Dan Boneh [Speaker-Timeline] [Speaker-Links]

Tell us about missing data
Title Conference Tags
Fidelius: Protecting User Secrets from Compromised Browsers IEEESymposium-2019 - San Francisco, US
True2F: Backdoor-Resistant Authentication Tokens IEEESymposium-2019 - San Francisco, US
Compact Multi-Signatures for Smaller Blockchains Asiacrypt2018-2018 - Brisbane, Australia
Threshold Cryptosystems From Threshold Fully Homomorphic Encryption Crypto2018-2018 - Santa Barbara, USA
Verifiable Delay Functions Crypto2018-2018 - Santa Barbara, USA
Quasi-Optimal SNARGs via Linear Multi-Prover Interactive Proofs EuroCryptTelAviv-2018 - Tel Aviv, Israel
Private Puncturable PRFs From Standard Lattice Assumptions EuroCrypt-2017 - paris,france
Lattice-Based SNARGs and Their Application to More Efficient Obfuscation EuroCrypt-2017 - paris,france
Applied crypto: the good, the bad, and the future EuroSP-2017 - paris,france
Prio: Private, Robust, and Scalable Computation of Aggregate Statistics NSDI-2017 - boston,usa
Provisions: Proofs of solvency for cryptocurrencies RWC-2016 - stanford,usa
PowerSpy: Location Tracking Using Mobile Device Power Analysis SecuritySymposium-2015 - washington,USA
Semantically Secure Order-Revealing Encryption: Multi-input Functional Encryption Without Obfuscation EuroCrypt-2015 - Soia,Bulgaria
Hosting Services on an Untrusted Cloud EuroCrypt-2015 - Soia,Bulgaria
Bivariate Polynomials Modulo Composites and their Applications AsiaCrypt-2014 - kaohsiung,taiwan
Password Managers: Attacks and Defenses usenix-2014 - san diego,usa
After Lunch Break Crypto usenix-2014 - san diego,usa
Tick Tock: Building Browser Red Pills from Timing Side Channels Woot-2014 - san diego,usa
Low Overhead Broadcast Encryption from Multilinear Maps crypto-2014 - california,usa
Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation crypto-2014 - california,usa
An Experimental Study of TLS Forward Secrecy Deployment (Slides) w2sp-2014 - California,USA
Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE and Compact Garbled Circuits EuroCrypt-2014 - copenhagen,denmark
New Frontiers in Cryptography Trustycon-2014 - San Francisco,USA
The PRNG Debate RSACon-2014 - San Francisco, USA
Function-Private Subspace-Membership Encryption and Its Applications asiacrypt-2013 - Bengalore,India
Constrained Pseudorandom Functions and Their Applications asiacrypt-2013 - Bengalore,India
The Cryptographers' Panel RSA USA-2013 - San Francisco, USA
Pairing-based Cryptography: Past, Present, and Future ASIACRYPT-2012 - Beijing,China Security
Neuroscience Meets Cryptography: Designing Crypto Primitives Secure Against Rubber Hose Attacks USENIX-2012 - Washington, D.C.
Evading Censorship with Browser-Based Proxies Privacy Enhancing Technologies Symposium-2012 - Vigo, Spain
An Analysis Of Private Browsing Modes In Modern Browsers 19th USENIX Security Symposium-2010 - Washington DC, USA Security Analysis
The Case For Ubiquitous Transport-Level Encryption 19th USENIX Security Symposium-2010 - Washington DC, USA Security
Busting Frame Busting: A Study Of Clickjacking Vulnerabilities On Popular Sites (Invited Talk) 4th USENIX Workshop on Offensive Technologies -2010 - Washington DC, USA Security
Framing Attacks On Smart Phones And Dumb Routers: Tap-Jacking And Geo-Localization Attacks 4th USENIX Workshop on Offensive Technologies -2010 - Washington DC, USA Security
Webseclab Security Education Workbench 3rd Workshop on Cyber Security Experimentation and Test -2010 - Washington DC, USA Security
Kartograph : Finding A Needle In A Haystack Or How To Apply Reverse Engineering Techniques To Cheat Atvideo Games DEF CON-18 - Las Vegas, USA Security
Embedded Management Interfaces: Emerging Massive Insecurity Blackhat USA-2009 - Las Vegas, USA Security
Cryptographic Keys 17th USENIX Security Symposium-2008 - San Jose, USA Security
Transaction Generators: Root Kits For Web 2nd USENIX Workshop on Hot Topics in Security-2007 - Boston, USA Security
Sane: A Protection Architecture For Enterprise Networks 15th USENIX Security Symposium-2006 - Vancouver, Canada Security
Stronger Password Authentication Using Browser Extensions 14th USENIX Security Symposium-2005 - Baltimore, USA Security Browser
Remote Timing Attacks Are Practical 12th USENIX Security Symposium-2003 - Washington DC, USA Security
The Road Less Traveled 12th USENIX Security Symposium-2003 - Washington DC, USA Security
Keynote:Recent Crypto Attacks and a New Approach to PKI First-2002 - Waikoala Village,Hawaii
A Method For Fast Revocation Of Public Key Certificates And Security Capabilities 10th USENIX Security Symposium-2001 - Washington DC, USA Security Privacy
Building Intrusion-Tolerant Applications 8th USENIX Security Symposium-1999 - Washington DC, USA Security