Last updated: Aug 2018. For an up to date list please see DBLP or Google scholar.
See also Publications by Topic
Books and survey papers
-
A Graduate Course in Applied Cryptography.
by D. Boneh and Victor ShoupAvailable at cryptobook.us -
Twenty years of attacks on the RSA cryptosystem.
by
D. Boneh
Notices of the American Mathematical Society (AMS), Vol. 46, No. 2, pp. 203-213, 1999
-
The decision Diffie-Hellman problem.
by
D. Boneh
In Proceedings of the Third Algorithmic Number Theory Symposium,
Lecture Notes in Computer Science, Vol. 1423, Springer-Verlag, pp. 48--63, 1998 -
A Survey of Two Signature Aggregation Techniques.
by D. Boneh, C. Gentry, B. Lynn, and H. ShachamIn CryptoBytes Vol. 6, No. 2, 2003Full paper: pdf
Research papers: cryptography and computer security
The list below contains some of my publications on cryptography and computer security.-
Threshold Cryptosystems From Threshold Fully Homomorphic Encryption.
by D. Boneh, R. Gennaro, S. Goldfeder, A. Jain, S. Kim, P. Rasmussen, and A. SahaiIn proceedings of Crypto 2018, pp. 565-596.Full paper: pdf -
Multiparty Non-Interactive Key Exchange and More From Isogenies on Elliptic Curves.
by D. Boneh, D. Glass, D. Krashen, K. Lauter, S. Sharif, A. Silverberg, M. Tibouchi, and M. ZhandryIn proceedings of MathCrypt 2018Full paper: pdf -
A Survey of Two Verifiable Delay Functions.
by D. Boneh, B. Bünz, and B. FischCryptology ePrint Archive: Report 2018/712Full paper: pdf -
Verifiable Delay Functions.
by D. Boneh, J. Bonneau, B. Bünz, and B. FischIn proceedings of Crypto 2018, pp. 757-788.Full paper: pdf -
Quasi-Optimal SNARGs via Linear Multi-Prover Interactive Proofs.
by D. Boneh, Y. Ishai, A. Sahai, and D. WuIn proceedings of Eurocrypt 2018, pp. 222-255.Full paper: pdf -
Compact Multi-Signatures for Smaller Blockchains..
by D. Boneh, M. Drijvers, and G. NevenTo appear in Asiacrypt 2018Full paper: pdf -
BLS Multi-Signatures With Public-Key Aggregation.
by D. Boneh, M. Drijvers, and G. Nevenweb noteFull paper: html -
Bulletproofs: Efficient Range Proofs for Confidential Transactions.
by B. Bünz, J. Bootle, D. Boneh, A. Poelstra, P. Wuille, and G. MaxwellIn proceedings of the IEEE S&P conference, Oakland 2018.Full paper: pdf -
Prio: Private, Robust, and Scalable Computation of Aggregate Statistics.
by H. Corrigan-Gibbs and D. BonehIn proceedings of NSDI 2017, pp. 76-81.Full paper: pdf -
Constrained Keys for Invertible Pseudorandom Functions.
by D. Boneh, S. Kim, and D. WuIn proceedings of TCC 2017, pp. 237-263.Full paper: pdf -
Private Puncturable PRFs From Standard Lattice Assumptions.
by D. Boneh, S. Kim, and H. MontgomeryIn proceedings of Eurocrypt 2017, pp. 415-445.Full paper: pdf -
Constraining Pseudorandom Functions Privately.
by D. Boneh, K. Lewi, and D. WuIn proceedings of PKC 2017, pp. 494-524.Full paper: pdf -
Lattice-Based SNARGs and Their Application to More Efficient Obfuscation.
by D. Boneh, Y. Ishai, A. Sahai, and D. WuIn proceedings of Eurocrypt 2017, pp. 247-277.Full paper: pdf -
Deriving Genomic Diagnoses Without Revealing Patient Genomes.
by K. Jagadeesh, D. Wu, J. Birgmeier, D. Boneh, and G. BejeranoScience, vol. 357, no. 6352, 2017, pp. 692-695.Full paper: pdf -
Trust but Verify: Auditing the Secure Internet of Things.
by J. Wilson, R. Wahby, H. Corrigan-Gibbs, D. Boneh, P. Levis, and K. WinsteinIn proceedings of Mobisys 2017, pp. 464-474.Full paper: pdf -
Quantum Operating Systems.
by H. Corrigan-Gibbs, D. Wu, and D. BonehIn proceedings of HotOS 2017, pp. 76-81.Full paper: pdf -
IRON: Functional Encryption using Intel SGX.
by B. Fisch, D. Vinayagamurthy, D. Boneh, and S. GorbunovIn proceedings of ACM CCS 2017, pp. 765-782.Full paper: pdf -
Surnaming Schemes, Fast Verification,and Applications to SGX Technology.
by D. Boneh and S. GueronIn proceedings of RSA-CT 2017, pp. 149-164.Full paper: pdf -
Lattice-Based DAPS and Generalizations: Self-enforcement in Signature Schemes.
by D. Boneh, S. Kim, and V. NikolaenkoIn proceedings of ACNS 2017, pp. 457-477.Full paper: pdf -
T/Key: Second-Factor Authentication From Secure Hash Chains.
by D. Kogan, N. Manohar, and D. BonehIn proceedings of ACM CCS 2017, pp. 983-999.Full paper: pdf -
Balloon Hashing: A Memory-Hard Function Providing Provable Protection Against Sequential Attacks.
by D. Boneh, H. Corrigan-Gibbs, and S. SchechterIn proceedings of ASIACRYPT 2016, pp. 220-248.Full paper: pdf -
5Gen: A Framework for Prototyping Applications Using Multilinear Maps and Matrix Branching Programs.
by K. Lewi, A. Malozemoff, D. Apon, B. Carmer, A. Foltzer, D. Wagner, D. Archer, D. Boneh, J. Katz, and M. RaykovaIn proceedings of ACM CCS 2016, pp. 981-992.Full paper: pdf -
Privacy, Discovery, and Authentication for the Internet of Things.
by D. Wu, A. Taly, A. Shankar, and D. BonehIn proceedings of ESORICS 2016, pp. 301-319.Full paper: pdf -
Cryptographically Enforced Control Flow Integrity.
by A. Mashtizadeh, A. Bittau, D. Mazières, and D. BonehIn proceedings of ACM CCS 2015, pp. 941-951.Full paper: pdf -
Provisions: Privacy-preserving Proofs of Solvency for Bitcoin Exchanges.
by G. Dagher, B. Bünz, J. Bonneau, J. Clark, and D. BonehIn proceedings ACM CCS 2015, pp. 720-731.Full paper: pdf -
Semantically Secure Order-Revealing Encryption: Multi-input Functional Encryption Without Obfuscation.
by D. Boneh, K. Lewi, M. Raykova, A. Sahai, M. Zhandry, and J. ZimmermanIn proceedings of Eurocrypt 2015, LNCS 9057, pp. 563-594Full paper: pdf -
Hosting Services on an Untrusted Cloud.
by D. Boneh, D. Gupta, I. Mironov, and A. SahaiIn proceedings of Eurocrypt 2015, LNCS 9057, pp. 404-436Full paper: pdf -
Riposte: An Anonymous Messaging System Handling Millions of Users.
by H. Corrigan-Gibbs, D. Boneh, and D. MazièresIEEE Symposium on Security and Privacy 2015, pp. 321-338.Full paper: pdf -
Stickler: Defending Against Malicious CDNs in an Unmodified Browser.
by A. Levy, H. Corrigan-Gibbs, and D. BonehIn IEEE Security & Privacy, Vol. 14, number 2, pp. 22-28, 2016. Extended abstract in proceedings of W2SP 2015Full paper: pdf -
PowerSpy: Location Tracking using Mobile Device Power Analysis.
by Y. Michalevsky, G. Nakibly, A. Schulman, and D. BonehIn proceedings of USENIX Security 2015, pp. 785-800.Full paper: pdf -
Bivariate Polynomials Modulo Composites and Their Applications.
by D. Boneh and H. Corrigan-GibbsIn proceedings of Asiacrypt 2014, LNCS 8873, pp. 42-62Full paper: pdf -
Immunizing Multilinear Maps Against Zeroizing Attacks.
by D. Boneh, D. Wu, and J. ZimmermanCryptology ePrint Archive, Report 2014/930Full paper: pdf -
Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation.
by D. Boneh and M. ZhandryIn Algorithmica vol. 79, no. 4, pp. 1233-1285, 2017. Extended abstract in Crypto 2014, LNCS 8616, pp. 480-499.Full paper: pdf -
Low Overhead Broadcast Encryption from Multilinear Maps.
by D. Boneh, B. Waters, and M. ZhandryIn proceedings Crypto 2014, LNCS 8616, pp. 206-223.Full paper: pdf -
Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE and Compact Garbled Circuits.
by D. Boneh, C. Gentry, S. Gorbunov, S. Halevi, V. Nikolaenko, G. Segev, V. Vaikuntanathan, and D. VinayagamurthyIn proceedings of Eurocrypt 2014, LNCS 8441, pp. 533-556.Full paper: pdf -
Differing-Inputs Obfuscation and Applications.
by P. Ananth, D. Boneh, S. Garg, A. Sahai, and M. ZhandryCryptology ePrint Archive: Report 2013/689Full paper: pdf -
Constrained Pseudorandom Functions and Their Applications.
by D. Boneh and B. WatersIn proceedings of Asiacrypt 2013, LNCS 8270, pp. 280-300.Full paper: pdf -
Gyrophone: Recognizing Speech From Gyroscope Signals.
by Y. Michalevsky, G. Nakibly, and D. BonehIn proceedings of Usenix Security 2014Full paper: pdf -
Password Managers: Attacks and Defenses.
by D. Silver, S. Jana, D. Boneh, E. Chen, and C. JacksonTo appear at Usenix Security 2014 -
Tick Tock: Building Browser Red Pills from Timing Side Channels.
by G. Ho, D. Boneh, L. Ballard, and N. ProvostTo appear at Usenix WOOT 2014Full paper: pdf -
Hacking Blind.
by A. Bittau, A. Belay, A. Mashtizadeh, D. Mazières, and D. BonehIn proceedings of the IEEE S&P conference, Oakland 2014.Full paper: pdf -
An Experimental Study of TLS Forward Secrecy Deployments.
by L.S. Huang, S. Adhikarla, D. Boneh, and C. JacksonIn proceedings of W2SP 2014
IEEE Internet Computing 18(6): 43-51 (2014)Full paper: pdf -
OSS: Using Online Scanning Services for Censorship Circumvention.
by D. Fifield, G. Nakibly, and D. BonehFull paper: pdf@inproceedings{FNB13, author = {David Fifield and Gabi Nakibly and Dan Boneh}, title = {OSS: Using Online Scanning Services for Censorship Circumvention}, booktitle = {Privacy Enhancing Technologies}, year = {2013}, pages = {185-204}, series = {{LNCS}}, volume = 7981 } -
Function-Private Subspace-Membership Encryption and Its Applications.
by D. Boneh, A. Raghunathan, and G. SegevIn Proceedings of Asiacrypt 2013.Full paper: PDF -
Key Homomorphic PRFs and Their Applications.
by D. Boneh, K. Lewi, H. Montgomery, and A. RaghunathanIn Proceedings of Crypto 2013, pp. 410-428. [BIBTEX]Full paper: pdf@inproceedings{BLMR13, author = {Dan Boneh and Kevin Lewi and Hart William Montgomery and Ananth Raghunathan}, title = {Key Homomorphic PRFs and Their Applications}, booktitle = {Proc. of Crypto}, series = {{LNCS}}, volume = 8043 year = {2013}, pages = {410-428} } -
Function-Private Identity-Based Encryption: Hiding the Function in Functional Encryption.
by D. Boneh, A. Raghunathan, and G. SegevIn Proceedings of Crypto 2013, pp. 461-478. [BIBTEX]Full paper: PDF@inproceedings{BRS13, author = {Dan Boneh and Ananth Raghunathan and Gil Segev}, title = {Function-Private Identity-Based Encryption: Hiding the Function in Functional Encryption}, booktitle = {Proc. of Crypto}, series = {{LNCS}}, volume = 8043 year = {2013}, pages = {461-478}, } -
Secure Signatures and Chosen Ciphertext Security in a Quantum Computing World.
by D. Boneh and M. ZhandryIn Proceedings of Crypto 2013, pp. 461-478. [BIBTEX]Full paper: pdf@inproceedings{BZ13b, author = {Dan Boneh and Mark Zhandry}, title = {Secure Signatures and Chosen Ciphertext Security in a Quantum Computing World}, booktitle = {Proc. of Crypto}, series = {{LNCS}}, volume = 8043 year = {2013}, pages = {361-379} } -
Message-Locked Encryption for Lock-Dependent Messages.
by M. Abadi, D. Boneh, I. Mironov, A. Raghunathan, and G. SegevIn Proceedings of Crypto 2013, pp. 374-391. [BIBTEX]Full paper: PDF@inproceedings{ABMRS13, author = {Mart\'{\i}n Abadi and Dan Boneh and Ilya Mironov and Ananth Raghunathan and Gil Segev}, title = {Message-Locked Encryption for Lock-Dependent Messages}, booktitle = {Proc. of Crypto}, series = {{LNCS}}, volume = 8043 year = {2013}, pages = {374-391} } -
A Note on Barrington's Theorem.
by
D. Boneh
web noteFull paper: html
-
Ensuring high-quality randomness in cryptographic key generation.
by H. Corrigan-Gibbs, W. Mu, D. Boneh, and B. FordIn Proceedings of ACM CCS 2013, pp. 685-696. [BIBTEX]Full paper: PDF@inproceedings{CMBF13, author = {Henry Corrigan-Gibbs and Wendy Mu and Dan Boneh and Bryan Ford}, title = {Ensuring high-quality randomness in cryptographic key generation}, booktitle = {ACM Conference on Computer and Communications Security}, year = {2013}, pages = {685-696} } -
Privacy-preserving matrix factorization.
by V. Nikolaenko, S. Ioannidis, U. Weinsberg, M. Joye, N. Taft, and D. BonehIn Proceedings of ACM CCS 2013, pp. 801-812. [BIBTEX]Full paper: PDF@inproceedings{NIWJTB13, author = {Valeria Nikolaenko and Stratis Ioannidis and Udi Weinsberg and Marc Joye and Nina Taft and Dan Boneh}, title = {Privacy-preserving matrix factorization}, booktitle = {ACM Conference on Computer and Communications Security}, year = {2013}, pages = {801-812}, } -
Privacy-Preserving Ridge Regression on Hundreds of Millions of Records.
by V. Nikolaenko, U. Weinsberg, S. Ioannidis, M. Joye, D. Boneh, and N. TaftIn Proceedings of IEEE Symposium on Security and Privacy 2013, pp. 334-348. [BIBTEX]Full paper: PDF@inproceedings{NWIJBT13, author = {Valeria Nikolaenko and Udi Weinsberg and Stratis Ioannidis and Marc Joye and Dan Boneh and Nina Taft}, title = {Privacy-Preserving Ridge Regression on Hundreds of Millions of Records}, booktitle = {IEEE Symposium on Security and Privacy}, year = {2013}, pages = {334-348} } -
Private Database Queries Using Somewhat Homomorphic Encryption.
by D. Boneh, C. Gentry, S. Halevi, F. Wang, and D. WuIn Proceedings of ACNS '13, Lecture Notes in Computer Science, Vol. 7954, Springer-Verlag, pp. 102-118, 2013Full paper: PDF -
Quantum-Secure Message Authentication Codes.
by D. Boneh and M. ZhandryIn proc. of Eurocrypt 2013, LNCS 7881, pp. 592-608. [BIBTEX]Full paper: pdf@inproceedings{BZ13, author = {Dan Boneh and Mark Zhandry}, title = {Quantum-Secure Message Authentication Codes}, booktitle = {Proc. of Eurocrypt}, year = {2013}, pages = {592-608}, series = {{LNCS}}, volume = 7881 } -
Neuroscience Meets Cryptography:
Designing Crypto Primitives Secure Against Rubber Hose Attacks.
by H. Bojinov, D. Sanchez, P. Reber, D. Boneh, and P. LincolnIn proceedings of Usenix security 2012. -
Evading Censorship with Browser-Based Proxies.
by D. Fifield, N. Hardison, J. Ellithorpe, E. Stark, D. Boneh, R. Dingledine, and P. PorrasIn proceedings of PETS 2012, LNCS 7384, pp. 239-258, 2012.Full paper: pdf -
The most dangerous code in the world: validating SSL certificates in non-browser software.
by M. Georgiev, S. Iyengar, S. Jana, R. Anubhai, D. Boneh, and V. ShmatikovIn proceedings of ACM CCS '12, pp. 38-49, 2012 [BIBTEX]Full paper: pdf@inproceedings{GIJABS12, author = {Martin Georgiev and Subodh Iyengar and Suman Jana and Rishita Anubhai and Dan Boneh and Vitaly Shmatikov}, title = {The most dangerous code in the world: validating SSL certificates in non-browser software}, booktitle = {ACM Conference on Computer and Communications Security}, year = {2012}, pages = {38-49} } -
StegoTorus: a camouflage proxy for the Tor anonymity system.
by Z. Weinberg, J. Wang, V. Yegneswaran, L. Briesemeister, S. Cheung, F. Wang, and D. BonehIn proceedings of ACM CCS '12, pp. 109-120, 2012 [BIBTEX]@inproceedings{stegotorus, author = {Zachary Weinberg and Jeffrey Wang and Vinod Yegneswaran and Linda Briesemeister and Steven Cheung and Frank Wang and Dan Boneh}, title = {StegoTorus: a camouflage proxy for the Tor anonymity system}, booktitle = {ACM Conference on Computer and Communications Security}, year = {2012}, pages = {109-120} } -
Who Killed My Battery: Analyzing Mobile Browser Energy Consumption.
by N. Thiagarajan, G. Aggarwal, A. Nicoara, D. Boneh, and J. SinghIn Proceedings of the 21st International World Wide Web conference (WWW), 2012, ACM Press, pp. 41-50.Full paper: pdf -
SessionJuggler: Secure Web Login From an Untrusted Terminal Using Session Hijacking.
by E. Bursztein, C. Soman, D. Boneh, and J. MitchellIn Proceedings of the 21st International World Wide Web conference (WWW), 2012, ACM Press, pp. 321-330.Full paper: pdf -
Targeted malleability: homomorphic encryption for restricted computations.
by D. Boneh, G. Segev, and B. WatersIn proceedings of Innovations in Theoretical Computer Science (ITCS), ACM, 2012, pp.350-366. [BIBTEX]Full paper: pdf@inproceedings{BSW12, author = {Dan Boneh and Gil Segev and Brent Waters}, title = {Targeted Malleability: Homomorphic Encryption for Restricted Computations}, howpublished = {Proc. of ITCS} year = {2012}, pages = {350-366}, note = {\url{http://eprint.iacr.org/2011/311}}, } -
Towards Short-Lived Certificates.
by E. Topalovic, B. Saeta, L.S. Huang, C. Jackson, and D. BonehIn proceedings of IEEE Oakland Web 2.0 Security and Privacy (W2SP 2012).Full paper: pdf. -
The case for prefetching and prevalidating TLS server certificates.
by E. Stark, L.S. Huang, D. Israni, C. Jackson, and D. BonehIn proceedings of the 19th Annual Network & Distributed System Security Conference (NDSS 2012)Full paper: pdf. -
Persistent OSPF Attacks.
by G. Nakibly, A. Kirshon, D. Gonikman, and D. BonehIn proceedings of the 19th Annual Network & Distributed System Security Conference (NDSS 2012)Full paper: pdf. -
Random Oracles in a Quantum World.
by D. Boneh, Ö. Dagdelen, M. Fischlin, A. Lehmann, C. Schaffner, and M. ZhandryIn proceedings of Asiacrypt 2011, LNCS 7073, pp. 41-69, 2011. [BIBTEX]Full paper: pdf@inproceedings{BDFLSZ11, author = {D. Boneh and {\"O}zg{\"u}r Dagdelen and Marc Fischlin and Anja Lehmann and Christian Schaffner and Mark Zhandry}, title = {Random Oracles in a Quantum World}, booktitle = {Proc. of Asiacrypt 2011}, series = {{LNCS}}, pages = {41-69}, number = {7073}, year = {2011} } -
OpenConflict: preventing real time map hacks in online games.
by E. Bursztein, M. Hamburg, J. Lagarenne, and D. BonehIn proceedings of the 2011 IEEE Oakland Security and Privacy conference, pp. 506-522 [BIBTEX]Full paper: pdf.@inproceedings{BHLB11, author = {Elie Bursztein and Mike Hamburg and Jocelyn Lagarenne and Dan Boneh}, title = {OpenConflict: Preventing Real Time Map Hacks in Online Games}, year = 2011, booktitle = {Proc. of IEEE Security and Privacy} } -
Homomorphic Signatures for Polynomial Functions.
by D. Boneh and D. FreemanIn proceedings of Eurocrypt 2011, LNCS 6632, pp. 149-168, 2011. [BIBTEX]Full paper: pdf@misc{BF11ec, author = {Dan Boneh and David Freeman}, title = {Homomorphic Signatures for Polynomial Functions}, booktitle = {Proc. of Eurocrypt'11}, year = {2011}, series = {{LNCS}}, pages = {149-168} } -
Functional encryption: definitions and challenges.
by D. Boneh, A. Sahai, and B. WatersIn proceedings of TCC'11, LNCS 6597, pp. 253-273.Full paper: pdf -
Computing on Authenticated Data.
by J.H. Ahn, D. Boneh, J. Camenisch, S. Hohenberger, A. Shelat, and B. WatersFull paper: pdf@inproceedings{quoting, author = {Jae Hyun Ahn and Dan Boneh and Jan Camenisch and Susan Hohenberger and Abhi Shelat and Brent Waters}, title = {Computing on Authenticated Data}, booktitle = {Proc. of {TCC}}, series = {{LNCS}}, number = 7194, year = {2012}, note = {\url{http://eprint.iacr.org/2011/096}}, } -
Linearly homomorphic signatures over binary fields and new tools for lattice-based signatures.
by D. Boneh and D. FreemanIn proceedings of PKC'11, LNCS 6571, pp. 1-16.Full paper: pdf -
Location privacy via private proximity testing.
by A. Narayanan, N. Thiagarajan, M. Lakhani, M. Hamburg, and D. BonehIn proceedings of NDSS 2011.Full paper: pdf -
Algebraic pseudorandom functions with improved efficiency from
the augmented cascade.
by D. Boneh, H. Montgomery, and A. RaghunathanIn proceedings of the 17'th ACM conference on Computer and Communications Security (CCS), 2010. [BIBTEX]Full paper: pdf@inproceedings{BMR10, author = {Dan Boneh and Hart Montogomery and Ananth Raghunathan}, title = {Algebraic Pseudorandom Functions with Improved Efficiency from the Augmented Cascade}, year = 2010, booktitle = {Proc. of ACM CCS'10} } -
Lattice basis delegation in fixed dimension and shorter ciphertext hierarchical IBE.
by S. Agrawal, D. Boneh, and X. BoyenIn proceedings of Crypto 2010, LNCS 6223, pp. 98-115, 2010 [BIBTEX]Full paper: pdf@inproceedings{ABB10b, author = {Shweta Agrawal and Dan Boneh and Xavier Boyen}, title = {Lattice Basis Delegation in Fixed Dimension and Shorter Ciphertext Hierarchical IBE}, year = 2010, booktitle = {Proc. of Crypto'10}, pages = {98-115}, series = {LNCS}, volume = 6223 } -
Efficient lattice (H)IBE in the standard model.
by S. Agrawal, D. Boneh, and X. BoyenIn proceedings of Eurocrypt 2010, LNCS 6110, pp. 553-572, 2010. [BIBTEX]@inproceedings{ABB10a, author = {Shweta Agrawal and Dan Boneh and Xavier Boyen}, title = {Efficient Lattice {(H)IBE} in the Standard Model}, year = 2010, booktitle = {Proc. of Eurocrypt'10}, series = {LNCS}, volume = 6110, pages = {553-572} } -
An analysis of private browsing modes in modern browsers.
by G. Aggarwal, E. Bursztein, C. Jackson, and D. BonehIn proceedings of Usenix Security 2010. [BIBTEX]Full paper: pdf@inproceedings{ABBJ10, author = {Gaurav Aggrawal and Elie Bursztein and Collin Jackson and Dan Boneh}, title = {An analysis of private browsing modes in modern browsers}, year = 2010, booktitle = {Proc. of 19th Usenix Security Symposium} } -
The case for ubiquitous transport-level encryption.
by A. Bittau, M. Hamburg, M. Handley, D. Mazières, and D. BonehIn proceedings of Usenix Security 2010.Full paper: pdf -
Framing attacks on smart phones and dumb routers:
tap-jacking and geo-localization attacks.
by G. Rydstedt, B. Gourdin, E. Bursztein, and D. BonehFull paper: pdf@inproceedings{framebustmobile, author = {Gustav Rydstedt and Baptiste Gourdin and Elie Bursztein and Dan Boneh}, title = {Framing Attacks on Smart Phones and Dumb Routers: Tap-jacking and Geo-localization Attacks}, year = 2010, booktitle = {Proc. of the Usenix workshop on offensive technology (wOOt)} } -
Busting frame busting: a study of clickjacking vulnerabilities at popular sites.
by G. Rydstedt, E. Bursztein, D. Boneh, and C. JacksonIn proceedings of IEEE Oakland Web 2.0 Security and Privacy (W2SP 2010).Full paper: pdf -
Kamouflage: loss-resistant password management.
by H. Bojinov, E. Bursztein, X. Boyen, and D. BonehIn proceedings of ESORICS 2010. [BIBTEX]Full paper: pdf@inproceedings{passwordmgr, author = {Hristo Bojinov and Elie Bursztein and Xavier Boyen and Dan Boneh}, title = {Kamouflage: Loss-Resistant Password Management}, year = 2010, booktitle = {Proc. of ESORICS'10} } -
Finding composite order ordinary elliptic curves using the Cocks-Pinch method.
by D. Boneh, K. Rubin, and A. SilverbergJournal of Number Theory, Vol. 131 (5), 2011, pp. 832-841. [BIBTEX]Full paper: pdf@article{BRS11, author = {Dan Boneh and Karl Rubin and Alice Silverberg}, title = {Finding composite order ordinary elliptic curves using the Cocks-Pinch method}, journal = {Journal of Number Theory}, volume = 131, number = 5, year = 2011, pages = {832-841}, note = {Cryptology ePrint Archive, Report 2009/533} } -
Privacy preserving targeted advertising.
by V. Toubiana, A. Narayanan, D. Boneh, H. Nissenbaum, and S. BarocasIn proceedings of NDSS 2010.Full paper: pdf -
XCS: cross channel scripting and its impact on web applications.
by H. Bojinov, E. Bursztein, and D. BonehIn proceedings of the 16'th ACM conference on Computer and Communications Security (CCS), 2009.Full paper: pdf -
Fast symmetric cryptography in Javascript.
by E. Stark, M. Hamburg, and D. BonehIn proceedings of ACSAC 2009.Full paper: pdf -
Preventing pollution attacks in multi-source network coding.
by S. Agrawal, D. Boneh, X. Boyen, and D. FreemanIn proceedings of PKC 2010.Full paper: pdf -
Signing a Linear Subspace: Signature Schemes for Network Coding.
by D. Boneh, D. Freeman, J. Katz, and B. WatersIn proceedings of PKC 2009, LNCS 5443, pp. 68-87.Full paper: pdf -
Homomorphic MACs: MAC-Based Integrity for Network Coding.
by S. Agrawal and D. BonehIn proceedings of ACNS 2009, LNCS 5536, pp. 292-305Full paper: pdf -
Circular-Secure Encryption from Decision Diffie-Hellman.
by D. Boneh, S. Halevi, M. Hamburg, and R. OstrovskyIn proceedings of Crypto 2008, LNCS 5157, pp. 108-125.Full paper: pdf -
On The Impossibility of Basing Identity Based Encryption on Trapdoor Permutations.
by D. Boneh, A. Papakonstantinou, C. Rackoff, Y. Vahlis, and B. WatersIn proceedings of FOCS 2008, pp. 283-292 -
Generalized Identity Based and Broadcast Encryption Schemes.
by D. Boneh and M. HamburgIn proceedings of Asiacrypt 2008, LNCS 5350, pp. 455-470 -
Traitor Tracing with Constant Size Ciphertext.
by D. Boneh and M. NaorIn proceedings of the 15'th ACM conference on Computer and Communications Security (CCS), pp. 455-470, 2008.Full paper: pdf -
Space-Efficient Identity Based Encryption Without Pairings.
by D. Boneh, C. Gentry, and M. HamburgIn proceedings of FOCS 2007, pp. 647-657, 2007Full paper: pdf -
Protecting Browsers from DNS Rebinding Attacks.
by C. Jackson, A. Barth, A. Bortz, W. Shao, and D. BonehACM Transactions on the Web (TWEB), Vol. 3(1), 2009,
extended abstract in proceedings of the 14'th ACM conference on Computer and Communications Security (CCS), pp. 421-431, 2007Full paper: pdf -
Overshadow: A Virtualization-Based Approach to Retrofitting Protection
in Commodity Operating Systems.
by M. Chen, P. Subrahmanyam, C. Waldspurger, E. C. Lewis, Tal Garfinkel, D. Boneh, D. Ports, and J. DwoskinIn proceedings of ACM ASPLOS 2008, pp. 2-13Full paper: pdf -
Transaction Generators: Root Kits for the Web.
by C. Jackson, D. Boneh, and J. MitchellIn proceedings of the 2nd USENIX Workshop on Hot Topics in Security, 2007Full paper: pdf -
Reducing Shoulder-surfing by Using Gaze-based Password Entry.
by M. Kumar, Tal Garfinkel, D. Boneh, and T. WinogradIn proceedings of the 2007 Symposium On Usable Privacy and Security (SOUPS)Full paper: pdf -
Private Web Search.
by F. Saint-Jean, A. Johnson, D. Boneh, and J. FeigenbaumIn proceedings of the 6th ACM Workshop on Privacy in the Electronic Society (WPES) 2007Full paper: pdf -
Covert Channels in Privacy-Preserving Identification Systems.
by D. Bailley, D. Boneh, E. Goh, and A. JuelsIn proceedings of the 14'th ACM conference on Computer and Communications Security (CCS), pp. 297-306, 2007 -
Public Key Encryption That Allows PIR Queries.
by D. Boneh, E. Kushilevitz, R. Ostrovsky, and W. SkeithIn proceedings of Crypto 2007, LNCS 4622, pp. 50-67, 2007 -
Geoencryption using Loran.
by D. Qiu, S. Lo, P. Enge, and D. BonehIn proceedings of the 2007 National Technical Meeting of the Institute of Navigation, pp. 104-115, 2007Full paper: pdf -
Exposing private information by timing web applications.
by A. Bortz, D. Boneh, and P. NandyIn proceedings of the 16th International Conference on World Wide Web, WWW 2007, ACM 2007, pp. 621-628Full paper: pdf -
Cryptographic Methods for Storing Ballots on a Voting Machine.
by J. Bethencourt, D. Boneh, and B. WatersIn proceedings of the 14th Annual Network & Distributed System Security Conference (NDSS 2007)Full paper: pdf -
Conjunctive, subset, and range queries on encrypted data.
by D. Boneh and B. WatersIn proceedings of TCC'07, LNCS 4392, pp. 535-554, 2007Full paper: pdf -
On the impossibility of efficiently combining collision resistant
hash functions.
by D. Boneh and X. BoyenIn proceedings of Crypto '06, LNCS 4117, pp. 570-583, 2006Full paper: pdf -
A collusion resistant broadcast, trace and revoke system.
by D. Boneh and B. WatersIn proceedings of ACM CCS '06, pp. 211-220, 2006Full paper: pdf -
Secure function evaluation with ordered binary decision diagrams.
by L. Kruger, S. Jha, E. Goh, and D. BonehIn proceedings of the ACM Conference on Computer and Communications Security (CCS) 2006, pp. 410-420 -
SANE: A protection architecture for enterprise networks.
by M. Casado, Tal Garfinkel, A. Akella, M. Freedman, D. Boneh, N. McKeown, and S. ShenkerIn proceedings of Usenix Security '06, pp. 137-151, 2006Full paper: pdf -
Fully Collusion Resistant Traitor Tracing With Short Ciphertexts and Private Keys.
by D. Boneh, A. Sahai, and B. WatersIn proceedings of Eurocrypt '06, LNCS 4004, 2006, pp. 573-592Full paper: pdf -
Protecting Browser State from Web Privacy Attacks.
by C. Jackson, A. Bortz, D. Boneh, and J. MitchellIn Proceedings of the 15th International Conference on World Wide Web, WWW '06, ACM Press, pp. 737-744Full paper: pdf -
Strongly Unforgeable Signatures Based on Computational Diffie-Hellman.
by D. Boneh, E. Shen, and B. WatersIn proceedings of PKC '06, LNCS 3958, pp. 229-240, 2006Full paper: pdf -
Private encrypted content distribution using private broadcast encryption.
by A. Barth, D. Boneh, and B. WatersIn proceedings of Financial Crypto (FC) '06, 2006, LNCS 4107, pp. 52-64Full paper: html -
Stronger Password Authentication Using Browser Extensions.
by B. Ross, C. Jackson, N. Miyake, D. Boneh, and J. MitchellIn proceedings of Usenix security 2005Full paper: pdf -
Chosen Ciphertext Secure Public Key Threshold Encryption Without Random Oracles.
by D. Boneh, X. Boyen, and S. HaleviIn proceedings of RSA-CT '06, LNCS 3860, pp. 226-243, 2006Full paper: pdf -
Chosen-Ciphertext Security from Identity-Based Encryption.
by D. Boneh, R. Canetti, S. Halevi, and J. KatzSIAM J. of Computing (SICOMP), Volume 36, Issue 5, pp. 915-942, 2006Full paper: pdf -
Collusion Resistant Broadcast Encryption With Short Ciphertexts
and Private Keys.
by D. Boneh, C. Gentry, and B. WatersIn proceedings of Crypto '05, LNCS 3621, pp. 258-275, 2005Full paper: pdf -
Hierarchical Identity Based Encryption with Constant Size Ciphertext.
by D. Boneh, E. Goh, and X. BoyenIn proceedings of Eurocrypt '05, LNCS 3493, pp. 440-456Full paper: pdf -
Evaluating 2-DNF Formulas on Ciphertexts.
by D. Boneh, E. Goh, and K. NissimIn proceedings of Theory of Cryptography (TCC) '05, LNCS 3378, pp. 325-341, 2005Full paper: pdf -
Improved Efficiency for CCA-Secure Cryptosystems Built Using
Identity Based Encryption.
by D. Boneh and J. KatzIn proceedings of RSA-CT '05, LNCS 3376, pp. 87-103, 2005Full paper: pdf -
Group Signatures with Verifier-Local Revocation.
by D. Boneh and H. ShachamIn proceedings of the 11'th ACM conference on Computer and Communications Security (CCS), pp. 168-177, 2004Full paper: pdf -
On the Effectiveness of Address-Space Randomization.
by H. Shacham, M. Page, B. Pfaff, E. Goh, N. Modadugu, and D. BonehIn proceedings of the 11'th ACM conference on Computer and Communications Security (CCS), pp. 298-307, 2004Full paper: pdf -
Short Group Signatures.
by D. Boneh, X. Boyen, and H. ShachamIn proceedings of Crypto '04, LNCS 3152, pp. 41-55, 2004Full paper: pdf -
Secure Identity Based Encryption Without Random Oracles.
by D. Boneh and X. BoyenIn proceedings of Crypto '04, LNCS 3152, 2004Full paper: pdf -
Efficient Selective Identity-Based Encryption Without Random Oracles.
by D. Boneh and X. BoyenJournal of Cryptology (JOC), 24 (4):659-693, 2011.
Extended abstract in proceedings of Eurocrypt 2004, LNCS 3027, pp. 223-238, 2004 [BIBTEX]Full paper: pdf@article{BF04, author = {Dan Boneh and Xavier Boyen}, title = {Efficient Selective Identity-Based Encryption Without Random Oracles}, journal = {Journal of Cryptology (JoC)}, volume = 24, number = 4, pages = {659-693}, year = 2011, note = {early version in Eurocrypt 2004} } -
Short Signatures Without Random Oracles.
by D. Boneh and X. BoyenJournal of Cryptology, 21(2), pp. 149-177, 2008.
Extended abstract in proceedings of Eurocrypt 2004, LNCS 3027, pp. 56-73, 2004Full paper: pdf -
Public key encryption with keyword search.
by D. Boneh, G. Di Crescenzo, R. Ostrovsky, and G. PersianoIn proceedings of Eurocrypt 2004, LNCS 3027, pp. 506-522, 2004Full paper: pdf -
A Secure Signature Scheme from Bilinear Maps.
by D. Boneh, I. Mironov, and Victor ShoupIn proceedings of RSA-CT '03, LNCS 2612, pp. 98-110Full paper: pdf -
Oblivious Signature-Based Envelope.
by Ninghui Li, W. Du, and D. BonehDistributed Computing 17(4), pp. 293-302, May 2005
Extended abstract in proceedings of the 22nd ACM Symposium on Principles of Distributed Computing (PODC), pp. 182-189, 2003Full paper: pdf -
Terra: A Virtual Machine-Based Platform for Trusted Computing.
by Tal Garfinkel, B. Pfaff, J. Chow, M. Rosenblum, and D. BonehIn Proceedings of 19th ACM Symposium on Operating Systems Principles (SOSP), pp 193-206, 2003Full paper: pdf -
The Design and Implementation of Protocol-based Hidden Key Recovery.
by E. Goh, D. Boneh, P. Golle, and B. PinkasIn proceedings of the 6th Information Security Conference 2003, LNCS 2851, pp. 165-179, 2003.Full paper: pdf -
Flexible OS support and applications for trusted computing.
by Tal Garfinkel, M. Rosenblum, and D. BonehIn the 9th Hot Topics in Operating Systems (HOTOS-IX), 2003 -
Remote timing attacks are practical.
by D. Boneh and D. BrumleyIn proceedings of the 12th Usenix Security Symposium, 2003 -
Aggregate and Verifiably Encrypted Signatures from Bilinear Maps.
by D. Boneh, C. Gentry, H. Shacham, and B. LynnIn proceedings of Eurocrypt 2003, LNCS 2656, pp. 416-432, 2003Full paper: pdf -
SiRiUS: Securing Remote Untrusted Storage.
by E. Goh, H. Shacham, N. Modadugu, and D. BonehIn proceedings of the Internet Society (ISOC) Network and Distributed Systems Security (NDSS) Symposium 2003, pp. 131-145Full paper: ps -
Almost entirely correct mixing with applications to voting.
by D. Boneh and P. GolleIn proceedings of the 9'th ACM conference on Computer and Communications Security (CCS), 2002 -
Attacking an obfuscated cipher by injecting faults.
by M. Jacob, D. Boneh, and E. FeltenIn proceedings of the 2002 ACM Workshop on Digital Rights ManagementFull paper: PDF -
Client side caching for TLS.
by D. Boneh, H. Shacham, and Eric RescrolaACM Trans. Info. and Sys. Security, 7(4):553-75, Nov. 2004
Extended abstract in NDSS 2002Full paper: PDF -
Fast variants of RSA.
by D. Boneh and H. ShachamCryptoBytes, Vol. 5, No. 1, pp. 1-9, 2002Full paper: pdf -
Applications of Multilinear Forms to Cryptography.
by D. Boneh and A. SilverbergContemporary Mathematics Vol. 324, American Mathematical Society, pp. 71-90, 2003Full paper: PDF -
The Modular Inversion Hidden Number Problem.
by D. Boneh, S. Halevi, and N. Howgrave-GrahamIn proceedings of Asiacrypt '01, LNCS Vol. 2248, Springer-Verlag, pp. 36-51, 2001 -
Short signatures from the Weil pairing.
by D. Boneh, H. Shacham, and B. LynnJ. of Cryptology, Vol. 17, No. 4, pp. 297-319, 2004
Extended abstract in Asiacrypt 2001Full paper: postscript -
Identity based encryption from the Weil pairing.
by D. Boneh and M. FranklinSIAM J. of Computing, Vol. 32, No. 3, pp. 586-615, 2003
Extended abstract in Crypto 2001, LNCS 2139, pp. 213-229, 2001. [BIBTEX]Full paper: PDF@article{BFibe, author = {Dan Boneh and Matt Franklin}, title = {Identity-Based Encryption from the {Weil} Pairing}, journal = {SIAM J. of Computing}, year = 2003, volume = 32, number = 3, pages = {586-615}, note = {extended abstract in Crypto'01} } -
Simplified OAEP for the RSA and Rabin functions.
by
D. Boneh
In proceedings of Crypto '2001, Lecture Notes in Computer Science, Vol. 2139, Springer-Verlag, pp. 275-291, 2001Full paper: PostScript
-
On the Unpredictability of Bits of the Elliptic Curve Diffie--Hellman Scheme.
by D. Boneh and I. ShparlinskiIn proceedings of Crypto '2001, Lecture Notes in Computer Science, Vol. 2139, Springer-Verlag, pp. 201-212, 2001Full paper: PostScript -
A Method for Fast Revocation of Public Key Certificates and
Security Capabilities.
by D. Boneh, X. Ding, G. Tsudik, and M. WongIn proceedings of the 10th USENIX Security Symposium, pp. 297-308Full paper: pdf -
Lower Bounds for Multicast Message Authentication.
by D. Boneh, G. Durfee, and M. FranklinIn proceedings of Eurocrypt '2001, Lecture Notes in Computer Science, Vol. 2045, Springer-Verlag, pp. 437--452, 2001Full paper: PostScript -
Improving SSL Handshake Performance via Batching.
by D. Boneh and H. ShachamIn proceedings RSA '2001, Lecture Notes in Computer Science, Vol. 2020, Springer-Verlag, pp. 28--43, 2001Full paper: PostScript -
Why Textbook ElGamal and RSA Encryption are Insecure.
by D. Boneh, A. Joux, and P. NguyenIn Proceedings AsiaCrypt '00, Lecture Notes in Computer Science, Vol. 1976, Springer-Verlag, pp. 30--44, 2000Full paper: pdf -
Timed Commitments.
by D. Boneh and M. NaorIn proceedings of Crypto '2000, Santa Barbara, LNCS 1880, Springer Verlag, pp. 236--254, 2000Full paper: PostScript -
Generating RSA Keys on a Handheld Using an Untrusted Server.
by N. Modadugu, D. Boneh, and M. KimIn proceedings of Indocrypt 2000, LNCS 1977, pp. 271-282, 2000Full paper: PostScript -
Anonymous authentication with subset queries.
by D. Boneh and M. FranklinIn proceedings of the 6th ACM conference on Computer and Communications Security, pp. 113--119, 1999 -
An efficient public key traitor tracing scheme.
by D. Boneh and M. FranklinIn Proceedings Crypto '99, Lecture Notes in Computer Science, Vol. 1666, Springer-Verlag, pp. 338--353, 1999Full paper: PostScript -
Building intrusion tolerant applications.
by T. Wu, M. Malkin, and D. BonehIn proceedings of the 8th USENIX Security Symposium, pp. 79--91, 1999Full paper: PostScript, PDF -
Factoring N=prq for large r.
by D. Boneh, G. Durfee, and N. Howgrave-GrahamIn Proceedings Crypto '99, Lecture Notes in Computer Science, Vol. 1666, Springer-Verlag, pp. 326--337, 1999Full paper: PostScript -
Cryptanalysis of RSA with private key d less
than N0.292.
by D. Boneh and G. DurfeeIEEE Transactions on Information Theory, Vol 46, No. 4, pp. 1339--1349, July 2000
Extended abstract in proceedings of Eurocrypt 1998Full paper: PostScript -
Experimenting with electronic commerce on the PalmPilot.
by D. Boneh and N. DaswaniIn proceedings of Financial Cryptography '99, Lecture Notes in Computer Science, Vol. 1648, Springer-Verlag, pp. 1--16, 1999Full paper: PostScript -
Experimenting with Shared Generation of RSA keys.
by M. Malkin, T. Wu, and D. BonehIn proceedings of the Internet Society's 1999 Symposium on Network and Distributed System Security (NDSS), pp. 43--56Full paper: PostScript -
An attack on RSA given a small fraction of the private key bits.
by D. Boneh, G. Durfee, and Y. FrankelIn proceedings AsiaCrypt '98, Lecture Notes in Computer Science, Vol. 1514, Springer-Verlag, pp. 25--34, 1998Full paper: PostScript -
A generalized wallet architecture.
by N. Daswani, D. Boneh, H. Garcia-Molina, S. Ketchpel, and A. PaepckeIn proceedings of the 3rd USENIX Workshop on Electronic Commerce, 1998Full paper: gzipped-PostScript -
Generating a Product of Three Primes With an Unknown Factorization.
by D. Boneh and J. HorwitzIn Proceedings of the third Algorithmic Number Theory Symposium, Lecture Notes in Computer Science, Vol. 1423, Springer-Verlag, pp. 237--251, 1998Full paper: gzipped-PostScript -
Breaking RSA may not be equivalent to factoring.
by D. Boneh and R. VenkatesanIn Proceedings Eurocrypt '98, Lecture Notes in Computer Science, Vol. 1233, Springer-Verlag, pp. 59--71, 1998Full paper: gzipped-PostScript, PDF -
Breaking generalized Diffie-Hellman modulo a composite is no easier
than factoring.
by E. Biham, D. Boneh, and O. ReingoldIn Information Processing Letters (IPL), Vol. 70, 1999, pp. 83--87Full paper: gzipped-PostScript -
Efficient generation of shared RSA keys.
by D. Boneh and M. FranklinJournal of the ACM (JACM), Vol. 48, Issue 4, pp. 702--722, July 2001
Extended abstract in proceedings of Crypto '97Full paper: PostScript -
Revocation of unread E-mail in an untrusted network.
by A. Rubin, D. Boneh, and K. FuIn Proceedings 1997 Australian Conference on Information Security, ACISP 1997, LNCS 1270, pp. 62-75Full paper: HTML -
On the importance of checking cryptographic protocols for faults.
by D. Boneh, R. DeMillo, and R. LiptonJournal of Cryptology, Springer-Verlag, Vol. 14, No. 2, pp. 101--119, 2001
Extended abstract in proceedings of Eurocrypt '97Full paper: gzipped-PostScript -
Rounding in lattices and its cryptographic applications.
by D. Boneh and R. VenkatesanIn Proceedings of SODA 1997, pp. 675--681Full paper: gzipped-PostScript -
A revocable backup system.
by D. Boneh and R. LiptonIn Proceedings 6th USENIX Security Conference, pp. 91--96, 1996Full paper: gzipped-PostScript, PDF -
Hardness of computing the most significant bits of
secret keys in Diffie-Hellman and related schemes.
by D. Boneh and R. VenkatesanIn Proceedings Crypto '96, Lecture Notes in Computer Science, Vol. 1109, Springer-Verlag, pp. 129--142, 1996Full paper: PostScript -
Algorithms for black box fields and their application to cryptography.
by D. Boneh and R. LiptonIn Proceedings Crypto '96, Lecture Notes in Computer Science, Vol. 1109, Springer-Verlag, pp. 283--297, 1996Full paper: PostScript -
Collusion secure fingerprinting for digital data.
by D. Boneh and J. ShawIEEE Transactions on Information Theory, Vol 44, No. 5, pp. 1897-1905, 1998
Extended abstract in proceedings of Crypto '95Full paper: gzipped-PostScript -
Quantum cryptanalysis of hidden linear forms.
by D. Boneh and R. LiptonIn Proceedings of Crypto '95, Lecture Notes in Computer Science, Vol. 963, Springer-Verlag, pp. 424--437, 1995Full paper: PDF
Research Papers: Learning Theory
-
Learning using group representations.
by
D. Boneh
In Proceedings COLT 1995, pp. 418--426, Santa Cruz, CaliforniaFull paper: gzipped-PostScript
-
Where Genetic Algorithms excel.
by E. Baum, D. Boneh, and C. GarrettEvolutionary Computation, MIT Press, Vol. 9, No. 1, pp. 93--124, 2001
Extended abstract in proceedings of COLT 1995Full paper: html -
Amplification of weak learning over the uniform distribution.
by D. Boneh and R. LiptonIn Proceedings COLT 1993, pp. 347--351, Santa Cruz, CaliforniaFull paper: gzipped-PostScript
Research Papers: DNA Computing
-
On the computational power of DNA.
by D. Boneh, C. Dunworth, R. Lipton, and J. SgallIn Discrete Applied Mathematics, Special Issue on Computational Molecular Biology, Vol. 71 (1996), pp. 79--94Full paper: gzipped-PostScript -
Breaking DES using a molecular computer.
by D. Boneh, C. Dunworth, and R. LiptonIn Proceedings of DIMACS workshop on DNA computing, 1995. published by the AMSFull paper: gzipped-PostScript -
Making DNA computers error resistant.
by D. Boneh and R. LiptonIn proceedings of 2nd annual DIMACS conference on DNA computing, 1996Full paper: gzipped-PostScript -
Running dynamic programming algorithms on a DNA computer.
by E. Baum and D. BonehIn proceedings of the 2nd annual conference on DNA computing, 1996Full paper: gzipped-PostScript
Research Papers: Misc.
-
Finding smooth integers in short intervals using CRT decoding.
by
D. Boneh
Journal of Computer and System Sciences (JCSS), Vol. 64, pp. 768--784, 2002
Extended abstract in STOC '2000, pp. 265--272, Portland, Oregon, 2000Full paper: PostScript -
Effect of operators on straight line complexity.
by D. Boneh and R. LiptonIn proceedings of ISTCS, Ramat-Gan, Israel, 1997Full paper: gzipped-PostScript