Dan Boneh

Affiliations: 
Electrical Engineering Stanford University, Palo Alto, CA 
Google:
"Dan Boneh"
Bio:

https://www.proquest.com/openview/a51944c9f9836d655332a42b0e3f329e/1

Parents

Sign in to add mentor
Richard Lipton grad student 1996 Princeton (MathTree)
 (Studies in computational number theory with applications to cryptography)

Children

Sign in to add trainee
Glenn E. Durfee grad student 2002 Stanford
Philippe Golle grad student 2004 Stanford
Jeremy A. Horwitz grad student 2004 Stanford
Ilya Mironov grad student 2004 Stanford
Michael T. Malkin grad student 2006 Stanford
Hovav Shacham grad student 2006 Stanford
Eu-Jin Goh grad student 2007 Stanford
Ben Lynn grad student 2007 Stanford
Nagendra G. Modadugu grad student 2007 Stanford
Craig Gentry grad student 2009 Stanford
BETA: Related publications

Publications

You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect.

Boneh D. (2018) Technical perspective: Attacking cryptographic key exchange with precomputation Communications of the Acm. 62: 105-105
Rajan A, Qin L, Archer DW, et al. (2018) Callisto: A Cryptographic Approach to Detecting Serial Perpetrators of Sexual Misconduct The Compass. 49
Boneh D, Zhandry M. (2017) Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation Algorithmica. 79: 1233-1285
Ahn JH, Boneh D, Camenisch J, et al. (2015) Computing on Authenticated Data Journal of Cryptology. 28: 351-395
Bojinov H, Sanchez D, Reber P, et al. (2014) Neuroscience meets cryptography: Crypto primitives secure against rubber hose attacks Communications of the Acm. 57: 110-118
Huang L, Adhikarla S, Boneh D, et al. (2014) An Experimental Study of TLS Forward Secrecy Deployments Ieee Internet Computing. 18: 43-51
Boneh D, Sahai A, Waters B. (2012) Functional encryption: A new vision for public-key cryptography Communications of the Acm. 55: 56-64
Boneh D, Rubin K, Silverberg A. (2011) Finding composite order ordinary elliptic curves using the Cocks-Pinch method Journal of Number Theory. 131: 832-841
Boneh D, Boyen X. (2011) Efficient Selective Identity-Based Encryption Without Random Oracles Journal of Cryptology. 24: 659-693
Qiu D, Boneh D, Lo S, et al. (2010) Reliable location-based services from radio navigation systems. Sensors (Basel, Switzerland). 10: 11369-89
See more...