dblp.uni-trier.dewww.uni-trier.de

Dan Boneh

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2009
117EEDan Boneh, David Freeman, Jonathan Katz, Brent Waters: Signing a Linear Subspace: Signature Schemes for Network Coding. Public Key Cryptography 2009: 68-87
116EECollin Jackson, Adam Barth, Andrew Bortz, Weidong Shao, Dan Boneh: Protecting browsers from DNS rebinding attacks. TWEB 3(1): 2 (2009)
2008
115 Johannes Blömer, Dan Boneh, Ronald Cramer, Ueli M. Maurer: Cryptography, 16.09. - 21.09.2007 Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany 2008
114 Dan Boneh, Tal Garfinkel, Dug Song: 2nd USENIX Workshop on Offensive Technologies, July 28, 2008, San Jose, CA, USA, Proceedings USENIX Association 2008
113EEDan Boneh, Moni Naor: Traitor tracing with constant size ciphertext. ACM Conference on Computer and Communications Security 2008: 501-510
112EEDan Boneh, Michael Hamburg: Generalized Identity Based and Broadcast Encryption Schemes. ASIACRYPT 2008: 455-470
111EEXiaoxin Chen, Tal Garfinkel, E. Christopher Lewis, Pratap Subrahmanyam, Carl A. Waldspurger, Dan Boneh, Jeffrey S. Dwoskin, Dan R. K. Ports: Overshadow: a virtualization-based approach to retrofitting protection in commodity operating systems. ASPLOS 2008: 2-13
110EEDan Boneh, Shai Halevi, Michael Hamburg, Rafail Ostrovsky: Circular-Secure Encryption from Decision Diffie-Hellman. CRYPTO 2008: 108-125
109EEDan Boneh, Periklis A. Papakonstantinou, Charles Rackoff, Yevgeniy Vahlis, Brent Waters: On the Impossibility of Basing Identity Based Encryption on Trapdoor Permutations. FOCS 2008: 283-292
108EEDan Boneh, Xavier Boyen: Short Signatures Without Random Oracles and the SDH Assumption in Bilinear Groups. J. Cryptology 21(2): 149-177 (2008)
2007
107EEDaniel V. Bailey, Dan Boneh, Eu-Jin Goh, Ari Juels: Covert channels in privacy-preserving identification systems. ACM Conference on Computer and Communications Security 2007: 297-306
106EECollin Jackson, Adam Barth, Andrew Bortz, Weidong Shao, Dan Boneh: Protecting browsers from dns rebinding attacks. ACM Conference on Computer and Communications Security 2007: 421-431
105EEDan Boneh, Eyal Kushilevitz, Rafail Ostrovsky, William E. Skeith III: Public Key Encryption That Allows PIR Queries. CRYPTO 2007: 50-67
104EEJohannes Blömer, Dan Boneh, Ronald Cramer, Ueli M. Maurer: 07381 Abstracts Collection -- Cryptography. Cryptography 2007
103EEJohannes Blömer, Dan Boneh, Ronald Cramer, Ueli M. Maurer: 07381 Executive Summary - Cryptography. Cryptography 2007
102EEDan Boneh: A Brief Look at Pairings Based Cryptography. FOCS 2007: 19-26
101EEDan Boneh, Craig Gentry, Michael Hamburg: Space-Efficient Identity Based Encryption Without Pairings. FOCS 2007: 647-657
100EEJohn Bethencourt, Dan Boneh, Brent Waters: Cryptographic Methods for Storing Ballots on a Voting Machine. NDSS 2007
99EEDan Boneh: Bilinear Groups of Composite Order. Pairing 2007: 1
98EEManu Kumar, Tal Garfinkel, Dan Boneh, Terry Winograd: Reducing shoulder-surfing by using gaze-based password entry. SOUPS 2007: 13-19
97EEDan Boneh, Brent Waters: Conjunctive, Subset, and Range Queries on Encrypted Data. TCC 2007: 535-554
96EEFelipe Saint-Jean, Aaron Johnson, Dan Boneh, Joan Feigenbaum: Private web search. WPES 2007: 84-90
95EEAndrew Bortz, Dan Boneh: Exposing private information by timing web applications. WWW 2007: 621-628
94EEDan Boneh, Ran Canetti, Shai Halevi, Jonathan Katz: Chosen-Ciphertext Security from Identity-Based Encryption. SIAM J. Comput. 36(5): 1301-1328 (2007)
2006
93EEDan Boneh, Brent Waters: A fully collusion resistant broadcast, trace, and revoke system. ACM Conference on Computer and Communications Security 2006: 211-220
92EELouis Kruger, Somesh Jha, Eu-Jin Goh, Dan Boneh: Secure function evaluation with ordered binary decision diagrams. ACM Conference on Computer and Communications Security 2006: 410-420
91EEDan Boneh, Xavier Boyen: On the Impossibility of Efficiently Combining Collision Resistant Hash Functions. CRYPTO 2006: 570-583
90EEDan Boneh, Xavier Boyen, Shai Halevi: Chosen Ciphertext Secure Public Key Threshold Encryption Without Random Oracles. CT-RSA 2006: 226-243
89EEDan Boneh, Amit Sahai, Brent Waters: Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys. EUROCRYPT 2006: 573-592
88EEAdam Barth, Dan Boneh, Brent Waters: Privacy in Encrypted Content Distribution Using Private Broadcast Encryption. Financial Cryptography 2006: 52-64
87EEDan Boneh, Emily Shen, Brent Waters: Strongly Unforgeable Signatures Based on Computational Diffie-Hellman. Public Key Cryptography 2006: 229-240
86EECollin Jackson, Andrew Bortz, Dan Boneh, John C. Mitchell: Protecting browser state from web privacy attacks. WWW 2006: 737-744
85EECollin Jackson, Andrew Bortz, Dan Boneh, John C. Mitchell: Protecting browser state from web privacy attacks. WWW 2006: 737-744
2005
84EEDan Boneh, Craig Gentry, Brent Waters: Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys. CRYPTO 2005: 258-275
83EEDan Boneh, Jonathan Katz: Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity-Based Encryption. CT-RSA 2005: 87-103
82EEDan Boneh, Xavier Boyen, Eu-Jin Goh: Hierarchical Identity Based Encryption with Constant Size Ciphertext. EUROCRYPT 2005: 440-456
81EEDan Boneh, Eu-Jin Goh, Kobbi Nissim: Evaluating 2-DNF Formulas on Ciphertexts. TCC 2005: 325-341
80EEDan Boneh: BLS Short Digital Signatures. Encyclopedia of Cryptography and Security 2005
79EEDan Boneh: Blum-Blum-Shub Pseudorandom Bit Generator. Encyclopedia of Cryptography and Security 2005
78EEDan Boneh: Blum-Goldwasser Public Key Encryption System. Encyclopedia of Cryptography and Security 2005
77EEDan Boneh: Cramer-Shoup Public Key System. Encyclopedia of Cryptography and Security 2005
76EEDan Boneh: Digital Signature Standard. Encyclopedia of Cryptography and Security 2005
75EEDan Boneh: Elgamal Digital Signature Scheme. Encyclopedia of Cryptography and Security 2005
74EEDan Boneh: Rabin Digital Signature Scheme. Encyclopedia of Cryptography and Security 2005
73EEDan Boneh: Schnorr Digital Signature Scheme. Encyclopedia of Cryptography and Security 2005
72EEDan Boneh: Secure signatures from the "strong RSA" assumption. Encyclopedia of Cryptography and Security 2005
71EEDan Boneh: Strong RSA Assumption. Encyclopedia of Cryptography and Security 2005
70EEDavid Brumley, Dan Boneh: Remote timing attacks are practical. Computer Networks 48(5): 701-716 (2005)
69EENinghui Li, Wenliang Du, Dan Boneh: Oblivious signature-based envelope. Distributed Computing 17(4): 293-302 (2005)
2004
68EEDan Boneh, Hovav Shacham: Group signatures with verifier-local revocation. ACM Conference on Computer and Communications Security 2004: 168-177
67EEHovav Shacham, Matthew Page, Ben Pfaff, Eu-Jin Goh, Nagendra Modadugu, Dan Boneh: On the effectiveness of address-space randomization. ACM Conference on Computer and Communications Security 2004: 298-307
66EEDan Boneh, Xavier Boyen, Hovav Shacham: Short Group Signatures. CRYPTO 2004: 41-55
65EEDan Boneh, Xavier Boyen: Secure Identity Based Encryption Without Random Oracles. CRYPTO 2004: 443-459
64EEDan Boneh, Xavier Boyen: Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles. EUROCRYPT 2004: 223-238
63EEDan Boneh, Giovanni Di Crescenzo, Rafail Ostrovsky, Giuseppe Persiano: Public Key Encryption with Keyword Search. EUROCRYPT 2004: 506-522
62EEDan Boneh, Xavier Boyen: Short Signatures Without Random Oracles. EUROCRYPT 2004: 56-73
61EEHovav Shacham, Dan Boneh, Eric Rescorla: Client-side caching for TLS. ACM Trans. Inf. Syst. Secur. 7(4): 553-575 (2004)
60EEDan Boneh, Xuhua Ding, Gene Tsudik: Fine-grained control of security capabilities. ACM Trans. Internet Techn. 4(1): 60-82 (2004)
59EEDan Boneh, Joan Feigenbaum, Abraham Silberschatz, Rebecca N. Wright: PORTIA: Privacy, Obligations, and Rights in Technologies of Information Assessment. IEEE Data Eng. Bull. 27(1): 10-18 (2004)
58EEDan Boneh, Ben Lynn, Hovav Shacham: Short Signatures from the Weil Pairing. J. Cryptology 17(4): 297-319 (2004)
2003
57 Dan Boneh: Advances in Cryptology - CRYPTO 2003, 23rd Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 2003, Proceedings Springer 2003
56EEDan Boneh, Ilya Mironov, Victor Shoup: A Secure Signature Scheme from Bilinear Maps. CT-RSA 2003: 98-110
55EEDan Boneh, Craig Gentry, Ben Lynn, Hovav Shacham: Aggregate and Verifiably Encrypted Signatures from Bilinear Maps. EUROCRYPT 2003: 416-432
54 Tal Garfinkel, Mendel Rosenblum, Dan Boneh: Flexible OS Support and Applications for Trusted Computing. HotOS 2003: 145-150
53EEEu-Jin Goh, Dan Boneh, Benny Pinkas, Philippe Golle: The Design and Implementation of Protocol-Based Hidden Key Recovery. ISC 2003: 165-179
52EEEu-Jin Goh, Hovav Shacham, Nagendra Modadugu, Dan Boneh: SiRiUS: Securing Remote Untrusted Storage. NDSS 2003
51EENinghui Li, Wenliang Du, Dan Boneh: Oblivious signature-based envelope. PODC 2003: 182-189
50EETal Garfinkel, Ben Pfaff, Jim Chow, Mendel Rosenblum, Dan Boneh: Terra: a virtual machine-based platform for trusted computing. SOSP 2003: 193-206
49EEDan Boneh, Matthew K. Franklin: Identity-Based Encryption from the Weil Pairing. SIAM J. Comput. 32(3): 586-615 (2003)
2002
48 Dan Boneh: Proceedings of the 11th USENIX Security Symposium, San Francisco, CA, USA, August 5-9, 2002 USENIX 2002
47EEDan Boneh, Philippe Golle: Almost entirely correct mixing with applications to voting. ACM Conference on Computer and Communications Security 2002: 68-77
46EEPhilippe Golle, Sheng Zhong, Dan Boneh, Markus Jakobsson, Ari Juels: Optimistic Mixing for Exit-Polls. ASIACRYPT 2002: 451-465
45EEMatthias Jacob, Dan Boneh, Edward W. Felten: Attacking an Obfuscated Cipher by Injecting Faults. Digital Rights Management Workshop 2002: 16-31
44EEHovav Shacham, Dan Boneh: Fast-Track Session Establishment for TLS. NDSS 2002
43EEDan Boneh: Finding Smooth Integers in Short Intervals Using CRT Decoding. J. Comput. Syst. Sci. 64(4): 768-784 (2002)
2001
42EEDan Boneh, Shai Halevi, Nick Howgrave-Graham: The Modular Inversion Hidden Number Problem. ASIACRYPT 2001: 36-51
41EEDan Boneh, Ben Lynn, Hovav Shacham: Short Signatures from the Weil Pairing. ASIACRYPT 2001: 514-532
40EEDan Boneh, Igor Shparlinski: On the Unpredictability of Bits of the Elliptic Curve Diffie--Hellman Scheme. CRYPTO 2001: 201-212
39EEDan Boneh, Matthew K. Franklin: Identity-Based Encryption from the Weil Pairing. CRYPTO 2001: 213-229
38EEDan Boneh: Simplified OAEP for the RSA and Rabin Functions. CRYPTO 2001: 275-291
37EEHovav Shacham, Dan Boneh: Improving SSL Handshake Performance via Batching. CT-RSA 2001: 28-43
36EEDan Boneh, Glenn Durfee, Matthew K. Franklin: Lower Bounds for Multicast Message Authentication. EUROCRYPT 2001: 437-452
35 Eric B. Baum, Dan Boneh, Charles Garrett: Where Genetic Algorithms Excel. Evolutionary Computation 9(1): 93-124 (2001)
34EEDan Boneh, Matthew K. Franklin: Efficient generation of shared RSA keys. J. ACM 48(4): 702-722 (2001)
33EEDan Boneh, Richard A. DeMillo, Richard J. Lipton: On the Importance of Eliminating Errors in Cryptographic Computations. J. Cryptology 14(2): 101-119 (2001)
2000
32EEDan Boneh, Antoine Joux, Phong Q. Nguyen: Why Textbook ElGamal and RSA Encryption Are Insecure. ASIACRYPT 2000: 30-43
31EEDavid Lie, Chandramohan A. Thekkath, Mark Mitchell, Patrick Lincoln, Dan Boneh, John C. Mitchell, Mark Horowitz: Architectural Support for Copy and Tamper Resistant Software. ASPLOS 2000: 168-177
30EEDan Boneh, Moni Naor: Timed Commitments. CRYPTO 2000: 236-254
29EEDan Boneh, Nagendra Modadugu, Michael Kim: Generating RSA Keys on a Handheld Using an Untrusted Server. INDOCRYPT 2000: 271-282
28EEDan Boneh: Finding smooth integers in short intervals using CRT decoding. STOC 2000: 265-272
27 Dan Boneh, Glenn Durfee: Cryptanalysis of RSA with private key d less than N0.292. IEEE Transactions on Information Theory 46(4): 1339 (2000)
1999
26EEDan Boneh, Matthew K. Franklin: Anonymous Authentication with Subset Queries (extended abstract). ACM Conference on Computer and Communications Security 1999: 113-119
25EEDan Boneh, Glenn Durfee, Nick Howgrave-Graham: Factoring N = prq for Large r. CRYPTO 1999: 326-337
24EEDan Boneh, Matthew K. Franklin: An Efficient Public Key Traitor Tracing Scheme. CRYPTO 1999: 338-353
23EEDan Boneh, Glenn Durfee: Cryptanalysis of RSA with Private Key d Less than N0.292. EUROCRYPT 1999: 1-11
22EENeil Daswani, Dan Boneh: Experimenting with Electronic Commerce on the PalmPilot. Financial Cryptography 1999: 1-16
21EEMichael Malkin, Thomas D. Wu, Dan Boneh: Experimenting with Shared Generation of RSA Keys. NDSS 1999
20EEEli Biham, Dan Boneh, Omer Reingold: Breaking Generalized Diffie-Hellmann Modulo a Composite is no Easier Than Factoring. Inf. Process. Lett. 70(2): 83-87 (1999)
1998
19EEDan Boneh, Jeremy Horwitz: Generating a Product of Three Primes with an Unknown Factorization. ANTS 1998: 237-251
18EEDan Boneh: The Decision Diffie-Hellman Problem. ANTS 1998: 48-63
17EEDan Boneh, Glenn Durfee, Yair Frankel: An Attack on RSA Given a Small Fraction of the Private Key Bits. ASIACRYPT 1998: 25-34
16EEDan Boneh, Ramarathnam Venkatesan: Breaking RSA May Not Be Equivalent to Factoring. EUROCRYPT 1998: 59-71
15 Dan Boneh, James Shaw: Collusion-Secure Fingerprinting for Digital Data. IEEE Transactions on Information Theory 44(5): 1897-1905 (1998)
1997
14 Aviel D. Rubin, Dan Boneh, Kevin Fu: Revocation of Unread E-mail in an Untrusted Network. ACISP 1997: 62-75
13EEDan Boneh, Matthew K. Franklin: Efficient Generation of Shared RSA Keys (Extended Abstract). CRYPTO 1997: 425-439
12EEDan Boneh, Richard A. DeMillo, Richard J. Lipton: On the Importance of Checking Cryptographic Protocols for Faults (Extended Abstract). EUROCRYPT 1997: 37-51
11EEDan Boneh, Richard J. Lipton: Effect of Operators on Straight Line Complexity. ISTCS 1997: 1-5
10 Dan Boneh, Ramarathnam Venkatesan: Rounding in Lattices and its Cryptographic Applications. SODA 1997: 675-681
9EEEli Biham, Dan Boneh, Omer Reingold: Generalized Diffie-Hellman Modulo a Composite is not Weaker than Factoring Electronic Colloquium on Computational Complexity (ECCC) 4(61): (1997)
1996
8EEDan Boneh, Ramarathnam Venkatesan: Hardness of Computing the Most Significant Bits of Secret Keys in Diffie-Hellman and Related Schemes. CRYPTO 1996: 129-142
7EEDan Boneh, Richard J. Lipton: Algorithms for Black-Box Fields and their Application to Cryptography (Extended Abstract). CRYPTO 1996: 283-297
6EEDan Boneh, Christopher Dunworth, Richard J. Lipton, Jiri Sgall: On the Computational Power of DNA. Discrete Applied Mathematics 71(1-3): 79-94 (1996)
1995
5EEEric B. Baum, Dan Boneh, Charles Garrett: On Genetic Algorithms. COLT 1995: 230-239
4EEDan Boneh: Learning Using Group Representations (Extended Abstract). COLT 1995: 418-426
3EEDan Boneh, Richard J. Lipton: Quantum Cryptanalysis of Hidden Linear Functions (Extended Abstract). CRYPTO 1995: 424-437
2EEDan Boneh, James Shaw: Collusion-Secure Fingerprinting for Digital Data (Extended Abstract). CRYPTO 1995: 452-465
1993
1EEDan Boneh, Richard J. Lipton: Amplification of Weak Learning under the Uniform Distribution. COLT 1993: 347-351

Coauthor Index

1Daniel V. Bailey [107]
2Adam Barth [88] [106] [116]
3Eric B. Baum [5] [35]
4John Bethencourt [100]
5Eli Biham [9] [20]
6Johannes Blömer [103] [104] [115]
7Andrew Bortz [85] [86] [95] [106] [116]
8Xavier Boyen [62] [64] [65] [66] [82] [90] [91] [108]
9David Brumley [70]
10Ran Canetti [94]
11Xiaoxin Chen [111]
12Jim Chow [50]
13Ronald Cramer [103] [104] [115]
14Giovanni Di Crescenzo [63]
15Neil Daswani [22]
16Richard A. DeMillo [12] [33]
17Xuhua Ding [60]
18Wenliang Du [51] [69]
19Christopher Dunworth [6]
20Glenn Durfee [17] [23] [25] [27] [36]
21Jeffrey S. Dwoskin [111]
22Joan Feigenbaum [59] [96]
23Edward W. Felten [45]
24Yair Frankel [17]
25Matthew K. Franklin [13] [24] [26] [34] [36] [39] [49]
26David Freeman [117]
27Kevin Fu [14]
28Tal Garfinkel [50] [54] [98] [111] [114]
29Charles Garrett [5] [35]
30Craig Gentry [55] [84] [101]
31Eu-Jin Goh [52] [53] [67] [81] [82] [92] [107]
32Philippe Golle [46] [47] [53]
33Shai Halevi [42] [90] [94] [110]
34Michael Hamburg [101] [110] [112]
35Mark Horowitz [31]
36Jeremy Horwitz [19]
37Nick Howgrave-Graham [25] [42]
38Collin Jackson [85] [86] [106] [116]
39Matthias Jacob [45]
40Markus Jakobsson [46]
41Somesh Jha [92]
42Aaron Johnson [96]
43Antoine Joux [32]
44Ari Juels [46] [107]
45Jonathan Katz [83] [94] [117]
46Michael Kim [29]
47Louis Kruger [92]
48Manu Kumar [98]
49Eyal Kushilevitz [105]
50E. Christopher Lewis [111]
51Ninghui Li [51] [69]
52David Lie [31]
53Patrick Lincoln [31]
54Richard J. Lipton [1] [3] [6] [7] [11] [12] [33]
55Ben Lynn [41] [55] [58]
56Michael Malkin [21]
57Ueli M. Maurer [103] [104] [115]
58Ilya Mironov [56]
59John C. Mitchell [31] [85] [86]
60Mark Mitchell [31]
61Nagendra Modadugu [29] [52] [67]
62Moni Naor [30] [113]
63Phong Q. Nguyen [32]
64Kobbi Nissim [81]
65Rafail Ostrovsky [63] [105] [110]
66Matthew Page [67]
67Periklis A. Papakonstantinou [109]
68Giuseppe Persiano (Pino Persiano) [63]
69Ben Pfaff [50] [67]
70Benny Pinkas [53]
71Dan R. K. Ports [111]
72Charles Rackoff [109]
73Omer Reingold [9] [20]
74Eric Rescorla [61]
75Mendel Rosenblum [50] [54]
76Aviel D. Rubin [14]
77Amit Sahai [89]
78Felipe Saint-Jean [96]
79Jiri Sgall [6]
80Hovav Shacham [37] [41] [44] [52] [55] [58] [61] [66] [67] [68]
81Weidong Shao [106] [116]
82James Shaw [2] [15]
83Emily Shen [87]
84Victor Shoup [56]
85Igor Shparlinski [40]
86Abraham Silberschatz (Avi Silberschatz) [59]
87William E. Skeith III [105]
88Dug Song [114]
89Pratap Subrahmanyam [111]
90Chandramohan A. Thekkath [31]
91Gene Tsudik [60]
92Yevgeniy Vahlis [109]
93Ramarathnam Venkatesan [8] [10] [16]
94Carl A. Waldspurger [111]
95Brent Waters (Brent R. Waters) [84] [87] [88] [89] [93] [97] [100] [109] [117]
96Terry Winograd [98]
97Rebecca N. Wright [59]
98Thomas D. Wu [21]
99Sheng Zhong [46]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)