Dan Boneh
Dan Boneh
Professor of Computer Science, Stanford University
Dirección de correo verificada de cs.stanford.edu - Página principal
Título
Citado por
Citado por
Año
Identity-based encryption from the Weil pairing
D Boneh, M Franklin
Annual international cryptology conference, 213-229, 2001
124542001
Short signatures from the Weil pairing
D Boneh, B Lynn, H Shacham
International conference on the theory and application of cryptology and …, 2001
34992001
Public key encryption with keyword search
D Boneh, G Di Crescenzo, R Ostrovsky, G Persiano
International conference on the theory and applications of cryptographic …, 2004
34842004
A fully homomorphic encryption scheme
C Gentry
Stanford university, 2009
28222009
Short group signatures
D Boneh, X Boyen, H Shacham
Annual international cryptology conference, 41-55, 2004
23592004
Aggregate and verifiably encrypted signatures from bilinear maps
D Boneh, C Gentry, B Lynn, H Shacham
International conference on the theory and applications of cryptographic …, 2003
21852003
On the importance of checking cryptographic protocols for faults
D Boneh, RA DeMillo, RJ Lipton
International conference on the theory and applications of cryptographic …, 1997
21851997
Efficient selective-ID secure identity-based encryption without random oracles
D Boneh, X Boyen
International conference on the theory and applications of cryptographic …, 2004
20792004
Broadcast encryption
A Fiat, M Naor
Annual International Cryptology Conference, 480-491, 1993
19451993
Evaluating 2-DNF formulas on ciphertexts
D Boneh, EJ Goh, K Nissim
Theory of cryptography conference, 325-341, 2005
18742005
Conjunctive, subset, and range queries on encrypted data
D Boneh, B Waters
Theory of cryptography conference, 535-554, 2007
16352007
Terra: A virtual machine-based platform for trusted computing
T Garfinkel, B Pfaff, J Chow, M Rosenblum, D Boneh
Proceedings of the nineteenth ACM symposium on Operating systems principles …, 2003
16162003
Short signatures without random oracles
D Boneh, X Boyen
International conference on the theory and applications of cryptographic …, 2004
15922004
Hierarchical identity based encryption with constant size ciphertext
D Boneh, X Boyen, EJ Goh
Annual International Conference on the Theory and Applications of …, 2005
15862005
Short signatures from the Weil pairing
D Boneh, B Lynn, H Shacham
Journal of cryptology 17 (4), 297-319, 2004
14632004
Ensemble adversarial training: Attacks and defenses
F Tramèr, A Kurakin, N Papernot, I Goodfellow, D Boneh, P McDaniel
arXiv preprint arXiv:1705.07204, 2017
14082017
Collusion resistant broadcast encryption with short ciphertexts and private keys
D Boneh, C Gentry, B Waters
Annual international cryptology conference, 258-275, 2005
12562005
Collusion-secure fingerprinting for digital data
D Boneh, J Shaw
IEEE Transactions on Information Theory 44 (5), 1897-1905, 1998
12131998
The decision diffie-hellman problem
D Boneh
International Algorithmic Number Theory Symposium, 48-63, 1998
11891998
On the effectiveness of address-space randomization
H Shacham, M Page, B Pfaff, EJ Goh, N Modadugu, D Boneh
Proceedings of the 11th ACM conference on Computer and communications …, 2004
11682004
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20