Please note: This is a beta version of the new dblp website.
You can find the classic dblp view of this page here.
You can find the classic dblp view of this page here.
Dan Boneh
2010 – today
- 2013
[c122]Dan Boneh, Craig Gentry, Shai Halevi, Frank Wang, David J. Wu: Private Database Queries Using Somewhat Homomorphic Encryption. ACNS 2013: 102-118
[c121]Dan Boneh, Mark Zhandry: Secure Signatures and Chosen Ciphertext Security in a Quantum Computing World. CRYPTO (2) 2013: 361-379
[c120]Martín Abadi, Dan Boneh, Ilya Mironov, Ananth Raghunathan, Gil Segev: Message-Locked Encryption for Lock-Dependent Messages. CRYPTO (1) 2013: 374-391
[c119]Dan Boneh, Kevin Lewi, Hart William Montgomery, Ananth Raghunathan: Key Homomorphic PRFs and Their Applications. CRYPTO (1) 2013: 410-428
[c118]Dan Boneh, Ananth Raghunathan, Gil Segev: Function-Private Identity-Based Encryption: Hiding the Function in Functional Encryption. CRYPTO (2) 2013: 461-478
[c117]
[c116]David Fifield, Gabi Nakibly, Dan Boneh: OSS: Using Online Scanning Services for Censorship Circumvention. Privacy Enhancing Technologies 2013: 185-204
[c115]Valeria Nikolaenko, Udi Weinsberg, Stratis Ioannidis, Marc Joye, Dan Boneh, Nina Taft: Privacy-Preserving Ridge Regression on Hundreds of Millions of Records. IEEE Symposium on Security and Privacy 2013: 334-348
[e5]Dan Boneh, Tim Roughgarden, Joan Feigenbaum (Eds.): Symposium on Theory of Computing Conference, STOC'13, Palo Alto, CA, USA, June 1-4, 2013. ACM 2013, ISBN 978-1-4503-2029-0
[i36]Henry Corrigan-Gibbs, Wendy Mu, Dan Boneh, Bryan Ford: Ensuring High-Quality Randomness in Cryptographic Key Generation. CoRR abs/1309.7366 (2013)
[i35]Dan Boneh, Mark Zhandry: Secure Signatures and Chosen Ciphertext Security in a Post-Quantum World. IACR Cryptology ePrint Archive 2013: 88 (2013)
[i34]Dan Boneh, Ananth Raghunathan, Gil Segev: Function-Private Identity-Based Encryption: Hiding the Function in Functional Encryption. IACR Cryptology ePrint Archive 2013: 283 (2013)
[i33]Dan Boneh, Brent Waters: Constrained Pseudorandom Functions and Their Applications. IACR Cryptology ePrint Archive 2013: 352 (2013)
[i32]Dan Boneh, Ananth Raghunathan, Gil Segev: Function-Private Subspace-Membership Encryption and Its Applications. IACR Cryptology ePrint Archive 2013: 403 (2013)
[i31]Dan Boneh, Craig Gentry, Shai Halevi, Frank Wang, David J. Wu: Private Database Queries Using Somewhat Homomorphic Encryption. IACR Cryptology ePrint Archive 2013: 422 (2013)- 2012
[j23]Dan Boneh, Amit Sahai, Brent Waters: Functional encryption: a new vision for public-key cryptography. Commun. ACM 55(11): 56-64 (2012)
[j22]Carl E. Landwehr, Dan Boneh, John C. Mitchell, Steven M. Bellovin, Susan Landau, Michael E. Lesk: Privacy and Cybersecurity: The Next 100 Years. Proceedings of the IEEE 100(Centennial-Issue): 1659-1673 (2012)
[c114]
[c113]Martin Georgiev, Subodh Iyengar, Suman Jana, Rishita Anubhai, Dan Boneh, Vitaly Shmatikov: The most dangerous code in the world: validating SSL certificates in non-browser software. ACM Conference on Computer and Communications Security 2012: 38-49
[c112]Zachary Weinberg, Jeffrey Wang, Vinod Yegneswaran, Linda Briesemeister, Steven Cheung, Frank Wang, Dan Boneh: StegoTorus: a camouflage proxy for the Tor anonymity system. ACM Conference on Computer and Communications Security 2012: 109-120
[c111]Dan Boneh, Gil Segev, Brent Waters: Targeted malleability: homomorphic encryption for restricted computations. ITCS 2012: 350-366
[c110]
[c109]Emily Stark, Lin-Shung Huang, Dinesh Israni, Collin Jackson, Dan Boneh: The Case for Prefetching and Prevalidating TLS Server Certificates. NDSS 2012
[c108]David Fifield, Nate Hardison, Jonathan Ellithorpe, Emily Stark, Dan Boneh, Roger Dingledine, Phil Porras: Evading Censorship with Browser-Based Proxies. Privacy Enhancing Technologies 2012: 239-258
[c107]Jae Hyun Ahn, Dan Boneh, Jan Camenisch, Susan Hohenberger, Abhi Shelat, Brent Waters: Computing on Authenticated Data. TCC 2012: 1-20
[c106]Narendran Thiagarajan, Gaurav Aggarwal, Angela Nicoara, Dan Boneh, Jatinder Pal Singh: Who killed my battery?: analyzing mobile browser energy consumption. WWW 2012: 41-50
[c105]Elie Bursztein, Chinmay Soman, Dan Boneh, John C. Mitchell: SessionJuggler: secure web login from an untrusted terminal using session hijacking. WWW 2012: 321-330
[i30]Arvind Narayanan, Vincent Toubiana, Solon Barocas, Helen Nissenbaum, Dan Boneh: A Critical Look at Decentralized Personal Data Architectures. CoRR abs/1202.4503 (2012)
[i29]Dan Boneh, Mark Zhandry: Quantum-Secure Message Authentication Codes. Electronic Colloquium on Computational Complexity (ECCC) 19: 136 (2012)
[i28]Dan Boneh, Mark Zhandry: Quantum-Secure Message Authentication Codes. IACR Cryptology ePrint Archive 2012: 606 (2012)- 2011
[j21]
[j20]Dan Boneh, Xavier Boyen: Efficient Selective Identity-Based Encryption Without Random Oracles. J. Cryptology 24(4): 659-693 (2011)
[c104]Dan Boneh, Özgür Dagdelen, Marc Fischlin, Anja Lehmann, Christian Schaffner, Mark Zhandry: Random Oracles in a Quantum World. ASIACRYPT 2011: 41-69
[c103]Dan Boneh, David Mandell Freeman: Homomorphic Signatures for Polynomial Functions. EUROCRYPT 2011: 149-168
[c102]Arvind Narayanan, Narendran Thiagarajan, Mugdha Lakhani, Michael Hamburg, Dan Boneh: Location Privacy via Private Proximity Testing. NDSS 2011
[c101]Dan Boneh, David Mandell Freeman: Linearly Homomorphic Signatures over Binary Fields and New Tools for Lattice-Based Signatures. Public Key Cryptography 2011: 1-16
[c100]Elie Bursztein, Mike Hamburg, Jocelyn Lagarenne, Dan Boneh: OpenConflict: Preventing Real Time Map Hacks in Online Games. IEEE Symposium on Security and Privacy 2011: 506-520
[c99]Dan Boneh, Amit Sahai, Brent Waters: Functional Encryption: Definitions and Challenges. TCC 2011: 253-273
[c98]Hristo Bojinov, Dan Boneh, Rich Cannings, Iliyan Malchev: Address space randomization for mobile devices. WISEC 2011: 127-138
[r21]
[r20]Dan Boneh: BLS Short Digital Signatures. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 158-159
[r19]Dan Boneh: Blum-Blum-Shub Pseudorandom Bit Generator. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 160-161
[r18]Dan Boneh: Blum-Goldwasser Public Key Encryption System. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 161-162
[r17]Dan Boneh: Cramer-Shoup Public-Key System. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 269-270
[r16]Dan Boneh: Digital Signature Standard. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 347
[r15]Dan Boneh: ElGamal Digital Signature Scheme. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 395-396
[r14]Dan Boneh: Rabin Digital Signature Scheme. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1014-1015
[r13]Dan Boneh: Schnorr Digital Signature Scheme. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1082-1083
[r12]Dan Boneh: Secure Signatures from the "Strong RSA" Assumption. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1134-1135
[r11]
[i27]Dan Boneh, David Mandell Freeman: Homomorphic Signatures for Polynomial Functions. IACR Cryptology ePrint Archive 2011: 18 (2011)
[i26]Jae Hyun Ahn, Dan Boneh, Jan Camenisch, Susan Hohenberger, Abhi Shelat, Brent Waters: Computing on Authenticated Data. IACR Cryptology ePrint Archive 2011: 96 (2011)
[i25]Dan Boneh, Gil Segev, Brent Waters: Targeted Malleability: Homomorphic Encryption for Restricted Computations. IACR Cryptology ePrint Archive 2011: 311 (2011)- 2010
[j19]Hristo Bojinov, Elie Bursztein, Dan Boneh: The emergence of cross channel scripting. Commun. ACM 53(8): 105-113 (2010)
[c97]Dan Boneh, Hart William Montgomery, Ananth Raghunathan: Algebraic pseudorandom functions with improved efficiency from the augmented cascade. ACM Conference on Computer and Communications Security 2010: 131-140
[c96]Shweta Agrawal, Dan Boneh, Xavier Boyen: Lattice Basis Delegation in Fixed Dimension and Shorter-Ciphertext Hierarchical IBE. CRYPTO 2010: 98-115
[c95]Dan Boneh, Aggelos Kiayias, Hart William Montgomery: Robust fingerprinting codes: a near optimal construction. Digital Rights Management Workshop 2010: 3-12
[c94]Hristo Bojinov, Elie Bursztein, Xavier Boyen, Dan Boneh: Kamouflage: Loss-Resistant Password Management. ESORICS 2010: 286-302
[c93]Shweta Agrawal, Dan Boneh, Xavier Boyen: Efficient Lattice (H)IBE in the Standard Model. EUROCRYPT 2010: 553-572
[c92]Ben Dodson, Debangsu Sengupta, Dan Boneh, Monica S. Lam: Secure, Consumer-Friendly Web Authentication and Payments with a Phone. MobiCASE 2010: 17-38
[c91]Vincent Toubiana, Arvind Narayanan, Dan Boneh, Helen Nissenbaum, Solon Barocas: Adnostic: Privacy Preserving Targeted Advertising. NDSS 2010
[c90]Shweta Agrawal, Dan Boneh, Xavier Boyen, David Mandell Freeman: Preventing Pollution Attacks in Multi-source Network Coding. Public Key Cryptography 2010: 161-176
[c89]Gaurav Aggarwal, Elie Bursztein, Collin Jackson, Dan Boneh: An Analysis of Private Browsing Modes in Modern Browsers. USENIX Security Symposium 2010: 79-94
[c88]Andrea Bittau, Michael Hamburg, Mark Handley, David Mazières, Dan Boneh: The Case for Ubiquitous Transport-Level Encryption. USENIX Security Symposium 2010: 403-418
[i24]Shweta Agrawal, Dan Boneh, Xavier Boyen, David Mandell Freeman: Preventing Pollution Attacks in Multi-Source Network Coding. IACR Cryptology ePrint Archive 2010: 183 (2010)
[i23]Dan Boneh, Özgür Dagdelen, Marc Fischlin, Anja Lehmann, Christian Schaffner, Mark Zhandry: Random Oracles in a Quantum World. IACR Cryptology ePrint Archive 2010: 428 (2010)
[i22]Dan Boneh, Hart William Montgomery, Ananth Raghunathan: Algebraic Pseudorandom Functions with Improved Efficiency from the Augmented Cascade. IACR Cryptology ePrint Archive 2010: 442 (2010)
[i21]Dan Boneh, David Mandell Freeman: Linearly Homomorphic Signatures over Binary Fields and New Tools for Lattice-Based Signatures. IACR Cryptology ePrint Archive 2010: 453 (2010)
[i20]Dan Boneh, Amit Sahai, Brent Waters: Functional Encryption: Definitions and Challenges. IACR Cryptology ePrint Archive 2010: 543 (2010)
2000 – 2009
- 2009
[j18]Collin Jackson, Adam Barth, Andrew Bortz, Weidong Shao, Dan Boneh: Protecting browsers from DNS rebinding attacks. TWEB 3(1): 2 (2009)
[c87]Shweta Agrawal, Dan Boneh: Homomorphic MACs: MAC-Based Integrity for Network Coding. ACNS 2009: 292-305
[c86]
[c85]Hristo Bojinov, Elie Bursztein, Dan Boneh: XCS: cross channel scripting and its impact on web applications. ACM Conference on Computer and Communications Security 2009: 420-431
[c84]Dan Boneh, David Mandell Freeman, Jonathan Katz, Brent Waters: Signing a Linear Subspace: Signature Schemes for Network Coding. Public Key Cryptography 2009: 68-87
[i19]Dan Boneh, Karl Rubin, Alice Silverberg: Finding composite order ordinary elliptic curves using the Cocks-Pinch method. IACR Cryptology ePrint Archive 2009: 533 (2009)- 2008
[j17]Dan Boneh, Xavier Boyen: Short Signatures Without Random Oracles and the SDH Assumption in Bilinear Groups. J. Cryptology 21(2): 149-177 (2008)
[c83]Dan Boneh, Michael Hamburg: Generalized Identity Based and Broadcast Encryption Schemes. ASIACRYPT 2008: 455-470
[c82]Xiaoxin Chen, Tal Garfinkel, E. Christopher Lewis, Pratap Subrahmanyam, Carl A. Waldspurger, Dan Boneh, Jeffrey S. Dwoskin, Dan R. K. Ports: Overshadow: a virtualization-based approach to retrofitting protection in commodity operating systems. ASPLOS 2008: 2-13
[c81]Dan Boneh, Moni Naor: Traitor tracing with constant size ciphertext. ACM Conference on Computer and Communications Security 2008: 501-510
[c80]Dan Boneh, Shai Halevi, Michael Hamburg, Rafail Ostrovsky: Circular-Secure Encryption from Decision Diffie-Hellman. CRYPTO 2008: 108-125
[c79]Dan Boneh, Periklis A. Papakonstantinou, Charles Rackoff, Yevgeniy Vahlis, Brent Waters: On the Impossibility of Basing Identity Based Encryption on Trapdoor Permutations. FOCS 2008: 283-292
[e4]Johannes Blömer, Dan Boneh, Ronald Cramer, Ueli M. Maurer (Eds.): Cryptography, 16.09. - 21.09.2007. Dagstuhl Seminar Proceedings 07381, Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany 2008
[e3]Dan Boneh, Tal Garfinkel, Dug Song (Eds.): 2nd USENIX Workshop on Offensive Technologies, July 28, 2008, San Jose, CA, USA, Proceedings. USENIX Association 2008
[i18]Dan Boneh, David Mandell Freeman, Jonathan Katz, Brent Waters: Signing a Linear Subspace: Signature Schemes for Network Coding. IACR Cryptology ePrint Archive 2008: 316 (2008)- 2007
[j16]Dan Boneh, Ran Canetti, Shai Halevi, Jonathan Katz: Chosen-Ciphertext Security from Identity-Based Encryption. SIAM J. Comput. 36(5): 1301-1328 (2007)
[c78]Daniel V. Bailey, Dan Boneh, Eu-Jin Goh, Ari Juels: Covert channels in privacy-preserving identification systems. ACM Conference on Computer and Communications Security 2007: 297-306
[c77]Collin Jackson, Adam Barth, Andrew Bortz, Weidong Shao, Dan Boneh: Protecting browsers from dns rebinding attacks. ACM Conference on Computer and Communications Security 2007: 421-431
[c76]Dan Boneh, Eyal Kushilevitz, Rafail Ostrovsky, William E. Skeith III: Public Key Encryption That Allows PIR Queries. CRYPTO 2007: 50-67
[c75]Johannes Blömer, Dan Boneh, Ronald Cramer, Ueli M. Maurer: 07381 Executive Summary - Cryptography. Cryptography 2007
[c74]Johannes Blömer, Dan Boneh, Ronald Cramer, Ueli M. Maurer: 07381 Abstracts Collection -- Cryptography. Cryptography 2007
[c73]
[c72]Dan Boneh, Craig Gentry, Michael Hamburg: Space-Efficient Identity Based Encryption Without Pairings. FOCS 2007: 647-657
[c71]John Bethencourt, Dan Boneh, Brent Waters: Cryptographic Methods for Storing Ballots on a Voting Machine. NDSS 2007
[c70]
[c69]Manu Kumar, Tal Garfinkel, Dan Boneh, Terry Winograd: Reducing shoulder-surfing by using gaze-based password entry. SOUPS 2007: 13-19
[c68]Dan Boneh, Brent Waters: Conjunctive, Subset, and Range Queries on Encrypted Data. TCC 2007: 535-554
[c67]
[c66]
[i17]Dan Boneh, Eyal Kushilevitz, Rafail Ostrovsky, William E. Skeith III: Public Key Encryption that Allows PIR Queries. IACR Cryptology ePrint Archive 2007: 73 (2007)
[i16]Dan Boneh, Craig Gentry, Michael Hamburg: Space-Efficient Identity Based Encryption Without Pairings. IACR Cryptology ePrint Archive 2007: 177 (2007)- 2006
[c65]Dan Boneh, Brent Waters: A fully collusion resistant broadcast, trace, and revoke system. ACM Conference on Computer and Communications Security 2006: 211-220
[c64]Louis Kruger, Somesh Jha, Eu-Jin Goh, Dan Boneh: Secure function evaluation with ordered binary decision diagrams. ACM Conference on Computer and Communications Security 2006: 410-420
[c63]Dan Boneh, Xavier Boyen: On the Impossibility of Efficiently Combining Collision Resistant Hash Functions. CRYPTO 2006: 570-583
[c62]Dan Boneh, Xavier Boyen, Shai Halevi: Chosen Ciphertext Secure Public Key Threshold Encryption Without Random Oracles. CT-RSA 2006: 226-243
[c61]Dan Boneh, Amit Sahai, Brent Waters: Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys. EUROCRYPT 2006: 573-592
[c60]Adam Barth, Dan Boneh, Brent Waters: Privacy in Encrypted Content Distribution Using Private Broadcast Encryption. Financial Cryptography 2006: 52-64
[c59]Dan Boneh, Emily Shen, Brent Waters: Strongly Unforgeable Signatures Based on Computational Diffie-Hellman. Public Key Cryptography 2006: 229-240
[c58]Collin Jackson, Andrew Bortz, Dan Boneh, John C. Mitchell: Protecting browser state from web privacy attacks. WWW 2006: 737-744
[i15]Dan Boneh, Amit Sahai, Brent Waters: Fully Collusion Resistant Traitor Tracing. IACR Cryptology ePrint Archive 2006: 45 (2006)
[i14]Dan Boneh, Brent Waters: Conjunctive, Subset, and Range Queries on Encrypted Data. IACR Cryptology ePrint Archive 2006: 287 (2006)
[i13]Dan Boneh, Brent Waters: A Fully Collusion Resistant Broadcast, Trace, and Revoke System. IACR Cryptology ePrint Archive 2006: 298 (2006)- 2005
[j15]David Brumley, Dan Boneh: Remote timing attacks are practical. Computer Networks 48(5): 701-716 (2005)
[j14]Ninghui Li, Wenliang Du, Dan Boneh: Oblivious signature-based envelope. Distributed Computing 17(4): 293-302 (2005)
[c57]Dan Boneh, Craig Gentry, Brent Waters: Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys. CRYPTO 2005: 258-275
[c56]Dan Boneh, Jonathan Katz: Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity-Based Encryption. CT-RSA 2005: 87-103
[c55]Dan Boneh, Xavier Boyen, Eu-Jin Goh: Hierarchical Identity Based Encryption with Constant Size Ciphertext. EUROCRYPT 2005: 440-456
[c54]
[r10]
[r9]Dan Boneh: Blum-Blum-Shub Pseudorandom Bit Generator. Encyclopedia of Cryptography and Security 2005
[r8]Dan Boneh: Blum-Goldwasser Public Key Encryption System. Encyclopedia of Cryptography and Security 2005
[r7]
[r6]
[r5]
[r4]
[r3]
[r2]Dan Boneh: Secure signatures from the "strong RSA" assumption. Encyclopedia of Cryptography and Security 2005
[r1]
[i12]Dan Boneh, Xavier Boyen, Eu-Jin Goh: Hierarchical Identity Based Encryption with Constant Size Ciphertext. IACR Cryptology ePrint Archive 2005: 15 (2005)
[i11]Dan Boneh, Craig Gentry, Brent Waters: Collusion Resistant Broadcast Encryption With Short Ciphertexts and Private Keys. IACR Cryptology ePrint Archive 2005: 18 (2005)- 2004
[j13]Dan Boneh, Joan Feigenbaum, Abraham Silberschatz, Rebecca N. Wright: PORTIA: Privacy, Obligations, and Rights in Technologies of Information Assessment. IEEE Data Eng. Bull. 27(1): 10-18 (2004)
[j12]Dan Boneh, Ben Lynn, Hovav Shacham: Short Signatures from the Weil Pairing. J. Cryptology 17(4): 297-319 (2004)
[j11]Hovav Shacham, Dan Boneh, Eric Rescorla: Client-side caching for TLS. ACM Trans. Inf. Syst. Secur. 7(4): 553-575 (2004)
[j10]Dan Boneh, Xuhua Ding, Gene Tsudik: Fine-grained control of security capabilities. ACM Trans. Internet Techn. 4(1): 60-82 (2004)
[c53]Dan Boneh, Hovav Shacham: Group signatures with verifier-local revocation. ACM Conference on Computer and Communications Security 2004: 168-177
[c52]Hovav Shacham, Matthew Page, Ben Pfaff, Eu-Jin Goh, Nagendra Modadugu, Dan Boneh: On the effectiveness of address-space randomization. ACM Conference on Computer and Communications Security 2004: 298-307
[c51]
[c50]Dan Boneh, Xavier Boyen: Secure Identity Based Encryption Without Random Oracles. CRYPTO 2004: 443-459
[c49]
[c48]Dan Boneh, Xavier Boyen: Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles. EUROCRYPT 2004: 223-238
[c47]Dan Boneh, Giovanni Di Crescenzo, Rafail Ostrovsky, Giuseppe Persiano: Public Key Encryption with Keyword Search. EUROCRYPT 2004: 506-522
[i10]Dan Boneh, Xavier Boyen: Short Signatures Without Random Oracles. IACR Cryptology ePrint Archive 2004: 171 (2004)
[i9]Dan Boneh, Xavier Boyen: Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles. IACR Cryptology ePrint Archive 2004: 172 (2004)
[i8]Dan Boneh, Xavier Boyen: Secure Identity Based Encryption Without Random Oracles. IACR Cryptology ePrint Archive 2004: 173 (2004)
[i7]Dan Boneh, Xavier Boyen, Hovav Shacham: Short Group Signatures. IACR Cryptology ePrint Archive 2004: 174 (2004)
[i6]Dan Boneh, Jonathan Katz: Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity-Based Encryption. IACR Cryptology ePrint Archive 2004: 261 (2004)- 2003
[j9]Dan Boneh, Matthew K. Franklin: Identity-Based Encryption from the Weil Pairing. SIAM J. Comput. 32(3): 586-615 (2003)
[c46]Dan Boneh, Ilya Mironov, Victor Shoup: A Secure Signature Scheme from Bilinear Maps. CT-RSA 2003: 98-110
[c45]Dan Boneh, Craig Gentry, Ben Lynn, Hovav Shacham: Aggregate and Verifiably Encrypted Signatures from Bilinear Maps. EUROCRYPT 2003: 416-432
[c44]Tal Garfinkel, Mendel Rosenblum, Dan Boneh: Flexible OS Support and Applications for Trusted Computing. HotOS 2003: 145-150
[c43]Eu-Jin Goh, Dan Boneh, Benny Pinkas, Philippe Golle: The Design and Implementation of Protocol-Based Hidden Key Recovery. ISC 2003: 165-179
[c42]Eu-Jin Goh, Hovav Shacham, Nagendra Modadugu, Dan Boneh: SiRiUS: Securing Remote Untrusted Storage. NDSS 2003
[c41]
[c40]Tal Garfinkel, Ben Pfaff, Jim Chow, Mendel Rosenblum, Dan Boneh: Terra: a virtual machine-based platform for trusted computing. SOSP 2003: 193-206
[e2]Dan Boneh (Ed.): Advances in Cryptology - CRYPTO 2003, 23rd Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 2003, Proceedings. Lecture Notes in Computer Science 2729, Springer 2003, ISBN 3-540-40674-3
[i5]Dan Boneh, Giovanni Di Crescenzo, Rafail Ostrovsky, Giuseppe Persiano: Public Key Encryption with keyword Search. IACR Cryptology ePrint Archive 2003: 195 (2003)- 2002
[j8]Dan Boneh: Finding Smooth Integers in Short Intervals Using CRT Decoding. J. Comput. Syst. Sci. 64(4): 768-784 (2002)
[c39]Philippe Golle, Sheng Zhong, Dan Boneh, Markus Jakobsson, Ari Juels: Optimistic Mixing for Exit-Polls. ASIACRYPT 2002: 451-465
[c38]Matthias Jacob, Dan Boneh, Edward W. Felten: Attacking an Obfuscated Cipher by Injecting Faults. Digital Rights Management Workshop 2002: 16-31
[c37]Dan Boneh, Philippe Golle: Almost entirely correct mixing with applications to voting. ACM Conference on Computer and Communications Security 2002: 68-77
[c36]
[e1]Dan Boneh (Ed.): Proceedings of the 11th USENIX Security Symposium, San Francisco, CA, USA, August 5-9, 2002. USENIX 2002, ISBN 1-931971-00-5
[i4]Dan Boneh, Alice Silverberg: Applications of Multilinear Forms to Cryptography. IACR Cryptology ePrint Archive 2002: 80 (2002)
[i3]Dan Boneh, Craig Gentry, Ben Lynn, Hovav Shacham: Aggregate and Verifiably Encrypted Signatures from Bilinear Maps. IACR Cryptology ePrint Archive 2002: 175 (2002)- 2001
[j7]Eric B. Baum, Dan Boneh, Charles Garrett: Where Genetic Algorithms Excel. Evolutionary Computation 9(1): 93-124 (2001)
[j6]Dan Boneh, Matthew K. Franklin: Efficient generation of shared RSA keys. J. ACM 48(4): 702-722 (2001)
[j5]Dan Boneh, Richard A. DeMillo, Richard J. Lipton: On the Importance of Eliminating Errors in Cryptographic Computations. J. Cryptology 14(2): 101-119 (2001)
[c35]Dan Boneh, Shai Halevi, Nick Howgrave-Graham: The Modular Inversion Hidden Number Problem. ASIACRYPT 2001: 36-51
[c34]
[c33]Dan Boneh, Igor Shparlinski: On the Unpredictability of Bits of the Elliptic Curve Diffie--Hellman Scheme. CRYPTO 2001: 201-212
[c32]Dan Boneh, Matthew K. Franklin: Identity-Based Encryption from the Weil Pairing. CRYPTO 2001: 213-229
[c31]
[c30]
[c29]Dan Boneh, Glenn Durfee, Matthew K. Franklin: Lower Bounds for Multicast Message Authentication. EUROCRYPT 2001: 437-452
[c28]Dan Boneh, Xuhua Ding, Gene Tsudik, Chi-Ming Wong: A Method for Fast Revocation of Public Key Certificates and Security Capabilities. USENIX Security Symposium 2001
[i2]Dan Boneh, Matthew K. Franklin: Identity Based Encryption From the Weil Pairing. IACR Cryptology ePrint Archive 2001: 90 (2001)- 2000
[j4]Dan Boneh, Glenn Durfee: Cryptanalysis of RSA with private key d less than N0.292. IEEE Transactions on Information Theory 46(4): 1339-1349 (2000)
[c27]Dan Boneh, Antoine Joux, Phong Q. Nguyen: Why Textbook ElGamal and RSA Encryption Are Insecure. ASIACRYPT 2000: 30-43
[c26]David Lie, Chandramohan A. Thekkath, Mark Mitchell, Patrick Lincoln, Dan Boneh, John C. Mitchell, Mark Horowitz: Architectural Support for Copy and Tamper Resistant Software. ASPLOS 2000: 168-177
[c25]
[c24]Dan Boneh, Nagendra Modadugu, Michael Kim: Generating RSA Keys on a Handheld Using an Untrusted Server. INDOCRYPT 2000: 271-282
[c23]
1990 – 1999
- 1999
[j3]Eli Biham, Dan Boneh, Omer Reingold: Breaking Generalized Diffie-Hellmann Modulo a Composite is no Easier Than Factoring. Inf. Process. Lett. 70(2): 83-87 (1999)
[c22]Dan Boneh, Matthew K. Franklin: Anonymous Authentication with Subset Queries (extended abstract). ACM Conference on Computer and Communications Security 1999: 113-119
[c21]
[c20]Dan Boneh, Matthew K. Franklin: An Efficient Public Key Traitor Tracing Scheme. CRYPTO 1999: 338-353
[c19]Dan Boneh, Glenn Durfee: Cryptanalysis of RSA with Private Key d Less than N0.292. EUROCRYPT 1999: 1-11
[c18]Neil Daswani, Dan Boneh: Experimenting with Electronic Commerce on the PalmPilot. Financial Cryptography 1999: 1-16
[c17]Michael Malkin, Thomas D. Wu, Dan Boneh: Experimenting with Shared Generation of RSA Keys. NDSS 1999- 1998
[j2]Dan Boneh, James Shaw: Collusion-Secure Fingerprinting for Digital Data. IEEE Transactions on Information Theory 44(5): 1897-1905 (1998)
[c16]
[c15]Dan Boneh, Jeremy Horwitz: Generating a Product of Three Primes with an Unknown Factorization. ANTS 1998: 237-251
[c14]Dan Boneh, Glenn Durfee, Yair Frankel: An Attack on RSA Given a Small Fraction of the Private Key Bits. ASIACRYPT 1998: 25-34
[c13]Dan Boneh, Ramarathnam Venkatesan: Breaking RSA May Not Be Equivalent to Factoring. EUROCRYPT 1998: 59-71- 1997
[c12]Aviel D. Rubin, Dan Boneh, Kevin Fu: Revocation of Unread E-mail in an Untrusted Network. ACISP 1997: 62-75
[c11]Dan Boneh, Matthew K. Franklin: Efficient Generation of Shared RSA Keys (Extended Abstract). CRYPTO 1997: 425-439
[c10]Dan Boneh, Richard A. DeMillo, Richard J. Lipton: On the Importance of Checking Cryptographic Protocols for Faults (Extended Abstract). EUROCRYPT 1997: 37-51
[c9]
[c8]Dan Boneh, Ramarathnam Venkatesan: Rounding in Lattices and its Cryptographic Applications. SODA 1997: 675-681
[i1]Eli Biham, Dan Boneh, Omer Reingold: Generalized Diffie-Hellman Modulo a Composite is not Weaker than Factoring. Electronic Colloquium on Computational Complexity (ECCC) 4(61) (1997)- 1996
[j1]Dan Boneh, Christopher Dunworth, Richard J. Lipton, Jiri Sgall: On the Computational Power of DNA. Discrete Applied Mathematics 71(1-3): 79-94 (1996)
[c7]Dan Boneh, Ramarathnam Venkatesan: Hardness of Computing the Most Significant Bits of Secret Keys in Diffie-Hellman and Related Schemes. CRYPTO 1996: 129-142
[c6]Dan Boneh, Richard J. Lipton: Algorithms for Black-Box Fields and their Application to Cryptography (Extended Abstract). CRYPTO 1996: 283-297- 1995
[c5]
[c4]
[c3]Dan Boneh, Richard J. Lipton: Quantum Cryptanalysis of Hidden Linear Functions (Extended Abstract). CRYPTO 1995: 424-437
[c2]Dan Boneh, James Shaw: Collusion-Secure Fingerprinting for Digital Data (Extended Abstract). CRYPTO 1995: 452-465- 1993
[c1]Dan Boneh, Richard J. Lipton: Amplification of Weak Learning under the Uniform Distribution. COLT 1993: 347-351
Coauthor Index
data released under the ODC-BY 1.0 license. See also our legal information page
last updated on 2013-10-17 21:26 CEST by the dblp team



