Dan Boneh
Dan Boneh
Professor of Computer Science, Stanford University
Verified email at cs.stanford.edu - Homepage
TitleCited byYear
Identity-based encryption from the Weil pairing
D Boneh, M Franklin
Annual international cryptology conference, 213-229, 2001
85592001
Short signatures from the Weil pairing
D Boneh, B Lynn, H Shacham
International Conference on the Theory and Application of Cryptology and …, 2001
30412001
Public key encryption with keyword search
D Boneh, G Di Crescenzo, R Ostrovsky, G Persiano
International conference on the theory and applications of cryptographic …, 2004
26542004
Identity-based encryption from the Weil pairing
D Boneh, M Franklin
SIAM journal on computing 32 (3), 586-615, 2003
25812003
A fully homomorphic encryption scheme
C Gentry, D Boneh
Stanford University 20 (09), 2009
20792009
Short group signatures
D Boneh, X Boyen, H Shacham
Annual International Cryptology Conference, 41-55, 2004
20282004
On the importance of checking cryptographic protocols for faults
D Boneh, RA DeMillo, RJ Lipton
International conference on the theory and applications of cryptographic …, 1997
18801997
Efficient selective-ID secure identity-based encryption without random oracles
D Boneh, X Boyen
International conference on the theory and applications of cryptographic …, 2004
17992004
Aggregate and verifiably encrypted signatures from bilinear maps
D Boneh, C Gentry, B Lynn, H Shacham
International Conference on the Theory and Applications of Cryptographic …, 2003
17892003
Evaluating 2-DNF formulas on ciphertexts
D Boneh, EJ Goh, K Nissim
Theory of Cryptography Conference, 325-341, 2005
15172005
Terra: A virtual machine-based platform for trusted computing
T Garfinkel, B Pfaff, J Chow, M Rosenblum, D Boneh
ACM SIGOPS Operating Systems Review 37 (5), 193-206, 2003
14962003
Short signatures without random oracles
D Boneh, X Boyen
International conference on the theory and applications of cryptographic …, 2004
13802004
Hierarchical identity based encryption with constant size ciphertext
D Boneh, X Boyen, EJ Goh
Annual International Conference on the Theory and Applications of …, 2005
13412005
Conjunctive, subset, and range queries on encrypted data
D Boneh, B Waters
Theory of Cryptography Conference, 535-554, 2007
13282007
Short signatures from the Weil pairing
D Boneh, B Lynn, H Shacham
Journal of cryptology 17 (4), 297-319, 2004
12102004
Collusion-secure fingerprinting for digital data
D Boneh, J Shaw
IEEE Transactions on Information Theory 44 (5), 1897-1905, 1998
11041998
Collusion resistant broadcast encryption with short ciphertexts and private keys
D Boneh, C Gentry, B Waters
Annual International Cryptology Conference, 258-275, 2005
10642005
The decision diffie-hellman problem
D Boneh
International Algorithmic Number Theory Symposium, 48-63, 1998
10461998
On the effectiveness of address-space randomization
H Shacham, M Page, B Pfaff, EJ Goh, N Modadugu, D Boneh
Proceedings of the 11th ACM conference on Computer and communications …, 2004
10042004
Remote timing attacks are practical
D Brumley, D Boneh
Computer Networks 48 (5), 701-716, 2005
9602005
The system can't perform the operation now. Try again later.
Articles 1–20