DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» Dan Boneh
Dan Boneh
Research Notices
A Decade of Lattice Cryptography
The Best Nurturers in Computer Science Research
Algebraic Pseudorandom Functions with Improved Efficiency from the Augmented Cascade*
Dan Boneh Cryptography Professor, Professor of Electrical Engineering and Senior Fellow at the Freeman Spogli Institute for International Studies Computer Science
Remote Side-Channel Attacks on Anonymous Transactions
Generalized Hierarchical Identity-Based Signcryption
A Fully Homomorphic Encryption Scheme
Zero-Knowledge Proofs on Secret-Shared Data Via Fully Linear Pcps∗
Data Collection with Self-Enforcing Privacy
Elliptic Curve Cryptography: Invention and Impact: the Invasion of the Number Theorists
Batching Techniques for Accumulators with Applications to Iops and Stateless Blockchains
Lattice Basis Delegation in Fixed Dimension and Shorter-Ciphertext Hierarchical IBE
Hellinger Volume and Number-On-The-Forehead
Zether: Towards Privacy in a Smart Contract World
Crypto Concepts Symmetric Encryption, Public Key Encryption
A Brief History on Homomorphic Learning: a Privacy-Focused Approach to Machine Learning
Crypto Concepts Symmetric Encryption, Public Key Encryption, and TLS
Top View
Lecture Notes in Computer Science 5157 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan Van Leeuwen
Interactive Proofs of Proximity: Delegating Computation in Sublinear Time
A Note on Separating Classical and Quantum Random Oracles
Lecture Notes in Computer Science 1880 Edited by G
Yan Michalevsky
Efficient Lattice (H)IBE in the Standard Model
Benedikt Bünz –
Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE, and Compact Garbled Circuits∗
Black-Box Circular-Secure Encryption Beyond Affine Functions
7Th USENIX Security Symposium (Security '98) Jan. 26-29, 1998
Sponsored by IEEE Computer Society Technical Committee On
Contents U U U
Stanford Advanced Computer Security Program
Dan Boneh Stanford University
Novel Frameworks for Mining Heterogeneous and Dynamic
Techniques for Computing on Encrypted Data in a Practical System*
Twenty Years of Attacks on the RSA Cryptosystem 1 Introduction
Quantitative Verification of Neural Networks and Its Security Applications
Remote Side-Channel Attacks on Anonymous Transactions
Cryptanalysis of an Identity-Based Authenticated Key Exchange Protocol
David J. Wu Department of Computer Science Email:
[email protected]
University of Texas at Austin Website
Applications of Multilinear Forms to Cryptography
Rogaway's the Moral Character of Cryptographic Work
Papernot Cv.Pdf
Functional Encryption: Definitions and Challenges
Arxiv:1702.02970V1 [Cs.DS] 9 Feb 2017
Efficient Lattice (H)IBE in the Standard Model*
Center for Discrete Mathematics and Theoretical Computer Science (DIMACS)
A Survey of Leakage-Resilient Cryptography∗
SIGS & Cacm Research Highlights
Identity-Based Encryption from the Weil Pairing
Structure Vs Combinatorics in Computational Complexity∗
Random Variables Def: a Random Variable X Is a Function X:U⟶V
BIRS-CMO Calendar Poster 2018
Horizon: a Gas-Efficient, Trustless Bridge for Cross-Chain Transactions
Identity-Based Signatures
Twenty Years of Attacks on the RSA Cryptosystem Dan Boneh
Acm and Infosys Foundation Honor Pioneer in Cryptography
Public Key Encryption with Keyword Search (PEKS) Scheme
United States Court of Appeals for the Federal Circuit
Restriction Access
BUILDING a NEW ACADEMIC FIELD of Cryptocurrency and Blockchain Technology PROBLEMS