Dan Boneh
Person information
- affiliation: Stanford University, USA
- award: ACM Prize in Computing, 2014
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2010 – today
- 2019
- [j32]Dan Boneh:
Technical perspective: Attacking cryptographic key exchange with precomputation. Commun. ACM 62(1): 105 (2019) - 2018
- [c175]Dan Boneh, Manu Drijvers, Gregory Neven:
Compact Multi-signatures for Smaller Blockchains. ASIACRYPT (2) 2018: 435-464 - [c174]Dan Boneh, Rosario Gennaro, Steven Goldfeder, Aayush Jain, Sam Kim, Peter M. R. Rasmussen, Amit Sahai:
Threshold Cryptosystems from Threshold Fully Homomorphic Encryption. CRYPTO (1) 2018: 565-596 - [c173]Dan Boneh, Joseph Bonneau, Benedikt Bünz, Ben Fisch:
Verifiable Delay Functions. CRYPTO (1) 2018: 757-788 - [c172]Anjana Rajan, Lucy Qin, David W. Archer, Dan Boneh, Tancrède Lepoint, Mayank Varia:
Callisto: A Cryptographic Approach to Detecting Serial Perpetrators of Sexual Misconduct. COMPASS 2018: 49:1-49:4 - [c171]Dan Boneh, Yuval Ishai, Amit Sahai, David J. Wu:
Quasi-Optimal SNARGs via Linear Multi-Prover Interactive Proofs. EUROCRYPT (3) 2018: 222-255 - [c170]Benedikt Bünz, Jonathan Bootle, Dan Boneh, Andrew Poelstra, Pieter Wuille, Gregory Maxwell:
Bulletproofs: Short Proofs for Confidential Transactions and More. IEEE Symposium on Security and Privacy 2018: 315-334 - [c169]Dan Boneh, Yuval Ishai, Alain Passelègue, Amit Sahai, David J. Wu:
Exploring Crypto Dark Matter: - New Simple PRF Candidates and Their Applications. TCC (2) 2018: 699-729 - [i87]Florian Tramèr, Dan Boneh:
Slalom: Fast, Verifiable and Private Execution of Neural Networks in Trusted Hardware. CoRR abs/1806.03287 (2018) - [i86]Dan Boneh, Darren Glass, Daniel Krashen, Kristin E. Lauter, Shahed Sharif, Alice Silverberg, Mehdi Tibouchi, Mark Zhandry:
Multiparty Non-Interactive Key Exchange and More From Isogenies on Elliptic Curves. CoRR abs/1807.03038 (2018) - [i85]Saba Eskandarian, Jonathan Cogan, Sawyer Birnbaum, Peh Chang Wei Brandon, Dillon Franke, Forest Fraser, Gaspar Garcia Jr., Eric Gong, Hung T. Nguyen, Taresh K. Sethi, Vishal Subbiah, Michael Backes, Giancarlo Pellegrino, Dan Boneh:
Fidelius: Protecting User Secrets from Compromised Browsers. CoRR abs/1809.04774 (2018) - [i84]Emma Dauterman, Henry Corrigan-Gibbs, David Mazières, Dan Boneh, Dominic Rizzo:
True2F: Backdoor-resistant authentication tokens. CoRR abs/1810.04660 (2018) - [i83]Florian Tramèr, Pascal Dupré, Gili Rusak, Giancarlo Pellegrino, Dan Boneh:
Ad-versarial: Defeating Perceptual Ad-Blocking. CoRR abs/1811.03194 (2018) - [i82]Edward Chou, Florian Tramèr, Giancarlo Pellegrino, Dan Boneh:
SentiNet: Detecting Physical Attacks Against Deep Learning Systems. CoRR abs/1812.00292 (2018) - [i81]Dan Boneh, Yuval Ishai, Amit Sahai, David J. Wu:
Quasi-Optimal SNARGs via Linear Multi-Prover Interactive Proofs. IACR Cryptology ePrint Archive 2018: 133 (2018) - [i80]Dan Boneh, Saba Eskandarian, Ben Fisch:
Post-Quantum Group Signatures from Symmetric Primitives. IACR Cryptology ePrint Archive 2018: 261 (2018) - [i79]Dan Boneh, Manu Drijvers, Gregory Neven:
Compact Multi-Signatures for Smaller Blockchains. IACR Cryptology ePrint Archive 2018: 483 (2018) - [i78]Dan Boneh, Joseph Bonneau, Benedikt Bünz, Ben Fisch:
Verifiable Delay Functions. IACR Cryptology ePrint Archive 2018: 601 (2018) - [i77]Dan Boneh, Darren Glass, Daniel Krashen, Kristin E. Lauter, Shahed Sharif, Alice Silverberg, Mehdi Tibouchi, Mark Zhandry:
Multiparty Non-Interactive Key Exchange and More From Isogenies on Elliptic Curves. IACR Cryptology ePrint Archive 2018: 665 (2018) - [i76]Dan Boneh, Benedikt Bünz, Ben Fisch:
A Survey of Two Verifiable Delay Functions. IACR Cryptology ePrint Archive 2018: 712 (2018) - [i75]Dan Boneh, Benedikt Bünz, Ben Fisch:
Batching Techniques for Accumulators with Applications to IOPs and Stateless Blockchains. IACR Cryptology ePrint Archive 2018: 1188 (2018) - [i74]Dan Boneh, Yuval Ishai, Alain Passelègue, Amit Sahai, David J. Wu:
Exploring Crypto Dark Matter: New Simple PRF Candidates and Their Applications. IACR Cryptology ePrint Archive 2018: 1218 (2018) - 2017
- [j31]Dan Boneh, Mark Zhandry:
Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation. Algorithmica 79(4): 1233-1285 (2017) - [j30]Saba Eskandarian, Eran Messeri, Joseph Bonneau, Dan Boneh:
Certificate Transparency with Privacy. PoPETs 2017(4): 329-344 (2017) - [c168]Dan Boneh, Sam Kim, Valeria Nikolaenko:
Lattice-Based DAPS and Generalizations: Self-enforcement in Signature Schemes. ACNS 2017: 457-477 - [c167]Ben Fisch, Dhinakaran Vinayagamurthy, Dan Boneh, Sergey Gorbunov:
IRON: Functional Encryption using Intel SGX. ACM Conference on Computer and Communications Security 2017: 765-782 - [c166]Dmitry Kogan, Nathan Manohar, Dan Boneh:
T/Key: Second-Factor Authentication From Secure Hash Chains. ACM Conference on Computer and Communications Security 2017: 983-999 - [c165]Dan Boneh, Shay Gueron:
Surnaming Schemes, Fast Verification, and Applications to SGX Technology. CT-RSA 2017: 149-164 - [c164]Dan Boneh, Yuval Ishai, Amit Sahai, David J. Wu:
Lattice-Based SNARGs and Their Application to More Efficient Obfuscation. EUROCRYPT (3) 2017: 247-277 - [c163]Dan Boneh, Sam Kim, Hart William Montgomery:
Private Puncturable PRFs from Standard Lattice Assumptions. EUROCRYPT (1) 2017: 415-445 - [c162]
- [c161]Judson Wilson, Riad S. Wahby, Henry Corrigan-Gibbs, Dan Boneh, Philip Levis, Keith Winstein:
Trust but Verify: Auditing the Secure Internet of Things. MobiSys 2017: 464-474 - [c160]Henry Corrigan-Gibbs, Dan Boneh:
Prio: Private, Robust, and Scalable Computation of Aggregate Statistics. NSDI 2017: 259-282 - [c159]Dan Boneh, Kevin Lewi, David J. Wu:
Constraining Pseudorandom Functions Privately. Public Key Cryptography (2) 2017: 494-524 - [c158]Dan Boneh, Sam Kim, David J. Wu:
Constrained Keys for Invertible Pseudorandom Functions. TCC (1) 2017: 237-263 - [i73]Saba Eskandarian, Eran Messeri, Joseph Bonneau, Dan Boneh:
Certificate Transparency with Privacy. CoRR abs/1703.02209 (2017) - [i72]Henry Corrigan-Gibbs, Dan Boneh:
Prio: Private, Robust, and Scalable Computation of Aggregate Statistics. CoRR abs/1703.06255 (2017) - [i71]Florian Tramèr, Nicolas Papernot, Ian J. Goodfellow, Dan Boneh, Patrick D. McDaniel:
The Space of Transferable Adversarial Examples. CoRR abs/1704.03453 (2017) - [i70]Florian Tramèr, Alexey Kurakin, Nicolas Papernot, Dan Boneh, Patrick D. McDaniel:
Ensemble Adversarial Training: Attacks and Defenses. CoRR abs/1705.07204 (2017) - [i69]Dmitry Kogan, Nathan Manohar, Dan Boneh:
T/Key: Second-Factor Authentication From Secure Hash Chains. CoRR abs/1708.08424 (2017) - [i68]Dan Boneh, Sam Kim, Hart William Montgomery:
Private Puncturable PRFs From Standard Lattice Assumptions. IACR Cryptology ePrint Archive 2017: 100 (2017) - [i67]Dan Boneh, Yuval Ishai, Amit Sahai, David J. Wu:
Lattice-Based SNARGs and Their Application to More Efficient Obfuscation. IACR Cryptology ePrint Archive 2017: 240 (2017) - [i66]Dan Boneh, Rosario Gennaro, Steven Goldfeder, Sam Kim:
A Lattice-Based Universal Thresholdizer for Cryptographic Systems. IACR Cryptology ePrint Archive 2017: 251 (2017) - [i65]Dan Boneh, Sam Kim, David J. Wu:
Constrained Keys for Invertible Pseudorandom Functions. IACR Cryptology ePrint Archive 2017: 477 (2017) - [i64]Dan Boneh, Rosario Gennaro, Steven Goldfeder, Aayush Jain, Sam Kim, Peter M. R. Rasmussen, Amit Sahai:
Threshold Cryptosystems From Threshold Fully Homomorphic Encryption. IACR Cryptology ePrint Archive 2017: 956 (2017) - [i63]Benedikt Bünz, Jonathan Bootle, Dan Boneh, Andrew Poelstra, Pieter Wuille, Gregory Maxwell:
Bulletproofs: Short Proofs for Confidential Transactions and More. IACR Cryptology ePrint Archive 2017: 1066 (2017) - 2016
- [j29]Amit Levy, Henry Corrigan-Gibbs, Dan Boneh:
Stickler: Defending against Malicious Content Distribution Networks in an Unmodified Browser. IEEE Security & Privacy 14(2): 22-28 (2016) - [j28]Dan Boneh, Kenny Paterson, Nigel P. Smart:
Building a Community of Real-World Cryptographers. IEEE Security & Privacy 14(6): 7-9 (2016) - [c157]Dan Boneh, Henry Corrigan-Gibbs, Stuart E. Schechter:
Balloon Hashing: A Memory-Hard Function Providing Provable Protection Against Sequential Attacks. ASIACRYPT (1) 2016: 220-248 - [c156]Kevin Lewi, Alex J. Malozemoff, Daniel Apon, Brent Carmer, Adam Foltzer, Daniel Wagner, David W. Archer, Dan Boneh, Jonathan Katz, Mariana Raykova:
5Gen: A Framework for Prototyping Applications Using Multilinear Maps and Matrix Branching Programs. ACM Conference on Computer and Communications Security 2016: 981-992 - [c155]David J. Wu, Ankur Taly, Asim Shankar, Dan Boneh:
Privacy, Discovery, and Authentication for the Internet of Things. ESORICS (2) 2016: 301-319 - [c154]Kevin Kiningham, Mark Horowitz, Philip Levis, Dan Boneh:
CESEL: Securing a Mote for 20 Years. EWSN 2016: 307-312 - [c153]Okke Schrijvers, Joseph Bonneau, Dan Boneh, Tim Roughgarden:
Incentive Compatibility of Bitcoin Mining Pool Reward Functions. Financial Cryptography 2016: 477-498 - [i62]David J. Wu, Ankur Taly, Asim Shankar, Dan Boneh:
Privacy, Discovery, and Authentication for the Internet of Things. CoRR abs/1604.06959 (2016) - [i61]Henry Corrigan-Gibbs, Dan Boneh, Stuart E. Schechter:
Balloon Hashing: Provably Space-Hard Hash Functions with Data-Independent Access Patterns. IACR Cryptology ePrint Archive 2016: 27 (2016) - [i60]Kevin Lewi, Alex J. Malozemoff, Daniel Apon, Brent Carmer, Adam Foltzer, Daniel Wagner, David W. Archer, Dan Boneh, Jonathan Katz, Mariana Raykova:
5Gen: A Framework for Prototyping Applications Using Multilinear Maps and Matrix Branching Programs. IACR Cryptology ePrint Archive 2016: 619 (2016) - 2015
- [j27]Jae Hyun Ahn, Dan Boneh, Jan Camenisch, Susan Hohenberger, Abhi Shelat, Brent Waters:
Computing on Authenticated Data. J. Cryptology 28(2): 351-395 (2015) - [c152]Gaby G. Dagher, Benedikt Bünz, Joseph Bonneau, Jeremy Clark, Dan Boneh:
Provisions: Privacy-preserving Proofs of Solvency for Bitcoin Exchanges. ACM Conference on Computer and Communications Security 2015: 720-731 - [c151]Ali José Mashtizadeh, Andrea Bittau, Dan Boneh, David Mazières:
CCFI: Cryptographically Enforced Control Flow Integrity. ACM Conference on Computer and Communications Security 2015: 941-951 - [c150]Dan Boneh, Divya Gupta, Ilya Mironov, Amit Sahai:
Hosting Services on an Untrusted Cloud. EUROCRYPT (2) 2015: 404-436 - [c149]Dan Boneh, Kevin Lewi, Mariana Raykova, Amit Sahai, Mark Zhandry, Joe Zimmerman:
Semantically Secure Order-Revealing Encryption: Multi-input Functional Encryption Without Obfuscation. EUROCRYPT (2) 2015: 563-594 - [c148]Henry Corrigan-Gibbs, Dan Boneh, David Mazières:
Riposte: An Anonymous Messaging System Handling Millions of Users. IEEE Symposium on Security and Privacy 2015: 321-338 - [c147]Yan Michalevsky, Aaron Schulman, Gunaa Arumugam Veerapandian, Dan Boneh, Gabi Nakibly:
PowerSpy: Location Tracking Using Mobile Device Power Analysis. USENIX Security Symposium 2015: 785-800 - [i59]Yan Michalevsky, Gabi Nakibly, Aaron Schulman, Dan Boneh:
PowerSpy: Location Tracking using Mobile Device Power Analysis. CoRR abs/1502.03182 (2015) - [i58]Henry Corrigan-Gibbs, Dan Boneh, David Mazières:
Riposte: An Anonymous Messaging System Handling Millions of Users. CoRR abs/1503.06115 (2015) - [i57]Benjamin A. Braun, Suman Jana, Dan Boneh:
Robust and Efficient Elimination of Cache and Timing Side Channels. CoRR abs/1506.00189 (2015) - [i56]Amit Levy, Henry Corrigan-Gibbs, Dan Boneh:
Stickler: Defending Against Malicious CDNs in an Unmodified Browser. CoRR abs/1506.04110 (2015) - [i55]Dan Boneh, Kevin Lewi, Hart William Montgomery, Ananth Raghunathan:
Key Homomorphic PRFs and Their Applications. IACR Cryptology ePrint Archive 2015: 220 (2015) - [i54]Martín Abadi, Dan Boneh, Ilya Mironov, Ananth Raghunathan, Gil Segev:
Message-Locked Encryption for Lock-Dependent Messages. IACR Cryptology ePrint Archive 2015: 440 (2015) - [i53]Gaby G. Dagher, Benedikt Bünz, Joseph Bonneau, Jeremy Clark, Dan Boneh:
Provisions: Privacy-preserving proofs of solvency for Bitcoin exchanges. IACR Cryptology ePrint Archive 2015: 1008 (2015) - [i52]Dan Boneh, Kevin Lewi, David J. Wu:
Constraining Pseudorandom Functions Privately. IACR Cryptology ePrint Archive 2015: 1167 (2015) - 2014
- [j26]Hristo Bojinov, Daniel Sánchez, Paul J. Reber, Dan Boneh, Patrick Lincoln:
Neuroscience meets cryptography: crypto primitives secure against rubber hose attacks. Commun. ACM 57(5): 110-118 (2014) - [j25]Lin-Shung Huang, Shrikant Adhikarla, Dan Boneh, Collin Jackson:
An Experimental Study of TLS Forward Secrecy Deployments. IEEE Internet Computing 18(6): 43-51 (2014) - [c146]Dan Boneh, Henry Corrigan-Gibbs:
Bivariate Polynomials Modulo Composites and Their Applications. ASIACRYPT (1) 2014: 42-62 - [c145]Dan Boneh, Brent Waters, Mark Zhandry:
Low Overhead Broadcast Encryption from Multilinear Maps. CRYPTO (1) 2014: 206-223 - [c144]Dan Boneh, Mark Zhandry:
Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation. CRYPTO (1) 2014: 480-499 - [c143]Dan Boneh, Craig Gentry, Sergey Gorbunov, Shai Halevi, Valeria Nikolaenko, Gil Segev, Vinod Vaikuntanathan, Dhinakaran Vinayagamurthy:
Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE and Compact Garbled Circuits. EUROCRYPT 2014: 533-556 - [c142]Andrea Bittau, Adam Belay, Ali José Mashtizadeh, David Mazières, Dan Boneh:
Hacking Blind. IEEE Symposium on Security and Privacy 2014: 227-242 - [c141]David Silver, Suman Jana, Dan Boneh, Eric Yawei Chen, Collin Jackson:
Password Managers: Attacks and Defenses. USENIX Security Symposium 2014: 449-464 - [c140]Yan Michalevsky, Dan Boneh, Gabi Nakibly:
Gyrophone: Recognizing Speech from Gyroscope Signals. USENIX Security Symposium 2014: 1053-1067 - [c139]Grant Ho, Dan Boneh, Lucas Ballard, Niels Provos:
Tick Tock: Building Browser Red Pills from Timing Side Channels. WOOT 2014 - [i51]Hristo Bojinov, Yan Michalevsky, Gabi Nakibly, Dan Boneh:
Mobile Device Identification via Sensor Fingerprinting. CoRR abs/1408.1416 (2014) - [i50]Ali José Mashtizadeh, Andrea Bittau, David Mazières, Dan Boneh:
Cryptographically Enforced Control Flow Integrity. CoRR abs/1408.1451 (2014) - [i49]Dan Boneh, Brent Waters, Mark Zhandry:
Low Overhead Broadcast Encryption from Multilinear Maps. IACR Cryptology ePrint Archive 2014: 195 (2014) - [i48]Dan Boneh, Craig Gentry, Sergey Gorbunov, Shai Halevi, Valeria Nikolaenko, Gil Segev, Vinod Vaikuntanathan, Dhinakaran Vinayagamurthy:
Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE, and Compact Garbled Circuits. IACR Cryptology ePrint Archive 2014: 356 (2014) - [i47]Dan Boneh, Henry Corrigan-Gibbs:
Bivariate Polynomials Modulo Composites and their Applications. IACR Cryptology ePrint Archive 2014: 719 (2014) - [i46]Dan Boneh, Kevin Lewi, Mariana Raykova, Amit Sahai, Mark Zhandry, Joe Zimmerman:
Semantically Secure Order-Revealing Encryption: Multi-Input Functional Encryption Without Obfuscation. IACR Cryptology ePrint Archive 2014: 834 (2014) - [i45]Dan Boneh, David J. Wu, Joe Zimmerman:
Immunizing Multilinear Maps Against Zeroizing Attacks. IACR Cryptology ePrint Archive 2014: 930 (2014) - 2013
- [c138]Dan Boneh, Craig Gentry, Shai Halevi, Frank Wang, David J. Wu:
Private Database Queries Using Somewhat Homomorphic Encryption. ACNS 2013: 102-118 - [c137]Dan Boneh, Ananth Raghunathan, Gil Segev:
Function-Private Subspace-Membership Encryption and Its Applications. ASIACRYPT (1) 2013: 255-275 - [c136]Dan Boneh, Brent Waters:
Constrained Pseudorandom Functions and Their Applications. ASIACRYPT (2) 2013: 280-300 - [c135]Henry Corrigan-Gibbs, Wendy Mu, Dan Boneh, Bryan Ford:
Ensuring high-quality randomness in cryptographic key generation. ACM Conference on Computer and Communications Security 2013: 685-696 - [c134]Valeria Nikolaenko, Stratis Ioannidis, Udi Weinsberg, Marc Joye, Nina Taft, Dan Boneh:
Privacy-preserving matrix factorization. ACM Conference on Computer and Communications Security 2013: 801-812 - [c133]Dan Boneh, Mark Zhandry:
Secure Signatures and Chosen Ciphertext Security in a Quantum Computing World. CRYPTO (2) 2013: 361-379 - [c132]Martín Abadi, Dan Boneh, Ilya Mironov, Ananth Raghunathan, Gil Segev:
Message-Locked Encryption for Lock-Dependent Messages. CRYPTO (1) 2013: 374-391 - [c131]Dan Boneh, Kevin Lewi, Hart William Montgomery, Ananth Raghunathan:
Key Homomorphic PRFs and Their Applications. CRYPTO (1) 2013: 410-428 - [c130]Dan Boneh, Ananth Raghunathan, Gil Segev:
Function-Private Identity-Based Encryption: Hiding the Function in Functional Encryption. CRYPTO (2) 2013: 461-478 - [c129]
- [c128]David Fifield, Gabi Nakibly, Dan Boneh:
OSS: Using Online Scanning Services for Censorship Circumvention. Privacy Enhancing Technologies 2013: 185-204 - [c127]Valeria Nikolaenko, Udi Weinsberg, Stratis Ioannidis, Marc Joye, Dan Boneh, Nina Taft:
Privacy-Preserving Ridge Regression on Hundreds of Millions of Records. IEEE Symposium on Security and Privacy 2013: 334-348 - [e7]Dan Boneh, Tim Roughgarden, Joan Feigenbaum:
Symposium on Theory of Computing Conference, STOC'13, Palo Alto, CA, USA, June 1-4, 2013. ACM 2013, ISBN 978-1-4503-2029-0 [contents] - [i44]Henry Corrigan-Gibbs, Wendy Mu, Dan Boneh, Bryan Ford:
Ensuring High-Quality Randomness in Cryptographic Key Generation. CoRR abs/1309.7366 (2013) - [i43]Dan Boneh, Mark Zhandry:
Secure Signatures and Chosen Ciphertext Security in a Post-Quantum World. IACR Cryptology ePrint Archive 2013: 88 (2013) - [i42]Dan Boneh, Ananth Raghunathan, Gil Segev:
Function-Private Identity-Based Encryption: Hiding the Function in Functional Encryption. IACR Cryptology ePrint Archive 2013: 283 (2013) - [i41]Dan Boneh, Brent Waters:
Constrained Pseudorandom Functions and Their Applications. IACR Cryptology ePrint Archive 2013: 352 (2013) - [i40]Dan Boneh, Ananth Raghunathan, Gil Segev:
Function-Private Subspace-Membership Encryption and Its Applications. IACR Cryptology ePrint Archive 2013: 403 (2013) - [i39]Dan Boneh, Craig Gentry, Shai Halevi, Frank Wang, David J. Wu:
Private Database Queries Using Somewhat Homomorphic Encryption. IACR Cryptology ePrint Archive 2013: 422 (2013) - [i38]Dan Boneh, Mark Zhandry:
Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation. IACR Cryptology ePrint Archive 2013: 642 (2013) - [i37]Dan Boneh, Valeria Nikolaenko, Gil Segev:
Attribute-Based Encryption for Arithmetic Circuits. IACR Cryptology ePrint Archive 2013: 669 (2013) - [i36]Prabhanjan Ananth, Dan Boneh, Sanjam Garg, Amit Sahai, Mark Zhandry:
Differing-Inputs Obfuscation and Applications. IACR Cryptology ePrint Archive 2013: 689 (2013) - 2012
- [j24]Dan Boneh, Amit Sahai, Brent Waters:
Functional encryption: a new vision for public-key cryptography. Commun. ACM 55(11): 56-64 (2012) - [j23]Carl E. Landwehr, Dan Boneh, John C. Mitchell, Steven M. Bellovin, Susan Landau, Michael E. Lesk:
Privacy and Cybersecurity: The Next 100 Years. Proceedings of the IEEE 100(Centennial-Issue): 1659-1673 (2012) - [c126]
- [c125]Martin Georgiev, Subodh Iyengar, Suman Jana, Rishita Anubhai, Dan Boneh, Vitaly Shmatikov:
The most dangerous code in the world: validating SSL certificates in non-browser software. ACM Conference on Computer and Communications Security 2012: 38-49 - [c124]Zachary Weinberg, Jeffrey Wang, Vinod Yegneswaran, Linda Briesemeister, Steven Cheung, Frank Wang, Dan Boneh:
StegoTorus: a camouflage proxy for the Tor anonymity system. ACM Conference on Computer and Communications Security 2012: 109-120 - [c123]Dan Boneh, Gil Segev, Brent Waters:
Targeted malleability: homomorphic encryption for restricted computations. ITCS 2012: 350-366 - [c122]
- [c121]Emily Stark, Lin-Shung Huang, Dinesh Israni, Collin Jackson, Dan Boneh:
The Case for Prefetching and Prevalidating TLS Server Certificates. NDSS 2012 - [c120]David Fifield, Nate Hardison, Jonathan Ellithorpe, Emily Stark, Dan Boneh, Roger Dingledine, Phillip A. Porras:
Evading Censorship with Browser-Based Proxies. Privacy Enhancing Technologies 2012: 239-258 - [c119]Jae Hyun Ahn, Dan Boneh, Jan Camenisch, Susan Hohenberger, Abhi Shelat, Brent Waters:
Computing on Authenticated Data. TCC 2012: 1-20 - [c118]Hristo Bojinov, Daniel Sánchez, Paul J. Reber, Dan Boneh, Patrick Lincoln:
Neuroscience Meets Cryptography: Designing Crypto Primitives Secure Against Rubber Hose Attacks. USENIX Security Symposium 2012: 129-141 - [c117]Patrick Lincoln, Ian Mason, Phillip A. Porras, Vinod Yegneswaran, Zachary Weinberg, Jeroen Massar, William Allen Simpson, Paul Vixie, Dan Boneh:
Bootstrapping Communications into an Anti-Censorship System. FOCI 2012 - [c116]Narendran Thiagarajan, Gaurav Aggarwal, Angela Nicoara, Dan Boneh, Jatinder Pal Singh:
Who killed my battery?: analyzing mobile browser energy consumption. WWW 2012: 41-50 - [c115]Elie Bursztein, Chinmay Soman, Dan Boneh, John C. Mitchell:
SessionJuggler: secure web login from an untrusted terminal using session hijacking. WWW 2012: 321-330 - [i35]