#### Filter Results:

- Full text PDF available (16)

#### Publication Year

1985

2018

- This year (5)
- Last 5 years (11)
- Last 10 years (21)

#### Publication Type

#### Co-author

#### Journals and Conferences

#### Brain Region

#### Cell Type

#### Organism

Learn More

We study privacy-preserving tests for proximity: Alice can test if she is close to Bob without either party revealing any other information about their location. We describe several secure protocols… (More)

- Dan Boneh, Shai Halevi, Michael Hamburg, Rafail Ostrovsky
- CRYPTO
- 2008

We describe a public-key encryption system that remains secure even encrypting messages that depend on the secret keys in use. In particular, it remains secure under a “key cycle” usage, where we… (More)

- Dan Boneh, Michael Hamburg
- ASIACRYPT
- 2008

We provide a general framework for constructing identitybased and broadcast encryption systems. In particular, we construct a general encryption system called spatial encryption from which many… (More)

- Dan Boneh, Craig Gentry, Michael Hamburg
- 48th Annual IEEE Symposium on Foundations of…
- 2007

Identity Based Encryption (IBE) systems are often constructed using bilinear maps (a.k.a. pairings) on elliptic curves. One exception is an elegant system due to Cocks which builds an IBE based on… (More)

- Michael Hamburg
- IACR Cryptology ePrint Archive
- 2012

Elliptic curve cryptosystems have improved greatly in speed over the past few years. Here we outline a new elliptic curve signature and key agreement implementation which achieves record speeds while… (More)

- Michael Hamburg
- IACR Cryptology ePrint Archive
- 2015

Many papers have proposed elliptic curves which are faster and easier to implement than the NIST prime-order curves. Most of these curves have had fields of size around 2, and thus security estimates… (More)

- Emily Stark, Michael Hamburg, Dan Boneh
- 2009 Annual Computer Security Applications…
- 2009

We take a systematic approach to developing a symmetric cryptography library in Javascript. We study various strategies for optimizing the code for the Javascript interpreter, and observe that… (More)

- Daniel J. Bernstein, Michael Hamburg, Anna Krasnova, Tanja Lange
- ACM Conference on Computer and Communications…
- 2013

Censorship-circumvention tools are in an arms race against censors. The censors study all traffic passing into and out of their controlled sphere, and try to disable censorship-circumvention tools… (More)

- Michael Hamburg
- CHES
- 2009

We demonstrate new techniques to speed up the Rijndael (AES) block cipher using vector permute instructions. Because these techniques avoid dataand key-dependent branches and memory references, they… (More)

- Elie Bursztein, Michael Hamburg, Jocelyn Lagarenne, Dan Boneh
- 2011 IEEE Symposium on Security and Privacy
- 2011

We present a generic tool, Kartograph, that lifts the fog of war in online real-time strategy games by snooping on the memory used by the game. Kartograph is passive and cannot be detected remotely.… (More)