Следене
Dan Boneh
Dan Boneh
Professor of Computer Science, Stanford University
Потвърден имейл адрес: cs.stanford.edu - Начална страница
Заглавие
Позовавания
Позовавания
Година
Identity-based encryption from the Weil pairing
D Boneh, M Franklin
Annual international cryptology conference, 213-229, 2001
140322001
Short signatures from the Weil pairing
D Boneh, B Lynn, H Shacham
International conference on the theory and application of cryptology and …, 2001
43372001
Public key encryption with keyword search
D Boneh, G Di Crescenzo, R Ostrovsky, G Persiano
Advances in Cryptology-EUROCRYPT 2004: International Conference on the …, 2004
42732004
Ensemble adversarial training: Attacks and defenses
F Tramèr, A Kurakin, N Papernot, I Goodfellow, D Boneh, P McDaniel
arXiv preprint arXiv:1705.07204, 2017
30792017
Short group signatures
D Boneh, X Boyen, H Shacham
Annual international cryptology conference, 41-55, 2004
27582004
Aggregate and verifiably encrypted signatures from bilinear maps
D Boneh, C Gentry, B Lynn, H Shacham
Advances in Cryptology—EUROCRYPT 2003: International Conference on the …, 2003
26642003
On the importance of checking cryptographic protocols for faults
D Boneh, RA DeMillo, RJ Lipton
International conference on the theory and applications of cryptographic …, 1997
24841997
Evaluating 2-DNF formulas on ciphertexts
D Boneh, EJ Goh, K Nissim
Theory of Cryptography: Second Theory of Cryptography Conference, TCC 2005 …, 2005
23082005
Efficient selective-ID secure identity-based encryption without random oracles
D Boneh, X Boyen
Advances in Cryptology-EUROCRYPT 2004: International Conference on the …, 2004
22802004
Conjunctive, subset, and range queries on encrypted data
D Boneh, B Waters
Theory of Cryptography: 4th Theory of Cryptography Conference, TCC 2007 …, 2007
18792007
Short signatures without random oracles
D Boneh, X Boyen
International conference on the theory and applications of cryptographic …, 2004
18652004
Hierarchical identity based encryption with constant size ciphertext
D Boneh, X Boyen, EJ Goh
Annual international conference on the theory and applications of …, 2005
18532005
Short signatures from the Weil pairing
D Boneh, B Lynn, H Shacham
Journal of cryptology 17, 297-319, 2004
17992004
Terra: A virtual machine-based platform for trusted computing
T Garfinkel, B Pfaff, J Chow, M Rosenblum, D Boneh
Proceedings of the nineteenth ACM symposium on Operating systems principles …, 2003
16942003
Collusion resistant broadcast encryption with short ciphertexts and private keys
D Boneh, C Gentry, B Waters
Annual international cryptology conference, 258-275, 2005
14552005
The decision diffie-hellman problem
D Boneh
International algorithmic number theory symposium, 48-63, 1998
14261998
On the effectiveness of address-space randomization
H Shacham, M Page, B Pfaff, EJ Goh, N Modadugu, D Boneh
Proceedings of the 11th ACM conference on Computer and communications …, 2004
13392004
Remote timing attacks are practical
D Brumley, D Boneh
Computer Networks 48 (5), 701-716, 2005
13292005
Collusion-secure fingerprinting for digital data
D Boneh, J Shaw
IEEE Transactions on Information Theory 44 (5), 1897-1905, 1998
13081998
Functional encryption: Definitions and challenges
D Boneh, A Sahai, B Waters
Theory of Cryptography: 8th Theory of Cryptography Conference, TCC 2011 …, 2011
12562011
Системата не може да изпълни операцията сега. Опитайте отново по-късно.
Статии 1–20