default search action
Dan Boneh
Person information
- affiliation: Stanford University, USA
- award (2014): ACM Prize in Computing
- award (2013): Gödel Prize
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j37]Dan Boneh, Benedikt Bünz, Ben Fisch:
A Survey of Two Verifiable Delay Functions Using Proof of Exponentiation. IACR Commun. Cryptol. 1(1): 7 (2024) - [j36]Kevin Liao, Henry Corrigan-Gibbs, Dan Boneh:
Divisible E-Cash for Billing in Private Ad Retargeting. Proc. Priv. Enhancing Technol. 2024(4): 5-23 (2024) - [c221]Valeria Nikolaenko, Sam Ragsdale, Joseph Bonneau, Dan Boneh:
Powers-of-Tau to the People: Decentralizing Setup Ceremonies. ACNS (3) 2024: 105-134 - [c220]Dan Boneh:
Cryptography and Computer Security: A View From the Year 2100. CCS 2024: 1 - [c219]Evan Laufer, Alex Ozdemir, Dan Boneh:
zkPi: Proving Lean Theorems in Zero-Knowledge. CCS 2024: 4301-4315 - [c218]Dan Boneh, Aditi Partap, Lior Rotem:
Traceable Secret Sharing: Strong Security and Efficient Constructions. CRYPTO (5) 2024: 221-256 - [c217]Wilson D. Nguyen, Trisha Datta, Binyi Chen, Nirvan Tyagi, Dan Boneh:
Mangrove: A Scalable Framework for Folding-Based SNARKs. CRYPTO (10) 2024: 308-344 - [c216]Dan Boneh, Aditi Partap, Lior Rotem:
Accountability for Misbehavior in Threshold Decryption via Threshold Traitor Tracing. CRYPTO (7) 2024: 317-351 - [c215]Chhavi Yadav, Amrita Roy Chowdhury, Dan Boneh, Kamalika Chaudhuri:
FairProof : Confidential and Certifiable Fairness for Neural Networks. ICML 2024 - [i140]Chhavi Yadav, Amrita Roy Chowdhury, Dan Boneh, Kamalika Chaudhuri:
FairProof : Confidential and Certifiable Fairness for Neural Networks. CoRR abs/2402.12572 (2024) - [i139]Megha Srivastava, Simran Arora, Dan Boneh:
Optimistic Verifiable Training by Controlling Hardware Nondeterminism. CoRR abs/2403.09603 (2024) - [i138]Andy K. Zhang, Neil Perry, Riya Dulepet, Eliot Jones, Justin W. Lin, Joey Ji, Celeste Menders, Gashon Hussein, Samantha Liu, Donovan Jasper, Pura Peetathawatchai, Ari Glenn, Vikram Sivashankar, Daniel Zamoshchin, Leo Glikbarg, Derek Askaryar, Mike Yang, Teddy Zhang, Rishi Alluri, Nathan Tran, Rinnara Sangpisit, Polycarpos Yiorkadjis, Kenny Osele, Gautham Raghupathi, Dan Boneh, Daniel E. Ho, Percy Liang:
Cybench: A Framework for Evaluating Cybersecurity Capabilities and Risk of Language Models. CoRR abs/2408.08926 (2024) - [i137]Dan Boneh, Binyi Chen:
LatticeFold: A Lattice-based Folding Scheme and its Applications to Succinct Proof Systems. IACR Cryptol. ePrint Arch. 2024: 257 (2024) - [i136]Evan Laufer, Alex Ozdemir, Dan Boneh:
zkPi: Proving Lean Theorems in Zero-Knowledge. IACR Cryptol. ePrint Arch. 2024: 267 (2024) - [i135]Dan Boneh, Iftach Haitner, Yehuda Lindell:
Exponent-VRFs and Their Applications. IACR Cryptol. ePrint Arch. 2024: 397 (2024) - [i134]Dan Boneh, Aditi Partap, Lior Rotem:
Traceable Secret Sharing: Strong Security and Efficient Constructions. IACR Cryptol. ePrint Arch. 2024: 405 (2024) - [i133]Wilson D. Nguyen, Trisha Datta, Binyi Chen, Nirvan Tyagi, Dan Boneh:
Mangrove: A Scalable Framework for Folding-based SNARKs. IACR Cryptol. ePrint Arch. 2024: 416 (2024) - [i132]Alex Ozdemir, Evan Laufer, Dan Boneh:
Volatile and Persistent Memory for zkSNARKs via Algebraic Interactive Proofs. IACR Cryptol. ePrint Arch. 2024: 979 (2024) - [i131]Trisha Datta, Binyi Chen, Dan Boneh:
VerITAS: Verifying Image Transformations at Scale. IACR Cryptol. ePrint Arch. 2024: 1066 (2024) - 2023
- [c214]Wilson D. Nguyen, Dan Boneh, Srinath T. V. Setty:
Revisiting the Nova Proof System on a Cycle of Curves. AFT 2023: 18:1-18:22 - [c213]Dan Boneh, Aditi Partap, Lior Rotem:
Post-Quantum Single Secret Leader Election (SSLE) from Publicly Re-Randomizable Commitments. AFT 2023: 26:1-26:23 - [c212]Ertem Nusret Tas, Dan Boneh:
Vector Commitments with Efficient Updates. AFT 2023: 29:1-29:23 - [c211]Neil Perry, Megha Srivastava, Deepak Kumar, Dan Boneh:
Do Users Write More Insecure Code with AI Assistants? CCS 2023: 2785-2799 - [c210]Dan Boneh, Elette Boyle, Henry Corrigan-Gibbs, Niv Gilboa, Yuval Ishai:
Arithmetic Sketching. CRYPTO (1) 2023: 171-202 - [c209]Kaili Wang, Qinchen Wang, Calvin Cai, Dan Boneh:
R-Pool and Settlement Markets for Recoverable ERC-20R Tokens. DeFi@CCS 2023: 49-54 - [c208]Binyi Chen, Benedikt Bünz, Dan Boneh, Zhenfei Zhang:
HyperPlonk: Plonk with Linear-Time Prover and High-Degree Custom Gates. EUROCRYPT (2) 2023: 499-530 - [c207]Dan Boneh, Jiaxin Guan, Mark Zhandry:
A Lower Bound on the Length of Signatures Based on Group Actions and Generic Isogenies. EUROCRYPT (5) 2023: 507-531 - [c206]Ertem Nusret Tas, Dan Boneh:
Cryptoeconomic Security for Data Availability Committees. FC 2023: 310-326 - [i130]Ertem Nusret Tas, Dan Boneh:
Vector Commitments with Efficient Updates. CoRR abs/2307.04085 (2023) - [i129]Joshua Z. Tan, Tara Merk, Sarah Hubbard, Eliza R. Oak, Joni Pirovich, Ellie Rennie, Rolf Hoefer, Michael Zargham, Jason Potts, Chris Berg, Reuben Youngblom, Primavera De Filippi, Seth Frey, Jeff Strnad, Morshed Mannan, Kelsie Nabben, Silke Noa Elrifai, Jake Hartnell, Benjamin Mako Hill, Alexia Maddox, Woojin Lim, Tobin South, Ari Juels, Dan Boneh:
Open Problems in DAOs. CoRR abs/2310.19201 (2023) - [i128]Kaili Wang, Qinchen Wang, Calvin Cai, Dan Boneh:
R-Pool and Settlement Markets for Recoverable ERC-20R Tokens. CoRR abs/2312.14375 (2023) - [i127]Dan Boneh, Jiaxin Guan, Mark Zhandry:
A Lower Bound on the Length of Signatures Based on Group Actions and Generic Isogenies. IACR Cryptol. ePrint Arch. 2023: 250 (2023) - [i126]Wilson D. Nguyen, Dan Boneh, Srinath T. V. Setty:
Revisiting the Nova Proof System on a Cycle of Curves. IACR Cryptol. ePrint Arch. 2023: 969 (2023) - [i125]Dan Boneh, Elette Boyle, Henry Corrigan-Gibbs, Niv Gilboa, Yuval Ishai:
Arithmetic Sketching. IACR Cryptol. ePrint Arch. 2023: 1012 (2023) - [i124]Dan Boneh, Aditi Partap, Lior Rotem:
Post-Quantum Single Secret Leader Election (SSLE) From Publicly Re-randomizable Commitments. IACR Cryptol. ePrint Arch. 2023: 1241 (2023) - [i123]Dan Boneh, Aditi Partap, Lior Rotem:
Traitor Tracing for Threshold Decryption. IACR Cryptol. ePrint Arch. 2023: 1724 (2023) - [i122]Dan Boneh, Aditi Partap, Brent Waters:
Accountable Multi-Signatures with Constant Size Public Keys. IACR Cryptol. ePrint Arch. 2023: 1793 (2023) - [i121]Ertem Nusret Tas, Dan Boneh:
Vector Commitments with Efficient Updates. IACR Cryptol. ePrint Arch. 2023: 1830 (2023) - 2022
- [c205]Tiancheng Xie, Jiaheng Zhang, Zerui Cheng, Fan Zhang, Yupeng Zhang, Yongzheng Jia, Dan Boneh, Dawn Song:
zkBridge: Trustless Cross-chain Bridges Made Practical. CCS 2022: 3003-3017 - [c204]Dan Boneh, Chelsea Komlo:
Threshold Signatures with Private Accountability. CRYPTO (4) 2022: 551-581 - [c203]Saba Eskandarian, Dan Boneh:
Clarion: Anonymous Communication from Multiparty Shuffling Protocols. NDSS 2022 - [c202]Alex Ozdemir, Dan Boneh:
Experimenting with Collaborative zk-SNARKs: Zero-Knowledge Proofs for Distributed Secrets. USENIX Security Symposium 2022: 4291-4308 - [i120]Neil Perry, Bruce Spang, Saba Eskandarian, Dan Boneh:
Strong Anonymity for Mesh Messaging. CoRR abs/2207.04145 (2022) - [i119]Kaili Wang, Qinchen Wang, Dan Boneh:
ERC-20R and ERC-721R: Reversible Transactions on Ethereum. CoRR abs/2208.00543 (2022) - [i118]Ertem Nusret Tas, Dan Boneh:
Cryptoeconomic Security for Data Availability Committees. CoRR abs/2208.02999 (2022) - [i117]Aditi Partap, Dan Boneh:
Memory Tagging: A Memory Efficient Design. CoRR abs/2209.00307 (2022) - [i116]Tiancheng Xie, Jiaheng Zhang, Zerui Cheng, Fan Zhang, Yupeng Zhang, Yongzheng Jia, Dan Boneh, Dawn Song:
zkBridge: Trustless Cross-chain Bridges Made Practical. CoRR abs/2210.00264 (2022) - [i115]Neil Perry, Megha Srivastava, Deepak Kumar, Dan Boneh:
Do Users Write More Insecure Code with AI Assistants? CoRR abs/2211.03622 (2022) - [i114]Binyi Chen, Benedikt Bünz, Dan Boneh, Zhenfei Zhang:
HyperPlonk: Plonk with Linear-Time Prover and High-Degree Custom Gates. IACR Cryptol. ePrint Arch. 2022: 1355 (2022) - [i113]Valeria Nikolaenko, Sam Ragsdale, Joseph Bonneau, Dan Boneh:
Powers-of-Tau to the People: Decentralizing Setup Ceremonies. IACR Cryptol. ePrint Arch. 2022: 1592 (2022) - [i112]Dan Boneh, Chelsea Komlo:
Threshold Signatures with Private Accountability. IACR Cryptol. ePrint Arch. 2022: 1636 (2022) - [i111]Dan Boneh, Aditi Partap, Lior Rotem:
Accountable Threshold Signatures with Proactive Refresh. IACR Cryptol. ePrint Arch. 2022: 1656 (2022) - 2021
- [c201]Charlotte Peale, Saba Eskandarian, Dan Boneh:
Secure Complaint-Enabled Source-Tracking for Encrypted Messaging. CCS 2021: 1484-1506 - [c200]Dan Boneh, Justin Drake, Ben Fisch, Ariel Gabizon:
Halo Infinite: Proof-Carrying Data from Additive Polynomial Commitments. CRYPTO (1) 2021: 649-680 - [c199]Florian Tramèr, Dan Boneh:
Differentially Private Learning Needs Better Features (or Much More Data). ICLR 2021 - [c198]Kurt Thomas, Devdatta Akhawe, Michael D. Bailey, Dan Boneh, Elie Bursztein, Sunny Consolvo, Nicola Dell, Zakir Durumeric, Patrick Gage Kelley, Deepak Kumar, Damon McCoy, Sarah Meiklejohn, Thomas Ristenpart, Gianluca Stringhini:
SoK: Hate, Harassment, and the Changing Landscape of Online Abuse. SP 2021: 247-267 - [c197]Dan Boneh, Elette Boyle, Henry Corrigan-Gibbs, Niv Gilboa, Yuval Ishai:
Lightweight Techniques for Private Heavy Hitters. SP 2021: 762-776 - [c196]Saba Eskandarian, Henry Corrigan-Gibbs, Matei Zaharia, Dan Boneh:
Express: Lowering the Cost of Metadata-hiding Communication with Cryptographic Privacy. USENIX Security Symposium 2021: 1775-1792 - [c195]Paul Syverson, Matthew Finkel, Saba Eskandarian, Dan Boneh:
Attacks on Onion Discovery and Remedies via Self-Authenticating Traditional Addresses. WPES@CCS 2021: 45-52 - [i110]Paul Syverson, Matthew Finkel, Saba Eskandarian, Dan Boneh:
Attacks on Onion Discovery and Remedies via Self-Authenticating Traditional Addresses. CoRR abs/2110.03168 (2021) - [i109]Dan Boneh, Elette Boyle, Henry Corrigan-Gibbs, Niv Gilboa, Yuval Ishai:
Lightweight Techniques for Private Heavy Hitters. IACR Cryptol. ePrint Arch. 2021: 17 (2021) - [i108]Dan Boneh, Wilson D. Nguyen, Alex Ozdemir:
Efficient Functional Commitments: How to Commit to Private Functions. IACR Cryptol. ePrint Arch. 2021: 1342 (2021) - [i107]Saba Eskandarian, Dan Boneh:
Clarion: Anonymous Communication from Multiparty Shuffling Protocols. IACR Cryptol. ePrint Arch. 2021: 1514 (2021) - [i106]Alex Ozdemir, Dan Boneh:
Experimenting with Collaborative zk-SNARKs: Zero-Knowledge Proofs for Distributed Secrets. IACR Cryptol. ePrint Arch. 2021: 1530 (2021) - 2020
- [j35]Dan Boneh, Darren B. Glass, Daniel Krashen, Kristin E. Lauter, Shahed Sharif, Alice Silverberg, Mehdi Tibouchi, Mark Zhandry:
Multiparty Non-Interactive Key Exchange and More From Isogenies on Elliptic Curves. J. Math. Cryptol. 14(1): 5-14 (2020) - [c194]Dan Boneh, Saba Eskandarian, Lucjan Hanzlik, Nicola Greco:
Single Secret Leader Election. AFT 2020: 12-24 - [c193]Dan Boneh, Dmitry Kogan, Katharine Woo:
Oblivious Pseudorandom Functions from Isogenies. ASIACRYPT (2) 2020: 520-550 - [c192]Dan Boneh, Saba Eskandarian, Sam Kim, Maurice Shih:
Improving Speed and Security in Updatable Encryption Schemes. ASIACRYPT (3) 2020: 559-589 - [c191]Benedikt Bünz, Shashank Agrawal, Mahdi Zamani, Dan Boneh:
Zether: Towards Privacy in a Smart Contract World. Financial Cryptography 2020: 423-443 - [c190]Riad S. Wahby, Dan Boneh, Christopher Jeffrey, Joseph Poon:
An Airdrop that Preserves Recipient Privacy. Financial Cryptography 2020: 444-463 - [c189]Alex Ozdemir, Riad S. Wahby, Barry Whitehat, Dan Boneh:
Scaling Verifiable Computation Using Efficient Set Accumulators. USENIX Security Symposium 2020: 2075-2092 - [c188]Florian Tramèr, Dan Boneh, Kenny Paterson:
Remote Side-Channel Attacks on Anonymous Transactions. USENIX Security Symposium 2020: 2739-2756 - [i105]Florian Tramèr, Dan Boneh:
Differentially Private Learning Needs Better Features (or Much More Data). CoRR abs/2011.11660 (2020) - [i104]Dan Boneh, Elette Boyle, Henry Corrigan-Gibbs, Niv Gilboa, Yuval Ishai:
Lightweight Techniques for Private Heavy Hitters. CoRR abs/2012.14884 (2020) - [i103]Dan Boneh, Saba Eskandarian, Lucjan Hanzlik, Nicola Greco:
Single Secret Leader Election. IACR Cryptol. ePrint Arch. 2020: 25 (2020) - [i102]Dan Boneh, Justin Drake, Ben Fisch, Ariel Gabizon:
Efficient polynomial commitment schemes for multiple points and polynomials. IACR Cryptol. ePrint Arch. 2020: 81 (2020) - [i101]Florian Tramèr, Dan Boneh, Kenneth G. Paterson:
Remote Side-Channel Attacks on Anonymous Transactions. IACR Cryptol. ePrint Arch. 2020: 220 (2020) - [i100]Dan Boneh, Saba Eskandarian, Sam Kim, Maurice Shih:
Improving Speed and Security in Updatable Encryption Schemes. IACR Cryptol. ePrint Arch. 2020: 222 (2020) - [i99]Riad S. Wahby, Dan Boneh, Christopher Jeffrey, Joseph Poon:
An airdrop that preserves recipient privacy. IACR Cryptol. ePrint Arch. 2020: 676 (2020) - [i98]Dan Boneh, Dmitry Kogan, Katharine Woo:
Oblivious Pseudorandom Functions from Isogenies. IACR Cryptol. ePrint Arch. 2020: 1532 (2020) - [i97]Dan Boneh, Justin Drake, Ben Fisch, Ariel Gabizon:
Halo Infinite: Recursive zk-SNARKs from any Additive Polynomial Commitment Scheme. IACR Cryptol. ePrint Arch. 2020: 1536 (2020)
2010 – 2019
- 2019
- [j34]Dan Boneh:
Technical perspective: Attacking cryptographic key exchange with precomputation. Commun. ACM 62(1): 105 (2019) - [j33]Dan Boneh, Andrew J. Grotto, Patrick D. McDaniel, Nicolas Papernot:
How Relevant Is the Turing Test in the Age of Sophisbots? IEEE Secur. Priv. 17(6): 64-71 (2019) - [j32]Riad S. Wahby, Dan Boneh:
Fast and simple constant-time hashing to the BLS12-381 elliptic curve. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2019(4): 154-179 (2019) - [c187]Florian Tramèr, Pascal Dupré, Gili Rusak, Giancarlo Pellegrino, Dan Boneh:
AdVersarial: Perceptual Ad Blocking meets Adversarial Machine Learning. CCS 2019: 2005-2021 - [c186]Dan Boneh, Elette Boyle, Henry Corrigan-Gibbs, Niv Gilboa, Yuval Ishai:
Zero-Knowledge Proofs on Secret-Shared Data via Fully Linear PCPs. CRYPTO (3) 2019: 67-97 - [c185]Dan Boneh, Benedikt Bünz, Ben Fisch:
Batching Techniques for Accumulators with Applications to IOPs and Stateless Blockchains. CRYPTO (1) 2019: 561-586 - [c184]Dan Boneh, Saba Eskandarian, Ben Fisch:
Post-quantum EPID Signatures from Symmetric Primitives. CT-RSA 2019: 251-271 - [c183]Florian Tramèr, Dan Boneh:
Slalom: Fast, Verifiable and Private Execution of Neural Networks in Trusted Hardware. ICLR 2019 - [c182]Kevin Kiningham, Philip Alexander Levis, Mark Anderson, Dan Boneh, Mark Horowitz, Maurice Shih:
Falcon - A Flexible Architecture For Accelerating Cryptography. MASS 2019: 136-144 - [c181]Florian Tramèr, Dan Boneh:
Adversarial Training and Robustness for Multiple Perturbations. NeurIPS 2019: 5858-5868 - [c180]Saba Eskandarian, Jonathan Cogan, Sawyer Birnbaum, Peh Chang Wei Brandon, Dillon Franke, Forest Fraser, Gaspar Garcia Jr., Eric Gong, Hung T. Nguyen, Taresh K. Sethi, Vishal Subbiah, Michael Backes, Giancarlo Pellegrino, Dan Boneh:
Fidelius: Protecting User Secrets from Compromised Browsers. IEEE Symposium on Security and Privacy 2019: 264-280 - [c179]Emma Dauterman, Henry Corrigan-Gibbs, David Mazières, Dan Boneh, Dominic Rizzo:
True2F: Backdoor-Resistant Authentication Tokens. IEEE Symposium on Security and Privacy 2019: 398-416 - [c178]Kurt Thomas, Jennifer Pullman, Kevin Yeo, Ananth Raghunathan, Patrick Gage Kelley, Luca Invernizzi, Borbala Benko, Tadek Pietraszek, Sarvar Patel, Dan Boneh, Elie Bursztein:
Protecting accounts from credential stuffing with password breach alerting. USENIX Security Symposium 2019: 1556-1571 - [i96]Florian Tramèr, Dan Boneh:
Adversarial Training and Robustness for Multiple Perturbations. CoRR abs/1904.13000 (2019) - [i95]Jason Teutsch, Michael Straka, Dan Boneh:
Retrofitting a two-way peg between blockchains. CoRR abs/1908.03999 (2019) - [i94]Dan Boneh, Andrew J. Grotto, Patrick D. McDaniel, Nicolas Papernot:
How Relevant is the Turing Test in the Age of Sophisbots? CoRR abs/1909.00056 (2019) - [i93]Jonathan Love, Dan Boneh:
Supersingular Curves With Small Non-integer Endomorphisms. CoRR abs/1910.03180 (2019) - [i92]Saba Eskandarian, Henry Corrigan-Gibbs, Matei Zaharia, Dan Boneh:
Express: Lowering the Cost of Metadata-hiding Communication with Cryptographic Privacy. CoRR abs/1911.09215 (2019) - [i91]Dan Boneh, Elette Boyle, Henry Corrigan-Gibbs, Niv Gilboa, Yuval Ishai:
How to Prove a Secret: Zero-Knowledge Proofs on Distributed Data via Fully Linear PCPs. IACR Cryptol. ePrint Arch. 2019: 188 (2019) - [i90]Benedikt Bünz, Shashank Agrawal, Mahdi Zamani, Dan Boneh:
Zether: Towards Privacy in a Smart Contract World. IACR Cryptol. ePrint Arch. 2019: 191 (2019) - [i89]Riad S. Wahby, Dan Boneh:
Fast and simple constant-time hashing to the BLS12-381 elliptic curve. IACR Cryptol. ePrint Arch. 2019: 403 (2019) - [i88]Alex Ozdemir, Riad S. Wahby, Dan Boneh:
Scaling Verifiable Computation Using Efficient Set Accumulators. IACR Cryptol. ePrint Arch. 2019: 1494 (2019) - 2018
- [c177]Dan Boneh, Manu Drijvers, Gregory Neven:
Compact Multi-signatures for Smaller Blockchains. ASIACRYPT (2) 2018: 435-464 - [c176]Dan Boneh, Rosario Gennaro, Steven Goldfeder, Aayush Jain, Sam Kim, Peter M. R. Rasmussen, Amit Sahai:
Threshold Cryptosystems from Threshold Fully Homomorphic Encryption. CRYPTO (1) 2018: 565-596 - [c175]Dan Boneh, Joseph Bonneau, Benedikt Bünz, Ben Fisch:
Verifiable Delay Functions. CRYPTO (1) 2018: 757-788 - [c174]Anjana Rajan, Lucy Qin, David W. Archer, Dan Boneh, Tancrède Lepoint, Mayank Varia:
Callisto: A Cryptographic Approach to Detecting Serial Perpetrators of Sexual Misconduct. COMPASS 2018: 49:1-49:4 - [c173]Dan Boneh, Yuval Ishai, Amit Sahai, David J. Wu:
Quasi-Optimal SNARGs via Linear Multi-Prover Interactive Proofs. EUROCRYPT (3) 2018: 222-255 - [c172]Florian Tramèr, Alexey Kurakin, Nicolas Papernot, Ian J. Goodfellow, Dan Boneh, Patrick D. McDaniel:
Ensemble Adversarial Training: Attacks and Defenses. ICLR (Poster) 2018 - [c171]Benedikt Bünz, Jonathan Bootle, Dan Boneh, Andrew Poelstra, Pieter Wuille, Gregory Maxwell:
Bulletproofs: Short Proofs for Confidential Transactions and More. IEEE Symposium on Security and Privacy 2018: 315-334 - [c170]Dan Boneh, Yuval Ishai, Alain Passelègue, Amit Sahai, David J. Wu:
Exploring Crypto Dark Matter: - New Simple PRF Candidates and Their Applications. TCC (2) 2018: 699-729 - [i87]Florian Tramèr, Dan Boneh:
Slalom: Fast, Verifiable and Private Execution of Neural Networks in Trusted Hardware. CoRR abs/1806.03287 (2018) - [i86]Dan Boneh, Darren B. Glass, Daniel Krashen, Kristin E. Lauter, Shahed Sharif, Alice Silverberg, Mehdi Tibouchi, Mark Zhandry:
Multiparty Non-Interactive Key Exchange and More From Isogenies on Elliptic Curves. CoRR abs/1807.03038 (2018) - [i85]Saba Eskandarian, Jonathan Cogan, Sawyer Birnbaum, Peh Chang Wei Brandon, Dillon Franke, Forest Fraser, Gaspar Garcia Jr., Eric Gong, Hung T. Nguyen, Taresh K. Sethi, Vishal Subbiah, Michael Backes, Giancarlo Pellegrino, Dan Boneh:
Fidelius: Protecting User Secrets from Compromised Browsers. CoRR abs/1809.04774 (2018) - [i84]Emma Dauterman, Henry Corrigan-Gibbs, David Mazières, Dan Boneh, Dominic Rizzo:
True2F: Backdoor-resistant authentication tokens. CoRR abs/1810.04660 (2018) - [i83]Florian Tramèr, Pascal Dupré, Gili Rusak, Giancarlo Pellegrino, Dan Boneh:
Ad-versarial: Defeating Perceptual Ad-Blocking. CoRR abs/1811.03194 (2018) - [i82]Edward Chou, Florian Tramèr, Giancarlo Pellegrino, Dan Boneh:
SentiNet: Detecting Physical Attacks Against Deep Learning Systems. CoRR abs/1812.00292 (2018) - [i81]Dan Boneh, Yuval Ishai, Amit Sahai, David J. Wu:
Quasi-Optimal SNARGs via Linear Multi-Prover Interactive Proofs. IACR Cryptol. ePrint Arch. 2018: 133 (2018) - [i80]Dan Boneh, Saba Eskandarian, Ben Fisch:
Post-Quantum Group Signatures from Symmetric Primitives. IACR Cryptol. ePrint Arch. 2018: 261 (2018) - [i79]Dan Boneh, Manu Drijvers, Gregory Neven:
Compact Multi-Signatures for Smaller Blockchains. IACR Cryptol. ePrint Arch. 2018: 483 (2018) - [i78]Dan Boneh, Joseph Bonneau, Benedikt Bünz, Ben Fisch:
Verifiable Delay Functions. IACR Cryptol. ePrint Arch. 2018: 601 (2018) - [i77]Dan Boneh, Darren B. Glass, Daniel Krashen, Kristin E. Lauter, Shahed Sharif, Alice Silverberg, Mehdi Tibouchi, Mark Zhandry:
Multiparty Non-Interactive Key Exchange and More From Isogenies on Elliptic Curves. IACR Cryptol. ePrint Arch. 2018: 665 (2018) - [i76]Dan Boneh, Benedikt Bünz, Ben Fisch:
A Survey of Two Verifiable Delay Functions. IACR Cryptol. ePrint Arch. 2018: 712 (2018) - [i75]Dan Boneh, Benedikt Bünz, Ben Fisch:
Batching Techniques for Accumulators with Applications to IOPs and Stateless Blockchains. IACR Cryptol. ePrint Arch. 2018: 1188 (2018) - [i74]Dan Boneh, Yuval Ishai, Alain Passelègue, Amit Sahai, David J. Wu:
Exploring Crypto Dark Matter: New Simple PRF Candidates and Their Applications. IACR Cryptol. ePrint Arch. 2018: 1218 (2018) - 2017