecture Notes in Computer Science},
  volume       = {1109},
  pages        = {283--297},
  publisher    = {Springer},
  year         = {1996}
}
@inproceedings{DBLP:conf/dimacs/BaumB96,
  author       = {Eric B. Baum and
                  Dan Boneh},
  title        = {Running dynamic programming algorithms on a {DNA} computer},
  booktitle    = {{DNA} Based Computers},
  series       = {{DIMACS} Series in Discrete Mathematics and Theoretical Computer Science},
  volume       = {44},
  pages        = {77--85},
  publisher    = {{DIMACS/AMS}},
  year         = {1996}
}
@inproceedings{DBLP:conf/dimacs/BonehDLS96,
  author       = {Dan Boneh and
                  Christopher Dunworth and
                  Richard J. Lipton and
                  Jir{\'{\i}} Sgall},
  title        = {Making {DNA} computers error resistant},
  booktitle    = {{DNA} Based Computers},
  series       = {{DIMACS} Series in Discrete Mathematics and Theoretical Computer Science},
  volume       = {44},
  pages        = {163--170},
  publisher    = {{DIMACS/AMS}},
  year         = {1996}
}
@inproceedings{DBLP:conf/uss/BonehL96,
  author       = {Dan Boneh and
                  Richard J. Lipton},
  title        = {A Revocable Backup System},
  booktitle    = {{USENIX} Security Symposium},
  publisher    = {{USENIX} Association},
  year         = {1996}
}
@inproceedings{DBLP:conf/colt/BaumBG95,
  author       = {Eric B. Baum and
                  Dan Boneh and
                  Charles Garrett},
  title        = {On Genetic Algorithms},
  booktitle    = {{COLT}},
  pages        = {230--239},
  publisher    = {{ACM}},
  year         = {1995}
}
@inproceedings{DBLP:conf/colt/Boneh95,
  author       = {Dan Boneh},
  title        = {Learning Using Group Representations (Extended Abstract)},
  booktitle    = {{COLT}},
  pages        = {418--426},
  publisher    = {{ACM}},
  year         = {1995}
}
@inproceedings{DBLP:conf/crypto/BonehL95,
  author       = {Dan Boneh and
                  Richard J. Lipton},
  title        = {Quantum Cryptanalysis of Hidden Linear Functions (Extended Abstract)},
  booktitle    = {{CRYPTO}},
  series       = {Lecture Notes in Computer Science},
  volume       = {963},
  pages        = {424--437},
  publisher    = {Springer},
  year         = {1995}
}
@inproceedings{DBLP:conf/crypto/BonehS95,
  author       = {Dan Boneh and
                  James Shaw},
  title        = {Collusion-Secure Fingerprinting for Digital Data (Extended Abstract)},
  booktitle    = {{CRYPTO}},
  series       = {Lecture Notes in Computer Science},
  volume       = {963},
  pages        = {452--465},
  publisher    = {Springer},
  year         = {1995}
}
@inproceedings{DBLP:conf/dimacs/BonehDL95,
  author       = {Dan Boneh and
                  Christopher Dunworth and
                  Richard J. Lipton},
  title        = {Breaking {DES} using a molecular computer},
  booktitle    = {{DNA} Based Computers},
  series       = {{DIMACS} Series in Discrete Mathematics and Theoretical Computer Science},
  volume       = {27},
  pages        = {37--65},
  publisher    = {{DIMACS/AMS}},
  year         = {1995}
}
@inproceedings{DBLP:conf/colt/BonehL93,
  author       = {Dan Boneh and
                  Richard J. Lipton},
  title        = {Amplification of Weak Learning under the Uniform Distribution},
  booktitle    = {{COLT}},
  pages        = {347--351},
  publisher    = {{ACM}},
  year         = {1993}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics