Year |
Citation |
Score |
2018 |
Boneh D. Technical perspective: Attacking cryptographic key exchange with precomputation Communications of the Acm. 62: 105-105. DOI: 10.1145/3292033 |
0.443 |
|
2018 |
Rajan A, Qin L, Archer DW, Boneh D, Lepoint T, Varia M. Callisto: A Cryptographic Approach to Detecting Serial Perpetrators of Sexual Misconduct The Compass. 49. DOI: 10.1145/3209811.3212699 |
0.328 |
|
2017 |
Boneh D, Zhandry M. Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation Algorithmica. 79: 1233-1285. DOI: 10.1007/S00453-016-0242-8 |
0.566 |
|
2015 |
Ahn JH, Boneh D, Camenisch J, Hohenberger S, Shelat A, Waters B. Computing on Authenticated Data Journal of Cryptology. 28: 351-395. DOI: 10.1007/S00145-014-9182-0 |
0.308 |
|
2014 |
Bojinov H, Sanchez D, Reber P, Boneh D, Lincoln P. Neuroscience meets cryptography: Crypto primitives secure against rubber hose attacks Communications of the Acm. 57: 110-118. DOI: 10.1145/2594445 |
0.416 |
|
2014 |
Huang L, Adhikarla S, Boneh D, Jackson C. An Experimental Study of TLS Forward Secrecy Deployments Ieee Internet Computing. 18: 43-51. DOI: 10.1109/Mic.2014.86 |
0.537 |
|
2012 |
Boneh D, Sahai A, Waters B. Functional encryption: A new vision for public-key cryptography Communications of the Acm. 55: 56-64. DOI: 10.1145/2366316.2366333 |
0.474 |
|
2011 |
Boneh D, Rubin K, Silverberg A. Finding composite order ordinary elliptic curves using the Cocks-Pinch method Journal of Number Theory. 131: 832-841. DOI: 10.1016/J.Jnt.2010.05.001 |
0.327 |
|
2011 |
Boneh D, Boyen X. Efficient Selective Identity-Based Encryption Without Random Oracles Journal of Cryptology. 24: 659-693. DOI: 10.1007/S00145-010-9078-6 |
0.537 |
|
2010 |
Qiu D, Boneh D, Lo S, Enge P. Reliable location-based services from radio navigation systems. Sensors (Basel, Switzerland). 10: 11369-89. PMID 22163532 DOI: 10.3390/S101211369 |
0.37 |
|
2010 |
Bojinov H, Bursztein E, Boneh D. The emergence of cross channel scripting Communications of the Acm. 53: 105-113. DOI: 10.1145/1787234.1787257 |
0.409 |
|
2009 |
Jackson C, Barth A, Bortz A, Shao W, Boneh D. Protecting browsers from DNS rebinding attacks Acm Transactions On the Web. 3: 2. DOI: 10.1145/1462148.1462150 |
0.463 |
|
2008 |
Boneh D, Boyen X. Short Signatures Without Random Oracles and the SDH Assumption in Bilinear Groups Journal of Cryptology. 21: 149-177. DOI: 10.1007/S00145-007-9005-7 |
0.626 |
|
2006 |
Boneh D, Canetti R, Halevi S, Katz J. Chosen-Ciphertext Security from Identity-Based Encryption Siam Journal On Computing. 36: 1301-1328. DOI: 10.1137/S009753970544713X |
0.659 |
|
2005 |
Brumley D, Boneh D. Remote timing attacks are practical Computer Networks. 48: 701-716. DOI: 10.1016/J.Comnet.2005.01.010 |
0.434 |
|
2005 |
Li N, Du W, Boneh D. Oblivious signature-based envelope Distributed Computing. 17: 293-302. DOI: 10.1007/S00446-004-0116-1 |
0.613 |
|
2004 |
Boneh D, Ding X, Tsudik G. Fine-grained control of security capabilities Acm Transactions On Internet Technology. 4: 60-82. DOI: 10.1145/967030.967033 |
0.457 |
|
2004 |
Shacham H, Boneh D, Rescorla E. Client-side caching for TLS Acm Transactions On Information and System Security. 7: 553-575. DOI: 10.1145/1042031.1042034 |
0.669 |
|
2004 |
Boneh D, Lynn B, Shacham H. Short Signatures from the Weil Pairing Journal of Cryptology. 17: 297-319. DOI: 10.1007/S00145-004-0314-9 |
0.389 |
|
2003 |
Boneh D, Franklin M. Identity-Based Encryption from the Weil Pairing Siam Journal On Computing. 32: 586-615. DOI: 10.1137/S0097539701398521 |
0.608 |
|
2001 |
Boneh D, Franklin M. Efficient generation of shared RSA keys Journal of the Acm. 48: 702-722. DOI: 10.1145/502090.502094 |
0.407 |
|
2001 |
Boneh D, Demillo RA, Lipton RJ. On the Importance of Eliminating Errors in Cryptographic Computations Journal of Cryptology. 14: 101-119. DOI: 10.1007/S001450010016 |
0.482 |
|
1999 |
Biham E, Boneh D, Reingold O. Breaking generalized Diffie-Hellman modulo a composite is no easier than factoring Information Processing Letters. 70: 83-87. DOI: 10.1016/S0020-0190(99)00047-2 |
0.423 |
|
1998 |
Boneh D, Shaw J. Collusion-secure fingerprinting for digital data Ieee Transactions On Information Theory. 44: 1897-1905. DOI: 10.1109/18.705568 |
0.384 |
|
Show low-probability matches. |