language:
Find link is a tool written by Edward Betts.searching for Dan Boneh 14 found (51 total)
alternate case: dan Boneh
Differential fault analysis
(401 words)
[view diff]
exact match in snippet
view article
find links to article
Fault Analysis: How to break completely unknown cryptosystems (1996) Dan Boneh and Richard A. DeMillo and Richard J. Lipton: On the Importance of CheckingSub-group hiding (57 words) [view diff] exact match in snippet view article find links to article
2-DNF homomorphic encryption scheme. Non-interactive zero-knowledge proof Dan Boneh, Eu-Jin Goh, Kobbi Nissim: Evaluating 2-DNF Formulas on Ciphertexts. TCCPairing (1,041 words) [view diff] exact match in snippet view article find links to article
its Applications, Volume 125, Number 3, 20 November 2002 , pp. 533–542. Dan Boneh, Matthew K. Franklin, Identity-Based Encryption from the Weil PairingLogjam (computer security) (1,296 words) [view diff] exact match in snippet view article
Perspective, "Attaching Cryptographic Key Exchange with Precomputation", by Dan Boneh, p. 105. "CVE-2015-4000". Common Vulnerabilities and Exposures List. TheArgon2 (1,491 words) [view diff] exact match in snippet view article find links to article
on Argon2i and Balloon Hashing (PDF) (Report). Henry; Corrigan-Gibbs; Dan Boneh; Stuart Schechter (2016-01-14). Balloon Hashing: Provably Space-Hard HashIdentity-based cryptography (828 words) [view diff] no match in snippet view article find links to article
pairings". SICS. Symposium on cryptography and information security. Dan, Boneh; Matt, Franklin (2001). "Identity-based encryption from the Weil pairing"Random oracle (1,775 words) [view diff] exact match in snippet view article find links to article
"Indifferentiability of 8-Round Feistel Networks". CRYPTO 2016. Springer. Dan Boneh, Özgür Dagdelen, Marc Fischlin, Anja Lehmann, Christian Schaffner, andSide-channel attack (3,387 words) [view diff] exact match in snippet view article find links to article
Key Recovery on the Cloud (PDF), retrieved 2018-01-07 David Brumley; Dan Boneh (2003). "Remote timing attacks are practical" (PDF). Kovacs, Eduard (2023-08-01)Falcon (signature scheme) (388 words) [view diff] exact match in snippet view article
Trapdoors for Hard Lattices and New Cryptographic Constructions. STOC. 5.^ Dan Boneh; Özgür Dagdelen; Marc Fischlin; Anja Lehmann; Christian Schaffner; MarkAmit Sahai (1,154 words) [view diff] exact match in snippet view article find links to article
CiteSeerX 10.1.1.21.6694. doi:10.1145/2160158.2160159. S2CID 220754739. Dan Boneh; Amit Sahai; Brent Waters (2011). "Functional Encryption: DefinitionsJonathan Katz (computer scientist) (905 words) [view diff] exact match in snippet view article
58 (2011) Chosen-Ciphertext Security from Identity-Based Encryption. Dan Boneh, Ran Canetti, Shai Halevi, and Jonathan Katz. SIAM J. Comput. 36(5):1301-1328Blind return oriented programming (1,123 words) [view diff] exact match in snippet view article find links to article
Hacking Blind, Andrea Bittau, Adam Belay, Ali Mashtizadeh, David Mazieres, Dan Boneh Return Oriented Programming, Hovav Shacham et al. http://www.scs.stanfordTraitor tracing (1,522 words) [view diff] exact match in snippet view article find links to article
Information in a Key" Archived 2016-10-12 at the Wayback Machine. p. 1. Dan Boneh; Mark Zhandry. "Multiparty Key Exchange, Efficient Traitor Tracing, andReturn-oriented programming (3,847 words) [view diff] exact match in snippet view article find links to article
Shacham, Matthew Page, Ben Pfaff, Eu-Jin Goh, Nagendra Modadugu, and Dan Boneh. On the effectiveness of address-space randomization. In Proceedings of