<--- Back to Details
First PageDocument Content
Theoretical computer science / Formal sciences / ACM SIGACT / International Colloquium on Automata /  Languages and Programming / Gödel Prize / Whitfield Diffie / Association for Computing Machinery / ID-based encryption / Dan Boneh / Cryptography / Computer science / Applied mathematics
Date: 2014-01-29 10:45:05
Theoretical computer science
Formal sciences
ACM SIGACT
International Colloquium on Automata
Languages and Programming
Gödel Prize
Whitfield Diffie
Association for Computing Machinery
ID-based encryption
Dan Boneh
Cryptography
Computer science
Applied mathematics

Contacts: Paul Beame ACM SIGACT Chair

Add to Reading List

Source URL: www.eatcs.org

Download Document from Source Website

File Size: 47,30 KB

Share Document on Facebook

Similar Documents

Cryptocurrencies / Bitcoin / Neuroscience / Alternative currencies / Economy / Mining pool / Money / Reward system

Incentive Compatibility of Bitcoin Mining Pool Reward Functions Okke Schrijvers, Joseph Bonneau, Dan Boneh, and Tim Roughgarden Stanford University Abstract. In this paper we introduce a game-theoretic model for reward

DocID: 1xVWx - View Document

Computing / Network architecture / Internet / Internet protocols / Secure communication / Internet Standards / Cryptographic protocols / Network protocols / Transmission Control Protocol / Proxy server / Deep packet inspection / Steganography

StegoTorus: A Camouflage Proxy for the Tor Anonymity System Zachary Weinberg,1,2 Jeffrey Wang,3 Vinod Yegneswaran,2 Linda Briesemeister,2 Steven Cheung,2 Frank Wang,3 and Dan Boneh 3 1

DocID: 1xV7f - View Document

Cryptography / Cryptocurrencies / Alternative currencies / Bitcoin / Decentralization / Cryptographic protocols / Non-interactive zero-knowledge proof / Zero-knowledge proof / Proof of knowledge / NP / Soundness / IP

Bulletproofs: Short Proofs for Confidential Transactions and More Benedikt B¨ unz∗1 , Jonathan Bootle†2 , Dan Boneh‡1 , Andrew Poelstra§3 , Pieter Wuille¶3 , and Greg Maxwellk 1

DocID: 1xUkV - View Document

Iron: Functional encryption using Intel SGX Sergey Gorbunov University of Waterloo Joint work with Ben Fisch, Dhinakaran Vinayagamurthy, Dan Boneh.

DocID: 1vrgS - View Document

Callisto: A Cryptographic Approach To Detect Serial Predators Of Sexual Misconduct Anjana Rajan Lucy Qin Dan Boneh Tancrède Lepoint

DocID: 1v9h6 - View Document