Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Dan Boneh
@inproceedings{DBLP:conf/acns/NikolaenkoRBB24, author = {Valeria Nikolaenko and Sam Ragsdale and Joseph Bonneau and Dan Boneh}, title = {Powers-of-Tau to the People: Decentralizing Setup Ceremonies}, booktitle = {{ACNS} {(3)}}, series = {Lecture Notes in Computer Science}, volume = {14585}, pages = {105--134}, publisher = {Springer}, year = {2024} }
@article{DBLP:journals/corr/abs-2402-12572, author = {Chhavi Yadav and Amrita Roy Chowdhury and Dan Boneh and Kamalika Chaudhuri}, title = {FairProof : Confidential and Certifiable Fairness for Neural Networks}, journal = {CoRR}, volume = {abs/2402.12572}, year = {2024} }
@article{DBLP:journals/corr/abs-2403-09603, author = {Megha Srivastava and Simran Arora and Dan Boneh}, title = {Optimistic Verifiable Training by Controlling Hardware Nondeterminism}, journal = {CoRR}, volume = {abs/2403.09603}, year = {2024} }
@article{DBLP:journals/iacr/BonehC24, author = {Dan Boneh and Binyi Chen}, title = {LatticeFold: {A} Lattice-based Folding Scheme and its Applications to Succinct Proof Systems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {257}, year = {2024} }
@article{DBLP:journals/iacr/LauferOB24, author = {Evan Laufer and Alex Ozdemir and Dan Boneh}, title = {zkPi: Proving Lean Theorems in Zero-Knowledge}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {267}, year = {2024} }
@article{DBLP:journals/iacr/BonehHL24, author = {Dan Boneh and Iftach Haitner and Yehuda Lindell}, title = {Exponent-VRFs and Their Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {397}, year = {2024} }
@article{DBLP:journals/iacr/BonehPR24, author = {Dan Boneh and Aditi Partap and Lior Rotem}, title = {Traceable Secret Sharing: Strong Security and Efficient Constructions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {405}, year = {2024} }
@article{DBLP:journals/iacr/NguyenDCTB24, author = {Wilson D. Nguyen and Trisha Datta and Binyi Chen and Nirvan Tyagi and Dan Boneh}, title = {Mangrove: {A} Scalable Framework for Folding-based SNARKs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {416}, year = {2024} }
@inproceedings{DBLP:conf/aft/NguyenBS23, author = {Wilson D. Nguyen and Dan Boneh and Srinath T. V. Setty}, title = {Revisiting the Nova Proof System on a Cycle of Curves}, booktitle = {{AFT}}, series = {LIPIcs}, volume = {282}, pages = {18:1--18:22}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2023} }
@inproceedings{DBLP:conf/aft/BonehPR23, author = {Dan Boneh and Aditi Partap and Lior Rotem}, title = {Post-Quantum Single Secret Leader Election {(SSLE)} from Publicly Re-Randomizable Commitments}, booktitle = {{AFT}}, series = {LIPIcs}, volume = {282}, pages = {26:1--26:23}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2023} }
@inproceedings{DBLP:conf/aft/TasB23, author = {Ertem Nusret Tas and Dan Boneh}, title = {Vector Commitments with Efficient Updates}, booktitle = {{AFT}}, series = {LIPIcs}, volume = {282}, pages = {29:1--29:23}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2023} }
@inproceedings{DBLP:conf/ccs/PerryS0B23, author = {Neil Perry and Megha Srivastava and Deepak Kumar and Dan Boneh}, title = {Do Users Write More Insecure Code with {AI} Assistants?}, booktitle = {{CCS}}, pages = {2785--2799}, publisher = {{ACM}}, year = {2023} }
@inproceedings{DBLP:conf/crypto/BonehBCGI23, author = {Dan Boneh and Elette Boyle and Henry Corrigan{-}Gibbs and Niv Gilboa and Yuval Ishai}, title = {Arithmetic Sketching}, booktitle = {{CRYPTO} {(1)}}, series = {Lecture Notes in Computer Science}, volume = {14081}, pages = {171--202}, publisher = {Springer}, year = {2023} }
@inproceedings{DBLP:conf/defi/WangWCB23, author = {Kaili Wang and Qinchen Wang and Calvin Cai and Dan Boneh}, title = {R-Pool and Settlement Markets for Recoverable {ERC-20R} Tokens}, booktitle = {DeFi@CCS}, pages = {49--54}, publisher = {{ACM}}, year = {2023} }
@inproceedings{DBLP:conf/eurocrypt/ChenBBZ23, author = {Binyi Chen and Benedikt B{\"{u}}nz and Dan Boneh and Zhenfei Zhang}, title = {HyperPlonk: Plonk with Linear-Time Prover and High-Degree Custom Gates}, booktitle = {{EUROCRYPT} {(2)}}, series = {Lecture Notes in Computer Science}, volume = {14005}, pages = {499--530}, publisher = {Springer}, year = {2023} }
@inproceedings{DBLP:conf/eurocrypt/BonehGZ23, author = {Dan Boneh and Jiaxin Guan and Mark Zhandry}, title = {A Lower Bound on the Length of Signatures Based on Group Actions and Generic Isogenies}, booktitle = {{EUROCRYPT} {(5)}}, series = {Lecture Notes in Computer Science}, volume = {14008}, pages = {507--531}, publisher = {Springer}, year = {2023} }
@inproceedings{DBLP:conf/fc/TasB23, author = {Ertem Nusret Tas and Dan Boneh}, title = {Cryptoeconomic Security for Data Availability Committees}, booktitle = {{FC}}, series = {Lecture Notes in Computer Science}, volume = {13951}, pages = {310--326}, publisher = {Springer}, year = {2023} }
@article{DBLP:journals/corr/abs-2307-04085, author = {Ertem Nusret Tas and Dan Boneh}, title = {Vector Commitments with Efficient Updates}, journal = {CoRR}, volume = {abs/2307.04085}, year = {2023} }
@article{DBLP:journals/corr/abs-2310-19201, author = {Joshua Z. Tan and Tara Merk and Sarah Hubbard and Eliza R. Oak and Joni Pirovich and Ellie Rennie and Rolf Hoefer and Michael Zargham and Jason Potts and Chris Berg and Reuben Youngblom and Primavera De Filippi and Seth Frey and Jeff Strnad and Morshed Mannan and Kelsie Nabben and Silke Noa Elrifai and Jake Hartnell and Benjamin Mako Hill and Alexia Maddox and Woojin Lim and Tobin South and Ari Juels and Dan Boneh}, title = {Open Problems in DAOs}, journal = {CoRR}, volume = {abs/2310.19201}, year = {2023} }
@article{DBLP:journals/corr/abs-2312-14375, author = {Kaili Wang and Qinchen Wang and Calvin Cai and Dan Boneh}, title = {R-Pool and Settlement Markets for Recoverable {ERC-20R} Tokens}, journal = {CoRR}, volume = {abs/2312.14375}, year = {2023} }
@article{DBLP:journals/iacr/BonehGZ23, author = {Dan Boneh and Jiaxin Guan and Mark Zhandry}, title = {A Lower Bound on the Length of Signatures Based on Group Actions and Generic Isogenies}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {250}, year = {2023} }
@article{DBLP:journals/iacr/NguyenBS23, author = {Wilson D. Nguyen and Dan Boneh and Srinath T. V. Setty}, title = {Revisiting the Nova Proof System on a Cycle of Curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {969}, year = {2023} }
@article{DBLP:journals/iacr/BonehBCGI23, author = {Dan Boneh and Elette Boyle and Henry Corrigan{-}Gibbs and Niv Gilboa and Yuval Ishai}, title = {Arithmetic Sketching}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1012}, year = {2023} }
@article{DBLP:journals/iacr/BonehPR23, author = {Dan Boneh and Aditi Partap and Lior Rotem}, title = {Post-Quantum Single Secret Leader Election {(SSLE)} From Publicly Re-randomizable Commitments}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1241}, year = {2023} }
@article{DBLP:journals/iacr/BonehPR23a, author = {Dan Boneh and Aditi Partap and Lior Rotem}, title = {Traitor Tracing for Threshold Decryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1724}, year = {2023} }
@article{DBLP:journals/iacr/BonehPW23, author = {Dan Boneh and Aditi Partap and Brent Waters}, title = {Accountable Multi-Signatures with Constant Size Public Keys}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1793}, year = {2023} }
@article{DBLP:journals/iacr/TasB23, author = {Ertem Nusret Tas and Dan Boneh}, title = {Vector Commitments with Efficient Updates}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1830}, year = {2023} }
@inproceedings{DBLP:conf/ccs/XieZCZ0JBS22, author = {Tiancheng Xie and Jiaheng Zhang and Zerui Cheng and Fan Zhang and Yupeng Zhang and Yongzheng Jia and Dan Boneh and Dawn Song}, title = {zkBridge: Trustless Cross-chain Bridges Made Practical}, booktitle = {{CCS}}, pages = {3003--3017}, publisher = {{ACM}}, year = {2022} }
@inproceedings{DBLP:conf/crypto/BonehK22, author = {Dan Boneh and Chelsea Komlo}, title = {Threshold Signatures with Private Accountability}, booktitle = {{CRYPTO} {(4)}}, series = {Lecture Notes in Computer Science}, volume = {13510}, pages = {551--581}, publisher = {Springer}, year = {2022} }
@inproceedings{DBLP:conf/ndss/EskandarianB22, author = {Saba Eskandarian and Dan Boneh}, title = {Clarion: Anonymous Communication from Multiparty Shuffling Protocols}, booktitle = {{NDSS}}, publisher = {The Internet Society}, year = {2022} }
@inproceedings{DBLP:conf/uss/OzdemirB22, author = {Alex Ozdemir and Dan Boneh}, title = {Experimenting with Collaborative zk-SNARKs: Zero-Knowledge Proofs for Distributed Secrets}, booktitle = {{USENIX} Security Symposium}, pages = {4291--4308}, publisher = {{USENIX} Association}, year = {2022} }
@article{DBLP:journals/corr/abs-2207-04145, author = {Neil Perry and Bruce Spang and Saba Eskandarian and Dan Boneh}, title = {Strong Anonymity for Mesh Messaging}, journal = {CoRR}, volume = {abs/2207.04145}, year = {2022} }
@article{DBLP:journals/corr/abs-2208-00543, author = {Kaili Wang and Qinchen Wang and Dan Boneh}, title = {{ERC-20R} and {ERC-721R:} Reversible Transactions on Ethereum}, journal = {CoRR}, volume = {abs/2208.00543}, year = {2022} }
@article{DBLP:journals/corr/abs-2208-02999, author = {Ertem Nusret Tas and Dan Boneh}, title = {Cryptoeconomic Security for Data Availability Committees}, journal = {CoRR}, volume = {abs/2208.02999}, year = {2022} }
@article{DBLP:journals/corr/abs-2209-00307, author = {Aditi Partap and Dan Boneh}, title = {Memory Tagging: {A} Memory Efficient Design}, journal = {CoRR}, volume = {abs/2209.00307}, year = {2022} }
@article{DBLP:journals/corr/abs-2210-00264, author = {Tiancheng Xie and Jiaheng Zhang and Zerui Cheng and Fan Zhang and Yupeng Zhang and Yongzheng Jia and Dan Boneh and Dawn Song}, title = {zkBridge: Trustless Cross-chain Bridges Made Practical}, journal = {CoRR}, volume = {abs/2210.00264}, year = {2022} }
@article{DBLP:journals/corr/abs-2211-03622, author = {Neil Perry and Megha Srivastava and Deepak Kumar and Dan Boneh}, title = {Do Users Write More Insecure Code with {AI} Assistants?}, journal = {CoRR}, volume = {abs/2211.03622}, year = {2022} }
@article{DBLP:journals/iacr/ChenBBZ22, author = {Binyi Chen and Benedikt B{\"{u}}nz and Dan Boneh and Zhenfei Zhang}, title = {HyperPlonk: Plonk with Linear-Time Prover and High-Degree Custom Gates}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1355}, year = {2022} }
@article{DBLP:journals/iacr/NikolaenkoRBB22, author = {Valeria Nikolaenko and Sam Ragsdale and Joseph Bonneau and Dan Boneh}, title = {Powers-of-Tau to the People: Decentralizing Setup Ceremonies}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1592}, year = {2022} }
@article{DBLP:journals/iacr/BonehK22, author = {Dan Boneh and Chelsea Komlo}, title = {Threshold Signatures with Private Accountability}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1636}, year = {2022} }
@article{DBLP:journals/iacr/BonehPR22, author = {Dan Boneh and Aditi Partap and Lior Rotem}, title = {Accountable Threshold Signatures with Proactive Refresh}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1656}, year = {2022} }
@inproceedings{DBLP:conf/ccs/PealeEB21, author = {Charlotte Peale and Saba Eskandarian and Dan Boneh}, title = {Secure Complaint-Enabled Source-Tracking for Encrypted Messaging}, booktitle = {{CCS}}, pages = {1484--1506}, publisher = {{ACM}}, year = {2021} }
@inproceedings{DBLP:conf/crypto/BonehDFG21, author = {Dan Boneh and Justin Drake and Ben Fisch and Ariel Gabizon}, title = {Halo Infinite: Proof-Carrying Data from Additive Polynomial Commitments}, booktitle = {{CRYPTO} {(1)}}, series = {Lecture Notes in Computer Science}, volume = {12825}, pages = {649--680}, publisher = {Springer}, year = {2021} }
@inproceedings{DBLP:conf/iclr/TramerB21, author = {Florian Tram{\`{e}}r and Dan Boneh}, title = {Differentially Private Learning Needs Better Features (or Much More Data)}, booktitle = {{ICLR}}, publisher = {OpenReview.net}, year = {2021} }
@inproceedings{DBLP:conf/sp/ThomasABBBCDDKK21, author = {Kurt Thomas and Devdatta Akhawe and Michael D. Bailey and Dan Boneh and Elie Bursztein and Sunny Consolvo and Nicola Dell and Zakir Durumeric and Patrick Gage Kelley and Deepak Kumar and Damon McCoy and Sarah Meiklejohn and Thomas Ristenpart and Gianluca Stringhini}, title = {SoK: Hate, Harassment, and the Changing Landscape of Online Abuse}, booktitle = {{SP}}, pages = {247--267}, publisher = {{IEEE}}, year = {2021} }
@inproceedings{DBLP:conf/sp/BonehBCGI21, author = {Dan Boneh and Elette Boyle and Henry Corrigan{-}Gibbs and Niv Gilboa and Yuval Ishai}, title = {Lightweight Techniques for Private Heavy Hitters}, booktitle = {{SP}}, pages = {762--776}, publisher = {{IEEE}}, year = {2021} }
@inproceedings{DBLP:conf/uss/EskandarianCZB21, author = {Saba Eskandarian and Henry Corrigan{-}Gibbs and Matei Zaharia and Dan Boneh}, title = {Express: Lowering the Cost of Metadata-hiding Communication with Cryptographic Privacy}, booktitle = {{USENIX} Security Symposium}, pages = {1775--1792}, publisher = {{USENIX} Association}, year = {2021} }
@inproceedings{DBLP:conf/wpes/SyversonFEB21, author = {Paul Syverson and Matthew Finkel and Saba Eskandarian and Dan Boneh}, title = {Attacks on Onion Discovery and Remedies via Self-Authenticating Traditional Addresses}, booktitle = {WPES@CCS}, pages = {45--52}, publisher = {{ACM}}, year = {2021} }
@article{DBLP:journals/corr/abs-2110-03168, author = {Paul Syverson and Matthew Finkel and Saba Eskandarian and Dan Boneh}, title = {Attacks on Onion Discovery and Remedies via Self-Authenticating Traditional Addresses}, journal = {CoRR}, volume = {abs/2110.03168}, year = {2021} }
@article{DBLP:journals/iacr/BonehBCGI21, author = {Dan Boneh and Elette Boyle and Henry Corrigan{-}Gibbs and Niv Gilboa and Yuval Ishai}, title = {Lightweight Techniques for Private Heavy Hitters}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {17}, year = {2021} }
@article{DBLP:journals/iacr/BonehNO21, author = {Dan Boneh and Wilson D. Nguyen and Alex Ozdemir}, title = {Efficient Functional Commitments: How to Commit to Private Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1342}, year = {2021} }
@article{DBLP:journals/iacr/EskandarianB21, author = {Saba Eskandarian and Dan Boneh}, title = {Clarion: Anonymous Communication from Multiparty Shuffling Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1514}, year = {2021} }
@article{DBLP:journals/iacr/OzdemirB21, author = {Alex Ozdemir and Dan Boneh}, title = {Experimenting with Collaborative zk-SNARKs: Zero-Knowledge Proofs for Distributed Secrets}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1530}, year = {2021} }
@article{DBLP:journals/jmc/BonehGKLSSTZ20, author = {Dan Boneh and Darren B. Glass and Daniel Krashen and Kristin E. Lauter and Shahed Sharif and Alice Silverberg and Mehdi Tibouchi and Mark Zhandry}, title = {Multiparty Non-Interactive Key Exchange and More From Isogenies on Elliptic Curves}, journal = {J. Math. Cryptol.}, volume = {14}, number = {1}, pages = {5--14}, year = {2020} }
@inproceedings{DBLP:conf/aft/BonehEHG20, author = {Dan Boneh and Saba Eskandarian and Lucjan Hanzlik and Nicola Greco}, title = {Single Secret Leader Election}, booktitle = {{AFT}}, pages = {12--24}, publisher = {{ACM}}, year = {2020} }
@inproceedings{DBLP:conf/asiacrypt/BonehKW20, author = {Dan Boneh and Dmitry Kogan and Katharine Woo}, title = {Oblivious Pseudorandom Functions from Isogenies}, booktitle = {{ASIACRYPT} {(2)}}, series = {Lecture Notes in Computer Science}, volume = {12492}, pages = {520--550}, publisher = {Springer}, year = {2020} }
@inproceedings{DBLP:conf/asiacrypt/BonehEKS20, author = {Dan Boneh and Saba Eskandarian and Sam Kim and Maurice Shih}, title = {Improving Speed and Security in Updatable Encryption Schemes}, booktitle = {{ASIACRYPT} {(3)}}, series = {Lecture Notes in Computer Science}, volume = {12493}, pages = {559--589}, publisher = {Springer}, year = {2020} }
@inproceedings{DBLP:conf/fc/BunzAZB20, author = {Benedikt B{\"{u}}nz and Shashank Agrawal and Mahdi Zamani and Dan Boneh}, title = {Zether: Towards Privacy in a Smart Contract World}, booktitle = {Financial Cryptography}, series = {Lecture Notes in Computer Science}, volume = {12059}, pages = {423--443}, publisher = {Springer}, year = {2020} }
@inproceedings{DBLP:conf/fc/WahbyBJP20, author = {Riad S. Wahby and Dan Boneh and Christopher Jeffrey and Joseph Poon}, title = {An Airdrop that Preserves Recipient Privacy}, booktitle = {Financial Cryptography}, series = {Lecture Notes in Computer Science}, volume = {12059}, pages = {444--463}, publisher = {Springer}, year = {2020} }
@inproceedings{DBLP:conf/uss/OzdemirWWB20, author = {Alex Ozdemir and Riad S. Wahby and Barry Whitehat and Dan Boneh}, title = {Scaling Verifiable Computation Using Efficient Set Accumulators}, booktitle = {{USENIX} Security Symposium}, pages = {2075--2092}, publisher = {{USENIX} Association}, year = {2020} }
@inproceedings{DBLP:conf/uss/TramerBP20, author = {Florian Tram{\`{e}}r and Dan Boneh and Kenny Paterson}, title = {Remote Side-Channel Attacks on Anonymous Transactions}, booktitle = {{USENIX} Security Symposium}, pages = {2739--2756}, publisher = {{USENIX} Association}, year = {2020} }
@article{DBLP:journals/corr/abs-2011-11660, author = {Florian Tram{\`{e}}r and Dan Boneh}, title = {Differentially Private Learning Needs Better Features (or Much More Data)}, journal = {CoRR}, volume = {abs/2011.11660}, year = {2020} }
@article{DBLP:journals/corr/abs-2012-14884, author = {Dan Boneh and Elette Boyle and Henry Corrigan{-}Gibbs and Niv Gilboa and Yuval Ishai}, title = {Lightweight Techniques for Private Heavy Hitters}, journal = {CoRR}, volume = {abs/2012.14884}, year = {2020} }
@article{DBLP:journals/iacr/BonehEHG20, author = {Dan Boneh and Saba Eskandarian and Lucjan Hanzlik and Nicola Greco}, title = {Single Secret Leader Election}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {25}, year = {2020} }
@article{DBLP:journals/iacr/BonehDFG20, author = {Dan Boneh and Justin Drake and Ben Fisch and Ariel Gabizon}, title = {Efficient polynomial commitment schemes for multiple points and polynomials}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {81}, year = {2020} }
@article{DBLP:journals/iacr/TramerBP20, author = {Florian Tram{\`{e}}r and Dan Boneh and Kenneth G. Paterson}, title = {Remote Side-Channel Attacks on Anonymous Transactions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {220}, year = {2020} }
@article{DBLP:journals/iacr/BonehEKS20, author = {Dan Boneh and Saba Eskandarian and Sam Kim and Maurice Shih}, title = {Improving Speed and Security in Updatable Encryption Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {222}, year = {2020} }
@article{DBLP:journals/iacr/WahbyBJP20, author = {Riad S. Wahby and Dan Boneh and Christopher Jeffrey and Joseph Poon}, title = {An airdrop that preserves recipient privacy}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {676}, year = {2020} }
@article{DBLP:journals/iacr/BonehKW20, author = {Dan Boneh and Dmitry Kogan and Katharine Woo}, title = {Oblivious Pseudorandom Functions from Isogenies}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1532}, year = {2020} }
@article{DBLP:journals/iacr/BonehDFG20a, author = {Dan Boneh and Justin Drake and Ben Fisch and Ariel Gabizon}, title = {Halo Infinite: Recursive zk-SNARKs from any Additive Polynomial Commitment Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1536}, year = {2020} }
@article{DBLP:journals/cacm/Boneh19, author = {Dan Boneh}, title = {Technical perspective: Attacking cryptographic key exchange with precomputation}, journal = {Commun. {ACM}}, volume = {62}, number = {1}, pages = {105}, year = {2019} }
@article{DBLP:journals/ieeesp/BonehGMP19, author = {Dan Boneh and Andrew J. Grotto and Patrick D. McDaniel and Nicolas Papernot}, title = {How Relevant Is the Turing Test in the Age of Sophisbots?}, journal = {{IEEE} Secur. Priv.}, volume = {17}, number = {6}, pages = {64--71}, year = {2019} }
@article{DBLP:journals/tches/WahbyB19, author = {Riad S. Wahby and Dan Boneh}, title = {Fast and simple constant-time hashing to the {BLS12-381} elliptic curve}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2019}, number = {4}, pages = {154--179}, year = {2019} }
@inproceedings{DBLP:conf/ccs/TramerDRPB19, author = {Florian Tram{\`{e}}r and Pascal Dupr{\'{e}} and Gili Rusak and Giancarlo Pellegrino and Dan Boneh}, title = {AdVersarial: Perceptual Ad Blocking meets Adversarial Machine Learning}, booktitle = {{CCS}}, pages = {2005--2021}, publisher = {{ACM}}, year = {2019} }
@inproceedings{DBLP:conf/crypto/BonehBCGI19, author = {Dan Boneh and Elette Boyle and Henry Corrigan{-}Gibbs and Niv Gilboa and Yuval Ishai}, title = {Zero-Knowledge Proofs on Secret-Shared Data via Fully Linear PCPs}, booktitle = {{CRYPTO} {(3)}}, series = {Lecture Notes in Computer Science}, volume = {11694}, pages = {67--97}, publisher = {Springer}, year = {2019} }
@inproceedings{DBLP:conf/crypto/BonehBF19, author = {Dan Boneh and Benedikt B{\"{u}}nz and Ben Fisch}, title = {Batching Techniques for Accumulators with Applications to IOPs and Stateless Blockchains}, booktitle = {{CRYPTO} {(1)}}, series = {Lecture Notes in Computer Science}, volume = {11692}, pages = {561--586}, publisher = {Springer}, year = {2019} }
@inproceedings{DBLP:conf/ctrsa/BonehEF19, author = {Dan Boneh and Saba Eskandarian and Ben Fisch}, title = {Post-quantum {EPID} Signatures from Symmetric Primitives}, booktitle = {{CT-RSA}}, series = {Lecture Notes in Computer Science}, volume = {11405}, pages = {251--271}, publisher = {Springer}, year = {2019} }
@inproceedings{DBLP:conf/iclr/TramerB19, author = {Florian Tram{\`{e}}r and Dan Boneh}, title = {Slalom: Fast, Verifiable and Private Execution of Neural Networks in Trusted Hardware}, booktitle = {{ICLR}}, publisher = {OpenReview.net}, year = {2019} }
@inproceedings{DBLP:conf/mass/KininghamLABHS19, author = {Kevin Kiningham and Philip Alexander Levis and Mark Anderson and Dan Boneh and Mark Horowitz and Maurice Shih}, title = {Falcon - {A} Flexible Architecture For Accelerating Cryptography}, booktitle = {{MASS}}, pages = {136--144}, publisher = {{IEEE}}, year = {2019} }
@inproceedings{DBLP:conf/nips/TramerB19, author = {Florian Tram{\`{e}}r and Dan Boneh}, title = {Adversarial Training and Robustness for Multiple Perturbations}, booktitle = {NeurIPS}, pages = {5858--5868}, year = {2019} }
@inproceedings{DBLP:conf/sp/EskandarianCBBF19, author = {Saba Eskandarian and Jonathan Cogan and Sawyer Birnbaum and Peh Chang Wei Brandon and Dillon Franke and Forest Fraser and Gaspar Garcia Jr. and Eric Gong and Hung T. Nguyen and Taresh K. Sethi and Vishal Subbiah and Michael Backes and Giancarlo Pellegrino and Dan Boneh}, title = {Fidelius: Protecting User Secrets from Compromised Browsers}, booktitle = {{IEEE} Symposium on Security and Privacy}, pages = {264--280}, publisher = {{IEEE}}, year = {2019} }
@inproceedings{DBLP:conf/sp/DautermanCMBR19, author = {Emma Dauterman and Henry Corrigan{-}Gibbs and David Mazi{\`{e}}res and Dan Boneh and Dominic Rizzo}, title = {True2F: Backdoor-Resistant Authentication Tokens}, booktitle = {{IEEE} Symposium on Security and Privacy}, pages = {398--416}, publisher = {{IEEE}}, year = {2019} }
@inproceedings{DBLP:conf/uss/ThomasPYRKIBPPB19, author = {Kurt Thomas and Jennifer Pullman and Kevin Yeo and Ananth Raghunathan and Patrick Gage Kelley and Luca Invernizzi and Borbala Benko and Tadek Pietraszek and Sarvar Patel and Dan Boneh and Elie Bursztein}, title = {Protecting accounts from credential stuffing with password breach alerting}, booktitle = {{USENIX} Security Symposium}, pages = {1556--1571}, publisher = {{USENIX} Association}, year = {2019} }
@article{DBLP:journals/corr/abs-1904-13000, author = {Florian Tram{\`{e}}r and Dan Boneh}, title = {Adversarial Training and Robustness for Multiple Perturbations}, journal = {CoRR}, volume = {abs/1904.13000}, year = {2019} }
@article{DBLP:journals/corr/abs-1908-03999, author = {Jason Teutsch and Michael Straka and Dan Boneh}, title = {Retrofitting a two-way peg between blockchains}, journal = {CoRR}, volume = {abs/1908.03999}, year = {2019} }
@article{DBLP:journals/corr/abs-1909-00056, author = {Dan Boneh and Andrew J. Grotto and Patrick D. McDaniel and Nicolas Papernot}, title = {How Relevant is the Turing Test in the Age of Sophisbots?}, journal = {CoRR}, volume = {abs/1909.00056}, year = {2019} }
@article{DBLP:journals/corr/abs-1910-03180, author = {Jonathan Love and Dan Boneh}, title = {Supersingular Curves With Small Non-integer Endomorphisms}, journal = {CoRR}, volume = {abs/1910.03180}, year = {2019} }
@article{DBLP:journals/corr/abs-1911-09215, author = {Saba Eskandarian and Henry Corrigan{-}Gibbs and Matei Zaharia and Dan Boneh}, title = {Express: Lowering the Cost of Metadata-hiding Communication with Cryptographic Privacy}, journal = {CoRR}, volume = {abs/1911.09215}, year = {2019} }
@article{DBLP:journals/iacr/BonehBCGI19, author = {Dan Boneh and Elette Boyle and Henry Corrigan{-}Gibbs and Niv Gilboa and Yuval Ishai}, title = {How to Prove a Secret: Zero-Knowledge Proofs on Distributed Data via Fully Linear PCPs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {188}, year = {2019} }
@article{DBLP:journals/iacr/BunzAZB19, author = {Benedikt B{\"{u}}nz and Shashank Agrawal and Mahdi Zamani and Dan Boneh}, title = {Zether: Towards Privacy in a Smart Contract World}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {191}, year = {2019} }
@article{DBLP:journals/iacr/WahbyB19, author = {Riad S. Wahby and Dan Boneh}, title = {Fast and simple constant-time hashing to the {BLS12-381} elliptic curve}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {403}, year = {2019} }
@article{DBLP:journals/iacr/OzdemirWB19, author = {Alex Ozdemir and Riad S. Wahby and Dan Boneh}, title = {Scaling Verifiable Computation Using Efficient Set Accumulators}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1494}, year = {2019} }
@inproceedings{DBLP:conf/asiacrypt/BonehDN18, author = {Dan Boneh and Manu Drijvers and Gregory Neven}, title = {Compact Multi-signatures for Smaller Blockchains}, booktitle = {{ASIACRYPT} {(2)}}, series = {Lecture Notes in Computer Science}, volume = {11273}, pages = {435--464}, publisher = {Springer}, year = {2018} }
@inproceedings{DBLP:conf/crypto/BonehGGJKRS18, author = {Dan Boneh and Rosario Gennaro and Steven Goldfeder and Aayush Jain and Sam Kim and Peter M. R. Rasmussen and Amit Sahai}, title = {Threshold Cryptosystems from Threshold Fully Homomorphic Encryption}, booktitle = {{CRYPTO} {(1)}}, series = {Lecture Notes in Computer Science}, volume = {10991}, pages = {565--596}, publisher = {Springer}, year = {2018} }
@inproceedings{DBLP:conf/crypto/BonehBBF18, author = {Dan Boneh and Joseph Bonneau and Benedikt B{\"{u}}nz and Ben Fisch}, title = {Verifiable Delay Functions}, booktitle = {{CRYPTO} {(1)}}, series = {Lecture Notes in Computer Science}, volume = {10991}, pages = {757--788}, publisher = {Springer}, year = {2018} }
@inproceedings{DBLP:conf/dev/RajanQABLV18, author = {Anjana Rajan and Lucy Qin and David W. Archer and Dan Boneh and Tancr{\`{e}}de Lepoint and Mayank Varia}, title = {Callisto: {A} Cryptographic Approach to Detecting Serial Perpetrators of Sexual Misconduct}, booktitle = {{COMPASS}}, pages = {49:1--49:4}, publisher = {{ACM}}, year = {2018} }
@inproceedings{DBLP:conf/eurocrypt/BonehISW18, author = {Dan Boneh and Yuval Ishai and Amit Sahai and David J. Wu}, title = {Quasi-Optimal SNARGs via Linear Multi-Prover Interactive Proofs}, booktitle = {{EUROCRYPT} {(3)}}, series = {Lecture Notes in Computer Science}, volume = {10822}, pages = {222--255}, publisher = {Springer}, year = {2018} }
@inproceedings{DBLP:conf/iclr/TramerKPGBM18, author = {Florian Tram{\`{e}}r and Alexey Kurakin and Nicolas Papernot and Ian J. Goodfellow and Dan Boneh and Patrick D. McDaniel}, title = {Ensemble Adversarial Training: Attacks and Defenses}, booktitle = {{ICLR} (Poster)}, publisher = {OpenReview.net}, year = {2018} }
@inproceedings{DBLP:conf/sp/BunzBBPWM18, author = {Benedikt B{\"{u}}nz and Jonathan Bootle and Dan Boneh and Andrew Poelstra and Pieter Wuille and Gregory Maxwell}, title = {Bulletproofs: Short Proofs for Confidential Transactions and More}, booktitle = {{IEEE} Symposium on Security and Privacy}, pages = {315--334}, publisher = {{IEEE} Computer Society}, year = {2018} }
@inproceedings{DBLP:conf/tcc/BonehIPSW18, author = {Dan Boneh and Yuval Ishai and Alain Passel{\`{e}}gue and Amit Sahai and David J. Wu}, title = {Exploring Crypto Dark Matter: - New Simple {PRF} Candidates and Their Applications}, booktitle = {{TCC} {(2)}}, series = {Lecture Notes in Computer Science}, volume = {11240}, pages = {699--729}, publisher = {Springer}, year = {2018} }
@article{DBLP:journals/corr/abs-1806-03287, author = {Florian Tram{\`{e}}r and Dan Boneh}, title = {Slalom: Fast, Verifiable and Private Execution of Neural Networks in Trusted Hardware}, journal = {CoRR}, volume = {abs/1806.03287}, year = {2018} }
@article{DBLP:journals/corr/abs-1807-03038, author = {Dan Boneh and Darren B. Glass and Daniel Krashen and Kristin E. Lauter and Shahed Sharif and Alice Silverberg and Mehdi Tibouchi and Mark Zhandry}, title = {Multiparty Non-Interactive Key Exchange and More From Isogenies on Elliptic Curves}, journal = {CoRR}, volume = {abs/1807.03038}, year = {2018} }
@article{DBLP:journals/corr/abs-1809-04774, author = {Saba Eskandarian and Jonathan Cogan and Sawyer Birnbaum and Peh Chang Wei Brandon and Dillon Franke and Forest Fraser and Gaspar Garcia Jr. and Eric Gong and Hung T. Nguyen and Taresh K. Sethi and Vishal Subbiah and Michael Backes and Giancarlo Pellegrino and Dan Boneh}, title = {Fidelius: Protecting User Secrets from Compromised Browsers}, journal = {CoRR}, volume = {abs/1809.04774}, year = {2018} }
@article{DBLP:journals/corr/abs-1810-04660, author = {Emma Dauterman and Henry Corrigan{-}Gibbs and David Mazi{\`{e}}res and Dan Boneh and Dominic Rizzo}, title = {True2F: Backdoor-resistant authentication tokens}, journal = {CoRR}, volume = {abs/1810.04660}, year = {2018} }
@article{DBLP:journals/corr/abs-1811-03194, author = {Florian Tram{\`{e}}r and Pascal Dupr{\'{e}} and Gili Rusak and Giancarlo Pellegrino and Dan Boneh}, title = {Ad-versarial: Defeating Perceptual Ad-Blocking}, journal = {CoRR}, volume = {abs/1811.03194}, year = {2018} }
@article{DBLP:journals/corr/abs-1812-00292, author = {Edward Chou and Florian Tram{\`{e}}r and Giancarlo Pellegrino and Dan Boneh}, title = {SentiNet: Detecting Physical Attacks Against Deep Learning Systems}, journal = {CoRR}, volume = {abs/1812.00292}, year = {2018} }
@article{DBLP:journals/iacr/BonehISW18, author = {Dan Boneh and Yuval Ishai and Amit Sahai and David J. Wu}, title = {Quasi-Optimal SNARGs via Linear Multi-Prover Interactive Proofs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {133}, year = {2018} }
@article{DBLP:journals/iacr/BonehEF18, author = {Dan Boneh and Saba Eskandarian and Ben Fisch}, title = {Post-Quantum Group Signatures from Symmetric Primitives}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {261}, year = {2018} }
@article{DBLP:journals/iacr/BonehDN18, author = {Dan Boneh and Manu Drijvers and Gregory Neven}, title = {Compact Multi-Signatures for Smaller Blockchains}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {483}, year = {2018} }
@article{DBLP:journals/iacr/BonehBBF18, author = {Dan Boneh and Joseph Bonneau and Benedikt B{\"{u}}nz and Ben Fisch}, title = {Verifiable Delay Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {601}, year = {2018} }
@article{DBLP:journals/iacr/BonehGKLSSTZ18, author = {Dan Boneh and Darren B. Glass and Daniel Krashen and Kristin E. Lauter and Shahed Sharif and Alice Silverberg and Mehdi Tibouchi and Mark Zhandry}, title = {Multiparty Non-Interactive Key Exchange and More From Isogenies on Elliptic Curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {665}, year = {2018} }
@article{DBLP:journals/iacr/BonehBF18, author = {Dan Boneh and Benedikt B{\"{u}}nz and Ben Fisch}, title = {A Survey of Two Verifiable Delay Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {712}, year = {2018} }
@article{DBLP:journals/iacr/BonehBF18a, author = {Dan Boneh and Benedikt B{\"{u}}nz and Ben Fisch}, title = {Batching Techniques for Accumulators with Applications to IOPs and Stateless Blockchains}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1188}, year = {2018} }
@article{DBLP:journals/iacr/BonehIPSW18, author = {Dan Boneh and Yuval Ishai and Alain Passel{\`{e}}gue and Amit Sahai and David J. Wu}, title = {Exploring Crypto Dark Matter: New Simple {PRF} Candidates and Their Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1218}, year = {2018} }
@article{DBLP:journals/algorithmica/BonehZ17, author = {Dan Boneh and Mark Zhandry}, title = {Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation}, journal = {Algorithmica}, volume = {79}, number = {4}, pages = {1233--1285}, year = {2017} }
@article{DBLP:journals/popets/EskandarianMBB17, author = {Saba Eskandarian and Eran Messeri and Joseph Bonneau and Dan Boneh}, title = {Certificate Transparency with Privacy}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2017}, number = {4}, pages = {329--344}, year = {2017} }
@inproceedings{DBLP:conf/acns/BonehKN17, author = {Dan Boneh and Sam Kim and Valeria Nikolaenko}, title = {Lattice-Based {DAPS} and Generalizations: Self-enforcement in Signature Schemes}, booktitle = {{ACNS}}, series = {Lecture Notes in Computer Science}, volume = {10355}, pages = {457--477}, publisher = {Springer}, year = {2017} }
@inproceedings{DBLP:conf/ccs/FischVBG17, author = {Ben Fisch and Dhinakaran Vinayagamurthy and Dan Boneh and Sergey Gorbunov}, title = {{IRON:} Functional Encryption using Intel {SGX}}, booktitle = {{CCS}}, pages = {765--782}, publisher = {{ACM}}, year = {2017} }
@inproceedings{DBLP:conf/ccs/KoganMB17, author = {Dmitry Kogan and Nathan Manohar and Dan Boneh}, title = {T/Key: Second-Factor Authentication From Secure Hash Chains}, booktitle = {{CCS}}, pages = {983--999}, publisher = {{ACM}}, year = {2017} }
@inproceedings{DBLP:conf/ctrsa/BonehG17, author = {Dan Boneh and Shay Gueron}, title = {Surnaming Schemes, Fast Verification, and Applications to {SGX} Technology}, booktitle = {{CT-RSA}}, series = {Lecture Notes in Computer Science}, volume = {10159}, pages = {149--164}, publisher = {Springer}, year = {2017} }
@inproceedings{DBLP:conf/eurocrypt/BonehISW17, author = {Dan Boneh and Yuval Ishai and Amit Sahai and David J. Wu}, title = {Lattice-Based SNARGs and Their Application to More Efficient Obfuscation}, booktitle = {{EUROCRYPT} {(3)}}, series = {Lecture Notes in Computer Science}, volume = {10212}, pages = {247--277}, year = {2017} }
@inproceedings{DBLP:conf/eurocrypt/BonehKM17, author = {Dan Boneh and Sam Kim and Hart William Montgomery}, title = {Private Puncturable PRFs from Standard Lattice Assumptions}, booktitle = {{EUROCRYPT} {(1)}}, series = {Lecture Notes in Computer Science}, volume = {10210}, pages = {415--445}, year = {2017} }
@inproceedings{DBLP:conf/hotos/Corrigan-GibbsW17, author = {Henry Corrigan{-}Gibbs and David J. Wu and Dan Boneh}, title = {Quantum Operating Systems}, booktitle = {HotOS}, pages = {76--81}, publisher = {{ACM}}, year = {2017} }
@inproceedings{DBLP:conf/latincrypt/BonehGG17, author = {Dan Boneh and Rosario Gennaro and Steven Goldfeder}, title = {Using Level-1 Homomorphic Encryption to Improve Threshold {DSA} Signatures for Bitcoin Wallet Security}, booktitle = {{LATINCRYPT}}, series = {Lecture Notes in Computer Science}, volume = {11368}, pages = {352--377}, publisher = {Springer}, year = {2017} }
@inproceedings{DBLP:conf/mobisys/WilsonWCBLW17, author = {Judson Wilson and Riad S. Wahby and Henry Corrigan{-}Gibbs and Dan Boneh and Philip Alexander Levis and Keith Winstein}, title = {Trust but Verify: Auditing the Secure Internet of Things}, booktitle = {MobiSys}, pages = {464--474}, publisher = {{ACM}}, year = {2017} }
@inproceedings{DBLP:conf/nsdi/Corrigan-GibbsB17, author = {Henry Corrigan{-}Gibbs and Dan Boneh}, title = {Prio: Private, Robust, and Scalable Computation of Aggregate Statistics}, booktitle = {{NSDI}}, pages = {259--282}, publisher = {{USENIX} Association}, year = {2017} }
@inproceedings{DBLP:conf/pkc/BonehLW17, author = {Dan Boneh and Kevin Lewi and David J. Wu}, title = {Constraining Pseudorandom Functions Privately}, booktitle = {Public Key Cryptography {(2)}}, series = {Lecture Notes in Computer Science}, volume = {10175}, pages = {494--524}, publisher = {Springer}, year = {2017} }
@inproceedings{DBLP:conf/tcc/BonehKW17, author = {Dan Boneh and Sam Kim and David J. Wu}, title = {Constrained Keys for Invertible Pseudorandom Functions}, booktitle = {{TCC} {(1)}}, series = {Lecture Notes in Computer Science}, volume = {10677}, pages = {237--263}, publisher = {Springer}, year = {2017} }
@article{DBLP:journals/corr/EskandarianMBB17, author = {Saba Eskandarian and Eran Messeri and Joseph Bonneau and Dan Boneh}, title = {Certificate Transparency with Privacy}, journal = {CoRR}, volume = {abs/1703.02209}, year = {2017} }
@article{DBLP:journals/corr/Corrigan-GibbsB17, author = {Henry Corrigan{-}Gibbs and Dan Boneh}, title = {Prio: Private, Robust, and Scalable Computation of Aggregate Statistics}, journal = {CoRR}, volume = {abs/1703.06255}, year = {2017} }
@article{DBLP:journals/corr/TramerPGBM17, author = {Florian Tram{\`{e}}r and Nicolas Papernot and Ian J. Goodfellow and Dan Boneh and Patrick D. McDaniel}, title = {The Space of Transferable Adversarial Examples}, journal = {CoRR}, volume = {abs/1704.03453}, year = {2017} }
@article{DBLP:journals/corr/TramerKPBM17, author = {Florian Tram{\`{e}}r and Alexey Kurakin and Nicolas Papernot and Dan Boneh and Patrick D. McDaniel}, title = {Ensemble Adversarial Training: Attacks and Defenses}, journal = {CoRR}, volume = {abs/1705.07204}, year = {2017} }
@article{DBLP:journals/corr/abs-1708-08424, author = {Dmitry Kogan and Nathan Manohar and Dan Boneh}, title = {T/Key: Second-Factor Authentication From Secure Hash Chains}, journal = {CoRR}, volume = {abs/1708.08424}, year = {2017} }
@article{DBLP:journals/iacr/BonehKM17, author = {Dan Boneh and Sam Kim and Hart William Montgomery}, title = {Private Puncturable PRFs From Standard Lattice Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {100}, year = {2017} }
@article{DBLP:journals/iacr/BonehISW17, author = {Dan Boneh and Yuval Ishai and Amit Sahai and David J. Wu}, title = {Lattice-Based SNARGs and Their Application to More Efficient Obfuscation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {240}, year = {2017} }
@article{DBLP:journals/iacr/BonehGGK17, author = {Dan Boneh and Rosario Gennaro and Steven Goldfeder and Sam Kim}, title = {A Lattice-Based Universal Thresholdizer for Cryptographic Systems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {251}, year = {2017} }
@article{DBLP:journals/iacr/BonehKW17, author = {Dan Boneh and Sam Kim and David J. Wu}, title = {Constrained Keys for Invertible Pseudorandom Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {477}, year = {2017} }
@article{DBLP:journals/iacr/BonehGGJKRS17, author = {Dan Boneh and Rosario Gennaro and Steven Goldfeder and Aayush Jain and Sam Kim and Peter M. R. Rasmussen and Amit Sahai}, title = {Threshold Cryptosystems From Threshold Fully Homomorphic Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {956}, year = {2017} }
@article{DBLP:journals/iacr/BunzBBPWM17, author = {Benedikt B{\"{u}}nz and Jonathan Bootle and Dan Boneh and Andrew Poelstra and Pieter Wuille and Gregory Maxwell}, title = {Bulletproofs: Short Proofs for Confidential Transactions and More}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1066}, year = {2017} }
@article{DBLP:journals/ieeesp/LevyCB16, author = {Amit Levy and Henry Corrigan{-}Gibbs and Dan Boneh}, title = {Stickler: Defending against Malicious Content Distribution Networks in an Unmodified Browser}, journal = {{IEEE} Secur. Priv.}, volume = {14}, number = {2}, pages = {22--28}, year = {2016} }
@article{DBLP:journals/ieeesp/BonehPS16, author = {Dan Boneh and Kenny Paterson and Nigel P. Smart}, title = {Building a Community of Real-World Cryptographers}, journal = {{IEEE} Secur. Priv.}, volume = {14}, number = {6}, pages = {7--9}, year = {2016} }
@inproceedings{DBLP:conf/asiacrypt/BonehCS16, author = {Dan Boneh and Henry Corrigan{-}Gibbs and Stuart E. Schechter}, title = {Balloon Hashing: {A} Memory-Hard Function Providing Provable Protection Against Sequential Attacks}, booktitle = {{ASIACRYPT} {(1)}}, series = {Lecture Notes in Computer Science}, volume = {10031}, pages = {220--248}, year = {2016} }
@inproceedings{DBLP:conf/ccs/LewiMACFWABK016, author = {Kevin Lewi and Alex J. Malozemoff and Daniel Apon and Brent Carmer and Adam Foltzer and Daniel Wagner and David W. Archer and Dan Boneh and Jonathan Katz and Mariana Raykova}, title = {5Gen: {A} Framework for Prototyping Applications Using Multilinear Maps and Matrix Branching Programs}, booktitle = {{CCS}}, pages = {981--992}, publisher = {{ACM}}, year = {2016} }
@inproceedings{DBLP:conf/esorics/WuTSB16, author = {David J. Wu and Ankur Taly and Asim Shankar and Dan Boneh}, title = {Privacy, Discovery, and Authentication for the Internet of Things}, booktitle = {{ESORICS} {(2)}}, series = {Lecture Notes in Computer Science}, volume = {9879}, pages = {301--319}, publisher = {Springer}, year = {2016} }
@inproceedings{DBLP:conf/ewsn/KininghamHLB16, author = {Kevin Kiningham and Mark Horowitz and Philip Alexander Levis and Dan Boneh}, title = {{CESEL:} Securing a Mote for 20 Years}, booktitle = {{EWSN}}, pages = {307--312}, publisher = {Junction Publishing, Canada / {ACM}}, year = {2016} }
@inproceedings{DBLP:conf/fc/SchrijversBBR16, author = {Okke Schrijvers and Joseph Bonneau and Dan Boneh and Tim Roughgarden}, title = {Incentive Compatibility of Bitcoin Mining Pool Reward Functions}, booktitle = {Financial Cryptography}, series = {Lecture Notes in Computer Science}, volume = {9603}, pages = {477--498}, publisher = {Springer}, year = {2016} }
@article{DBLP:journals/corr/WuTSB16, author = {David J. Wu and Ankur Taly and Asim Shankar and Dan Boneh}, title = {Privacy, Discovery, and Authentication for the Internet of Things}, journal = {CoRR}, volume = {abs/1604.06959}, year = {2016} }
@article{DBLP:journals/iacr/Corrigan-GibbsB16, author = {Henry Corrigan{-}Gibbs and Dan Boneh and Stuart E. Schechter}, title = {Balloon Hashing: Provably Space-Hard Hash Functions with Data-Independent Access Patterns}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {27}, year = {2016} }
@article{DBLP:journals/iacr/LewiMACFWABK016, author = {Kevin Lewi and Alex J. Malozemoff and Daniel Apon and Brent Carmer and Adam Foltzer and Daniel Wagner and David W. Archer and Dan Boneh and Jonathan Katz and Mariana Raykova}, title = {5Gen: {A} Framework for Prototyping Applications Using Multilinear Maps and Matrix Branching Programs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {619}, year = {2016} }
@article{DBLP:journals/joc/AhnBCHSW15, author = {Jae Hyun Ahn and Dan Boneh and Jan Camenisch and Susan Hohenberger and Abhi Shelat and Brent Waters}, title = {Computing on Authenticated Data}, journal = {J. Cryptol.}, volume = {28}, number = {2}, pages = {351--395}, year = {2015} }
@inproceedings{DBLP:conf/ccs/DagherBBCB15, author = {Gaby G. Dagher and Benedikt B{\"{u}}nz and Joseph Bonneau and Jeremy Clark and Dan Boneh}, title = {Provisions: Privacy-preserving Proofs of Solvency for Bitcoin Exchanges}, booktitle = {{CCS}}, pages = {720--731}, publisher = {{ACM}}, year = {2015} }
@inproceedings{DBLP:conf/ccs/MashtizadehBBM15, author = {Ali Jos{\'{e}} Mashtizadeh and Andrea Bittau and Dan Boneh and David Mazi{\`{e}}res}, title = {{CCFI:} Cryptographically Enforced Control Flow Integrity}, booktitle = {{CCS}}, pages = {941--951}, publisher = {{ACM}}, year = {2015} }
@inproceedings{DBLP:conf/eurocrypt/Boneh0MS15, author = {Dan Boneh and Divya Gupta and Ilya Mironov and Amit Sahai}, title = {Hosting Services on an Untrusted Cloud}, booktitle = {{EUROCRYPT} {(2)}}, series = {Lecture Notes in Computer Science}, volume = {9057}, pages = {404--436}, publisher = {Springer}, year = {2015} }
@inproceedings{DBLP:conf/eurocrypt/BonehL0SZZ15, author = {Dan Boneh and Kevin Lewi and Mariana Raykova and Amit Sahai and Mark Zhandry and Joe Zimmerman}, title = {Semantically Secure Order-Revealing Encryption: Multi-input Functional Encryption Without Obfuscation}, booktitle = {{EUROCRYPT} {(2)}}, series = {Lecture Notes in Computer Science}, volume = {9057}, pages = {563--594}, publisher = {Springer}, year = {2015} }
@inproceedings{DBLP:conf/sp/Corrigan-GibbsB15, author = {Henry Corrigan{-}Gibbs and Dan Boneh and David Mazi{\`{e}}res}, title = {Riposte: An Anonymous Messaging System Handling Millions of Users}, booktitle = {{IEEE} Symposium on Security and Privacy}, pages = {321--338}, publisher = {{IEEE} Computer Society}, year = {2015} }
@inproceedings{DBLP:conf/uss/MichalevskySVBN15, author = {Yan Michalevsky and Aaron Schulman and Gunaa Arumugam Veerapandian and Dan Boneh and Gabi Nakibly}, title = {PowerSpy: Location Tracking Using Mobile Device Power Analysis}, booktitle = {{USENIX} Security Symposium}, pages = {785--800}, publisher = {{USENIX} Association}, year = {2015} }
@article{DBLP:journals/corr/MichalevskyNSB15, author = {Yan Michalevsky and Gabi Nakibly and Aaron Schulman and Dan Boneh}, title = {PowerSpy: Location Tracking using Mobile Device Power Analysis}, journal = {CoRR}, volume = {abs/1502.03182}, year = {2015} }
@article{DBLP:journals/corr/Corrigan-GibbsB15, author = {Henry Corrigan{-}Gibbs and Dan Boneh and David Mazi{\`{e}}res}, title = {Riposte: An Anonymous Messaging System Handling Millions of Users}, journal = {CoRR}, volume = {abs/1503.06115}, year = {2015} }
@article{DBLP:journals/corr/BraunJB15, author = {Benjamin A. Braun and Suman Jana and Dan Boneh}, title = {Robust and Efficient Elimination of Cache and Timing Side Channels}, journal = {CoRR}, volume = {abs/1506.00189}, year = {2015} }
@article{DBLP:journals/corr/LevyCB15, author = {Amit Levy and Henry Corrigan{-}Gibbs and Dan Boneh}, title = {Stickler: Defending Against Malicious CDNs in an Unmodified Browser}, journal = {CoRR}, volume = {abs/1506.04110}, year = {2015} }
@article{DBLP:journals/iacr/BonehLMR15, author = {Dan Boneh and Kevin Lewi and Hart William Montgomery and Ananth Raghunathan}, title = {Key Homomorphic PRFs and Their Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {220}, year = {2015} }
@article{DBLP:journals/iacr/AbadiBMRS15, author = {Mart{\'{\i}}n Abadi and Dan Boneh and Ilya Mironov and Ananth Raghunathan and Gil Segev}, title = {Message-Locked Encryption for Lock-Dependent Messages}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {440}, year = {2015} }
@article{DBLP:journals/iacr/DagherBBCB15, author = {Gaby G. Dagher and Benedikt B{\"{u}}nz and Joseph Bonneau and Jeremy Clark and Dan Boneh}, title = {Provisions: Privacy-preserving proofs of solvency for Bitcoin exchanges}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1008}, year = {2015} }
@article{DBLP:journals/iacr/BonehLW15, author = {Dan Boneh and Kevin Lewi and David J. Wu}, title = {Constraining Pseudorandom Functions Privately}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1167}, year = {2015} }
@article{DBLP:journals/cacm/BojinovSRBL14, author = {Hristo Bojinov and Daniel S{\'{a}}nchez and Paul J. Reber and Dan Boneh and Patrick Lincoln}, title = {Neuroscience meets cryptography: crypto primitives secure against rubber hose attacks}, journal = {Commun. {ACM}}, volume = {57}, number = {5}, pages = {110--118}, year = {2014} }
@article{DBLP:journals/internet/HuangABJ14, author = {Lin{-}Shung Huang and Shrikant Adhikarla and Dan Boneh and Collin Jackson}, title = {An Experimental Study of {TLS} Forward Secrecy Deployments}, journal = {{IEEE} Internet Comput.}, volume = {18}, number = {6}, pages = {43--51}, year = {2014} }
@inproceedings{DBLP:conf/asiacrypt/BonehC14, author = {Dan Boneh and Henry Corrigan{-}Gibbs}, title = {Bivariate Polynomials Modulo Composites and Their Applications}, booktitle = {{ASIACRYPT} {(1)}}, series = {Lecture Notes in Computer Science}, volume = {8873}, pages = {42--62}, publisher = {Springer}, year = {2014} }
@inproceedings{DBLP:conf/crypto/BonehWZ14, author = {Dan Boneh and Brent Waters and Mark Zhandry}, title = {Low Overhead Broadcast Encryption from Multilinear Maps}, booktitle = {{CRYPTO} {(1)}}, series = {Lecture Notes in Computer Science}, volume = {8616}, pages = {206--223}, publisher = {Springer}, year = {2014} }
@inproceedings{DBLP:conf/crypto/BonehZ14, author = {Dan Boneh and Mark Zhandry}, title = {Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation}, booktitle = {{CRYPTO} {(1)}}, series = {Lecture Notes in Computer Science}, volume = {8616}, pages = {480--499}, publisher = {Springer}, year = {2014} }
@inproceedings{DBLP:conf/eurocrypt/BonehGGHNSVV14, author = {Dan Boneh and Craig Gentry and Sergey Gorbunov and Shai Halevi and Valeria Nikolaenko and Gil Segev and Vinod Vaikuntanathan and Dhinakaran Vinayagamurthy}, title = {Fully Key-Homomorphic Encryption, Arithmetic Circuit {ABE} and Compact Garbled Circuits}, booktitle = {{EUROCRYPT}}, series = {Lecture Notes in Computer Science}, volume = {8441}, pages = {533--556}, publisher = {Springer}, year = {2014} }
@inproceedings{DBLP:conf/sp/BittauBMMB14, author = {Andrea Bittau and Adam Belay and Ali Jos{\'{e}} Mashtizadeh and David Mazi{\`{e}}res and Dan Boneh}, title = {Hacking Blind}, booktitle = {{IEEE} Symposium on Security and Privacy}, pages = {227--242}, publisher = {{IEEE} Computer Society}, year = {2014} }
@inproceedings{DBLP:conf/uss/SilverJBCJ14, author = {David Silver and Suman Jana and Dan Boneh and Eric Yawei Chen and Collin Jackson}, title = {Password Managers: Attacks and Defenses}, booktitle = {{USENIX} Security Symposium}, pages = {449--464}, publisher = {{USENIX} Association}, year = {2014} }
@inproceedings{DBLP:conf/uss/MichalevskyBN14, author = {Yan Michalevsky and Dan Boneh and Gabi Nakibly}, title = {Gyrophone: Recognizing Speech from Gyroscope Signals}, booktitle = {{USENIX} Security Symposium}, pages = {1053--1067}, publisher = {{USENIX} Association}, year = {2014} }
@inproceedings{DBLP:conf/woot/HoBBP14, author = {Grant Ho and Dan Boneh and Lucas Ballard and Niels Provos}, title = {Tick Tock: Building Browser Red Pills from Timing Side Channels}, booktitle = {{WOOT}}, publisher = {{USENIX} Association}, year = {2014} }
@article{DBLP:journals/corr/BojinovMNB14, author = {Hristo Bojinov and Yan Michalevsky and Gabi Nakibly and Dan Boneh}, title = {Mobile Device Identification via Sensor Fingerprinting}, journal = {CoRR}, volume = {abs/1408.1416}, year = {2014} }
@article{DBLP:journals/corr/MashtizadehBMB14, author = {Ali Jos{\'{e}} Mashtizadeh and Andrea Bittau and David Mazi{\`{e}}res and Dan Boneh}, title = {Cryptographically Enforced Control Flow Integrity}, journal = {CoRR}, volume = {abs/1408.1451}, year = {2014} }
@article{DBLP:journals/iacr/BonehWZ14, author = {Dan Boneh and Brent Waters and Mark Zhandry}, title = {Low Overhead Broadcast Encryption from Multilinear Maps}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {195}, year = {2014} }
@article{DBLP:journals/iacr/BonehGGHNSVV14, author = {Dan Boneh and Craig Gentry and Sergey Gorbunov and Shai Halevi and Valeria Nikolaenko and Gil Segev and Vinod Vaikuntanathan and Dhinakaran Vinayagamurthy}, title = {Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE, and Compact Garbled Circuits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {356}, year = {2014} }
@article{DBLP:journals/iacr/BonehC14, author = {Dan Boneh and Henry Corrigan{-}Gibbs}, title = {Bivariate Polynomials Modulo Composites and their Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {719}, year = {2014} }
@article{DBLP:journals/iacr/BonehLRSZZ14, author = {Dan Boneh and Kevin Lewi and Mariana Raykova and Amit Sahai and Mark Zhandry and Joe Zimmerman}, title = {Semantically Secure Order-Revealing Encryption: Multi-Input Functional Encryption Without Obfuscation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {834}, year = {2014} }
@article{DBLP:journals/iacr/BonehWZ14a, author = {Dan Boneh and David J. Wu and Joe Zimmerman}, title = {Immunizing Multilinear Maps Against Zeroizing Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {930}, year = {2014} }
@inproceedings{DBLP:conf/acns/BonehGHWW13, author = {Dan Boneh and Craig Gentry and Shai Halevi and Frank Wang and David J. Wu}, title = {Private Database Queries Using Somewhat Homomorphic Encryption}, booktitle = {{ACNS}}, series = {Lecture Notes in Computer Science}, volume = {7954}, pages = {102--118}, publisher = {Springer}, year = {2013} }
@inproceedings{DBLP:conf/asiacrypt/BonehRS13, author = {Dan Boneh and Ananth Raghunathan and Gil Segev}, title = {Function-Private Subspace-Membership Encryption and Its Applications}, booktitle = {{ASIACRYPT} {(1)}}, series = {Lecture Notes in Computer Science}, volume = {8269}, pages = {255--275}, publisher = {Springer}, year = {2013} }
@inproceedings{DBLP:conf/asiacrypt/BonehW13, author = {Dan Boneh and Brent Waters}, title = {Constrained Pseudorandom Functions and Their Applications}, booktitle = {{ASIACRYPT} {(2)}}, series = {Lecture Notes in Computer Science}, volume = {8270}, pages = {280--300}, publisher = {Springer}, year = {2013} }
@inproceedings{DBLP:conf/ccs/Corrigan-GibbsMBF13, author = {Henry Corrigan{-}Gibbs and Wendy Mu and Dan Boneh and Bryan Ford}, title = {Ensuring high-quality randomness in cryptographic key generation}, booktitle = {{CCS}}, pages = {685--696}, publisher = {{ACM}}, year = {2013} }
@inproceedings{DBLP:conf/ccs/NikolaenkoIWJTB13, author = {Valeria Nikolaenko and Stratis Ioannidis and Udi Weinsberg and Marc Joye and Nina Taft and Dan Boneh}, title = {Privacy-preserving matrix factorization}, booktitle = {{CCS}}, pages = {801--812}, publisher = {{ACM}}, year = {2013} }
@inproceedings{DBLP:conf/crypto/BonehZ13, author = {Dan Boneh and Mark Zhandry}, title = {Secure Signatures and Chosen Ciphertext Security in a Quantum Computing World}, booktitle = {{CRYPTO} {(2)}}, series = {Lecture Notes in Computer Science}, volume = {8043}, pages = {361--379}, publisher = {Springer}, year = {2013} }
@inproceedings{DBLP:conf/crypto/AbadiBMRS13, author = {Mart{\'{\i}}n Abadi and Dan Boneh and Ilya Mironov and Ananth Raghunathan and Gil Segev}, title = {Message-Locked Encryption for Lock-Dependent Messages}, booktitle = {{CRYPTO} {(1)}}, series = {Lecture Notes in Computer Science}, volume = {8042}, pages = {374--391}, publisher = {Springer}, year = {2013} }
@inproceedings{DBLP:conf/crypto/BonehLMR13, author = {Dan Boneh and Kevin Lewi and Hart William Montgomery and Ananth Raghunathan}, title = {Key Homomorphic PRFs and Their Applications}, booktitle = {{CRYPTO} {(1)}}, series = {Lecture Notes in Computer Science}, volume = {8042}, pages = {410--428}, publisher = {Springer}, year = {2013} }
@inproceedings{DBLP:conf/crypto/BonehRS13, author = {Dan Boneh and Ananth Raghunathan and Gil Segev}, title = {Function-Private Identity-Based Encryption: Hiding the Function in Functional Encryption}, booktitle = {{CRYPTO} {(2)}}, series = {Lecture Notes in Computer Science}, volume = {8043}, pages = {461--478}, publisher = {Springer}, year = {2013} }
@inproceedings{DBLP:conf/eurocrypt/BonehZ13, author = {Dan Boneh and Mark Zhandry}, title = {Quantum-Secure Message Authentication Codes}, booktitle = {{EUROCRYPT}}, series = {Lecture Notes in Computer Science}, volume = {7881}, pages = {592--608}, publisher = {Springer}, year = {2013} }
@inproceedings{DBLP:conf/pet/FifieldNB13, author = {David Fifield and Gabi Nakibly and Dan Boneh}, title = {{OSS:} Using Online Scanning Services for Censorship Circumvention}, booktitle = {Privacy Enhancing Technologies}, series = {Lecture Notes in Computer Science}, volume = {7981}, pages = {185--204}, publisher = {Springer}, year = {2013} }
@inproceedings{DBLP:conf/sp/NikolaenkoWIJBT13, author = {Valeria Nikolaenko and Udi Weinsberg and Stratis Ioannidis and Marc Joye and Dan Boneh and Nina Taft}, title = {Privacy-Preserving Ridge Regression on Hundreds of Millions of Records}, booktitle = {{IEEE} Symposium on Security and Privacy}, pages = {334--348}, publisher = {{IEEE} Computer Society}, year = {2013} }
@proceedings{DBLP:conf/stoc/2013, editor = {Dan Boneh and Tim Roughgarden and Joan Feigenbaum}, title = {Symposium on Theory of Computing Conference, STOC'13, Palo Alto, CA, USA, June 1-4, 2013}, publisher = {{ACM}}, year = {2013} }
@article{DBLP:journals/corr/Corrigan-GibbsMBF13, author = {Henry Corrigan{-}Gibbs and Wendy Mu and Dan Boneh and Bryan Ford}, title = {Ensuring High-Quality Randomness in Cryptographic Key Generation}, journal = {CoRR}, volume = {abs/1309.7366}, year = {2013} }
@article{DBLP:journals/iacr/BonehZ13, author = {Dan Boneh and Mark Zhandry}, title = {Secure Signatures and Chosen Ciphertext Security in a Post-Quantum World}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {88}, year = {2013} }
@article{DBLP:journals/iacr/BonehRS13, author = {Dan Boneh and Ananth Raghunathan and Gil Segev}, title = {Function-Private Identity-Based Encryption: Hiding the Function in Functional Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {283}, year = {2013} }
@article{DBLP:journals/iacr/BonehW13, author = {Dan Boneh and Brent Waters}, title = {Constrained Pseudorandom Functions and Their Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {352}, year = {2013} }
@article{DBLP:journals/iacr/BonehRS13a, author = {Dan Boneh and Ananth Raghunathan and Gil Segev}, title = {Function-Private Subspace-Membership Encryption and Its Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {403}, year = {2013} }
@article{DBLP:journals/iacr/BonehGHWW13, author = {Dan Boneh and Craig Gentry and Shai Halevi and Frank Wang and David J. Wu}, title = {Private Database Queries Using Somewhat Homomorphic Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {422}, year = {2013} }
@article{DBLP:journals/iacr/BonehZ13a, author = {Dan Boneh and Mark Zhandry}, title = {Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {642}, year = {2013} }
@article{DBLP:journals/iacr/BonehNS13, author = {Dan Boneh and Valeria Nikolaenko and Gil Segev}, title = {Attribute-Based Encryption for Arithmetic Circuits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {669}, year = {2013} }
@article{DBLP:journals/iacr/AnanthBGSZ13, author = {Prabhanjan Ananth and Dan Boneh and Sanjam Garg and Amit Sahai and Mark Zhandry}, title = {Differing-Inputs Obfuscation and Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {689}, year = {2013} }
@article{DBLP:journals/cacm/BonehSW12, author = {Dan Boneh and Amit Sahai and Brent Waters}, title = {Functional encryption: a new vision for public-key cryptography}, journal = {Commun. {ACM}}, volume = {55}, number = {11}, pages = {56--64}, year = {2012} }
@article{DBLP:journals/pieee/LandwehrBMBLL12, author = {Carl E. Landwehr and Dan Boneh and John C. Mitchell and Steven M. Bellovin and Susan Landau and Michael E. Lesk}, title = {Privacy and Cybersecurity: The Next 100 Years}, journal = {Proc. {IEEE}}, volume = {100}, number = {Centennial-Issue}, pages = {1659--1673}, year = {2012} }
@inproceedings{DBLP:conf/asiacrypt/Boneh12, author = {Dan Boneh}, title = {Pairing-Based Cryptography: Past, Present, and Future}, booktitle = {{ASIACRYPT}}, series = {Lecture Notes in Computer Science}, volume = {7658}, pages = {1}, publisher = {Springer}, year = {2012} }
@inproceedings{DBLP:conf/ccs/GeorgievIJABS12, author = {Martin Georgiev and Subodh Iyengar and Suman Jana and Rishita Anubhai and Dan Boneh and Vitaly Shmatikov}, title = {The most dangerous code in the world: validating {SSL} certificates in non-browser software}, booktitle = {{CCS}}, pages = {38--49}, publisher = {{ACM}}, year = {2012} }
@inproceedings{DBLP:conf/ccs/WeinbergWYBCWB12, author = {Zachary Weinberg and Jeffrey Wang and Vinod Yegneswaran and Linda Briesemeister and Steven Cheung and Frank Wang and Dan Boneh}, title = {StegoTorus: a camouflage proxy for the Tor anonymity system}, booktitle = {{CCS}}, pages = {109--120}, publisher = {{ACM}}, year = {2012} }
@inproceedings{DBLP:conf/innovations/BonehSW12, author = {Dan Boneh and Gil Segev and Brent Waters}, title = {Targeted malleability: homomorphic encryption for restricted computations}, booktitle = {{ITCS}}, pages = {350--366}, publisher = {{ACM}}, year = {2012} }
@inproceedings{DBLP:conf/ndss/NakiblyKGB12, author = {Gabi Nakibly and Alex Kirshon and Dima Gonikman and Dan Boneh}, title = {Persistent {OSPF} Attacks}, booktitle = {{NDSS}}, publisher = {The Internet Society}, year = {2012} }
@inproceedings{DBLP:conf/ndss/StarkHIJB12, author = {Emily Stark and Lin{-}Shung Huang and Dinesh Israni and Collin Jackson and Dan Boneh}, title = {The Case for Prefetching and Prevalidating {TLS} Server Certificates}, booktitle = {{NDSS}}, publisher = {The Internet Society}, year = {2012} }
@inproceedings{DBLP:conf/pet/FifieldHESBDP12, author = {David Fifield and Nate Hardison and Jonathan D. Ellithorpe and Emily Stark and Dan Boneh and Roger Dingledine and Phillip A. Porras}, title = {Evading Censorship with Browser-Based Proxies}, booktitle = {Privacy Enhancing Technologies}, series = {Lecture Notes in Computer Science}, volume = {7384}, pages = {239--258}, publisher = {Springer}, year = {2012} }
@inproceedings{DBLP:conf/tcc/AhnBCHSW12, author = {Jae Hyun Ahn and Dan Boneh and Jan Camenisch and Susan Hohenberger and Abhi Shelat and Brent Waters}, title = {Computing on Authenticated Data}, booktitle = {{TCC}}, series = {Lecture Notes in Computer Science}, volume = {7194}, pages = {1--20}, publisher = {Springer}, year = {2012} }
@inproceedings{DBLP:conf/uss/BojinovSRBL12, author = {Hristo Bojinov and Daniel S{\'{a}}nchez and Paul J. Reber and Dan Boneh and Patrick Lincoln}, title = {Neuroscience Meets Cryptography: Designing Crypto Primitives Secure Against Rubber Hose Attacks}, booktitle = {{USENIX} Security Symposium}, pages = {129--141}, publisher = {{USENIX} Association}, year = {2012} }
@inproceedings{DBLP:conf/uss/LincolnMPYWMSVB12, author = {Patrick Lincoln and Ian Mason and Phillip A. Porras and Vinod Yegneswaran and Zachary Weinberg and Jeroen Massar and William Allen Simpson and Paul Vixie and Dan Boneh}, title = {Bootstrapping Communications into an Anti-Censorship System}, booktitle = {{FOCI}}, publisher = {{USENIX} Association}, year = {2012} }
@inproceedings{DBLP:conf/www/ThiagarajanANBS12, author = {Narendran Thiagarajan and Gaurav Aggarwal and Angela Nicoara and Dan Boneh and Jatinder Pal Singh}, title = {Who killed my battery?: analyzing mobile browser energy consumption}, booktitle = {{WWW}}, pages = {41--50}, publisher = {{ACM}}, year = {2012} }
@inproceedings{DBLP:conf/www/BurszteinSBM12, author = {Elie Bursztein and Chinmay Soman and Dan Boneh and John C. Mitchell}, title = {SessionJuggler: secure web login from an untrusted terminal using session hijacking}, booktitle = {{WWW}}, pages = {321--330}, publisher = {{ACM}}, year = {2012} }
@article{DBLP:journals/corr/abs-1202-4503, author = {Arvind Narayanan and Vincent Toubiana and Solon Barocas and Helen Nissenbaum and Dan Boneh}, title = {A Critical Look at Decentralized Personal Data Architectures}, journal = {CoRR}, volume = {abs/1202.4503}, year = {2012} }
@article{DBLP:journals/eccc/BonehZ12, author = {Dan Boneh and Mark Zhandry}, title = {Quantum-Secure Message Authentication Codes}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR12-136}}, year = {2012} }
@article{DBLP:journals/iacr/BonehZ12, author = {Dan Boneh and Mark Zhandry}, title = {Quantum-Secure Message Authentication Codes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {606}, year = {2012} }
@article{DBLP:journals/crossroads/Boneh11, author = {Dan Boneh}, title = {Recent ideas for circumventing internet filtering}, journal = {{XRDS}}, volume = {18}, number = {2}, pages = {36--40}, year = {2011} }
@article{DBLP:journals/joc/BonehB11, author = {Dan Boneh and Xavier Boyen}, title = {Efficient Selective Identity-Based Encryption Without Random Oracles}, journal = {J. Cryptol.}, volume = {24}, number = {4}, pages = {659--693}, year = {2011} }
@inproceedings{DBLP:conf/asiacrypt/BonehDFLSZ11, author = {Dan Boneh and {\"{O}}zg{\"{u}}r Dagdelen and Marc Fischlin and Anja Lehmann and Christian Schaffner and Mark Zhandry}, title = {Random Oracles in a Quantum World}, booktitle = {{ASIACRYPT}}, series = {Lecture Notes in Computer Science}, volume = {7073}, pages = {41--69}, publisher = {Springer}, year = {2011} }
@inproceedings{DBLP:conf/eurocrypt/BonehF11, author = {Dan Boneh and David Mandell Freeman}, title = {Homomorphic Signatures for Polynomial Functions}, booktitle = {{EUROCRYPT}}, series = {Lecture Notes in Computer Science}, volume = {6632}, pages = {149--168}, publisher = {Springer}, year = {2011} }
@inproceedings{DBLP:conf/ndss/NarayananTLHB11, author = {Arvind Narayanan and Narendran Thiagarajan and Mugdha Lakhani and Michael Hamburg and Dan Boneh}, title = {Location Privacy via Private Proximity Testing}, booktitle = {{NDSS}}, publisher = {The Internet Society}, year = {2011} }
@inproceedings{DBLP:conf/pkc/BonehF11, author = {Dan Boneh and David Mandell Freeman}, title = {Linearly Homomorphic Signatures over Binary Fields and New Tools for Lattice-Based Signatures}, booktitle = {Public Key Cryptography}, series = {Lecture Notes in Computer Science}, volume = {6571}, pages = {1--16}, publisher = {Springer}, year = {2011} }
@inproceedings{DBLP:conf/sp/BurszteinHLB11, author = {Elie Bursztein and Mike Hamburg and Jocelyn Lagarenne and Dan Boneh}, title = {OpenConflict: Preventing Real Time Map Hacks in Online Games}, booktitle = {{IEEE} Symposium on Security and Privacy}, pages = {506--520}, publisher = {{IEEE} Computer Society}, year = {2011} }
@inproceedings{DBLP:conf/tcc/BonehSW11, author = {Dan Boneh and Amit Sahai and Brent Waters}, title = {Functional Encryption: Definitions and Challenges}, booktitle = {{TCC}}, series = {Lecture Notes in Computer Science}, volume = {6597}, pages = {253--273}, publisher = {Springer}, year = {2011} }
@inproceedings{DBLP:conf/wisec/BojinovBCM11, author = {Hristo Bojinov and Dan Boneh and Rich Cannings and Iliyan Malchev}, title = {Address space randomization for mobile devices}, booktitle = {{WISEC}}, pages = {127--138}, publisher = {{ACM}}, year = {2011} }
@inproceedings{DBLP:conf/wmcsa/BojinovB11, author = {Hristo Bojinov and Dan Boneh}, title = {Mobile token-based authentication on a budget}, booktitle = {HotMobile}, pages = {14--19}, publisher = {{ACM}}, year = {2011} }
@incollection{DBLP:reference/crypt/Boneh11, author = {Dan Boneh}, title = {Aggregate Signatures}, booktitle = {Encyclopedia of Cryptography and Security (2nd Ed.)}, pages = {27}, publisher = {Springer}, year = {2011} }
@incollection{DBLP:reference/crypt/Boneh11a, author = {Dan Boneh}, title = {{BLS} Short Digital Signatures}, booktitle = {Encyclopedia of Cryptography and Security (2nd Ed.)}, pages = {158--159}, publisher = {Springer}, year = {2011} }
@incollection{DBLP:reference/crypt/Boneh11b, author = {Dan Boneh}, title = {Blum-Blum-Shub Pseudorandom Bit Generator}, booktitle = {Encyclopedia of Cryptography and Security (2nd Ed.)}, pages = {160--161}, publisher = {Springer}, year = {2011} }
@incollection{DBLP:reference/crypt/Boneh11c, author = {Dan Boneh}, title = {Blum-Goldwasser Public Key Encryption System}, booktitle = {Encyclopedia of Cryptography and Security (2nd Ed.)}, pages = {161--162}, publisher = {Springer}, year = {2011} }
@incollection{DBLP:reference/crypt/Boneh11d, author = {Dan Boneh}, title = {Cramer-Shoup Public-Key System}, booktitle = {Encyclopedia of Cryptography and Security (2nd Ed.)}, pages = {269--270}, publisher = {Springer}, year = {2011} }
@incollection{DBLP:reference/crypt/Boneh11e, author = {Dan Boneh}, title = {Digital Signature Standard}, booktitle = {Encyclopedia of Cryptography and Security (2nd Ed.)}, pages = {347}, publisher = {Springer}, year = {2011} }
@incollection{DBLP:reference/crypt/Boneh11f, author = {Dan Boneh}, title = {ElGamal Digital Signature Scheme}, booktitle = {Encyclopedia of Cryptography and Security (2nd Ed.)}, pages = {395--396}, publisher = {Springer}, year = {2011} }
@incollection{DBLP:reference/crypt/Boneh11g, author = {Dan Boneh}, title = {Rabin Digital Signature Scheme}, booktitle = {Encyclopedia of Cryptography and Security (2nd Ed.)}, pages = {1014--1015}, publisher = {Springer}, year = {2011} }
@incollection{DBLP:reference/crypt/Boneh11h, author = {Dan Boneh}, title = {Schnorr Digital Signature Scheme}, booktitle = {Encyclopedia of Cryptography and Security (2nd Ed.)}, pages = {1082--1083}, publisher = {Springer}, year = {2011} }
@incollection{DBLP:reference/crypt/Boneh11i, author = {Dan Boneh}, title = {Secure Signatures from the "Strong RSA" Assumption}, booktitle = {Encyclopedia of Cryptography and Security (2nd Ed.)}, pages = {1134--1135}, publisher = {Springer}, year = {2011} }
@incollection{DBLP:reference/crypt/Boneh11j, author = {Dan Boneh}, title = {Strong {RSA} Assumption}, booktitle = {Encyclopedia of Cryptography and Security (2nd Ed.)}, pages = {1266}, publisher = {Springer}, year = {2011} }
@article{DBLP:journals/iacr/BonehF11, author = {Dan Boneh and David Mandell Freeman}, title = {Homomorphic Signatures for Polynomial Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {18}, year = {2011} }
@article{DBLP:journals/iacr/AhnBCHSW11, author = {Jae Hyun Ahn and Dan Boneh and Jan Camenisch and Susan Hohenberger and Abhi Shelat and Brent Waters}, title = {Computing on Authenticated Data}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {96}, year = {2011} }
@article{DBLP:journals/iacr/BonehSW11, author = {Dan Boneh and Gil Segev and Brent Waters}, title = {Targeted Malleability: Homomorphic Encryption for Restricted Computations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {311}, year = {2011} }
@article{DBLP:journals/cacm/BojinovBB10, author = {Hristo Bojinov and Elie Bursztein and Dan Boneh}, title = {The emergence of cross channel scripting}, journal = {Commun. {ACM}}, volume = {53}, number = {8}, pages = {105--113}, year = {2010} }
@article{DBLP:journals/sensors/QiuBLE10, author = {Di Qiu and Dan Boneh and Sherman C. Lo and Per K. Enge}, title = {Reliable Location-Based Services from Radio Navigation Systems}, journal = {Sensors}, volume = {10}, number = {12}, pages = {11369--11389}, year = {2010} }
@inproceedings{DBLP:conf/ccs/BonehMR10, author = {Dan Boneh and Hart William Montgomery and Ananth Raghunathan}, title = {Algebraic pseudorandom functions with improved efficiency from the augmented cascade}, booktitle = {{CCS}}, pages = {131--140}, publisher = {{ACM}}, year = {2010} }
@inproceedings{DBLP:conf/crypto/AgrawalBB10, author = {Shweta Agrawal and Dan Boneh and Xavier Boyen}, title = {Lattice Basis Delegation in Fixed Dimension and Shorter-Ciphertext Hierarchical {IBE}}, booktitle = {{CRYPTO}}, series = {Lecture Notes in Computer Science}, volume = {6223}, pages = {98--115}, publisher = {Springer}, year = {2010} }
@inproceedings{DBLP:conf/drm/BonehKM10, author = {Dan Boneh and Aggelos Kiayias and Hart William Montgomery}, title = {Robust fingerprinting codes: a near optimal construction}, booktitle = {Digital Rights Management Workshop}, pages = {3--12}, publisher = {{ACM}}, year = {2010} }
@inproceedings{DBLP:conf/esorics/BojinovBBB10, author = {Hristo Bojinov and Elie Bursztein and Xavier Boyen and Dan Boneh}, title = {Kamouflage: Loss-Resistant Password Management}, booktitle = {{ESORICS}}, series = {Lecture Notes in Computer Science}, volume = {6345}, pages = {286--302}, publisher = {Springer}, year = {2010} }
@inproceedings{DBLP:conf/eurocrypt/AgrawalBB10, author = {Shweta Agrawal and Dan Boneh and Xavier Boyen}, title = {Efficient Lattice {(H)IBE} in the Standard Model}, booktitle = {{EUROCRYPT}}, series = {Lecture Notes in Computer Science}, volume = {6110}, pages = {553--572}, publisher = {Springer}, year = {2010} }
@inproceedings{DBLP:conf/mobicase/DodsonSBL10, author = {Ben Dodson and Debangsu Sengupta and Dan Boneh and Monica S. Lam}, title = {Secure, Consumer-Friendly Web Authentication and Payments with a Phone}, booktitle = {MobiCASE}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {76}, pages = {17--38}, publisher = {Springer}, year = {2010} }
@inproceedings{DBLP:conf/ndss/ToubianaNBNB10, author = {Vincent Toubiana and Arvind Narayanan and Dan Boneh and Helen Nissenbaum and Solon Barocas}, title = {Adnostic: Privacy Preserving Targeted Advertising}, booktitle = {{NDSS}}, publisher = {The Internet Society}, year = {2010} }
@inproceedings{DBLP:conf/pkc/AgrawalBBF10, author = {Shweta Agrawal and Dan Boneh and Xavier Boyen and David Mandell Freeman}, title = {Preventing Pollution Attacks in Multi-source Network Coding}, booktitle = {Public Key Cryptography}, series = {Lecture Notes in Computer Science}, volume = {6056}, pages = {161--176}, publisher = {Springer}, year = {2010} }
@inproceedings{DBLP:conf/uss/AggarwalBJB10, author = {Gaurav Aggarwal and Elie Bursztein and Collin Jackson and Dan Boneh}, title = {An Analysis of Private Browsing Modes in Modern Browsers}, booktitle = {{USENIX} Security Symposium}, pages = {79--94}, publisher = {{USENIX} Association}, year = {2010} }
@inproceedings{DBLP:conf/uss/BittauHHMB10, author = {Andrea Bittau and Michael Hamburg and Mark Handley and David Mazi{\`{e}}res and Dan Boneh}, title = {The Case for Ubiquitous Transport-Level Encryption}, booktitle = {{USENIX} Security Symposium}, pages = {403--418}, publisher = {{USENIX} Association}, year = {2010} }
@inproceedings{DBLP:conf/uss/BurszteinGFBRBBM10, author = {Elie Bursztein and Baptiste Gourdin and Celine Fabry and Jason Bau and Gustav Rydstedt and Hristo Bojinov and Dan Boneh and John C. Mitchell}, title = {Webseclab Security Education Workbench}, booktitle = {{CSET}}, publisher = {{USENIX} Association}, year = {2010} }
@article{DBLP:journals/iacr/AgrawalBBF10, author = {Shweta Agrawal and Dan Boneh and Xavier Boyen and David Mandell Freeman}, title = {Preventing Pollution Attacks in Multi-Source Network Coding}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {183}, year = {2010} }
@article{DBLP:journals/iacr/BonehDFLSZ10, author = {Dan Boneh and {\"{O}}zg{\"{u}}r Dagdelen and Marc Fischlin and Anja Lehmann and Christian Schaffner and Mark Zhandry}, title = {Random Oracles in a Quantum World}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {428}, year = {2010} }
@article{DBLP:journals/iacr/BonehMR10, author = {Dan Boneh and Hart William Montgomery and Ananth Raghunathan}, title = {Algebraic Pseudorandom Functions with Improved Efficiency from the Augmented Cascade}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {442}, year = {2010} }
@article{DBLP:journals/iacr/BonehF10, author = {Dan Boneh and David Mandell Freeman}, title = {Linearly Homomorphic Signatures over Binary Fields and New Tools for Lattice-Based Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {453}, year = {2010} }
@article{DBLP:journals/iacr/BonehSW10, author = {Dan Boneh and Amit Sahai and Brent Waters}, title = {Functional Encryption: Definitions and Challenges}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {543}, year = {2010} }
@article{DBLP:journals/tweb/JacksonBBSB09, author = {Collin Jackson and Adam Barth and Andrew Bortz and Weidong Shao and Dan Boneh}, title = {Protecting browsers from {DNS} rebinding attacks}, journal = {{ACM} Trans. Web}, volume = {3}, number = {1}, pages = {2:1--2:26}, year = {2009} }
@inproceedings{DBLP:conf/acns/AgrawalB09, author = {Shweta Agrawal and Dan Boneh}, title = {Homomorphic MACs: MAC-Based Integrity for Network Coding}, booktitle = {{ACNS}}, series = {Lecture Notes in Computer Science}, volume = {5536}, pages = {292--305}, year = {2009} }
@inproceedings{DBLP:conf/acsac/StarkHB09, author = {Emily Stark and Michael Hamburg and Dan Boneh}, title = {Symmetric Cryptography in Javascript}, booktitle = {{ACSAC}}, pages = {373--381}, publisher = {{IEEE} Computer Society}, year = {2009} }
@inproceedings{DBLP:conf/ccs/BojinovBB09, author = {Hristo Bojinov and Elie Bursztein and Dan Boneh}, title = {{XCS:} cross channel scripting and its impact on web applications}, booktitle = {{CCS}}, pages = {420--431}, publisher = {{ACM}}, year = {2009} }
@inproceedings{DBLP:conf/pkc/BonehFKW09, author = {Dan Boneh and David Mandell Freeman and Jonathan Katz and Brent Waters}, title = {Signing a Linear Subspace: Signature Schemes for Network Coding}, booktitle = {Public Key Cryptography}, series = {Lecture Notes in Computer Science}, volume = {5443}, pages = {68--87}, publisher = {Springer}, year = {2009} }
@proceedings{DBLP:conf/dagstuhl/2009P9141, editor = {Dan Boneh and {\'{U}}lfar Erlingsson and Martin Johns and Benjamin Livshits}, title = {Web Application Security, 29.03. - 03.04.2009}, series = {Dagstuhl Seminar Proceedings}, volume = {09141}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, Germany}, year = {2009} }
@proceedings{DBLP:conf/woot/2009, editor = {Dan Boneh and Alexander Sotirov}, title = {3rd {USENIX} Workshop on Offensive Technologies, {WOOT} 2009, Montreal, Canada, August 10, 2009}, publisher = {{USENIX} Association}, year = {2009} }
@inproceedings{DBLP:conf/dagstuhl/BonehEJL09, author = {Dan Boneh and {\'{U}}lfar Erlingsson and Martin Johns and Benjamin Livshits}, title = {09141 Abstracts Collection - Web Application Security}, booktitle = {Web Application Security}, series = {Dagstuhl Seminar Proceedings}, volume = {09141}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, Germany}, year = {2009} }
@inproceedings{DBLP:conf/dagstuhl/BonehEJL09a, author = {Dan Boneh and {\'{U}}lfar Erlingsson and Martin Johns and Benjamin Livshits}, title = {09141 Executive Summary - Web Application Security}, booktitle = {Web Application Security}, series = {Dagstuhl Seminar Proceedings}, volume = {09141}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, Germany}, year = {2009} }
@article{DBLP:journals/iacr/BonehRS09, author = {Dan Boneh and Karl Rubin and Alice Silverberg}, title = {Finding composite order ordinary elliptic curves using the Cocks-Pinch method}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {533}, year = {2009} }
@article{DBLP:journals/joc/BonehB08, author = {Dan Boneh and Xavier Boyen}, title = {Short Signatures Without Random Oracles and the {SDH} Assumption in Bilinear Groups}, journal = {J. Cryptol.}, volume = {21}, number = {2}, pages = {149--177}, year = {2008} }
@inproceedings{DBLP:conf/asiacrypt/BonehH08, author = {Dan Boneh and Michael Hamburg}, title = {Generalized Identity Based and Broadcast Encryption Schemes}, booktitle = {{ASIACRYPT}}, series = {Lecture Notes in Computer Science}, volume = {5350}, pages = {455--470}, publisher = {Springer}, year = {2008} }
@inproceedings{DBLP:conf/asplos/ChenGLSWBDP08, author = {Xiaoxin Chen and Tal Garfinkel and E. Christopher Lewis and Pratap Subrahmanyam and Carl A. Waldspurger and Dan Boneh and Jeffrey S. Dwoskin and Dan R. K. Ports}, title = {Overshadow: a virtualization-based approach to retrofitting protection in commodity operating systems}, booktitle = {{ASPLOS}}, pages = {2--13}, publisher = {{ACM}}, year = {2008} }
@inproceedings{DBLP:conf/ccs/BonehN08, author = {Dan Boneh and Moni Naor}, title = {Traitor tracing with constant size ciphertext}, booktitle = {{CCS}}, pages = {501--510}, publisher = {{ACM}}, year = {2008} }
@inproceedings{DBLP:conf/crypto/BonehHHO08, author = {Dan Boneh and Shai Halevi and Michael Hamburg and Rafail Ostrovsky}, title = {Circular-Secure Encryption from Decision Diffie-Hellman}, booktitle = {{CRYPTO}}, series = {Lecture Notes in Computer Science}, volume = {5157}, pages = {108--125}, publisher = {Springer}, year = {2008} }
@inproceedings{DBLP:conf/focs/BonehPRVW08, author = {Dan Boneh and Periklis A. Papakonstantinou and Charles Rackoff and Yevgeniy Vahlis and Brent Waters}, title = {On the Impossibility of Basing Identity Based Encryption on Trapdoor Permutations}, booktitle = {{FOCS}}, pages = {283--292}, publisher = {{IEEE} Computer Society}, year = {2008} }
@proceedings{DBLP:conf/dagstuhl/2007P7381, editor = {Johannes Bl{\"{o}}mer and Dan Boneh and Ronald Cramer and Ueli M. Maurer}, title = {Cryptography, 16.09. - 21.09.2007}, series = {Dagstuhl Seminar Proceedings}, volume = {07381}, publisher = {Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany}, year = {2008} }
@proceedings{DBLP:conf/uss/2008woot, editor = {Dan Boneh and Tal Garfinkel and Dug Song}, title = {2nd {USENIX} Workshop on Offensive Technologies, WOOT'08, San Jose, CA, USA, July 28, 2008, Proceedings}, publisher = {{USENIX} Association}, year = {2008} }
@article{DBLP:journals/iacr/BonehFKW08, author = {Dan Boneh and David Mandell Freeman and Jonathan Katz and Brent Waters}, title = {Signing a Linear Subspace: Signature Schemes for Network Coding}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {316}, year = {2008} }
@article{DBLP:journals/siamcomp/BonehCHK07, author = {Dan Boneh and Ran Canetti and Shai Halevi and Jonathan Katz}, title = {Chosen-Ciphertext Security from Identity-Based Encryption}, journal = {{SIAM} J. Comput.}, volume = {36}, number = {5}, pages = {1301--1328}, year = {2007} }
@inproceedings{DBLP:conf/ccs/BaileyBGJ07, author = {Daniel V. Bailey and Dan Boneh and Eu{-}Jin Goh and Ari Juels}, title = {Covert channels in privacy-preserving identification systems}, booktitle = {{CCS}}, pages = {297--306}, publisher = {{ACM}}, year = {2007} }
@inproceedings{DBLP:conf/ccs/JacksonBBSB07, author = {Collin Jackson and Adam Barth and Andrew Bortz and Weidong Shao and Dan Boneh}, title = {Protecting browsers from dns rebinding attacks}, booktitle = {{CCS}}, pages = {421--431}, publisher = {{ACM}}, year = {2007} }
@inproceedings{DBLP:conf/crypto/BonehKOS07, author = {Dan Boneh and Eyal Kushilevitz and Rafail Ostrovsky and William E. Skeith III}, title = {Public Key Encryption That Allows {PIR} Queries}, booktitle = {{CRYPTO}}, series = {Lecture Notes in Computer Science}, volume = {4622}, pages = {50--67}, publisher = {Springer}, year = {2007} }
@inproceedings{DBLP:conf/focs/Boneh07, author = {Dan Boneh}, title = {A Brief Look at Pairings Based Cryptography}, booktitle = {{FOCS}}, pages = {19--26}, publisher = {{IEEE} Computer Society}, year = {2007} }
@inproceedings{DBLP:conf/focs/BonehGH07, author = {Dan Boneh and Craig Gentry and Michael Hamburg}, title = {Space-Efficient Identity Based Encryption Without Pairings}, booktitle = {{FOCS}}, pages = {647--657}, publisher = {{IEEE} Computer Society}, year = {2007} }
@inproceedings{DBLP:conf/ndss/BethencourtBW07, author = {John Bethencourt and Dan Boneh and Brent Waters}, title = {Cryptographic Methods for Storing Ballots on a Voting Machine}, booktitle = {{NDSS}}, publisher = {The Internet Society}, year = {2007} }
@inproceedings{DBLP:conf/pairing/Boneh07, author = {Dan Boneh}, title = {Bilinear Groups of Composite Order}, booktitle = {Pairing}, series = {Lecture Notes in Computer Science}, volume = {4575}, pages = {1}, publisher = {Springer}, year = {2007} }
@inproceedings{DBLP:conf/soups/KumarGBW07, author = {Manu Kumar and Tal Garfinkel and Dan Boneh and Terry Winograd}, title = {Reducing shoulder-surfing by using gaze-based password entry}, booktitle = {{SOUPS}}, series = {{ACM} International Conference Proceeding Series}, volume = {229}, pages = {13--19}, publisher = {{ACM}}, year = {2007} }
@inproceedings{DBLP:conf/tcc/BonehW07, author = {Dan Boneh and Brent Waters}, title = {Conjunctive, Subset, and Range Queries on Encrypted Data}, booktitle = {{TCC}}, series = {Lecture Notes in Computer Science}, volume = {4392}, pages = {535--554}, publisher = {Springer}, year = {2007} }
@inproceedings{DBLP:conf/uss/JacksonBM07, author = {Collin Jackson and Dan Boneh and John C. Mitchell}, title = {Transaction Generators: Root Kits for Web}, booktitle = {HotSec}, publisher = {{USENIX} Association}, year = {2007} }
@inproceedings{DBLP:conf/wpes/Saint-JeanJBF07, author = {Felipe Saint{-}Jean and Aaron Johnson and Dan Boneh and Joan Feigenbaum}, title = {Private web search}, booktitle = {{WPES}}, pages = {84--90}, publisher = {{ACM}}, year = {2007} }
@inproceedings{DBLP:conf/www/BortzB07, author = {Andrew Bortz and Dan Boneh}, title = {Exposing private information by timing web applications}, booktitle = {{WWW}}, pages = {621--628}, publisher = {{ACM}}, year = {2007} }
@proceedings{DBLP:conf/woot/2007, editor = {Dan Boneh and Tal Garfinkel and Dug Song}, title = {First {USENIX} Workshop on Offensive Technologies, {WOOT} '07, Boston, MA, USA, August 6, 2007}, publisher = {{USENIX} Association}, year = {2007} }
@inproceedings{DBLP:conf/dagstuhl/BlomerBCM07, author = {Johannes Bl{\"{o}}mer and Dan Boneh and Ronald Cramer and Ueli M. Maurer}, title = {07381 Executive Summary - Cryptography}, booktitle = {Cryptography}, series = {Dagstuhl Seminar Proceedings}, volume = {07381}, publisher = {Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany}, year = {2007} }
@inproceedings{DBLP:conf/dagstuhl/BlomerBCM07a, author = {Johannes Bl{\"{o}}mer and Dan Boneh and Ronald Cramer and Ueli M. Maurer}, title = {07381 Abstracts Collection -- Cryptography}, booktitle = {Cryptography}, series = {Dagstuhl Seminar Proceedings}, volume = {07381}, publisher = {Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany}, year = {2007} }
@article{DBLP:journals/iacr/BonehKOS07, author = {Dan Boneh and Eyal Kushilevitz and Rafail Ostrovsky and William E. Skeith III}, title = {Public Key Encryption that Allows {PIR} Queries}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {73}, year = {2007} }
@article{DBLP:journals/iacr/BonehGH07, author = {Dan Boneh and Craig Gentry and Michael Hamburg}, title = {Space-Efficient Identity Based Encryption Without Pairings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {177}, year = {2007} }
@inproceedings{DBLP:conf/ccs/BonehW06, author = {Dan Boneh and Brent Waters}, title = {A fully collusion resistant broadcast, trace, and revoke system}, booktitle = {{CCS}}, pages = {211--220}, publisher = {{ACM}}, year = {2006} }
@inproceedings{DBLP:conf/ccs/KrugerJGB06, author = {Louis Kruger and Somesh Jha and Eu{-}Jin Goh and Dan Boneh}, title = {Secure function evaluation with ordered binary decision diagrams}, booktitle = {{CCS}}, pages = {410--420}, publisher = {{ACM}}, year = {2006} }
@inproceedings{DBLP:conf/crypto/BonehB06, author = {Dan Boneh and Xavier Boyen}, title = {On the Impossibility of Efficiently Combining Collision Resistant Hash Functions}, booktitle = {{CRYPTO}}, series = {Lecture Notes in Computer Science}, volume = {4117}, pages = {570--583}, publisher = {Springer}, year = {2006} }
@inproceedings{DBLP:conf/ctrsa/BonehBH06, author = {Dan Boneh and Xavier Boyen and Shai Halevi}, title = {Chosen Ciphertext Secure Public Key Threshold Encryption Without Random Oracles}, booktitle = {{CT-RSA}}, series = {Lecture Notes in Computer Science}, volume = {3860}, pages = {226--243}, publisher = {Springer}, year = {2006} }
@inproceedings{DBLP:conf/eurocrypt/BonehSW06, author = {Dan Boneh and Amit Sahai and Brent Waters}, title = {Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys}, booktitle = {{EUROCRYPT}}, series = {Lecture Notes in Computer Science}, volume = {4004}, pages = {573--592}, publisher = {Springer}, year = {2006} }
@inproceedings{DBLP:conf/fc/BarthBW06, author = {Adam Barth and Dan Boneh and Brent Waters}, title = {Privacy in Encrypted Content Distribution Using Private Broadcast Encryption}, booktitle = {Financial Cryptography}, series = {Lecture Notes in Computer Science}, volume = {4107}, pages = {52--64}, publisher = {Springer}, year = {2006} }
@inproceedings{DBLP:conf/pkc/BonehSW06, author = {Dan Boneh and Emily Shen and Brent Waters}, title = {Strongly Unforgeable Signatures Based on Computational Diffie-Hellman}, booktitle = {Public Key Cryptography}, series = {Lecture Notes in Computer Science}, volume = {3958}, pages = {229--240}, publisher = {Springer}, year = {2006} }
@inproceedings{DBLP:conf/uss/CasadoGAFBM06, author = {Mart{\'{\i}}n Casado and Tal Garfinkel and Aditya Akella and Michael J. Freedman and Dan Boneh and Nick McKeown}, title = {{SANE:} {A} Protection Architecture for Enterprise Networks}, booktitle = {{USENIX} Security Symposium}, publisher = {{USENIX} Association}, year = {2006} }
@inproceedings{DBLP:conf/www/JacksonBBM06a, author = {Collin Jackson and Andrew Bortz and Dan Boneh and John C. Mitchell}, title = {Protecting browser state from web privacy attacks}, booktitle = {{WWW}}, pages = {737--744}, publisher = {{ACM}}, year = {2006} }
@article{DBLP:journals/iacr/BonehSW06, author = {Dan Boneh and Amit Sahai and Brent Waters}, title = {Fully Collusion Resistant Traitor Tracing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {45}, year = {2006} }
@article{DBLP:journals/iacr/BonehW06, author = {Dan Boneh and Brent Waters}, title = {Conjunctive, Subset, and Range Queries on Encrypted Data}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {287}, year = {2006} }
@article{DBLP:journals/iacr/BonehW06a, author = {Dan Boneh and Brent Waters}, title = {A Fully Collusion Resistant Broadcast, Trace, and Revoke System}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {298}, year = {2006} }
@article{DBLP:journals/cn/BrumleyB05, author = {David Brumley and Dan Boneh}, title = {Remote timing attacks are practical}, journal = {Comput. Networks}, volume = {48}, number = {5}, pages = {701--716}, year = {2005} }
@article{DBLP:journals/dc/LiDB05, author = {Ninghui Li and Wenliang Du and Dan Boneh}, title = {Oblivious signature-based envelope}, journal = {Distributed Comput.}, volume = {17}, number = {4}, pages = {293--302}, year = {2005} }
@inproceedings{DBLP:conf/crypto/BonehGW05, author = {Dan Boneh and Craig Gentry and Brent Waters}, title = {Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys}, booktitle = {{CRYPTO}}, series = {Lecture Notes in Computer Science}, volume = {3621}, pages = {258--275}, publisher = {Springer}, year = {2005} }
@inproceedings{DBLP:conf/ctrsa/BonehK05, author = {Dan Boneh and Jonathan Katz}, title = {Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity-Based Encryption}, booktitle = {{CT-RSA}}, series = {Lecture Notes in Computer Science}, volume = {3376}, pages = {87--103}, publisher = {Springer}, year = {2005} }
@inproceedings{DBLP:conf/eurocrypt/BonehBG05, author = {Dan Boneh and Xavier Boyen and Eu{-}Jin Goh}, title = {Hierarchical Identity Based Encryption with Constant Size Ciphertext}, booktitle = {{EUROCRYPT}}, series = {Lecture Notes in Computer Science}, volume = {3494}, pages = {440--456}, publisher = {Springer}, year = {2005} }
@inproceedings{DBLP:conf/tcc/BonehGN05, author = {Dan Boneh and Eu{-}Jin Goh and Kobbi Nissim}, title = {Evaluating 2-DNF Formulas on Ciphertexts}, booktitle = {{TCC}}, series = {Lecture Notes in Computer Science}, volume = {3378}, pages = {325--341}, publisher = {Springer}, year = {2005} }
@inproceedings{DBLP:conf/uss/RossJMBM05, author = {Blake Ross and Collin Jackson and Nick Miyake and Dan Boneh and John C. Mitchell}, title = {Stronger Password Authentication Using Browser Extensions}, booktitle = {{USENIX} Security Symposium}, publisher = {{USENIX} Association}, year = {2005} }
@incollection{DBLP:reference/crypt/Boneh05, author = {Dan Boneh}, title = {{BLS} Short Digital Signatures}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005} }
@incollection{DBLP:reference/crypt/Boneh05a, author = {Dan Boneh}, title = {Blum-Blum-Shub Pseudorandom Bit Generator}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005} }
@incollection{DBLP:reference/crypt/Boneh05b, author = {Dan Boneh}, title = {Blum-Goldwasser Public Key Encryption System}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005} }
@incollection{DBLP:reference/crypt/Boneh05c, author = {Dan Boneh}, title = {Cramer-Shoup Public Key System}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005} }
@incollection{DBLP:reference/crypt/Boneh05d, author = {Dan Boneh}, title = {Digital Signature Standard}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005} }
@incollection{DBLP:reference/crypt/Boneh05e, author = {Dan Boneh}, title = {Elgamal Digital Signature Scheme}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005} }
@incollection{DBLP:reference/crypt/Boneh05f, author = {Dan Boneh}, title = {Rabin Digital Signature Scheme}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005} }
@incollection{DBLP:reference/crypt/Boneh05g, author = {Dan Boneh}, title = {Schnorr Digital Signature Scheme}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005} }
@incollection{DBLP:reference/crypt/Boneh05h, author = {Dan Boneh}, title = {Secure signatures from the "strong RSA" assumption}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005} }
@incollection{DBLP:reference/crypt/Boneh05i, author = {Dan Boneh}, title = {Strong {RSA} Assumption}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005} }
@article{DBLP:journals/iacr/BonehBG05, author = {Dan Boneh and Xavier Boyen and Eu{-}Jin Goh}, title = {Hierarchical Identity Based Encryption with Constant Size Ciphertext}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {15}, year = {2005} }
@article{DBLP:journals/iacr/BonehGW05, author = {Dan Boneh and Craig Gentry and Brent Waters}, title = {Collusion Resistant Broadcast Encryption With Short Ciphertexts and Private Keys}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {18}, year = {2005} }
@article{DBLP:journals/debu/BonehFSW04, author = {Dan Boneh and Joan Feigenbaum and Abraham Silberschatz and Rebecca N. Wright}, title = {{PORTIA:} Privacy, Obligations, and Rights in Technologies of Information Assessment}, journal = {{IEEE} Data Eng. Bull.}, volume = {27}, number = {1}, pages = {10--18}, year = {2004} }
@article{DBLP:journals/joc/BonehLS04, author = {Dan Boneh and Ben Lynn and Hovav Shacham}, title = {Short Signatures from the Weil Pairing}, journal = {J. Cryptol.}, volume = {17}, number = {4}, pages = {297--319}, year = {2004} }
@article{DBLP:journals/tissec/ShachamBR04, author = {Hovav Shacham and Dan Boneh and Eric Rescorla}, title = {Client-side caching for {TLS}}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {7}, number = {4}, pages = {553--575}, year = {2004} }
@article{DBLP:journals/toit/BonehDT04, author = {Dan Boneh and Xuhua Ding and Gene Tsudik}, title = {Fine-grained control of security capabilities}, journal = {{ACM} Trans. Internet Techn.}, volume = {4}, number = {1}, pages = {60--82}, year = {2004} }
@inproceedings{DBLP:conf/ccs/BonehS04, author = {Dan Boneh and Hovav Shacham}, title = {Group signatures with verifier-local revocation}, booktitle = {{CCS}}, pages = {168--177}, publisher = {{ACM}}, year = {2004} }
@inproceedings{DBLP:conf/ccs/ShachamPPGMB04, author = {Hovav Shacham and Matthew Page and Ben Pfaff and Eu{-}Jin Goh and Nagendra Modadugu and Dan Boneh}, title = {On the effectiveness of address-space randomization}, booktitle = {{CCS}}, pages = {298--307}, publisher = {{ACM}}, year = {2004} }
@inproceedings{DBLP:conf/crypto/BonehBS04, author = {Dan Boneh and Xavier Boyen and Hovav Shacham}, title = {Short Group Signatures}, booktitle = {{CRYPTO}}, series = {Lecture Notes in Computer Science}, volume = {3152}, pages = {41--55}, publisher = {Springer}, year = {2004} }
@inproceedings{DBLP:conf/crypto/BonehB04, author = {Dan Boneh and Xavier Boyen}, title = {Secure Identity Based Encryption Without Random Oracles}, booktitle = {{CRYPTO}}, series = {Lecture Notes in Computer Science}, volume = {3152}, pages = {443--459}, publisher = {Springer}, year = {2004} }
@inproceedings{DBLP:conf/eurocrypt/BonehB04, author = {Dan Boneh and Xavier Boyen}, title = {Short Signatures Without Random Oracles}, booktitle = {{EUROCRYPT}}, series = {Lecture Notes in Computer Science}, volume = {3027}, pages = {56--73}, publisher = {Springer}, year = {2004} }
@inproceedings{DBLP:conf/eurocrypt/BonehB04a, author = {Dan Boneh and Xavier Boyen}, title = {Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles}, booktitle = {{EUROCRYPT}}, series = {Lecture Notes in Computer Science}, volume = {3027}, pages = {223--238}, publisher = {Springer}, year = {2004} }
@inproceedings{DBLP:conf/eurocrypt/BonehCOP04, author = {Dan Boneh and Giovanni Di Crescenzo and Rafail Ostrovsky and Giuseppe Persiano}, title = {Public Key Encryption with Keyword Search}, booktitle = {{EUROCRYPT}}, series = {Lecture Notes in Computer Science}, volume = {3027}, pages = {506--522}, publisher = {Springer}, year = {2004} }
@article{DBLP:journals/iacr/BonehB04, author = {Dan Boneh and Xavier Boyen}, title = {Short Signatures Without Random Oracles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {171}, year = {2004} }
@article{DBLP:journals/iacr/BonehB04a, author = {Dan Boneh and Xavier Boyen}, title = {Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {172}, year = {2004} }
@article{DBLP:journals/iacr/BonehB04b, author = {Dan Boneh and Xavier Boyen}, title = {Secure Identity Based Encryption Without Random Oracles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {173}, year = {2004} }
@article{DBLP:journals/iacr/BonehBS04, author = {Dan Boneh and Xavier Boyen and Hovav Shacham}, title = {Short Group Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {174}, year = {2004} }
@article{DBLP:journals/iacr/BonehK04, author = {Dan Boneh and Jonathan Katz}, title = {Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity-Based Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {261}, year = {2004} }
@article{DBLP:journals/siamcomp/BonehF03, author = {Dan Boneh and Matthew K. Franklin}, title = {Identity-Based Encryption from the Weil Pairing}, journal = {{SIAM} J. Comput.}, volume = {32}, number = {3}, pages = {586--615}, year = {2003} }
@inproceedings{DBLP:conf/ctrsa/BonehMS03, author = {Dan Boneh and Ilya Mironov and Victor Shoup}, title = {A Secure Signature Scheme from Bilinear Maps}, booktitle = {{CT-RSA}}, series = {Lecture Notes in Computer Science}, volume = {2612}, pages = {98--110}, publisher = {Springer}, year = {2003} }
@inproceedings{DBLP:conf/eurocrypt/BonehGLS03, author = {Dan Boneh and Craig Gentry and Ben Lynn and Hovav Shacham}, title = {Aggregate and Verifiably Encrypted Signatures from Bilinear Maps}, booktitle = {{EUROCRYPT}}, series = {Lecture Notes in Computer Science}, volume = {2656}, pages = {416--432}, publisher = {Springer}, year = {2003} }
@inproceedings{DBLP:conf/hotos/GarfinkelRB03, author = {Tal Garfinkel and Mendel Rosenblum and Dan Boneh}, title = {Flexible {OS} Support and Applications for Trusted Computing}, booktitle = {HotOS}, pages = {145--150}, publisher = {{USENIX}}, year = {2003} }
@inproceedings{DBLP:conf/isw/GohBPG03, author = {Eu{-}Jin Goh and Dan Boneh and Benny Pinkas and Philippe Golle}, title = {The Design and Implementation of Protocol-Based Hidden Key Recovery}, booktitle = {{ISC}}, series = {Lecture Notes in Computer Science}, volume = {2851}, pages = {165--179}, publisher = {Springer}, year = {2003} }
@inproceedings{DBLP:conf/ndss/GohSMB03, author = {Eu{-}Jin Goh and Hovav Shacham and Nagendra Modadugu and Dan Boneh}, title = {SiRiUS: Securing Remote Untrusted Storage}, booktitle = {{NDSS}}, publisher = {The Internet Society}, year = {2003} }
@inproceedings{DBLP:conf/podc/LiDB03, author = {Ninghui Li and Wenliang Du and Dan Boneh}, title = {Oblivious signature-based envelope}, booktitle = {{PODC}}, pages = {182--189}, publisher = {{ACM}}, year = {2003} }
@inproceedings{DBLP:conf/sosp/GarfinkelPCRB03, author = {Tal Garfinkel and Ben Pfaff and Jim Chow and Mendel Rosenblum and Dan Boneh}, title = {Terra: a virtual machine-based platform for trusted computing}, booktitle = {{SOSP}}, pages = {193--206}, publisher = {{ACM}}, year = {2003} }
@inproceedings{DBLP:conf/uss/BrumleyB03, author = {David Brumley and Dan Boneh}, title = {Remote Timing Attacks Are Practical}, booktitle = {{USENIX} Security Symposium}, publisher = {{USENIX} Association}, year = {2003} }
@proceedings{DBLP:conf/crypto/2003, editor = {Dan Boneh}, title = {Advances in Cryptology - {CRYPTO} 2003, 23rd Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2729}, publisher = {Springer}, year = {2003} }
@article{DBLP:journals/iacr/BonehCOP03, author = {Dan Boneh and Giovanni Di Crescenzo and Rafail Ostrovsky and Giuseppe Persiano}, title = {Public Key Encryption with keyword Search}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {195}, year = {2003} }
@article{DBLP:journals/jcss/Boneh02, author = {Dan Boneh}, title = {Finding Smooth Integers in Short Intervals Using {CRT} Decoding}, journal = {J. Comput. Syst. Sci.}, volume = {64}, number = {4}, pages = {768--784}, year = {2002} }
@inproceedings{DBLP:conf/asiacrypt/GolleZBJJ02, author = {Philippe Golle and Sheng Zhong and Dan Boneh and Markus Jakobsson and Ari Juels}, title = {Optimistic Mixing for Exit-Polls}, booktitle = {{ASIACRYPT}}, series = {Lecture Notes in Computer Science}, volume = {2501}, pages = {451--465}, publisher = {Springer}, year = {2002} }
@inproceedings{DBLP:conf/ccs/JacobBF02, author = {Matthias Jacob and Dan Boneh and Edward W. Felten}, title = {Attacking an Obfuscated Cipher by Injecting Faults}, booktitle = {Digital Rights Management Workshop}, series = {Lecture Notes in Computer Science}, volume = {2696}, pages = {16--31}, publisher = {Springer}, year = {2002} }
@inproceedings{DBLP:conf/ccs/BonehG02, author = {Dan Boneh and Philippe Golle}, title = {Almost entirely correct mixing with applications to voting}, booktitle = {{CCS}}, pages = {68--77}, publisher = {{ACM}}, year = {2002} }
@inproceedings{DBLP:conf/ndss/ShachamB02, author = {Hovav Shacham and Dan Boneh}, title = {Fast-Track Session Establishment for {TLS}}, booktitle = {{NDSS}}, publisher = {The Internet Society}, year = {2002} }
@proceedings{DBLP:conf/uss/2002, editor = {Dan Boneh}, title = {Proceedings of the 11th {USENIX} Security Symposium, San Francisco, CA, USA, August 5-9, 2002}, publisher = {{USENIX}}, year = {2002} }
@article{DBLP:journals/iacr/BonehS02, author = {Dan Boneh and Alice Silverberg}, title = {Applications of Multilinear Forms to Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {80}, year = {2002} }
@article{DBLP:journals/iacr/BonehGLS02, author = {Dan Boneh and Craig Gentry and Ben Lynn and Hovav Shacham}, title = {Aggregate and Verifiably Encrypted Signatures from Bilinear Maps}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {175}, year = {2002} }
@article{DBLP:journals/ec/BaumBG01, author = {Eric B. Baum and Dan Boneh and Charles Garrett}, title = {Where Genetic Algorithms Excel}, journal = {Evol. Comput.}, volume = {9}, number = {1}, pages = {93--124}, year = {2001} }
@article{DBLP:journals/jacm/BonehF01, author = {Dan Boneh and Matthew K. Franklin}, title = {Efficient generation of shared {RSA} keys}, journal = {J. {ACM}}, volume = {48}, number = {4}, pages = {702--722}, year = {2001} }
@article{DBLP:journals/joc/BonehDL01, author = {Dan Boneh and Richard A. DeMillo and Richard J. Lipton}, title = {On the Importance of Eliminating Errors in Cryptographic Computations}, journal = {J. Cryptol.}, volume = {14}, number = {2}, pages = {101--119}, year = {2001} }
@inproceedings{DBLP:conf/asiacrypt/BonehHH01, author = {Dan Boneh and Shai Halevi and Nick Howgrave{-}Graham}, title = {The Modular Inversion Hidden Number Problem}, booktitle = {{ASIACRYPT}}, series = {Lecture Notes in Computer Science}, volume = {2248}, pages = {36--51}, publisher = {Springer}, year = {2001} }
@inproceedings{DBLP:conf/asiacrypt/BonehLS01, author = {Dan Boneh and Ben Lynn and Hovav Shacham}, title = {Short Signatures from the Weil Pairing}, booktitle = {{ASIACRYPT}}, series = {Lecture Notes in Computer Science}, volume = {2248}, pages = {514--532}, publisher = {Springer}, year = {2001} }
@inproceedings{DBLP:conf/crypto/BonehS01, author = {Dan Boneh and Igor E. Shparlinski}, title = {On the Unpredictability of Bits of the Elliptic Curve Diffie--Hellman Scheme}, booktitle = {{CRYPTO}}, series = {Lecture Notes in Computer Science}, volume = {2139}, pages = {201--212}, publisher = {Springer}, year = {2001} }
@inproceedings{DBLP:conf/crypto/BonehF01, author = {Dan Boneh and Matthew K. Franklin}, title = {Identity-Based Encryption from the Weil Pairing}, booktitle = {{CRYPTO}}, series = {Lecture Notes in Computer Science}, volume = {2139}, pages = {213--229}, publisher = {Springer}, year = {2001} }
@inproceedings{DBLP:conf/crypto/Boneh01, author = {Dan Boneh}, title = {Simplified {OAEP} for the {RSA} and Rabin Functions}, booktitle = {{CRYPTO}}, series = {Lecture Notes in Computer Science}, volume = {2139}, pages = {275--291}, publisher = {Springer}, year = {2001} }
@inproceedings{DBLP:conf/ctrsa/ShachamB01, author = {Hovav Shacham and Dan Boneh}, title = {Improving {SSL} Handshake Performance via Batching}, booktitle = {{CT-RSA}}, series = {Lecture Notes in Computer Science}, volume = {2020}, pages = {28--43}, publisher = {Springer}, year = {2001} }
@inproceedings{DBLP:conf/eurocrypt/BonehDF01, author = {Dan Boneh and Glenn Durfee and Matthew K. Franklin}, title = {Lower Bounds for Multicast Message Authentication}, booktitle = {{EUROCRYPT}}, series = {Lecture Notes in Computer Science}, volume = {2045}, pages = {437--452}, publisher = {Springer}, year = {2001} }
@inproceedings{DBLP:conf/uss/BonehDTW01, author = {Dan Boneh and Xuhua Ding and Gene Tsudik and Chi{-}Ming Wong}, title = {A Method for Fast Revocation of Public Key Certificates and Security Capabilities}, booktitle = {{USENIX} Security Symposium}, publisher = {{USENIX}}, year = {2001} }
@article{DBLP:journals/iacr/BonehF01, author = {Dan Boneh and Matthew K. Franklin}, title = {Identity Based Encryption From the Weil Pairing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {90}, year = {2001} }
@article{DBLP:journals/tit/BonehD00, author = {Dan Boneh and Glenn Durfee}, title = {Cryptanalysis of {RSA} with private key d less than N\({}^{\mbox{0.292}}\)}, journal = {{IEEE} Trans. Inf. Theory}, volume = {46}, number = {4}, pages = {1339--1349}, year = {2000} }
@inproceedings{DBLP:conf/asiacrypt/BonehJN00, author = {Dan Boneh and Antoine Joux and Phong Q. Nguyen}, title = {Why Textbook ElGamal and {RSA} Encryption Are Insecure}, booktitle = {{ASIACRYPT}}, series = {Lecture Notes in Computer Science}, volume = {1976}, pages = {30--43}, publisher = {Springer}, year = {2000} }
@inproceedings{DBLP:conf/asplos/LieTMLBMH00, author = {David Lie and Chandramohan A. Thekkath and Mark Mitchell and Patrick Lincoln and Dan Boneh and John C. Mitchell and Mark Horowitz}, title = {Architectural Support for Copy and Tamper Resistant Software}, booktitle = {{ASPLOS}}, pages = {168--177}, publisher = {{ACM} Press}, year = {2000} }
@inproceedings{DBLP:conf/crypto/BonehN00, author = {Dan Boneh and Moni Naor}, title = {Timed Commitments}, booktitle = {{CRYPTO}}, series = {Lecture Notes in Computer Science}, volume = {1880}, pages = {236--254}, publisher = {Springer}, year = {2000} }
@inproceedings{DBLP:conf/indocrypt/BonehMK00, author = {Dan Boneh and Nagendra Modadugu and Michael Kim}, title = {Generating {RSA} Keys on a Handheld Using an Untrusted Server}, booktitle = {{INDOCRYPT}}, series = {Lecture Notes in Computer Science}, volume = {1977}, pages = {271--282}, publisher = {Springer}, year = {2000} }
@inproceedings{DBLP:conf/stoc/Boneh00, author = {Dan Boneh}, title = {Finding smooth integers in short intervals using {CRT} decoding}, booktitle = {{STOC}}, pages = {265--272}, publisher = {{ACM}}, year = {2000} }
@article{DBLP:journals/ipl/BihamBR99, author = {Eli Biham and Dan Boneh and Omer Reingold}, title = {Breaking Generalized Diffie-Hellmann Modulo a Composite is no Easier Than Factoring}, journal = {Inf. Process. Lett.}, volume = {70}, number = {2}, pages = {83--87}, year = {1999} }
@inproceedings{DBLP:conf/ccs/BonehF99, author = {Dan Boneh and Matthew K. Franklin}, title = {Anonymous Authentication with Subset Queries (extended abstract)}, booktitle = {{CCS}}, pages = {113--119}, publisher = {{ACM}}, year = {1999} }
@inproceedings{DBLP:conf/crypto/BonehDH99, author = {Dan Boneh and Glenn Durfee and Nick Howgrave{-}Graham}, title = {Factoring {N} = p\({}^{\mbox{r}}\)q for Large r}, booktitle = {{CRYPTO}}, series = {Lecture Notes in Computer Science}, volume = {1666}, pages = {326--337}, publisher = {Springer}, year = {1999} }
@inproceedings{DBLP:conf/crypto/BonehF99, author = {Dan Boneh and Matthew K. Franklin}, title = {An Efficient Public Key Traitor Tracing Scheme}, booktitle = {{CRYPTO}}, series = {Lecture Notes in Computer Science}, volume = {1666}, pages = {338--353}, publisher = {Springer}, year = {1999} }
@inproceedings{DBLP:conf/eurocrypt/BonehD99, author = {Dan Boneh and Glenn Durfee}, title = {Cryptanalysis of {RSA} with Private Key \emph{d} Less than \emph{N}\({}^{\mbox{0.292}}\)}, booktitle = {{EUROCRYPT}}, series = {Lecture Notes in Computer Science}, volume = {1592}, pages = {1--11}, publisher = {Springer}, year = {1999} }
@inproceedings{DBLP:conf/fc/DaswaniB99, author = {Neil Daswani and Dan Boneh}, title = {Experimenting with Electronic Commerce on the PalmPilot}, booktitle = {Financial Cryptography}, series = {Lecture Notes in Computer Science}, volume = {1648}, pages = {1--16}, publisher = {Springer}, year = {1999} }
@inproceedings{DBLP:conf/ndss/MalkinWB99, author = {Michael Malkin and Thomas D. Wu and Dan Boneh}, title = {Experimenting with Shared Generation of {RSA} Keys}, booktitle = {{NDSS}}, publisher = {The Internet Society}, year = {1999} }
@inproceedings{DBLP:conf/uss/WuMB99, author = {Thomas D. Wu and Michael Malkin and Dan Boneh}, title = {Building Intrusion-Tolerant Applications}, booktitle = {{USENIX} Security Symposium}, publisher = {{USENIX} Association}, year = {1999} }
@article{DBLP:journals/tit/BonehS98, author = {Dan Boneh and James Shaw}, title = {Collusion-Secure Fingerprinting for Digital Data}, journal = {{IEEE} Trans. Inf. Theory}, volume = {44}, number = {5}, pages = {1897--1905}, year = {1998} }
@inproceedings{DBLP:conf/ants/Boneh98, author = {Dan Boneh}, title = {The Decision Diffie-Hellman Problem}, booktitle = {{ANTS}}, series = {Lecture Notes in Computer Science}, volume = {1423}, pages = {48--63}, publisher = {Springer}, year = {1998} }
@inproceedings{DBLP:conf/ants/BonehH98, author = {Dan Boneh and Jeremy Horwitz}, title = {Generating a Product of Three Primes with an Unknown Factorization}, booktitle = {{ANTS}}, series = {Lecture Notes in Computer Science}, volume = {1423}, pages = {237--251}, publisher = {Springer}, year = {1998} }
@inproceedings{DBLP:conf/asiacrypt/BonehDF98, author = {Dan Boneh and Glenn Durfee and Yair Frankel}, title = {An Attack on {RSA} Given a Small Fraction of the Private Key Bits}, booktitle = {{ASIACRYPT}}, series = {Lecture Notes in Computer Science}, volume = {1514}, pages = {25--34}, publisher = {Springer}, year = {1998} }
@inproceedings{DBLP:conf/eurocrypt/BonehV98, author = {Dan Boneh and Ramarathnam Venkatesan}, title = {Breaking {RSA} May Not Be Equivalent to Factoring}, booktitle = {{EUROCRYPT}}, series = {Lecture Notes in Computer Science}, volume = {1403}, pages = {59--71}, publisher = {Springer}, year = {1998} }
@inproceedings{DBLP:conf/uwec/DaswaniBGKP98, author = {Neil Daswani and Dan Boneh and Hector Garcia{-}Molina and Steven P. Ketchpel and Andreas Paepcke}, title = {{SWAPEROO:} {A} Simple Wallet Architecture for Payments, Exchanges, Refunds, and Other Operations}, booktitle = {{USENIX} Workshop on Electronic Commerce}, publisher = {{USENIX} Association}, year = {1998} }
@inproceedings{DBLP:conf/acisp/RubinBF97, author = {Aviel D. Rubin and Dan Boneh and Kevin Fu}, title = {Revocation of Unread E-mail in an Untrusted Network}, booktitle = {{ACISP}}, series = {Lecture Notes in Computer Science}, volume = {1270}, pages = {62--75}, publisher = {Springer}, year = {1997} }
@inproceedings{DBLP:conf/crypto/BonehF97, author = {Dan Boneh and Matthew K. Franklin}, title = {Efficient Generation of Shared {RSA} Keys (Extended Abstract)}, booktitle = {{CRYPTO}}, series = {Lecture Notes in Computer Science}, volume = {1294}, pages = {425--439}, publisher = {Springer}, year = {1997} }
@inproceedings{DBLP:conf/eurocrypt/BonehDL97, author = {Dan Boneh and Richard A. DeMillo and Richard J. Lipton}, title = {On the Importance of Checking Cryptographic Protocols for Faults (Extended Abstract)}, booktitle = {{EUROCRYPT}}, series = {Lecture Notes in Computer Science}, volume = {1233}, pages = {37--51}, publisher = {Springer}, year = {1997} }
@inproceedings{DBLP:conf/istcs/BonehL97, author = {Dan Boneh and Richard J. Lipton}, title = {Effect of Operators on Straight Line Complexity}, booktitle = {{ISTCS}}, pages = {1--5}, publisher = {{IEEE} Computer Society}, year = {1997} }
@inproceedings{DBLP:conf/soda/BonehV97, author = {Dan Boneh and Ramarathnam Venkatesan}, title = {Rounding in Lattices and its Cryptographic Applications}, booktitle = {{SODA}}, pages = {675--681}, publisher = {{ACM/SIAM}}, year = {1997} }
@article{DBLP:journals/eccc/ECCC-TR97-061, author = {Eli Biham and Dan Boneh and Omer Reingold}, title = {Generalized Diffie-Hellman Modulo a Composite is not Weaker than Factoring}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR97-061}}, year = {1997} }
@article{DBLP:journals/iacr/BihamBR97, author = {Eli Biham and Dan Boneh and Omer Reingold}, title = {Generalized Diffie-Hellman Modulo a Composite is not Weaker than Factoring}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {14}, year = {1997} }
@article{DBLP:journals/dam/BonehDLS96, author = {Dan Boneh and Christopher Dunworth and Richard J. Lipton and Jir{\'{\i}} Sgall}, title = {On the Computational Power of {DNA}}, journal = {Discret. Appl. Math.}, volume = {71}, number = {1-3}, pages = {79--94}, year = {1996} }
@inproceedings{DBLP:conf/crypto/BonehV96, author = {Dan Boneh and Ramarathnam Venkatesan}, title = {Hardness of Computing the Most Significant Bits of Secret Keys in Diffie-Hellman and Related Schemes}, booktitle = {{CRYPTO}}, series = {Lecture Notes in Computer Science}, volume = {1109}, pages = {129--142}, publisher = {Springer}, year = {1996} }
@inproceedings{DBLP:conf/crypto/BonehL96, author = {Dan Boneh and Richard J. Lipton}, title = {Algorithms for Black-Box Fields and their Application to Cryptography (Extended Abstract)}, booktitle = {{CRYPTO}}, series = {Lecture Notes in Computer Science}, volume = {1109}, pages = {283--297}, publisher = {Springer}, year = {1996} }
@inproceedings{DBLP:conf/dimacs/BaumB96, author = {Eric B. Baum and Dan Boneh}, title = {Running dynamic programming algorithms on a {DNA} computer}, booktitle = {{DNA} Based Computers}, series = {{DIMACS} Series in Discrete Mathematics and Theoretical Computer Science}, volume = {44}, pages = {77--85}, publisher = {{DIMACS/AMS}}, year = {1996} }
@inproceedings{DBLP:conf/dimacs/BonehDLS96, author = {Dan Boneh and Christopher Dunworth and Richard J. Lipton and Jir{\'{\i}} Sgall}, title = {Making {DNA} computers error resistant}, booktitle = {{DNA} Based Computers}, series = {{DIMACS} Series in Discrete Mathematics and Theoretical Computer Science}, volume = {44}, pages = {163--170}, publisher = {{DIMACS/AMS}}, year = {1996} }
@inproceedings{DBLP:conf/uss/BonehL96, author = {Dan Boneh and Richard J. Lipton}, title = {A Revocable Backup System}, booktitle = {{USENIX} Security Symposium}, publisher = {{USENIX} Association}, year = {1996} }
@inproceedings{DBLP:conf/colt/BaumBG95, author = {Eric B. Baum and Dan Boneh and Charles Garrett}, title = {On Genetic Algorithms}, booktitle = {{COLT}}, pages = {230--239}, publisher = {{ACM}}, year = {1995} }
@inproceedings{DBLP:conf/colt/Boneh95, author = {Dan Boneh}, title = {Learning Using Group Representations (Extended Abstract)}, booktitle = {{COLT}}, pages = {418--426}, publisher = {{ACM}}, year = {1995} }
@inproceedings{DBLP:conf/crypto/BonehL95, author = {Dan Boneh and Richard J. Lipton}, title = {Quantum Cryptanalysis of Hidden Linear Functions (Extended Abstract)}, booktitle = {{CRYPTO}}, series = {Lecture Notes in Computer Science}, volume = {963}, pages = {424--437}, publisher = {Springer}, year = {1995} }
@inproceedings{DBLP:conf/crypto/BonehS95, author = {Dan Boneh and James Shaw}, title = {Collusion-Secure Fingerprinting for Digital Data (Extended Abstract)}, booktitle = {{CRYPTO}}, series = {Lecture Notes in Computer Science}, volume = {963}, pages = {452--465}, publisher = {Springer}, year = {1995} }
@inproceedings{DBLP:conf/dimacs/BonehDL95, author = {Dan Boneh and Christopher Dunworth and Richard J. Lipton}, title = {Breaking {DES} using a molecular computer}, booktitle = {{DNA} Based Computers}, series = {{DIMACS} Series in Discrete Mathematics and Theoretical Computer Science}, volume = {27}, pages = {37--65}, publisher = {{DIMACS/AMS}}, year = {1995} }
@inproceedings{DBLP:conf/colt/BonehL93, author = {Dan Boneh and Richard J. Lipton}, title = {Amplification of Weak Learning under the Uniform Distribution}, booktitle = {{COLT}}, pages = {347--351}, publisher = {{ACM}}, year = {1993} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.