Evaluating 2-DNF formulas on ciphertexts D Boneh, EJ Goh, K Nissim Theory of Cryptography: Second Theory of Cryptography Conference, TCC 2005 …, 2005 | 2297 | 2005 |
Secure indexes EJ Goh Cryptology ePrint Archive, 2003 | 1873 | 2003 |
Hierarchical identity based encryption with constant size ciphertext D Boneh, X Boyen, EJ Goh Annual international conference on the theory and applications of …, 2005 | 1848 | 2005 |
On the effectiveness of address-space randomization H Shacham, M Page, B Pfaff, EJ Goh, N Modadugu, D Boneh Proceedings of the 11th ACM conference on Computer and communications …, 2004 | 1336 | 2004 |
SiRiUS: Securing Remote Untrusted Storage. EJ Goh, H Shacham, N Modadugu, D Boneh NDSS 3, 131-145, 2003 | 815 | 2003 |
A signature scheme as secure as the Diffie-Hellman problem EJ Goh, S Jarecki Advances in Cryptology—EUROCRYPT 2003: International Conference on the …, 2003 | 179 | 2003 |
Efficient signature schemes with tight reductions to the Diffie-Hellman problems EJ Goh, S Jarecki, J Katz, N Wang Journal of Cryptology 20, 493-514, 2007 | 120 | 2007 |
Method and apparatus for transparent encryption D Boneh, R Chawla, A Frindell, EJ Goh, N Modadugu, P Tsirigotis US Patent 7,757,278, 2010 | 87 | 2010 |
Secure function evaluation with ordered binary decision diagrams L Kruger, S Jha, EJ Goh, D Boneh Proceedings of the 13th ACM conference on Computer and communications …, 2006 | 83 | 2006 |
IACR Cryptology ePrint Archive EJ Goh, S Indexes Secure indexes 2003, 216, 2003 | 71 | 2003 |
Encryption schemes from bilinear maps EJ Goh Stanford University, 2007 | 44 | 2007 |
The design and implementation of protocol-based hidden key recovery EJ Goh, D Boneh, B Pinkas, P Golle Information Security: 6th International Conference, ISC 2003, Bristol, UK …, 2003 | 38 | 2003 |
Delegation system for decryption rights T Matsuo, D Boneh, EJ Goh US Patent App. 11/894,448, 2008 | 22 | 2008 |
Covert channels in privacy-preserving identification systems DV Bailey, D Boneh, EJ Goh, A Juels Proceedings of the 14th ACM conference on Computer and communications …, 2007 | 22 | 2007 |
Event driven private counters EJ Goh, P Golle Financial Cryptography and Data Security: 9th International Conference, FC …, 2005 | 12 | 2005 |
Secure indexes E jin Goh In submission, 2004 | 9 | 2004 |
How to Search on Encrypted data EJ Goh slides available at http://crypto. stanford. edu/~ eujin/papers/secureindex …, 2003 | 3 | 2003 |
Searching on Encrypted Data EJ Goh | | 2003 |
A Signature Scheme as Secure as the EJ Goh, S Jarecki Advances in Cryptology--EUROCRYPT 2003: International Conference on the …, 2003 | | 2003 |
14th USENIX Security Symposium P McDaniel, H Adkins, S Bellovin, D Boneh, P Chen, EJ Goh, T Jaeger, ... | | |