Dan Boneh

79.6k total citations · 10 hit papers
185 papers, 17.2k citations indexed

About

Dan Boneh is a scholar working on Artificial Intelligence, Information Systems and Computer Networks and Communications. According to data from OpenAlex, Dan Boneh has authored 185 papers receiving a total of 17.2k indexed citations (citations by other indexed papers that have themselves been cited), including 128 papers in Artificial Intelligence, 83 papers in Information Systems and 44 papers in Computer Networks and Communications. Recurrent topics in Dan Boneh's work include Cryptography and Data Security (61 papers), Advanced Malware Detection Techniques (36 papers) and Security and Verification in Computing (32 papers). Dan Boneh is often cited by papers focused on Cryptography and Data Security (61 papers), Advanced Malware Detection Techniques (36 papers) and Security and Verification in Computing (32 papers). Dan Boneh collaborates with scholars based in United States, France and United Kingdom. Dan Boneh's co-authors include Matthew Franklin, Craig Gentry, Hovav Shacham, Tal Garfinkel, James M. Shaw, Ben Pfaff, Ben Lynn, John C. Mitchell, Mendel Rosenblum and Jim Chow and has published in prestigious journals such as Science, SHILAP Revista de lepidopterología and Proceedings of the IEEE.

In The Last Decade

Dan Boneh

182 papers receiving 15.8k citations

Hit Papers

Identity-Based Encryption... 1998 2026 2007 2016 2003 2002 2009 2004 2003 500 1000 1.5k

Author Peers

Peers are selected by citation overlap in the author's most active subfields. citations · hero ref

Author Last Decade Papers Cites
Dan Boneh 12.7k 7.6k 5.3k 4.2k 2.0k 185 17.2k
Martı́n Abadi 10.0k 0.8× 4.6k 0.6× 5.9k 1.1× 1.9k 0.5× 772 0.4× 141 13.8k
Somesh Jha 9.2k 0.7× 3.1k 0.4× 4.2k 0.8× 4.6k 1.1× 1.3k 0.6× 185 13.7k
Sushil Jajodia 7.8k 0.6× 6.4k 0.8× 10.7k 2.0× 3.6k 0.9× 2.4k 1.2× 511 18.5k
Michael K. Reiter 7.5k 0.6× 5.4k 0.7× 8.0k 1.5× 3.7k 0.9× 1.2k 0.6× 265 15.1k
Robert H. Deng 9.3k 0.7× 6.6k 0.9× 4.3k 0.8× 1.5k 0.4× 1.5k 0.8× 528 13.8k
Kui Ren 14.5k 1.1× 12.0k 1.6× 6.2k 1.2× 1.5k 0.4× 3.0k 1.5× 370 22.5k
Dawn Song 14.4k 1.1× 8.0k 1.1× 9.9k 1.9× 7.2k 1.7× 2.1k 1.1× 261 22.9k
Jennifer Widom 10.7k 0.8× 6.9k 0.9× 14.7k 2.8× 8.5k 2.0× 1.9k 1.0× 231 21.3k
Elisa Bertino 13.2k 1.0× 8.3k 1.1× 8.2k 1.5× 3.2k 0.8× 1.3k 0.7× 966 21.3k
Héctor García-Molina 12.4k 1.0× 14.0k 1.9× 20.0k 3.8× 5.8k 1.4× 2.5k 1.3× 521 32.5k

Countries citing papers authored by Dan Boneh

Since Specialization
Citations

This map shows the geographic impact of Dan Boneh's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Dan Boneh with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Dan Boneh more than expected).

Fields of papers citing papers by Dan Boneh

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Dan Boneh. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Dan Boneh. The network helps show where Dan Boneh may publish in the future.

Co-authorship network of co-authors of Dan Boneh

This figure shows the co-authorship network connecting the top 25 collaborators of Dan Boneh. A scholar is included among the top collaborators of Dan Boneh based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Dan Boneh. Dan Boneh is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Boneh, Dan, Benedikt Bünz, & Ben Fisch. (2024). A Survey of Two Verifiable Delay Functions Using Proof of Exponentiation. 1 indexed citations
2.
Boneh, Dan, Daniel Krashen, Kristin Lauter, et al.. (2020). Multiparty Non-Interactive Key Exchange and More From Isogenies on Elliptic Curves. SHILAP Revista de lepidopterología. 6 indexed citations
3.
Chou, Edward, Florian Tramèr, Giancarlo Pellegrino, & Dan Boneh. (2018). SentiNet: Detecting Physical Attacks Against Deep Learning Systems. arXiv (Cornell University). 33 indexed citations
4.
Tramèr, Florian, et al.. (2018). Ad-versarial: Defeating Perceptual Ad-Blocking. arXiv (Cornell University). 4 indexed citations
5.
Jagadeesh, Karthik A., David J. Wu, Johannes Birgmeier, Dan Boneh, & Gill Bejerano. (2017). Deriving genomic diagnoses without revealing patient genomes. Science. 357(6352). 692–695. 87 indexed citations
6.
Horowitz, Mark, et al.. (2016). CESEL: Securing a Mote for 20 Years. 307–312. 3 indexed citations
7.
Michalevsky, Yan, Dan Boneh, & Gabi Nakibly. (2014). Gyrophone: recognizing speech from gyroscope signals. USENIX Security Symposium. 1053–1067. 151 indexed citations
8.
Boneh, Dan, Tim Roughgarden, & Joan Feigenbaum. (2013). Proceedings of the forty-fifth annual ACM symposium on Theory of computing. 3 indexed citations
9.
Boneh, Dan & Mark Zhandry. (2012). Quantum-Secure Message Authentication Codes.. IACR Cryptology ePrint Archive. 19. 136. 1 indexed citations
10.
Bojinov, Hristo, et al.. (2012). Neuroscience meets cryptography: designing crypto primitives secure against rubber hose attacks. USENIX Security Symposium. 33–33. 30 indexed citations
11.
Lincoln, Patrick, Ian Mason, Phillip Porras, et al.. (2012). Bootstrapping Communications into an Anti-Censorship System.. 10 indexed citations
12.
Narayanan, Arvind, et al.. (2011). Location Privacy via Private Proximity Testing.. Network and Distributed System Security Symposium. 201 indexed citations
13.
Qiu, Di, Dan Boneh, Sherman Lo, & Per Enge. (2009). Robust Location Tag Generation from Noisy Location Data for Security Applications. 586–597. 8 indexed citations
14.
Boneh, Dan & Xavier Boyen. (2008). Short signature without random oracles and the SDH assumption in bilinear groups. QUT ePrints (Queensland University of Technology). 1 indexed citations
15.
Jackson, Collin, Dan Boneh, & John C. Mitchell. (2007). Transaction generators: root kits for web. 1. 12 indexed citations
16.
Casado, Martín, Tal Garfinkel, Aditya Akella, et al.. (2006). SANE: a protection architecture for enterprise networks. USENIX Security Symposium. 10. 225 indexed citations
17.
Boneh, Dan, Joan Feigenbaum, Abraham Silberschatz, & Rebecca N. Wright. (2004). PORTIA: Privacy, Obligations, and Rights in Technologies of Information Assessment.. IEEE Data(base) Engineering Bulletin. 27. 10–18. 3 indexed citations
18.
Garfinkel, Tal, Mendel Rosenblum, & Dan Boneh. (2003). Flexible OS support and applications for trusted computing. 25–25. 52 indexed citations
19.
Malkin, Michael, Thomas D. Wu, & Dan Boneh. (1999). Experimenting with Shared Generation of RSA Keys.. Network and Distributed System Security Symposium. 36 indexed citations
20.
Biham, Eli, Dan Boneh, & Omer Reingold. (1997). Generalized Diffie-Hellman Modulo a Composite is not Weaker than Factoring. Electronic colloquium on computational complexity. 1997(2). 112–20. 2 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026