default search action
Dan Boneh
Person information
- affiliation: Stanford University, USA
- award (2014): ACM Prize in Computing
- award (2013): Gödel Prize
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j37]Dan Boneh, Benedikt Bünz, Ben Fisch:
A Survey of Two Verifiable Delay Functions Using Proof of Exponentiation. IACR Commun. Cryptol. 1(1): 7 (2024) - [j36]Kevin Liao, Henry Corrigan-Gibbs, Dan Boneh:
Divisible E-Cash for Billing in Private Ad Retargeting. Proc. Priv. Enhancing Technol. 2024(4): 5-23 (2024) - [c219]Valeria Nikolaenko, Sam Ragsdale, Joseph Bonneau, Dan Boneh:
Powers-of-Tau to the People: Decentralizing Setup Ceremonies. ACNS (3) 2024: 105-134 - [c218]Dan Boneh, Aditi Partap, Lior Rotem:
Traceable Secret Sharing: Strong Security and Efficient Constructions. CRYPTO (5) 2024: 221-256 - [c217]Wilson D. Nguyen, Trisha Datta, Binyi Chen, Nirvan Tyagi, Dan Boneh:
Mangrove: A Scalable Framework for Folding-Based SNARKs. CRYPTO (10) 2024: 308-344 - [c216]Dan Boneh, Aditi Partap, Lior Rotem:
Accountability for Misbehavior in Threshold Decryption via Threshold Traitor Tracing. CRYPTO (7) 2024: 317-351 - [c215]Chhavi Yadav, Amrita Roy Chowdhury, Dan Boneh, Kamalika Chaudhuri:
FairProof : Confidential and Certifiable Fairness for Neural Networks. ICML 2024 - [i140]Chhavi Yadav, Amrita Roy Chowdhury, Dan Boneh, Kamalika Chaudhuri:
FairProof : Confidential and Certifiable Fairness for Neural Networks. CoRR abs/2402.12572 (2024) - [i139]Megha Srivastava, Simran Arora, Dan Boneh:
Optimistic Verifiable Training by Controlling Hardware Nondeterminism. CoRR abs/2403.09603 (2024) - [i138]Andy K. Zhang, Neil Perry, Riya Dulepet, Eliot Jones, Justin W. Lin, Joey Ji, Celeste Menders, Gashon Hussein, Samantha Liu, Donovan Jasper, Pura Peetathawatchai, Ari Glenn, Vikram Sivashankar, Daniel Zamoshchin, Leo Glikbarg, Derek Askaryar, Mike Yang, Teddy Zhang, Rishi Alluri, Nathan Tran, Rinnara Sangpisit, Polycarpos Yiorkadjis, Kenny Osele, Gautham Raghupathi, Dan Boneh, Daniel E. Ho, Percy Liang:
Cybench: A Framework for Evaluating Cybersecurity Capabilities and Risk of Language Models. CoRR abs/2408.08926 (2024) - [i137]Dan Boneh, Binyi Chen:
LatticeFold: A Lattice-based Folding Scheme and its Applications to Succinct Proof Systems. IACR Cryptol. ePrint Arch. 2024: 257 (2024) - [i136]Evan Laufer, Alex Ozdemir, Dan Boneh:
zkPi: Proving Lean Theorems in Zero-Knowledge. IACR Cryptol. ePrint Arch. 2024: 267 (2024) - [i135]Dan Boneh, Iftach Haitner, Yehuda Lindell:
Exponent-VRFs and Their Applications. IACR Cryptol. ePrint Arch. 2024: 397 (2024) - [i134]Dan Boneh, Aditi Partap, Lior Rotem:
Traceable Secret Sharing: Strong Security and Efficient Constructions. IACR Cryptol. ePrint Arch. 2024: 405 (2024) - [i133]Wilson D. Nguyen, Trisha Datta, Binyi Chen, Nirvan Tyagi, Dan Boneh:
Mangrove: A Scalable Framework for Folding-based SNARKs. IACR Cryptol. ePrint Arch. 2024: 416 (2024) - [i132]Alex Ozdemir, Evan Laufer, Dan Boneh:
Volatile and Persistent Memory for zkSNARKs via Algebraic Interactive Proofs. IACR Cryptol. ePrint Arch. 2024: 979 (2024) - [i131]Trisha Datta, Binyi Chen, Dan Boneh:
VerITAS: Verifying Image Transformations at Scale. IACR Cryptol. ePrint Arch. 2024: 1066 (2024) - 2023
- [c214]Wilson D. Nguyen, Dan Boneh, Srinath T. V. Setty:
Revisiting the Nova Proof System on a Cycle of Curves. AFT 2023: 18:1-18:22 - [c213]Dan Boneh, Aditi Partap, Lior Rotem:
Post-Quantum Single Secret Leader Election (SSLE) from Publicly Re-Randomizable Commitments. AFT 2023: 26:1-26:23 - [c212]Ertem Nusret Tas, Dan Boneh:
Vector Commitments with Efficient Updates. AFT 2023: 29:1-29:23 - [c211]Neil Perry, Megha Srivastava, Deepak Kumar, Dan Boneh:
Do Users Write More Insecure Code with AI Assistants? CCS 2023: 2785-2799 - [c210]Dan Boneh, Elette Boyle, Henry Corrigan-Gibbs, Niv Gilboa, Yuval Ishai:
Arithmetic Sketching. CRYPTO (1) 2023: 171-202 - [c209]Kaili Wang, Qinchen Wang, Calvin Cai, Dan Boneh:
R-Pool and Settlement Markets for Recoverable ERC-20R Tokens. DeFi@CCS 2023: 49-54 - [c208]Binyi Chen, Benedikt Bünz, Dan Boneh, Zhenfei Zhang:
HyperPlonk: Plonk with Linear-Time Prover and High-Degree Custom Gates. EUROCRYPT (2) 2023: 499-530 - [c207]Dan Boneh, Jiaxin Guan, Mark Zhandry:
A Lower Bound on the Length of Signatures Based on Group Actions and Generic Isogenies. EUROCRYPT (5) 2023: 507-531 - [c206]Ertem Nusret Tas, Dan Boneh:
Cryptoeconomic Security for Data Availability Committees. FC 2023: 310-326 - [i130]Ertem Nusret Tas, Dan Boneh:
Vector Commitments with Efficient Updates. CoRR abs/2307.04085 (2023) - [i129]Joshua Z. Tan, Tara Merk, Sarah Hubbard, Eliza R. Oak, Joni Pirovich, Ellie Rennie, Rolf Hoefer, Michael Zargham, Jason Potts, Chris Berg, Reuben Youngblom, Primavera De Filippi, Seth Frey, Jeff Strnad, Morshed Mannan, Kelsie Nabben, Silke Noa Elrifai, Jake Hartnell, Benjamin Mako Hill, Alexia Maddox, Woojin Lim, Tobin South, Ari Juels, Dan Boneh:
Open Problems in DAOs. CoRR abs/2310.19201 (2023) - [i128]Kaili Wang, Qinchen Wang, Calvin Cai, Dan Boneh:
R-Pool and Settlement Markets for Recoverable ERC-20R Tokens. CoRR abs/2312.14375 (2023) - [i127]Dan Boneh, Jiaxin Guan, Mark Zhandry:
A Lower Bound on the Length of Signatures Based on Group Actions and Generic Isogenies. IACR Cryptol. ePrint Arch. 2023: 250 (2023) - [i126]Wilson D. Nguyen, Dan Boneh, Srinath T. V. Setty:
Revisiting the Nova Proof System on a Cycle of Curves. IACR Cryptol. ePrint Arch. 2023: 969 (2023) - [i125]Dan Boneh, Elette Boyle, Henry Corrigan-Gibbs, Niv Gilboa, Yuval Ishai:
Arithmetic Sketching. IACR Cryptol. ePrint Arch. 2023: 1012 (2023) - [i124]Dan Boneh, Aditi Partap, Lior Rotem:
Post-Quantum Single Secret Leader Election (SSLE) From Publicly Re-randomizable Commitments. IACR Cryptol. ePrint Arch. 2023: 1241 (2023) - [i123]Dan Boneh, Aditi Partap, Lior Rotem:
Traitor Tracing for Threshold Decryption. IACR Cryptol. ePrint Arch. 2023: 1724 (2023) - [i122]Dan Boneh, Aditi Partap, Brent Waters:
Accountable Multi-Signatures with Constant Size Public Keys. IACR Cryptol. ePrint Arch. 2023: 1793 (2023) - [i121]Ertem Nusret Tas, Dan Boneh:
Vector Commitments with Efficient Updates. IACR Cryptol. ePrint Arch. 2023: 1830 (2023) - 2022
- [c205]Tiancheng Xie, Jiaheng Zhang, Zerui Cheng, Fan Zhang, Yupeng Zhang, Yongzheng Jia, Dan Boneh, Dawn Song:
zkBridge: Trustless Cross-chain Bridges Made Practical. CCS 2022: 3003-3017 - [c204]Dan Boneh, Chelsea Komlo:
Threshold Signatures with Private Accountability. CRYPTO (4) 2022: 551-581 - [c203]Saba Eskandarian, Dan Boneh:
Clarion: Anonymous Communication from Multiparty Shuffling Protocols. NDSS 2022 - [c202]Alex Ozdemir, Dan Boneh:
Experimenting with Collaborative zk-SNARKs: Zero-Knowledge Proofs for Distributed Secrets. USENIX Security Symposium 2022: 4291-4308 - [i120]Neil Perry, Bruce Spang, Saba Eskandarian, Dan Boneh:
Strong Anonymity for Mesh Messaging. CoRR abs/2207.04145 (2022) - [i119]Kaili Wang, Qinchen Wang, Dan Boneh:
ERC-20R and ERC-721R: Reversible Transactions on Ethereum. CoRR abs/2208.00543 (2022) - [i118]Ertem Nusret Tas, Dan Boneh:
Cryptoeconomic Security for Data Availability Committees. CoRR abs/2208.02999 (2022) - [i117]Aditi Partap, Dan Boneh:
Memory Tagging: A Memory Efficient Design. CoRR abs/2209.00307 (2022) - [i116]Tiancheng Xie, Jiaheng Zhang, Zerui Cheng, Fan Zhang, Yupeng Zhang, Yongzheng Jia, Dan Boneh, Dawn Song:
zkBridge: Trustless Cross-chain Bridges Made Practical. CoRR abs/2210.00264 (2022) - [i115]Neil Perry, Megha Srivastava, Deepak Kumar, Dan Boneh:
Do Users Write More Insecure Code with AI Assistants? CoRR abs/2211.03622 (2022) - [i114]Binyi Chen, Benedikt Bünz, Dan Boneh, Zhenfei Zhang:
HyperPlonk: Plonk with Linear-Time Prover and High-Degree Custom Gates. IACR Cryptol. ePrint Arch. 2022: 1355 (2022) - [i113]Valeria Nikolaenko, Sam Ragsdale, Joseph Bonneau, Dan Boneh:
Powers-of-Tau to the People: Decentralizing Setup Ceremonies. IACR Cryptol. ePrint Arch. 2022: 1592 (2022) - [i112]Dan Boneh, Chelsea Komlo:
Threshold Signatures with Private Accountability. IACR Cryptol. ePrint Arch. 2022: 1636 (2022) - [i111]Dan Boneh, Aditi Partap, Lior Rotem:
Accountable Threshold Signatures with Proactive Refresh. IACR Cryptol. ePrint Arch. 2022: 1656 (2022) - 2021
- [c201]Charlotte Peale, Saba Eskandarian, Dan Boneh:
Secure Complaint-Enabled Source-Tracking for Encrypted Messaging. CCS 2021: 1484-1506 - [c200]Dan Boneh, Justin Drake, Ben Fisch, Ariel Gabizon:
Halo Infinite: Proof-Carrying Data from Additive Polynomial Commitments. CRYPTO (1) 2021: 649-680 - [c199]Florian Tramèr, Dan Boneh:
Differentially Private Learning Needs Better Features (or Much More Data). ICLR 2021 - [c198]Kurt Thomas, Devdatta Akhawe, Michael D. Bailey, Dan Boneh, Elie Bursztein, Sunny Consolvo, Nicola Dell, Zakir Durumeric, Patrick Gage Kelley, Deepak Kumar, Damon McCoy, Sarah Meiklejohn, Thomas Ristenpart, Gianluca Stringhini:
SoK: Hate, Harassment, and the Changing Landscape of Online Abuse. SP 2021: 247-267 - [c197]Dan Boneh, Elette Boyle, Henry Corrigan-Gibbs, Niv Gilboa, Yuval Ishai:
Lightweight Techniques for Private Heavy Hitters. SP 2021: 762-776 - [c196]Saba Eskandarian, Henry Corrigan-Gibbs, Matei Zaharia, Dan Boneh:
Express: Lowering the Cost of Metadata-hiding Communication with Cryptographic Privacy. USENIX Security Symposium 2021: 1775-1792 - [c195]Paul Syverson, Matthew Finkel, Saba Eskandarian, Dan Boneh:
Attacks on Onion Discovery and Remedies via Self-Authenticating Traditional Addresses. WPES@CCS 2021: 45-52 - [i110]Paul Syverson, Matthew Finkel, Saba Eskandarian, Dan Boneh:
Attacks on Onion Discovery and Remedies via Self-Authenticating Traditional Addresses. CoRR abs/2110.03168 (2021) - [i109]Dan Boneh, Elette Boyle, Henry Corrigan-Gibbs, Niv Gilboa, Yuval Ishai:
Lightweight Techniques for Private Heavy Hitters. IACR Cryptol. ePrint Arch. 2021: 17 (2021) - [i108]Dan Boneh, Wilson D. Nguyen, Alex Ozdemir:
Efficient Functional Commitments: How to Commit to Private Functions. IACR Cryptol. ePrint Arch. 2021: 1342 (2021) - [i107]Saba Eskandarian, Dan Boneh:
Clarion: Anonymous Communication from Multiparty Shuffling Protocols. IACR Cryptol. ePrint Arch. 2021: 1514 (2021) - [i106]Alex Ozdemir, Dan Boneh:
Experimenting with Collaborative zk-SNARKs: Zero-Knowledge Proofs for Distributed Secrets. IACR Cryptol. ePrint Arch. 2021: 1530 (2021) - 2020
- [j35]Dan Boneh, Darren B. Glass, Daniel Krashen, Kristin E. Lauter, Shahed Sharif, Alice Silverberg, Mehdi Tibouchi, Mark Zhandry:
Multiparty Non-Interactive Key Exchange and More From Isogenies on Elliptic Curves. J. Math. Cryptol. 14(1): 5-14 (2020) - [c194]Dan Boneh, Saba Eskandarian, Lucjan Hanzlik, Nicola Greco:
Single Secret Leader Election. AFT 2020: 12-24 - [c193]Dan Boneh, Dmitry Kogan, Katharine Woo:
Oblivious Pseudorandom Functions from Isogenies. ASIACRYPT (2) 2020: 520-550 - [c192]Dan Boneh, Saba Eskandarian, Sam Kim, Maurice Shih:
Improving Speed and Security in Updatable Encryption Schemes. ASIACRYPT (3) 2020: 559-589 - [c191]Benedikt Bünz, Shashank Agrawal, Mahdi Zamani, Dan Boneh:
Zether: Towards Privacy in a Smart Contract World. Financial Cryptography 2020: 423-443 - [c190]Riad S. Wahby, Dan Boneh, Christopher Jeffrey, Joseph Poon:
An Airdrop that Preserves Recipient Privacy. Financial Cryptography 2020: 444-463 - [c189]Alex Ozdemir, Riad S. Wahby, Barry Whitehat, Dan Boneh:
Scaling Verifiable Computation Using Efficient Set Accumulators. USENIX Security Symposium 2020: 2075-2092 - [c188]Florian Tramèr, Dan Boneh, Kenny Paterson:
Remote Side-Channel Attacks on Anonymous Transactions. USENIX Security Symposium 2020: 2739-2756 - [i105]Florian Tramèr, Dan Boneh:
Differentially Private Learning Needs Better Features (or Much More Data). CoRR abs/2011.11660 (2020) - [i104]Dan Boneh, Elette Boyle, Henry Corrigan-Gibbs, Niv Gilboa, Yuval Ishai:
Lightweight Techniques for Private Heavy Hitters. CoRR abs/2012.14884 (2020) - [i103]Dan Boneh, Saba Eskandarian, Lucjan Hanzlik, Nicola Greco:
Single Secret Leader Election. IACR Cryptol. ePrint Arch. 2020: 25 (2020) - [i102]Dan Boneh, Justin Drake, Ben Fisch, Ariel Gabizon:
Efficient polynomial commitment schemes for multiple points and polynomials. IACR Cryptol. ePrint Arch. 2020: 81 (2020) - [i101]Florian Tramèr, Dan Boneh, Kenneth G. Paterson:
Remote Side-Channel Attacks on Anonymous Transactions. IACR Cryptol. ePrint Arch. 2020: 220 (2020) - [i100]Dan Boneh, Saba Eskandarian, Sam Kim, Maurice Shih:
Improving Speed and Security in Updatable Encryption Schemes. IACR Cryptol. ePrint Arch. 2020: 222 (2020) - [i99]Riad S. Wahby, Dan Boneh, Christopher Jeffrey, Joseph Poon:
An airdrop that preserves recipient privacy. IACR Cryptol. ePrint Arch. 2020: 676 (2020) - [i98]Dan Boneh, Dmitry Kogan, Katharine Woo:
Oblivious Pseudorandom Functions from Isogenies. IACR Cryptol. ePrint Arch. 2020: 1532 (2020) - [i97]Dan Boneh, Justin Drake, Ben Fisch, Ariel Gabizon:
Halo Infinite: Recursive zk-SNARKs from any Additive Polynomial Commitment Scheme. IACR Cryptol. ePrint Arch. 2020: 1536 (2020)
2010 – 2019
- 2019
- [j34]Dan Boneh:
Technical perspective: Attacking cryptographic key exchange with precomputation. Commun. ACM 62(1): 105 (2019) - [j33]Dan Boneh, Andrew J. Grotto, Patrick D. McDaniel, Nicolas Papernot:
How Relevant Is the Turing Test in the Age of Sophisbots? IEEE Secur. Priv. 17(6): 64-71 (2019) - [j32]Riad S. Wahby, Dan Boneh:
Fast and simple constant-time hashing to the BLS12-381 elliptic curve. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2019(4): 154-179 (2019) - [c187]Florian Tramèr, Pascal Dupré, Gili Rusak, Giancarlo Pellegrino, Dan Boneh:
AdVersarial: Perceptual Ad Blocking meets Adversarial Machine Learning. CCS 2019: 2005-2021 - [c186]Dan Boneh, Elette Boyle, Henry Corrigan-Gibbs, Niv Gilboa, Yuval Ishai:
Zero-Knowledge Proofs on Secret-Shared Data via Fully Linear PCPs. CRYPTO (3) 2019: 67-97 - [c185]Dan Boneh, Benedikt Bünz, Ben Fisch:
Batching Techniques for Accumulators with Applications to IOPs and Stateless Blockchains. CRYPTO (1) 2019: 561-586 - [c184]Dan Boneh, Saba Eskandarian, Ben Fisch:
Post-quantum EPID Signatures from Symmetric Primitives. CT-RSA 2019: 251-271 - [c183]Florian Tramèr, Dan Boneh:
Slalom: Fast, Verifiable and Private Execution of Neural Networks in Trusted Hardware. ICLR 2019 - [c182]Kevin Kiningham, Philip Alexander Levis, Mark Anderson, Dan Boneh, Mark Horowitz, Maurice Shih:
Falcon - A Flexible Architecture For Accelerating Cryptography. MASS 2019: 136-144 - [c181]Florian Tramèr, Dan Boneh:
Adversarial Training and Robustness for Multiple Perturbations. NeurIPS 2019: 5858-5868 - [c180]Saba Eskandarian, Jonathan Cogan, Sawyer Birnbaum, Peh Chang Wei Brandon, Dillon Franke, Forest Fraser, Gaspar Garcia Jr., Eric Gong, Hung T. Nguyen, Taresh K. Sethi, Vishal Subbiah, Michael Backes, Giancarlo Pellegrino, Dan Boneh:
Fidelius: Protecting User Secrets from Compromised Browsers. IEEE Symposium on Security and Privacy 2019: 264-280 - [c179]Emma Dauterman, Henry Corrigan-Gibbs, David Mazières, Dan Boneh, Dominic Rizzo:
True2F: Backdoor-Resistant Authentication Tokens. IEEE Symposium on Security and Privacy 2019: 398-416 - [c178]Kurt Thomas, Jennifer Pullman, Kevin Yeo, Ananth Raghunathan, Patrick Gage Kelley, Luca Invernizzi, Borbala Benko, Tadek Pietraszek, Sarvar Patel, Dan Boneh, Elie Bursztein:
Protecting accounts from credential stuffing with password breach alerting. USENIX Security Symposium 2019: 1556-1571 - [i96]Florian Tramèr, Dan Boneh:
Adversarial Training and Robustness for Multiple Perturbations. CoRR abs/1904.13000 (2019) - [i95]Jason Teutsch, Michael Straka, Dan Boneh:
Retrofitting a two-way peg between blockchains. CoRR abs/1908.03999 (2019) - [i94]Dan Boneh, Andrew J. Grotto, Patrick D. McDaniel, Nicolas Papernot:
How Relevant is the Turing Test in the Age of Sophisbots? CoRR abs/1909.00056 (2019) - [i93]Jonathan Love, Dan Boneh:
Supersingular Curves With Small Non-integer Endomorphisms. CoRR abs/1910.03180 (2019) - [i92]Saba Eskandarian, Henry Corrigan-Gibbs, Matei Zaharia, Dan Boneh:
Express: Lowering the Cost of Metadata-hiding Communication with Cryptographic Privacy. CoRR abs/1911.09215 (2019) - [i91]Dan Boneh, Elette Boyle, Henry Corrigan-Gibbs, Niv Gilboa, Yuval Ishai:
How to Prove a Secret: Zero-Knowledge Proofs on Distributed Data via Fully Linear PCPs. IACR Cryptol. ePrint Arch. 2019: 188 (2019) - [i90]Benedikt Bünz, Shashank Agrawal, Mahdi Zamani, Dan Boneh:
Zether: Towards Privacy in a Smart Contract World. IACR Cryptol. ePrint Arch. 2019: 191 (2019) - [i89]Riad S. Wahby, Dan Boneh:
Fast and simple constant-time hashing to the BLS12-381 elliptic curve. IACR Cryptol. ePrint Arch. 2019: 403 (2019) - [i88]Alex Ozdemir, Riad S. Wahby, Dan Boneh:
Scaling Verifiable Computation Using Efficient Set Accumulators. IACR Cryptol. ePrint Arch. 2019: 1494 (2019) - 2018
- [c177]Dan Boneh, Manu Drijvers, Gregory Neven:
Compact Multi-signatures for Smaller Blockchains. ASIACRYPT (2) 2018: 435-464 - [c176]Dan Boneh, Rosario Gennaro, Steven Goldfeder, Aayush Jain, Sam Kim, Peter M. R. Rasmussen, Amit Sahai:
Threshold Cryptosystems from Threshold Fully Homomorphic Encryption. CRYPTO (1) 2018: 565-596 - [c175]Dan Boneh, Joseph Bonneau, Benedikt Bünz, Ben Fisch:
Verifiable Delay Functions. CRYPTO (1) 2018: 757-788 - [c174]Anjana Rajan, Lucy Qin, David W. Archer, Dan Boneh, Tancrède Lepoint, Mayank Varia:
Callisto: A Cryptographic Approach to Detecting Serial Perpetrators of Sexual Misconduct. COMPASS 2018: 49:1-49:4 - [c173]Dan Boneh, Yuval Ishai, Amit Sahai, David J. Wu:
Quasi-Optimal SNARGs via Linear Multi-Prover Interactive Proofs. EUROCRYPT (3) 2018: 222-255 - [c172]Florian Tramèr, Alexey Kurakin, Nicolas Papernot, Ian J. Goodfellow, Dan Boneh, Patrick D. McDaniel:
Ensemble Adversarial Training: Attacks and Defenses. ICLR (Poster) 2018 - [c171]Benedikt Bünz, Jonathan Bootle, Dan Boneh, Andrew Poelstra, Pieter Wuille, Gregory Maxwell:
Bulletproofs: Short Proofs for Confidential Transactions and More. IEEE Symposium on Security and Privacy 2018: 315-334 - [c170]Dan Boneh, Yuval Ishai, Alain Passelègue, Amit Sahai, David J. Wu:
Exploring Crypto Dark Matter: - New Simple PRF Candidates and Their Applications. TCC (2) 2018: 699-729 - [i87]Florian Tramèr, Dan Boneh:
Slalom: Fast, Verifiable and Private Execution of Neural Networks in Trusted Hardware. CoRR abs/1806.03287 (2018) - [i86]Dan Boneh, Darren B. Glass, Daniel Krashen, Kristin E. Lauter, Shahed Sharif, Alice Silverberg, Mehdi Tibouchi, Mark Zhandry:
Multiparty Non-Interactive Key Exchange and More From Isogenies on Elliptic Curves. CoRR abs/1807.03038 (2018) - [i85]Saba Eskandarian, Jonathan Cogan, Sawyer Birnbaum, Peh Chang Wei Brandon, Dillon Franke, Forest Fraser, Gaspar Garcia Jr., Eric Gong, Hung T. Nguyen, Taresh K. Sethi, Vishal Subbiah, Michael Backes, Giancarlo Pellegrino, Dan Boneh:
Fidelius: Protecting User Secrets from Compromised Browsers. CoRR abs/1809.04774 (2018) - [i84]Emma Dauterman, Henry Corrigan-Gibbs, David Mazières, Dan Boneh, Dominic Rizzo:
True2F: Backdoor-resistant authentication tokens. CoRR abs/1810.04660 (2018) - [i83]Florian Tramèr, Pascal Dupré, Gili Rusak, Giancarlo Pellegrino, Dan Boneh:
Ad-versarial: Defeating Perceptual Ad-Blocking. CoRR abs/1811.03194 (2018) - [i82]Edward Chou, Florian Tramèr, Giancarlo Pellegrino, Dan Boneh:
SentiNet: Detecting Physical Attacks Against Deep Learning Systems. CoRR abs/1812.00292 (2018) - [i81]Dan Boneh, Yuval Ishai, Amit Sahai, David J. Wu:
Quasi-Optimal SNARGs via Linear Multi-Prover Interactive Proofs. IACR Cryptol. ePrint Arch. 2018: 133 (2018) - [i80]Dan Boneh, Saba Eskandarian, Ben Fisch:
Post-Quantum Group Signatures from Symmetric Primitives. IACR Cryptol. ePrint Arch. 2018: 261 (2018) - [i79]Dan Boneh, Manu Drijvers, Gregory Neven:
Compact Multi-Signatures for Smaller Blockchains. IACR Cryptol. ePrint Arch. 2018: 483 (2018) - [i78]Dan Boneh, Joseph Bonneau, Benedikt Bünz, Ben Fisch:
Verifiable Delay Functions. IACR Cryptol. ePrint Arch. 2018: 601 (2018) - [i77]Dan Boneh, Darren B. Glass, Daniel Krashen, Kristin E. Lauter, Shahed Sharif, Alice Silverberg, Mehdi Tibouchi, Mark Zhandry:
Multiparty Non-Interactive Key Exchange and More From Isogenies on Elliptic Curves. IACR Cryptol. ePrint Arch. 2018: 665 (2018) - [i76]Dan Boneh, Benedikt Bünz, Ben Fisch:
A Survey of Two Verifiable Delay Functions. IACR Cryptol. ePrint Arch. 2018: 712 (2018) - [i75]Dan Boneh, Benedikt Bünz, Ben Fisch:
Batching Techniques for Accumulators with Applications to IOPs and Stateless Blockchains. IACR Cryptol. ePrint Arch. 2018: 1188 (2018) - [i74]Dan Boneh, Yuval Ishai, Alain Passelègue, Amit Sahai, David J. Wu:
Exploring Crypto Dark Matter: New Simple PRF Candidates and Their Applications. IACR Cryptol. ePrint Arch. 2018: 1218 (2018) - 2017
- [j31]Dan Boneh, Mark Zhandry:
Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation. Algorithmica 79(4): 1233-1285 (2017) - [j30]Saba Eskandarian, Eran Messeri, Joseph Bonneau, Dan Boneh:
Certificate Transparency with Privacy. Proc. Priv. Enhancing Technol. 2017(4): 329-344 (2017) - [c169]Dan Boneh, Sam Kim, Valeria Nikolaenko:
Lattice-Based DAPS and Generalizations: Self-enforcement in Signature Schemes. ACNS 2017: 457-477 - [c168]Ben Fisch, Dhinakaran Vinayagamurthy, Dan Boneh, Sergey Gorbunov:
IRON: Functional Encryption using Intel SGX. CCS 2017: 765-782 - [c167]Dmitry Kogan, Nathan Manohar, Dan Boneh:
T/Key: Second-Factor Authentication From Secure Hash Chains. CCS 2017: 983-999 - [c166]Dan Boneh, Shay Gueron:
Surnaming Schemes, Fast Verification, and Applications to SGX Technology. CT-RSA 2017: 149-164 - [c165]Dan Boneh, Yuval Ishai, Amit Sahai, David J. Wu:
Lattice-Based SNARGs and Their Application to More Efficient Obfuscation. EUROCRYPT (3) 2017: 247-277 - [c164]Dan Boneh, Sam Kim, Hart William Montgomery:
Private Puncturable PRFs from Standard Lattice Assumptions. EUROCRYPT (1) 2017: 415-445 - [c163]Henry Corrigan-Gibbs, David J. Wu, Dan Boneh:
Quantum Operating Systems. HotOS 2017: 76-81 - [c162]Dan Boneh, Rosario Gennaro, Steven Goldfeder:
Using Level-1 Homomorphic Encryption to Improve Threshold DSA Signatures for Bitcoin Wallet Security. LATINCRYPT 2017: 352-377 - [c161]Judson Wilson, Riad S. Wahby, Henry Corrigan-Gibbs, Dan Boneh, Philip Alexander Levis, Keith Winstein:
Trust but Verify: Auditing the Secure Internet of Things. MobiSys 2017: 464-474 - [c160]Henry Corrigan-Gibbs, Dan Boneh:
Prio: Private, Robust, and Scalable Computation of Aggregate Statistics. NSDI 2017: 259-282 - [c159]Dan Boneh, Kevin Lewi, David J. Wu:
Constraining Pseudorandom Functions Privately. Public Key Cryptography (2) 2017: 494-524 - [c158]Dan Boneh, Sam Kim, David J. Wu:
Constrained Keys for Invertible Pseudorandom Functions. TCC (1) 2017: 237-263 - [i73]Saba Eskandarian, Eran Messeri, Joseph Bonneau, Dan Boneh:
Certificate Transparency with Privacy. CoRR abs/1703.02209 (2017) - [i72]Henry Corrigan-Gibbs, Dan Boneh:
Prio: Private, Robust, and Scalable Computation of Aggregate Statistics. CoRR abs/1703.06255 (2017) - [i71]Florian Tramèr, Nicolas Papernot, Ian J. Goodfellow, Dan Boneh, Patrick D. McDaniel:
The Space of Transferable Adversarial Examples. CoRR abs/1704.03453 (2017) - [i70]Florian Tramèr, Alexey Kurakin, Nicolas Papernot, Dan Boneh, Patrick D. McDaniel:
Ensemble Adversarial Training: Attacks and Defenses. CoRR abs/1705.07204 (2017) - [i69]Dmitry Kogan, Nathan Manohar, Dan Boneh:
T/Key: Second-Factor Authentication From Secure Hash Chains. CoRR abs/1708.08424 (2017) - [i68]Dan Boneh, Sam Kim, Hart William Montgomery:
Private Puncturable PRFs From Standard Lattice Assumptions. IACR Cryptol. ePrint Arch. 2017: 100 (2017) - [i67]Dan Boneh, Yuval Ishai, Amit Sahai, David J. Wu:
Lattice-Based SNARGs and Their Application to More Efficient Obfuscation. IACR Cryptol. ePrint Arch. 2017: 240 (2017) - [i66]Dan Boneh, Rosario Gennaro, Steven Goldfeder, Sam Kim:
A Lattice-Based Universal Thresholdizer for Cryptographic Systems. IACR Cryptol. ePrint Arch. 2017: 251 (2017) - [i65]Dan Boneh, Sam Kim, David J. Wu:
Constrained Keys for Invertible Pseudorandom Functions. IACR Cryptol. ePrint Arch. 2017: 477 (2017) - [i64]Dan Boneh, Rosario Gennaro, Steven Goldfeder, Aayush Jain, Sam Kim, Peter M. R. Rasmussen, Amit Sahai:
Threshold Cryptosystems From Threshold Fully Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2017: 956 (2017) - [i63]Benedikt Bünz, Jonathan Bootle, Dan Boneh, Andrew Poelstra, Pieter Wuille, Gregory Maxwell:
Bulletproofs: Short Proofs for Confidential Transactions and More. IACR Cryptol. ePrint Arch. 2017: 1066 (2017) - 2016
- [j29]Amit Levy, Henry Corrigan-Gibbs, Dan Boneh:
Stickler: Defending against Malicious Content Distribution Networks in an Unmodified Browser. IEEE Secur. Priv. 14(2): 22-28 (2016) - [j28]Dan Boneh, Kenny Paterson, Nigel P. Smart:
Building a Community of Real-World Cryptographers. IEEE Secur. Priv. 14(6): 7-9 (2016) - [c157]Dan Boneh, Henry Corrigan-Gibbs, Stuart E. Schechter:
Balloon Hashing: A Memory-Hard Function Providing Provable Protection Against Sequential Attacks. ASIACRYPT (1) 2016: 220-248 - [c156]Kevin Lewi, Alex J. Malozemoff, Daniel Apon, Brent Carmer, Adam Foltzer, Daniel Wagner, David W. Archer, Dan Boneh, Jonathan Katz, Mariana Raykova:
5Gen: A Framework for Prototyping Applications Using Multilinear Maps and Matrix Branching Programs. CCS 2016: 981-992 - [c155]David J. Wu, Ankur Taly, Asim Shankar, Dan Boneh:
Privacy, Discovery, and Authentication for the Internet of Things. ESORICS (2) 2016: 301-319 - [c154]Kevin Kiningham, Mark Horowitz, Philip Alexander Levis, Dan Boneh:
CESEL: Securing a Mote for 20 Years. EWSN 2016: 307-312 - [c153]Okke Schrijvers, Joseph Bonneau, Dan Boneh, Tim Roughgarden:
Incentive Compatibility of Bitcoin Mining Pool Reward Functions. Financial Cryptography 2016: 477-498 - [i62]David J. Wu, Ankur Taly, Asim Shankar, Dan Boneh:
Privacy, Discovery, and Authentication for the Internet of Things. CoRR abs/1604.06959 (2016) - [i61]Henry Corrigan-Gibbs, Dan Boneh, Stuart E. Schechter:
Balloon Hashing: Provably Space-Hard Hash Functions with Data-Independent Access Patterns. IACR Cryptol. ePrint Arch. 2016: 27 (2016) - [i60]Kevin Lewi, Alex J. Malozemoff, Daniel Apon, Brent Carmer, Adam Foltzer, Daniel Wagner, David W. Archer, Dan Boneh, Jonathan Katz, Mariana Raykova:
5Gen: A Framework for Prototyping Applications Using Multilinear Maps and Matrix Branching Programs. IACR Cryptol. ePrint Arch. 2016: 619 (2016) - 2015
- [j27]Jae Hyun Ahn, Dan Boneh, Jan Camenisch, Susan Hohenberger, Abhi Shelat, Brent Waters:
Computing on Authenticated Data. J. Cryptol. 28(2): 351-395 (2015) - [c152]Gaby G. Dagher, Benedikt Bünz, Joseph Bonneau, Jeremy Clark, Dan Boneh:
Provisions: Privacy-preserving Proofs of Solvency for Bitcoin Exchanges. CCS 2015: 720-731 - [c151]Ali José Mashtizadeh, Andrea Bittau, Dan Boneh, David Mazières:
CCFI: Cryptographically Enforced Control Flow Integrity. CCS 2015: 941-951 - [c150]Dan Boneh, Divya Gupta, Ilya Mironov, Amit Sahai:
Hosting Services on an Untrusted Cloud. EUROCRYPT (2) 2015: 404-436 - [c149]Dan Boneh, Kevin Lewi, Mariana Raykova, Amit Sahai, Mark Zhandry, Joe Zimmerman:
Semantically Secure Order-Revealing Encryption: Multi-input Functional Encryption Without Obfuscation. EUROCRYPT (2) 2015: 563-594 - [c148]Henry Corrigan-Gibbs, Dan Boneh, David Mazières:
Riposte: An Anonymous Messaging System Handling Millions of Users. IEEE Symposium on Security and Privacy 2015: 321-338 - [c147]Yan Michalevsky, Aaron Schulman, Gunaa Arumugam Veerapandian, Dan Boneh, Gabi Nakibly:
PowerSpy: Location Tracking Using Mobile Device Power Analysis. USENIX Security Symposium 2015: 785-800 - [i59]Yan Michalevsky, Gabi Nakibly, Aaron Schulman, Dan Boneh:
PowerSpy: Location Tracking using Mobile Device Power Analysis. CoRR abs/1502.03182 (2015) - [i58]Henry Corrigan-Gibbs, Dan Boneh, David Mazières:
Riposte: An Anonymous Messaging System Handling Millions of Users. CoRR abs/1503.06115 (2015) - [i57]Benjamin A. Braun, Suman Jana, Dan Boneh:
Robust and Efficient Elimination of Cache and Timing Side Channels. CoRR abs/1506.00189 (2015) - [i56]Amit Levy, Henry Corrigan-Gibbs, Dan Boneh:
Stickler: Defending Against Malicious CDNs in an Unmodified Browser. CoRR abs/1506.04110 (2015) - [i55]Dan Boneh, Kevin Lewi, Hart William Montgomery, Ananth Raghunathan:
Key Homomorphic PRFs and Their Applications. IACR Cryptol. ePrint Arch. 2015: 220 (2015) - [i54]Martín Abadi, Dan Boneh, Ilya Mironov, Ananth Raghunathan, Gil Segev:
Message-Locked Encryption for Lock-Dependent Messages. IACR Cryptol. ePrint Arch. 2015: 440 (2015) - [i53]Gaby G. Dagher, Benedikt Bünz, Joseph Bonneau, Jeremy Clark, Dan Boneh:
Provisions: Privacy-preserving proofs of solvency for Bitcoin exchanges. IACR Cryptol. ePrint Arch. 2015: 1008 (2015) - [i52]Dan Boneh, Kevin Lewi, David J. Wu:
Constraining Pseudorandom Functions Privately. IACR Cryptol. ePrint Arch. 2015: 1167 (2015) - 2014
- [j26]Hristo Bojinov, Daniel Sánchez, Paul J. Reber, Dan Boneh, Patrick Lincoln:
Neuroscience meets cryptography: crypto primitives secure against rubber hose attacks. Commun. ACM 57(5): 110-118 (2014) - [j25]Lin-Shung Huang, Shrikant Adhikarla, Dan Boneh, Collin Jackson:
An Experimental Study of TLS Forward Secrecy Deployments. IEEE Internet Comput. 18(6): 43-51 (2014) - [c146]Dan Boneh, Henry Corrigan-Gibbs:
Bivariate Polynomials Modulo Composites and Their Applications. ASIACRYPT (1) 2014: 42-62 - [c145]Dan Boneh, Brent Waters, Mark Zhandry:
Low Overhead Broadcast Encryption from Multilinear Maps. CRYPTO (1) 2014: 206-223 - [c144]Dan Boneh, Mark Zhandry:
Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation. CRYPTO (1) 2014: 480-499 - [c143]Dan Boneh, Craig Gentry, Sergey Gorbunov, Shai Halevi, Valeria Nikolaenko, Gil Segev, Vinod Vaikuntanathan, Dhinakaran Vinayagamurthy:
Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE and Compact Garbled Circuits. EUROCRYPT 2014: 533-556 - [c142]Andrea Bittau, Adam Belay, Ali José Mashtizadeh, David Mazières, Dan Boneh:
Hacking Blind. IEEE Symposium on Security and Privacy 2014: 227-242 - [c141]David Silver, Suman Jana, Dan Boneh, Eric Yawei Chen, Collin Jackson:
Password Managers: Attacks and Defenses. USENIX Security Symposium 2014: 449-464 - [c140]Yan Michalevsky, Dan Boneh, Gabi Nakibly:
Gyrophone: Recognizing Speech from Gyroscope Signals. USENIX Security Symposium 2014: 1053-1067 - [c139]Grant Ho, Dan Boneh, Lucas Ballard, Niels Provos:
Tick Tock: Building Browser Red Pills from Timing Side Channels. WOOT 2014 - [i51]Hristo Bojinov, Yan Michalevsky, Gabi Nakibly, Dan Boneh:
Mobile Device Identification via Sensor Fingerprinting. CoRR abs/1408.1416 (2014) - [i50]Ali José Mashtizadeh, Andrea Bittau, David Mazières, Dan Boneh:
Cryptographically Enforced Control Flow Integrity. CoRR abs/1408.1451 (2014) - [i49]Dan Boneh, Brent Waters, Mark Zhandry:
Low Overhead Broadcast Encryption from Multilinear Maps. IACR Cryptol. ePrint Arch. 2014: 195 (2014) - [i48]Dan Boneh, Craig Gentry, Sergey Gorbunov, Shai Halevi, Valeria Nikolaenko, Gil Segev, Vinod Vaikuntanathan, Dhinakaran Vinayagamurthy:
Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE, and Compact Garbled Circuits. IACR Cryptol. ePrint Arch. 2014: 356 (2014) - [i47]Dan Boneh, Henry Corrigan-Gibbs:
Bivariate Polynomials Modulo Composites and their Applications. IACR Cryptol. ePrint Arch. 2014: 719 (2014) - [i46]Dan Boneh, Kevin Lewi, Mariana Raykova, Amit Sahai, Mark Zhandry, Joe Zimmerman:
Semantically Secure Order-Revealing Encryption: Multi-Input Functional Encryption Without Obfuscation. IACR Cryptol. ePrint Arch. 2014: 834 (2014) - [i45]Dan Boneh, David J. Wu, Joe Zimmerman:
Immunizing Multilinear Maps Against Zeroizing Attacks. IACR Cryptol. ePrint Arch. 2014: 930 (2014) - 2013
- [c138]Dan Boneh, Craig Gentry, Shai Halevi, Frank Wang, David J. Wu:
Private Database Queries Using Somewhat Homomorphic Encryption. ACNS 2013: 102-118 - [c137]Dan Boneh, Ananth Raghunathan, Gil Segev:
Function-Private Subspace-Membership Encryption and Its Applications. ASIACRYPT (1) 2013: 255-275 - [c136]Dan Boneh, Brent Waters:
Constrained Pseudorandom Functions and Their Applications. ASIACRYPT (2) 2013: 280-300 - [c135]Henry Corrigan-Gibbs, Wendy Mu, Dan Boneh, Bryan Ford:
Ensuring high-quality randomness in cryptographic key generation. CCS 2013: 685-696 - [c134]Valeria Nikolaenko, Stratis Ioannidis, Udi Weinsberg, Marc Joye, Nina Taft, Dan Boneh:
Privacy-preserving matrix factorization. CCS 2013: 801-812 - [c133]Dan Boneh, Mark Zhandry:
Secure Signatures and Chosen Ciphertext Security in a Quantum Computing World. CRYPTO (2) 2013: 361-379 - [c132]Martín Abadi, Dan Boneh, Ilya Mironov, Ananth Raghunathan, Gil Segev:
Message-Locked Encryption for Lock-Dependent Messages. CRYPTO (1) 2013: 374-391 - [c131]Dan Boneh, Kevin Lewi, Hart William Montgomery, Ananth Raghunathan:
Key Homomorphic PRFs and Their Applications. CRYPTO (1) 2013: 410-428 - [c130]Dan Boneh, Ananth Raghunathan, Gil Segev:
Function-Private Identity-Based Encryption: Hiding the Function in Functional Encryption. CRYPTO (2) 2013: 461-478 - [c129]Dan Boneh, Mark Zhandry:
Quantum-Secure Message Authentication Codes. EUROCRYPT 2013: 592-608 - [c128]David Fifield, Gabi Nakibly, Dan Boneh:
OSS: Using Online Scanning Services for Censorship Circumvention. Privacy Enhancing Technologies 2013: 185-204 - [c127]Valeria Nikolaenko, Udi Weinsberg, Stratis Ioannidis, Marc Joye, Dan Boneh, Nina Taft:
Privacy-Preserving Ridge Regression on Hundreds of Millions of Records. IEEE Symposium on Security and Privacy 2013: 334-348 - [e8]Dan Boneh, Tim Roughgarden, Joan Feigenbaum:
Symposium on Theory of Computing Conference, STOC'13, Palo Alto, CA, USA, June 1-4, 2013. ACM 2013, ISBN 978-1-4503-2029-0 [contents] - [i44]Henry Corrigan-Gibbs, Wendy Mu, Dan Boneh, Bryan Ford:
Ensuring High-Quality Randomness in Cryptographic Key Generation. CoRR abs/1309.7366 (2013) - [i43]Dan Boneh, Mark Zhandry:
Secure Signatures and Chosen Ciphertext Security in a Post-Quantum World. IACR Cryptol. ePrint Arch. 2013: 88 (2013) - [i42]Dan Boneh, Ananth Raghunathan, Gil Segev:
Function-Private Identity-Based Encryption: Hiding the Function in Functional Encryption. IACR Cryptol. ePrint Arch. 2013: 283 (2013) - [i41]Dan Boneh, Brent Waters:
Constrained Pseudorandom Functions and Their Applications. IACR Cryptol. ePrint Arch. 2013: 352 (2013) - [i40]Dan Boneh, Ananth Raghunathan, Gil Segev:
Function-Private Subspace-Membership Encryption and Its Applications. IACR Cryptol. ePrint Arch. 2013: 403 (2013) - [i39]Dan Boneh, Craig Gentry, Shai Halevi, Frank Wang, David J. Wu:
Private Database Queries Using Somewhat Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2013: 422 (2013) - [i38]Dan Boneh, Mark Zhandry:
Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation. IACR Cryptol. ePrint Arch. 2013: 642 (2013) - [i37]Dan Boneh, Valeria Nikolaenko, Gil Segev:
Attribute-Based Encryption for Arithmetic Circuits. IACR Cryptol. ePrint Arch. 2013: 669 (2013) - [i36]Prabhanjan Ananth, Dan Boneh, Sanjam Garg, Amit Sahai, Mark Zhandry:
Differing-Inputs Obfuscation and Applications. IACR Cryptol. ePrint Arch. 2013: 689 (2013) - 2012
- [j24]Dan Boneh, Amit Sahai, Brent Waters:
Functional encryption: a new vision for public-key cryptography. Commun. ACM 55(11): 56-64 (2012) - [j23]Carl E. Landwehr, Dan Boneh, John C. Mitchell, Steven M. Bellovin, Susan Landau, Michael E. Lesk:
Privacy and Cybersecurity: The Next 100 Years. Proc. IEEE 100(Centennial-Issue): 1659-1673 (2012) - [c126]Dan Boneh:
Pairing-Based Cryptography: Past, Present, and Future. ASIACRYPT 2012: 1 - [c125]Martin Georgiev, Subodh Iyengar, Suman Jana, Rishita Anubhai, Dan Boneh, Vitaly Shmatikov:
The most dangerous code in the world: validating SSL certificates in non-browser software. CCS 2012: 38-49 - [c124]Zachary Weinberg, Jeffrey Wang, Vinod Yegneswaran, Linda Briesemeister, Steven Cheung, Frank Wang, Dan Boneh:
StegoTorus: a camouflage proxy for the Tor anonymity system. CCS 2012: 109-120 - [c123]Dan Boneh, Gil Segev, Brent Waters:
Targeted malleability: homomorphic encryption for restricted computations. ITCS 2012: 350-366 - [c122]Gabi Nakibly, Alex Kirshon, Dima Gonikman, Dan Boneh:
Persistent OSPF Attacks. NDSS 2012 - [c121]Emily Stark, Lin-Shung Huang, Dinesh Israni, Collin Jackson, Dan Boneh:
The Case for Prefetching and Prevalidating TLS Server Certificates. NDSS 2012 - [c120]David Fifield, Nate Hardison, Jonathan D. Ellithorpe, Emily Stark, Dan Boneh, Roger Dingledine, Phillip A. Porras:
Evading Censorship with Browser-Based Proxies. Privacy Enhancing Technologies 2012: 239-258 - [c119]Jae Hyun Ahn, Dan Boneh, Jan Camenisch, Susan Hohenberger, Abhi Shelat, Brent Waters:
Computing on Authenticated Data. TCC 2012: 1-20 - [c118]Hristo Bojinov, Daniel Sánchez, Paul J. Reber, Dan Boneh, Patrick Lincoln:
Neuroscience Meets Cryptography: Designing Crypto Primitives Secure Against Rubber Hose Attacks. USENIX Security Symposium 2012: 129-141 - [c117]Patrick Lincoln, Ian Mason, Phillip A. Porras, Vinod Yegneswaran, Zachary Weinberg, Jeroen Massar, William Allen Simpson, Paul Vixie, Dan Boneh:
Bootstrapping Communications into an Anti-Censorship System. FOCI 2012 - [c116]Narendran Thiagarajan, Gaurav Aggarwal, Angela Nicoara, Dan Boneh, Jatinder Pal Singh:
Who killed my battery?: analyzing mobile browser energy consumption. WWW 2012: 41-50 - [c115]Elie Bursztein, Chinmay Soman, Dan Boneh, John C. Mitchell:
SessionJuggler: secure web login from an untrusted terminal using session hijacking. WWW 2012: 321-330 - [i35]Arvind Narayanan, Vincent Toubiana, Solon Barocas, Helen Nissenbaum, Dan Boneh:
A Critical Look at Decentralized Personal Data Architectures. CoRR abs/1202.4503 (2012) - [i34]Dan Boneh, Mark Zhandry:
Quantum-Secure Message Authentication Codes. Electron. Colloquium Comput. Complex. TR12 (2012) - [i33]Dan Boneh, Mark Zhandry:
Quantum-Secure Message Authentication Codes. IACR Cryptol. ePrint Arch. 2012: 606 (2012) - 2011
- [j22]Dan Boneh:
Recent ideas for circumventing internet filtering. XRDS 18(2): 36-40 (2011) - [j21]Dan Boneh, Xavier Boyen:
Efficient Selective Identity-Based Encryption Without Random Oracles. J. Cryptol. 24(4): 659-693 (2011) - [c114]Dan Boneh, Özgür Dagdelen, Marc Fischlin, Anja Lehmann, Christian Schaffner, Mark Zhandry:
Random Oracles in a Quantum World. ASIACRYPT 2011: 41-69 - [c113]Dan Boneh, David Mandell Freeman:
Homomorphic Signatures for Polynomial Functions. EUROCRYPT 2011: 149-168 - [c112]Arvind Narayanan, Narendran Thiagarajan, Mugdha Lakhani, Michael Hamburg, Dan Boneh:
Location Privacy via Private Proximity Testing. NDSS 2011 - [c111]Dan Boneh, David Mandell Freeman:
Linearly Homomorphic Signatures over Binary Fields and New Tools for Lattice-Based Signatures. Public Key Cryptography 2011: 1-16 - [c110]Elie Bursztein, Mike Hamburg, Jocelyn Lagarenne, Dan Boneh:
OpenConflict: Preventing Real Time Map Hacks in Online Games. IEEE Symposium on Security and Privacy 2011: 506-520 - [c109]Dan Boneh, Amit Sahai, Brent Waters:
Functional Encryption: Definitions and Challenges. TCC 2011: 253-273 - [c108]Hristo Bojinov, Dan Boneh, Rich Cannings, Iliyan Malchev:
Address space randomization for mobile devices. WISEC 2011: 127-138 - [c107]Hristo Bojinov, Dan Boneh:
Mobile token-based authentication on a budget. HotMobile 2011: 14-19 - [r21]Dan Boneh:
Aggregate Signatures. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 27 - [r20]Dan Boneh:
BLS Short Digital Signatures. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 158-159 - [r19]Dan Boneh:
Blum-Blum-Shub Pseudorandom Bit Generator. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 160-161 - [r18]Dan Boneh:
Blum-Goldwasser Public Key Encryption System. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 161-162 - [r17]Dan Boneh:
Cramer-Shoup Public-Key System. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 269-270 - [r16]Dan Boneh:
Digital Signature Standard. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 347 - [r15]Dan Boneh:
ElGamal Digital Signature Scheme. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 395-396 - [r14]Dan Boneh:
Rabin Digital Signature Scheme. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1014-1015 - [r13]Dan Boneh:
Schnorr Digital Signature Scheme. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1082-1083 - [r12]Dan Boneh:
Secure Signatures from the "Strong RSA" Assumption. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1134-1135 - [r11]Dan Boneh:
Strong RSA Assumption. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1266 - [i32]Dan Boneh, David Mandell Freeman:
Homomorphic Signatures for Polynomial Functions. IACR Cryptol. ePrint Arch. 2011: 18 (2011) - [i31]Jae Hyun Ahn, Dan Boneh, Jan Camenisch, Susan Hohenberger, Abhi Shelat, Brent Waters:
Computing on Authenticated Data. IACR Cryptol. ePrint Arch. 2011: 96 (2011) - [i30]Dan Boneh, Gil Segev, Brent Waters:
Targeted Malleability: Homomorphic Encryption for Restricted Computations. IACR Cryptol. ePrint Arch. 2011: 311 (2011) - 2010
- [j20]Hristo Bojinov, Elie Bursztein, Dan Boneh:
The emergence of cross channel scripting. Commun. ACM 53(8): 105-113 (2010) - [j19]Di Qiu, Dan Boneh, Sherman C. Lo, Per K. Enge:
Reliable Location-Based Services from Radio Navigation Systems. Sensors 10(12): 11369-11389 (2010) - [c106]Dan Boneh, Hart William Montgomery, Ananth Raghunathan:
Algebraic pseudorandom functions with improved efficiency from the augmented cascade. CCS 2010: 131-140 - [c105]Shweta Agrawal, Dan Boneh, Xavier Boyen:
Lattice Basis Delegation in Fixed Dimension and Shorter-Ciphertext Hierarchical IBE. CRYPTO 2010: 98-115 - [c104]Dan Boneh, Aggelos Kiayias, Hart William Montgomery:
Robust fingerprinting codes: a near optimal construction. Digital Rights Management Workshop 2010: 3-12 - [c103]Hristo Bojinov, Elie Bursztein, Xavier Boyen, Dan Boneh:
Kamouflage: Loss-Resistant Password Management. ESORICS 2010: 286-302 - [c102]Shweta Agrawal, Dan Boneh, Xavier Boyen:
Efficient Lattice (H)IBE in the Standard Model. EUROCRYPT 2010: 553-572 - [c101]Ben Dodson, Debangsu Sengupta, Dan Boneh, Monica S. Lam:
Secure, Consumer-Friendly Web Authentication and Payments with a Phone. MobiCASE 2010: 17-38 - [c100]Vincent Toubiana, Arvind Narayanan, Dan Boneh, Helen Nissenbaum, Solon Barocas:
Adnostic: Privacy Preserving Targeted Advertising. NDSS 2010 - [c99]Shweta Agrawal, Dan Boneh, Xavier Boyen, David Mandell Freeman:
Preventing Pollution Attacks in Multi-source Network Coding. Public Key Cryptography 2010: 161-176 - [c98]Gaurav Aggarwal, Elie Bursztein, Collin Jackson, Dan Boneh:
An Analysis of Private Browsing Modes in Modern Browsers. USENIX Security Symposium 2010: 79-94 - [c97]Andrea Bittau, Michael Hamburg, Mark Handley, David Mazières, Dan Boneh:
The Case for Ubiquitous Transport-Level Encryption. USENIX Security Symposium 2010: 403-418 - [c96]Elie Bursztein, Baptiste Gourdin, Celine Fabry, Jason Bau, Gustav Rydstedt, Hristo Bojinov, Dan Boneh, John C. Mitchell:
Webseclab Security Education Workbench. CSET 2010 - [i29]Shweta Agrawal, Dan Boneh, Xavier Boyen, David Mandell Freeman:
Preventing Pollution Attacks in Multi-Source Network Coding. IACR Cryptol. ePrint Arch. 2010: 183 (2010) - [i28]Dan Boneh, Özgür Dagdelen, Marc Fischlin, Anja Lehmann, Christian Schaffner, Mark Zhandry:
Random Oracles in a Quantum World. IACR Cryptol. ePrint Arch. 2010: 428 (2010) - [i27]Dan Boneh, Hart William Montgomery, Ananth Raghunathan:
Algebraic Pseudorandom Functions with Improved Efficiency from the Augmented Cascade. IACR Cryptol. ePrint Arch. 2010: 442 (2010) - [i26]Dan Boneh, David Mandell Freeman:
Linearly Homomorphic Signatures over Binary Fields and New Tools for Lattice-Based Signatures. IACR Cryptol. ePrint Arch. 2010: 453 (2010) - [i25]Dan Boneh, Amit Sahai, Brent Waters:
Functional Encryption: Definitions and Challenges. IACR Cryptol. ePrint Arch. 2010: 543 (2010)
2000 – 2009
- 2009
- [j18]Collin Jackson, Adam Barth, Andrew Bortz, Weidong Shao, Dan Boneh:
Protecting browsers from DNS rebinding attacks. ACM Trans. Web 3(1): 2:1-2:26 (2009) - [c95]Shweta Agrawal, Dan Boneh:
Homomorphic MACs: MAC-Based Integrity for Network Coding. ACNS 2009: 292-305 - [c94]Emily Stark, Michael Hamburg, Dan Boneh:
Symmetric Cryptography in Javascript. ACSAC 2009: 373-381 - [c93]Hristo Bojinov, Elie Bursztein, Dan Boneh:
XCS: cross channel scripting and its impact on web applications. CCS 2009: 420-431 - [c92]Dan Boneh, David Mandell Freeman, Jonathan Katz, Brent Waters:
Signing a Linear Subspace: Signature Schemes for Network Coding. Public Key Cryptography 2009: 68-87 - [e7]Dan Boneh, Úlfar Erlingsson, Martin Johns, Benjamin Livshits:
Web Application Security, 29.03. - 03.04.2009. Dagstuhl Seminar Proceedings 09141, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany 2009 [contents] - [e6]Dan Boneh, Alexander Sotirov:
3rd USENIX Workshop on Offensive Technologies, WOOT 2009, Montreal, Canada, August 10, 2009. USENIX Association 2009 [contents] - [i24]Dan Boneh, Úlfar Erlingsson, Martin Johns, Benjamin Livshits:
09141 Abstracts Collection - Web Application Security. Web Application Security 2009 - [i23]Dan Boneh, Úlfar Erlingsson, Martin Johns, Benjamin Livshits:
09141 Executive Summary - Web Application Security. Web Application Security 2009 - [i22]Dan Boneh, Karl Rubin, Alice Silverberg:
Finding composite order ordinary elliptic curves using the Cocks-Pinch method. IACR Cryptol. ePrint Arch. 2009: 533 (2009) - 2008
- [j17]Dan Boneh, Xavier Boyen:
Short Signatures Without Random Oracles and the SDH Assumption in Bilinear Groups. J. Cryptol. 21(2): 149-177 (2008) - [c91]Dan Boneh, Michael Hamburg:
Generalized Identity Based and Broadcast Encryption Schemes. ASIACRYPT 2008: 455-470 - [c90]Xiaoxin Chen, Tal Garfinkel, E. Christopher Lewis, Pratap Subrahmanyam, Carl A. Waldspurger, Dan Boneh, Jeffrey S. Dwoskin, Dan R. K. Ports:
Overshadow: a virtualization-based approach to retrofitting protection in commodity operating systems. ASPLOS 2008: 2-13 - [c89]Dan Boneh, Moni Naor:
Traitor tracing with constant size ciphertext. CCS 2008: 501-510 - [c88]Dan Boneh, Shai Halevi, Michael Hamburg, Rafail Ostrovsky:
Circular-Secure Encryption from Decision Diffie-Hellman. CRYPTO 2008: 108-125 - [c87]Dan Boneh, Periklis A. Papakonstantinou, Charles Rackoff, Yevgeniy Vahlis, Brent Waters:
On the Impossibility of Basing Identity Based Encryption on Trapdoor Permutations. FOCS 2008: 283-292 - [e5]Johannes Blömer, Dan Boneh, Ronald Cramer, Ueli M. Maurer:
Cryptography, 16.09. - 21.09.2007. Dagstuhl Seminar Proceedings 07381, Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany 2008 [contents] - [e4]Dan Boneh, Tal Garfinkel, Dug Song:
2nd USENIX Workshop on Offensive Technologies, WOOT'08, San Jose, CA, USA, July 28, 2008, Proceedings. USENIX Association 2008 [contents] - [i21]Dan Boneh, David Mandell Freeman, Jonathan Katz, Brent Waters:
Signing a Linear Subspace: Signature Schemes for Network Coding. IACR Cryptol. ePrint Arch. 2008: 316 (2008) - 2007
- [j16]Dan Boneh, Ran Canetti, Shai Halevi, Jonathan Katz:
Chosen-Ciphertext Security from Identity-Based Encryption. SIAM J. Comput. 36(5): 1301-1328 (2007) - [c86]Daniel V. Bailey, Dan Boneh, Eu-Jin Goh, Ari Juels:
Covert channels in privacy-preserving identification systems. CCS 2007: 297-306 - [c85]Collin Jackson, Adam Barth, Andrew Bortz, Weidong Shao, Dan Boneh:
Protecting browsers from dns rebinding attacks. CCS 2007: 421-431 - [c84]Dan Boneh, Eyal Kushilevitz, Rafail Ostrovsky, William E. Skeith III:
Public Key Encryption That Allows PIR Queries. CRYPTO 2007: 50-67 - [c83]Dan Boneh:
A Brief Look at Pairings Based Cryptography. FOCS 2007: 19-26 - [c82]Dan Boneh, Craig Gentry, Michael Hamburg:
Space-Efficient Identity Based Encryption Without Pairings. FOCS 2007: 647-657 - [c81]John Bethencourt, Dan Boneh, Brent Waters:
Cryptographic Methods for Storing Ballots on a Voting Machine. NDSS 2007 - [c80]Dan Boneh:
Bilinear Groups of Composite Order. Pairing 2007: 1 - [c79]Manu Kumar, Tal Garfinkel, Dan Boneh, Terry Winograd:
Reducing shoulder-surfing by using gaze-based password entry. SOUPS 2007: 13-19 - [c78]Dan Boneh, Brent Waters:
Conjunctive, Subset, and Range Queries on Encrypted Data. TCC 2007: 535-554 - [c77]Collin Jackson, Dan Boneh, John C. Mitchell:
Transaction Generators: Root Kits for Web. HotSec 2007 - [c76]Felipe Saint-Jean, Aaron Johnson, Dan Boneh, Joan Feigenbaum:
Private web search. WPES 2007: 84-90 - [c75]Andrew Bortz, Dan Boneh:
Exposing private information by timing web applications. WWW 2007: 621-628 - [e3]Dan Boneh, Tal Garfinkel, Dug Song:
First USENIX Workshop on Offensive Technologies, WOOT '07, Boston, MA, USA, August 6, 2007. USENIX Association 2007 [contents] - [i20]Johannes Blömer, Dan Boneh, Ronald Cramer, Ueli M. Maurer:
07381 Executive Summary - Cryptography. Cryptography 2007 - [i19]Johannes Blömer, Dan Boneh, Ronald Cramer, Ueli M. Maurer:
07381 Abstracts Collection -- Cryptography. Cryptography 2007 - [i18]Dan Boneh, Eyal Kushilevitz, Rafail Ostrovsky, William E. Skeith III:
Public Key Encryption that Allows PIR Queries. IACR Cryptol. ePrint Arch. 2007: 73 (2007) - [i17]Dan Boneh, Craig Gentry, Michael Hamburg:
Space-Efficient Identity Based Encryption Without Pairings. IACR Cryptol. ePrint Arch. 2007: 177 (2007) - 2006
- [c74]Dan Boneh, Brent Waters:
A fully collusion resistant broadcast, trace, and revoke system. CCS 2006: 211-220 - [c73]Louis Kruger, Somesh Jha, Eu-Jin Goh, Dan Boneh:
Secure function evaluation with ordered binary decision diagrams. CCS 2006: 410-420 - [c72]Dan Boneh, Xavier Boyen:
On the Impossibility of Efficiently Combining Collision Resistant Hash Functions. CRYPTO 2006: 570-583 - [c71]Dan Boneh, Xavier Boyen, Shai Halevi:
Chosen Ciphertext Secure Public Key Threshold Encryption Without Random Oracles. CT-RSA 2006: 226-243 - [c70]Dan Boneh, Amit Sahai, Brent Waters:
Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys. EUROCRYPT 2006: 573-592 - [c69]Adam Barth, Dan Boneh, Brent Waters:
Privacy in Encrypted Content Distribution Using Private Broadcast Encryption. Financial Cryptography 2006: 52-64 - [c68]Dan Boneh, Emily Shen, Brent Waters:
Strongly Unforgeable Signatures Based on Computational Diffie-Hellman. Public Key Cryptography 2006: 229-240 - [c67]Martín Casado, Tal Garfinkel, Aditya Akella, Michael J. Freedman, Dan Boneh, Nick McKeown:
SANE: A Protection Architecture for Enterprise Networks. USENIX Security Symposium 2006 - [c66]Collin Jackson, Andrew Bortz, Dan Boneh, John C. Mitchell:
Protecting browser state from web privacy attacks. WWW 2006: 737-744 - [i16]Dan Boneh, Amit Sahai, Brent Waters:
Fully Collusion Resistant Traitor Tracing. IACR Cryptol. ePrint Arch. 2006: 45 (2006) - [i15]Dan Boneh, Brent Waters:
Conjunctive, Subset, and Range Queries on Encrypted Data. IACR Cryptol. ePrint Arch. 2006: 287 (2006) - [i14]Dan Boneh, Brent Waters:
A Fully Collusion Resistant Broadcast, Trace, and Revoke System. IACR Cryptol. ePrint Arch. 2006: 298 (2006) - 2005
- [j15]David Brumley, Dan Boneh:
Remote timing attacks are practical. Comput. Networks 48(5): 701-716 (2005) - [j14]Ninghui Li, Wenliang Du, Dan Boneh:
Oblivious signature-based envelope. Distributed Comput. 17(4): 293-302 (2005) - [c65]Dan Boneh, Craig Gentry, Brent Waters:
Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys. CRYPTO 2005: 258-275 - [c64]Dan Boneh, Jonathan Katz:
Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity-Based Encryption. CT-RSA 2005: 87-103 - [c63]Dan Boneh, Xavier Boyen, Eu-Jin Goh:
Hierarchical Identity Based Encryption with Constant Size Ciphertext. EUROCRYPT 2005: 440-456 - [c62]Dan Boneh, Eu-Jin Goh, Kobbi Nissim:
Evaluating 2-DNF Formulas on Ciphertexts. TCC 2005: 325-341 - [c61]Blake Ross, Collin Jackson, Nick Miyake, Dan Boneh, John C. Mitchell:
Stronger Password Authentication Using Browser Extensions. USENIX Security Symposium 2005 - [r10]Dan Boneh:
BLS Short Digital Signatures. Encyclopedia of Cryptography and Security 2005 - [r9]Dan Boneh:
Blum-Blum-Shub Pseudorandom Bit Generator. Encyclopedia of Cryptography and Security 2005 - [r8]Dan Boneh:
Blum-Goldwasser Public Key Encryption System. Encyclopedia of Cryptography and Security 2005 - [r7]Dan Boneh:
Cramer-Shoup Public Key System. Encyclopedia of Cryptography and Security 2005 - [r6]Dan Boneh:
Digital Signature Standard. Encyclopedia of Cryptography and Security 2005 - [r5]Dan Boneh:
Elgamal Digital Signature Scheme. Encyclopedia of Cryptography and Security 2005 - [r4]Dan Boneh:
Rabin Digital Signature Scheme. Encyclopedia of Cryptography and Security 2005 - [r3]Dan Boneh:
Schnorr Digital Signature Scheme. Encyclopedia of Cryptography and Security 2005 - [r2]Dan Boneh:
Secure signatures from the "strong RSA" assumption. Encyclopedia of Cryptography and Security 2005 - [r1]Dan Boneh:
Strong RSA Assumption. Encyclopedia of Cryptography and Security 2005 - [i13]Dan Boneh, Xavier Boyen, Eu-Jin Goh:
Hierarchical Identity Based Encryption with Constant Size Ciphertext. IACR Cryptol. ePrint Arch. 2005: 15 (2005) - [i12]Dan Boneh, Craig Gentry, Brent Waters:
Collusion Resistant Broadcast Encryption With Short Ciphertexts and Private Keys. IACR Cryptol. ePrint Arch. 2005: 18 (2005) - 2004
- [j13]Dan Boneh, Joan Feigenbaum, Abraham Silberschatz, Rebecca N. Wright:
PORTIA: Privacy, Obligations, and Rights in Technologies of Information Assessment. IEEE Data Eng. Bull. 27(1): 10-18 (2004) - [j12]Dan Boneh, Ben Lynn, Hovav Shacham:
Short Signatures from the Weil Pairing. J. Cryptol. 17(4): 297-319 (2004) - [j11]Hovav Shacham, Dan Boneh, Eric Rescorla:
Client-side caching for TLS. ACM Trans. Inf. Syst. Secur. 7(4): 553-575 (2004) - [j10]Dan Boneh, Xuhua Ding, Gene Tsudik:
Fine-grained control of security capabilities. ACM Trans. Internet Techn. 4(1): 60-82 (2004) - [c60]Dan Boneh, Hovav Shacham:
Group signatures with verifier-local revocation. CCS 2004: 168-177 - [c59]Hovav Shacham, Matthew Page, Ben Pfaff, Eu-Jin Goh, Nagendra Modadugu, Dan Boneh:
On the effectiveness of address-space randomization. CCS 2004: 298-307 - [c58]Dan Boneh, Xavier Boyen, Hovav Shacham:
Short Group Signatures. CRYPTO 2004: 41-55 - [c57]Dan Boneh, Xavier Boyen:
Secure Identity Based Encryption Without Random Oracles. CRYPTO 2004: 443-459 - [c56]Dan Boneh, Xavier Boyen:
Short Signatures Without Random Oracles. EUROCRYPT 2004: 56-73 - [c55]Dan Boneh, Xavier Boyen:
Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles. EUROCRYPT 2004: 223-238 - [c54]Dan Boneh, Giovanni Di Crescenzo, Rafail Ostrovsky, Giuseppe Persiano:
Public Key Encryption with Keyword Search. EUROCRYPT 2004: 506-522 - [i11]Dan Boneh, Xavier Boyen:
Short Signatures Without Random Oracles. IACR Cryptol. ePrint Arch. 2004: 171 (2004) - [i10]Dan Boneh, Xavier Boyen:
Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles. IACR Cryptol. ePrint Arch. 2004: 172 (2004) - [i9]Dan Boneh, Xavier Boyen:
Secure Identity Based Encryption Without Random Oracles. IACR Cryptol. ePrint Arch. 2004: 173 (2004) - [i8]Dan Boneh, Xavier Boyen, Hovav Shacham:
Short Group Signatures. IACR Cryptol. ePrint Arch. 2004: 174 (2004) - [i7]Dan Boneh, Jonathan Katz:
Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity-Based Encryption. IACR Cryptol. ePrint Arch. 2004: 261 (2004) - 2003
- [j9]Dan Boneh, Matthew K. Franklin:
Identity-Based Encryption from the Weil Pairing. SIAM J. Comput. 32(3): 586-615 (2003) - [c53]Dan Boneh, Ilya Mironov, Victor Shoup:
A Secure Signature Scheme from Bilinear Maps. CT-RSA 2003: 98-110 - [c52]Dan Boneh, Craig Gentry, Ben Lynn, Hovav Shacham:
Aggregate and Verifiably Encrypted Signatures from Bilinear Maps. EUROCRYPT 2003: 416-432 - [c51]Tal Garfinkel, Mendel Rosenblum, Dan Boneh:
Flexible OS Support and Applications for Trusted Computing. HotOS 2003: 145-150 - [c50]Eu-Jin Goh, Dan Boneh, Benny Pinkas, Philippe Golle:
The Design and Implementation of Protocol-Based Hidden Key Recovery. ISC 2003: 165-179 - [c49]Eu-Jin Goh, Hovav Shacham, Nagendra Modadugu, Dan Boneh:
SiRiUS: Securing Remote Untrusted Storage. NDSS 2003 - [c48]Ninghui Li, Wenliang Du, Dan Boneh:
Oblivious signature-based envelope. PODC 2003: 182-189 - [c47]Tal Garfinkel, Ben Pfaff, Jim Chow, Mendel Rosenblum, Dan Boneh:
Terra: a virtual machine-based platform for trusted computing. SOSP 2003: 193-206 - [c46]David Brumley, Dan Boneh:
Remote Timing Attacks Are Practical. USENIX Security Symposium 2003 - [e2]Dan Boneh:
Advances in Cryptology - CRYPTO 2003, 23rd Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 2003, Proceedings. Lecture Notes in Computer Science 2729, Springer 2003, ISBN 3-540-40674-3 [contents] - [i6]Dan Boneh, Giovanni Di Crescenzo, Rafail Ostrovsky, Giuseppe Persiano:
Public Key Encryption with keyword Search. IACR Cryptol. ePrint Arch. 2003: 195 (2003) - 2002
- [j8]Dan Boneh:
Finding Smooth Integers in Short Intervals Using CRT Decoding. J. Comput. Syst. Sci. 64(4): 768-784 (2002) - [c45]Philippe Golle, Sheng Zhong, Dan Boneh, Markus Jakobsson, Ari Juels:
Optimistic Mixing for Exit-Polls. ASIACRYPT 2002: 451-465 - [c44]Matthias Jacob, Dan Boneh, Edward W. Felten:
Attacking an Obfuscated Cipher by Injecting Faults. Digital Rights Management Workshop 2002: 16-31 - [c43]Dan Boneh, Philippe Golle:
Almost entirely correct mixing with applications to voting. CCS 2002: 68-77 - [c42]Hovav Shacham, Dan Boneh:
Fast-Track Session Establishment for TLS. NDSS 2002 - [e1]Dan Boneh:
Proceedings of the 11th USENIX Security Symposium, San Francisco, CA, USA, August 5-9, 2002. USENIX 2002, ISBN 1-931971-00-5 [contents] - [i5]Dan Boneh, Alice Silverberg:
Applications of Multilinear Forms to Cryptography. IACR Cryptol. ePrint Arch. 2002: 80 (2002) - [i4]Dan Boneh, Craig Gentry, Ben Lynn, Hovav Shacham:
Aggregate and Verifiably Encrypted Signatures from Bilinear Maps. IACR Cryptol. ePrint Arch. 2002: 175 (2002) - 2001
- [j7]Eric B. Baum, Dan Boneh, Charles Garrett:
Where Genetic Algorithms Excel. Evol. Comput. 9(1): 93-124 (2001) - [j6]Dan Boneh, Matthew K. Franklin:
Efficient generation of shared RSA keys. J. ACM 48(4): 702-722 (2001) - [j5]Dan Boneh, Richard A. DeMillo, Richard J. Lipton:
On the Importance of Eliminating Errors in Cryptographic Computations. J. Cryptol. 14(2): 101-119 (2001) - [c41]Dan Boneh, Shai Halevi, Nick Howgrave-Graham:
The Modular Inversion Hidden Number Problem. ASIACRYPT 2001: 36-51 - [c40]Dan Boneh, Ben Lynn, Hovav Shacham:
Short Signatures from the Weil Pairing. ASIACRYPT 2001: 514-532 - [c39]Dan Boneh, Igor E. Shparlinski:
On the Unpredictability of Bits of the Elliptic Curve Diffie--Hellman Scheme. CRYPTO 2001: 201-212 - [c38]Dan Boneh, Matthew K. Franklin:
Identity-Based Encryption from the Weil Pairing. CRYPTO 2001: 213-229 - [c37]Dan Boneh:
Simplified OAEP for the RSA and Rabin Functions. CRYPTO 2001: 275-291 - [c36]Hovav Shacham, Dan Boneh:
Improving SSL Handshake Performance via Batching. CT-RSA 2001: 28-43 - [c35]Dan Boneh, Glenn Durfee, Matthew K. Franklin:
Lower Bounds for Multicast Message Authentication. EUROCRYPT 2001: 437-452 - [c34]Dan Boneh, Xuhua Ding, Gene Tsudik, Chi-Ming Wong:
A Method for Fast Revocation of Public Key Certificates and Security Capabilities. USENIX Security Symposium 2001 - [i3]Dan Boneh, Matthew K. Franklin:
Identity Based Encryption From the Weil Pairing. IACR Cryptol. ePrint Arch. 2001: 90 (2001) - 2000
- [j4]Dan Boneh, Glenn Durfee:
Cryptanalysis of RSA with private key d less than N0.292. IEEE Trans. Inf. Theory 46(4): 1339-1349 (2000) - [c33]Dan Boneh, Antoine Joux, Phong Q. Nguyen:
Why Textbook ElGamal and RSA Encryption Are Insecure. ASIACRYPT 2000: 30-43 - [c32]David Lie, Chandramohan A. Thekkath, Mark Mitchell, Patrick Lincoln, Dan Boneh, John C. Mitchell, Mark Horowitz:
Architectural Support for Copy and Tamper Resistant Software. ASPLOS 2000: 168-177 - [c31]Dan Boneh, Moni Naor:
Timed Commitments. CRYPTO 2000: 236-254 - [c30]Dan Boneh, Nagendra Modadugu, Michael Kim:
Generating RSA Keys on a Handheld Using an Untrusted Server. INDOCRYPT 2000: 271-282 - [c29]Dan Boneh:
Finding smooth integers in short intervals using CRT decoding. STOC 2000: 265-272
1990 – 1999
- 1999
- [j3]Eli Biham, Dan Boneh, Omer Reingold:
Breaking Generalized Diffie-Hellmann Modulo a Composite is no Easier Than Factoring. Inf. Process. Lett. 70(2): 83-87 (1999) - [c28]Dan Boneh, Matthew K. Franklin:
Anonymous Authentication with Subset Queries (extended abstract). CCS 1999: 113-119 - [c27]Dan Boneh, Glenn Durfee, Nick Howgrave-Graham:
Factoring N = prq for Large r. CRYPTO 1999: 326-337 - [c26]Dan Boneh, Matthew K. Franklin:
An Efficient Public Key Traitor Tracing Scheme. CRYPTO 1999: 338-353 - [c25]Dan Boneh, Glenn Durfee:
Cryptanalysis of RSA with Private Key d Less than N0.292. EUROCRYPT 1999: 1-11 - [c24]Neil Daswani, Dan Boneh:
Experimenting with Electronic Commerce on the PalmPilot. Financial Cryptography 1999: 1-16 - [c23]Michael Malkin, Thomas D. Wu, Dan Boneh:
Experimenting with Shared Generation of RSA Keys. NDSS 1999 - [c22]Thomas D. Wu, Michael Malkin, Dan Boneh:
Building Intrusion-Tolerant Applications. USENIX Security Symposium 1999 - 1998
- [j2]Dan Boneh, James Shaw:
Collusion-Secure Fingerprinting for Digital Data. IEEE Trans. Inf. Theory 44(5): 1897-1905 (1998) - [c21]Dan Boneh:
The Decision Diffie-Hellman Problem. ANTS 1998: 48-63 - [c20]Dan Boneh, Jeremy Horwitz:
Generating a Product of Three Primes with an Unknown Factorization. ANTS 1998: 237-251 - [c19]Dan Boneh, Glenn Durfee, Yair Frankel:
An Attack on RSA Given a Small Fraction of the Private Key Bits. ASIACRYPT 1998: 25-34 - [c18]Dan Boneh, Ramarathnam Venkatesan:
Breaking RSA May Not Be Equivalent to Factoring. EUROCRYPT 1998: 59-71 - [c17]Neil Daswani, Dan Boneh, Hector Garcia-Molina, Steven P. Ketchpel, Andreas Paepcke:
SWAPEROO: A Simple Wallet Architecture for Payments, Exchanges, Refunds, and Other Operations. USENIX Workshop on Electronic Commerce 1998 - 1997
- [c16]Aviel D. Rubin, Dan Boneh, Kevin Fu:
Revocation of Unread E-mail in an Untrusted Network. ACISP 1997: 62-75 - [c15]Dan Boneh, Matthew K. Franklin:
Efficient Generation of Shared RSA Keys (Extended Abstract). CRYPTO 1997: 425-439 - [c14]Dan Boneh, Richard A. DeMillo, Richard J. Lipton:
On the Importance of Checking Cryptographic Protocols for Faults (Extended Abstract). EUROCRYPT 1997: 37-51 - [c13]Dan Boneh, Richard J. Lipton:
Effect of Operators on Straight Line Complexity. ISTCS 1997: 1-5 - [c12]Dan Boneh, Ramarathnam Venkatesan:
Rounding in Lattices and its Cryptographic Applications. SODA 1997: 675-681 - [i2]Eli Biham, Dan Boneh, Omer Reingold:
Generalized Diffie-Hellman Modulo a Composite is not Weaker than Factoring. Electron. Colloquium Comput. Complex. TR97 (1997) - [i1]Eli Biham, Dan Boneh, Omer Reingold:
Generalized Diffie-Hellman Modulo a Composite is not Weaker than Factoring. IACR Cryptol. ePrint Arch. 1997: 14 (1997) - 1996
- [j1]Dan Boneh, Christopher Dunworth, Richard J. Lipton, Jirí Sgall:
On the Computational Power of DNA. Discret. Appl. Math. 71(1-3): 79-94 (1996) - [c11]Dan Boneh, Ramarathnam Venkatesan:
Hardness of Computing the Most Significant Bits of Secret Keys in Diffie-Hellman and Related Schemes. CRYPTO 1996: 129-142 - [c10]Dan Boneh, Richard J. Lipton:
Algorithms for Black-Box Fields and their Application to Cryptography (Extended Abstract). CRYPTO 1996: 283-297 - [c9]Eric B. Baum, Dan Boneh:
Running dynamic programming algorithms on a DNA computer. DNA Based Computers 1996: 77-85 - [c8]Dan Boneh, Christopher Dunworth, Richard J. Lipton, Jirí Sgall:
Making DNA computers error resistant. DNA Based Computers 1996: 163-170 - [c7]Dan Boneh, Richard J. Lipton:
A Revocable Backup System. USENIX Security Symposium 1996 - 1995
- [c6]Eric B. Baum, Dan Boneh, Charles Garrett:
On Genetic Algorithms. COLT 1995: 230-239 - [c5]Dan Boneh:
Learning Using Group Representations (Extended Abstract). COLT 1995: 418-426 - [c4]Dan Boneh, Richard J. Lipton:
Quantum Cryptanalysis of Hidden Linear Functions (Extended Abstract). CRYPTO 1995: 424-437 - [c3]Dan Boneh, James Shaw:
Collusion-Secure Fingerprinting for Digital Data (Extended Abstract). CRYPTO 1995: 452-465 - [c2]Dan Boneh, Christopher Dunworth, Richard J. Lipton:
Breaking DES using a molecular computer. DNA Based Computers 1995: 37-65 - 1993
- [c1]Dan Boneh, Richard J. Lipton:
Amplification of Weak Learning under the Uniform Distribution. COLT 1993: 347-351
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:19 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint