Boneh

Results: 146



#Item
111ID-based encryption / Semantic security / Chosen-plaintext attack / RSA / Advantage / Boneh/Franklin scheme / Chosen-ciphertext attack / Adaptive chosen-ciphertext attack / GMR / Cryptography / Public-key cryptography / Ciphertext indistinguishability

Formal Security Treatments for IBE-to-Signature Transformation: Relations among Security Notions∗ Yang Cui1 , Eiichiro Fujisaki2 , Goichiro Hanaoka1 , Hideki Imai1,3 and Rui Zhang1 1 National Institute of Advanced Ind

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-11-10 22:37:01
112Public-key cryptography / Computational hardness assumptions / BLS / Diffie–Hellman problem / Digital signature / XTR / Parity of a permutation / Diffie–Hellman key exchange / Structure / Cryptography / Finite fields / Cryptographic protocols

Boneh et al.’s k-Element Aggregate Extraction Assumption Is Equivalent to The Diffie-Hellman Assumption Jean-Sebastien Coron and David Naccache Gemplus Card International 34, rue Guynemer, Issy-les-Moulineaux, F-92447,

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:54
113Malware / Red pill and blue pill / VM / JavaScript / Honeypot / Client honeypot / System software / Software / Computing

Tick Tock: Building Browser Red Pills from Timing Side Channels Grant Ho, Dan Boneh Stanford and

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2014-11-11 15:48:32
114Programming language implementation / JavaScript / Red pill and blue pill / Honeypot / Hypervisor / VM / Google Chrome / Firefox / Operating system / Software / System software / Virtual machines

Tick Tock: Building Browser Red Pills from Timing Side Channels Grant Ho Stanford University Dan Boneh Stanford University

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2015-01-17 17:53:41
115Computer network security / Internet / Internet protocols / TCP/IP / Tcpcrypt / Internet standards / Transport Layer Security / Wireless security / IPsec / Cryptographic protocols / Computing / Data

Simple Opportunistic Encryption Andrea Bittau Michael Hamburg Mark Handley David Mazi`eres Dan Boneh

Add to Reading List

Source URL: www.w3.org

Language: English - Date: 2014-02-07 14:41:45
116Online chat

ESP Egocentric Social Platform T. J. Purtell, Ian Vo, Monica S. Lam With: Kanak Biscuitwala, Willem Bult, Dan Boneh, Ben Dodson, Steve Fan, and Frank Wang,

Add to Reading List

Source URL: forum.stanford.edu

Language: English - Date: 2012-04-06 12:29:35
    117Mathematics / Boneh/Franklin scheme / Pairing / XTR / Supersingular elliptic curve / Elliptic curve / ID-based encryption / RSA / Weil pairing / Abstract algebra / Cryptography / Algebra

    FAULT ATTACKS ON PAIRING-BASED PROTOCOLS REVISITED SANJIT CHATTERJEE, KORAY KARABINA, AND ALFRED MENEZES Abstract. Several papers have studied fault attacks on computing a pairing value e(P, Q), where P is a public point

    Add to Reading List

    Source URL: cacr.uwaterloo.ca

    Language: English - Date: 2014-06-20 19:35:34
    118Technology / Gyroscopes / Applied mathematics / Vibrating structure gyroscope / Speech recognition / Sampling rate / Mel-frequency cepstrum / Aliasing / Microphone / Signal processing / Digital signal processing / Electrical engineering

    Gyrophone: Recognizing Speech from Gyroscope Signals Yan Michalevsky and Dan Boneh, Stanford University; Gabi Nakibly, National Research & Simulation Center, Rafael Ltd. https://www.usenix.org/conference/usenixsecurity14

    Add to Reading List

    Source URL: www.usenix.org

    Language: English - Date: 2014-11-28 05:39:17
    119Cyberwarfare / Computer security / Security / RSA / Email encryption / Boneh/Franklin scheme / Cryptography / Public-key cryptography / ID-based encryption

    Identity Based Encryption Terence Spies VP Engineering [removed]

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2007-09-25 01:00:00
    120Applied mathematics / Gyroscopes / Electrical engineering / Vibrating structure gyroscope / Digital audio / Speech recognition / Mel-frequency cepstrum / Aliasing / Sampling / Signal processing / Digital signal processing / Automatic identification and data capture

    Gyrophone: Recognizing Speech From Gyroscope Signals Yan Michalevsky Dan Boneh Gabi Nakibly Computer Science Department

    Add to Reading List

    Source URL: crypto.stanford.edu

    Language: English - Date: 2014-08-18 00:36:27
    UPDATE