Follow
Dan Boneh
Dan Boneh
Professor of Computer Science, Stanford University
Verified email at cs.stanford.edu - Homepage
Title
Cited by
Cited by
Year
Identity-based encryption from the Weil pairing
D Boneh, M Franklin
Annual international cryptology conference, 213-229, 2001
139982001
Short signatures from the Weil pairing
D Boneh, B Lynn, H Shacham
International conference on the theory and application of cryptology and …, 2001
43212001
Public key encryption with keyword search
D Boneh, G Di Crescenzo, R Ostrovsky, G Persiano
Advances in Cryptology-EUROCRYPT 2004: International Conference on the …, 2004
42602004
Ensemble adversarial training: Attacks and defenses
F Tramèr, A Kurakin, N Papernot, I Goodfellow, D Boneh, P McDaniel
arXiv preprint arXiv:1705.07204, 2017
30542017
Short group signatures
D Boneh, X Boyen, H Shacham
Annual international cryptology conference, 41-55, 2004
27502004
Aggregate and verifiably encrypted signatures from bilinear maps
D Boneh, C Gentry, B Lynn, H Shacham
Advances in Cryptology—EUROCRYPT 2003: International Conference on the …, 2003
26522003
On the importance of checking cryptographic protocols for faults
D Boneh, RA DeMillo, RJ Lipton
International conference on the theory and applications of cryptographic …, 1997
24751997
Evaluating 2-DNF formulas on ciphertexts
D Boneh, EJ Goh, K Nissim
Theory of Cryptography: Second Theory of Cryptography Conference, TCC 2005 …, 2005
22972005
Efficient selective-ID secure identity-based encryption without random oracles
D Boneh, X Boyen
Advances in Cryptology-EUROCRYPT 2004: International Conference on the …, 2004
22742004
Conjunctive, subset, and range queries on encrypted data
D Boneh, B Waters
Theory of Cryptography: 4th Theory of Cryptography Conference, TCC 2007 …, 2007
18762007
Short signatures without random oracles
D Boneh, X Boyen
International conference on the theory and applications of cryptographic …, 2004
18602004
Hierarchical identity based encryption with constant size ciphertext
D Boneh, X Boyen, EJ Goh
Annual international conference on the theory and applications of …, 2005
18482005
Short signatures from the Weil pairing
D Boneh, B Lynn, H Shacham
Journal of cryptology 17, 297-319, 2004
17942004
Terra: A virtual machine-based platform for trusted computing
T Garfinkel, B Pfaff, J Chow, M Rosenblum, D Boneh
Proceedings of the nineteenth ACM symposium on Operating systems principles …, 2003
16932003
Collusion resistant broadcast encryption with short ciphertexts and private keys
D Boneh, C Gentry, B Waters
Annual international cryptology conference, 258-275, 2005
14472005
The decision diffie-hellman problem
D Boneh
International algorithmic number theory symposium, 48-63, 1998
14231998
On the effectiveness of address-space randomization
H Shacham, M Page, B Pfaff, EJ Goh, N Modadugu, D Boneh
Proceedings of the 11th ACM conference on Computer and communications …, 2004
13362004
Remote timing attacks are practical
D Brumley, D Boneh
Computer Networks 48 (5), 701-716, 2005
13272005
Collusion-secure fingerprinting for digital data
D Boneh, J Shaw
IEEE Transactions on Information Theory 44 (5), 1897-1905, 1998
13061998
Functional encryption: Definitions and challenges
D Boneh, A Sahai, B Waters
Theory of Cryptography: 8th Theory of Cryptography Conference, TCC 2011 …, 2011
12492011
Bulletproofs: Short proofs for confidential transactions and more
B Bünz, J Bootle, D Boneh, A Poelstra, P Wuille, G Maxwell
2018 IEEE symposium on security and privacy (SP), 315-334, 2018
12342018
Efficient lattice (H) IBE in the standard model
S Agrawal, D Boneh, X Boyen
Advances in Cryptology–EUROCRYPT 2010: 29th Annual International Conference …, 2010
11692010
Twenty years of attacks on the RSA cryptosystem
D Boneh
Notices of the AMS 46 (2), 203-213, 1999
11671999
Architectural support for copy and tamper resistant software
D Lie, C Thekkath, M Mitchell, P Lincoln, D Boneh, J Mitchell, M Horowitz
Acm Sigplan Notices 35 (11), 168-177, 2000
10592000
SiRiUS: Securing Remote Untrusted Storage.
EJ Goh, H Shacham, N Modadugu, D Boneh
NDSS 3, 131-145, 2003
8152003
Group signatures with verifier-local revocation
D Boneh, H Shacham
Proceedings of the 11th ACM conference on Computer and communications …, 2004
8062004
Secure identity based encryption without random oracles
D Boneh, X Boyen
Annual International Cryptology Conference, 443-459, 2004
7892004
SANE: A Protection Architecture for Enterprise Networks.
M Casado, T Garfinkel, A Akella, MJ Freedman, D Boneh, N McKeown, ...
USENIX security symposium 49, 50, 2006
7712006
Short signatures without random oracles and the SDH assumption in bilinear groups
D Boneh, X Boyen
Journal of cryptology 21 (2), 149-177, 2008
7052008
The most dangerous code in the world: validating SSL certificates in non-browser software
M Georgiev, S Iyengar, S Jana, R Anubhai, D Boneh, V Shmatikov
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
6772012
Overshadow: a virtualization-based approach to retrofitting protection in commodity operating systems
X Chen, T Garfinkel, EC Lewis, P Subrahmanyam, CA Waldspurger, ...
ACM SIGOPS Operating Systems Review 42 (2), 2-13, 2008
6772008
On the importance of eliminating errors in cryptographic computations
D Boneh, RA DeMillo, RJ Lipton
Journal of cryptology 14, 101-119, 2001
6392001
Collusion-secure fingerprinting for digital data
D Boneh, J Shaw
Annual International Cryptology Conference, 452-465, 1995
6221995
The space of transferable adversarial examples
F Tramèr, N Papernot, I Goodfellow, D Boneh, P McDaniel
arXiv preprint arXiv:1704.03453, 2017
6062017
Privacy-preserving ridge regression on hundreds of millions of records
V Nikolaenko, U Weinsberg, S Ioannidis, M Joye, D Boneh, N Taft
2013 IEEE symposium on security and privacy, 334-348, 2013
5822013
Stronger Password Authentication Using Browser Extensions.
B Ross, C Jackson, N Miyake, D Boneh, JC Mitchell
USENIX Security Symposium 17, 32, 2005
5762005
Verifiable delay functions
D Boneh, J Bonneau, B Bünz, B Fisch
Annual international cryptology conference, 757-788, 2018
5732018
Large-scale virtualization in the emulab network testbed
M Hibler, R Ricci, L Stoller, J Duerig, S Guruprasad, T Stack, K Webb, ...
2008 USENIX Annual Technical Conference (USENIX ATC 08), 2008
538*2008
Random oracles in a quantum world
D Boneh, Ö Dagdelen, M Fischlin, A Lehmann, C Schaffner, M Zhandry
Advances in Cryptology–ASIACRYPT 2011: 17th International Conference on the …, 2011
5192011
Efficient generation of shared RSA keys
D Boneh, M Franklin
Advances in Cryptology—CRYPTO'97: 17th Annual International Cryptology …, 1997
5171997
The system can't perform the operation now. Try again later.
Articles 1–40