The SCEAS System
| |||||||

## Search the dblp DataBase
Dan Boneh:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
## Publications of Author- Aviel D. Rubin, Dan Boneh, Kevin Fu
**Revocation of Unread E-mail in an Untrusted Network.**[Citation Graph (0, 0)][DBLP] ACISP, 1997, pp:62-75 [Conf] - Dan Boneh
**The Decision Diffie-Hellman Problem.**[Citation Graph (0, 0)][DBLP] ANTS, 1998, pp:48-63 [Conf] - Dan Boneh, Jeremy Horwitz
**Generating a Product of Three Primes with an Unknown Factorization.**[Citation Graph (0, 0)][DBLP] ANTS, 1998, pp:237-251 [Conf] - Dan Boneh, Glenn Durfee, Yair Frankel
**An Attack on RSA Given a Small Fraction of the Private Key Bits.**[Citation Graph (0, 0)][DBLP] ASIACRYPT, 1998, pp:25-34 [Conf] - Dan Boneh, Shai Halevi, Nick Howgrave-Graham
**The Modular Inversion Hidden Number Problem.**[Citation Graph (0, 0)][DBLP] ASIACRYPT, 2001, pp:36-51 [Conf] - Dan Boneh, Antoine Joux, Phong Q. Nguyen
**Why Textbook ElGamal and RSA Encryption Are Insecure.**[Citation Graph (0, 0)][DBLP] ASIACRYPT, 2000, pp:30-43 [Conf] - Dan Boneh, Ben Lynn, Hovav Shacham
**Short Signatures from the Weil Pairing.**[Citation Graph (0, 0)][DBLP] ASIACRYPT, 2001, pp:514-532 [Conf] - Philippe Golle, Sheng Zhong, Dan Boneh, Markus Jakobsson, Ari Juels
**Optimistic Mixing for Exit-Polls.**[Citation Graph (0, 0)][DBLP] ASIACRYPT, 2002, pp:451-465 [Conf] - David Lie, Chandramohan A. Thekkath, Mark Mitchell, Patrick Lincoln, Dan Boneh, John C. Mitchell, Mark Horowitz
**Architectural Support for Copy and Tamper Resistant Software.**[Citation Graph (0, 0)][DBLP] ASPLOS, 2000, pp:168-177 [Conf] - Dan Boneh, Matthew K. Franklin
**Anonymous Authentication with Subset Queries (extended abstract).**[Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 1999, pp:113-119 [Conf] - Dan Boneh, Philippe Golle
**Almost entirely correct mixing with applications to voting.**[Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2002, pp:68-77 [Conf] - Dan Boneh, Hovav Shacham
**Group signatures with verifier-local revocation.**[Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2004, pp:168-177 [Conf] - Matthias Jacob, Dan Boneh, Edward W. Felten
**Attacking an Obfuscated Cipher by Injecting Faults.**[Citation Graph (0, 0)][DBLP] Digital Rights Management Workshop, 2002, pp:16-31 [Conf] - Hovav Shacham, Matthew Page, Ben Pfaff, Eu-Jin Goh, Nagendra Modadugu, Dan Boneh
**On the effectiveness of address-space randomization.**[Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2004, pp:298-307 [Conf] - Louis Kruger, Somesh Jha, Eu-Jin Goh, Dan Boneh
**Secure function evaluation with ordered binary decision diagrams.**[Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2006, pp:410-420 [Conf] - Dan Boneh, Brent Waters
**A fully collusion resistant broadcast, trace, and revoke system.**[Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2006, pp:211-220 [Conf] - Dan Boneh
**Learning Using Group Representations (Extended Abstract).**[Citation Graph (0, 0)][DBLP] COLT, 1995, pp:418-426 [Conf] - Dan Boneh, Richard J. Lipton
**Amplification of Weak Learning under the Uniform Distribution.**[Citation Graph (0, 0)][DBLP] COLT, 1993, pp:347-351 [Conf] - Eric B. Baum, Dan Boneh, Charles Garrett
**On Genetic Algorithms.**[Citation Graph (0, 0)][DBLP] COLT, 1995, pp:230-239 [Conf] - Dan Boneh
**Simplified OAEP for the RSA and Rabin Functions.**[Citation Graph (0, 0)][DBLP] CRYPTO, 2001, pp:275-291 [Conf] - Dan Boneh, Xavier Boyen
**Secure Identity Based Encryption Without Random Oracles.**[Citation Graph (0, 0)][DBLP] CRYPTO, 2004, pp:443-459 [Conf] - Dan Boneh, Xavier Boyen, Hovav Shacham
**Short Group Signatures.**[Citation Graph (0, 0)][DBLP] CRYPTO, 2004, pp:41-55 [Conf] - Dan Boneh, Glenn Durfee, Nick Howgrave-Graham
**Factoring N = p**[Citation Graph (0, 0)][DBLP]^{r}q for Large r. CRYPTO, 1999, pp:326-337 [Conf] - Dan Boneh, Matthew K. Franklin
**Identity-Based Encryption from the Weil Pairing.**[Citation Graph (0, 0)][DBLP] CRYPTO, 2001, pp:213-229 [Conf] - Dan Boneh, Matthew K. Franklin
**Efficient Generation of Shared RSA Keys (Extended Abstract).**[Citation Graph (0, 0)][DBLP] CRYPTO, 1997, pp:425-439 [Conf] - Dan Boneh, Matthew K. Franklin
**An Efficient Public Key Traitor Tracing Scheme.**[Citation Graph (0, 0)][DBLP] CRYPTO, 1999, pp:338-353 [Conf] - Dan Boneh, Craig Gentry, Brent Waters
**Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys.**[Citation Graph (0, 0)][DBLP] CRYPTO, 2005, pp:258-275 [Conf] - Dan Boneh, Richard J. Lipton
**Quantum Cryptanalysis of Hidden Linear Functions (Extended Abstract).**[Citation Graph (0, 0)][DBLP] CRYPTO, 1995, pp:424-437 [Conf] - Dan Boneh, Richard J. Lipton
**Algorithms for Black-Box Fields and their Application to Cryptography (Extended Abstract).**[Citation Graph (0, 0)][DBLP] CRYPTO, 1996, pp:283-297 [Conf] - Dan Boneh, Moni Naor
**Timed Commitments.**[Citation Graph (0, 0)][DBLP] CRYPTO, 2000, pp:236-254 [Conf] - Dan Boneh, Igor Shparlinski
**On the Unpredictability of Bits of the Elliptic Curve Diffie--Hellman Scheme.**[Citation Graph (0, 0)][DBLP] CRYPTO, 2001, pp:201-212 [Conf] - Dan Boneh, James Shaw
**Collusion-Secure Fingerprinting for Digital Data (Extended Abstract).**[Citation Graph (0, 0)][DBLP] CRYPTO, 1995, pp:452-465 [Conf] - Dan Boneh, Ramarathnam Venkatesan
**Hardness of Computing the Most Significant Bits of Secret Keys in Diffie-Hellman and Related Schemes.**[Citation Graph (0, 0)][DBLP] CRYPTO, 1996, pp:129-142 [Conf] - Dan Boneh, Xavier Boyen
**On the Impossibility of Efficiently Combining Collision Resistant Hash Functions.**[Citation Graph (0, 0)][DBLP] CRYPTO, 2006, pp:570-583 [Conf] - Dan Boneh, Xavier Boyen, Shai Halevi
**Chosen Ciphertext Secure Public Key Threshold Encryption Without Random Oracles.**[Citation Graph (0, 0)][DBLP] CT-RSA, 2006, pp:226-243 [Conf] - Dan Boneh, Jonathan Katz
**Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity-Based Encryption.**[Citation Graph (0, 0)][DBLP] CT-RSA, 2005, pp:87-103 [Conf] - Dan Boneh, Ilya Mironov, Victor Shoup
**A Secure Signature Scheme from Bilinear Maps.**[Citation Graph (0, 0)][DBLP] CT-RSA, 2003, pp:98-110 [Conf] - Hovav Shacham, Dan Boneh
**Improving SSL Handshake Performance via Batching.**[Citation Graph (0, 0)][DBLP] CT-RSA, 2001, pp:28-43 [Conf] - Dan Boneh, Xavier Boyen
**Short Signatures Without Random Oracles.**[Citation Graph (0, 0)][DBLP] EUROCRYPT, 2004, pp:56-73 [Conf] - Dan Boneh, Xavier Boyen
**Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles.**[Citation Graph (0, 0)][DBLP] EUROCRYPT, 2004, pp:223-238 [Conf] - Dan Boneh, Xavier Boyen, Eu-Jin Goh
**Hierarchical Identity Based Encryption with Constant Size Ciphertext.**[Citation Graph (0, 0)][DBLP] EUROCRYPT, 2005, pp:440-456 [Conf] - Dan Boneh, Giovanni Di Crescenzo, Rafail Ostrovsky, Giuseppe Persiano
**Public Key Encryption with Keyword Search.**[Citation Graph (0, 0)][DBLP] EUROCRYPT, 2004, pp:506-522 [Conf] - Dan Boneh, Glenn Durfee
**Cryptanalysis of RSA with Private Key**[Citation Graph (0, 0)][DBLP]*d*Less than*N*^{0.292}. EUROCRYPT, 1999, pp:1-11 [Conf] - Dan Boneh, Glenn Durfee, Matthew K. Franklin
**Lower Bounds for Multicast Message Authentication.**[Citation Graph (0, 0)][DBLP] EUROCRYPT, 2001, pp:437-452 [Conf] - Dan Boneh, Richard A. DeMillo, Richard J. Lipton
**On the Importance of Checking Cryptographic Protocols for Faults (Extended Abstract).**[Citation Graph (0, 0)][DBLP] EUROCRYPT, 1997, pp:37-51 [Conf] - Dan Boneh, Craig Gentry, Ben Lynn, Hovav Shacham
**Aggregate and Verifiably Encrypted Signatures from Bilinear Maps.**[Citation Graph (0, 0)][DBLP] EUROCRYPT, 2003, pp:416-432 [Conf] - Dan Boneh, Amit Sahai, Brent Waters
**Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys.**[Citation Graph (0, 0)][DBLP] EUROCRYPT, 2006, pp:573-592 [Conf] - Dan Boneh, Ramarathnam Venkatesan
**Breaking RSA May Not Be Equivalent to Factoring.**[Citation Graph (0, 0)][DBLP] EUROCRYPT, 1998, pp:59-71 [Conf] - Neil Daswani, Dan Boneh
**Experimenting with Electronic Commerce on the PalmPilot.**[Citation Graph (0, 0)][DBLP] Financial Cryptography, 1999, pp:1-16 [Conf] - Adam Barth, Dan Boneh, Brent Waters
**Privacy in Encrypted Content Distribution Using Private Broadcast Encryption.**[Citation Graph (0, 0)][DBLP] Financial Cryptography, 2006, pp:52-64 [Conf] - Tal Garfinkel, Mendel Rosenblum, Dan Boneh
**Flexible OS Support and Applications for Trusted Computing.**[Citation Graph (0, 0)][DBLP] HotOS, 2003, pp:145-150 [Conf] - Dan Boneh, Nagendra Modadugu, Michael Kim
**Generating RSA Keys on a Handheld Using an Untrusted Server.**[Citation Graph (0, 0)][DBLP] INDOCRYPT, 2000, pp:271-282 [Conf] - Dan Boneh, Richard J. Lipton
**Effect of Operators on Straight Line Complexity.**[Citation Graph (0, 0)][DBLP] ISTCS, 1997, pp:1-5 [Conf] - Eu-Jin Goh, Dan Boneh, Benny Pinkas, Philippe Golle
**The Design and Implementation of Protocol-Based Hidden Key Recovery.**[Citation Graph (0, 0)][DBLP] ISC, 2003, pp:165-179 [Conf] - Hovav Shacham, Dan Boneh
**Fast-Track Session Establishment for TLS.**[Citation Graph (0, 0)][DBLP] NDSS, 2002, pp:- [Conf] - Michael Malkin, Thomas D. Wu, Dan Boneh
**Experimenting with Shared Generation of RSA Keys.**[Citation Graph (0, 0)][DBLP] NDSS, 1999, pp:- [Conf] - Eu-Jin Goh, Hovav Shacham, Nagendra Modadugu, Dan Boneh
**SiRiUS: Securing Remote Untrusted Storage.**[Citation Graph (0, 0)][DBLP] NDSS, 2003, pp:- [Conf] - Dan Boneh, Emily Shen, Brent Waters
**Strongly Unforgeable Signatures Based on Computational Diffie-Hellman.**[Citation Graph (0, 0)][DBLP] Public Key Cryptography, 2006, pp:229-240 [Conf] - Ninghui Li, Wenliang Du, Dan Boneh
**Oblivious signature-based envelope.**[Citation Graph (0, 0)][DBLP] PODC, 2003, pp:182-189 [Conf] - Dan Boneh, Ramarathnam Venkatesan
**Rounding in Lattices and its Cryptographic Applications.**[Citation Graph (0, 0)][DBLP] SODA, 1997, pp:675-681 [Conf] - Tal Garfinkel, Ben Pfaff, Jim Chow, Mendel Rosenblum, Dan Boneh
**Terra: a virtual machine-based platform for trusted computing.**[Citation Graph (0, 0)][DBLP] SOSP, 2003, pp:193-206 [Conf] - Dan Boneh
**Finding smooth integers in short intervals using CRT decoding.**[Citation Graph (0, 0)][DBLP] STOC, 2000, pp:265-272 [Conf] - Dan Boneh, Eu-Jin Goh, Kobbi Nissim
**Evaluating 2-DNF Formulas on Ciphertexts.**[Citation Graph (0, 0)][DBLP] TCC, 2005, pp:325-341 [Conf] - Dan Boneh, Brent Waters
**Conjunctive, Subset, and Range Queries on Encrypted Data.**[Citation Graph (0, 0)][DBLP] TCC, 2007, pp:535-554 [Conf] - Collin Jackson, Andrew Bortz, Dan Boneh, John C. Mitchell
**Protecting browser state from web privacy attacks.**[Citation Graph (0, 0)][DBLP] WWW, 2006, pp:737-744 [Conf] - Collin Jackson, Andrew Bortz, Dan Boneh, John C. Mitchell
**Protecting browser state from web privacy attacks.**[Citation Graph (0, 0)][DBLP] WWW, 2006, pp:737-744 [Conf] - David Brumley, Dan Boneh
**Remote timing attacks are practical.**[Citation Graph (0, 0)][DBLP] Computer Networks, 2005, v:48, n:5, pp:701-716 [Journal] - Dan Boneh, Christopher Dunworth, Richard J. Lipton, Jiri Sgall
**On the Computational Power of DNA.**[Citation Graph (0, 0)][DBLP] Discrete Applied Mathematics, 1996, v:71, n:1-3, pp:79-94 [Journal] - Ninghui Li, Wenliang Du, Dan Boneh
**Oblivious signature-based envelope.**[Citation Graph (0, 0)][DBLP] Distributed Computing, 2005, v:17, n:4, pp:293-302 [Journal] - Dan Boneh, Joan Feigenbaum, Abraham Silberschatz, Rebecca N. Wright
**PORTIA: Privacy, Obligations, and Rights in Technologies of Information Assessment.**[Citation Graph (0, 0)][DBLP] IEEE Data Eng. Bull., 2004, v:27, n:1, pp:10-18 [Journal] - Eric B. Baum, Dan Boneh, Charles Garrett
**Where Genetic Algorithms Excel.**[Citation Graph (0, 0)][DBLP] Evolutionary Computation, 2001, v:9, n:1, pp:93-124 [Journal] - Eli Biham, Dan Boneh, Omer Reingold
**Generalized Diffie-Hellman Modulo a Composite is not Weaker than Factoring**[Citation Graph (0, 0)][DBLP] Electronic Colloquium on Computational Complexity (ECCC), 1997, v:4, n:61, pp:- [Journal] - Eli Biham, Dan Boneh, Omer Reingold
**Breaking Generalized Diffie-Hellmann Modulo a Composite is no Easier Than Factoring.**[Citation Graph (0, 0)][DBLP] Inf. Process. Lett., 1999, v:70, n:2, pp:83-87 [Journal] - Dan Boneh, Matthew K. Franklin
**Efficient generation of shared RSA keys.**[Citation Graph (0, 0)][DBLP] J. ACM, 2001, v:48, n:4, pp:702-722 [Journal] - Dan Boneh
**Finding Smooth Integers in Short Intervals Using CRT Decoding.**[Citation Graph (0, 0)][DBLP] J. Comput. Syst. Sci., 2002, v:64, n:4, pp:768-784 [Journal] - Dan Boneh, Richard A. DeMillo, Richard J. Lipton
**On the Importance of Eliminating Errors in Cryptographic Computations.**[Citation Graph (0, 0)][DBLP] J. Cryptology, 2001, v:14, n:2, pp:101-119 [Journal] - Dan Boneh, Ben Lynn, Hovav Shacham
**Short Signatures from the Weil Pairing.**[Citation Graph (0, 0)][DBLP] J. Cryptology, 2004, v:17, n:4, pp:297-319 [Journal] - Dan Boneh, Matthew K. Franklin
**Identity-Based Encryption from the Weil Pairing.**[Citation Graph (0, 0)][DBLP] SIAM J. Comput., 2003, v:32, n:3, pp:586-615 [Journal] - Dan Boneh, Ran Canetti, Shai Halevi, Jonathan Katz
**Chosen-Ciphertext Security from Identity-Based Encryption.**[Citation Graph (0, 0)][DBLP] SIAM J. Comput., 2007, v:36, n:5, pp:1301-1328 [Journal] - Hovav Shacham, Dan Boneh, Eric Rescorla
**Client-side caching for TLS.**[Citation Graph (0, 0)][DBLP] ACM Trans. Inf. Syst. Secur., 2004, v:7, n:4, pp:553-575 [Journal] - Dan Boneh, Glenn Durfee
**Cryptanalysis of RSA with private key d less than N**[Citation Graph (0, 0)][DBLP]^{0.292}. IEEE Transactions on Information Theory, 2000, v:46, n:4, pp:1339- [Journal] - Dan Boneh, James Shaw
**Collusion-Secure Fingerprinting for Digital Data.**[Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 1998, v:44, n:5, pp:1897-1905 [Journal] - Dan Boneh, Xuhua Ding, Gene Tsudik
**Fine-grained control of security capabilities.**[Citation Graph (0, 0)][DBLP] ACM Trans. Internet Techn., 2004, v:4, n:1, pp:60-82 [Journal] - Dan Boneh, Eyal Kushilevitz, Rafail Ostrovsky, William E. Skeith III
**Public Key Encryption That Allows PIR Queries.**[Citation Graph (0, 0)][DBLP] CRYPTO, 2007, pp:50-67 [Conf] - Andrew Bortz, Dan Boneh
**Exposing private information by timing web applications.**[Citation Graph (0, 0)][DBLP] WWW, 2007, pp:621-628 [Conf] - Dan Boneh
**Bilinear Groups of Composite Order.**[Citation Graph (0, 0)][DBLP] Pairing, 2007, pp:1- [Conf] **Homomorphic MACs: MAC-Based Integrity for Network Coding.**[Citation Graph (, )][DBLP]**Symmetric Cryptography in Javascript.**[Citation Graph (, )][DBLP]**Generalized Identity Based and Broadcast Encryption Schemes.**[Citation Graph (, )][DBLP]**Overshadow: a virtualization-based approach to retrofitting protection in commodity operating systems.**[Citation Graph (, )][DBLP]**Protecting browsers from dns rebinding attacks.**[Citation Graph (, )][DBLP]**Covert channels in privacy-preserving identification systems.**[Citation Graph (, )][DBLP]**Traitor tracing with constant size ciphertext.**[Citation Graph (, )][DBLP]**XCS: cross channel scripting and its impact on web applications.**[Citation Graph (, )][DBLP]**Circular-Secure Encryption from Decision Diffie-Hellman.**[Citation Graph (, )][DBLP]**Lattice Basis Delegation in Fixed Dimension and Shorter-Ciphertext Hierarchical IBE.**[Citation Graph (, )][DBLP]**07381 Executive Summary - Cryptography.**[Citation Graph (, )][DBLP]**07381 Abstracts Collection -- Cryptography.**[Citation Graph (, )][DBLP]**Kamouflage: Loss-Resistant Password Management.**[Citation Graph (, )][DBLP]**Efficient Lattice (H)IBE in the Standard Model.**[Citation Graph (, )][DBLP]**Space-Efficient Identity Based Encryption Without Pairings.**[Citation Graph (, )][DBLP]**A Brief Look at Pairings Based Cryptography.**[Citation Graph (, )][DBLP]**On the Impossibility of Basing Identity Based Encryption on Trapdoor Permutations.**[Citation Graph (, )][DBLP]**Cryptographic Methods for Storing Ballots on a Voting Machine.**[Citation Graph (, )][DBLP]**Signing a Linear Subspace: Signature Schemes for Network Coding.**[Citation Graph (, )][DBLP]**Preventing Pollution Attacks in Multi-source Network Coding.**[Citation Graph (, )][DBLP]**Private web search.**[Citation Graph (, )][DBLP]**Reducing shoulder-surfing by using gaze-based password entry.**[Citation Graph (, )][DBLP]**The emergence of cross channel scripting.**[Citation Graph (, )][DBLP]
Search in 0.032secs, Finished in 0.039secs | |||||||

| |||||||

| |||||||

System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002 for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002 |