• Thumbnail for Dan Boneh
    Dan Boneh (/boʊˈneɪ/; Hebrew: דן בונה) is an Israeli–American professor in applied cryptography and computer security at Stanford University. In 2016...
    14 KB (1,150 words) - 19:02, 6 February 2025
  • Boneh or Beneh may refer to: Dan Boneh (b. 1969), Israeli computer scientist Boneh–Franklin scheme, an identity-based encryption system Boneh-Lynn-Shacham...
    5 KB (952 words) - 10:00, 16 February 2025
  • The Boneh–Franklin scheme is an identity-based encryption system proposed by Dan Boneh and Matthew K. Franklin in 2001. This article refers to the protocol...
    6 KB (1,142 words) - 11:11, 13 February 2024
  • Thumbnail for Functional encryption
    was proposed by Amit Sahai and Brent Waters in 2005 and formalized by Dan Boneh, Amit Sahai and Brent Waters in 2010. Until recently, however, most instantiations...
    5 KB (534 words) - 15:12, 30 November 2024
  • Thumbnail for Gödel Prize
    (1–2): 166–196. CiteSeerX 10.1.1.21.1731. doi:10.1006/game.1999.0790. Boneh, Dan; Franklin, Matthew (2003). "Identity-based encryption from the Weil pairing"...
    31 KB (2,200 words) - 01:40, 9 June 2025
  • A BLS digital signature, also known as Boneh–Lynn–Shacham (BLS), is a cryptographic signature scheme which allows a user to verify that a signer is authentic...
    9 KB (974 words) - 16:44, 24 May 2025
  • proven memory-hard password-hashing and modern design. It was created by Dan Boneh, Henry Corrigan-Gibbs (both at Stanford University) and Stuart Schechter...
    3 KB (271 words) - 07:14, 28 May 2025
  • Thumbnail for Andrew Ng
    peer-grading system, John Mitchell (Courseware, a Learning Management System), Dan Boneh (using machine learning to sync videos, later teaching cryptography on...
    40 KB (3,740 words) - 20:12, 12 April 2025
  • certificateless cryptography. The steps involved are depicted in this diagram: Dan Boneh and Matthew K. Franklin defined a set of four algorithms that form a complete...
    16 KB (1,942 words) - 00:54, 12 April 2025
  • Shacham, Matthew Page, Ben Pfaff, Eu-Jin Goh, Nagendra Modadugu, and Dan Boneh. On the effectiveness of address-space randomization. In Proceedings of...
    31 KB (3,850 words) - 21:06, 16 June 2025
  • of differential cryptanalysis and Related-key attack. Matt Blaze, US. Dan Boneh, US, Stanford University. Niels Ferguson, Netherlands, co-inventor of...
    22 KB (2,482 words) - 17:36, 10 May 2025
  • on Argon2i and Balloon Hashing (PDF) (Report). Henry; Corrigan-Gibbs; Dan Boneh; Stuart Schechter (2016-01-14). Balloon Hashing: Provably Space-Hard Hash...
    14 KB (1,491 words) - 04:51, 31 March 2025
  • public-key encryption" (PDF). Handbook of Applied Cryptography. CRC Press. Dan Boneh (1998). "The Decision Diffie-Hellman problem". Algorithmic Number Theory...
    10 KB (1,473 words) - 11:12, 31 March 2025
  • networking experts: Andrea Bittau, Mike Hamburg, Mark Handley, David Mazières, Dan Boneh and Quinn Slack. Tcpcrypt has been published as an Internet Draft. Experimental...
    8 KB (772 words) - 21:08, 18 June 2025
  • Thumbnail for List of people by Erdős number
    Bochner Mary Ellen Bock Hans L. Bodlaender Anna Bogomolnaia Enrico Bombieri Dan Boneh Carl R. de Boor Richard Borcherds Christian Borgs Allan Borodin Karol...
    61 KB (5,914 words) - 23:31, 20 June 2025
  • Thumbnail for Arvind Narayanan
    post-doctoral researcher at Stanford University, working closely with Dan Boneh. Narayanan moved to Princeton University as an assistant professor in...
    10 KB (646 words) - 19:13, 31 March 2025
  • This approach was proposed in 2010 by Gustav Rydstedt, Elie Bursztein, Dan Boneh and Collin Jackson in a paper that highlighted the limitations of existing...
    5 KB (587 words) - 07:53, 13 November 2023
  • Trapdoors for Hard Lattices and New Cryptographic Constructions. STOC. Dan Boneh; Özgür Dagdelen; Marc Fischlin; Anja Lehmann; Christian Schaffner; Mark...
    4 KB (411 words) - 00:20, 3 April 2025
  • privacy. The 2018 Theory of Cryptography Test of Time Award (joint with Dan Boneh and Eu-Jin Goh). The 2019 Caspar Bowden Award for Outstanding Research...
    4 KB (221 words) - 12:06, 12 January 2025
  • its Applications, Volume 125, Number 3, 20 November 2002 , pp. 533–542. Dan Boneh, Matthew K. Franklin, Identity-Based Encryption from the Weil Pairing...
    6 KB (1,096 words) - 19:35, 13 March 2025
  • "Indifferentiability of 8-Round Feistel Networks". CRYPTO 2016. Springer. Dan Boneh, Özgür Dagdelen, Marc Fischlin, Anja Lehmann, Christian Schaffner, and...
    14 KB (1,785 words) - 16:58, 5 June 2025
  • Thumbnail for Timing attack
    constant-time cryptography". Retrieved 9 May 2021. David Brumley and Dan Boneh. Remote timing attacks are practical. USENIX Security Symposium, August...
    13 KB (1,616 words) - 12:26, 4 June 2025
  • Fault Analysis: How to break completely unknown cryptosystems (1996) Dan Boneh and Richard A. DeMillo and Richard J. Lipton: On the Importance of Checking...
    3 KB (401 words) - 03:26, 31 July 2024
  • doi:10.1007/3-540-68697-5_9. ISBN 978-3-540-68697-2. David Brumley; Dan Boneh (2003). "Remote timing attacks are practical" (PDF). Archived (PDF) from...
    31 KB (3,588 words) - 14:14, 13 June 2025
  • writer Tom Boellstorff, anthropologist Christopher Boffoli, photographer Dan Boneh, Israeli-born University professor Boogie, Serbian-born photographer Claria...
    113 KB (10,266 words) - 15:44, 21 June 2025
  • pairings". SICS. Symposium on cryptography and information security. Dan, Boneh; Matt, Franklin (2001). "Identity-based encryption from the Weil pairing"...
    7 KB (868 words) - 15:50, 7 December 2024
  • elements of an integrated technological, societal, and economic system. 2014 Dan Boneh For ground-breaking contributions to the development of pairing-based...
    4 KB (135 words) - 08:42, 20 June 2025
  • security. Shacham his PhD from Stanford University under the supervision of Dan Boneh, where he wrote his dissertation on "New Paradigms in Signature Schemes"...
    6 KB (582 words) - 03:58, 16 March 2025
  • Perspective, "Attaching Cryptographic Key Exchange with Precomputation", by Dan Boneh, p. 105. "CVE-2015-4000". Common Vulnerabilities and Exposures List. The...
    12 KB (1,297 words) - 06:30, 11 March 2025
  • Project) was a research program run by Hector Garcia-Molina, Terry Winograd, Dan Boneh, and Andreas Paepcke at Stanford University in the mid-1990s to 2004....
    3 KB (331 words) - 12:25, 20 May 2024