Boneh

Results: 146



#Item
11

Bulletproofs: Short Proofs for Confidential Transactions and More Benedikt B¨ unz∗1 , Jonathan Bootle†2 , Dan Boneh‡1 , Andrew Poelstra§3 , Pieter Wuille¶3 , and Greg Maxwellk 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2018-07-01 19:56:57
    12

    Preventing Pollution Attacks in Multi-Source Network Coding Dan Boneh† Stanford University, USA Shweta Agrawal∗

    Add to Reading List

    Source URL: theory.stanford.edu

    Language: English - Date: 2010-07-03 01:38:20
      13

      A Lattice-Based Universal Thresholdizer for Cryptographic Systems Dan Boneh∗ Rosario Gennaro† Steven Goldfeder‡

      Add to Reading List

      Source URL: eprint.iacr.org

      - Date: 2017-06-18 11:51:59
        14

        Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE, and Compact Garbled Circuits∗ Dan Boneh† Craig Gentry‡

        Add to Reading List

        Source URL: eprint.iacr.org

        - Date: 2014-05-20 14:24:26
          15

          Differing-Inputs Obfuscation and Applications Prabhanjan Ananth Dan Boneh Sanjam Garg

          Add to Reading List

          Source URL: eprint.iacr.org

          - Date: 2014-06-16 21:33:44
            16

            Attribute-Based Encryption for Arithmetic Circuits Dan Boneh∗ Valeria Nikolaenko† Gil Segev‡

            Add to Reading List

            Source URL: eprint.iacr.org

            - Date: 2013-10-21 19:18:05
              17

              Black Hat USABad Memories Elie Bursztein, Baptiste Gourdin, Gustav Rydstedt, Dan Boneh Stanford University Security Laboratory

              Add to Reading List

              Source URL: media.blackhat.com

              - Date: 2012-04-07 14:53:10
                18

                Function-Private Identity-Based Encryption: Hiding the Function in Functional Encryption Dan Boneh∗ Ananth Raghunathan†

                Add to Reading List

                Source URL: eprint.iacr.org

                - Date: 2014-09-15 06:13:04
                  19

                  SANE: A Protection Architecture for Enterprise Networks Martin Casado, Tal Garfinkel, Aditya Akella, Michael J. Freedman Dan Boneh, Nick McKeown, Scott Shenker {casado,talg,mfreed,dabo,nickm}@cs.stanford.edu

                  Add to Reading List

                  Source URL: yuba.stanford.edu

                  - Date: 2006-05-12 04:08:41
                    20

                    Constraining Pseudorandom Functions Privately Dan Boneh Kevin Lewi David J. Wu

                    Add to Reading List

                    Source URL: eprint.iacr.org

                    - Date: 2015-12-03 19:08:14
                      UPDATE