Dan Boneh
#10,739
Most Influential Person Now
Israeli cryptographer
Dan Boneh's AcademicInfluence.com Rankings
Dan Bonehcriminal-justice Degrees
Criminal Justice
#68
World Rank
#81
Historical Rank
Cyber Security
#4
World Rank
#4
Historical Rank
Dan Bonehcomputer-science Degrees
Computer Science
#681
World Rank
#702
Historical Rank
Cybersecurity
#2
World Rank
#2
Historical Rank
Dan Bonehmathematics Degrees
Mathematics
#2756
World Rank
#4190
Historical Rank
Measure Theory
#194
World Rank
#302
Historical Rank
Download Badge
Criminal Justice Computer Science Mathematics
Dan Boneh's Degrees
- PhD Computer Science Princeton University
- Masters Computer Science Stanford University
- Bachelors Mathematics Tel Aviv University
Similar Degrees You Can Earn
Why Is Dan Boneh Influential?
(Suggest an Edit or Addition)According to Wikipedia, Dan Boneh is an Israeli–American professor in applied cryptography and computer security at Stanford University. In 2016, Boneh was elected a member of the National Academy of Engineering for contributions to the theory and practice of cryptography and computer security.
Dan Boneh's Published Works
Published Works
- Identity-Based Encryption from the Weil Pairing (2001) (9737)
- On genetic algorithms (1995) (5647)
- Short Signatures from the Weil Pairing (2001) (4067)
- Public Key Encryption with Keyword Search (2004) (3155)
- Ensemble Adversarial Training: Attacks and Defenses (2017) (2060)
- Short Group Signatures (2004) (1991)
- Aggregate and Verifiably Encrypted Signatures from Bilinear Maps (2003) (1871)
- Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles (2004) (1754)
- On the Importance of Checking Cryptographic Protocols for Faults (Extended Abstract) (1997) (1711)
- Evaluating 2-DNF Formulas on Ciphertexts (2005) (1662)
- Conjunctive, Subset, and Range Queries on Encrypted Data (2007) (1502)
- Hierarchical Identity Based Encryption with Constant Size Ciphertext (2005) (1406)
- Short Signatures Without Random Oracles (2004) (1389)
- Terra: a virtual machine-based platform for trusted computing (2003) (1151)
- Chosen-Ciphertext Security from Identity-Based Encryption (2004) (1099)
- Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys (2005) (1074)
- The Decision Diffie-Hellman Problem (1998) (973)
- On the effectiveness of address-space randomization (2004) (963)
- Remote timing attacks are practical (2003) (949)
- Collusion-Secure Fingerprinting for Digital Data (1998) (913)
- Functional Encryption: Definitions and Challenges (2011) (862)
- Efficient Lattice (H)IBE in the Standard Model (2010) (851)
- Advances in Cryptology - CRYPTO 2003 (2003) (755)
- SiRiUS: Securing Remote Untrusted Storage (2003) (685)
- TWENTY YEARS OF ATTACKS ON THE RSA CRYPTOSYSTEM (1999) (672)
- Architectural support for copy and tamper resistant software (2000) (631)
- Group signatures with verifier-local revocation (2004) (623)
- Secure Identity Based Encryption Without Random Oracles (2004) (603)
- Bulletproofs: Short Proofs for Confidential Transactions and More (2018) (601)
- Short Signatures Without Random Oracles and the SDH Assumption in Bilinear Groups (2008) (536)
- The most dangerous code in the world: validating SSL certificates in non-browser software (2012) (483)
- Overshadow: a virtualization-based approach to retrofitting protection in commodity operating systems (2008) (446)
- Stronger Password Authentication Using Browser Extensions (2005) (445)
- The Space of Transferable Adversarial Examples (2017) (445)
- Cryptanalysis of RSA with private key d less than N0.292 (1999) (427)
- Efficient generation of shared RSA keys (2001) (415)
- Applications of Multilinear Forms to Cryptography (2002) (398)
- Privacy-Preserving Ridge Regression on Hundreds of Millions of Records (2013) (391)
- Random Oracles in a Quantum World (2010) (381)
- Location Privacy via Private Proximity Testing (2011) (379)
- Lattice Basis Delegation in Fixed Dimension and Shorter-Ciphertext Hierarchical IBE (2010) (368)
- Constrained Pseudorandom Functions and Their Applications (2013) (357)
- Reducing shoulder-surfing by using gaze-based password entry (2007) (352)
- Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE and Compact Garbled Circuits (2014) (351)
- Signing a Linear Subspace: Signature Schemes for Network Coding (2009) (332)
- Adnostic: Privacy Preserving Targeted Advertising (2010) (330)
- Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys (2006) (324)
- Hacking Blind (2014) (320)
- Verifiable Delay Functions (2018) (312)
- An Efficient Public Key Traitor Tracing Scheme (1999) (307)
- Public Key Encryption That Allows PIR Queries (2007) (300)
- Hardness of Computing the Most Significant Bits of Secret Keys in Diffie-Hellman and Related Schemes (1996) (297)
- Digital Signature Standard (2005) (288)
- Homomorphic MACs: MAC-Based Integrity for Network Coding (2009) (287)
- Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity-Based Encryption (2005) (280)
- Homomorphic Signatures for Polynomial Functions (2011) (272)
- A Method for Fast Revocation of Public Key Certificates and Security Capabilities (2001) (272)
- SANE: A Protection Architecture for Enterprise Networks (2006) (271)
- Circular-Secure Encryption from Decision Diffie-Hellman (2008) (268)
- Slalom: Fast, Verifiable and Private Execution of Neural Networks in Trusted Hardware (2018) (265)
- Adversarial Training and Robustness for Multiple Perturbations (2019) (263)
- Privacy-preserving matrix factorization (2013) (262)
- Gyrophone: Recognizing Speech from Gyroscope Signals (2014) (262)
- On the Importance of Eliminating Errors in Cryptographic Computations (2015) (259)
- Breaking DES using a molecular computer (1995) (256)
- Timed Commitments (2000) (250)
- Breaking RSA May Not Be Equivalent to Factoring (1998) (248)
- Key Homomorphic PRFs and Their Applications (2013) (246)
- Cryptanalysis of RSA with Private Key d Less Than N 0 (1999) (245)
- Protecting browser state from web privacy attacks (2006) (235)
- Generalized Identity Based and Broadcast Encryption Schemes (2008) (232)
- Effect of high-albedo materials on pedestrian heat stress in urban street canyons (2014) (228)
- On the Computational Power of DNA (1996) (227)
- Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation (2014) (227)
- A fully collusion resistant broadcast, trace, and revoke system (2006) (219)
- Strongly Unforgeable Signatures Based on Computational Diffie-Hellman (2006) (215)
- Who killed my battery?: analyzing mobile browser energy consumption (2012) (214)
- Linearly Homomorphic Signatures over Binary Fields and New Tools for Lattice-Based Signatures (2011) (214)
- Space-Efficient Identity Based EncryptionWithout Pairings (2007) (208)
- Mobile Device Identification via Sensor Fingerprinting (2014) (206)
- Semantically Secure Order-Revealing Encryption: Multi-input Functional Encryption Without Obfuscation (2015) (205)
- Riposte: An Anonymous Messaging System Handling Millions of Users (2015) (204)
- An Analysis of Private Browsing Modes in Modern Browsers (2010) (201)
- An Attack on RSA Given a Small Fraction of the Private Key Bits (1998) (196)
- Prio: Private, Robust, and Scalable Computation of Aggregate Statistics (2017) (195)
- Collusion-Secure Fingerprinting for Digital Data (Extended Abstract) (1995) (192)
- Efficient Selective Identity-Based Encryption Without Random Oracles (2011) (183)
- CCFI: Cryptographically Enforced Control Flow Integrity (2015) (183)
- Zether: Towards Privacy in a Smart Contract World (2020) (182)
- Exposing private information by timing web applications (2007) (177)
- Algorithms for Black-Box Fields and their Application to Cryptography (Extended Abstract) (1996) (175)
- Quantum Cryptanalysis of Hidden Linear Functions (Extended Abstract) (1995) (174)
- StegoTorus: a camouflage proxy for the Tor anonymity system (2012) (173)
- Compact Multi-Signatures for Smaller Blockchains (2018) (173)
- Busting frame busting a study of clickjacking vulnerabilities on popular sites (2010) (172)
- Secure Signatures and Chosen Ciphertext Security in a Quantum Computing World (2013) (171)
- Private Database Queries Using Somewhat Homomorphic Encryption (2013) (170)
- Efficient Generation of Shared RSA Keys (Extended Abstract) (1997) (167)
- Oblivious signature-based envelope (2003) (164)
- Fast Variants of RSA (2007) (162)
- Batching Techniques for Accumulators with Applications to IOPs and Stateless Blockchains (2019) (161)
- Chosen Ciphertext Secure Public Key Threshold Encryption Without Random Oracles (2006) (157)
- PowerSpy: Location Tracking Using Mobile Device Power Analysis (2015) (157)
- Simplified OAEP for the RSA and Rabin Functions (2001) (154)
- Incentive Compatibility of Bitcoin Mining Pool Reward Functions (2016) (154)
- Computing on Authenticated Data (2012) (153)
- Privacy in Encrypted Content Distribution Using Private Broadcast Encryption (2006) (147)
- Message-Locked Encryption for Lock-Dependent Messages (2013) (145)
- A Revocable Backup System (1996) (137)
- Differing-Inputs Obfuscation and Applications (2013) (134)
- Building intrusion tolerant applications (1999) (133)
- Optimistic Mixing for Exit-Polls (2002) (132)
- Remote Oblivious Storage: Making Oblivious RAM Practical (2011) (131)
- Threshold Cryptosystems From Threshold Fully Homomorphic Encryption (2018) (131)
- Password Managers: Attacks and Defenses (2014) (129)
- Protecting browsers from DNS rebinding attacks (2007) (128)
- Kamouflage: Loss-Resistant Password Management (2010) (127)
- IRON: Functional Encryption using Intel SGX (2017) (124)
- Differentially Private Learning Needs Better Features (or Much More Data) (2020) (124)
- Deriving genomic diagnoses without revealing patient genomes (2017) (115)
- Traitor tracing with constant size ciphertext (2008) (114)
- Fine-grained control of security capabilities (2004) (111)
- Quantum-Secure Message Authentication Codes (2013) (111)
- Factoring N = pr q for large r (1999) (111)
- Almost entirely correct mixing with applications to voting (2002) (108)
- Attacking an Obfuscated Cipher by Injecting Faults (2002) (106)
- Function-Private Identity-Based Encryption: Hiding the Function in Functional Encryption (2013) (106)
- Low Overhead Broadcast Encryption from Multilinear Maps (2014) (105)
- A Survey of Two Verifiable Delay Functions (2018) (102)
- Proceedings of the 11th USENIX Security Symposium (2002) (99)
- Why Textbook ElGamal and RSA Encryption Are Insecure (2000) (98)
- Flexible OS Support and Applications for Trusted Computing (2003) (97)
- Functional encryption: a new vision for public-key cryptography (2012) (97)
- Immunizing Multilinear Maps Against Zeroizing Attacks (2014) (92)
- Experimenting with Electronic Commerce on the PalmPilot (1999) (91)
- Experimenting with Shared Generation of RSA Keys (1999) (90)
- SentiNet: Detecting Physical Attacks Against Deep Learning Systems (2018) (89)
- Factoring N = prq for Large r (1999) (87)
- A Secure Signature Scheme from Bilinear Maps (2003) (85)
- Lower Bounds for Multicast Message Authentication (2001) (81)
- Making DNA computers error resistant (1996) (81)
- Evading Censorship with Browser-Based Proxies (2012) (81)
- Finding smooth integers in short intervals using CRT decoding (2000) (80)
- The Case for Ubiquitous Transport-Level Encryption (2010) (79)
- A Survey of Two Signature Aggregation Techniques (2003) (79)
- Symmetric Cryptography in Javascript (2009) (77)
- Private web search (2007) (76)
- Improving SSL Handshake Performance via Batching (2001) (75)
- Secure, Consumer-Friendly Web Authentication and Payments with a Phone (2010) (74)
- Provisions: Privacy-preserving Proofs of Solvency for Bitcoin Exchanges (2015) (69)
- XCS: cross channel scripting and its impact on web applications (2009) (68)
- Constraining Pseudorandom Functions Privately (2017) (66)
- Rounding in lattices and its cryptographic applications (1997) (64)
- Targeted malleability: homomorphic encryption for restricted computations (2012) (64)
- Zero-Knowledge Proofs on Secret-Shared Data via Fully Linear PCPs (2019) (64)
- A Critical Look at Decentralized Personal Data Architectures (2012) (62)
- On the Unpredictability of Bits of the Elliptic Curve Diffie--Hellman Scheme (2001) (62)
- Secure function evaluation with ordered binary decision diagrams (2006) (62)
- Balloon Hashing: A Memory-Hard Function Providing Provable Protection Against Sequential Attacks (2016) (62)
- Privacy, Discovery, and Authentication for the Internet of Things (2016) (62)
- Algebraic pseudorandom functions with improved efficiency from the augmented cascade (2010) (60)
- On the Impossibility of Basing Identity Based Encryption on Trapdoor Permutations (2008) (60)
- Generating RSA Keys on a Handheld Using an Untrusted Server (2000) (60)
- Protecting accounts from credential stuffing with password breach alerting (2019) (59)
- Neuroscience Meets Cryptography: Designing Crypto Primitives Secure Against Rubber Hose Attacks (2012) (57)
- Running dynamic programming algorithms on a DNA computer (1996) (56)
- Certificate Transparency with Privacy (2017) (53)
- Breaking Generalized Diffie-Hellmann Modulo a Composite is no Easier Than Factoring (1999) (53)
- Address space randomization for mobile devices (2011) (51)
- Private Puncturable PRFs from Standard Lattice Assumptions (2017) (50)
- SoK: Hate, Harassment, and the Changing Landscape of Online Abuse (2021) (50)
- Lattice-Based SNARGs and Their Application to More Efficient Obfuscation (2017) (50)
- Function-Private Subspace-Membership Encryption and Its Applications (2013) (47)
- OpenConflict: Preventing Real Time Map Hacks in Online Games (2011) (47)
- Preventing Pollution Attacks in Multi-Source Network Coding (2010) (47)
- Exposing an RSA Private Key Given a Small Fraction of its Bits (1998) (46)
- Finding composite order ordinary elliptic curves using the Cocks-Pinch method (2011) (46)
- The Case for Prefetching and Prevalidating TLS Server Certificates (2012) (44)
- Protecting browsers from dns rebinding attacks (2007) (44)
- Cryptographically Enforced Control Flow Integrity (2014) (44)
- On the Impossibility of Efficiently Combining Collision Resistant Hash Functions (2006) (43)
- Proceedings of the forty-fifth annual ACM symposium on Theory of computing (2013) (43)
- Lightweight Techniques for Private Heavy Hitters (2020) (42)
- Bulletproofs : Efficient Range Proofs for Confidential Transactions (2017) (42)
- Using Level-1 Homomorphic Encryption to Improve Threshold DSA Signatures for Bitcoin Wallet Security (2017) (41)
- Robust and Efficient Elimination of Cache and Timing Side Channels (2015) (41)
- On the Importance of Checking Computations (1996) (41)
- Fidelius: Protecting User Secrets from Compromised Browsers (2018) (41)
- Anonymous authentication with subset queries (extended abstract) (1999) (40)
- Scaling Verifiable Computation Using Efficient Set Accumulators (2019) (38)
- An Experimental Study of TLS Forward Secrecy Deployments (2014) (38)
- Privacy and Cybersecurity: The Next 100 Years (2012) (38)
- Express: Lowering the Cost of Metadata-hiding Communication with Cryptographic Privacy (2019) (38)
- Trust but Verify: Auditing the Secure Internet of Things (2017) (36)
- Client-side caching for TLS (2004) (35)
- AdVersarial: Perceptual Ad Blocking meets Adversarial Machine Learning (2019) (35)
- Succinct Randomized Encodings and their Applications. (2014) (34)
- Fast and simple constant-time hashing to the BLS12-381 elliptic curve (2019) (34)
- A browser plug-in solution to the unique password problem (2005) (31)
- Quasi-Optimal SNARGs via Linear Multi-Prover Interactive Proofs (2018) (31)
- Where Genetic Algorithms Excel (2001) (31)
- Geoencryption Using Loran (2007) (30)
- Persistent OSPF Attacks (2012) (30)
- 5Gen: A Framework for Prototyping Applications Using Multilinear Maps and Matrix Branching Programs (2016) (29)
- The Decision Diie-hellman Problem (1998) (29)
- Single Secret Leader Election (2020) (28)
- Supersingular Curves With Small Non-integer Endomorphisms (2019) (28)
- T/Key: Second-Factor Authentication From Secure Hash Chains (2017) (28)
- The Modular Inversion Hidden Number Problem (2001) (27)
- Mobile token-based authentication on a budget (2011) (27)
- The Design and Implementation of Protocol-Based Hidden Key Recovery (2003) (27)
- Cryptographic Methods for Storing Ballots on a Voting Machine (2007) (26)
- Transaction Generators: Root Kits for Web (2007) (26)
- Cryptanalysis of RSA with Private Key Less Than (2000) (26)
- Exploring Crypto Dark Matter: - New Simple PRF Candidates and Their Applications (2018) (25)
- Ensuring high-quality randomness in cryptographic key generation (2013) (25)
- Remote Side-Channel Attacks on Anonymous Transactions (2020) (24)
- ECRYPT Stream Cipher Project (2011) (24)
- Hosting Services on an Untrusted Cloud (2015) (23)
- Robust Location Tag Generation from Noisy Location Data for Security Applications (2009) (23)
- How Relevant Is the Turing Test in the Age of Sophisbots? (2019) (23)
- Bootstrapping Communications into an Anti-Censorship System (2012) (22)
- Searching for Elements in Black Box Fields and Applications (1996) (22)
- Oblivious Pseudorandom Functions from Isogenies (2020) (22)
- Efficient polynomial commitment schemes for multiple points and polynomials (2020) (22)
- Halo Infinite: Recursive zk-SNARKs from any Additive Polynomial Commitment Scheme (2020) (22)
- Callisto: A Cryptographic Approach to Detecting Serial Perpetrators of Sexual Misconduct (2018) (21)
- Pairing-Based Cryptography: Past, Present, and Future (2012) (21)
- Multiparty Non-Interactive Key Exchange and More From Isogenies on Elliptic Curves (2018) (20)
- Fast-Track Session Establishment for TLS (2002) (20)
- Halo Infinite: Proof-Carrying Data from Additive Polynomial Commitments (2021) (19)
- A Brief Look at Pairings Based Cryptography (2007) (19)
- Bivariate Polynomials Modulo Composites and their Applications (2014) (18)
- Amplification of weak learning under the uniform distribution (1993) (18)
- Ad-versarial: Defeating Perceptual Ad-Blocking (2018) (18)
- Clean-slate Design for the Internet (2006) (17)
- Tick Tock: Building Browser Red Pills from Timing Side Channels (2014) (17)
- Retrofitting a two-way peg between blockchains (2019) (17)
- Covert channels in privacy-preserving identification systems (2007) (17)
- SWAPEROO: A Simple Wallet Architecture for Payments, Exchanges, Refunds, and Other Operations (1998) (17)
- Stickler: Defending against Malicious Content Distribution Networks in an Unmodified Browser (2016) (17)
- Balloon Hashing: Provably Space-Hard Hash Functions with Data-Independent Access Patterns (2016) (17)
- Improving Speed and Security in Updatable Encryption Schemes (2020) (17)
- Diffie-Hellman Key Exchange (2011) (17)
- A Lattice-Based Universal Thresholdizer for Cryptographic Systems (2017) (16)
- Identity-Based En ryption from the Weil Pairing (2001) (16)
- Breaking RSA May Be Easier Than Factoring (1999) (16)
- Callisto (2018) (15)
- SessionJuggler: secure web login from an untrusted terminal using session hijacking (2012) (15)
- Robust fingerprinting codes: a near optimal construction (2010) (15)
- The Apple PSI System (2021) (15)
- Attribute-Based Encryption for Arithmetic Circuits (2013) (15)
- Neuroscience meets cryptography: crypto primitives secure against rubber hose attacks (2014) (14)
- Identity-Based Mediated RSA ? (2002) (14)
- Empirical Measurements on Pricing Oracles and Decentralized Governance for Stablecoins (2020) (14)
- True2F: Backdoor-Resistant Authentication Tokens (2018) (14)
- Effect of High-albedo Materials on Pedestrian Thermal Sensation in Urban Street Canyons in Hot Climates (2013) (13)
- The Difficulties of Tracing Spam Email (2004) (13)
- Post-quantum EPID Signatures from Symmetric Primitives (2019) (13)
- Spyware Resistant Web Authentication using Virtual Machines (2006) (13)
- Quantum Operating Systems (2017) (13)
- Reliable Location-Based Services from Radio Navigation Systems (2010) (12)
- Evaluation of Security Level of Cryptography (2001) (12)
- Lattice-Based DAPS and Generalizations: Self-enforcement in Signature Schemes (2017) (12)
- OSS: Using Online Scanning Services for Censorship Circumvention (2013) (12)
- Entity Resolution (2011) (12)
- Clarion: Anonymous Communication from Multiparty Shuffling Protocols (2021) (11)
- Do Users Write More Insecure Code with AI Assistants? (2022) (11)
- Generating a Product of Three Primes with an Unknown Factorization (1998) (10)
- Bilinear Groups of Composite Order (2007) (10)
- Constrained Keys for Invertible Pseudorandom Functions (2017) (10)
- Generalized Diffie-Hellman Modulo a Composite is not Weaker than Factoring (1997) (10)
- Surnaming Schemes, Fast Verification, and Applications to SGX Technology (2017) (10)
- Physical Pseudo Random Function in Radio Frequency Sources for Security (2009) (9)
- Course in Applied Cryptography (2015) (9)
- Post-Quantum Group Signatures from Symmetric Primitives (2018) (8)
- Post-Quantum EPID Group Signatures from Symmetric Primitives (2018) (8)
- Secure Signatures and Chosen Ciphertext Security in a Post-Quantum World (2013) (8)
- Webseclab Security Education Workbench (2010) (8)
- Evaluating Reputation Systems for Document Authenticity (2003) (8)
- Studies in computational number theory with applications to cryptography (1996) (8)
- The State of HSTS Deployment: A Survey and Common Pitfalls (2014) (7)
- The emergence of cross channel scripting (2010) (7)
- CESEL: Securing a Mote for 20 Years (2016) (7)
- Aggregate Signatures (2011) (7)
- Stickler: Defending Against Malicious CDNs in an Unmodified Browser (2015) (7)
- PORTIA: Privacy, Obligations, and Rights in Technologies of Information Assessment (2004) (7)
- Eecient Generation of Shared Rsa Keys (2007) (6)
- Efficient Lattice (H)IBE in the Standard Model ∗ (2020) (6)
- An EÆcient Public Key Traitor Tracing Scheme (1999) (5)
- Schnorr Digital Signature Scheme (2005) (5)
- Experimenting with Collaborative zk-SNARKs: Zero-Knowledge Proofs for Distributed Secrets (2021) (5)
- BLS Short Digital Signatures (2005) (5)
- zkBridge: Trustless Cross-chain Bridges Made Practical (2022) (5)
- Internet of Everything ( IoE ) focus area (2015) (5)
- Fully Collusion Resistant Traitor Tracing (2006) (5)
- Balloon Hashing : a Provably Memory-Hard Function with a Data-Independent Access Pattern (2016) (5)
- HyperPlonk: Plonk with Linear-Time Prover and High-Degree Custom Gates (2022) (5)
- Hardware Support for Tamper-Resistant and Copy-Resistant Software (2000) (5)
- Mystical Powers of Hyenas:Interpreting a Bedouin Belief (1987) (5)
- Effect of operators on straight line complexity (1997) (4)
- Preparing for the Age of Deepfakes and Disinformation (2020) (4)
- Learning using group representations (extended abstract) (1995) (4)
- Falcon — A Flexible Architecture For Accelerating Cryptography (2019) (4)
- Snap 2 Pass : Consumer-Friendly Challenge-Response Authentication with a Phone (2010) (4)
- How to Prove a Secret: Zero-Knowledge Proofs on Distributed Data via Fully Linear PCPs (2019) (4)
- New Results on the Cryptanalysis of Low Exponent Rsa (1997) (4)
- A Generalized Digital Wallet Architecture (2000) (4)
- Efficient Functional Commitments: How to Commit to Private Functions (2021) (3)
- Revocation of Unread E-mail in an Untrusted Network (1997) (3)
- Technical perspective: Attacking cryptographic key exchange with precomputation (2018) (3)
- Implementing the Halevi-Krawczyk Randomized Hashing Scheme (2007) (3)
- BLS Signature Scheme (2019) (3)
- Cellular Network Security (2011) (3)
- On the Importance of Checking Computations ( Extended (1996) (3)
- Threshold Signatures with Private Accountability (2022) (3)
- Simple Opportunistic Encryption (2014) (3)
- Remote Attestation (2011) (3)
- An airdrop that preserves recipient privacy (2020) (3)
- Conceptual Modeling (2012) (3)
- Breaking Plain ElGamal and Plain RSA Encryption (2013) (3)
- Secure Complaint-Enabled Source-Tracking for Encrypted Messaging (2021) (3)
- Attacks on Onion Discovery and Remedies via Self-Authenticating Traditional Addresses (2021) (3)
- Elgamal Digital Signature Scheme (2005) (2)
- Strong RSA Assumption (2011) (2)
- Privately Identifying Location Hotspots (2012) (2)
- Private Service Discovery and Mutual Authentication for the Internet of Things (2016) (2)
- Powers-of-Tau to the People: Decentralizing Setup Ceremonies (2022) (2)
- Homomorphic Signatures over Binary Fields : Secure Network Coding with Small Coefficients (2010) (2)
- Decentralized Trust Management (2011) (2)
- Dan Boneh (2007) (2)
- Cramer-Shoup Public-Key System (2011) (2)
- A Center for Correct , Usable , Reliable , Auditable , and Transparent Elections ( ACCURATE ) (2005) (2)
- Provisions: Private Proofs of Solvency for Bitcoin Exchanges (2015) (2)
- Security from Location (2012) (2)
- Rabin Digital Signature Scheme (2005) (1)
- Immigrants from Russia: A Marketing Challenge for Israel′s Banks (1991) (1)
- Signing a subspace: Signatures for network coding (2009) (1)
- Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation (2016) (1)
- Software-Based Attestation (2011) (1)
- Pattern Classification for Geotag Generation (2009) (1)
- Keeping patient phenotypes and genotypes private while seeking disease diagnoses (2019) (1)
- Framing attacks on smartphones dumb routers and social sites tap-jacking geo-localization and framing leak attacks (2010) (1)
- draft-irtf-cfrg-bls-signature-02 (2020) (1)
- draft-irtf-cfrg-bls-signature-00.txt (2019) (1)
- Computing on Authenticated Data (2014) (1)
- On the Importan e of Eliminating Errors in Cryptographi Computations (2001) (1)
- Advances in cryptology - CRYPTO 2003 : 23rd Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 2003 : proceedings (2003) (1)
- Revealing the causative variant in Mendelian patient genomes without revealing patient genomes (2017) (1)
- ERC-20R and ERC-721R: Reversible Transactions on Ethereum (2022) (1)
- A New Life for Group Signatures (2004) (1)
- 2009 Executive Summary (2010) (1)
- 2 . High Level View of the Protocol (2007) (0)
- Security for real-world networked applications (2007) (0)
- Strong Anonymity for Mesh Messaging (2022) (0)
- Speaker Identification and Verification (SIV) (2011) (0)
- Effect of Operators on Straight Line Complexity (Extended Abstract (1997) (0)
- Blum-Goldwasser Public Key Encryption System (2005) (0)
- Privacy-Protecting Regulatory Solutions Using Zero-Knowledge Proofs (0)
- Accountable Threshold Signatures with Proactive Refresh (2022) (0)
- Framing attacks on smartphones and dumb routers: social sites tap-jacking and geo-localization attacks (2010) (0)
- Recent ideas for circumventing internet filtering (2011) (0)
- 07381 Abstracts Collection -- Cryptography (2007) (0)
- 4.4 Security for the Merchant (2007) (0)
- Chapter 5 The New Attack on RSA Cryptosystem 5 . 1 Cryptanalysis of RSA (2014) (0)
- Building a Community of Real-World Cryptographers (2016) (0)
- Systems and methods for encryption identity based and related cryptographic techniques (2002) (0)
- Quantum Cryptanalysis of Hidden Linear h n c t ions ( Extended Abstract ) (2002) (0)
- Secure Signatures from the "Strong RSA" Assumption (2005) (0)
- Proceedings of the 2nd conference on USENIX Workshop on offensive technologies (2008) (0)
- Survivability Using Controlled Security Services (2005) (0)
- Credential Verification (2011) (0)
- 09141 Executive Summary - Web Application Security (2009) (0)
- Evaluation of Security Level of Cryptography HIME-1 (2001) (0)
- Multi Owner Data Sharing & Outsourced Revocation Using Identity Based Encryption on Cloud (2016) (0)
- Dagstuhl Seminar 09141: Web Application Security (Abstracts collection) (2010) (0)
- A SECURE MULTI OWNER DATA SHARING SCHEME (2018) (0)
- ACCURATE Principal Investigators (2008) (0)
- A Lower Bound on the Length of Signatures Based on Group Actions and Generic Isogenies (2023) (0)
- 07381 Executive Summary - Cryptography (2007) (0)
- BIOS Basic Input Output System (2011) (0)
- An Exploration of the Dna Computing Model (2000) (0)
- Collection Cryptography Dagstuhl Seminar (2008) (0)
- Interface Extensions for TCP-ENO (2016) (0)
- Access Lists (2020) (0)
- Cramer-Shoup Public Key System (2005) (0)
- Biometric Cryptosystem (2009) (0)
- 09141 Abstracts Collection Web Application Security Dagstuhl Seminar (2010) (0)
- Advanced Homomorphic Encryption its Applications and Derivatives (AHEAD) (2013) (0)
- An Algebraic Approach to Multilinear Maps for Cryptography ( 18 w 5118 ) (2018) (0)
- Application of analysis of algorithms in cryptography (2004) (0)
- Post-Quantum Group Signatures from Symmetric Primitives Dan (2018) (0)
- Experimenting with Electronic Commerce onthe (1998) (0)
- Server-aided public key generation protocols on low-power devices for ad-hoc networks (2017) (0)
- Interface Extensions for TCP-ENO and tcpcrypt (2018) (0)
- Subgroup Cryptosystems (2011) (0)
- Ju l 2 01 6 Privacy , Discovery , and Authentication for the Internet of Things ( Extended Version ) (2016) (0)
- Predicting Short-Range Displacements From Sensor Data (2015) (0)
- Runtime Analysis (2011) (0)
- 09141 Abstracts Collection - Web Application Security (2009) (0)
- Evaluation of Security Level of Cryptography HDEF-ECDH (2001) (0)
- Proceedings of the 11th USENIX Security Symposium, San Francisco, CA, USA, August 5-9, 2002 (2002) (0)
- Memory Tagging: A Memory Efficient Design (2022) (0)
- Cryptoeconomic Security for Data Availability Committees (2022) (0)
- Molecular computing (2003) (0)
- The bank card (2013) (0)
- Interactive proofs of proximity: Delegating computation in sublinear time (2013) (0)
- Efficient Functional Commitments (2021) (0)
This paper list is powered by the following services:
Other Resources About Dan Boneh
What Schools Are Affiliated With Dan Boneh?
Dan Boneh is affiliated with the following schools: