Dan Boneh
Affiliations: | Electrical Engineering | Stanford University, Palo Alto, CA |
Google:
"Dan Boneh"Bio:
https://www.proquest.com/openview/a51944c9f9836d655332a42b0e3f329e/1
Parents
Sign in to add mentorRichard Lipton | grad student | 1996 | Princeton (MathTree) | |
(Studies in computational number theory with applications to cryptography) |
Children
Sign in to add traineeGlenn E. Durfee | grad student | 2002 | Stanford |
Philippe Golle | grad student | 2004 | Stanford |
Jeremy A. Horwitz | grad student | 2004 | Stanford |
Ilya Mironov | grad student | 2004 | Stanford |
Michael T. Malkin | grad student | 2006 | Stanford |
Hovav Shacham | grad student | 2006 | Stanford |
Eu-Jin Goh | grad student | 2007 | Stanford |
Ben Lynn | grad student | 2007 | Stanford |
Nagendra G. Modadugu | grad student | 2007 | Stanford |
Craig Gentry | grad student | 2009 | Stanford |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Boneh D. (2018) Technical perspective: Attacking cryptographic key exchange with precomputation Communications of the Acm. 62: 105-105 |
Rajan A, Qin L, Archer DW, et al. (2018) Callisto: A Cryptographic Approach to Detecting Serial Perpetrators of Sexual Misconduct The Compass. 49 |
Boneh D, Zhandry M. (2017) Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation Algorithmica. 79: 1233-1285 |
Ahn JH, Boneh D, Camenisch J, et al. (2015) Computing on Authenticated Data Journal of Cryptology. 28: 351-395 |
Bojinov H, Sanchez D, Reber P, et al. (2014) Neuroscience meets cryptography: Crypto primitives secure against rubber hose attacks Communications of the Acm. 57: 110-118 |
Huang L, Adhikarla S, Boneh D, et al. (2014) An Experimental Study of TLS Forward Secrecy Deployments Ieee Internet Computing. 18: 43-51 |
Boneh D, Sahai A, Waters B. (2012) Functional encryption: A new vision for public-key cryptography Communications of the Acm. 55: 56-64 |
Boneh D, Rubin K, Silverberg A. (2011) Finding composite order ordinary elliptic curves using the Cocks-Pinch method Journal of Number Theory. 131: 832-841 |
Boneh D, Boyen X. (2011) Efficient Selective Identity-Based Encryption Without Random Oracles Journal of Cryptology. 24: 659-693 |
Qiu D, Boneh D, Lo S, et al. (2010) Reliable location-based services from radio navigation systems. Sensors (Basel, Switzerland). 10: 11369-89 |