Dan Boneh

Results: 106



#Item
71Online advertising / Behavioral targeting / Advertising network / NebuAd / Click fraud / Internet privacy / DoubleClick / HTTP cookie / AdSense / Internet / Advertising / Internet marketing

Adnostic: Privacy Preserving Targeted Advertising∗ Vincent Toubiana Arvind Narayanan Dan Boneh

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2010-02-28 02:06:52
72Internet marketing / Online advertising / Advertising network / Behavioral targeting / Advertising / DoubleClick / NebuAd / Click fraud / HTTP cookie / Internet / Computing / Internet privacy

Adnostic: Privacy Preserving Targeted Advertising∗ Vincent Toubiana Arvind Narayanan Dan Boneh

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2009-12-20 15:46:46
73RSA / Finite fields / Timing attack / Montgomery reduction / David Brumley / Cipher / Dan Boneh / OpenSSL / XTR / Cryptography / Public-key cryptography / Electronic commerce

Computer Networks[removed]–716 www.elsevier.com/locate/comnet Remote timing attacks are practical David Brumley a

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
74Dan Boneh / Signature / Cryptography / Homomorphic encryption / Digital signature

Homomorphic Signatures for Polynomial Functions Dan Boneh and David Mandell Freeman Stanford University, USA Eurocrypt 2011

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2011-06-17 14:17:33
75Data / Computer network security / TCP/IP / Tcpcrypt / Internet protocols / Tunneling protocols / Transmission Control Protocol / Opportunistic encryption / IPsec / Cryptographic protocols / Computing / Network architecture

tcpcrypt: the case for transport-level encryption Andrea Bittau, Dan Boneh, Mike Hamburg, Mark Handley, David Mazières, Quinn Slack Stanford, UCL

Add to Reading List

Source URL: tools.ietf.org

Language: English - Date: 2014-03-03 03:26:31
76Abstract algebra / Vectors / Cryptography / Information theory / Network coding / Linear combination / Linear span / Vector space / Digital signature / Algebra / Mathematics / Linear algebra

Linearly Homomorphic Signatures over Binary Fields and New Tools for Lattice-Based Signatures Dan Boneh and David Mandell Freeman Stanford University, USA

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2011-04-01 18:52:46
77Elliptic curve cryptography / Algorithmic Number Theory Symposium / Dan Boneh / International Association for Cryptologic Research / Pairing / Lecture Notes in Computer Science / International Cryptology Conference / Elliptic curve / PKC / Cryptography / Abstract algebra / Finite fields

David Mandell Freeman (+[removed]Curriculum Vitae [removed]

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2012-06-11 19:59:59
78Dan Boneh / RSA / Digital signature / Cryptography / Public-key cryptography / Homomorphic encryption

Homomorphic Signatures for Polynomial Functions Dan Boneh and David Mandell Freeman Stanford University, USA Séminaire de Crypto de l’ENS

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2011-04-01 19:30:54
79Ciphertext / Chosen-ciphertext attack / Ø / PKCS1 / PKCS / Malleability / Rabin cryptosystem / Cryptography / Public-key cryptography / RSA

The RSA Cryptosystem Dan Boneh Stanford University The RSA cryptosystem

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2003-02-27 15:18:26
80Ciphertext / Cramer–Shoup cryptosystem / Chosen-plaintext attack / Semantic security / Cipher / Chosen-ciphertext attack / RSA / ElGamal encryption / Email encryption / Cryptography / Public-key cryptography / Ciphertext indistinguishability

Privacy in Encrypted Content Distribution Using Private Broadcast Encryption Adam Barth1 , Dan Boneh?1 , and Brent Waters2 1 2

Add to Reading List

Source URL: www.adambarth.com

Language: English - Date: 2007-04-29 16:34:52
UPDATE