The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Dan Boneh: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Aviel D. Rubin, Dan Boneh, Kevin Fu
    Revocation of Unread E-mail in an Untrusted Network. [Citation Graph (0, 0)][DBLP]
    ACISP, 1997, pp:62-75 [Conf]
  2. Dan Boneh
    The Decision Diffie-Hellman Problem. [Citation Graph (0, 0)][DBLP]
    ANTS, 1998, pp:48-63 [Conf]
  3. Dan Boneh, Jeremy Horwitz
    Generating a Product of Three Primes with an Unknown Factorization. [Citation Graph (0, 0)][DBLP]
    ANTS, 1998, pp:237-251 [Conf]
  4. Dan Boneh, Glenn Durfee, Yair Frankel
    An Attack on RSA Given a Small Fraction of the Private Key Bits. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1998, pp:25-34 [Conf]
  5. Dan Boneh, Shai Halevi, Nick Howgrave-Graham
    The Modular Inversion Hidden Number Problem. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2001, pp:36-51 [Conf]
  6. Dan Boneh, Antoine Joux, Phong Q. Nguyen
    Why Textbook ElGamal and RSA Encryption Are Insecure. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2000, pp:30-43 [Conf]
  7. Dan Boneh, Ben Lynn, Hovav Shacham
    Short Signatures from the Weil Pairing. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2001, pp:514-532 [Conf]
  8. Philippe Golle, Sheng Zhong, Dan Boneh, Markus Jakobsson, Ari Juels
    Optimistic Mixing for Exit-Polls. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2002, pp:451-465 [Conf]
  9. David Lie, Chandramohan A. Thekkath, Mark Mitchell, Patrick Lincoln, Dan Boneh, John C. Mitchell, Mark Horowitz
    Architectural Support for Copy and Tamper Resistant Software. [Citation Graph (0, 0)][DBLP]
    ASPLOS, 2000, pp:168-177 [Conf]
  10. Dan Boneh, Matthew K. Franklin
    Anonymous Authentication with Subset Queries (extended abstract). [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1999, pp:113-119 [Conf]
  11. Dan Boneh, Philippe Golle
    Almost entirely correct mixing with applications to voting. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2002, pp:68-77 [Conf]
  12. Dan Boneh, Hovav Shacham
    Group signatures with verifier-local revocation. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2004, pp:168-177 [Conf]
  13. Matthias Jacob, Dan Boneh, Edward W. Felten
    Attacking an Obfuscated Cipher by Injecting Faults. [Citation Graph (0, 0)][DBLP]
    Digital Rights Management Workshop, 2002, pp:16-31 [Conf]
  14. Hovav Shacham, Matthew Page, Ben Pfaff, Eu-Jin Goh, Nagendra Modadugu, Dan Boneh
    On the effectiveness of address-space randomization. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2004, pp:298-307 [Conf]
  15. Louis Kruger, Somesh Jha, Eu-Jin Goh, Dan Boneh
    Secure function evaluation with ordered binary decision diagrams. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2006, pp:410-420 [Conf]
  16. Dan Boneh, Brent Waters
    A fully collusion resistant broadcast, trace, and revoke system. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2006, pp:211-220 [Conf]
  17. Dan Boneh
    Learning Using Group Representations (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    COLT, 1995, pp:418-426 [Conf]
  18. Dan Boneh, Richard J. Lipton
    Amplification of Weak Learning under the Uniform Distribution. [Citation Graph (0, 0)][DBLP]
    COLT, 1993, pp:347-351 [Conf]
  19. Eric B. Baum, Dan Boneh, Charles Garrett
    On Genetic Algorithms. [Citation Graph (0, 0)][DBLP]
    COLT, 1995, pp:230-239 [Conf]
  20. Dan Boneh
    Simplified OAEP for the RSA and Rabin Functions. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2001, pp:275-291 [Conf]
  21. Dan Boneh, Xavier Boyen
    Secure Identity Based Encryption Without Random Oracles. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2004, pp:443-459 [Conf]
  22. Dan Boneh, Xavier Boyen, Hovav Shacham
    Short Group Signatures. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2004, pp:41-55 [Conf]
  23. Dan Boneh, Glenn Durfee, Nick Howgrave-Graham
    Factoring N = prq for Large r. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1999, pp:326-337 [Conf]
  24. Dan Boneh, Matthew K. Franklin
    Identity-Based Encryption from the Weil Pairing. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2001, pp:213-229 [Conf]
  25. Dan Boneh, Matthew K. Franklin
    Efficient Generation of Shared RSA Keys (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1997, pp:425-439 [Conf]
  26. Dan Boneh, Matthew K. Franklin
    An Efficient Public Key Traitor Tracing Scheme. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1999, pp:338-353 [Conf]
  27. Dan Boneh, Craig Gentry, Brent Waters
    Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2005, pp:258-275 [Conf]
  28. Dan Boneh, Richard J. Lipton
    Quantum Cryptanalysis of Hidden Linear Functions (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1995, pp:424-437 [Conf]
  29. Dan Boneh, Richard J. Lipton
    Algorithms for Black-Box Fields and their Application to Cryptography (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1996, pp:283-297 [Conf]
  30. Dan Boneh, Moni Naor
    Timed Commitments. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2000, pp:236-254 [Conf]
  31. Dan Boneh, Igor Shparlinski
    On the Unpredictability of Bits of the Elliptic Curve Diffie--Hellman Scheme. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2001, pp:201-212 [Conf]
  32. Dan Boneh, James Shaw
    Collusion-Secure Fingerprinting for Digital Data (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1995, pp:452-465 [Conf]
  33. Dan Boneh, Ramarathnam Venkatesan
    Hardness of Computing the Most Significant Bits of Secret Keys in Diffie-Hellman and Related Schemes. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1996, pp:129-142 [Conf]
  34. Dan Boneh, Xavier Boyen
    On the Impossibility of Efficiently Combining Collision Resistant Hash Functions. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2006, pp:570-583 [Conf]
  35. Dan Boneh, Xavier Boyen, Shai Halevi
    Chosen Ciphertext Secure Public Key Threshold Encryption Without Random Oracles. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2006, pp:226-243 [Conf]
  36. Dan Boneh, Jonathan Katz
    Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity-Based Encryption. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2005, pp:87-103 [Conf]
  37. Dan Boneh, Ilya Mironov, Victor Shoup
    A Secure Signature Scheme from Bilinear Maps. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2003, pp:98-110 [Conf]
  38. Hovav Shacham, Dan Boneh
    Improving SSL Handshake Performance via Batching. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2001, pp:28-43 [Conf]
  39. Dan Boneh, Xavier Boyen
    Short Signatures Without Random Oracles. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2004, pp:56-73 [Conf]
  40. Dan Boneh, Xavier Boyen
    Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2004, pp:223-238 [Conf]
  41. Dan Boneh, Xavier Boyen, Eu-Jin Goh
    Hierarchical Identity Based Encryption with Constant Size Ciphertext. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2005, pp:440-456 [Conf]
  42. Dan Boneh, Giovanni Di Crescenzo, Rafail Ostrovsky, Giuseppe Persiano
    Public Key Encryption with Keyword Search. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2004, pp:506-522 [Conf]
  43. Dan Boneh, Glenn Durfee
    Cryptanalysis of RSA with Private Key d Less than N0.292. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1999, pp:1-11 [Conf]
  44. Dan Boneh, Glenn Durfee, Matthew K. Franklin
    Lower Bounds for Multicast Message Authentication. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2001, pp:437-452 [Conf]
  45. Dan Boneh, Richard A. DeMillo, Richard J. Lipton
    On the Importance of Checking Cryptographic Protocols for Faults (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1997, pp:37-51 [Conf]
  46. Dan Boneh, Craig Gentry, Ben Lynn, Hovav Shacham
    Aggregate and Verifiably Encrypted Signatures from Bilinear Maps. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2003, pp:416-432 [Conf]
  47. Dan Boneh, Amit Sahai, Brent Waters
    Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2006, pp:573-592 [Conf]
  48. Dan Boneh, Ramarathnam Venkatesan
    Breaking RSA May Not Be Equivalent to Factoring. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1998, pp:59-71 [Conf]
  49. Neil Daswani, Dan Boneh
    Experimenting with Electronic Commerce on the PalmPilot. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 1999, pp:1-16 [Conf]
  50. Adam Barth, Dan Boneh, Brent Waters
    Privacy in Encrypted Content Distribution Using Private Broadcast Encryption. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2006, pp:52-64 [Conf]
  51. Tal Garfinkel, Mendel Rosenblum, Dan Boneh
    Flexible OS Support and Applications for Trusted Computing. [Citation Graph (0, 0)][DBLP]
    HotOS, 2003, pp:145-150 [Conf]
  52. Dan Boneh, Nagendra Modadugu, Michael Kim
    Generating RSA Keys on a Handheld Using an Untrusted Server. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2000, pp:271-282 [Conf]
  53. Dan Boneh, Richard J. Lipton
    Effect of Operators on Straight Line Complexity. [Citation Graph (0, 0)][DBLP]
    ISTCS, 1997, pp:1-5 [Conf]
  54. Eu-Jin Goh, Dan Boneh, Benny Pinkas, Philippe Golle
    The Design and Implementation of Protocol-Based Hidden Key Recovery. [Citation Graph (0, 0)][DBLP]
    ISC, 2003, pp:165-179 [Conf]
  55. Hovav Shacham, Dan Boneh
    Fast-Track Session Establishment for TLS. [Citation Graph (0, 0)][DBLP]
    NDSS, 2002, pp:- [Conf]
  56. Michael Malkin, Thomas D. Wu, Dan Boneh
    Experimenting with Shared Generation of RSA Keys. [Citation Graph (0, 0)][DBLP]
    NDSS, 1999, pp:- [Conf]
  57. Eu-Jin Goh, Hovav Shacham, Nagendra Modadugu, Dan Boneh
    SiRiUS: Securing Remote Untrusted Storage. [Citation Graph (0, 0)][DBLP]
    NDSS, 2003, pp:- [Conf]
  58. Dan Boneh, Emily Shen, Brent Waters
    Strongly Unforgeable Signatures Based on Computational Diffie-Hellman. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2006, pp:229-240 [Conf]
  59. Ninghui Li, Wenliang Du, Dan Boneh
    Oblivious signature-based envelope. [Citation Graph (0, 0)][DBLP]
    PODC, 2003, pp:182-189 [Conf]
  60. Dan Boneh, Ramarathnam Venkatesan
    Rounding in Lattices and its Cryptographic Applications. [Citation Graph (0, 0)][DBLP]
    SODA, 1997, pp:675-681 [Conf]
  61. Tal Garfinkel, Ben Pfaff, Jim Chow, Mendel Rosenblum, Dan Boneh
    Terra: a virtual machine-based platform for trusted computing. [Citation Graph (0, 0)][DBLP]
    SOSP, 2003, pp:193-206 [Conf]
  62. Dan Boneh
    Finding smooth integers in short intervals using CRT decoding. [Citation Graph (0, 0)][DBLP]
    STOC, 2000, pp:265-272 [Conf]
  63. Dan Boneh, Eu-Jin Goh, Kobbi Nissim
    Evaluating 2-DNF Formulas on Ciphertexts. [Citation Graph (0, 0)][DBLP]
    TCC, 2005, pp:325-341 [Conf]
  64. Dan Boneh, Brent Waters
    Conjunctive, Subset, and Range Queries on Encrypted Data. [Citation Graph (0, 0)][DBLP]
    TCC, 2007, pp:535-554 [Conf]
  65. Collin Jackson, Andrew Bortz, Dan Boneh, John C. Mitchell
    Protecting browser state from web privacy attacks. [Citation Graph (0, 0)][DBLP]
    WWW, 2006, pp:737-744 [Conf]
  66. Collin Jackson, Andrew Bortz, Dan Boneh, John C. Mitchell
    Protecting browser state from web privacy attacks. [Citation Graph (0, 0)][DBLP]
    WWW, 2006, pp:737-744 [Conf]
  67. David Brumley, Dan Boneh
    Remote timing attacks are practical. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2005, v:48, n:5, pp:701-716 [Journal]
  68. Dan Boneh, Christopher Dunworth, Richard J. Lipton, Jiri Sgall
    On the Computational Power of DNA. [Citation Graph (0, 0)][DBLP]
    Discrete Applied Mathematics, 1996, v:71, n:1-3, pp:79-94 [Journal]
  69. Ninghui Li, Wenliang Du, Dan Boneh
    Oblivious signature-based envelope. [Citation Graph (0, 0)][DBLP]
    Distributed Computing, 2005, v:17, n:4, pp:293-302 [Journal]
  70. Dan Boneh, Joan Feigenbaum, Abraham Silberschatz, Rebecca N. Wright
    PORTIA: Privacy, Obligations, and Rights in Technologies of Information Assessment. [Citation Graph (0, 0)][DBLP]
    IEEE Data Eng. Bull., 2004, v:27, n:1, pp:10-18 [Journal]
  71. Eric B. Baum, Dan Boneh, Charles Garrett
    Where Genetic Algorithms Excel. [Citation Graph (0, 0)][DBLP]
    Evolutionary Computation, 2001, v:9, n:1, pp:93-124 [Journal]
  72. Eli Biham, Dan Boneh, Omer Reingold
    Generalized Diffie-Hellman Modulo a Composite is not Weaker than Factoring [Citation Graph (0, 0)][DBLP]
    Electronic Colloquium on Computational Complexity (ECCC), 1997, v:4, n:61, pp:- [Journal]
  73. Eli Biham, Dan Boneh, Omer Reingold
    Breaking Generalized Diffie-Hellmann Modulo a Composite is no Easier Than Factoring. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1999, v:70, n:2, pp:83-87 [Journal]
  74. Dan Boneh, Matthew K. Franklin
    Efficient generation of shared RSA keys. [Citation Graph (0, 0)][DBLP]
    J. ACM, 2001, v:48, n:4, pp:702-722 [Journal]
  75. Dan Boneh
    Finding Smooth Integers in Short Intervals Using CRT Decoding. [Citation Graph (0, 0)][DBLP]
    J. Comput. Syst. Sci., 2002, v:64, n:4, pp:768-784 [Journal]
  76. Dan Boneh, Richard A. DeMillo, Richard J. Lipton
    On the Importance of Eliminating Errors in Cryptographic Computations. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 2001, v:14, n:2, pp:101-119 [Journal]
  77. Dan Boneh, Ben Lynn, Hovav Shacham
    Short Signatures from the Weil Pairing. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 2004, v:17, n:4, pp:297-319 [Journal]
  78. Dan Boneh, Matthew K. Franklin
    Identity-Based Encryption from the Weil Pairing. [Citation Graph (0, 0)][DBLP]
    SIAM J. Comput., 2003, v:32, n:3, pp:586-615 [Journal]
  79. Dan Boneh, Ran Canetti, Shai Halevi, Jonathan Katz
    Chosen-Ciphertext Security from Identity-Based Encryption. [Citation Graph (0, 0)][DBLP]
    SIAM J. Comput., 2007, v:36, n:5, pp:1301-1328 [Journal]
  80. Hovav Shacham, Dan Boneh, Eric Rescorla
    Client-side caching for TLS. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2004, v:7, n:4, pp:553-575 [Journal]
  81. Dan Boneh, Glenn Durfee
    Cryptanalysis of RSA with private key d less than N0.292. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2000, v:46, n:4, pp:1339- [Journal]
  82. Dan Boneh, James Shaw
    Collusion-Secure Fingerprinting for Digital Data. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1998, v:44, n:5, pp:1897-1905 [Journal]
  83. Dan Boneh, Xuhua Ding, Gene Tsudik
    Fine-grained control of security capabilities. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Internet Techn., 2004, v:4, n:1, pp:60-82 [Journal]
  84. Dan Boneh, Eyal Kushilevitz, Rafail Ostrovsky, William E. Skeith III
    Public Key Encryption That Allows PIR Queries. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2007, pp:50-67 [Conf]
  85. Andrew Bortz, Dan Boneh
    Exposing private information by timing web applications. [Citation Graph (0, 0)][DBLP]
    WWW, 2007, pp:621-628 [Conf]
  86. Dan Boneh
    Bilinear Groups of Composite Order. [Citation Graph (0, 0)][DBLP]
    Pairing, 2007, pp:1- [Conf]

  87. Homomorphic MACs: MAC-Based Integrity for Network Coding. [Citation Graph (, )][DBLP]


  88. Symmetric Cryptography in Javascript. [Citation Graph (, )][DBLP]


  89. Generalized Identity Based and Broadcast Encryption Schemes. [Citation Graph (, )][DBLP]


  90. Overshadow: a virtualization-based approach to retrofitting protection in commodity operating systems. [Citation Graph (, )][DBLP]


  91. Protecting browsers from dns rebinding attacks. [Citation Graph (, )][DBLP]


  92. Covert channels in privacy-preserving identification systems. [Citation Graph (, )][DBLP]


  93. Traitor tracing with constant size ciphertext. [Citation Graph (, )][DBLP]


  94. XCS: cross channel scripting and its impact on web applications. [Citation Graph (, )][DBLP]


  95. Circular-Secure Encryption from Decision Diffie-Hellman. [Citation Graph (, )][DBLP]


  96. Lattice Basis Delegation in Fixed Dimension and Shorter-Ciphertext Hierarchical IBE. [Citation Graph (, )][DBLP]


  97. 07381 Executive Summary - Cryptography. [Citation Graph (, )][DBLP]


  98. 07381 Abstracts Collection -- Cryptography. [Citation Graph (, )][DBLP]


  99. Kamouflage: Loss-Resistant Password Management. [Citation Graph (, )][DBLP]


  100. Efficient Lattice (H)IBE in the Standard Model. [Citation Graph (, )][DBLP]


  101. Space-Efficient Identity Based Encryption Without Pairings. [Citation Graph (, )][DBLP]


  102. A Brief Look at Pairings Based Cryptography. [Citation Graph (, )][DBLP]


  103. On the Impossibility of Basing Identity Based Encryption on Trapdoor Permutations. [Citation Graph (, )][DBLP]


  104. Cryptographic Methods for Storing Ballots on a Voting Machine. [Citation Graph (, )][DBLP]


  105. Signing a Linear Subspace: Signature Schemes for Network Coding. [Citation Graph (, )][DBLP]


  106. Preventing Pollution Attacks in Multi-source Network Coding. [Citation Graph (, )][DBLP]


  107. Private web search. [Citation Graph (, )][DBLP]


  108. Reducing shoulder-surfing by using gaze-based password entry. [Citation Graph (, )][DBLP]


  109. The emergence of cross channel scripting. [Citation Graph (, )][DBLP]


Search in 0.051secs, Finished in 0.054secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002