Follow
Eu-Jin Goh
Eu-Jin Goh
Unknown affiliation
Verified email at cs.stanford.edu
Title
Cited by
Cited by
Year
Evaluating 2-DNF formulas on ciphertexts
D Boneh, EJ Goh, K Nissim
Theory of Cryptography: Second Theory of Cryptography Conference, TCC 2005 …, 2005
23162005
Secure indexes
EJ Goh
Cryptology ePrint Archive, 2003
18812003
Hierarchical identity based encryption with constant size ciphertext
D Boneh, X Boyen, EJ Goh
Annual international conference on the theory and applications of …, 2005
18552005
On the effectiveness of address-space randomization
H Shacham, M Page, B Pfaff, EJ Goh, N Modadugu, D Boneh
Proceedings of the 11th ACM conference on Computer and communications …, 2004
13452004
SiRiUS: Securing Remote Untrusted Storage.
EJ Goh, H Shacham, N Modadugu, D Boneh
NDSS 3, 131-145, 2003
8152003
A signature scheme as secure as the Diffie-Hellman problem
EJ Goh, S Jarecki
Advances in Cryptology—EUROCRYPT 2003: International Conference on the …, 2003
1792003
Efficient signature schemes with tight reductions to the Diffie-Hellman problems
EJ Goh, S Jarecki, J Katz, N Wang
Journal of Cryptology 20, 493-514, 2007
1232007
Method and apparatus for transparent encryption
D Boneh, R Chawla, A Frindell, EJ Goh, N Modadugu, P Tsirigotis
US Patent 7,757,278, 2010
882010
Secure function evaluation with ordered binary decision diagrams
L Kruger, S Jha, EJ Goh, D Boneh
Proceedings of the 13th ACM conference on Computer and communications …, 2006
832006
IACR Cryptology ePrint Archive
EJ Goh, S Indexes
Secure indexes 2003, 216, 2003
722003
Encryption schemes from bilinear maps
EJ Goh
Stanford University, 2007
442007
The design and implementation of protocol-based hidden key recovery
EJ Goh, D Boneh, B Pinkas, P Golle
Information Security: 6th International Conference, ISC 2003, Bristol, UK …, 2003
382003
Delegation system for decryption rights
T Matsuo, D Boneh, EJ Goh
US Patent App. 11/894,448, 2008
222008
Covert channels in privacy-preserving identification systems
DV Bailey, D Boneh, EJ Goh, A Juels
Proceedings of the 14th ACM conference on Computer and communications …, 2007
222007
Event driven private counters
EJ Goh, P Golle
Financial Cryptography and Data Security: 9th International Conference, FC …, 2005
122005
Secure indexes
E jin Goh
In submission, 2004
92004
How to Search on Encrypted data
EJ Goh
slides available at http://crypto. stanford. edu/~ eujin/papers/secureindex …, 2003
32003
Searching on Encrypted Data
EJ Goh
2003
A Signature Scheme as Secure as the
EJ Goh, S Jarecki
Advances in Cryptology--EUROCRYPT 2003: International Conference on the …, 2003
2003
14th USENIX Security Symposium
P McDaniel, H Adkins, S Bellovin, D Boneh, P Chen, EJ Goh, T Jaeger, ...
The system can't perform the operation now. Try again later.
Articles 1–20