Identity-based encryption from the Weil pairing D Boneh, M Franklin Annual international cryptology conference, 213-229, 2001 | 14064 | 2001 |
Short signatures from the Weil pairing D Boneh, B Lynn, H Shacham International conference on the theory and application of cryptology and …, 2001 | 4350 | 2001 |
Public key encryption with keyword search D Boneh, G Di Crescenzo, R Ostrovsky, G Persiano Advances in Cryptology-EUROCRYPT 2004: International Conference on the …, 2004 | 4294 | 2004 |
Ensemble adversarial training: Attacks and defenses F Tramèr, A Kurakin, N Papernot, I Goodfellow, D Boneh, P McDaniel arXiv preprint arXiv:1705.07204, 2017 | 3129 | 2017 |
Short group signatures D Boneh, X Boyen, H Shacham Annual international cryptology conference, 41-55, 2004 | 2768 | 2004 |
Aggregate and verifiably encrypted signatures from bilinear maps D Boneh, C Gentry, B Lynn, H Shacham Advances in Cryptology—EUROCRYPT 2003: International Conference on the …, 2003 | 2681 | 2003 |
On the importance of checking cryptographic protocols for faults D Boneh, RA DeMillo, RJ Lipton International conference on the theory and applications of cryptographic …, 1997 | 2493 | 1997 |
Evaluating 2-DNF formulas on ciphertexts D Boneh, EJ Goh, K Nissim Theory of Cryptography: Second Theory of Cryptography Conference, TCC 2005 …, 2005 | 2317 | 2005 |
Efficient selective-ID secure identity-based encryption without random oracles D Boneh, X Boyen Advances in Cryptology-EUROCRYPT 2004: International Conference on the …, 2004 | 2285 | 2004 |
Conjunctive, subset, and range queries on encrypted data D Boneh, B Waters Theory of Cryptography: 4th Theory of Cryptography Conference, TCC 2007 …, 2007 | 1891 | 2007 |
Short signatures without random oracles D Boneh, X Boyen International conference on the theory and applications of cryptographic …, 2004 | 1871 | 2004 |
Hierarchical identity based encryption with constant size ciphertext D Boneh, X Boyen, EJ Goh Annual international conference on the theory and applications of …, 2005 | 1856 | 2005 |
Short signatures from the Weil pairing D Boneh, B Lynn, H Shacham Journal of cryptology 17, 297-319, 2004 | 1811 | 2004 |
Terra: A virtual machine-based platform for trusted computing T Garfinkel, B Pfaff, J Chow, M Rosenblum, D Boneh Proceedings of the nineteenth ACM symposium on Operating systems principles …, 2003 | 1698 | 2003 |
Collusion resistant broadcast encryption with short ciphertexts and private keys D Boneh, C Gentry, B Waters Annual international cryptology conference, 258-275, 2005 | 1457 | 2005 |
The decision diffie-hellman problem D Boneh International algorithmic number theory symposium, 48-63, 1998 | 1437 | 1998 |
On the effectiveness of address-space randomization H Shacham, M Page, B Pfaff, EJ Goh, N Modadugu, D Boneh Proceedings of the 11th ACM conference on Computer and communications …, 2004 | 1344 | 2004 |
Remote timing attacks are practical D Brumley, D Boneh Computer Networks 48 (5), 701-716, 2005 | 1337 | 2005 |
Collusion-secure fingerprinting for digital data D Boneh, J Shaw IEEE Transactions on Information Theory 44 (5), 1897-1905, 1998 | 1310 | 1998 |
Bulletproofs: Short proofs for confidential transactions and more B Bünz, J Bootle, D Boneh, A Poelstra, P Wuille, G Maxwell 2018 IEEE symposium on security and privacy (SP), 315-334, 2018 | 1281 | 2018 |