• Thumbnail for Dan Boneh
    Dan Boneh (/boʊˈneɪ/; Hebrew: דן בונה) is an Israeli–American professor in applied cryptography and computer security at Stanford University. In 2016...
    14 KB (1,150 words) - 19:02, 6 February 2025
  • Boneh or Beneh may refer to: Dan Boneh (b. 1969), Israeli computer scientist Boneh–Franklin scheme, an identity-based encryption system Boneh-Lynn-Shacham...
    5 KB (952 words) - 10:00, 16 February 2025
  • The Boneh–Franklin scheme is an identity-based encryption system proposed by Dan Boneh and Matthew K. Franklin in 2001. This article refers to the protocol...
    6 KB (1,142 words) - 11:11, 13 February 2024
  • proven memory-hard password-hashing and modern design. It was created by Dan Boneh, Henry Corrigan-Gibbs (both at Stanford University) and Stuart Schechter...
    3 KB (271 words) - 07:14, 28 May 2025
  • Shacham, Matthew Page, Ben Pfaff, Eu-Jin Goh, Nagendra Modadugu, and Dan Boneh. On the effectiveness of address-space randomization. In Proceedings of...
    31 KB (3,850 words) - 22:44, 18 May 2025
  • certificateless cryptography. The steps involved are depicted in this diagram: Dan Boneh and Matthew K. Franklin defined a set of four algorithms that form a complete...
    16 KB (1,942 words) - 00:54, 12 April 2025
  • security. Shacham his PhD from Stanford University under the supervision of Dan Boneh, where he wrote his dissertation on "New Paradigms in Signature Schemes"...
    6 KB (582 words) - 03:58, 16 March 2025
  • Thumbnail for Functional encryption
    was proposed by Amit Sahai and Brent Waters in 2005 and formalized by Dan Boneh, Amit Sahai and Brent Waters in 2010. Until recently, however, most instantiations...
    5 KB (534 words) - 15:12, 30 November 2024
  • Thumbnail for Andrew Ng
    peer-grading system, John Mitchell (Courseware, a Learning Management System), Dan Boneh (using machine learning to sync videos, later teaching cryptography on...
    40 KB (3,740 words) - 20:12, 12 April 2025
  • of differential cryptanalysis and Related-key attack. Matt Blaze, US. Dan Boneh, US, Stanford University. Niels Ferguson, Netherlands, co-inventor of...
    22 KB (2,482 words) - 17:36, 10 May 2025
  • This approach was proposed in 2010 by Gustav Rydstedt, Elie Bursztein, Dan Boneh and Collin Jackson in a paper that highlighted the limitations of existing...
    5 KB (587 words) - 07:53, 13 November 2023
  • "Indifferentiability of 8-Round Feistel Networks". CRYPTO 2016. Springer. Dan Boneh, Özgür Dagdelen, Marc Fischlin, Anja Lehmann, Christian Schaffner, and...
    14 KB (1,785 words) - 16:58, 5 June 2025
  • public-key encryption" (PDF). Handbook of Applied Cryptography. CRC Press. Dan Boneh (1998). "The Decision Diffie-Hellman problem". Algorithmic Number Theory...
    10 KB (1,473 words) - 11:12, 31 March 2025
  • on Argon2i and Balloon Hashing (PDF) (Report). Henry; Corrigan-Gibbs; Dan Boneh; Stuart Schechter (2016-01-14). Balloon Hashing: Provably Space-Hard Hash...
    14 KB (1,491 words) - 04:51, 31 March 2025
  • A BLS digital signature, also known as Boneh–Lynn–Shacham (BLS), is a cryptographic signature scheme which allows a user to verify that a signer is authentic...
    9 KB (974 words) - 16:44, 24 May 2025
  • Thumbnail for Timing attack
    constant-time cryptography". Retrieved 9 May 2021. David Brumley and Dan Boneh. Remote timing attacks are practical. USENIX Security Symposium, August...
    13 KB (1,616 words) - 12:26, 4 June 2025
  • Trapdoors for Hard Lattices and New Cryptographic Constructions. STOC. Dan Boneh; Özgür Dagdelen; Marc Fischlin; Anja Lehmann; Christian Schaffner; Mark...
    4 KB (411 words) - 00:20, 3 April 2025
  • networking experts: Andrea Bittau, Mike Hamburg, Mark Handley, David Mazières, Dan Boneh and Quinn Slack. Tcpcrypt has been published as an Internet Draft. Experimental...
    8 KB (764 words) - 21:12, 9 March 2024
  • Thumbnail for Next-Generation Secure Computing Base
    responsible for the cessation of NGSCB's development. In a 2003 article, Dan Boneh and David Brumley indicated that projects like NGSCB may be vulnerable...
    79 KB (7,358 words) - 20:00, 9 June 2025
  • Thumbnail for Gödel Prize
    (1–2): 166–196. CiteSeerX 10.1.1.21.1731. doi:10.1006/game.1999.0790. Boneh, Dan; Franklin, Matthew (2003). "Identity-based encryption from the Weil pairing"...
    31 KB (2,200 words) - 01:40, 9 June 2025
  • Information in a Key" Archived 2016-10-12 at the Wayback Machine. p. 1. Dan Boneh; Mark Zhandry. "Multiparty Key Exchange, Efficient Traitor Tracing, and...
    10 KB (1,522 words) - 17:14, 18 September 2024
  • its Applications, Volume 125, Number 3, 20 November 2002 , pp. 533–542. Dan Boneh, Matthew K. Franklin, Identity-Based Encryption from the Weil Pairing...
    6 KB (1,096 words) - 19:35, 13 March 2025
  • compromise the privacy of a user's browsing habits. In 2007, Andrew Bortz and Dan Boneh from Stanford University published a white paper detailing an attack that...
    65 KB (7,518 words) - 03:17, 7 June 2025
  • Fault Analysis: How to break completely unknown cryptosystems (1996) Dan Boneh and Richard A. DeMillo and Richard J. Lipton: On the Importance of Checking...
    3 KB (401 words) - 03:26, 31 July 2024
  • Thumbnail for Arvind Narayanan
    post-doctoral researcher at Stanford University, working closely with Dan Boneh. Narayanan moved to Princeton University as an assistant professor in...
    10 KB (646 words) - 19:13, 31 March 2025
  • from the original on 2016-07-17, retrieved 2018-01-07 David Brumley; Dan Boneh (2003). "Remote timing attacks are practical" (PDF). Archived (PDF) from...
    31 KB (3,618 words) - 16:36, 25 May 2025
  • Enterprise Networks,” under advisors Nick McKeown, Scott Shenker and Dan Boneh, was published in 2008. In 2007, Casado co-founded Nicira Networks along...
    9 KB (700 words) - 00:57, 9 May 2025
  • writer Tom Boellstorff, anthropologist Christopher Boffoli, photographer Dan Boneh, Israeli-born University professor Boogie, Serbian-born photographer Claria...
    98 KB (8,807 words) - 03:14, 9 June 2025
  • Thesis A Fully Homomorphic Encryption Scheme (2009) Doctoral advisor Dan Boneh Academic work Discipline Cryptography, computer science Institutions IBM...
    4 KB (282 words) - 22:32, 5 May 2025
  • Perspective, "Attaching Cryptographic Key Exchange with Precomputation", by Dan Boneh, p. 105. "CVE-2015-4000". Common Vulnerabilities and Exposures List. The...
    12 KB (1,297 words) - 06:30, 11 March 2025