Boneh

Results: 146



#Item
61

2013 IEEE Symposium on Security and Privacy Privacy-Preserving Ridge Regression on Hundreds of Millions of Records Valeria Nikolaenko∗ , Udi Weinsberg† , Stratis Ioannidis† , Marc Joye† , Dan Boneh∗ , Nina Taf

Add to Reading List

Source URL: ieee-security.org

Language: English - Date: 2013-04-05 19:52:25
    62Symbol / RSA / Structure / Cryptography / Model theory / Advantage

    Conjunctive, Subset, and Range Queries on Encrypted Data Dan Boneh ∗ Brent Waters

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2007-03-21 13:19:19
    63Analytic number theory / Elliptic curve / Group theory / Mathematics / Hash function / Cryptographic hash function / Information retrieval / Artificial intelligence / Boneh/Franklin scheme / Cryptography / Search algorithms / Hashing

    Introduction Related Works Proposal Hashing Conclusion How to Hash into Elliptic Curves Thomas Icart

    Add to Reading List

    Source URL: www.iacr.org

    Language: English - Date: 2009-10-23 17:02:32
    64Cryptographic software / Boneh/Franklin scheme / Finite fields / Tor / Onion routing / XTR / Diffie–Hellman key exchange / Public-key cryptography / Pairing / Cryptography / Internet privacy / Cryptographic protocols

    Pairing-Based Onion Routing with Improved Forward Secrecy ANIKET KATE, GREG M. ZAVERUCHA, and IAN GOLDBERG University of Waterloo This article presents new protocols for onion routing anonymity networks. We define a pro

    Add to Reading List

    Source URL: www.cypherpunks.ca

    Language: English - Date: 2010-12-30 09:39:44
    65Mathematics / Elliptic curve cryptography / Elliptic curve / Boneh/Franklin scheme / ID-based encryption / Pairing / Homomorphic signatures for network coding / BLS / Cryptography / Abstract algebra / Algebra

    Verified Indifferentiable Hashing into Elliptic Curves Santiago Zanella B´eguelin1 Gilles Barthe2 , Benjamin Gr´egoire3 , Sylvain Heraud3 and Federico Olmedo2

    Add to Reading List

    Source URL: certicrypt.gforge.inria.fr

    Language: English - Date: 2013-06-17 13:32:36
    66ID-based cryptography / Cyberwarfare / Security / Key management / Boneh/Franklin scheme / Applied mathematics / Cryptography / ID-based encryption / Public-key cryptography

    Verifiable Security of Boneh-Franklin Identity-Based Encryption Federico Olmedo Gilles Barthe Santiago Zanella Béguelin IMDEA Software Institute, Madrid, Spain

    Add to Reading List

    Source URL: certicrypt.gforge.inria.fr

    Language: English - Date: 2013-06-17 13:32:36
    67Software architecture / World Wide Web / Model–view–controller / Web developer / Web application / Sandbox / Form / Ruby on Rails / Software / Computing / Web development

    Bridging the Security Gap with Decentralized Information Flow Control Adam Belay, Andrea Bittau, Dan Boneh, Pablo Buiras*, Daniel Giffin, Amit Levy, Ali Mashtizadeh, David Mazieres, John Mitchell, Alejandro Russo*, Amy S

    Add to Reading List

    Source URL: www.amitlevy.com

    Language: English - Date: 2012-11-15 17:46:54
    68Intel Core / Cryptography / Boneh/Franklin scheme / ID-based encryption

    Verifiable Security of Boneh-Franklin Identity-Based Encryption⋆ Gilles Barthe, Federico Olmedo, and Santiago Zanella B´eguelin {Gilles.Barthe,Federico.Olmedo,Santiago.Zanella}@imdea.org IMDEA Software Institute, Madr

    Add to Reading List

    Source URL: software.imdea.org

    Language: English - Date: 2013-03-13 12:33:24
    69Intel Core / Cryptography / Boneh/Franklin scheme / ID-based encryption

    Verifiable Security of Boneh-Franklin Identity-Based Encryption⋆ Gilles Barthe, Federico Olmedo, and Santiago Zanella B´eguelin {Gilles.Barthe,Federico.Olmedo,Santiago.Zanella}@imdea.org IMDEA Software Institute, Madr

    Add to Reading List

    Source URL: certicrypt.gforge.inria.fr

    Language: English - Date: 2013-06-17 13:32:36
    70Cryptography / ID-based encryption / Dan Boneh

    Overview of the results The Framework Work in progress Simple Functional Encryption Schemes for Inner Products

    Add to Reading List

    Source URL: www.iacr.org

    Language: English - Date: 2015-03-27 08:27:56
    UPDATE