Follow
Eu-Jin Goh
Eu-Jin Goh
Unknown affiliation
Verified email at cs.stanford.edu
Title
Cited by
Cited by
Year
Evaluating 2-DNF formulas on ciphertexts
D Boneh, EJ Goh, K Nissim
Theory of Cryptography: Second Theory of Cryptography Conference, TCC 2005 …, 2005
23082005
Secure indexes
EJ Goh
Cryptology ePrint Archive, 2003
18942003
Hierarchical identity based encryption with constant size ciphertext
D Boneh, X Boyen, EJ Goh
Annual international conference on the theory and applications of …, 2005
18682005
On the effectiveness of address-space randomization
H Shacham, M Page, B Pfaff, EJ Goh, N Modadugu, D Boneh
Proceedings of the 11th ACM conference on Computer and communications …, 2004
13362004
SiRiUS: Securing Remote Untrusted Storage.
EJ Goh, H Shacham, N Modadugu, D Boneh
NDSS 3, 131-145, 2003
8202003
A signature scheme as secure as the Diffie-Hellman problem
EJ Goh, S Jarecki
Advances in Cryptology—EUROCRYPT 2003: International Conference on the …, 2003
1812003
Efficient signature schemes with tight reductions to the Diffie-Hellman problems
EJ Goh, S Jarecki, J Katz, N Wang
Journal of Cryptology 20, 493-514, 2007
1242007
Method and apparatus for transparent encryption
D Boneh, R Chawla, A Frindell, EJ Goh, N Modadugu, P Tsirigotis
US Patent 7,757,278, 2010
892010
Secure function evaluation with ordered binary decision diagrams
L Kruger, S Jha, EJ Goh, D Boneh
Proceedings of the 13th ACM conference on Computer and communications …, 2006
822006
Encryption schemes from bilinear maps
EJ Goh
Stanford University, 2007
442007
The design and implementation of protocol-based hidden key recovery
EJ Goh, D Boneh, B Pinkas, P Golle
Information Security: 6th International Conference, ISC 2003, Bristol, UK …, 2003
392003
IACR Cryptology ePrint Archive
EJ Goh, S Indexes
Secure indexes 2003, 216, 2003
382003
Delegation system for decryption rights
T Matsuo, D Boneh, EJ Goh
US Patent App. 11/894,448, 2008
232008
Covert channels in privacy-preserving identification systems
DV Bailey, D Boneh, EJ Goh, A Juels
Proceedings of the 14th ACM conference on Computer and communications …, 2007
212007
Event driven private counters
EJ Goh, P Golle
Financial Cryptography and Data Security: 9th International Conference, FC …, 2005
122005
Secure indexes
E jin Goh
In submission, 2004
102004
How to Search on Encrypted data
EJ Goh
slides available at http://crypto. stanford. edu/~ eujin/papers/secureindex …, 2003
32003
Searching on Encrypted Data
EJ Goh
2003
A Signature Scheme as Secure as the
EJ Goh, S Jarecki
Advances in Cryptology--EUROCRYPT 2003: International Conference on the …, 2003
2003
14th USENIX Security Symposium
P McDaniel, H Adkins, S Bellovin, D Boneh, P Chen, EJ Goh, T Jaeger, ...
The system can't perform the operation now. Try again later.
Articles 1–20