Fact-checked by Grok 2 weeks ago
References
-
[1]
Dan Boneh - Stanford ProfilesProfessor Boneh's research focuses on applications of cryptography to computer security. His work includes cryptosystems with novel properties, web security.
-
[2]
Dan Boneh - ACM AwardsMore generally, Boneh has made significant contributions to a broad range of applications in cryptography and computer security, including: anti-phishing tools, ...
-
[3]
Dan Boneh - Simons FoundationDan Boneh is an expert in cryptography and computer security. One of his main achievements is the development of pairing-based cryptography.
-
[4]
Dan Boneh - Google ScholarIdentity-based encryption from the Weil pairing. D Boneh, M Franklin. Annual international cryptology conference, 213-229, 2001. 14475, 2001 ; Short signatures ...
-
[5]
Dan Boneh elected to National Academy of SciencesMay 5, 2023 · Dan Boneh elected to National Academy of Sciences ... In recognition of his distinguished and continuing achievements in original research.
-
[6]
Dan Boneh - DoradolistBorn in Israel in 1969, Dan Boneh obtained his Ph.D. in Computer Science from Princeton University in 1996 under the supervision of Richard J. Lipton.<|control11|><|separator|>
-
[7]
[PDF] 2023 G-49 SUMMIT - WebflowAug 14, 2023 · Dan Boneh is an Israeli-American professor in applied cryptography and computer security at. Stanford University. In 2016, Boneh was elected.
-
[8]
Q&A: A Passion For Pairings - Communications of the ACMSep 1, 2015 · Dan Boneh, recipient of this year's ACM-Infosys Foundation Award, discovered his passion for computers early; by the time he got to Princeton ...Missing: life | Show results with:life
-
[9]
Dan Boneh honored for innovations that have simplified cryptographyMar 30, 2015 · Stanford computer scientist and electrical engineer Dan Boneh has been selected to receive the 2014 ACM-Infosys Foundation Award in the Computing Sciences.
-
[10]
A Revocable Backup System - USENIXA Revocable Backup System. Authors: Dan Boneh and Richard J. Lipton, Princeton University ... year = {1996}, address = {San Jose, CA}, url = {https://www ...
-
[11]
On The Computational Power of DNA - cs.PrincetonThis technical report will be published as: On The Computational Power of DNA. Dan Boneh, Christopher Dunworth, Richard J. Lipton and Jiri Sgall, DAM 1996.
-
[12]
On the computational power of DNA - ScienceDirect.com5 December 1996, Pages 79-94. Discrete Applied Mathematics. On the computational power of DNA. Author links open overlay panelDan Boneh , Christopher ...
-
[13]
Hardness of Computing the Most Significant Bits of Secret Keys in ...Jul 13, 2001 · PhD thesis, Univ. of Tokyo, 1988. Google Scholar. C, Schnorr. A ... CS Department, Princeton University, Princeton, NJ, 08544. Dan Boneh.
-
[14]
Dan Boneh | Stanford University School of EngineeringProfessor Boneh's research focuses on applications of cryptography to computer security. His work includes cryptosystems with novel properties, web security.Missing: biography | Show results with:biography
-
[15]
Dan Boneh - Applied Cryptography Group - Stanford UniversityProfessor of Computer Science and Electrical Engineering, Stanford University. Co-director of the Stanford Computer Security Lab ...Publications · CS255 Introduction to... · CS 355 · Freshmen SeminarMissing: bachelor's | Show results with:bachelor's
-
[16]
Stanford computer scientists launch the Center for Blockchain ...Jun 20, 2018 · Stanford computer scientists have founded the Center for Blockchain Research, an initiative dedicated to researching and understanding a ...
-
[17]
HP Ups Security Ante With Big Data Encryption Company AcquisitionFeb 9, 2015 · HP said the Voltage Security transaction is expected to close sometime before its second fiscal quarter ended April 30. Joseph F. Kovar ...Missing: source | Show results with:source
-
[18]
Dan Boneh - a16z cryptoDan Boneh leads the applied cryptography group at Stanford University and co-directs the computer security lab. Dan's research focuses on applications of ...Missing: biography | Show results with:biography
-
[19]
Board of Advisors - Data TheoremDan Boneh. Professor of Computer Science. Dr. Boneh is a Professor of Computer Science at Stanford University where he heads the applied cryptography group.
-
[20]
Chainlink Brings Co-Creator of Diem, Stanford Cryptographer as ...Professor Boneh was a founder of Voltage Security, a cryptography startup acquired by Hewlett Packard in 2015. “For a cryptographic system to secure ...
-
[21]
RFC 8547: TCP-ENO: Encryption Negotiation OptionContributors Dan Boneh was a coauthor of the draft that became this document. Bittau, et al. Experimental [Page 30]. RFC 8547 TCP Encryption Negotiation ...
-
[22]
RFC 8548 - Cryptographic Protection of TCP Streams (tcpcrypt)Contributors Dan Boneh and Michael Hamburg were coauthors of the draft that became this document. Authors' Addresses Andrea Bittau Google 345 Spear Street ...
-
[23]
NIST Special Publication 800-63B[BALLOON] Boneh, Dan, Corrigan-Gibbs, Henry, and Stuart Schechter. “Balloon Hashing: A Memory-Hard Function Providing Provable Protection Against Sequential ...
-
[24]
Dan Boneh - Explore Courses - Stanford UniversityCS 355: Advanced Topics in Cryptography (Spring) ; CS 251: Cryptocurrencies and blockchain technologies (Autumn) ; CS 255: Introduction to Cryptography (Winter).
-
[25]
Cryptography I - CourseraIn this course you will learn the inner workings of cryptographic systems and how to correctly use them in real-world applications.Cryptography · Dan Boneh · An Introduction to Cryptography
-
[26]
Dan Boneh, Instructor - CourseraProfessor Dan Boneh heads the applied cryptography group at the Computer Science department at Stanford University.Missing: bachelor's | Show results with:bachelor's
-
[27]
Free Course: Cryptography II from Stanford University | Class CentralRating 4.0 (4) Explore cryptographic primitives and protocols, gaining practical knowledge for real-world application. Free textbook available online.
-
[28]
Online Cryptography Course by Dan BonehThis page contains all the lectures in the free cryptography course. To officially take the course, including homeworks, projects, and final exam, please visit ...Missing: enrollment impact
-
[29]
Craig Gentry wins dissertation award - Stanford EngineeringAug 1, 2010 · Gentry's graduate advisor Dan Boneh, a professor of computer science and electrical engineering, said the work is groundbreaking. "Craigs ...
-
[30]
[PDF] A FULLY HOMOMORPHIC ENCRYPTION SCHEME A ...This thesis would have been impossible without the support and mentoring of my advisor,. Dan Boneh. Even after several years of working with him, I am ...
-
[31]
Hovav Shacham - Jacobs School of EngineeringShacham received his Ph.D. in computer science in 2005 from Stanford University, where he had also earned, in 2000, an A.B. in English. His Ph.D. advisor ...
-
[32]
CS55N Class PageTen Ideas in Computer Security and Cryptography (one idea per week) Freshmen seminar. Fall 2005. Administrative Course Staff and office hoursMissing: 55N | Show results with:55N
-
[33]
[PDF] Identity-Based Encryption from the Weil PairingIdentity-Based Encryption from the Weil Pairing. Dan Boneh∗. Matthew Franklin† dabo@cs.stanford.edu franklin@cs.ucdavis.edu. Appears in SIAM J. of Computing ...
-
[34]
[PDF] Improved Weil and Tate pairings for elliptic and hyperelliptic curvesThe Weil and Tate pairings have been proposed for use in cryptography, includ- ing one-round 3-way key establishment, identity-based encryption, and short.
-
[35]
[PDF] Short Signatures Without Random Oracles and the SDH Assumption ...Towards this goal, Boneh, Lynn, and Shacham (BLS) [11] proposed a short digital signature scheme where signatures are about half the size of DSA signatures with ...Missing: BBS | Show results with:BBS
-
[36]
[PDF] Functional Encryption: A New Vision for Public Key CryptographyAttribute-based encryption. Another encryption concept called. Attribute-based encryption or ABE for short, lets the encryptor specify more abstractly who ...
-
[37]
ACM and Infosys Foundation Honor Pioneer in CryptographyMar 31, 2015 · Boneh pioneered the use of new computational problems based on pairings to solve a broad range of problems in cryptography. This approach, ...
-
[38]
[PDF] Identity-Based Encryption from the Weil Pairing - IACRDan Boneh*. Matthew FranklinQ dabo@cs.stanford.edu franklin@cs.ucdavis.edu. Abstract. We propose a fully functional identity-based encryption scheme (IBE). The ...
-
[39]
[PDF] Hierarchical Identity Based Encryption with Constant Size CiphertextMay 20, 2005 · Abstract. We present a Hierarchical Identity Based Encryption (HIBE) system where the ciphertext consists of just three group elements and ...
-
[40]
[PDF] Efficient Lattice (H)IBE in the Standard Model[1] Shweta Agrawal, Dan Boneh, and Xavier Boyen. Efficient lattice (H)IBE in the standard model. In Proc. of Eurocrypt'10, 2010. [2] Shweta Agrawal ...
-
[41]
[PDF] Evaluating 2-DNF Formulas on CiphertextsApr 2, 2006 · Boneh and M. Franklin. Identity based encryption from the Weil pairing. SIAM Journal of Computing, 32(3):586–615, 2003. Extended abstract in ...Missing: url | Show results with:url
-
[42]
Evaluating 2-DNF Formulas on Ciphertexts - SpringerLinkComputational Number Theory · Cryptology · DNA computing and cryptography ... Dan Boneh & Eu-Jin Goh. Department of Computer Science, Ben-Gurion University ...Missing: title | Show results with:title
-
[43]
[PDF] Chosen Ciphertext Secure Public Key Threshold Encryption Without ...Our construction uses the recent iden- tity based encryption system of Boneh and Boyen and the chosen cipher- text secure construction of Canetti, Halevi ...
-
[44]
Threshold Cryptosystems From Threshold Fully Homomorphic ...We develop a general approach to adding a threshold functionality to a large class of (non-threshold) cryptographic schemes.
-
[45]
Privacy-preserving proofs of solvency for Bitcoin exchangesOct 19, 2015 · We introduce Provisions, a privacy-preserving proof of solvency whereby an exchange does not have to disclose its Bitcoin addresses; total holdings or ...
-
[46]
Homomorphic Encryption for Large Integers from Nested Residue ...Feb 25, 2025 · In this paper we construct a new FHE system that is specifically designed for this purpose. Our system composes three layers of residue systems to enable much ...Missing: contributions | Show results with:contributions
-
[47]
[PDF] Remote Timing Attacks are Practical - Applied Cryptography GroupTiming attacks are usually used to attack weak comput- ing devices such as smartcards. We show that timing attacks apply to general software systems.
-
[48]
Cache Based Remote Timing Attack on the AES - SpringerLinkCache Based Remote Timing Attack on the AES. Conference paper. pp 271–286; Cite this conference paper. Download book PDF · Topics in Cryptology – CT-RSA 2007 ( ...
-
[49]
USENIX Test of Time AwardsRemote Timing Attacks Are Practical. David Brumley and Dan Boneh. Published in the Proceedings of the 12th USENIX Security Symposium, August 2003. 2022. FAST ...
-
[50]
Stanford Center for Blockchain Research- **Dan Boneh Co-Director Confirmation**: Yes, Dan Boneh co-directs the Stanford Center for Blockchain Research.
-
[51]
Boneh Publications: Verifiable Delay FunctionsAbstract: We study the problem of building a verifiable delay function (VDF). A VDF requires a specified number of sequential steps to evaluate, yet produces a ...
-
[52]
Mangrove: A Scalable Framework for Folding-based SNARKsMar 9, 2024 · We present a framework for building efficient folding-based SNARKs. First we develop a new "uniformizing" compiler for NP statements that converts any poly- ...
-
[53]
LatticeFold: A Lattice-based Folding Scheme and its Applications to ...Feb 16, 2024 · In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem.
-
[54]
Short Group Signatures - Cryptology ePrint ArchivePaper 2004/174. Short Group Signatures. Dan Boneh, Xavier Boyen, and Hovav Shacham. Abstract. We construct a short group signature scheme.Missing: BBS | Show results with:BBS
-
[55]
Short Group Signatures | SpringerLinkAbstract. We construct a short group signature scheme. Signatures in our scheme are approximately the size of a standard RSA signature with the same security.
-
[56]
[PDF] Privacy, Discovery, and Authentication for the Internet of ThingsThis paper presents private mutual authentication and service discovery proto- cols for IoT and mobile settings. Given the network connectivity constraints im-.
-
[57]
[PDF] PowerSpy: Location Tracking using Mobile Device Power AnalysisAug 12, 2015 · PowerSpy: Location Tracking using Mobile Device Power Analysis. Yan Michalevsky, Aaron Schulman,. Gunaa Arumugam Veerapandian and Dan Boneh.
-
[58]
[1408.1416] Mobile Device Identification via Sensor FingerprintingAug 6, 2014 · Authors:Hristo Bojinov, Yan Michalevsky, Gabi Nakibly, Dan Boneh. View a PDF of the paper titled Mobile Device Identification via Sensor ...
-
[59]
Dan Boneh - The David and Lucile Packard FoundationAwards and Achievements · ACM Infosys Award ( 2014) · ACM Godel prize ( 2013) · Ishii Award -- dean's award for Industry Education Innovation ( 2011) ...
-
[60]
Gödel Prize - 2013May 29, 2013 · The papers' authors are Antoine Joux, and the team of Dan Boneh and Matthew K. Franklin. They will receive the 2013 Gödel Prize for outstanding ...
-
[61]
The second half of ANTS 2020 | ellipticnews - WordPress.comJul 6, 2020 · ... Selfridge Prize for the best submitted paper as judged by the program committee was awarded to Jonathan Love and Dan Boneh for their paper ...
-
[62]
National Academy of Engineering Elects New Members - CCC BlogFeb 8, 2016 · The National Academy of Engineering (NAE) has elected 80 new members and 22 foreign members ... Dan Boneh, professor of computer science and ...
-
[63]
Dan Boneh, 2013 IACR FellowDan Boneh, 2013 IACR fellow for opening up new areas in cryptography and computer security, for innovative educational initiatives in cryptography.
-
[64]
[PDF] 1999 ANNUAL REPORT - Sloan FoundationComputer Science: Dan Boneh. Economics: Charles I. Jones. Neuroscience: Jennifer L. Raymond. Physics: Martin Greven. Kathryn Ann Moler. Eva Silverstein.
-
[65]
Simons Investigators - Simons FoundationDan Boneh, Ph.D. Stanford University. Theoretical Computer Science | 2015. Dan Boneh is an expert in cryptography and computer security. One of his main ...
-
[66]
2021 Class of - American Mathematical SocietyApr 1, 2021 · The Fellows of the American Mathematical Society program recognizes members who have made outstanding con- ... Dan Boneh, Stanford University.
-
[67]
Okta Ventures Unveils "The Identity 25" to Honor Pioneers Shaping ...Mar 25, 2025 · ... The Identity 25" aims to recognize and elevate emerging leaders ... Dan Boneh, Professor of Computer Science and Electrical Engineering ...