Boneh

Results: 146



#Item
81Public-key cryptography / Cocks IBE scheme / Ciphertext indistinguishability / XTR / Diffie–Hellman key exchange / Random oracle / Cipher / Boneh/Franklin scheme / Feistel cipher / Cryptography / ID-based encryption / Advantage

On the Relations Between Non-Interactive Key Distribution, Identity-Based Encryption and Trapdoor Discrete Log Groups Kenneth G. Paterson and Sriramkrishnan Srinivasan Information Security Group, Royal Holloway, Universi

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-10-12 12:17:42
82Software quality / Stack buffer overflow / Address space layout randomization / Buffer overflow protection / Return-to-libc attack / Buffer overflow / Stack / Shellcode / FALSE / Computing / Software bugs / Software engineering

Hacking Blind Andrea Bittau, Adam Belay, Ali Mashtizadeh, David Mazi`eres, Dan Boneh Stanford University Abstract—We show that it is possible to write remote stack buffer overflow exploits without possessing a copy of

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2014-08-24 01:28:14
83Computational hardness assumptions / Diffie–Hellman key exchange / Diffie–Hellman problem / Weil pairing / ID-based encryption / Password authentication protocol / Public-key cryptography / Boneh/Franklin scheme / Cryptography / Cryptographic protocols / Finite fields

Improvement of Ma ni ke ta l .

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-12-09 05:56:33
84Mathematics / Multilinear algebra / Cryptography / Finite fields / Decision Linear assumption / Boneh/Franklin scheme / Group theory / Bilinear map / Decisional Diffie–Hellman assumption / Algebra / Computational hardness assumptions / Abstract algebra

The k-BDH Assumption Family: Bilinear Map Cryptography from Progressively Weaker Assumptions Brent Waters† University of Texas at Austin

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-06 19:27:51
85Semantic security / Cipher / RSA / Adaptive chosen-ciphertext attack / Boneh/Franklin scheme / Chosen-ciphertext attack / Key / Advantage / Cryptography / ID-based encryption / Public-key cryptography

Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application Yumiko Hanaoka∗, Goichiro Hanaoka†, Junji Shikata‡and Hideki Imai§ December 12, 2005 Abstract

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-12-12 03:12:37
86Finite fields / Computability theory / Alan Turing / Turing reduction / Reduction / Diffie–Hellman problem / Theoretical computer science / Applied mathematics / Computational complexity theory

AN OBSERVATION ABOUT VARIATIONS OF THE DIFFIE-HELLMAN ASSUMPTION R. BHASKAR, K. CHANDRASEKARAN, S. LOKAM, P.L. MONTGOMERY, R. VENKATESAN, AND Y. YACOBI Abstract. We generalize the Strong Boneh-Boyen (SBB) signature sche

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-12-16 15:26:16
87Internet marketing / Online advertising / Behavioral targeting / Advertising network / NebuAd / DoubleClick / Click fraud / Internet privacy / HTTP cookie / Internet / Computing / Advertising

Adnostic: Privacy Preserving Targeted Advertising∗ Vincent Toubiana Arvind Narayanan Dan Boneh

Add to Reading List

Source URL: www.nyu.edu

Language: English - Date: 2005-10-16 18:59:48
88Mathematical notation / Computational complexity theory / Asymptotic analysis / Combinatorics / Big O notation / Heap / Factorial / Randomized algorithm / Summation / Mathematics / Theoretical computer science / Analysis of algorithms

CS161 Design and Analysis of Algorithms Dan Boneh 1

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2001-04-08 18:20:48
89ID-based encryption / Cyberwarfare / Semantic security / Applied mathematics / Security / Cryptography / Public-key cryptography / Ciphertext indistinguishability

Bilinear Pairings in Cryptography: Identity Based Encryption Dan Boneh Stanford University

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2014-05-27 15:07:17
90Online advertising / Behavioral targeting / Advertising network / NebuAd / Click fraud / Internet privacy / DoubleClick / HTTP cookie / AdSense / Internet / Advertising / Internet marketing

Adnostic: Privacy Preserving Targeted Advertising∗ Vincent Toubiana Arvind Narayanan Dan Boneh

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2010-02-28 02:06:52
UPDATE