Published in: LIPIcs, Volume 282, 5th Conference on Advances in Financial Technologies (AFT 2023)
Wilson D. Nguyen, Dan Boneh, and Srinath Setty. Revisiting the Nova Proof System on a Cycle of Curves. In 5th Conference on Advances in Financial Technologies (AFT 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 282, pp. 18:1-18:22, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)
@InProceedings{nguyen_et_al:LIPIcs.AFT.2023.18, author = {Nguyen, Wilson D. and Boneh, Dan and Setty, Srinath}, title = {{Revisiting the Nova Proof System on a Cycle of Curves}}, booktitle = {5th Conference on Advances in Financial Technologies (AFT 2023)}, pages = {18:1--18:22}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-303-4}, ISSN = {1868-8969}, year = {2023}, volume = {282}, editor = {Bonneau, Joseph and Weinberg, S. Matthew}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.AFT.2023.18}, URN = {urn:nbn:de:0030-drops-192076}, doi = {10.4230/LIPIcs.AFT.2023.18}, annote = {Keywords: Cryptographic Protocols, Recursive Proof Systems, Folding, Vulnerability} }
Published in: LIPIcs, Volume 282, 5th Conference on Advances in Financial Technologies (AFT 2023)
Dan Boneh, Aditi Partap, and Lior Rotem. Post-Quantum Single Secret Leader Election (SSLE) from Publicly Re-Randomizable Commitments. In 5th Conference on Advances in Financial Technologies (AFT 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 282, pp. 26:1-26:23, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)
@InProceedings{boneh_et_al:LIPIcs.AFT.2023.26, author = {Boneh, Dan and Partap, Aditi and Rotem, Lior}, title = {{Post-Quantum Single Secret Leader Election (SSLE) from Publicly Re-Randomizable Commitments}}, booktitle = {5th Conference on Advances in Financial Technologies (AFT 2023)}, pages = {26:1--26:23}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-303-4}, ISSN = {1868-8969}, year = {2023}, volume = {282}, editor = {Bonneau, Joseph and Weinberg, S. Matthew}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.AFT.2023.26}, URN = {urn:nbn:de:0030-drops-192158}, doi = {10.4230/LIPIcs.AFT.2023.26}, annote = {Keywords: Consensus, Leader Election, Post-Quantum, Lattice Cryptography, Blockchain} }
Published in: LIPIcs, Volume 282, 5th Conference on Advances in Financial Technologies (AFT 2023)
Ertem Nusret Tas and Dan Boneh. Vector Commitments with Efficient Updates. In 5th Conference on Advances in Financial Technologies (AFT 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 282, pp. 29:1-29:23, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)
@InProceedings{tas_et_al:LIPIcs.AFT.2023.29, author = {Tas, Ertem Nusret and Boneh, Dan}, title = {{Vector Commitments with Efficient Updates}}, booktitle = {5th Conference on Advances in Financial Technologies (AFT 2023)}, pages = {29:1--29:23}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-303-4}, ISSN = {1868-8969}, year = {2023}, volume = {282}, editor = {Bonneau, Joseph and Weinberg, S. Matthew}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.AFT.2023.29}, URN = {urn:nbn:de:0030-drops-192184}, doi = {10.4230/LIPIcs.AFT.2023.29}, annote = {Keywords: Vector commitments, stateless clients} }
Published in: Dagstuhl Seminar Proceedings, Volume 9141, Web Application Security (2010)
Dan Boneh, Ulfar Erlingsson, Martin Johns, and Benjamin Livshits. 09141 Abstracts Collection – Web Application Security. In Web Application Security. Dagstuhl Seminar Proceedings, Volume 9141, pp. 1-16, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2010)
@InProceedings{boneh_et_al:DagSemProc.09141.1, author = {Boneh, Dan and Erlingsson, Ulfar and Johns, Martin and Livshits, Benjamin}, title = {{09141 Abstracts Collection – Web Application Security}}, booktitle = {Web Application Security}, pages = {1--16}, series = {Dagstuhl Seminar Proceedings (DagSemProc)}, ISSN = {1862-4405}, year = {2010}, volume = {9141}, editor = {Dan Boneh and Ulfar Erlingsson and Martin Johns and Benjamin Livshits}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.09141.1}, URN = {urn:nbn:de:0030-drops-27263}, doi = {10.4230/DagSemProc.09141.1}, annote = {Keywords: Web applications, Security, Ajax, Web 2.0, Analysis for security, Browser design, Distributed applications} }
Published in: Dagstuhl Seminar Proceedings, Volume 9141, Web Application Security (2010)
Dan Boneh, Ulfar Erlingsson, Martin Johns, and Benjamin Livshits. 09141 Executive Summary – Web Application Security. In Web Application Security. Dagstuhl Seminar Proceedings, Volume 9141, pp. 1-11, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2010)
@InProceedings{boneh_et_al:DagSemProc.09141.2, author = {Boneh, Dan and Erlingsson, Ulfar and Johns, Martin and Livshits, Benjamin}, title = {{09141 Executive Summary – Web Application Security}}, booktitle = {Web Application Security}, pages = {1--11}, series = {Dagstuhl Seminar Proceedings (DagSemProc)}, ISSN = {1862-4405}, year = {2010}, volume = {9141}, editor = {Dan Boneh and Ulfar Erlingsson and Martin Johns and Benjamin Livshits}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.09141.2}, URN = {urn:nbn:de:0030-drops-27258}, doi = {10.4230/DagSemProc.09141.2}, annote = {Keywords: Web applications, Security, Ajax, Web 2.0, Analysis for security, Browser design, Distributed applications} }
Published in: Dagstuhl Seminar Proceedings, Volume 7381, Cryptography (2008)
Johannes Blömer, Dan Boneh, Ronald Cramer, and Ueli Maurer. 07381 Abstracts Collection – Cryptography. In Cryptography. Dagstuhl Seminar Proceedings, Volume 7381, pp. 1-19, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2008)
@InProceedings{blomer_et_al:DagSemProc.07381.1, author = {Bl\"{o}mer, Johannes and Boneh, Dan and Cramer, Ronald and Maurer, Ueli}, title = {{07381 Abstracts Collection – Cryptography}}, booktitle = {Cryptography}, pages = {1--19}, series = {Dagstuhl Seminar Proceedings (DagSemProc)}, ISSN = {1862-4405}, year = {2008}, volume = {7381}, editor = {Johannes Bl\"{o}mer and Dan Boneh and Ronald Cramer and Ueli Maurer}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.07381.1}, URN = {urn:nbn:de:0030-drops-12935}, doi = {10.4230/DagSemProc.07381.1}, annote = {Keywords: Cryptography, information security, public-key cryptography, cryptographic protocols, security proofs} }
Published in: Dagstuhl Seminar Proceedings, Volume 7381, Cryptography (2008)
Johannes Blömer, Dan Boneh, Ronald Cramer, and Ueli Maurer. 07381 Executive Summary - Cryptography. In Cryptography. Dagstuhl Seminar Proceedings, Volume 7381, pp. 1-2, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2008)
@InProceedings{blomer_et_al:DagSemProc.07381.2, author = {Bl\"{o}mer, Johannes and Boneh, Dan and Cramer, Ronald and Maurer, Ueli}, title = {{07381 Executive Summary - Cryptography}}, booktitle = {Cryptography}, pages = {1--2}, series = {Dagstuhl Seminar Proceedings (DagSemProc)}, ISSN = {1862-4405}, year = {2008}, volume = {7381}, editor = {Johannes Bl\"{o}mer and Dan Boneh and Ronald Cramer and Ueli Maurer}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.07381.2}, URN = {urn:nbn:de:0030-drops-12928}, doi = {10.4230/DagSemProc.07381.2}, annote = {Keywords: Cryptography, information security, public-key cryptography, cryptographic protocols, security proofs} }
Feedback for Dagstuhl Publishing