What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Dan Boneh
Google Scholar
186
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/sp
VerITAS: Verifying Image Transformations at Scale.
Trisha Datta
Binyi Chen
Dan Boneh
2025
conf/sp
Volatile and Persistent Memory for zkSNARKs via Algebraic Interactive Proofs.
Alex Ozdemir
Evan Laufer
Dan Boneh
2025
conf/pkc
Accountable Multi-signatures with Constant Size Public Keys.
Dan Boneh
Aditi Partap
Brent Waters
2025
conf/eurocrypt
Exponent-VRFs and Their Applications.
Dan Boneh
Iftach Haitner
Yehuda Lindell
Gil Segev
2025
conf/crypto
Traceable Verifiable Random Functions.
Dan Boneh
Aditi Partap
Lior Rotem
2025
conf/crypto
LatticeFold+: Faster, Simpler, Shorter Lattice-Based Folding for Succinct Proof Systems.
Dan Boneh
Binyi Chen
2025
conf/crypto
Homomorphic Encryption for Large Integers from Nested Residue Number Systems.
Dan Boneh
Jaehyung Kim
2024
journals/cic
A Survey of Two Verifiable Delay Functions Using Proof of Exponentiation.
Dan Boneh
Benedikt Bünz
Ben Fisch
2024
journals/popets
Divisible E-Cash for Billing in Private Ad Retargeting.
Kevin Liao
Henry Corrigan-Gibbs
Dan Boneh
2024
conf/ccs
Cryptography and Computer Security: A View From the Year 2100.
Dan Boneh
2024
conf/ccs
zkPi: Proving Lean Theorems in Zero-Knowledge.
Evan Laufer
Alex Ozdemir
Dan Boneh
2024
conf/crypto
Traceable Secret Sharing: Strong Security and Efficient Constructions.
Dan Boneh
Aditi Partap
Lior Rotem
2024
conf/crypto
Accountability for Misbehavior in Threshold Decryption via Threshold Traitor Tracing.
Dan Boneh
Aditi Partap
Lior Rotem
2024
conf/crypto
Mangrove: A Scalable Framework for Folding-Based SNARKs.
Wilson D. Nguyen
Trisha Datta
Binyi Chen
Nirvan Tyagi
Dan Boneh
2024
conf/fc
Proactive Refresh for Accountable Threshold Signatures.
Dan Boneh
Aditi Partap
Lior Rotem
2024
conf/acns
Powers-of-Tau to the People: Decentralizing Setup Ceremonies.
Valeria Nikolaenko
Sam Ragsdale
Joseph Bonneau
Dan Boneh
2023
conf/ccs
Do Users Write More Insecure Code with AI Assistants?
Neil Perry
Megha Srivastava
Deepak Kumar
Dan Boneh
2023
conf/crypto
Arithmetic Sketching.
Dan Boneh
Elette Boyle
Henry Corrigan-Gibbs
Niv Gilboa
Yuval Ishai
2023
conf/fc
Cryptoeconomic Security for Data Availability Committees.
Ertem Nusret Tas
Dan Boneh
2023
conf/eurocrypt
HyperPlonk: Plonk with Linear-Time Prover and High-Degree Custom Gates.
Binyi Chen
Benedikt Bünz
Dan Boneh
Zhenfei Zhang
2023
conf/eurocrypt
A Lower Bound on the Length of Signatures Based on Group Actions and Generic Isogenies.
Dan Boneh
Jiaxin Guan
Mark Zhandry
2022
conf/ccs
zkBridge: Trustless Cross-chain Bridges Made Practical.
Tiancheng Xie
Jiaheng Zhang
Zerui Cheng
Fan Zhang
Yupeng Zhang
Yongzheng Jia
Dan Boneh
Dawn Song
2022
conf/uss
Experimenting with Collaborative zk-SNARKs: Zero-Knowledge Proofs for Distributed Secrets.
Alex Ozdemir
Dan Boneh
2022
conf/crypto
Threshold Signatures with Private Accountability.
Dan Boneh
Chelsea Komlo
2022
conf/ndss
Clarion: Anonymous Communication from Multiparty Shuffling Protocols.
Saba Eskandarian
Dan Boneh
2021
conf/ccs
Secure Complaint-Enabled Source-Tracking for Encrypted Messaging.
Charlotte Peale
Saba Eskandarian
Dan Boneh
2021
conf/uss
Express: Lowering the Cost of Metadata-hiding Communication with Cryptographic Privacy.
Saba Eskandarian
Henry Corrigan-Gibbs
Matei Zaharia
Dan Boneh
2021
conf/crypto
Halo Infinite: Proof-Carrying Data from Additive Polynomial Commitments.
Dan Boneh
Justin Drake
Ben Fisch
Ariel Gabizon
2021
conf/sp
SoK: Hate, Harassment, and the Changing Landscape of Online Abuse.
Kurt Thomas
Devdatta Akhawe
Michael D. Bailey
Dan Boneh
Elie Bursztein
Sunny Consolvo
Nicola Dell
Zakir Durumeric
Patrick Gage Kelley
Deepak Kumar
Damon McCoy
Sarah Meiklejohn
Thomas Ristenpart
Gianluca Stringhini
2021
conf/sp
Lightweight Techniques for Private Heavy Hitters.
Dan Boneh
Elette Boyle
Henry Corrigan-Gibbs
Niv Gilboa
Yuval Ishai
2020
conf/uss
Scaling Verifiable Computation Using Efficient Set Accumulators.
Alex Ozdemir
Riad S. Wahby
Barry Whitehat
Dan Boneh
2020
conf/uss
Remote Side-Channel Attacks on Anonymous Transactions.
Florian Tramèr
Dan Boneh
Kenny Paterson
2020
conf/fc
An Airdrop that Preserves Recipient Privacy.
Riad S. Wahby
Dan Boneh
Christopher Jeffrey
Joseph Poon
2020
conf/fc
Zether: Towards Privacy in a Smart Contract World.
Benedikt Bünz
Shashank Agrawal
Mahdi Zamani
Dan Boneh
2020
conf/asiacrypt
Improving Speed and Security in Updatable Encryption Schemes.
Dan Boneh
Saba Eskandarian
Sam Kim
Maurice Shih
2020
conf/asiacrypt
Oblivious Pseudorandom Functions from Isogenies.
Dan Boneh
Dmitry Kogan
Katharine Woo
2019
journals/tches
Fast and simple constant-time hashing to the BLS12-381 elliptic curve.
Riad S. Wahby
Dan Boneh
2019
conf/ccs
AdVersarial: Perceptual Ad Blocking meets Adversarial Machine Learning.
Florian Tramèr
Pascal Dupré
Gili Rusak
Giancarlo Pellegrino
Dan Boneh
2019
conf/uss
Protecting accounts from credential stuffing with password breach alerting.
Kurt Thomas
Jennifer Pullman
Kevin Yeo
Ananth Raghunathan
Patrick Gage Kelley
Luca Invernizzi
Borbala Benko
Tadek Pietraszek
Sarvar Patel
Dan Boneh
Elie Bursztein
2019
conf/crypto
Batching Techniques for Accumulators with Applications to IOPs and Stateless Blockchains.
Dan Boneh
Benedikt Bünz
Ben Fisch
2019
conf/crypto
Zero-Knowledge Proofs on Secret-Shared Data via Fully Linear PCPs.
Dan Boneh
Elette Boyle
Henry Corrigan-Gibbs
Niv Gilboa
Yuval Ishai
2019
conf/sp
Fidelius: Protecting User Secrets from Compromised Browsers.
Saba Eskandarian
Jonathan Cogan
Sawyer Birnbaum
Peh Chang Wei Brandon
Dillon Franke
Forest Fraser
Gaspar Garcia Jr.
Eric Gong
Hung T. Nguyen
Taresh K. Sethi
Vishal Subbiah
Michael Backes
Giancarlo Pellegrino
Dan Boneh
2019
conf/sp
True2F: Backdoor-Resistant Authentication Tokens.
Emma Dauterman
Henry Corrigan-Gibbs
David Mazières
Dan Boneh
Dominic Rizzo
2019
conf/ctrsa
Post-quantum EPID Signatures from Symmetric Primitives.
Dan Boneh
Saba Eskandarian
Ben Fisch
2018
conf/crypto
Threshold Cryptosystems from Threshold Fully Homomorphic Encryption.
Dan Boneh
Rosario Gennaro
Steven Goldfeder
Aayush Jain
Sam Kim
Peter M. R. Rasmussen
Amit Sahai
2018
conf/crypto
Verifiable Delay Functions.
Dan Boneh
Joseph Bonneau
Benedikt Bünz
Ben Fisch
2018
conf/sp
Bulletproofs: Short Proofs for Confidential Transactions and More.
Benedikt Bünz
Jonathan Bootle
Dan Boneh
Andrew Poelstra
Pieter Wuille
Gregory Maxwell
2018
conf/eurocrypt
Quasi-Optimal SNARGs via Linear Multi-Prover Interactive Proofs.
Dan Boneh
Yuval Ishai
Amit Sahai
David J. Wu
2018
conf/asiacrypt
Compact Multi-signatures for Smaller Blockchains.
Dan Boneh
Manu Drijvers
Gregory Neven
2018
conf/tcc
Exploring Crypto Dark Matter: - New Simple PRF Candidates and Their Applications.
Dan Boneh
Yuval Ishai
Alain Passelègue
Amit Sahai
David J. Wu
2017
journals/popets
Certificate Transparency with Privacy.
Saba Eskandarian
Eran Messeri
Joseph Bonneau
Dan Boneh
2017
conf/latincrypt
Using Level-1 Homomorphic Encryption to Improve Threshold DSA Signatures for Bitcoin Wallet Security.
Dan Boneh
Rosario Gennaro
Steven Goldfeder
2017
conf/ccs
IRON: Functional Encryption using Intel SGX.
Ben Fisch
Dhinakaran Vinayagamurthy
Dan Boneh
Sergey Gorbunov
2017
conf/ccs
T/Key: Second-Factor Authentication From Secure Hash Chains.
Dmitry Kogan
Nathan Manohar
Dan Boneh
2017
conf/acns
Lattice-Based DAPS and Generalizations: Self-enforcement in Signature Schemes.
Dan Boneh
Sam Kim
Valeria Nikolaenko
2017
conf/pkc
Constraining Pseudorandom Functions Privately.
Dan Boneh
Kevin Lewi
David J. Wu
2017
conf/ctrsa
Surnaming Schemes, Fast Verification, and Applications to SGX Technology.
Dan Boneh
Shay Gueron
2017
conf/eurocrypt
Private Puncturable PRFs from Standard Lattice Assumptions.
Dan Boneh
Sam Kim
Hart William Montgomery
2017
conf/eurocrypt
Lattice-Based SNARGs and Their Application to More Efficient Obfuscation.
Dan Boneh
Yuval Ishai
Amit Sahai
David J. Wu
2017
conf/tcc
Constrained Keys for Invertible Pseudorandom Functions.
Dan Boneh
Sam Kim
David J. Wu
2016
conf/ccs
5Gen: A Framework for Prototyping Applications Using Multilinear Maps and Matrix Branching Programs.
Kevin Lewi
Alex J. Malozemoff
Daniel Apon
Brent Carmer
Adam Foltzer
Daniel Wagner
David W. Archer
Dan Boneh
Jonathan Katz
Mariana Raykova
2016
conf/fc
Incentive Compatibility of Bitcoin Mining Pool Reward Functions.
Okke Schrijvers
Joseph Bonneau
Dan Boneh
Tim Roughgarden
2016
conf/esorics
Privacy, Discovery, and Authentication for the Internet of Things.
David J. Wu
Ankur Taly
Asim Shankar
Dan Boneh
2016
conf/asiacrypt
Balloon Hashing: A Memory-Hard Function Providing Provable Protection Against Sequential Attacks.
Dan Boneh
Henry Corrigan-Gibbs
Stuart E. Schechter
2015
journals/joc
Computing on Authenticated Data.
Jae Hyun Ahn
Dan Boneh
Jan Camenisch
Susan Hohenberger
Abhi Shelat
Brent Waters
2015
conf/ccs
Provisions: Privacy-preserving Proofs of Solvency for Bitcoin Exchanges.
Gaby G. Dagher
Benedikt Bünz
Joseph Bonneau
Jeremy Clark
Dan Boneh
2015
conf/ccs
CCFI: Cryptographically Enforced Control Flow Integrity.
Ali José Mashtizadeh
Andrea Bittau
Dan Boneh
David Mazières
2015
conf/uss
PowerSpy: Location Tracking Using Mobile Device Power Analysis.
Yan Michalevsky
Aaron Schulman
Gunaa Arumugam Veerapandian
Dan Boneh
Gabi Nakibly
2015
conf/sp
Riposte: An Anonymous Messaging System Handling Millions of Users.
Henry Corrigan-Gibbs
Dan Boneh
David Mazières
2015
conf/eurocrypt
Semantically Secure Order-Revealing Encryption: Multi-input Functional Encryption Without Obfuscation.
Dan Boneh
Kevin Lewi
Mariana Raykova
Amit Sahai
Mark Zhandry
Joe Zimmerman
2015
conf/eurocrypt
Hosting Services on an Untrusted Cloud.
Dan Boneh
Divya Gupta
Ilya Mironov
Amit Sahai
2014
conf/uss
Password Managers: Attacks and Defenses.
David Silver
Suman Jana
Dan Boneh
Eric Yawei Chen
Collin Jackson
2014
conf/uss
Gyrophone: Recognizing Speech from Gyroscope Signals.
Yan Michalevsky
Dan Boneh
Gabi Nakibly
2014
conf/crypto
Low Overhead Broadcast Encryption from Multilinear Maps.
Dan Boneh
Brent Waters
Mark Zhandry
2014
conf/crypto
Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation.
Dan Boneh
Mark Zhandry
2014
conf/sp
Hacking Blind.
Andrea Bittau
Adam Belay
Ali José Mashtizadeh
David Mazières
Dan Boneh
2014
conf/eurocrypt
Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE and Compact Garbled Circuits.
Dan Boneh
Craig Gentry
Sergey Gorbunov
Shai Halevi
Valeria Nikolaenko
Gil Segev
Vinod Vaikuntanathan
Dhinakaran Vinayagamurthy
2014
conf/asiacrypt
Bivariate Polynomials Modulo Composites and Their Applications.
Dan Boneh
Henry Corrigan-Gibbs
2013
conf/ccs
Ensuring high-quality randomness in cryptographic key generation.
Henry Corrigan-Gibbs
Wendy Mu
Dan Boneh
Bryan Ford
2013
conf/ccs
Privacy-preserving matrix factorization.
Valeria Nikolaenko
Stratis Ioannidis
Udi Weinsberg
Marc Joye
Nina Taft
Dan Boneh
2013
conf/crypto
Secure Signatures and Chosen Ciphertext Security in a Quantum Computing World.
Dan Boneh
Mark Zhandry
2013
conf/crypto
Message-Locked Encryption for Lock-Dependent Messages.
Martín Abadi
Dan Boneh
Ilya Mironov
Ananth Raghunathan
Gil Segev
2013
conf/crypto
Function-Private Identity-Based Encryption: Hiding the Function in Functional Encryption.
Dan Boneh
Ananth Raghunathan
Gil Segev
2013
conf/crypto
Key Homomorphic PRFs and Their Applications.
Dan Boneh
Kevin Lewi
Hart William Montgomery
Ananth Raghunathan
2013
conf/sp
Privacy-Preserving Ridge Regression on Hundreds of Millions of Records.
Valeria Nikolaenko
Udi Weinsberg
Stratis Ioannidis
Marc Joye
Dan Boneh
Nina Taft
2013
conf/acns
Private Database Queries Using Somewhat Homomorphic Encryption.
Dan Boneh
Craig Gentry
Shai Halevi
Frank Wang
David J. Wu
2013
conf/eurocrypt
Quantum-Secure Message Authentication Codes.
Dan Boneh
Mark Zhandry
2013
conf/asiacrypt
Constrained Pseudorandom Functions and Their Applications.
Dan Boneh
Brent Waters
2013
conf/asiacrypt
Function-Private Subspace-Membership Encryption and Its Applications.
Dan Boneh
Ananth Raghunathan
Gil Segev
2012
conf/ccs
The most dangerous code in the world: validating SSL certificates in non-browser software.
Martin Georgiev
Subodh Iyengar
Suman Jana
Rishita Anubhai
Dan Boneh
Vitaly Shmatikov
2012
conf/ccs
StegoTorus: a camouflage proxy for the Tor anonymity system.
Zachary Weinberg
Jeffrey Wang
Vinod Yegneswaran
Linda Briesemeister
Steven Cheung
Frank Wang
Dan Boneh
2012
conf/uss
Bootstrapping Communications into an Anti-Censorship System.
Patrick Lincoln
Ian Mason
Phillip A. Porras
Vinod Yegneswaran
Zachary Weinberg
Jeroen Massar
William Allen Simpson
Paul Vixie
Dan Boneh
2012
conf/uss
Neuroscience Meets Cryptography: Designing Crypto Primitives Secure Against Rubber Hose Attacks.
Hristo Bojinov
Daniel Sánchez
Paul J. Reber
Dan Boneh
Patrick Lincoln
2012
conf/ndss
The Case for Prefetching and Prevalidating TLS Server Certificates.
Emily Stark
Lin-Shung Huang
Dinesh Israni
Collin Jackson
Dan Boneh
2012
conf/ndss
Persistent OSPF Attacks.
Gabi Nakibly
Alex Kirshon
Dima Gonikman
Dan Boneh
2012
conf/asiacrypt
Pairing-Based Cryptography: Past, Present, and Future.
Dan Boneh
2012
conf/tcc
Computing on Authenticated Data.
Jae Hyun Ahn
Dan Boneh
Jan Camenisch
Susan Hohenberger
Abhi Shelat
Brent Waters
2011
journals/joc
Efficient Selective Identity-Based Encryption Without Random Oracles.
Dan Boneh
Xavier Boyen
2011
conf/sp
OpenConflict: Preventing Real Time Map Hacks in Online Games.
Elie Bursztein
Mike Hamburg
Jocelyn Lagarenne
Dan Boneh
2011
conf/ndss
Location Privacy via Private Proximity Testing.
Arvind Narayanan
Narendran Thiagarajan
Mugdha Lakhani
Michael Hamburg
Dan Boneh
2011
conf/pkc
Linearly Homomorphic Signatures over Binary Fields and New Tools for Lattice-Based Signatures.
Dan Boneh
David Mandell Freeman
2011
conf/eurocrypt
Homomorphic Signatures for Polynomial Functions.
Dan Boneh
David Mandell Freeman
2011
conf/asiacrypt
Random Oracles in a Quantum World.
Dan Boneh
Özgür Dagdelen
Marc Fischlin
Anja Lehmann
Christian Schaffner
Mark Zhandry
2011
conf/wisec
Address space randomization for mobile devices.
Hristo Bojinov
Dan Boneh
Rich Cannings
Iliyan Malchev
2011
conf/tcc
Functional Encryption: Definitions and Challenges.
Dan Boneh
Amit Sahai
Brent Waters
2010
conf/ccs
Algebraic pseudorandom functions with improved efficiency from the augmented cascade.
Dan Boneh
Hart William Montgomery
Ananth Raghunathan
2010
conf/uss
The Case for Ubiquitous Transport-Level Encryption.
Andrea Bittau
Michael Hamburg
Mark Handley
David Mazières
Dan Boneh
2010
conf/uss
Webseclab Security Education Workbench.
Elie Bursztein
Baptiste Gourdin
Celine Fabry
Jason Bau
Gustav Rydstedt
Hristo Bojinov
Dan Boneh
John C. Mitchell
2010
conf/uss
An Analysis of Private Browsing Modes in Modern Browsers.
Gaurav Aggarwal
Elie Bursztein
Collin Jackson
Dan Boneh
2010
conf/crypto
Lattice Basis Delegation in Fixed Dimension and Shorter-Ciphertext Hierarchical IBE.
Shweta Agrawal
Dan Boneh
Xavier Boyen
2010
conf/esorics
Kamouflage: Loss-Resistant Password Management.
Hristo Bojinov
Elie Bursztein
Xavier Boyen
Dan Boneh
2010
conf/ndss
Adnostic: Privacy Preserving Targeted Advertising.
Vincent Toubiana
Arvind Narayanan
Dan Boneh
Helen Nissenbaum
Solon Barocas
2010
conf/pkc
Preventing Pollution Attacks in Multi-source Network Coding.
Shweta Agrawal
Dan Boneh
Xavier Boyen
David Mandell Freeman
2010
conf/eurocrypt
Efficient Lattice (H)IBE in the Standard Model.
Shweta Agrawal
Dan Boneh
Xavier Boyen
2009
conf/ccs
XCS: cross channel scripting and its impact on web applications.
Hristo Bojinov
Elie Bursztein
Dan Boneh
2009
conf/acns
Homomorphic MACs: MAC-Based Integrity for Network Coding.
Shweta Agrawal
Dan Boneh
2009
conf/pkc
Signing a Linear Subspace: Signature Schemes for Network Coding.
Dan Boneh
David Mandell Freeman
Jonathan Katz
Brent Waters
2009
conf/acsac
Symmetric Cryptography in Javascript.
Emily Stark
Michael Hamburg
Dan Boneh
2008
journals/joc
Short Signatures Without Random Oracles and the SDH Assumption in Bilinear Groups.
Dan Boneh
Xavier Boyen
2008
conf/ccs
Traitor tracing with constant size ciphertext.
Dan Boneh
Moni Naor
2008
conf/crypto
Circular-Secure Encryption from Decision Diffie-Hellman.
Dan Boneh
Shai Halevi
Michael Hamburg
Rafail Ostrovsky
2008
conf/asiacrypt
Generalized Identity Based and Broadcast Encryption Schemes.
Dan Boneh
Michael Hamburg
2007
conf/ccs
Covert channels in privacy-preserving identification systems.
Daniel V. Bailey
Dan Boneh
Eu-Jin Goh
Ari Juels
2007
conf/ccs
Protecting browsers from dns rebinding attacks.
Collin Jackson
Adam Barth
Andrew Bortz
Weidong Shao
Dan Boneh
2007
conf/uss
Transaction Generators: Root Kits for Web.
Collin Jackson
Dan Boneh
John C. Mitchell
2007
conf/crypto
Public Key Encryption That Allows PIR Queries.
Dan Boneh
Eyal Kushilevitz
Rafail Ostrovsky
William E. Skeith III
2007
conf/soups
Reducing shoulder-surfing by using gaze-based password entry.
Manu Kumar
Tal Garfinkel
Dan Boneh
Terry Winograd
2007
conf/ndss
Cryptographic Methods for Storing Ballots on a Voting Machine.
John Bethencourt
Dan Boneh
Brent Waters
2007
conf/tcc
Conjunctive, Subset, and Range Queries on Encrypted Data.
Dan Boneh
Brent Waters
2006
conf/ccs
Secure function evaluation with ordered binary decision diagrams.
Louis Kruger
Somesh Jha
Eu-Jin Goh
Dan Boneh
2006
conf/ccs
A fully collusion resistant broadcast, trace, and revoke system.
Dan Boneh
Brent Waters
2006
conf/uss
SANE: A Protection Architecture for Enterprise Networks.
Martín Casado
Tal Garfinkel
Aditya Akella
Michael J. Freedman
Dan Boneh
Nick McKeown
2006
conf/crypto
On the Impossibility of Efficiently Combining Collision Resistant Hash Functions.
Dan Boneh
Xavier Boyen
2006
conf/fc
Privacy in Encrypted Content Distribution Using Private Broadcast Encryption.
Adam Barth
Dan Boneh
Brent Waters
2006
conf/pkc
Strongly Unforgeable Signatures Based on Computational Diffie-Hellman.
Dan Boneh
Emily Shen
Brent Waters
2006
conf/ctrsa
Chosen Ciphertext Secure Public Key Threshold Encryption Without Random Oracles.
Dan Boneh
Xavier Boyen
Shai Halevi
2006
conf/eurocrypt
Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys.
Dan Boneh
Amit Sahai
Brent Waters
2005
conf/uss
Stronger Password Authentication Using Browser Extensions.
Blake Ross
Collin Jackson
Nick Miyake
Dan Boneh
John C. Mitchell
2005
conf/crypto
Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys.
Dan Boneh
Craig Gentry
Brent Waters
2005
conf/ctrsa
Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity-Based Encryption.
Dan Boneh
Jonathan Katz
2005
conf/eurocrypt
Hierarchical Identity Based Encryption with Constant Size Ciphertext.
Dan Boneh
Xavier Boyen
Eu-Jin Goh
2005
conf/tcc
Evaluating 2-DNF Formulas on Ciphertexts.
Dan Boneh
Eu-Jin Goh
Kobbi Nissim
2004
journals/joc
Short Signatures from the Weil Pairing.
Dan Boneh
Ben Lynn
Hovav Shacham
2004
conf/ccs
Group signatures with verifier-local revocation.
Dan Boneh
Hovav Shacham
2004
conf/ccs
On the effectiveness of address-space randomization.
Hovav Shacham
Matthew Page
Ben Pfaff
Eu-Jin Goh
Nagendra Modadugu
Dan Boneh
2004
conf/crypto
Secure Identity Based Encryption Without Random Oracles.
Dan Boneh
Xavier Boyen
2004
conf/crypto
Short Group Signatures.
Dan Boneh
Xavier Boyen
Hovav Shacham
2004
conf/eurocrypt
Short Signatures Without Random Oracles.
Dan Boneh
Xavier Boyen
2004
conf/eurocrypt
Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles.
Dan Boneh
Xavier Boyen
2004
conf/eurocrypt
Public Key Encryption with Keyword Search.
Dan Boneh
Giovanni Di Crescenzo
Rafail Ostrovsky
Giuseppe Persiano
2003
conf/uss
Remote Timing Attacks Are Practical.
David Brumley
Dan Boneh
2003
conf/ndss
SiRiUS: Securing Remote Untrusted Storage.
Eu-Jin Goh
Hovav Shacham
Nagendra Modadugu
Dan Boneh
2003
conf/ctrsa
A Secure Signature Scheme from Bilinear Maps.
Dan Boneh
Ilya Mironov
Victor Shoup
2003
conf/eurocrypt
Aggregate and Verifiably Encrypted Signatures from Bilinear Maps.
Dan Boneh
Craig Gentry
Ben Lynn
Hovav Shacham
2002
conf/ccs
Attacking an Obfuscated Cipher by Injecting Faults.
Matthias Jacob
Dan Boneh
Edward W. Felten
2002
conf/ccs
Almost entirely correct mixing with applications to voting.
Dan Boneh
Philippe Golle
2002
conf/ndss
Fast-Track Session Establishment for TLS.
Hovav Shacham
Dan Boneh
2002
conf/asiacrypt
Optimistic Mixing for Exit-Polls.
Philippe Golle
Sheng Zhong
Dan Boneh
Markus Jakobsson
Ari Juels
2001
journals/joc
On the Importance of Eliminating Errors in Cryptographic Computations.
Dan Boneh
Richard A. DeMillo
Richard J. Lipton
2001
conf/uss
A Method for Fast Revocation of Public Key Certificates and Security Capabilities.
Dan Boneh
Xuhua Ding
Gene Tsudik
Chi-Ming Wong
2001
conf/crypto
Identity-Based Encryption from the Weil Pairing.
Dan Boneh
Matthew K. Franklin
2001
conf/crypto
On the Unpredictability of Bits of the Elliptic Curve Diffie--Hellman Scheme.
Dan Boneh
Igor E. Shparlinski
2001
conf/crypto
Simplified OAEP for the RSA and Rabin Functions.
Dan Boneh
2001
conf/ctrsa
Improving SSL Handshake Performance via Batching.
Hovav Shacham
Dan Boneh
2001
conf/eurocrypt
Lower Bounds for Multicast Message Authentication.
Dan Boneh
Glenn Durfee
Matthew K. Franklin
2001
conf/asiacrypt
Short Signatures from the Weil Pairing.
Dan Boneh
Ben Lynn
Hovav Shacham
2001
conf/asiacrypt
The Modular Inversion Hidden Number Problem.
Dan Boneh
Shai Halevi
Nick Howgrave-Graham
2000
conf/crypto
Timed Commitments.
Dan Boneh
Moni Naor
2000
conf/asiacrypt
Why Textbook ElGamal and RSA Encryption Are Insecure.
Dan Boneh
Antoine Joux
Phong Q. Nguyen
1999
conf/ccs
Anonymous Authentication with Subset Queries (extended abstract).
Dan Boneh
Matthew K. Franklin
1999
conf/uss
Building Intrusion-Tolerant Applications.
Thomas D. Wu
Michael Malkin
Dan Boneh
1999
conf/crypto
An Efficient Public Key Traitor Tracing Scheme.
Dan Boneh
Matthew K. Franklin
1999
conf/crypto
Factoring N = p<sup>r</sup>q for Large r.
Dan Boneh
Glenn Durfee
Nick Howgrave-Graham
1999
conf/fc
Experimenting with Electronic Commerce on the PalmPilot.
Neil Daswani
Dan Boneh
1999
conf/ndss
Experimenting with Shared Generation of RSA Keys.
Michael Malkin
Thomas D. Wu
Dan Boneh
1999
conf/eurocrypt
<sup>0.292</sup>.
Dan Boneh
Glenn Durfee
1998
conf/eurocrypt
Breaking RSA May Not Be Equivalent to Factoring.
Dan Boneh
Ramarathnam Venkatesan
1998
conf/asiacrypt
An Attack on RSA Given a Small Fraction of the Private Key Bits.
Dan Boneh
Glenn Durfee
Yair Frankel
1997
conf/acisp
Revocation of Unread E-mail in an Untrusted Network.
Aviel D. Rubin
Dan Boneh
Kevin Fu
1997
conf/crypto
Efficient Generation of Shared RSA Keys (Extended Abstract).
Dan Boneh
Matthew K. Franklin
1997
conf/eurocrypt
On the Importance of Checking Cryptographic Protocols for Faults (Extended Abstract).
Dan Boneh
Richard A. DeMillo
Richard J. Lipton
1996
conf/uss
A Revocable Backup System.
Dan Boneh
Richard J. Lipton
1996
conf/crypto
Algorithms for Black-Box Fields and their Application to Cryptography (Extended Abstract).
Dan Boneh
Richard J. Lipton
1996
conf/crypto
Hardness of Computing the Most Significant Bits of Secret Keys in Diffie-Hellman and Related Schemes.
Dan Boneh
Ramarathnam Venkatesan
1995
conf/crypto
Quantum Cryptanalysis of Hidden Linear Functions (Extended Abstract).
Dan Boneh
Richard J. Lipton
1995
conf/crypto
Collusion-Secure Fingerprinting for Digital Data (Extended Abstract).
Dan Boneh
James Shaw
Coauthors
Aaron Schulman
(1)
Aayush Jain
(1)
Abhi Shelat
(2)
Adam Barth
(2)
Adam Belay
(1)
Adam Foltzer
(1)
Aditi Partap
(5)
Aditya Akella
(1)
Alain Passelègue
(1)
Alex J. Malozemoff
(1)
Alex Kirshon
(1)
Alex Ozdemir
(4)
Ali José Mashtizadeh
(2)
Amit Sahai
(8)
Ananth Raghunathan
(6)
Andrea Bittau
(3)
Andrew Bortz
(1)
Andrew Poelstra
(1)
Anja Lehmann
(1)
Ankur Taly
(1)
Antoine Joux
(1)
Ari Juels
(2)
Ariel Gabizon
(1)
Arvind Narayanan
(2)
Asim Shankar
(1)
Aviel D. Rubin
(1)
Baptiste Gourdin
(1)
Barry Whitehat
(1)
Ben Fisch
(6)
Ben Lynn
(3)
Ben Pfaff
(1)
Benedikt Bünz
(7)
Binyi Chen
(4)
Blake Ross
(1)
Borbala Benko
(1)
Brent Carmer
(1)
Brent Waters
(14)
Bryan Ford
(1)
Celine Fabry
(1)
Charlotte Peale
(1)
Chelsea Komlo
(1)
Chi-Ming Wong
(1)
Christian Schaffner
(1)
Christopher Jeffrey
(1)
Collin Jackson
(6)
Craig Gentry
(4)
Damon McCoy
(1)
Dan Boneh
(186)
Daniel Apon
(1)
Daniel Sánchez
(1)
Daniel V. Bailey
(1)
Daniel Wagner
(1)
David Brumley
(1)
David J. Wu
(7)
David Mandell Freeman
(4)
David Mazières
(5)
David Silver
(1)
David W. Archer
(1)
Dawn Song
(1)
Deepak Kumar
(2)
Devdatta Akhawe
(1)
Dhinakaran Vinayagamurthy
(2)
Dillon Franke
(1)
Dima Gonikman
(1)
Dinesh Israni
(1)
Divya Gupta
(1)
Dmitry Kogan
(2)
Dominic Rizzo
(1)
Edward W. Felten
(1)
Elette Boyle
(3)
Elie Bursztein
(7)
Emily Shen
(1)
Emily Stark
(2)
Emma Dauterman
(1)
Eran Messeri
(1)
Eric Gong
(1)
Eric Yawei Chen
(1)
Ertem Nusret Tas
(1)
Eu-Jin Goh
(6)
Evan Laufer
(2)
Eyal Kushilevitz
(1)
Fan Zhang
(1)
Florian Tramèr
(2)
Forest Fraser
(1)
Frank Wang
(2)
Gabi Nakibly
(3)
Gaby G. Dagher
(1)
Gaspar Garcia Jr.
(1)
Gaurav Aggarwal
(1)
Gene Tsudik
(1)
Giancarlo Pellegrino
(2)
Gianluca Stringhini
(1)
Gil Segev
(5)
Gili Rusak
(1)
Giovanni Di Crescenzo
(1)
Giuseppe Persiano
(1)
Glenn Durfee
(4)
Gregory Maxwell
(1)
Gregory Neven
(1)
Gunaa Arumugam Veerapandian
(1)
Gustav Rydstedt
(1)
Hart William Montgomery
(3)
Helen Nissenbaum
(1)
Henry Corrigan-Gibbs
(10)
Hovav Shacham
(9)
Hristo Bojinov
(5)
Hung T. Nguyen
(1)
Ian Mason
(1)
Iftach Haitner
(1)
Igor E. Shparlinski
(1)
Iliyan Malchev
(1)
Ilya Mironov
(3)
Jae Hyun Ahn
(2)
Jaehyung Kim
(1)
James Shaw
(1)
Jan Camenisch
(2)
Jason Bau
(1)
Jeffrey Wang
(1)
Jennifer Pullman
(1)
Jeremy Clark
(1)
Jeroen Massar
(1)
Jiaheng Zhang
(1)
Jiaxin Guan
(1)
Jocelyn Lagarenne
(1)
Joe Zimmerman
(1)
John Bethencourt
(1)
John C. Mitchell
(3)
Jonathan Bootle
(1)
Jonathan Cogan
(1)
Jonathan Katz
(3)
Joseph Bonneau
(5)
Joseph Poon
(1)
Justin Drake
(1)
Katharine Woo
(1)
Kenny Paterson
(1)
Kevin Fu
(1)
Kevin Lewi
(4)
Kevin Liao
(1)
Kevin Yeo
(1)
Kobbi Nissim
(1)
Kurt Thomas
(2)
Lin-Shung Huang
(1)
Linda Briesemeister
(1)
Lior Rotem
(4)
Louis Kruger
(1)
Luca Invernizzi
(1)
Mahdi Zamani
(1)
Manu Drijvers
(1)
Manu Kumar
(1)
Marc Fischlin
(1)
Marc Joye
(2)
Mariana Raykova
(2)
Mark Handley
(1)
Mark Zhandry
(7)
Markus Jakobsson
(1)
Martín Abadi
(1)
Martín Casado
(1)
Martin Georgiev
(1)
Matei Zaharia
(1)
Matthew K. Franklin
(5)
Matthew Page
(1)
Matthias Jacob
(1)
Maurice Shih
(1)
Megha Srivastava
(1)
Michael Backes
(1)
Michael D. Bailey
(1)
Michael Hamburg
(5)
Michael J. Freedman
(1)
Michael Malkin
(2)
Mike Hamburg
(1)
Moni Naor
(2)
Mugdha Lakhani
(1)
Nagendra Modadugu
(2)
Narendran Thiagarajan
(1)
Nathan Manohar
(1)
Neil Daswani
(1)
Neil Perry
(1)
Nick Howgrave-Graham
(2)
Nick McKeown
(1)
Nick Miyake
(1)
Nicola Dell
(1)
Nina Taft
(2)
Nirvan Tyagi
(1)
Niv Gilboa
(3)
Okke Schrijvers
(1)
Özgür Dagdelen
(1)
Pascal Dupré
(1)
Patrick Gage Kelley
(2)
Patrick Lincoln
(2)
Paul J. Reber
(1)
Paul Vixie
(1)
Peh Chang Wei Brandon
(1)
Peter M. R. Rasmussen
(1)
Philippe Golle
(2)
Phillip A. Porras
(1)
Phong Q. Nguyen
(1)
Pieter Wuille
(1)
Rafail Ostrovsky
(3)
Ramarathnam Venkatesan
(2)
Riad S. Wahby
(3)
Rich Cannings
(1)
Richard A. DeMillo
(2)
Richard J. Lipton
(5)
Rishita Anubhai
(1)
Rosario Gennaro
(2)
Saba Eskandarian
(7)
Sam Kim
(5)
Sam Ragsdale
(1)
Sarah Meiklejohn
(1)
Sarvar Patel
(1)
Sawyer Birnbaum
(1)
Sergey Gorbunov
(2)
Shai Halevi
(5)
Shashank Agrawal
(1)
Shay Gueron
(1)
Sheng Zhong
(1)
Shweta Agrawal
(4)
Solon Barocas
(1)
Somesh Jha
(1)
Steven Cheung
(1)
Steven Goldfeder
(2)
Stratis Ioannidis
(2)
Stuart E. Schechter
(1)
Subodh Iyengar
(1)
Suman Jana
(2)
Sunny Consolvo
(1)
Susan Hohenberger
(2)
Tadek Pietraszek
(1)
Tal Garfinkel
(2)
Taresh K. Sethi
(1)
Terry Winograd
(1)
Thomas D. Wu
(2)
Thomas Ristenpart
(1)
Tiancheng Xie
(1)
Tim Roughgarden
(1)
Trisha Datta
(2)
Udi Weinsberg
(2)
Valeria Nikolaenko
(5)
Victor Shoup
(1)
Vincent Toubiana
(1)
Vinod Vaikuntanathan
(1)
Vinod Yegneswaran
(2)
Vishal Subbiah
(1)
Vitaly Shmatikov
(1)
Weidong Shao
(1)
Wendy Mu
(1)
William Allen Simpson
(1)
William E. Skeith III
(1)
Wilson D. Nguyen
(1)
Xavier Boyen
(13)
Xuhua Ding
(1)
Yair Frankel
(1)
Yan Michalevsky
(2)
Yehuda Lindell
(1)
Yongzheng Jia
(1)
Yupeng Zhang
(1)
Yuval Ishai
(6)
Zachary Weinberg
(2)
Zakir Durumeric
(1)
Zerui Cheng
(1)
Zhenfei Zhang
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to