Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Eu-Jin Goh
@phdthesis{DBLP:phd/us/Goh07, author = {Eu{-}Jin Goh}, title = {Encryption schemes from bilinear maps}, school = {Stanford University, {USA}}, year = {2007}, url = {https://searchworks.stanford.edu/view/7139555}, timestamp = {Fri, 02 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/us/Goh07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/GohJKW07, author = {Eu{-}Jin Goh and Stanislaw Jarecki and Jonathan Katz and Nan Wang}, title = {Efficient Signature Schemes with Tight Reductions to the Diffie-Hellman Problems}, journal = {J. Cryptol.}, volume = {20}, number = {4}, pages = {493--514}, year = {2007}, url = {https://doi.org/10.1007/s00145-007-0549-3}, doi = {10.1007/S00145-007-0549-3}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/GohJKW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BaileyBGJ07, author = {Daniel V. Bailey and Dan Boneh and Eu{-}Jin Goh and Ari Juels}, editor = {Peng Ning and Sabrina De Capitani di Vimercati and Paul F. Syverson}, title = {Covert channels in privacy-preserving identification systems}, booktitle = {Proceedings of the 2007 {ACM} Conference on Computer and Communications Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007}, pages = {297--306}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1315245.1315283}, doi = {10.1145/1315245.1315283}, timestamp = {Tue, 10 Nov 2020 20:00:14 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BaileyBGJ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KrugerJGB06, author = {Louis Kruger and Somesh Jha and Eu{-}Jin Goh and Dan Boneh}, editor = {Ari Juels and Rebecca N. Wright and Sabrina De Capitani di Vimercati}, title = {Secure function evaluation with ordered binary decision diagrams}, booktitle = {Proceedings of the 13th {ACM} Conference on Computer and Communications Security, {CCS} 2006, Alexandria, VA, USA, October 30 - November 3, 2006}, pages = {410--420}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1180405.1180455}, doi = {10.1145/1180405.1180455}, timestamp = {Wed, 24 Feb 2021 17:28:35 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KrugerJGB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BonehBG05, author = {Dan Boneh and Xavier Boyen and Eu{-}Jin Goh}, editor = {Ronald Cramer}, title = {Hierarchical Identity Based Encryption with Constant Size Ciphertext}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3494}, pages = {440--456}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11426639\_26}, doi = {10.1007/11426639\_26}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BonehBG05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/GohG05, author = {Eu{-}Jin Goh and Philippe Golle}, editor = {Andrew S. Patrick and Moti Yung}, title = {Event Driven Private Counters}, booktitle = {Financial Cryptography and Data Security, 9th International Conference, {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March 3, 2005, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3570}, pages = {313--327}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11507840\_27}, doi = {10.1007/11507840\_27}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/GohG05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/BonehGN05, author = {Dan Boneh and Eu{-}Jin Goh and Kobbi Nissim}, editor = {Joe Kilian}, title = {Evaluating 2-DNF Formulas on Ciphertexts}, booktitle = {Theory of Cryptography, Second Theory of Cryptography Conference, {TCC} 2005, Cambridge, MA, USA, February 10-12, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3378}, pages = {325--341}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-30576-7\_18}, doi = {10.1007/978-3-540-30576-7\_18}, timestamp = {Sun, 02 Jun 2019 21:21:22 +0200}, biburl = {https://dblp.org/rec/conf/tcc/BonehGN05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BonehBG05, author = {Dan Boneh and Xavier Boyen and Eu{-}Jin Goh}, title = {Hierarchical Identity Based Encryption with Constant Size Ciphertext}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {15}, year = {2005}, url = {http://eprint.iacr.org/2005/015}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BonehBG05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ShachamPPGMB04, author = {Hovav Shacham and Matthew Page and Ben Pfaff and Eu{-}Jin Goh and Nagendra Modadugu and Dan Boneh}, editor = {Vijayalakshmi Atluri and Birgit Pfitzmann and Patrick D. McDaniel}, title = {On the effectiveness of address-space randomization}, booktitle = {Proceedings of the 11th {ACM} Conference on Computer and Communications Security, {CCS} 2004, Washington, DC, USA, October 25-29, 2004}, pages = {298--307}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1030083.1030124}, doi = {10.1145/1030083.1030124}, timestamp = {Fri, 13 Nov 2020 16:10:44 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ShachamPPGMB04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GohJ03, author = {Eu{-}Jin Goh and Stanislaw Jarecki}, editor = {Eli Biham}, title = {A Signature Scheme as Secure as the Diffie-Hellman Problem}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2003, International Conference on the Theory and Applications of Cryptographic Techniques, Warsaw, Poland, May 4-8, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2656}, pages = {401--415}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-39200-9\_25}, doi = {10.1007/3-540-39200-9\_25}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GohJ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/GohBPG03, author = {Eu{-}Jin Goh and Dan Boneh and Benny Pinkas and Philippe Golle}, editor = {Colin Boyd and Wenbo Mao}, title = {The Design and Implementation of Protocol-Based Hidden Key Recovery}, booktitle = {Information Security, 6th International Conference, {ISC} 2003, Bristol, UK, October 1-3, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2851}, pages = {165--179}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/10958513\_13}, doi = {10.1007/10958513\_13}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/isw/GohBPG03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/GohSMB03, author = {Eu{-}Jin Goh and Hovav Shacham and Nagendra Modadugu and Dan Boneh}, title = {SiRiUS: Securing Remote Untrusted Storage}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2003, San Diego, California, {USA}}, publisher = {The Internet Society}, year = {2003}, url = {https://www.ndss-symposium.org/ndss2003/sirius-securing-remote-untrusted-storage/}, timestamp = {Mon, 01 Feb 2021 08:42:24 +0100}, biburl = {https://dblp.org/rec/conf/ndss/GohSMB03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Goh03, author = {Eu{-}Jin Goh}, title = {Secure Indexes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {216}, year = {2003}, url = {http://eprint.iacr.org/2003/216}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Goh03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.