Search the dblp DataBase
Dan Boneh :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Aviel D. Rubin , Dan Boneh , Kevin Fu Revocation of Unread E-mail in an Untrusted Network. [Citation Graph (0, 0)][DBLP ] ACISP, 1997, pp:62-75 [Conf ] Dan Boneh The Decision Diffie-Hellman Problem. [Citation Graph (0, 0)][DBLP ] ANTS, 1998, pp:48-63 [Conf ] Dan Boneh , Jeremy Horwitz Generating a Product of Three Primes with an Unknown Factorization. [Citation Graph (0, 0)][DBLP ] ANTS, 1998, pp:237-251 [Conf ] Dan Boneh , Glenn Durfee , Yair Frankel An Attack on RSA Given a Small Fraction of the Private Key Bits. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1998, pp:25-34 [Conf ] Dan Boneh , Shai Halevi , Nick Howgrave-Graham The Modular Inversion Hidden Number Problem. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2001, pp:36-51 [Conf ] Dan Boneh , Antoine Joux , Phong Q. Nguyen Why Textbook ElGamal and RSA Encryption Are Insecure. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2000, pp:30-43 [Conf ] Dan Boneh , Ben Lynn , Hovav Shacham Short Signatures from the Weil Pairing. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2001, pp:514-532 [Conf ] Philippe Golle , Sheng Zhong , Dan Boneh , Markus Jakobsson , Ari Juels Optimistic Mixing for Exit-Polls. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2002, pp:451-465 [Conf ] David Lie , Chandramohan A. Thekkath , Mark Mitchell , Patrick Lincoln , Dan Boneh , John C. Mitchell , Mark Horowitz Architectural Support for Copy and Tamper Resistant Software. [Citation Graph (0, 0)][DBLP ] ASPLOS, 2000, pp:168-177 [Conf ] Dan Boneh , Matthew K. Franklin Anonymous Authentication with Subset Queries (extended abstract). [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 1999, pp:113-119 [Conf ] Dan Boneh , Philippe Golle Almost entirely correct mixing with applications to voting. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2002, pp:68-77 [Conf ] Dan Boneh , Hovav Shacham Group signatures with verifier-local revocation. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2004, pp:168-177 [Conf ] Matthias Jacob , Dan Boneh , Edward W. Felten Attacking an Obfuscated Cipher by Injecting Faults. [Citation Graph (0, 0)][DBLP ] Digital Rights Management Workshop, 2002, pp:16-31 [Conf ] Hovav Shacham , Matthew Page , Ben Pfaff , Eu-Jin Goh , Nagendra Modadugu , Dan Boneh On the effectiveness of address-space randomization. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2004, pp:298-307 [Conf ] Louis Kruger , Somesh Jha , Eu-Jin Goh , Dan Boneh Secure function evaluation with ordered binary decision diagrams. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2006, pp:410-420 [Conf ] Dan Boneh , Brent Waters A fully collusion resistant broadcast, trace, and revoke system. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2006, pp:211-220 [Conf ] Dan Boneh Learning Using Group Representations (Extended Abstract). [Citation Graph (0, 0)][DBLP ] COLT, 1995, pp:418-426 [Conf ] Dan Boneh , Richard J. Lipton Amplification of Weak Learning under the Uniform Distribution. [Citation Graph (0, 0)][DBLP ] COLT, 1993, pp:347-351 [Conf ] Eric B. Baum , Dan Boneh , Charles Garrett On Genetic Algorithms. [Citation Graph (0, 0)][DBLP ] COLT, 1995, pp:230-239 [Conf ] Dan Boneh Simplified OAEP for the RSA and Rabin Functions. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2001, pp:275-291 [Conf ] Dan Boneh , Xavier Boyen Secure Identity Based Encryption Without Random Oracles. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2004, pp:443-459 [Conf ] Dan Boneh , Xavier Boyen , Hovav Shacham Short Group Signatures. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2004, pp:41-55 [Conf ] Dan Boneh , Glenn Durfee , Nick Howgrave-Graham Factoring N = pr q for Large r. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1999, pp:326-337 [Conf ] Dan Boneh , Matthew K. Franklin Identity-Based Encryption from the Weil Pairing. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2001, pp:213-229 [Conf ] Dan Boneh , Matthew K. Franklin Efficient Generation of Shared RSA Keys (Extended Abstract). [Citation Graph (0, 0)][DBLP ] CRYPTO, 1997, pp:425-439 [Conf ] Dan Boneh , Matthew K. Franklin An Efficient Public Key Traitor Tracing Scheme. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1999, pp:338-353 [Conf ] Dan Boneh , Craig Gentry , Brent Waters Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2005, pp:258-275 [Conf ] Dan Boneh , Richard J. Lipton Quantum Cryptanalysis of Hidden Linear Functions (Extended Abstract). [Citation Graph (0, 0)][DBLP ] CRYPTO, 1995, pp:424-437 [Conf ] Dan Boneh , Richard J. Lipton Algorithms for Black-Box Fields and their Application to Cryptography (Extended Abstract). [Citation Graph (0, 0)][DBLP ] CRYPTO, 1996, pp:283-297 [Conf ] Dan Boneh , Moni Naor Timed Commitments. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2000, pp:236-254 [Conf ] Dan Boneh , Igor Shparlinski On the Unpredictability of Bits of the Elliptic Curve Diffie--Hellman Scheme. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2001, pp:201-212 [Conf ] Dan Boneh , James Shaw Collusion-Secure Fingerprinting for Digital Data (Extended Abstract). [Citation Graph (0, 0)][DBLP ] CRYPTO, 1995, pp:452-465 [Conf ] Dan Boneh , Ramarathnam Venkatesan Hardness of Computing the Most Significant Bits of Secret Keys in Diffie-Hellman and Related Schemes. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1996, pp:129-142 [Conf ] Dan Boneh , Xavier Boyen On the Impossibility of Efficiently Combining Collision Resistant Hash Functions. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2006, pp:570-583 [Conf ] Dan Boneh , Xavier Boyen , Shai Halevi Chosen Ciphertext Secure Public Key Threshold Encryption Without Random Oracles. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2006, pp:226-243 [Conf ] Dan Boneh , Jonathan Katz Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity-Based Encryption. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2005, pp:87-103 [Conf ] Dan Boneh , Ilya Mironov , Victor Shoup A Secure Signature Scheme from Bilinear Maps. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2003, pp:98-110 [Conf ] Hovav Shacham , Dan Boneh Improving SSL Handshake Performance via Batching. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2001, pp:28-43 [Conf ] Dan Boneh , Xavier Boyen Short Signatures Without Random Oracles. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2004, pp:56-73 [Conf ] Dan Boneh , Xavier Boyen Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2004, pp:223-238 [Conf ] Dan Boneh , Xavier Boyen , Eu-Jin Goh Hierarchical Identity Based Encryption with Constant Size Ciphertext. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2005, pp:440-456 [Conf ] Dan Boneh , Giovanni Di Crescenzo , Rafail Ostrovsky , Giuseppe Persiano Public Key Encryption with Keyword Search. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2004, pp:506-522 [Conf ] Dan Boneh , Glenn Durfee Cryptanalysis of RSA with Private Key d Less than N 0.292 . [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1999, pp:1-11 [Conf ] Dan Boneh , Glenn Durfee , Matthew K. Franklin Lower Bounds for Multicast Message Authentication. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2001, pp:437-452 [Conf ] Dan Boneh , Richard A. DeMillo , Richard J. Lipton On the Importance of Checking Cryptographic Protocols for Faults (Extended Abstract). [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1997, pp:37-51 [Conf ] Dan Boneh , Craig Gentry , Ben Lynn , Hovav Shacham Aggregate and Verifiably Encrypted Signatures from Bilinear Maps. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2003, pp:416-432 [Conf ] Dan Boneh , Amit Sahai , Brent Waters Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2006, pp:573-592 [Conf ] Dan Boneh , Ramarathnam Venkatesan Breaking RSA May Not Be Equivalent to Factoring. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1998, pp:59-71 [Conf ] Neil Daswani , Dan Boneh Experimenting with Electronic Commerce on the PalmPilot. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 1999, pp:1-16 [Conf ] Adam Barth , Dan Boneh , Brent Waters Privacy in Encrypted Content Distribution Using Private Broadcast Encryption. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2006, pp:52-64 [Conf ] Tal Garfinkel , Mendel Rosenblum , Dan Boneh Flexible OS Support and Applications for Trusted Computing. [Citation Graph (0, 0)][DBLP ] HotOS, 2003, pp:145-150 [Conf ] Dan Boneh , Nagendra Modadugu , Michael Kim Generating RSA Keys on a Handheld Using an Untrusted Server. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2000, pp:271-282 [Conf ] Dan Boneh , Richard J. Lipton Effect of Operators on Straight Line Complexity. [Citation Graph (0, 0)][DBLP ] ISTCS, 1997, pp:1-5 [Conf ] Eu-Jin Goh , Dan Boneh , Benny Pinkas , Philippe Golle The Design and Implementation of Protocol-Based Hidden Key Recovery. [Citation Graph (0, 0)][DBLP ] ISC, 2003, pp:165-179 [Conf ] Hovav Shacham , Dan Boneh Fast-Track Session Establishment for TLS. [Citation Graph (0, 0)][DBLP ] NDSS, 2002, pp:- [Conf ] Michael Malkin , Thomas D. Wu , Dan Boneh Experimenting with Shared Generation of RSA Keys. [Citation Graph (0, 0)][DBLP ] NDSS, 1999, pp:- [Conf ] Eu-Jin Goh , Hovav Shacham , Nagendra Modadugu , Dan Boneh SiRiUS: Securing Remote Untrusted Storage. [Citation Graph (0, 0)][DBLP ] NDSS, 2003, pp:- [Conf ] Dan Boneh , Emily Shen , Brent Waters Strongly Unforgeable Signatures Based on Computational Diffie-Hellman. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2006, pp:229-240 [Conf ] Ninghui Li , Wenliang Du , Dan Boneh Oblivious signature-based envelope. [Citation Graph (0, 0)][DBLP ] PODC, 2003, pp:182-189 [Conf ] Dan Boneh , Ramarathnam Venkatesan Rounding in Lattices and its Cryptographic Applications. [Citation Graph (0, 0)][DBLP ] SODA, 1997, pp:675-681 [Conf ] Tal Garfinkel , Ben Pfaff , Jim Chow , Mendel Rosenblum , Dan Boneh Terra: a virtual machine-based platform for trusted computing. [Citation Graph (0, 0)][DBLP ] SOSP, 2003, pp:193-206 [Conf ] Dan Boneh Finding smooth integers in short intervals using CRT decoding. [Citation Graph (0, 0)][DBLP ] STOC, 2000, pp:265-272 [Conf ] Dan Boneh , Eu-Jin Goh , Kobbi Nissim Evaluating 2-DNF Formulas on Ciphertexts. [Citation Graph (0, 0)][DBLP ] TCC, 2005, pp:325-341 [Conf ] Dan Boneh , Brent Waters Conjunctive, Subset, and Range Queries on Encrypted Data. [Citation Graph (0, 0)][DBLP ] TCC, 2007, pp:535-554 [Conf ] Collin Jackson , Andrew Bortz , Dan Boneh , John C. Mitchell Protecting browser state from web privacy attacks. [Citation Graph (0, 0)][DBLP ] WWW, 2006, pp:737-744 [Conf ] Collin Jackson , Andrew Bortz , Dan Boneh , John C. Mitchell Protecting browser state from web privacy attacks. [Citation Graph (0, 0)][DBLP ] WWW, 2006, pp:737-744 [Conf ] David Brumley , Dan Boneh Remote timing attacks are practical. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2005, v:48, n:5, pp:701-716 [Journal ] Dan Boneh , Christopher Dunworth , Richard J. Lipton , Jiri Sgall On the Computational Power of DNA. [Citation Graph (0, 0)][DBLP ] Discrete Applied Mathematics, 1996, v:71, n:1-3, pp:79-94 [Journal ] Ninghui Li , Wenliang Du , Dan Boneh Oblivious signature-based envelope. [Citation Graph (0, 0)][DBLP ] Distributed Computing, 2005, v:17, n:4, pp:293-302 [Journal ] Dan Boneh , Joan Feigenbaum , Abraham Silberschatz , Rebecca N. Wright PORTIA: Privacy, Obligations, and Rights in Technologies of Information Assessment. [Citation Graph (0, 0)][DBLP ] IEEE Data Eng. Bull., 2004, v:27, n:1, pp:10-18 [Journal ] Eric B. Baum , Dan Boneh , Charles Garrett Where Genetic Algorithms Excel. [Citation Graph (0, 0)][DBLP ] Evolutionary Computation, 2001, v:9, n:1, pp:93-124 [Journal ] Eli Biham , Dan Boneh , Omer Reingold Generalized Diffie-Hellman Modulo a Composite is not Weaker than Factoring [Citation Graph (0, 0)][DBLP ] Electronic Colloquium on Computational Complexity (ECCC), 1997, v:4, n:61, pp:- [Journal ] Eli Biham , Dan Boneh , Omer Reingold Breaking Generalized Diffie-Hellmann Modulo a Composite is no Easier Than Factoring. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 1999, v:70, n:2, pp:83-87 [Journal ] Dan Boneh , Matthew K. Franklin Efficient generation of shared RSA keys. [Citation Graph (0, 0)][DBLP ] J. ACM, 2001, v:48, n:4, pp:702-722 [Journal ] Dan Boneh Finding Smooth Integers in Short Intervals Using CRT Decoding. [Citation Graph (0, 0)][DBLP ] J. Comput. Syst. Sci., 2002, v:64, n:4, pp:768-784 [Journal ] Dan Boneh , Richard A. DeMillo , Richard J. Lipton On the Importance of Eliminating Errors in Cryptographic Computations. [Citation Graph (0, 0)][DBLP ] J. Cryptology, 2001, v:14, n:2, pp:101-119 [Journal ] Dan Boneh , Ben Lynn , Hovav Shacham Short Signatures from the Weil Pairing. [Citation Graph (0, 0)][DBLP ] J. Cryptology, 2004, v:17, n:4, pp:297-319 [Journal ] Dan Boneh , Matthew K. Franklin Identity-Based Encryption from the Weil Pairing. [Citation Graph (0, 0)][DBLP ] SIAM J. Comput., 2003, v:32, n:3, pp:586-615 [Journal ] Dan Boneh , Ran Canetti , Shai Halevi , Jonathan Katz Chosen-Ciphertext Security from Identity-Based Encryption. [Citation Graph (0, 0)][DBLP ] SIAM J. Comput., 2007, v:36, n:5, pp:1301-1328 [Journal ] Hovav Shacham , Dan Boneh , Eric Rescorla Client-side caching for TLS. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 2004, v:7, n:4, pp:553-575 [Journal ] Dan Boneh , Glenn Durfee Cryptanalysis of RSA with private key d less than N0.292 . [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 2000, v:46, n:4, pp:1339- [Journal ] Dan Boneh , James Shaw Collusion-Secure Fingerprinting for Digital Data. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 1998, v:44, n:5, pp:1897-1905 [Journal ] Dan Boneh , Xuhua Ding , Gene Tsudik Fine-grained control of security capabilities. [Citation Graph (0, 0)][DBLP ] ACM Trans. Internet Techn., 2004, v:4, n:1, pp:60-82 [Journal ] Dan Boneh , Eyal Kushilevitz , Rafail Ostrovsky , William E. Skeith III Public Key Encryption That Allows PIR Queries. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2007, pp:50-67 [Conf ] Andrew Bortz , Dan Boneh Exposing private information by timing web applications. [Citation Graph (0, 0)][DBLP ] WWW, 2007, pp:621-628 [Conf ] Dan Boneh Bilinear Groups of Composite Order. [Citation Graph (0, 0)][DBLP ] Pairing, 2007, pp:1- [Conf ] Homomorphic MACs: MAC-Based Integrity for Network Coding. [Citation Graph (, )][DBLP ] Symmetric Cryptography in Javascript. [Citation Graph (, )][DBLP ] Generalized Identity Based and Broadcast Encryption Schemes. [Citation Graph (, )][DBLP ] Overshadow: a virtualization-based approach to retrofitting protection in commodity operating systems. [Citation Graph (, )][DBLP ] Protecting browsers from dns rebinding attacks. [Citation Graph (, )][DBLP ] Covert channels in privacy-preserving identification systems. [Citation Graph (, )][DBLP ] Traitor tracing with constant size ciphertext. [Citation Graph (, )][DBLP ] XCS: cross channel scripting and its impact on web applications. [Citation Graph (, )][DBLP ] Circular-Secure Encryption from Decision Diffie-Hellman. [Citation Graph (, )][DBLP ] Lattice Basis Delegation in Fixed Dimension and Shorter-Ciphertext Hierarchical IBE. [Citation Graph (, )][DBLP ] 07381 Executive Summary - Cryptography. [Citation Graph (, )][DBLP ] 07381 Abstracts Collection -- Cryptography. [Citation Graph (, )][DBLP ] Kamouflage: Loss-Resistant Password Management. [Citation Graph (, )][DBLP ] Efficient Lattice (H)IBE in the Standard Model. [Citation Graph (, )][DBLP ] Space-Efficient Identity Based Encryption Without Pairings. [Citation Graph (, )][DBLP ] A Brief Look at Pairings Based Cryptography. [Citation Graph (, )][DBLP ] On the Impossibility of Basing Identity Based Encryption on Trapdoor Permutations. [Citation Graph (, )][DBLP ] Cryptographic Methods for Storing Ballots on a Voting Machine. [Citation Graph (, )][DBLP ] Signing a Linear Subspace: Signature Schemes for Network Coding. [Citation Graph (, )][DBLP ] Preventing Pollution Attacks in Multi-source Network Coding. [Citation Graph (, )][DBLP ] Private web search. [Citation Graph (, )][DBLP ] Reducing shoulder-surfing by using gaze-based password entry. [Citation Graph (, )][DBLP ] The emergence of cross channel scripting. [Citation Graph (, )][DBLP ] Search in 0.046secs, Finished in 0.053secs