Dan Boneh - Publications

Affiliations: 
Electrical Engineering Stanford University, Palo Alto, CA 

24 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2018 Boneh D. Technical perspective: Attacking cryptographic key exchange with precomputation Communications of the Acm. 62: 105-105. DOI: 10.1145/3292033  0.443
2018 Rajan A, Qin L, Archer DW, Boneh D, Lepoint T, Varia M. Callisto: A Cryptographic Approach to Detecting Serial Perpetrators of Sexual Misconduct The Compass. 49. DOI: 10.1145/3209811.3212699  0.328
2017 Boneh D, Zhandry M. Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation Algorithmica. 79: 1233-1285. DOI: 10.1007/S00453-016-0242-8  0.566
2015 Ahn JH, Boneh D, Camenisch J, Hohenberger S, Shelat A, Waters B. Computing on Authenticated Data Journal of Cryptology. 28: 351-395. DOI: 10.1007/S00145-014-9182-0  0.308
2014 Bojinov H, Sanchez D, Reber P, Boneh D, Lincoln P. Neuroscience meets cryptography: Crypto primitives secure against rubber hose attacks Communications of the Acm. 57: 110-118. DOI: 10.1145/2594445  0.416
2014 Huang L, Adhikarla S, Boneh D, Jackson C. An Experimental Study of TLS Forward Secrecy Deployments Ieee Internet Computing. 18: 43-51. DOI: 10.1109/Mic.2014.86  0.537
2012 Boneh D, Sahai A, Waters B. Functional encryption: A new vision for public-key cryptography Communications of the Acm. 55: 56-64. DOI: 10.1145/2366316.2366333  0.474
2011 Boneh D, Rubin K, Silverberg A. Finding composite order ordinary elliptic curves using the Cocks-Pinch method Journal of Number Theory. 131: 832-841. DOI: 10.1016/J.Jnt.2010.05.001  0.327
2011 Boneh D, Boyen X. Efficient Selective Identity-Based Encryption Without Random Oracles Journal of Cryptology. 24: 659-693. DOI: 10.1007/S00145-010-9078-6  0.537
2010 Qiu D, Boneh D, Lo S, Enge P. Reliable location-based services from radio navigation systems. Sensors (Basel, Switzerland). 10: 11369-89. PMID 22163532 DOI: 10.3390/S101211369  0.37
2010 Bojinov H, Bursztein E, Boneh D. The emergence of cross channel scripting Communications of the Acm. 53: 105-113. DOI: 10.1145/1787234.1787257  0.409
2009 Jackson C, Barth A, Bortz A, Shao W, Boneh D. Protecting browsers from DNS rebinding attacks Acm Transactions On the Web. 3: 2. DOI: 10.1145/1462148.1462150  0.463
2008 Boneh D, Boyen X. Short Signatures Without Random Oracles and the SDH Assumption in Bilinear Groups Journal of Cryptology. 21: 149-177. DOI: 10.1007/S00145-007-9005-7  0.626
2006 Boneh D, Canetti R, Halevi S, Katz J. Chosen-Ciphertext Security from Identity-Based Encryption Siam Journal On Computing. 36: 1301-1328. DOI: 10.1137/S009753970544713X  0.659
2005 Brumley D, Boneh D. Remote timing attacks are practical Computer Networks. 48: 701-716. DOI: 10.1016/J.Comnet.2005.01.010  0.434
2005 Li N, Du W, Boneh D. Oblivious signature-based envelope Distributed Computing. 17: 293-302. DOI: 10.1007/S00446-004-0116-1  0.613
2004 Boneh D, Ding X, Tsudik G. Fine-grained control of security capabilities Acm Transactions On Internet Technology. 4: 60-82. DOI: 10.1145/967030.967033  0.457
2004 Shacham H, Boneh D, Rescorla E. Client-side caching for TLS Acm Transactions On Information and System Security. 7: 553-575. DOI: 10.1145/1042031.1042034  0.669
2004 Boneh D, Lynn B, Shacham H. Short Signatures from the Weil Pairing Journal of Cryptology. 17: 297-319. DOI: 10.1007/S00145-004-0314-9  0.389
2003 Boneh D, Franklin M. Identity-Based Encryption from the Weil Pairing Siam Journal On Computing. 32: 586-615. DOI: 10.1137/S0097539701398521  0.608
2001 Boneh D, Franklin M. Efficient generation of shared RSA keys Journal of the Acm. 48: 702-722. DOI: 10.1145/502090.502094  0.407
2001 Boneh D, Demillo RA, Lipton RJ. On the Importance of Eliminating Errors in Cryptographic Computations Journal of Cryptology. 14: 101-119. DOI: 10.1007/S001450010016  0.482
1999 Biham E, Boneh D, Reingold O. Breaking generalized Diffie-Hellman modulo a composite is no easier than factoring Information Processing Letters. 70: 83-87. DOI: 10.1016/S0020-0190(99)00047-2  0.423
1998 Boneh D, Shaw J. Collusion-secure fingerprinting for digital data Ieee Transactions On Information Theory. 44: 1897-1905. DOI: 10.1109/18.705568  0.384
Show low-probability matches.