Eu-Jin Goh
Eu-Jin Goh
Unknown affiliation
Verified email at cs.stanford.edu
Title
Cited by
Cited by
Year
Evaluating 2-DNF formulas on ciphertexts
D Boneh, EJ Goh, K Nissim
Theory of cryptography conference, 325-341, 2005
16922005
Hierarchical identity based encryption with constant size ciphertext
D Boneh, X Boyen, EJ Goh
Annual International Conference on the Theory and Applications of …, 2005
14582005
Secure indexes.
EJ Goh
IACR Cryptol. ePrint Arch. 2003, 216, 2003
13972003
On the effectiveness of address-space randomization
H Shacham, M Page, B Pfaff, EJ Goh, N Modadugu, D Boneh
Proceedings of the 11th ACM conference on Computer and communications …, 2004
10822004
SiRiUS: Securing Remote Untrusted Storage.
EJ Goh, H Shacham, N Modadugu, D Boneh
NDSS 3, 131-145, 2003
7022003
Efficient selective identity-based encryption without random oracles
D Boneh, X Boyen
Journal of Cryptology 24 (4), 659-693, 2011
1502011
A signature scheme as secure as the Diffie-Hellman problem
EJ Goh, S Jarecki
International Conference on the Theory and Applications of Cryptographic …, 2003
1452003
Efficient signature schemes with tight reductions to the Diffie-Hellman problems
EJ Goh, S Jarecki, J Katz, N Wang
Journal of Cryptology 20 (4), 493-514, 2007
912007
Secure function evaluation with ordered binary decision diagrams
L Kruger, S Jha, EJ Goh, D Boneh
Proceedings of the 13th ACM conference on Computer and communications …, 2006
772006
Method and apparatus for transparent encryption
D Boneh, R Chawla, A Frindell, EJ Goh, N Modadugu, P Tsirigotis
US Patent 7,757,278, 2010
652010
Secure indexes, Cryptography ePrint archive
EJ Goh
http://eprint. iacr. org/2006/216/, 2003
452003
Encryption schemes from bilinear maps
EJ Goh
Stanford University, 2007
352007
The design and implementation of protocol-based hidden key recovery
EJ Goh, D Boneh, B Pinkas, P Golle
International Conference on Information Security, 165-179, 2003
302003
Covert channels in privacy-preserving identification systems
DV Bailey, D Boneh, EJ Goh, A Juels
Proceedings of the 14th ACM conference on Computer and communications …, 2007
202007
Delegation system for decryption rights
T Matsuo, D Boneh, EJ Goh
US Patent App. 11/894,448, 2008
192008
Event driven private counters
EJ Goh, P Golle
International Conference on Financial Cryptography and Data Security, 313-327, 2005
112005
Secure indexes
E jin Goh
In submission, 2004
62004
How to Search on Encrypted data
EJ Goh
slides available at http://crypto. stanford. edu/~ eujin/papers/secureindex …, 2003
32003
A Signature Scheme as Secure as the
EJ Goh, SJ Jarecki
Advances in Cryptology: Proceedings of EUROCRYPT..., a Workshop on the …, 2003
2003
Searching on Encrypted Data
EJ Goh
2003
The system can't perform the operation now. Try again later.
Articles 1–20