Dan Boneh

Results: 106



#Item
41Cryptography / Homeomorphisms / Homomorphic encryption / Public-key cryptography / Malleability / CramerShoup cryptosystem / Semantic security / RSA / Paillier cryptosystem / NaccacheStern cryptosystem

Targeted Malleability: Homomorphic Encryption for Restricted Computations Dan Boneh∗ Gil Segev†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-01-02 12:48:47
42

Quantum-Secure Message Authentication Codes Dan Boneh Mark Zhandry Stanford University

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-09-11 11:51:07
    43

    Bivariate Polynomials Modulo Composites and Their Applications Dan Boneh and Henry Corrigan-Gibbs Stanford University ASIACRYPT — 8 December 2014

    Add to Reading List

    Source URL: www.henrycg.com

    Language: English
      44

      An Experimental Study of TLS Forward Secrecy Deployments Lin-Shung Huang∗ , Shrikant Adhikarla† , Dan Boneh‡ , Collin Jackson∗ Mellon University, {linshung.huang, collin.jackson}@sv.cmu.edu † Microsoft, shrikan

      Add to Reading List

      Source URL: www.w2spconf.com

      Language: English - Date: 2014-05-19 03:40:02
        45

        Riposte: An Anonymous Messaging System Handling Millions of Users Henry Corrigan-Gibbs,
 Dan Boneh, and David Mazières Stanford University 


        Add to Reading List

        Source URL: www.henrycg.com

        Language: English
          46

          Privacy Preserving Ridge Regression on Hundreds of Millions of Records Valeria Nikolaenko, Dan Boneh Stanford Udi Weinsberg, Stratis Ioannidis

          Add to Reading List

          Source URL: sisl.caltech.edu

          Language: English - Date: 2013-05-14 19:32:46
            47

            Programming Assignment 2 Winter 2015 CS 255: Intro to Cryptography Prof. Dan Boneh

            Add to Reading List

            Source URL: crypto.stanford.edu

            Language: English - Date: 2015-02-26 12:31:17
              48

              Chosen-Ciphertext Security from Identity-Based Encryption∗ Dan Boneh† Ran Canetti‡

              Add to Reading List

              Source URL: www.cs.tau.ac.il

              - Date: 2009-04-27 14:49:47
                49

                Hacking Blind Andrea Bittau, Adam Belay, Ali Mashtizadeh, David Mazi`eres, Dan Boneh Stanford University Abstract—We show that it is possible to write remote stack buffer overflow exploits without possessing a copy of

                Add to Reading List

                Source URL: www.scs.stanford.edu

                - Date: 2014-05-19 16:48:47
                  50

                  2013 IEEE Symposium on Security and Privacy Privacy-Preserving Ridge Regression on Hundreds of Millions of Records Valeria Nikolaenko∗ , Udi Weinsberg† , Stratis Ioannidis† , Marc Joye† , Dan Boneh∗ , Nina Taf

                  Add to Reading List

                  Source URL: www.ieee-security.org

                  Language: English - Date: 2013-04-05 19:52:25
                    UPDATE