Boneh

Results: 146



#Item
41

IoT: Security and Privacy Dan Boneh Stanford University Private discovery via secret handshakes attributes X

Add to Reading List

Source URL: iot.stanford.edu

Language: English - Date: 2015-06-17 22:28:30
    42

    A Fully Collusion Resistant Broadcast, Trace, and Revoke System∗ Dan Boneh† Stanford University Brent Waters‡ SRI International

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2006-08-30 21:26:58
      43

      ATTACKING BONEH ET AL. (WORK IN PROGRESS) Peter Nordholt Claudio Orlandi Aarhus University, Denmark

      Add to Reading List

      Source URL: cis.sjtu.edu.cn

      Language: English - Date: 2012-12-10 09:59:39
        44Computer arithmetic / Modular arithmetic / Finite fields / Multiplication / E-commerce / RSA / Exponentiation by squaring / Montgomery modular multiplication / Modular exponentiation / Timing attack / Multiplication algorithm / XTR

        Improving Brumley and Boneh Timing Attack on Unprotected SSL Implementations Onur Acıic¸mez Werner Schindler

        Add to Reading List

        Source URL: tls.mbed.org

        Language: English - Date: 2016-01-19 07:39:30
        45Cryptography / Homeomorphisms / Homomorphic encryption / Public-key cryptography / Malleability / CramerShoup cryptosystem / Semantic security / RSA / Paillier cryptosystem / NaccacheStern cryptosystem

        Targeted Malleability: Homomorphic Encryption for Restricted Computations Dan Boneh∗ Gil Segev†

        Add to Reading List

        Source URL: eprint.iacr.org

        Language: English - Date: 2012-01-02 12:48:47
        46Cryptography / Identity-based cryptography / Public-key cryptography / Elliptic curve cryptography / Pairing-based cryptography / Ciphertext indistinguishability / Chosen-ciphertext attack / ID-based encryption / Advantage / Encryption / BonehFranklin scheme / Ciphertext

        Boneh-Franklin Identity Based Encryption Revisited David Galindo Institute for Computing and Information Sciences Radboud University Nijmegen P.O.BoxGL, Nijmegen, The Netherlands.

        Add to Reading List

        Source URL: www.dgalindo.es

        Language: English - Date: 2007-11-26 10:35:37
        47

        Quantum-Secure Message Authentication Codes Dan Boneh Mark Zhandry Stanford University

        Add to Reading List

        Source URL: eprint.iacr.org

        Language: English - Date: 2013-09-11 11:51:07
          48

          Bivariate Polynomials Modulo Composites and Their Applications Dan Boneh and Henry Corrigan-Gibbs Stanford University ASIACRYPT — 8 December 2014

          Add to Reading List

          Source URL: www.henrycg.com

          Language: English
            49

            An Experimental Study of TLS Forward Secrecy Deployments Lin-Shung Huang∗ , Shrikant Adhikarla† , Dan Boneh‡ , Collin Jackson∗ Mellon University, {linshung.huang, collin.jackson}@sv.cmu.edu † Microsoft, shrikan

            Add to Reading List

            Source URL: www.w2spconf.com

            Language: English - Date: 2014-05-19 03:40:02
              50

              Riposte: An Anonymous Messaging System Handling Millions of Users Henry Corrigan-Gibbs,
 Dan Boneh, and David Mazières Stanford University 


              Add to Reading List

              Source URL: www.henrycg.com

              Language: English
                UPDATE