Studies in Computational Number Theory with Applications to Cryptography (1996)
Doctoral advisor
Richard J. Lipton
Doctoral students
Craig Gentry
Dan Boneh (/boʊˈneɪ/; Hebrew: דן בונה) is an Israeli–American professor in applied cryptography and computer security at Stanford University.
In 2016, Boneh was elected a member of the National Academy of Engineering for contributions to the theory and practice of cryptography and computer security.
DanBoneh (/boʊˈneɪ/; Hebrew: דן בונה) is an Israeli–American professor in applied cryptography and computer security at Stanford University. In 2016...
A BLS digital signature, also known as Boneh–Lynn–Shacham (BLS), is a cryptographic signature scheme which allows a user to verify that a signer is authentic...
Boneh or Beneh may refer to: DanBoneh (b. 1969), Israeli computer scientist Boneh–Franklin scheme, an identity-based encryption system Boneh-Lynn-Shacham...
was proposed by Amit Sahai and Brent Waters in 2005 and formalized by DanBoneh, Amit Sahai and Brent Waters in 2010. Until recently, however, most instantiations...
proven memory-hard password-hashing and modern design. It was created by DanBoneh, Henry Corrigan-Gibbs (both at Stanford University) and Stuart Schechter...
Project) was a research program run by Hector Garcia-Molina, Terry Winograd, DanBoneh, and Andreas Paepcke at Stanford University in the mid-1990s to 2004....
security. Shacham his PhD from Stanford University under the supervision of DanBoneh, where he wrote his dissertation on "New Paradigms in Signature Schemes"...
networking experts: Andrea Bittau, Mike Hamburg, Mark Handley, David Mazières, DanBoneh and Quinn Slack. Tcpcrypt has been published as an Internet Draft. Experimental...
constant-time cryptography". Retrieved 9 May 2021. David Brumley and DanBoneh. Remote timing attacks are practical. USENIX Security Symposium, August...
This approach was proposed in 2010 by Gustav Rydstedt, Elie Bursztein, DanBoneh and Collin Jackson in a paper that highlighted the limitations of existing...
peer-grading system, John Mitchell (Courseware, a Learning Management System), DanBoneh (using machine learning to sync videos, later teaching cryptography on...
its Applications, Volume 125, Number 3, 20 November 2002 , pp. 533–542. DanBoneh, Matthew K. Franklin, Identity-Based Encryption from the Weil Pairing...
Fault Analysis: How to break completely unknown cryptosystems (1996) DanBoneh and Richard A. DeMillo and Richard J. Lipton: On the Importance of Checking...
privacy. The 2018 Theory of Cryptography Test of Time Award (joint with DanBoneh and Eu-Jin Goh). The 2019 Caspar Bowden Award for Outstanding Research...
Enterprise Networks,” under advisors Nick McKeown, Scott Shenker and DanBoneh, was published in 2008. In 2007, Casado co-founded Nicira Networks along...
2020-03-19.{{cite web}}: CS1 maint: numeric names: authors list (link) Goodin, Dan (2020-01-07). "PGP keys, software security, and much more threatened by new...
Stanford University's Security Laboratory, where he collaborated with DanBoneh and John Mitchell on web security, game security, and applied cryptographic...