Dan Boneh

From Wikipedia, the free encyclopedia
Dan Boneh

Dan Boneh
Born 1969
Israel
Residence U.S
Fields Cryptography
Institutions Stanford University
Alma mater Princeton, 1996
Doctoral advisor Richard J. Lipton
Known for pairing-based cryptography
Notable awards Packard Award
Alfred P. Sloan Award
Terman Award
RSA Award

Dan Boneh (/bˈn/; Hebrew: דן בונה) is Professor of Computer Science and Electrical Engineering at Stanford University. He is a researcher in the areas of applied cryptography and computer security.[1][2] He teaches three massive open online courses on online learning platform Coursera namely Computer Security,[3] Cryptography I[4] and Cryptography II[5]

Born in Israel in 1969, Boneh obtained his Ph.D. in Computer Science from Princeton University in 1996 (under the supervision of Richard J. Lipton).[6][7]

Research

Boneh is one of the principal contributors to the development of pairing-based cryptography from the Weil Pairing, along with Dr. Matt Franklin of the University of California at Davis.[8]

Cryptography

Some of his achievements in cryptography include:

  • 2010 He was involved in designing tcpcrypt, TCP extensions for transport-level security[9][10]
  • 2005 The first broadcast encryption system with full collusion resistance (with Craig Gentry and Brent Waters)
  • 2003 A timing attack on OpenSSL (with David Brumley)
  • 2001 An efficient identity-based encryption system (with Matt Franklin) based on the Weil pairing.[11]
  • 1999 Cryptanalysis of RSA when the private key is less than N0.292 (with Glenn Durfee)
  • 1997 Fault-based cryptanalysis of public-key systems (with Richard J. Lipton and Richard DeMillo)
  • 1995 Collusion resistant fingerprinting codes for digital data (with James Shaw)
  • 1995 Cryptanalysis using a DNA computer (with Christopher Dunworth and Richard J. Lipton)

Computer security

Some of his contributions in computer security include:

  • 2007 "Show[ing] that the time web sites take to respond to HTTP requests can leak private information."[12]
  • 2005 PwdHash a browser extension that transparently produces a different password for each site[13][14]

Awards

Boneh has received a number of awards, including the following:

References

  1. "Dan Boneh's Publications by Topic". 
  2. "Dan Boneh's Google Scholar Profile". 
  3. https://www.coursera.org/course/security
  4. https://www.coursera.org/course/crypto
  5. https://www.coursera.org/course/crypto2
  6. "Cryptography Is Dead?". March 2013. 
  7. "Math Genealogy Project". 
  8. "Google Scholar citations of Boneh-Franklin paper". 
  9. A. Bittau, et al. (July 2010). "Cryptographic protection of TCP Streams (tcpcrypt)". IETF draft. 
  10. Andrea Bittau, et al. (2010-08-13). "The case for ubiquitous transport-level encryption". 19th USENIX Security Symposium. 
  11. D. Boneh and M. Franklin. Identity based encryption from the Weil pairing SIAM J. of Computing, Vol. 32, No. 3, pp. 586-615, 2003. Extended abstract in proc. of Crypto '2001, LNCS Vol. 2139, Springer-Verlag, pp. 213-229, 2001.
  12. A. Bortz, D. Boneh, and P. Nandy Exposing private information by timing web applications 6th International Conference on World Wide Web, WWW 2007, ACM 2007, pp. 621-628
  13. B. Ross, C. Jackson, N. Miyake, D. Boneh, and J. Mitchell Stronger Password Authentication Using Browser Extensions Usenix security 2005
  14. "Security experts unveil defense against phishing". 
  15. ACM Group Presents Gödel Prize for Advances in Cryptography: Three Computer Scientists Cited for Innovations that Improve Security, Association for Computing Machinery, May 29, 2013.

External links

This article is issued from Wikipedia. The text is available under the Creative Commons Attribution/Share Alike; additional terms may apply for the media files.