Find link

language:

jump to random article

Find link is a tool written by Edward Betts.

searching for Dan Boneh 14 found (51 total)

alternate case: dan Boneh

Differential fault analysis (401 words) [view diff] exact match in snippet view article find links to article

Fault Analysis: How to break completely unknown cryptosystems (1996) Dan Boneh and Richard A. DeMillo and Richard J. Lipton: On the Importance of Checking
Sub-group hiding (57 words) [view diff] exact match in snippet view article find links to article
2-DNF homomorphic encryption scheme. Non-interactive zero-knowledge proof Dan Boneh, Eu-Jin Goh, Kobbi Nissim: Evaluating 2-DNF Formulas on Ciphertexts. TCC
Pairing (1,041 words) [view diff] exact match in snippet view article find links to article
its Applications, Volume 125, Number 3, 20 November 2002 , pp. 533–542. Dan Boneh, Matthew K. Franklin, Identity-Based Encryption from the Weil Pairing
Logjam (computer security) (1,296 words) [view diff] exact match in snippet view article
Perspective, "Attaching Cryptographic Key Exchange with Precomputation", by Dan Boneh, p. 105. "CVE-2015-4000". Common Vulnerabilities and Exposures List. The
Argon2 (1,491 words) [view diff] exact match in snippet view article find links to article
on Argon2i and Balloon Hashing (PDF) (Report). Henry; Corrigan-Gibbs; Dan Boneh; Stuart Schechter (2016-01-14). Balloon Hashing: Provably Space-Hard Hash
Identity-based cryptography (828 words) [view diff] no match in snippet view article find links to article
pairings". SICS. Symposium on cryptography and information security. Dan, Boneh; Matt, Franklin (2001). "Identity-based encryption from the Weil pairing"
Random oracle (1,775 words) [view diff] exact match in snippet view article find links to article
"Indifferentiability of 8-Round Feistel Networks". CRYPTO 2016. Springer. Dan Boneh, Özgür Dagdelen, Marc Fischlin, Anja Lehmann, Christian Schaffner, and
Side-channel attack (3,387 words) [view diff] exact match in snippet view article find links to article
Key Recovery on the Cloud (PDF), retrieved 2018-01-07 David Brumley; Dan Boneh (2003). "Remote timing attacks are practical" (PDF). Kovacs, Eduard (2023-08-01)
Falcon (signature scheme) (388 words) [view diff] exact match in snippet view article
Trapdoors for Hard Lattices and New Cryptographic Constructions. STOC. 5.^ Dan Boneh; Özgür Dagdelen; Marc Fischlin; Anja Lehmann; Christian Schaffner; Mark
Amit Sahai (1,154 words) [view diff] exact match in snippet view article find links to article
CiteSeerX 10.1.1.21.6694. doi:10.1145/2160158.2160159. S2CID 220754739. Dan Boneh; Amit Sahai; Brent Waters (2011). "Functional Encryption: Definitions
Jonathan Katz (computer scientist) (905 words) [view diff] exact match in snippet view article
58 (2011) Chosen-Ciphertext Security from Identity-Based Encryption. Dan Boneh, Ran Canetti, Shai Halevi, and Jonathan Katz. SIAM J. Comput. 36(5):1301-1328
Blind return oriented programming (1,123 words) [view diff] exact match in snippet view article find links to article
Hacking Blind, Andrea Bittau, Adam Belay, Ali Mashtizadeh, David Mazieres, Dan Boneh Return Oriented Programming, Hovav Shacham et al. http://www.scs.stanford
Traitor tracing (1,522 words) [view diff] exact match in snippet view article find links to article
Information in a Key" Archived 2016-10-12 at the Wayback Machine. p. 1. Dan Boneh; Mark Zhandry. "Multiparty Key Exchange, Efficient Traitor Tracing, and
Return-oriented programming (3,847 words) [view diff] exact match in snippet view article find links to article
Shacham, Matthew Page, Ben Pfaff, Eu-Jin Goh, Nagendra Modadugu, and Dan Boneh. On the effectiveness of address-space randomization. In Proceedings of