Dan Boneh
Dan Boneh | |
---|---|
Dan Boneh | |
Born |
1969 Israel |
Residence | U.S |
Fields | Cryptography |
Institutions | Stanford University |
Alma mater | Princeton, 1996 |
Doctoral advisor | Richard J. Lipton |
Known for | pairing-based cryptography |
Notable awards |
Packard Award Alfred P. Sloan Award Terman Award RSA Award |
Dan Boneh (/boʊˈneɪ/; Hebrew: דן בונה) is Professor of Computer Science and Electrical Engineering at Stanford University. He is a researcher in the areas of applied cryptography and computer security.[1][2] He teaches three massive open online courses on online learning platform Coursera namely Computer Security,[3] Cryptography I[4] and Cryptography II[5]
Born in Israel in 1969, Boneh obtained his Ph.D. in Computer Science from Princeton University in 1996 (under the supervision of Richard J. Lipton).[6][7]
Research
Boneh is one of the principal contributors to the development of pairing-based cryptography from the Weil Pairing, along with Dr. Matt Franklin of the University of California at Davis.[8]
Cryptography
Some of his achievements in cryptography include:
- 2010 He was involved in designing tcpcrypt, TCP extensions for transport-level security[9][10]
- 2005 The first broadcast encryption system with full collusion resistance (with Craig Gentry and Brent Waters)
- 2003 A timing attack on OpenSSL (with David Brumley)
- 2001 An efficient identity-based encryption system (with Matt Franklin) based on the Weil pairing.[11]
- 1999 Cryptanalysis of RSA when the private key is less than N0.292 (with Glenn Durfee)
- 1997 Fault-based cryptanalysis of public-key systems (with Richard J. Lipton and Richard DeMillo)
- 1995 Collusion resistant fingerprinting codes for digital data (with James Shaw)
- 1995 Cryptanalysis using a DNA computer (with Christopher Dunworth and Richard J. Lipton)
Computer security
Some of his contributions in computer security include:
- 2007 "Show[ing] that the time web sites take to respond to HTTP requests can leak private information."[12]
- 2005 PwdHash a browser extension that transparently produces a different password for each site[13][14]
Awards
Boneh has received a number of awards, including the following:
- The Packard Award
- The Alfred P. Sloan Award
- the Terman Award
- The RSA Award
- Gödel Prize, 2013, with Matthew K. Franklin and Antoine Joux, for his work on the Boneh–Franklin scheme[15]
References
- ↑ "Dan Boneh's Publications by Topic".
- ↑ "Dan Boneh's Google Scholar Profile".
- ↑ https://www.coursera.org/course/security
- ↑ https://www.coursera.org/course/crypto
- ↑ https://www.coursera.org/course/crypto2
- ↑ "Cryptography Is Dead?". March 2013.
- ↑ "Math Genealogy Project".
- ↑ "Google Scholar citations of Boneh-Franklin paper".
- ↑ A. Bittau, et al. (July 2010). "Cryptographic protection of TCP Streams (tcpcrypt)". IETF draft.
- ↑ Andrea Bittau, et al. (2010-08-13). "The case for ubiquitous transport-level encryption". 19th USENIX Security Symposium.
- ↑ D. Boneh and M. Franklin. Identity based encryption from the Weil pairing SIAM J. of Computing, Vol. 32, No. 3, pp. 586-615, 2003. Extended abstract in proc. of Crypto '2001, LNCS Vol. 2139, Springer-Verlag, pp. 213-229, 2001.
- ↑ A. Bortz, D. Boneh, and P. Nandy Exposing private information by timing web applications 6th International Conference on World Wide Web, WWW 2007, ACM 2007, pp. 621-628
- ↑ B. Ross, C. Jackson, N. Miyake, D. Boneh, and J. Mitchell Stronger Password Authentication Using Browser Extensions Usenix security 2005
- ↑ "Security experts unveil defense against phishing".
- ↑ ACM Group Presents Gödel Prize for Advances in Cryptography: Three Computer Scientists Cited for Innovations that Improve Security, Association for Computing Machinery, May 29, 2013.
External links
|