Dan Boneh Home Page Coauthor index DBLP Vis pubzone.org

List of publications from the DBLP Bibliography Server - FAQ
Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo

DBLP keys2009
120Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLHristo Bojinov, Elie Bursztein, Dan Boneh: XCS: cross channel scripting and its impact on web applications. ACM Conference on Computer and Communications Security 2009: 420-431
119Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLShweta Agrawal, Dan Boneh: Homomorphic MACs: MAC-Based Integrity for Network Coding. ACNS 2009: 292-305
118Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLEmily Stark, Michael Hamburg, Dan Boneh: Symmetric Cryptography in Javascript. ACSAC 2009: 373-381
117Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDan Boneh, David Freeman, Jonathan Katz, Brent Waters: Signing a Linear Subspace: Signature Schemes for Network Coding. Public Key Cryptography 2009: 68-87
116Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLCollin Jackson, Adam Barth, Andrew Bortz, Weidong Shao, Dan Boneh: Protecting browsers from DNS rebinding attacks. TWEB 3(1): 2 (2009)
2008
115no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLJohannes Blömer, Dan Boneh, Ronald Cramer, Ueli M. Maurer: Cryptography, 16.09. - 21.09.2007 Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany 2008
114no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDan Boneh, Tal Garfinkel, Dug Song: 2nd USENIX Workshop on Offensive Technologies, July 28, 2008, San Jose, CA, USA, Proceedings USENIX Association 2008
113Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDan Boneh, Moni Naor: Traitor tracing with constant size ciphertext. ACM Conference on Computer and Communications Security 2008: 501-510
112Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDan Boneh, Michael Hamburg: Generalized Identity Based and Broadcast Encryption Schemes. ASIACRYPT 2008: 455-470
111Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLXiaoxin Chen, Tal Garfinkel, E. Christopher Lewis, Pratap Subrahmanyam, Carl A. Waldspurger, Dan Boneh, Jeffrey S. Dwoskin, Dan R. K. Ports: Overshadow: a virtualization-based approach to retrofitting protection in commodity operating systems. ASPLOS 2008: 2-13
110Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDan Boneh, Shai Halevi, Michael Hamburg, Rafail Ostrovsky: Circular-Secure Encryption from Decision Diffie-Hellman. CRYPTO 2008: 108-125
109Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDan Boneh, Periklis A. Papakonstantinou, Charles Rackoff, Yevgeniy Vahlis, Brent Waters: On the Impossibility of Basing Identity Based Encryption on Trapdoor Permutations. FOCS 2008: 283-292
108Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDan Boneh, Xavier Boyen: Short Signatures Without Random Oracles and the SDH Assumption in Bilinear Groups. J. Cryptology 21(2): 149-177 (2008)
2007
107Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDaniel V. Bailey, Dan Boneh, Eu-Jin Goh, Ari Juels: Covert channels in privacy-preserving identification systems. ACM Conference on Computer and Communications Security 2007: 297-306
106Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLCollin Jackson, Adam Barth, Andrew Bortz, Weidong Shao, Dan Boneh: Protecting browsers from dns rebinding attacks. ACM Conference on Computer and Communications Security 2007: 421-431
105Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDan Boneh, Eyal Kushilevitz, Rafail Ostrovsky, William E. Skeith III: Public Key Encryption That Allows PIR Queries. CRYPTO 2007: 50-67
104Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLJohannes Blömer, Dan Boneh, Ronald Cramer, Ueli M. Maurer: 07381 Abstracts Collection -- Cryptography. Cryptography 2007
103Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLJohannes Blömer, Dan Boneh, Ronald Cramer, Ueli M. Maurer: 07381 Executive Summary - Cryptography. Cryptography 2007
102Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDan Boneh: A Brief Look at Pairings Based Cryptography. FOCS 2007: 19-26
101Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDan Boneh, Craig Gentry, Michael Hamburg: Space-Efficient Identity Based Encryption Without Pairings. FOCS 2007: 647-657
100Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLJohn Bethencourt, Dan Boneh, Brent Waters: Cryptographic Methods for Storing Ballots on a Voting Machine. NDSS 2007
99Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDan Boneh: Bilinear Groups of Composite Order. Pairing 2007: 1
98Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLManu Kumar, Tal Garfinkel, Dan Boneh, Terry Winograd: Reducing shoulder-surfing by using gaze-based password entry. SOUPS 2007: 13-19
97Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDan Boneh, Brent Waters: Conjunctive, Subset, and Range Queries on Encrypted Data. TCC 2007: 535-554
96Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLFelipe Saint-Jean, Aaron Johnson, Dan Boneh, Joan Feigenbaum: Private web search. WPES 2007: 84-90
95Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLAndrew Bortz, Dan Boneh: Exposing private information by timing web applications. WWW 2007: 621-628
94Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDan Boneh, Ran Canetti, Shai Halevi, Jonathan Katz: Chosen-Ciphertext Security from Identity-Based Encryption. SIAM J. Comput. 36(5): 1301-1328 (2007)
2006
93Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDan Boneh, Brent Waters: A fully collusion resistant broadcast, trace, and revoke system. ACM Conference on Computer and Communications Security 2006: 211-220
92Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLLouis Kruger, Somesh Jha, Eu-Jin Goh, Dan Boneh: Secure function evaluation with ordered binary decision diagrams. ACM Conference on Computer and Communications Security 2006: 410-420
91Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDan Boneh, Xavier Boyen: On the Impossibility of Efficiently Combining Collision Resistant Hash Functions. CRYPTO 2006: 570-583
90Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDan Boneh, Xavier Boyen, Shai Halevi: Chosen Ciphertext Secure Public Key Threshold Encryption Without Random Oracles. CT-RSA 2006: 226-243
89Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDan Boneh, Amit Sahai, Brent Waters: Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys. EUROCRYPT 2006: 573-592
88Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLAdam Barth, Dan Boneh, Brent Waters: Privacy in Encrypted Content Distribution Using Private Broadcast Encryption. Financial Cryptography 2006: 52-64
87Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDan Boneh, Emily Shen, Brent Waters: Strongly Unforgeable Signatures Based on Computational Diffie-Hellman. Public Key Cryptography 2006: 229-240
86Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLCollin Jackson, Andrew Bortz, Dan Boneh, John C. Mitchell: Protecting browser state from web privacy attacks. WWW 2006: 737-744
85Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLCollin Jackson, Andrew Bortz, Dan Boneh, John C. Mitchell: Protecting browser state from web privacy attacks. WWW 2006: 737-744
2005
84Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDan Boneh, Craig Gentry, Brent Waters: Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys. CRYPTO 2005: 258-275
83Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDan Boneh, Jonathan Katz: Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity-Based Encryption. CT-RSA 2005: 87-103
82Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDan Boneh, Xavier Boyen, Eu-Jin Goh: Hierarchical Identity Based Encryption with Constant Size Ciphertext. EUROCRYPT 2005: 440-456
81Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDan Boneh, Eu-Jin Goh, Kobbi Nissim: Evaluating 2-DNF Formulas on Ciphertexts. TCC 2005: 325-341
80Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDan Boneh: BLS Short Digital Signatures. Encyclopedia of Cryptography and Security 2005
79Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDan Boneh: Blum-Blum-Shub Pseudorandom Bit Generator. Encyclopedia of Cryptography and Security 2005
78Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDan Boneh: Blum-Goldwasser Public Key Encryption System. Encyclopedia of Cryptography and Security 2005
77Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDan Boneh: Cramer-Shoup Public Key System. Encyclopedia of Cryptography and Security 2005
76Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDan Boneh: Digital Signature Standard. Encyclopedia of Cryptography and Security 2005
75Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDan Boneh: Elgamal Digital Signature Scheme. Encyclopedia of Cryptography and Security 2005
74Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDan Boneh: Rabin Digital Signature Scheme. Encyclopedia of Cryptography and Security 2005
73Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDan Boneh: Schnorr Digital Signature Scheme. Encyclopedia of Cryptography and Security 2005
72Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDan Boneh: Secure signatures from the "strong RSA" assumption. Encyclopedia of Cryptography and Security 2005
71Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDan Boneh: Strong RSA Assumption. Encyclopedia of Cryptography and Security 2005
70Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDavid Brumley, Dan Boneh: Remote timing attacks are practical. Computer Networks 48(5): 701-716 (2005)
69Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLNinghui Li, Wenliang Du, Dan Boneh: Oblivious signature-based envelope. Distributed Computing 17(4): 293-302 (2005)
2004
68Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDan Boneh, Hovav Shacham: Group signatures with verifier-local revocation. ACM Conference on Computer and Communications Security 2004: 168-177
67Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLHovav Shacham, Matthew Page, Ben Pfaff, Eu-Jin Goh, Nagendra Modadugu, Dan Boneh: On the effectiveness of address-space randomization. ACM Conference on Computer and Communications Security 2004: 298-307
66Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDan Boneh, Xavier Boyen, Hovav Shacham: Short Group Signatures. CRYPTO 2004: 41-55
65Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDan Boneh, Xavier Boyen: Secure Identity Based Encryption Without Random Oracles. CRYPTO 2004: 443-459
64Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDan Boneh, Xavier Boyen: Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles. EUROCRYPT 2004: 223-238
63Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDan Boneh, Giovanni Di Crescenzo, Rafail Ostrovsky, Giuseppe Persiano: Public Key Encryption with Keyword Search. EUROCRYPT 2004: 506-522
62Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDan Boneh, Xavier Boyen: Short Signatures Without Random Oracles. EUROCRYPT 2004: 56-73
61Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLHovav Shacham, Dan Boneh, Eric Rescorla: Client-side caching for TLS. ACM Trans. Inf. Syst. Secur. 7(4): 553-575 (2004)
60Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDan Boneh, Xuhua Ding, Gene Tsudik: Fine-grained control of security capabilities. ACM Trans. Internet Techn. 4(1): 60-82 (2004)
59Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDan Boneh, Joan Feigenbaum, Abraham Silberschatz, Rebecca N. Wright: PORTIA: Privacy, Obligations, and Rights in Technologies of Information Assessment. IEEE Data Eng. Bull. 27(1): 10-18 (2004)
58Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDan Boneh, Ben Lynn, Hovav Shacham: Short Signatures from the Weil Pairing. J. Cryptology 17(4): 297-319 (2004)
2003
57no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDan Boneh: Advances in Cryptology - CRYPTO 2003, 23rd Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 2003, Proceedings Springer 2003
56Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDan Boneh, Ilya Mironov, Victor Shoup: A Secure Signature Scheme from Bilinear Maps. CT-RSA 2003: 98-110
55Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDan Boneh, Craig Gentry, Ben Lynn, Hovav Shacham: Aggregate and Verifiably Encrypted Signatures from Bilinear Maps. EUROCRYPT 2003: 416-432
54no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLTal Garfinkel, Mendel Rosenblum, Dan Boneh: Flexible OS Support and Applications for Trusted Computing. HotOS 2003: 145-150
53Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLEu-Jin Goh, Dan Boneh, Benny Pinkas, Philippe Golle: The Design and Implementation of Protocol-Based Hidden Key Recovery. ISC 2003: 165-179
52Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLEu-Jin Goh, Hovav Shacham, Nagendra Modadugu, Dan Boneh: SiRiUS: Securing Remote Untrusted Storage. NDSS 2003
51Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLNinghui Li, Wenliang Du, Dan Boneh: Oblivious signature-based envelope. PODC 2003: 182-189
50Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLTal Garfinkel, Ben Pfaff, Jim Chow, Mendel Rosenblum, Dan Boneh: Terra: a virtual machine-based platform for trusted computing. SOSP 2003: 193-206
49Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDan Boneh, Matthew K. Franklin: Identity-Based Encryption from the Weil Pairing. SIAM J. Comput. 32(3): 586-615 (2003)
2002
48no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDan Boneh: Proceedings of the 11th USENIX Security Symposium, San Francisco, CA, USA, August 5-9, 2002 USENIX 2002
47Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDan Boneh, Philippe Golle: Almost entirely correct mixing with applications to voting. ACM Conference on Computer and Communications Security 2002: 68-77
46Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPhilippe Golle, Sheng Zhong, Dan Boneh, Markus Jakobsson, Ari Juels: Optimistic Mixing for Exit-Polls. ASIACRYPT 2002: 451-465
45Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMatthias Jacob, Dan Boneh, Edward W. Felten: Attacking an Obfuscated Cipher by Injecting Faults. Digital Rights Management Workshop 2002: 16-31
44Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLHovav Shacham, Dan Boneh: Fast-Track Session Establishment for TLS. NDSS 2002
43Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDan Boneh: Finding Smooth Integers in Short Intervals Using CRT Decoding. J. Comput. Syst. Sci. 64(4): 768-784 (2002)
2001
42Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDan Boneh, Shai Halevi, Nick Howgrave-Graham: The Modular Inversion Hidden Number Problem. ASIACRYPT 2001: 36-51
41Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDan Boneh, Ben Lynn, Hovav Shacham: Short Signatures from the Weil Pairing. ASIACRYPT 2001: 514-532
40Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDan Boneh, Igor Shparlinski: On the Unpredictability of Bits of the Elliptic Curve Diffie--Hellman Scheme. CRYPTO 2001: 201-212
39Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDan Boneh, Matthew K. Franklin: Identity-Based Encryption from the Weil Pairing. CRYPTO 2001: 213-229
38Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDan Boneh: Simplified OAEP for the RSA and Rabin Functions. CRYPTO 2001: 275-291
37Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLHovav Shacham, Dan Boneh: Improving SSL Handshake Performance via Batching. CT-RSA 2001: 28-43
36Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDan Boneh, Glenn Durfee, Matthew K. Franklin: Lower Bounds for Multicast Message Authentication. EUROCRYPT 2001: 437-452
35no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLEric B. Baum, Dan Boneh, Charles Garrett: Where Genetic Algorithms Excel. Evolutionary Computation 9(1): 93-124 (2001)
34Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDan Boneh, Matthew K. Franklin: Efficient generation of shared RSA keys. J. ACM 48(4): 702-722 (2001)
33Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDan Boneh, Richard A. DeMillo, Richard J. Lipton: On the Importance of Eliminating Errors in Cryptographic Computations. J. Cryptology 14(2): 101-119 (2001)
2000
32Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDan Boneh, Antoine Joux, Phong Q. Nguyen: Why Textbook ElGamal and RSA Encryption Are Insecure. ASIACRYPT 2000: 30-43
31Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDavid Lie, Chandramohan A. Thekkath, Mark Mitchell, Patrick Lincoln, Dan Boneh, John C. Mitchell, Mark Horowitz: Architectural Support for Copy and Tamper Resistant Software. ASPLOS 2000: 168-177
30Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDan Boneh, Moni Naor: Timed Commitments. CRYPTO 2000: 236-254
29Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDan Boneh, Nagendra Modadugu, Michael Kim: Generating RSA Keys on a Handheld Using an Untrusted Server. INDOCRYPT 2000: 271-282
28Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDan Boneh: Finding smooth integers in short intervals using CRT decoding. STOC 2000: 265-272
27no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDan Boneh, Glenn Durfee: Cryptanalysis of RSA with private key d less than N0.292. IEEE Transactions on Information Theory 46(4): 1339 (2000)
1999
26Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDan Boneh, Matthew K. Franklin: Anonymous Authentication with Subset Queries (extended abstract). ACM Conference on Computer and Communications Security 1999: 113-119
25Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDan Boneh, Glenn Durfee, Nick Howgrave-Graham: Factoring N = prq for Large r. CRYPTO 1999: 326-337
24Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDan Boneh, Matthew K. Franklin: An Efficient Public Key Traitor Tracing Scheme. CRYPTO 1999: 338-353
23Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDan Boneh, Glenn Durfee: Cryptanalysis of RSA with Private Key d Less than N0.292. EUROCRYPT 1999: 1-11
22Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLNeil Daswani, Dan Boneh: Experimenting with Electronic Commerce on the PalmPilot. Financial Cryptography 1999: 1-16
21Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMichael Malkin, Thomas D. Wu, Dan Boneh: Experimenting with Shared Generation of RSA Keys. NDSS 1999
20Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLEli Biham, Dan Boneh, Omer Reingold: Breaking Generalized Diffie-Hellmann Modulo a Composite is no Easier Than Factoring. Inf. Process. Lett. 70(2): 83-87 (1999)
1998
19Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDan Boneh, Jeremy Horwitz: Generating a Product of Three Primes with an Unknown Factorization. ANTS 1998: 237-251
18Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDan Boneh: The Decision Diffie-Hellman Problem. ANTS 1998: 48-63
17Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDan Boneh, Glenn Durfee, Yair Frankel: An Attack on RSA Given a Small Fraction of the Private Key Bits. ASIACRYPT 1998: 25-34
16Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDan Boneh, Ramarathnam Venkatesan: Breaking RSA May Not Be Equivalent to Factoring. EUROCRYPT 1998: 59-71
15no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDan Boneh, James Shaw: Collusion-Secure Fingerprinting for Digital Data. IEEE Transactions on Information Theory 44(5): 1897-1905 (1998)
1997
14no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLAviel D. Rubin, Dan Boneh, Kevin Fu: Revocation of Unread E-mail in an Untrusted Network. ACISP 1997: 62-75
13Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDan Boneh, Matthew K. Franklin: Efficient Generation of Shared RSA Keys (Extended Abstract). CRYPTO 1997: 425-439
12Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDan Boneh, Richard A. DeMillo, Richard J. Lipton: On the Importance of Checking Cryptographic Protocols for Faults (Extended Abstract). EUROCRYPT 1997: 37-51
11Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDan Boneh, Richard J. Lipton: Effect of Operators on Straight Line Complexity. ISTCS 1997: 1-5
10Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDan Boneh, Ramarathnam Venkatesan: Rounding in Lattices and its Cryptographic Applications. SODA 1997: 675-681
9Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLEli Biham, Dan Boneh, Omer Reingold: Generalized Diffie-Hellman Modulo a Composite is not Weaker than Factoring Electronic Colloquium on Computational Complexity (ECCC) 4(61): (1997)
1996
8Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDan Boneh, Ramarathnam Venkatesan: Hardness of Computing the Most Significant Bits of Secret Keys in Diffie-Hellman and Related Schemes. CRYPTO 1996: 129-142
7Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDan Boneh, Richard J. Lipton: Algorithms for Black-Box Fields and their Application to Cryptography (Extended Abstract). CRYPTO 1996: 283-297
6Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDan Boneh, Christopher Dunworth, Richard J. Lipton, Jiri Sgall: On the Computational Power of DNA. Discrete Applied Mathematics 71(1-3): 79-94 (1996)
1995
5Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLEric B. Baum, Dan Boneh, Charles Garrett: On Genetic Algorithms. COLT 1995: 230-239
4Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDan Boneh: Learning Using Group Representations (Extended Abstract). COLT 1995: 418-426
3Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDan Boneh, Richard J. Lipton: Quantum Cryptanalysis of Hidden Linear Functions (Extended Abstract). CRYPTO 1995: 424-437
2Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDan Boneh, James Shaw: Collusion-Secure Fingerprinting for Digital Data (Extended Abstract). CRYPTO 1995: 452-465
1993
1Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDan Boneh, Richard J. Lipton: Amplification of Weak Learning under the Uniform Distribution. COLT 1993: 347-351

Coauthor Index

1Shweta Agrawal [119]
2Daniel V. Bailey [107]
3Adam Barth [88] [106] [116]
4Eric B. Baum [5] [35]
5John Bethencourt [100]
6Eli Biham [9] [20]
7Johannes Blömer [103] [104] [115]
8Hristo Bojinov [120]
9Andrew Bortz [85] [86] [95] [106] [116]
10Xavier Boyen [62] [64] [65] [66] [82] [90] [91] [108]
11David Brumley [70]
12Elie Bursztein [120]
13Ran Canetti [94]
14Xiaoxin Chen [111]
15Jim Chow [50]
16Ronald Cramer [103] [104] [115]
17Giovanni Di Crescenzo [63]
18Neil Daswani [22]
19Richard A. DeMillo [12] [33]
20Xuhua Ding [60]
21Wenliang Du [51] [69]
22Christopher Dunworth [6]
23Glenn Durfee [17] [23] [25] [27] [36]
24Jeffrey S. Dwoskin [111]
25Joan Feigenbaum [59] [96]
26Edward W. Felten [45]
27Yair Frankel [17]
28Matthew K. Franklin [13] [24] [26] [34] [36] [39] [49]
29David Freeman [117]
30Kevin Fu [14]
31Tal Garfinkel [50] [54] [98] [111] [114]
32Charles Garrett [5] [35]
33Craig Gentry [55] [84] [101]
34Eu-Jin Goh [52] [53] [67] [81] [82] [92] [107]
35Philippe Golle [46] [47] [53]
36Shai Halevi [42] [90] [94] [110]
37Michael Hamburg [101] [110] [112] [118]
38Mark Horowitz [31]
39Jeremy Horwitz [19]
40Nick Howgrave-Graham [25] [42]
41Collin Jackson [85] [86] [106] [116]
42Matthias Jacob [45]
43Markus Jakobsson [46]
44Somesh Jha [92]
45Aaron Johnson [96]
46Antoine Joux [32]
47Ari Juels [46] [107]
48Jonathan Katz [83] [94] [117]
49Michael Kim [29]
50Louis Kruger [92]
51Manu Kumar [98]
52Eyal Kushilevitz [105]
53E. Christopher Lewis [111]
54Ninghui Li [51] [69]
55David Lie [31]
56Patrick Lincoln [31]
57Richard J. Lipton [1] [3] [6] [7] [11] [12] [33]
58Ben Lynn [41] [55] [58]
59Michael Malkin [21]
60Ueli M. Maurer [103] [104] [115]
61Ilya Mironov [56]
62John C. Mitchell [31] [85] [86]
63Mark Mitchell [31]
64Nagendra Modadugu [29] [52] [67]
65Moni Naor [30] [113]
66Phong Q. Nguyen [32]
67Kobbi Nissim [81]
68Rafail Ostrovsky [63] [105] [110]
69Matthew Page [67]
70Periklis A. Papakonstantinou [109]
71Giuseppe Persiano (Pino Persiano) [63]
72Ben Pfaff [50] [67]
73Benny Pinkas [53]
74Dan R. K. Ports [111]
75Charles Rackoff [109]
76Omer Reingold [9] [20]
77Eric Rescorla [61]
78Mendel Rosenblum [50] [54]
79Aviel D. Rubin [14]
80Amit Sahai [89]
81Felipe Saint-Jean [96]
82Jiri Sgall [6]
83Hovav Shacham [37] [41] [44] [52] [55] [58] [61] [66] [67] [68]
84Weidong Shao [106] [116]
85James Shaw [2] [15]
86Emily Shen [87]
87Victor Shoup [56]
88Igor Shparlinski [40]
89Abraham Silberschatz (Avi Silberschatz) [59]
90William E. Skeith III [105]
91Dug Song [114]
92Emily Stark [118]
93Pratap Subrahmanyam [111]
94Chandramohan A. Thekkath [31]
95Gene Tsudik [60]
96Yevgeniy Vahlis [109]
97Ramarathnam Venkatesan [8] [10] [16]
98Carl A. Waldspurger [111]
99Brent Waters (Brent R. Waters) [84] [87] [88] [89] [93] [97] [100] [109] [117]
100Terry Winograd [98]
101Rebecca N. Wright [59]
102Thomas D. Wu [21]
103Sheng Zhong [46]

Colors in the list of coauthors

Copyright © Sun Mar 14 22:39:24 2010 by Michael Ley (ley@uni-trier.de)