Dan Boneh
Orcid: 0000-0003-0820-0421Affiliations:
- Stanford University, USA
According to our database1,
Dan Boneh
authored at least 317 papers
between 1993 and 2024.
Collaborative distances:
Collaborative distances:
Awards
ACM Fellow
ACM Fellow 2016, "For contributions to cryptography and computer security".
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on linkedin.com
-
on viaf.org
-
on orcid.org
-
on id.loc.gov
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
Proc. Priv. Enhancing Technol., 2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
LatticeFold: A Lattice-based Folding Scheme and its Applications to Succinct Proof Systems.
IACR Cryptol. ePrint Arch., 2024
Cybench: A Framework for Evaluating Cybersecurity Capabilities and Risk of Language Models.
CoRR, 2024
IACR Commun. Cryptol., 2024
Proceedings of the Forty-first International Conference on Machine Learning, 2024
Accountability for Misbehavior in Threshold Decryption via Threshold Traitor Tracing.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
Post-Quantum Single Secret Leader Election (SSLE) From Publicly Re-randomizable Commitments.
IACR Cryptol. ePrint Arch., 2023
A Lower Bound on the Length of Signatures Based on Group Actions and Generic Isogenies.
IACR Cryptol. ePrint Arch., 2023
Proceedings of the Financial Cryptography and Data Security, 2023
Proceedings of the 2023 Workshop on Decentralized Finance and Security, 2023
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
Experimenting with Collaborative zk-SNARKs: Zero-Knowledge Proofs for Distributed Secrets.
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
Attacks on Onion Discovery and Remedies via Self-Authenticating Traditional Addresses.
Proceedings of the WPES '21: Proceedings of the 20th Workshop on Workshop on Privacy in the Electronic Society, 2021
Express: Lowering the Cost of Metadata-hiding Communication with Cryptographic Privacy.
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021
Proceedings of the 9th International Conference on Learning Representations, 2021
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
2020
J. Math. Cryptol., 2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
Proceedings of the 29th USENIX Security Symposium, 2020
2019
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019
IACR Cryptol. ePrint Arch., 2019
How to Prove a Secret: Zero-Knowledge Proofs on Distributed Data via Fully Linear PCPs.
IACR Cryptol. ePrint Arch., 2019
Commun. ACM, 2019
Proceedings of the 28th USENIX Security Symposium, 2019
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019
Proceedings of the Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems 2019, 2019
Proceedings of the 16th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2019
Slalom: Fast, Verifiable and Private Execution of Neural Networks in Trusted Hardware.
Proceedings of the 7th International Conference on Learning Representations, 2019
Proceedings of the Topics in Cryptology - CT-RSA 2019, 2019
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
Batching Techniques for Accumulators with Applications to IOPs and Stateless Blockchains.
IACR Cryptol. ePrint Arch., 2018
Proceedings of the 6th International Conference on Learning Representations, 2018
Callisto: A Cryptographic Approach to Detecting Serial Perpetrators of Sexual Misconduct.
Proceedings of the 1st ACM SIGCAS Conference on Computing and Sustainable Societies, 2018
2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation.
Algorithmica, 2017
Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation, 2017
Proceedings of the 15th Annual International Conference on Mobile Systems, 2017
Using Level-1 Homomorphic Encryption to Improve Threshold DSA Signatures for Bitcoin Wallet Security.
Proceedings of the Progress in Cryptology - LATINCRYPT 2017, 2017
Proceedings of the 16th Workshop on Hot Topics in Operating Systems, 2017
Proceedings of the Topics in Cryptology - CT-RSA 2017, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
Proceedings of the Applied Cryptography and Network Security, 2017
2016
Stickler: Defending against Malicious Content Distribution Networks in an Unmodified Browser.
IEEE Secur. Priv., 2016
5Gen: A Framework for Prototyping Applications Using Multilinear Maps and Matrix Branching Programs.
IACR Cryptol. ePrint Arch., 2016
Balloon Hashing: Provably Space-Hard Hash Functions with Data-Independent Access Patterns.
IACR Cryptol. ePrint Arch., 2016
Proceedings of the Financial Cryptography and Data Security, 2016
Proceedings of the International Conference on Embedded Wireless Systems and Networks, 2016
Proceedings of the Computer Security - ESORICS 2016, 2016
Balloon Hashing: A Memory-Hard Function Providing Provable Protection Against Sequential Attacks.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016
2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Proceedings of the 24th USENIX Security Symposium, 2015
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015
Proceedings of the Advances in Cryptology - EUROCRYPT 2015, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
IEEE Internet Comput., 2014
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
Semantically Secure Order-Revealing Encryption: Multi-Input Functional Encryption Without Obfuscation.
IACR Cryptol. ePrint Arch., 2014
Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE, and Compact Garbled Circuits.
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
Neuroscience meets cryptography: crypto primitives secure against rubber hose attacks.
Commun. ACM, 2014
Proceedings of the 8th USENIX Workshop on Offensive Technologies, 2014
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014
2013
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
Function-Private Identity-Based Encryption: Hiding the Function in Functional Encryption.
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013
Proceedings of the Privacy Enhancing Technologies - 13th International Symposium, 2013
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
2012
Electron. Colloquium Comput. Complex., 2012
Proceedings of the 21st World Wide Web Conference 2012, 2012
Proceedings of the 21st World Wide Web Conference 2012, 2012
Proceedings of the 2nd USENIX Workshop on Free and Open Communications on the Internet, 2012
Neuroscience Meets Cryptography: Designing Crypto Primitives Secure Against Rubber Hose Attacks.
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012
Proceedings of the Privacy Enhancing Technologies - 12th International Symposium, 2012
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
The most dangerous code in the world: validating SSL certificates in non-browser software.
Proceedings of the ACM Conference on Computer and Communications Security, 2012
Proceedings of the Advances in Cryptology - ASIACRYPT 2012, 2012
2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
J. Cryptol., 2011
IACR Cryptol. ePrint Arch., 2011
Proceedings of the 12th Workshop on Mobile Computing Systems and Applications, 2011
Proceedings of the Fourth ACM Conference on Wireless Network Security, 2011
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011
Proceedings of the Network and Distributed System Security Symposium, 2011
2010
Algebraic Pseudorandom Functions with Improved Efficiency from the Augmented Cascade.
IACR Cryptol. ePrint Arch., 2010
Linearly Homomorphic Signatures over Binary Fields and New Tools for Lattice-Based Signatures.
IACR Cryptol. ePrint Arch., 2010
IACR Cryptol. ePrint Arch., 2010
Proceedings of the 3rd Workshop on Cyber Security Experimentation and Test, 2010
Proceedings of the 19th USENIX Security Symposium, 2010
Proceedings of the 19th USENIX Security Symposium, 2010
Proceedings of the Network and Distributed System Security Symposium, 2010
Proceedings of the Mobile Computing, Applications, and Services, 2010
Proceedings of the Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30, 2010
Proceedings of the Computer Security, 2010
Proceedings of the 10th ACM Workshop on Digital Rights Management, 2010
Proceedings of the Advances in Cryptology, 2010
2009
IACR Cryptol. ePrint Arch., 2009
Proceedings of the Web Application Security, 29.03. - 03.04.2009, 2009
Proceedings of the Web Application Security, 29.03. - 03.04.2009, 2009
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009
Proceedings of the Applied Cryptography and Network Security, 7th International Conference, 2009
2008
J. Cryptol., 2008
IACR Cryptol. ePrint Arch., 2008
Proceedings of the 49th Annual IEEE Symposium on Foundations of Computer Science, 2008
Proceedings of the Advances in Cryptology, 2008
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008
Overshadow: a virtualization-based approach to retrofitting protection in commodity operating systems.
Proceedings of the 13th International Conference on Architectural Support for Programming Languages and Operating Systems, 2008
Proceedings of the Advances in Cryptology, 2008
2007
IACR Cryptol. ePrint Arch., 2007
Proceedings of the 16th International Conference on World Wide Web, 2007
Proceedings of the 2007 ACM Workshop on Privacy in the Electronic Society, 2007
Proceedings of the 2nd USENIX Workshop on Hot Topics in Security, 2007
Proceedings of the 3rd Symposium on Usable Privacy and Security, 2007
Proceedings of the Pairing-Based Cryptography, 2007
Proceedings of the Network and Distributed System Security Symposium, 2007
Proceedings of the 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS 2007), 2007
Proceedings of the Cryptography, 16.09. - 21.09.2007, 2007
Proceedings of the Cryptography, 16.09. - 21.09.2007, 2007
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007
2006
IACR Cryptol. ePrint Arch., 2006
IACR Cryptol. ePrint Arch., 2006
Proceedings of the 15th international conference on World Wide Web, 2006
Proceedings of the 15th USENIX Security Symposium, Vancouver, BC, Canada, July 31, 2006
Proceedings of the Public Key Cryptography, 2006
Proceedings of the Financial Cryptography and Data Security, 2006
Proceedings of the Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28, 2006
Proceedings of the Topics in Cryptology, 2006
Proceedings of the Advances in Cryptology, 2006
Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006
2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
IACR Cryptol. ePrint Arch., 2005
IACR Cryptol. ePrint Arch., 2005
Proceedings of the 14th USENIX Security Symposium, Baltimore, MD, USA, July 31, 2005
Proceedings of the Theory of Cryptography, Second Theory of Cryptography Conference, 2005
2004
Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity-Based Encryption.
IACR Cryptol. ePrint Arch., 2004
IACR Cryptol. ePrint Arch., 2004
IACR Cryptol. ePrint Arch., 2004
IEEE Data Eng. Bull., 2004
Proceedings of the 11th ACM Conference on Computer and Communications Security, 2004
Proceedings of the 11th ACM Conference on Computer and Communications Security, 2004
2003
Proceedings of the 19th ACM Symposium on Operating Systems Principles 2003, 2003
Proceedings of the Network and Distributed System Security Symposium, 2003
Proceedings of the Information Security, 6th International Conference, 2003
Proceedings of HotOS'03: 9th Workshop on Hot Topics in Operating Systems, 2003
Proceedings of the Topics in Cryptology, 2003
2002
J. Comput. Syst. Sci., 2002
IACR Cryptol. ePrint Arch., 2002
Proceedings of the Network and Distributed System Security Symposium, 2002
Proceedings of the Security and Privacy in Digital Rights Management, 2002
Proceedings of the 9th ACM Conference on Computer and Communications Security, 2002
2001
J. Cryptol., 2001
Proceedings of the 10th USENIX Security Symposium, 2001
Proceedings of the Advances in Cryptology, 2001
Proceedings of the Topics in Cryptology, 2001
Proceedings of the Advances in Cryptology, 2001
Proceedings of the Advances in Cryptology, 2001
Proceedings of the Advances in Cryptology, 2001
2000
IEEE Trans. Inf. Theory, 2000
Proceedings of the Progress in Cryptology, 2000
Proceedings of the ASPLOS-IX Proceedings of the 9th International Conference on Architectural Support for Programming Languages and Operating Systems, 2000
Proceedings of the Advances in Cryptology, 2000
1999
Inf. Process. Lett., 1999
Proceedings of the 8th USENIX Security Symposium, Washington, DC, USA, August 23-26, 1999, 1999
Proceedings of the Network and Distributed System Security Symposium, 1999
Proceedings of the Financial Cryptography, 1999
Proceedings of the Advances in Cryptology, 1999
Proceedings of the Advances in Cryptology, 1999
Proceedings of the Advances in Cryptology, 1999
Proceedings of the CCS '99, 1999
1998
SWAPEROO: A Simple Wallet Architecture for Payments, Exchanges, Refunds, and Other Operations.
Proceedings of the 3rd USENIX Workshop on Electronic Commerce, Boston, Massachusetts, USA, August 31, 1998
Proceedings of the Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31, 1998
Proceedings of the Advances in Cryptology, 1998
Proceedings of the Algorithmic Number Theory, Third International Symposium, 1998
Proceedings of the Algorithmic Number Theory, Third International Symposium, 1998
1997
Electron. Colloquium Comput. Complex., 1997
Proceedings of the Eighth Annual ACM-SIAM Symposium on Discrete Algorithms, 1997
Proceedings of the Fifth Israel Symposium on Theory of Computing and Systems, 1997
On the Importance of Checking Cryptographic Protocols for Faults (Extended Abstract).
Proceedings of the Advances in Cryptology, 1997
Proceedings of the Advances in Cryptology, 1997
Proceedings of the Information Security and Privacy, Second Australasian Conference, 1997
1996
Proceedings of the 6th USENIX Security Symposium, San Jose, CA, USA, July 22-25, 1996, 1996
Proceedings of the DNA Based Computers, 1996
Hardness of Computing the Most Significant Bits of Secret Keys in Diffie-Hellman and Related Schemes.
Proceedings of the Advances in Cryptology, 1996
Algorithms for Black-Box Fields and their Application to Cryptography (Extended Abstract).
Proceedings of the Advances in Cryptology, 1996
1995
Proceedings of the DNA Based Computers, 1995
Proceedings of the Advances in Cryptology, 1995
Proceedings of the Advances in Cryptology, 1995
Proceedings of the Eigth Annual Conference on Computational Learning Theory, 1995
Proceedings of the Eigth Annual Conference on Computational Learning Theory, 1995
1993
Proceedings of the Sixth Annual ACM Conference on Computational Learning Theory, 1993