Dan Boneh

Results: 106



#Item
11

Preventing Pollution Attacks in Multi-Source Network Coding Dan Boneh† Stanford University, USA Shweta Agrawal∗

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2010-07-03 01:38:20
    12

    A Lattice-Based Universal Thresholdizer for Cryptographic Systems Dan Boneh∗ Rosario Gennaro† Steven Goldfeder‡

    Add to Reading List

    Source URL: eprint.iacr.org

    - Date: 2017-06-18 11:51:59
      13

      Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE, and Compact Garbled Circuits∗ Dan Boneh† Craig Gentry‡

      Add to Reading List

      Source URL: eprint.iacr.org

      - Date: 2014-05-20 14:24:26
        14

        Differing-Inputs Obfuscation and Applications Prabhanjan Ananth Dan Boneh Sanjam Garg

        Add to Reading List

        Source URL: eprint.iacr.org

        - Date: 2014-06-16 21:33:44
          15

          Attribute-Based Encryption for Arithmetic Circuits Dan Boneh∗ Valeria Nikolaenko† Gil Segev‡

          Add to Reading List

          Source URL: eprint.iacr.org

          - Date: 2013-10-21 19:18:05
            16

            Black Hat USABad Memories Elie Bursztein, Baptiste Gourdin, Gustav Rydstedt, Dan Boneh Stanford University Security Laboratory

            Add to Reading List

            Source URL: media.blackhat.com

            - Date: 2012-04-07 14:53:10
              17

              Function-Private Identity-Based Encryption: Hiding the Function in Functional Encryption Dan Boneh∗ Ananth Raghunathan†

              Add to Reading List

              Source URL: eprint.iacr.org

              - Date: 2014-09-15 06:13:04
                18

                SANE: A Protection Architecture for Enterprise Networks Martin Casado, Tal Garfinkel, Aditya Akella, Michael J. Freedman Dan Boneh, Nick McKeown, Scott Shenker {casado,talg,mfreed,dabo,nickm}@cs.stanford.edu

                Add to Reading List

                Source URL: yuba.stanford.edu

                - Date: 2006-05-12 04:08:41
                  19

                  Constraining Pseudorandom Functions Privately Dan Boneh Kevin Lewi David J. Wu

                  Add to Reading List

                  Source URL: eprint.iacr.org

                  - Date: 2015-12-03 19:08:14
                    20

                    Function-Private Subspace-Membership Encryption and Its Applications Dan Boneh∗ Ananth Raghunathan†

                    Add to Reading List

                    Source URL: eprint.iacr.org

                    - Date: 2014-07-29 01:54:29
                      UPDATE