Dan Boneh (/boʊˈneɪ/; Hebrew: דן בונה) is an Israeli–American professor in applied cryptography and computer security at Stanford University. In 2016...
14 KB (1,150 words) - 19:02, 6 February 2025
Boneh or Beneh may refer to: Dan Boneh (b. 1969), Israeli computer scientist Boneh–Franklin scheme, an identity-based encryption system Boneh-Lynn-Shacham...
5 KB (952 words) - 10:00, 16 February 2025
The Boneh–Franklin scheme is an identity-based encryption system proposed by Dan Boneh and Matthew K. Franklin in 2001. This article refers to the protocol...
6 KB (1,142 words) - 11:11, 13 February 2024
proven memory-hard password-hashing and modern design. It was created by Dan Boneh, Henry Corrigan-Gibbs (both at Stanford University) and Stuart Schechter...
3 KB (271 words) - 07:14, 28 May 2025
Shacham, Matthew Page, Ben Pfaff, Eu-Jin Goh, Nagendra Modadugu, and Dan Boneh. On the effectiveness of address-space randomization. In Proceedings of...
31 KB (3,850 words) - 22:44, 18 May 2025
certificateless cryptography. The steps involved are depicted in this diagram: Dan Boneh and Matthew K. Franklin defined a set of four algorithms that form a complete...
16 KB (1,942 words) - 00:54, 12 April 2025
security. Shacham his PhD from Stanford University under the supervision of Dan Boneh, where he wrote his dissertation on "New Paradigms in Signature Schemes"...
6 KB (582 words) - 03:58, 16 March 2025
was proposed by Amit Sahai and Brent Waters in 2005 and formalized by Dan Boneh, Amit Sahai and Brent Waters in 2010. Until recently, however, most instantiations...
5 KB (534 words) - 15:12, 30 November 2024
peer-grading system, John Mitchell (Courseware, a Learning Management System), Dan Boneh (using machine learning to sync videos, later teaching cryptography on...
40 KB (3,740 words) - 20:12, 12 April 2025
of differential cryptanalysis and Related-key attack. Matt Blaze, US. Dan Boneh, US, Stanford University. Niels Ferguson, Netherlands, co-inventor of...
22 KB (2,482 words) - 17:36, 10 May 2025
This approach was proposed in 2010 by Gustav Rydstedt, Elie Bursztein, Dan Boneh and Collin Jackson in a paper that highlighted the limitations of existing...
5 KB (587 words) - 07:53, 13 November 2023
"Indifferentiability of 8-Round Feistel Networks". CRYPTO 2016. Springer. Dan Boneh, Özgür Dagdelen, Marc Fischlin, Anja Lehmann, Christian Schaffner, and...
14 KB (1,785 words) - 16:58, 5 June 2025
public-key encryption" (PDF). Handbook of Applied Cryptography. CRC Press. Dan Boneh (1998). "The Decision Diffie-Hellman problem". Algorithmic Number Theory...
10 KB (1,473 words) - 11:12, 31 March 2025
on Argon2i and Balloon Hashing (PDF) (Report). Henry; Corrigan-Gibbs; Dan Boneh; Stuart Schechter (2016-01-14). Balloon Hashing: Provably Space-Hard Hash...
14 KB (1,491 words) - 04:51, 31 March 2025
BLS digital signature (redirect from Boneh-Lynn-Shacham)
A BLS digital signature, also known as Boneh–Lynn–Shacham (BLS), is a cryptographic signature scheme which allows a user to verify that a signer is authentic...
9 KB (974 words) - 16:44, 24 May 2025
constant-time cryptography". Retrieved 9 May 2021. David Brumley and Dan Boneh. Remote timing attacks are practical. USENIX Security Symposium, August...
13 KB (1,616 words) - 12:26, 4 June 2025
Trapdoors for Hard Lattices and New Cryptographic Constructions. STOC. Dan Boneh; Özgür Dagdelen; Marc Fischlin; Anja Lehmann; Christian Schaffner; Mark...
4 KB (411 words) - 00:20, 3 April 2025
networking experts: Andrea Bittau, Mike Hamburg, Mark Handley, David Mazières, Dan Boneh and Quinn Slack. Tcpcrypt has been published as an Internet Draft. Experimental...
8 KB (764 words) - 21:12, 9 March 2024
responsible for the cessation of NGSCB's development. In a 2003 article, Dan Boneh and David Brumley indicated that projects like NGSCB may be vulnerable...
79 KB (7,358 words) - 20:00, 9 June 2025
(1–2): 166–196. CiteSeerX 10.1.1.21.1731. doi:10.1006/game.1999.0790. Boneh, Dan; Franklin, Matthew (2003). "Identity-based encryption from the Weil pairing"...
31 KB (2,200 words) - 01:40, 9 June 2025
Information in a Key" Archived 2016-10-12 at the Wayback Machine. p. 1. Dan Boneh; Mark Zhandry. "Multiparty Key Exchange, Efficient Traitor Tracing, and...
10 KB (1,522 words) - 17:14, 18 September 2024
its Applications, Volume 125, Number 3, 20 November 2002 , pp. 533–542. Dan Boneh, Matthew K. Franklin, Identity-Based Encryption from the Weil Pairing...
6 KB (1,096 words) - 19:35, 13 March 2025
compromise the privacy of a user's browsing habits. In 2007, Andrew Bortz and Dan Boneh from Stanford University published a white paper detailing an attack that...
65 KB (7,518 words) - 03:17, 7 June 2025
Fault Analysis: How to break completely unknown cryptosystems (1996) Dan Boneh and Richard A. DeMillo and Richard J. Lipton: On the Importance of Checking...
3 KB (401 words) - 03:26, 31 July 2024
post-doctoral researcher at Stanford University, working closely with Dan Boneh. Narayanan moved to Princeton University as an assistant professor in...
10 KB (646 words) - 19:13, 31 March 2025
from the original on 2016-07-17, retrieved 2018-01-07 David Brumley; Dan Boneh (2003). "Remote timing attacks are practical" (PDF). Archived (PDF) from...
31 KB (3,618 words) - 16:36, 25 May 2025
Enterprise Networks,” under advisors Nick McKeown, Scott Shenker and Dan Boneh, was published in 2008. In 2007, Casado co-founded Nicira Networks along...
9 KB (700 words) - 00:57, 9 May 2025
writer Tom Boellstorff, anthropologist Christopher Boffoli, photographer Dan Boneh, Israeli-born University professor Boogie, Serbian-born photographer Claria...
98 KB (8,807 words) - 03:14, 9 June 2025
Thesis A Fully Homomorphic Encryption Scheme (2009) Doctoral advisor Dan Boneh Academic work Discipline Cryptography, computer science Institutions IBM...
4 KB (282 words) - 22:32, 5 May 2025
Perspective, "Attaching Cryptographic Key Exchange with Precomputation", by Dan Boneh, p. 105. "CVE-2015-4000". Common Vulnerabilities and Exposures List. The...
12 KB (1,297 words) - 06:30, 11 March 2025