default search action
Yevgeniy Dodis
Person information
- affiliation: New York University, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c150]Yevgeniy Dodis, Daniel Jost, Antonio Marcedone:
Compact Key Storage - A Modern Approach to Key Backup and Delegation. CRYPTO (2) 2024: 75-109 - [i95]Yevgeniy Dodis, Daniel Jost, Antonio Marcedone:
Compact Key Storage: A Modern Approach to Key Backup and Delegation. IACR Cryptol. ePrint Arch. 2024: 914 (2024) - [i94]Alexander Bienstock, Yevgeniy Dodis, Paul Rösler, Daniel Wichs:
Interval Key-Encapsulation Mechanism. IACR Cryptol. ePrint Arch. 2024: 1454 (2024) - 2023
- [c149]Yevgeniy Dodis, Niels Ferguson, Eli Goldin, Peter Hall, Krzysztof Pietrzak:
Random Oracle Combiners: Breaking the Concatenation Barrier for Collision-Resistance. CRYPTO (2) 2023: 514-546 - [c148]Yevgeniy Dodis, Willy Quach, Daniel Wichs:
Speak Much, Remember Little: Cryptography in the Bounded Storage Model, Revisited. EUROCRYPT (1) 2023: 86-116 - [c147]Yevgeniy Dodis, Daniel Jost, Balachandar Kesavan, Antonio Marcedone:
End-to-End Encrypted Zoom Meetings: Proving Security and Strengthening Liveness. EUROCRYPT (5) 2023: 157-189 - [c146]Marshall Ball, Yevgeniy Dodis, Eli Goldin:
Immunizing Backdoored PRGs. TCC (3) 2023: 153-182 - [c145]Yevgeniy Dodis, Shai Halevi, Daniel Wichs:
Security with Functional Re-encryption from CPA. TCC (2) 2023: 279-305 - [i93]Yevgeniy Dodis, Niels Ferguson, Eli Goldin, Peter Hall, Krzysztof Pietrzak:
Random Oracle Combiners: Breaking the Concatenation Barrier for Collision-Resistance. IACR Cryptol. ePrint Arch. 2023: 1041 (2023) - [i92]Yevgeniy Dodis, Shai Halevi, Daniel Wichs:
Security with Functional Re-Encryption from CPA. IACR Cryptol. ePrint Arch. 2023: 1443 (2023) - [i91]Marshall Ball, Yevgeniy Dodis, Eli Goldin:
Immunizing Backdoored PRGs. IACR Cryptol. ePrint Arch. 2023: 1778 (2023) - [i90]Yevgeniy Dodis, Daniel Jost, Balachandar Kesavan, Antonio Marcedone:
End-to-End Encrypted Zoom Meetings: Proving Security and Strengthening Liveness. IACR Cryptol. ePrint Arch. 2023: 1829 (2023) - 2022
- [c144]Brian Chen, Yevgeniy Dodis, Esha Ghosh, Eli Goldin, Balachandar Kesavan, Antonio Marcedone, Merry Ember Mou:
Rotatable Zero Knowledge Sets - Post Compromise Secure Auditable Dictionaries with Application to Key Transparency. ASIACRYPT (3) 2022: 547-580 - [c143]Sandro Coretti, Yevgeniy Dodis, Harish Karthikeyan, Noah Stephens-Davidowitz, Stefano Tessaro:
On Seedless PRNGs and Premature Next. ITC 2022: 9:1-9:20 - [c142]Chandranan Dhar, Yevgeniy Dodis, Mridul Nandi:
Revisiting Collision and Local Opening Analysis of ABR Hash. ITC 2022: 11:1-11:22 - [c141]Alexander Bienstock, Yevgeniy Dodis, Yi Tang:
Multicast Key Agreement, Revisited. CT-RSA 2022: 1-25 - [c140]Yevgeniy Dodis, Willy Quach, Daniel Wichs:
Authentication in the Bounded Storage Model. EUROCRYPT (3) 2022: 737-766 - [c139]Yevgeniy Dodis, Harish Karthikeyan, Daniel Wichs:
Small-Box Cryptography. ITCS 2022: 56:1-56:25 - [c138]Erik Aronesty, David Cash, Yevgeniy Dodis, Daniel H. Gallancy, Christopher Higley, Harish Karthikeyan, Oren Tysor:
Encapsulated Search Index: Public-Key, Sub-linear, Distributed, and Delegatable. Public Key Cryptography (2) 2022: 256-285 - [c137]Yevgeniy Dodis, Daniel Jost, Harish Karthikeyan:
Forward-Secure Encryption with Fast Forwarding. TCC (2) 2022: 3-32 - [c136]Alexander Bienstock, Yevgeniy Dodis, Sanjam Garg, Garrison Grogan, Mohammad Hajiabadi, Paul Rösler:
On the Worst-Case Inefficiency of CGKA. TCC (2) 2022: 213-243 - [e7]Yevgeniy Dodis, Thomas Shrimpton:
Advances in Cryptology - CRYPTO 2022 - 42nd Annual International Cryptology Conference, CRYPTO 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part I. Lecture Notes in Computer Science 13507, Springer 2022, ISBN 978-3-031-15801-8 [contents] - [e6]Yevgeniy Dodis, Thomas Shrimpton:
Advances in Cryptology - CRYPTO 2022 - 42nd Annual International Cryptology Conference, CRYPTO 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part II. Lecture Notes in Computer Science 13508, Springer 2022, ISBN 978-3-031-15978-7 [contents] - [e5]Yevgeniy Dodis, Thomas Shrimpton:
Advances in Cryptology - CRYPTO 2022 - 42nd Annual International Cryptology Conference, CRYPTO 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part III. Lecture Notes in Computer Science 13509, Springer 2022, ISBN 978-3-031-15981-7 [contents] - [e4]Yevgeniy Dodis, Thomas Shrimpton:
Advances in Cryptology - CRYPTO 2022 - 42nd Annual International Cryptology Conference, CRYPTO 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part IV. Lecture Notes in Computer Science 13510, Springer 2022, ISBN 978-3-031-15984-8 [contents] - [i89]Yevgeniy Dodis, Harish Karthikeyan, Daniel Wichs:
Updatable Public Key Encryption in the Standard Model. IACR Cryptol. ePrint Arch. 2022: 68 (2022) - [i88]Yevgeniy Dodis, Harish Karthikeyan, Daniel Wichs:
Small-Box Cryptography. IACR Cryptol. ePrint Arch. 2022: 69 (2022) - [i87]Erik Aronesty, David Cash, Yevgeniy Dodis, Daniel H. Gallancy, Christopher Higley, Harish Karthikeyan, Oren Tysor:
Encapsulated Search Index: Public-Key, Sub-linear, Distributed, and Delegatable. IACR Cryptol. ePrint Arch. 2022: 71 (2022) - [i86]Sandro Coretti, Yevgeniy Dodis, Harish Karthikeyan, Noah Stephens-Davidowitz, Stefano Tessaro:
On Seedless PRNGs and Premature Next. IACR Cryptol. ePrint Arch. 2022: 558 (2022) - [i85]Yevgeniy Dodis, Willy Quach, Daniel Wichs:
Authentication in the Bounded Storage Model. IACR Cryptol. ePrint Arch. 2022: 690 (2022) - [i84]Yevgeniy Dodis, Daniel Jost, Harish Karthikeyan:
Forward-Secure Encryption with Fast Forwarding. IACR Cryptol. ePrint Arch. 2022: 1233 (2022) - [i83]Alexander Bienstock, Yevgeniy Dodis, Sanjam Garg, Garrison Grogan, Mohammad Hajiabadi, Paul Rösler:
On the Worst-Case Inefficiency of CGKA. IACR Cryptol. ePrint Arch. 2022: 1237 (2022) - [i82]Brian Chen, Yevgeniy Dodis, Esha Ghosh, Eli Goldin, Balachandar Kesavan, Antonio Marcedone, Merry Ember Mou:
Rotatable Zero Knowledge Sets: Post Compromise Secure Auditable Dictionaries with application to Key Transparency. IACR Cryptol. ePrint Arch. 2022: 1264 (2022) - 2021
- [c135]Joël Alwen, Sandro Coretti, Yevgeniy Dodis, Yiannis Tselekounis:
Modular Design of Secure Group Messaging Protocols and the Security of MLS. CCS 2021: 1463-1483 - [c134]Yevgeniy Dodis, Kevin Yeo:
Doubly-Affine Extractors, and Their Applications. ITC 2021: 13:1-13:23 - [c133]Yevgeniy Dodis, Siyao Guo, Noah Stephens-Davidowitz, Zhiye Xie:
Online Linear Extractors for Independent Sources. ITC 2021: 14:1-14:14 - [c132]Yevgeniy Dodis, Dmitry Khovratovich, Nicky Mouha, Mridul Nandi:
T₅: Hashing Five Inputs with Three Compression Calls. ITC 2021: 24:1-24:23 - [c131]Yevgeniy Dodis, Siyao Guo, Noah Stephens-Davidowitz, Zhiye Xie:
No Time to Hash: On Super-Efficient Entropy Accumulation. CRYPTO (4) 2021: 548-576 - [c130]Alexander Bienstock, Yevgeniy Dodis, Kevin Yeo:
Forward Secret Encrypted RAM: Lower Bounds and Applications. TCC (3) 2021: 62-93 - [c129]Yevgeniy Dodis, Harish Karthikeyan, Daniel Wichs:
Updatable Public Key Encryption in the Standard Model. TCC (3) 2021: 254-285 - [i81]Alexander Bienstock, Yevgeniy Dodis, Kevin Yeo:
Forward Secret Encrypted RAM: Lower Bounds and Applications. IACR Cryptol. ePrint Arch. 2021: 244 (2021) - [i80]Yevgeniy Dodis, Dmitry Khovratovich, Nicky Mouha, Mridul Nandi:
T5: Hashing Five Inputs with Three Compression Calls. IACR Cryptol. ePrint Arch. 2021: 373 (2021) - [i79]Yevgeniy Dodis, Siyao Guo, Noah Stephens-Davidowitz, Zhiye Xie:
No Time to Hash: On Superefficient Entropy Accumulation. IACR Cryptol. ePrint Arch. 2021: 523 (2021) - [i78]Yevgeniy Dodis, Kevin Yeo:
Doubly-Affine Extractors, and their Applications. IACR Cryptol. ePrint Arch. 2021: 637 (2021) - [i77]Yevgeniy Dodis, Siyao Guo, Noah Stephens-Davidowitz, Zhiye Xie:
Online Linear Extractors for Independent Sources. IACR Cryptol. ePrint Arch. 2021: 1002 (2021) - [i76]Joël Alwen, Sandro Coretti, Yevgeniy Dodis, Yiannis Tselekounis:
Modular Design of Secure Group Messaging Protocols and the Security of MLS. IACR Cryptol. ePrint Arch. 2021: 1083 (2021) - [i75]Yevgeniy Dodis, Willy Quach, Daniel Wichs:
Speak Much, Remember Little: Cryptography in the Bounded Storage Model, Revisited. IACR Cryptol. ePrint Arch. 2021: 1270 (2021) - [i74]Alexander Bienstock, Yevgeniy Dodis, Yi Tang:
Multicast Key Agreement, Revisited. IACR Cryptol. ePrint Arch. 2021: 1570 (2021) - 2020
- [j10]Sandro Coretti, Yevgeniy Dodis, Ueli Maurer, Björn Tackmann, Daniele Venturi:
Non-malleable Encryption: Simpler, Shorter, Stronger. J. Cryptol. 33(4): 1984-2033 (2020) - [c128]Joël Alwen, Sandro Coretti, Yevgeniy Dodis, Yiannis Tselekounis:
Security Analysis and Improvements for the IETF MLS Standard for Group Messaging. CRYPTO (1) 2020: 248-277 - [c127]Yevgeniy Dodis, Vinod Vaikuntanathan, Daniel Wichs:
Extracting Randomness from Extractor-Dependent Sources. EUROCRYPT (1) 2020: 313-342 - [c126]Alexander Bienstock, Yevgeniy Dodis, Paul Rösler:
On the Price of Concurrency in Group Ratcheting Protocols. TCC (2) 2020: 198-228 - [c125]Yevgeniy Dodis, Pooya Farshim, Sogol Mazaheri, Stefano Tessaro:
Towards Defeating Backdoored Random Oracles: Indifferentiability with Bounded Adaptivity. TCC (3) 2020: 241-273 - [i73]Alexander Bienstock, Yevgeniy Dodis, Paul Rösler:
On the Price of Concurrency in Group Ratcheting Protocols. IACR Cryptol. ePrint Arch. 2020: 1171 (2020) - [i72]Yevgeniy Dodis, Pooya Farshim, Sogol Mazaheri, Stefano Tessaro:
Towards Defeating Backdoored Random Oracles: Indifferentiability with Bounded Adaptivity. IACR Cryptol. ePrint Arch. 2020: 1199 (2020)
2010 – 2019
- 2019
- [c124]Sandro Coretti, Yevgeniy Dodis, Harish Karthikeyan, Stefano Tessaro:
Seedless Fruit Is the Sweetest: Random Number Generation, Revisited. CRYPTO (1) 2019: 205-234 - [c123]Melissa Chase, Yevgeniy Dodis, Yuval Ishai, Daniel Kraschewski, Tianren Liu, Rafail Ostrovsky, Vinod Vaikuntanathan:
Reusable Non-Interactive Secure Computation. CRYPTO (3) 2019: 462-488 - [c122]Joël Alwen, Sandro Coretti, Yevgeniy Dodis:
The Double Ratchet: Security Notions, Proofs, and Modularization for the Signal Protocol. EUROCRYPT (1) 2019: 129-158 - [i71]Yevgeniy Dodis, Paul Grubbs, Thomas Ristenpart, Joanne Woodage:
Fast Message Franking: From Invisible Salamanders to Encryptment. IACR Cryptol. ePrint Arch. 2019: 16 (2019) - [i70]Sandro Coretti, Yevgeniy Dodis, Harish Karthikeyan, Stefano Tessaro:
Seedless Fruit is the Sweetest: Random Number Generation, Revisited. IACR Cryptol. ePrint Arch. 2019: 198 (2019) - [i69]Joël Alwen, Sandro Coretti, Yevgeniy Dodis, Yiannis Tselekounis:
Security Analysis and Improvements for the IETF MLS Standard for Group Messaging. IACR Cryptol. ePrint Arch. 2019: 1189 (2019) - [i68]Yevgeniy Dodis, Vinod Vaikuntanathan, Daniel Wichs:
Extracting Randomness from Extractor-Dependent Sources. IACR Cryptol. ePrint Arch. 2019: 1339 (2019) - 2018
- [j9]Divesh Aggarwal, Yevgeniy Dodis, Shachar Lovett:
Non-Malleable Codes from Additive Combinatorics. SIAM J. Comput. 47(2): 524-546 (2018) - [c121]Yevgeniy Dodis, Paul Grubbs, Thomas Ristenpart, Joanne Woodage:
Fast Message Franking: From Invisible Salamanders to Encryptment. CRYPTO (1) 2018: 155-186 - [c120]Sandro Coretti, Yevgeniy Dodis, Siyao Guo:
Non-Uniform Bounds in the Random-Permutation, Ideal-Cipher, and Generic-Group Models. CRYPTO (1) 2018: 693-721 - [c119]Benoît Cogliati, Yevgeniy Dodis, Jonathan Katz, Jooyoung Lee, John P. Steinberger, Aishwarya Thiruvengadam, Zhe Zhang:
Provable Security of (Tweakable) Block Ciphers Based on Substitution-Permutation Networks. CRYPTO (1) 2018: 722-753 - [c118]Sandro Coretti, Yevgeniy Dodis, Siyao Guo, John P. Steinberger:
Random Oracles and Non-uniformity. EUROCRYPT (1) 2018: 227-258 - [i67]Sandro Coretti, Yevgeniy Dodis, Siyao Guo:
Non-Uniform Bounds in the Random-Permutation, Ideal-Cipher, and Generic-Group Models. IACR Cryptol. ePrint Arch. 2018: 226 (2018) - [i66]Melissa Chase, Yevgeniy Dodis, Yuval Ishai, Daniel Kraschewski, Tianren Liu, Rafail Ostrovsky, Vinod Vaikuntanathan:
Reusable Non-Interactive Secure Computation. IACR Cryptol. ePrint Arch. 2018: 940 (2018) - [i65]Joël Alwen, Sandro Coretti, Yevgeniy Dodis:
The Double Ratchet: Security Notions, Proofs, and Modularization for the Signal Protocol. IACR Cryptol. ePrint Arch. 2018: 1037 (2018) - 2017
- [j8]Yevgeniy Dodis, Adi Shamir, Noah Stephens-Davidowitz, Daniel Wichs:
How to Eat Your Entropy and Have it Too: Optimal Recovery Strategies for Compromised RNGs. Algorithmica 79(4): 1196-1232 (2017) - [c117]Yevgeniy Dodis:
Basing cryptography on biometrics and other noisy data. CISS 2017: 1 - [c116]Joanne Woodage, Rahul Chatterjee, Yevgeniy Dodis, Ari Juels, Thomas Ristenpart:
A New Distribution-Sensitive Secure Sketch and Popularity-Proportional Hashing. CRYPTO (3) 2017: 682-710 - [c115]Yevgeniy Dodis, Siyao Guo, Jonathan Katz:
Fixing Cracks in the Concrete: Random Oracles with Auxiliary Input, Revisited. EUROCRYPT (2) 2017: 473-495 - [c114]Yevgeniy Dodis, Dario Fiore:
Unilaterally-Authenticated Key Exchange. Financial Cryptography 2017: 542-560 - [i64]Yevgeniy Dodis, Jonathan Katz, John P. Steinberger, Aishwarya Thiruvengadam, Zhe Zhang:
Provable Security of Substitution-Permutation Networks. IACR Cryptol. ePrint Arch. 2017: 16 (2017) - [i63]Yevgeniy Dodis, Dario Fiore:
Unilaterally-Authenticated Key Exchange. IACR Cryptol. ePrint Arch. 2017: 109 (2017) - [i62]Joanne Woodage, Rahul Chatterjee, Yevgeniy Dodis, Ari Juels, Thomas Ristenpart:
A New Distribution Sensitive Secure Sketch and a Comparison Between Approaches to Typo-Tolerant Authentication. IACR Cryptol. ePrint Arch. 2017: 542 (2017) - [i61]Sandro Coretti, Yevgeniy Dodis, Siyao Guo, John P. Steinberger:
Random Oracles and Non-Uniformity. IACR Cryptol. ePrint Arch. 2017: 937 (2017) - 2016
- [c113]Yevgeniy Dodis, Shai Halevi, Ron D. Rothblum, Daniel Wichs:
Spooky Encryption and Its Applications. CRYPTO (3) 2016: 93-122 - [c112]Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz:
Message Transmission with Reverse Firewalls - Secure Communication on Corrupted Machines. CRYPTO (1) 2016: 341-372 - [c111]Yevgeniy Dodis, Martijn Stam, John P. Steinberger, Tianren Liu:
Indifferentiability of Confusion-Diffusion Networks. EUROCRYPT (2) 2016: 679-704 - [c110]Sandro Coretti, Yevgeniy Dodis, Björn Tackmann, Daniele Venturi:
Non-Malleable Encryption: Simpler, Shorter, Stronger. TCC (A1) 2016: 306-335 - [c109]Allison Bishop, Yevgeniy Dodis:
Interactive Coding for Interactive Proofs. TCC (A2) 2016: 352-366 - [i60]Yevgeniy Dodis, Shai Halevi, Ron D. Rothblum, Daniel Wichs:
Spooky Encryption and its Applications. IACR Cryptol. ePrint Arch. 2016: 272 (2016) - [i59]Yevgeniy Dodis, Chaya Ganesh, Alexander Golovnev, Ari Juels, Thomas Ristenpart:
A Formal Treatment of Backdoored Pseudorandom Generators. IACR Cryptol. ePrint Arch. 2016: 306 (2016) - 2015
- [c108]Yevgeniy Dodis, Yanqing Yao:
Privacy with Imperfect Randomness. CRYPTO (2) 2015: 463-482 - [c107]Yevgeniy Dodis, Chaya Ganesh, Alexander Golovnev, Ari Juels, Thomas Ristenpart:
A Formal Treatment of Backdoored Pseudorandom Generators. EUROCRYPT (1) 2015: 101-126 - [c106]Divesh Aggarwal, Yevgeniy Dodis, Tomasz Kazana, Maciej Obremski:
Non-malleable Reductions and Applications. STOC 2015: 459-468 - [e3]Yevgeniy Dodis, Jesper Buus Nielsen:
Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I. Lecture Notes in Computer Science 9014, Springer 2015, ISBN 978-3-662-46493-9 [contents] - [e2]Yevgeniy Dodis, Jesper Buus Nielsen:
Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part II. Lecture Notes in Computer Science 9015, Springer 2015, ISBN 978-3-662-46496-0 [contents] - [i58]Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz:
Message Transmission with Reverse Firewalls - Secure Communication on Corrupted Machines. IACR Cryptol. ePrint Arch. 2015: 548 (2015) - [i57]Yevgeniy Dodis, Tianren Liu, Martijn Stam, John P. Steinberger:
Indifferentiability of Confusion-Diffusion Networks. IACR Cryptol. ePrint Arch. 2015: 680 (2015) - [i56]Sandro Coretti, Yevgeniy Dodis, Björn Tackmann, Daniele Venturi:
Non-Malleable Encryption: Simpler, Shorter, Stronger. IACR Cryptol. ePrint Arch. 2015: 772 (2015) - 2014
- [j7]Yevgeniy Dodis, Xin Li, Trevor D. Wooley, David Zuckerman:
Privacy Amplification and Nonmalleable Extractors Via Character Sums. SIAM J. Comput. 43(2): 800-830 (2014) - [c105]Yevgeniy Dodis, Adi Shamir, Noah Stephens-Davidowitz, Daniel Wichs:
How to Eat Your Entropy and Have It Too - Optimal Recovery Strategies for Compromised RNGs. CRYPTO (2) 2014: 37-54 - [c104]Divesh Aggarwal, Yevgeniy Dodis, Zahra Jafargholi, Eric Miles, Leonid Reyzin:
Amplifying Privacy in Privacy Amplification. CRYPTO (2) 2014: 183-198 - [c103]Yevgeniy Dodis, Krzysztof Pietrzak, Daniel Wichs:
Key Derivation without Entropy Waste. EUROCRYPT 2014: 93-110 - [c102]Yevgeniy Dodis, Dario Fiore:
Interactive Encryption and Message Authentication. SCN 2014: 494-513 - [c101]Divesh Aggarwal, Yevgeniy Dodis, Shachar Lovett:
Non-malleable codes from additive combinatorics. STOC 2014: 774-783 - [i55]Divesh Aggarwal, Yevgeniy Dodis, Tomasz Kazana, Maciej Obremski:
Non-malleable Reductions and Applications. Electron. Colloquium Comput. Complex. TR14 (2014) - [i54]Yevgeniy Dodis, Adi Shamir, Noah Stephens-Davidowitz, Daniel Wichs:
How to Eat Your Entropy and Have it Too - Optimal Recovery Strategies for Compromised RNGs. IACR Cryptol. ePrint Arch. 2014: 167 (2014) - [i53]Yevgeniy Dodis, Yanqing Yao:
Privacy and Imperfect Randomness. IACR Cryptol. ePrint Arch. 2014: 623 (2014) - [i52]Divesh Aggarwal, Yevgeniy Dodis, Tomasz Kazana, Maciej Obremski:
Non-malleable Reductions and Applications. IACR Cryptol. ePrint Arch. 2014: 821 (2014) - [i51]Yevgeniy Dodis, Allison Bishop Lewko:
Interactive Coding for Interactive Proofs. IACR Cryptol. ePrint Arch. 2014: 827 (2014) - 2013
- [c100]Shweta Agrawal, Yevgeniy Dodis, Vinod Vaikuntanathan, Daniel Wichs:
On Continual Leakage of Discrete Log Representations. ASIACRYPT (2) 2013: 401-420 - [c99]Yevgeniy Dodis, David Pointcheval, Sylvain Ruhault, Damien Vergnaud, Daniel Wichs:
Security analysis of pseudo-random number generators with input: /dev/random is not robust. CCS 2013: 647-658 - [c98]Elena Andreeva, Andrey Bogdanov, Yevgeniy Dodis, Bart Mennink, John P. Steinberger:
On the Indifferentiability of Key-Alternating Ciphers. CRYPTO (1) 2013: 531-550 - [c97]Yevgeniy Dodis, Yu Yu:
Overcoming Weak Expectations. TCC 2013: 1-22 - [i50]Divesh Aggarwal, Yevgeniy Dodis, Shachar Lovett:
Non-malleable Codes from Additive Combinatorics. Electron. Colloquium Comput. Complex. TR13 (2013) - [i49]Elena Andreeva, Andrey Bogdanov, Yevgeniy Dodis, Bart Mennink, John P. Steinberger:
On the Indifferentiability of Key-Alternating Ciphers. IACR Cryptol. ePrint Arch. 2013: 61 (2013) - [i48]Divesh Aggarwal, Yevgeniy Dodis, Shachar Lovett:
Non-malleable Codes from Additive Combinatorics. IACR Cryptol. ePrint Arch. 2013: 201 (2013) - [i47]Yevgeniy Dodis, David Pointcheval, Sylvain Ruhault, Damien Vergnaud, Daniel Wichs:
Security Analysis of Pseudo-Random Number Generators with Input: /dev/random is not Robust. IACR Cryptol. ePrint Arch. 2013: 338 (2013) - [i46]Yevgeniy Dodis, Thomas Ristenpart, John P. Steinberger, Stefano Tessaro:
To Hash or Not to Hash Again? (In)differentiability Results for H2 and HMAC. IACR Cryptol. ePrint Arch. 2013: 382 (2013) - [i45]Yevgeniy Dodis, Krzysztof Pietrzak, Daniel Wichs:
Key Derivation Without Entropy Waste. IACR Cryptol. ePrint Arch. 2013: 708 (2013) - [i44]Divesh Aggarwal, Yevgeniy Dodis, Zahra Jafargholi, Eric Miles, Leonid Reyzin:
Amplifying Privacy in Privacy Amplification. IACR Cryptol. ePrint Arch. 2013: 723 (2013) - [i43]Yevgeniy Dodis, Dario Fiore:
Interactive Encryption, Message Authentication, and Anonymous Key Exchange. IACR Cryptol. ePrint Arch. 2013: 817 (2013) - 2012
- [j6]Richard Cole, Yevgeniy Dodis, Tim Roughgarden:
Bottleneck links, variable demand, and the tragedy of the commons. Networks 60(3): 194-203 (2012) - [j5]Yevgeniy Dodis, Bhavana Kanukurthi, Jonathan Katz, Leonid Reyzin, Adam D. Smith:
Robust Fuzzy Extractors and Authenticated Key Agreement From Close Secrets. IEEE Trans. Inf. Theory 58(9): 6207-6222 (2012) - [c96]Yevgeniy Dodis, Weiliang Luo, Shouhuai Xu, Moti Yung:
Key-insulated symmetric key cryptography and mitigating attacks against cryptographic cloud software. AsiaCCS 2012: 57-58 - [c95]Yevgeniy Dodis, Thomas Ristenpart, John P. Steinberger, Stefano Tessaro:
To Hash or Not to Hash Again? (In)Differentiability Results for H 2 and HMAC. CRYPTO 2012: 348-366 - [c94]Yevgeniy Dodis, Adriana López-Alt, Ilya Mironov, Salil P. Vadhan:
Differential Privacy with Imperfect Randomness. CRYPTO 2012: 497-516 - [c93]Yevgeniy Dodis, Eike Kiltz, Krzysztof Pietrzak, Daniel Wichs:
Message Authentication, Revisited. EUROCRYPT 2012: 355-374 - [c92]Yevgeniy Dodis:
Shannon Impossibility, Revisited. ICITS 2012: 100-110 - [c91]Yevgeniy Dodis, Yu Yu:
Overcoming weak expectations. ITW 2012: 109-113 - [c90]Yevgeniy Dodis, Iftach Haitner, Aris Tentes:
On the Instantiability of Hash-and-Sign RSA Signatures. TCC 2012: 112-132 - [c89]Yevgeniy Dodis, Abhishek Jain, Tal Moran, Daniel Wichs:
Counterexamples to Hardness Amplification beyond Negligible. TCC 2012: 476-493 - [c88]Yevgeniy Dodis, Thomas Ristenpart, Salil P. Vadhan:
Randomness Condensers for Efficiently Samplable, Seed-Dependent Sources. TCC 2012: 618-635 - [i42]Yevgeniy Dodis, Abhishek Jain, Tal Moran, Daniel Wichs:
Counterexamples to Hardness Amplification Beyond Negligible. IACR Cryptol. ePrint Arch. 2012: 32 (2012) - [i41]Yevgeniy Dodis:
Beating Shannon requires BOTH efficient adversaries AND non-zero advantage. IACR Cryptol. ePrint Arch. 2012: 53 (2012) - [i40]Yevgeniy Dodis, Eike Kiltz, Krzysztof Pietrzak, Daniel Wichs:
Message Authentication, Revisited. IACR Cryptol. ePrint Arch. 2012: 59 (2012) - [i39]Shweta Agrawal, Yevgeniy Dodis, Vinod Vaikuntanathan, Daniel Wichs:
On Continual Leakage of Discrete Log Representations. IACR Cryptol. ePrint Arch. 2012: 367 (2012) - [i38]Yevgeniy Dodis, Adriana López-Alt, Ilya Mironov, Salil P. Vadhan:
Differential Privacy with Imperfect Randomness. IACR Cryptol. ePrint Arch. 2012: 435 (2012) - 2011
- [c87]Boaz Barak, Yevgeniy Dodis, Hugo Krawczyk, Olivier Pereira, Krzysztof Pietrzak, François-Xavier Standaert, Yu Yu:
Leftover Hash Lemma, Revisited. CRYPTO 2011: 1-20 - [c86]Yevgeniy Dodis, John P. Steinberger:
Domain Extension for MACs Beyond the Birthday Barrier. EUROCRYPT 2011: 323-342 - [c85]Yevgeniy Dodis, Xin Li, Trevor D. Wooley, David Zuckerman:
Privacy Amplification and Non-malleable Extractors via Character Sums. FOCS 2011: 668-677 - [c84]Yevgeniy Dodis, Allison B. Lewko, Brent Waters, Daniel Wichs:
Storing Secrets on Continually Leaky Devices. FOCS 2011: 688-697 - [r2]Yevgeniy Dodis:
Signcryption. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1210-1215 - [i37]Yevgeniy Dodis, Iftach Haitner, Aris Tentes:
On the (In)Security of RSA Signatures. IACR Cryptol. ePrint Arch. 2011: 87 (2011) - [i36]Boaz Barak, Yevgeniy Dodis, Hugo Krawczyk, Olivier Pereira, Krzysztof Pietrzak, François-Xavier Standaert, Yu Yu:
Leftover Hash Lemma, Revisited. IACR Cryptol. ePrint Arch. 2011: 88 (2011) - [i35]Yevgeniy Dodis, Allison B. Lewko, Brent Waters, Daniel Wichs:
Storing Secrets on Continually Leaky Devices. IACR Cryptol. ePrint Arch. 2011: 369 (2011) - 2010
- [c83]Yevgeniy Dodis, Kristiyan Haralambiev, Adriana López-Alt, Daniel Wichs:
Efficient Public-Key Cryptography in the Presence of Key Leakage. ASIACRYPT 2010: 613-631 - [c82]Sherman S. M. Chow, Yevgeniy Dodis, Yannis Rouselakis, Brent Waters:
Practical leakage-resilient identity-based encryption from simple assumptions. CCS 2010: 152-161 - [c81]Yevgeniy Dodis, Krzysztof Pietrzak:
Leakage-Resilient Pseudorandom Functions and Side-Channel Attacks on Feistel Networks. CRYPTO 2010: 21-40 - [c80]Joël Alwen, Yevgeniy Dodis, Moni Naor, Gil Segev, Shabsi Walfish, Daniel Wichs:
Public-Key Encryption in the Bounded-Retrieval Model. EUROCRYPT 2010: 113-134 - [c79]Yevgeniy Dodis, Kristiyan Haralambiev, Adriana López-Alt, Daniel Wichs:
Cryptography against Continuous Memory Attacks. FOCS 2010: 511-520 - [c78]Yevgeniy Dodis, Mihai Patrascu, Mikkel Thorup:
Changing base without losing space. STOC 2010: 593-602 - [c77]Jean-Sébastien Coron, Yevgeniy Dodis, Avradip Mandal, Yannick Seurin:
A Domain Extender for the Ideal Cipher. TCC 2010: 273-289 - [c76]Yevgeniy Dodis, Shafi Goldwasser, Yael Tauman Kalai, Chris Peikert, Vinod Vaikuntanathan:
Public-Key Encryption Schemes with Auxiliary Inputs. TCC 2010: 361-381 - [p2]Yevgeniy Dodis:
Concealment and Its Applications to Authenticated Encryption. Practical Signcryption 2010: 149-173 - [i34]Yevgeniy Dodis, Kristiyan Haralambiev, Adriana López-Alt, Daniel Wichs:
Efficient Public-Key Cryptography in the Presence of Key Leakage. IACR Cryptol. ePrint Arch. 2010: 154 (2010) - [i33]Yevgeniy Dodis, Kristiyan Haralambiev, Adriana López-Alt, Daniel Wichs:
Cryptography Against Continuous Memory Attacks. IACR Cryptol. ePrint Arch. 2010: 196 (2010) - [i32]Yevgeniy Dodis, Bhavana Kanukurthi, Jonathan Katz, Leonid Reyzin, Adam D. Smith:
Robust Fuzzy Extractors and Authenticated Key Agreement from Close Secrets. IACR Cryptol. ePrint Arch. 2010: 456 (2010)
2000 – 2009
- 2009
- [c75]Joël Alwen, Yevgeniy Dodis, Daniel Wichs:
Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model. CRYPTO 2009: 36-54 - [c74]Yevgeniy Dodis, John P. Steinberger:
Message Authentication Codes from Unpredictable Block Ciphers. CRYPTO 2009: 267-285 - [c73]Yevgeniy Dodis, Thomas Ristenpart, Thomas Shrimpton:
Salvaging Merkle-Damgård for Practical Applications. EUROCRYPT 2009: 371-388 - [c72]Yevgeniy Dodis, Leonid Reyzin, Ronald L. Rivest, Emily Shen:
Indifferentiability of Permutation-Based Compression Functions and Tree-Based Modes of Operation, with Applications to MD6. FSE 2009: 104-121 - [c71]Joël Alwen, Yevgeniy Dodis, Daniel Wichs:
Survey: Leakage Resilience and the Bounded Retrieval Model. ICITS 2009: 1-18 - [c70]Yevgeniy Dodis, Daniel Wichs:
Non-malleable extractors and symmetric key cryptography from weak secrets. STOC 2009: 601-610 - [c69]Yevgeniy Dodis, Yael Tauman Kalai, Shachar Lovett:
On cryptography with auxiliary input. STOC 2009: 621-630 - [c68]Yevgeniy Dodis, Salil P. Vadhan, Daniel Wichs:
Proofs of Retrievability via Hardness Amplification. TCC 2009: 109-127 - [c67]Yevgeniy Dodis, Russell Impagliazzo, Ragesh Jaiswal, Valentine Kabanets:
Security Amplification for InteractiveCryptographic Primitives. TCC 2009: 128-145 - [c66]Yevgeniy Dodis, Jonathan Katz, Adam D. Smith, Shabsi Walfish:
Composability and On-Line Deniability of Authentication. TCC 2009: 146-162 - [p1]Danfeng (Daphne) Yao, Nelly Fazio, Yevgeniy Dodis, Anna Lysyanskaya:
Forward-Secure Hierarchical IBE with Applications to Broadcast Encryption. Identity-Based Cryptography 2009: 100-118 - [i31]Yevgeniy Dodis, Salil P. Vadhan, Daniel Wichs:
Proofs of Retrievability via Hardness Amplification. IACR Cryptol. ePrint Arch. 2009: 41 (2009) - [i30]Joël Alwen, Yevgeniy Dodis, Daniel Wichs:
Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model. IACR Cryptol. ePrint Arch. 2009: 160 (2009) - [i29]Yevgeniy Dodis, Thomas Ristenpart, Thomas Shrimpton:
Salvaging Merkle-Damgard for Practical Applications. IACR Cryptol. ePrint Arch. 2009: 177 (2009) - [i28]Jean-Sébastien Coron, Yevgeniy Dodis, Avradip Mandal, Yannick Seurin:
A Domain Extender for the Ideal Cipher. IACR Cryptol. ePrint Arch. 2009: 356 (2009) - [i27]Joël Alwen, Yevgeniy Dodis, Moni Naor, Gil Segev, Shabsi Walfish, Daniel Wichs:
Public-Key Encryption in the Bounded-Retrieval Model. IACR Cryptol. ePrint Arch. 2009: 512 (2009) - 2008
- [j4]Yevgeniy Dodis, Pil Joong Lee, Dae Hyun Yum:
Optimistic Fair Exchange in a Multi-user Setting. J. Univers. Comput. Sci. 14(3): 318-346 (2008) - [j3]Yevgeniy Dodis, Rafail Ostrovsky, Leonid Reyzin, Adam D. Smith:
Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data. SIAM J. Comput. 38(1): 97-139 (2008) - [c65]Yevgeniy Dodis, Prashant Puniya:
Getting the Best Out of Existing Hash Functions; or What if We Are Stuck with SHA?. ACNS 2008: 156-173 - [c64]Yevgeniy Dodis, Victor Shoup, Shabsi Walfish:
Efficient Constructions of Composable Commitments and Zero-Knowledge Proofs. CRYPTO 2008: 515-535 - [c63]Yevgeniy Dodis, Krzysztof Pietrzak, Prashant Puniya:
A New Mode of Operation for Block Ciphers and Length-Preserving MACs. EUROCRYPT 2008: 198-219 - [c62]Ronald Cramer, Yevgeniy Dodis, Serge Fehr, Carles Padró, Daniel Wichs:
Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors. EUROCRYPT 2008: 471-488 - [i26]Ronald Cramer, Yevgeniy Dodis, Serge Fehr, Carles Padró, Daniel Wichs:
Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors. IACR Cryptol. ePrint Arch. 2008: 30 (2008) - [i25]Yevgeniy Dodis, Daniel Wichs:
Non-Malleable Extractors and Symmetric Key Cryptography from Weak Secrets. IACR Cryptol. ePrint Arch. 2008: 503 (2008) - 2007
- [c61]Yevgeniy Dodis, Prashant Puniya:
Feistel Networks Made Public, and Applications. EUROCRYPT 2007: 534-554 - [c60]Yevgeniy Dodis, Krzysztof Pietrzak:
Improving the Security of MACs Via Randomized Message Preprocessing. FSE 2007: 414-433 - [c59]Yevgeniy Dodis, Pil Joong Lee, Dae Hyun Yum:
Optimistic Fair Exchange in a Multi-user Setting. Public Key Cryptography 2007: 118-133 - [c58]Carl Bosley, Yevgeniy Dodis:
Does Privacy Require True Randomness? TCC 2007: 1-20 - [c57]Ran Canetti, Yevgeniy Dodis, Rafael Pass, Shabsi Walfish:
Universally Composable Security with Global Setup. TCC 2007: 61-85 - [c56]David Cash, Yan Zong Ding, Yevgeniy Dodis, Wenke Lee, Richard J. Lipton, Shabsi Walfish:
Intrusion-Resilient Key Exchange in the Bounded Retrieval Model. TCC 2007: 479-498 - [i24]Yevgeniy Dodis, Pil Joong Lee, Dae Hyun Yum:
Optimistic Fair Exchange in a Multi-user Setting. IACR Cryptol. ePrint Arch. 2007: 182 (2007) - 2006
- [j2]Richard Cole, Yevgeniy Dodis, Tim Roughgarden:
How much can taxes help selfish routing? J. Comput. Syst. Sci. 72(3): 444-467 (2006) - [c55]Yevgeniy Dodis, Jonathan Katz, Leonid Reyzin, Adam D. Smith:
Robust Fuzzy Extractors and Authenticated Key Agreement from Close Secrets. CRYPTO 2006: 232-250 - [c54]Yevgeniy Dodis, Renato Renner:
On the Impossibility of Extracting Classical Randomness Using a Quantum Computer. ICALP (2) 2006: 204-215 - [c53]Richard Cole, Yevgeniy Dodis, Tim Roughgarden:
Bottleneck links, variable demand, and the tragedy of the commons. SODA 2006: 668-677 - [c52]Dario Catalano, Yevgeniy Dodis, Ivan Visconti:
Mercurial Commitments: Minimal Assumptions and Efficient Constructions. TCC 2006: 120-144 - [c51]Yevgeniy Dodis, Prashant Puniya:
On the Relation Between the Ideal Cipher and the Random Oracle Models. TCC 2006: 184-206 - [c50]Yevgeniy Dodis, Aleksandr Yampolskiy, Moti Yung:
Threshold and Proactive Pseudo-Random Permutations. TCC 2006: 542-560 - [c49]Yevgeniy Dodis, Krzysztof Pietrzak, Bartosz Przydatek:
Separating Sources for Encryption and Secret Sharing. TCC 2006: 601-616 - [e1]Moti Yung, Yevgeniy Dodis, Aggelos Kiayias, Tal Malkin:
Public Key Cryptography - PKC 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings. Lecture Notes in Computer Science 3958, Springer 2006, ISBN 3-540-33851-9 [contents] - [i23]Yevgeniy Dodis, Rafail Ostrovsky, Leonid Reyzin, Adam D. Smith:
Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data. CoRR abs/cs/0602007 (2006) - [i22]Carl Bosley, Yevgeniy Dodis:
Does Privacy Require True Randomness?. Electron. Colloquium Comput. Complex. TR06 (2006) - [i21]Yevgeniy Dodis, Aleksandr Yampolskiy, Moti Yung:
Threshold and Proactive Pseudo-Random Permutations. IACR Cryptol. ePrint Arch. 2006: 17 (2006) - [i20]Yevgeniy Dodis, Prashant Puniya:
Verifiable Random Permutations. IACR Cryptol. ePrint Arch. 2006: 78 (2006) - [i19]Carl Bosley, Yevgeniy Dodis:
Does Privacy Require True Randomness? IACR Cryptol. ePrint Arch. 2006: 283 (2006) - [i18]Ran Canetti, Yevgeniy Dodis, Rafael Pass, Shabsi Walfish:
Universally Composable Security with Global Setup. IACR Cryptol. ePrint Arch. 2006: 432 (2006) - 2005
- [j1]Yevgeniy Dodis, Nelly Fazio, Aggelos Kiayias, Moti Yung:
Scalable public-key tracing and revoking. Distributed Comput. 17(4): 323-347 (2005) - [c48]Jean-Sébastien Coron, Yevgeniy Dodis, Cécile Malinaud, Prashant Puniya:
Merkle-Damgård Revisited: How to Construct a Hash Function. CRYPTO 2005: 430-448 - [c47]Yevgeniy Dodis, Roberto Oliveira, Krzysztof Pietrzak:
On the Generic Insecurity of the Full Domain Hash. CRYPTO 2005: 449-466 - [c46]Xavier Boyen, Yevgeniy Dodis, Jonathan Katz, Rafail Ostrovsky, Adam D. Smith:
Secure Remote Authentication Using Biometric Data. EUROCRYPT 2005: 147-163 - [c45]Yevgeniy Dodis, Dae Hyun Yum:
Time Capsule Signature. Financial Cryptography 2005: 57-71 - [c44]Yevgeniy Dodis:
On extractors, error-correction and hiding all partial information. ICITS 2005: 74-79 - [c43]Yevgeniy Dodis, Aleksandr Yampolskiy:
A Verifiable Random Function with Short Proofs and Keys. Public Key Cryptography 2005: 416-431 - [c42]Yevgeniy Dodis, Adam D. Smith:
Correcting errors without leaking partial information. STOC 2005: 654-663 - [c41]Yevgeniy Dodis, Jonathan Katz:
Chosen-Ciphertext Security of Multiple Encryption. TCC 2005: 188-209 - [c40]Yevgeniy Dodis, Adam D. Smith:
Entropic Security and the Encryption of High Entropy Messages. TCC 2005: 556-577 - [r1]Yevgeniy Dodis:
Signcryption. Encyclopedia of Cryptography and Security 2005 - [i17]Yevgeniy Dodis:
Minimal Assumptions for Efficient Mercurial Commitments. IACR Cryptol. ePrint Arch. 2005: 438 (2005) - 2004
- [c39]Yevgeniy Dodis, Ariel Elbaz, Roberto Oliveira, Ran Raz:
Improved Randomness Extraction from Two Independent Sources. APPROX-RANDOM 2004: 334-344 - [c38]Yevgeniy Dodis, Michael J. Freedman, Stanislaw Jarecki, Shabsi Walfish:
Versatile padding schemes for joint signature and encryption. CCS 2004: 344-353 - [c37]Danfeng Yao, Nelly Fazio, Yevgeniy Dodis, Anna Lysyanskaya:
ID-based encryption for complex hierarchies with applications to forward security and broadcast encryption. CCS 2004: 354-363 - [c36]Andris Ambainis, Harry Buhrman, Yevgeniy Dodis, Hein Röhrig:
Multiparty Quantum Coin Flipping. CCC 2004: 250-259 - [c35]Yevgeniy Dodis, Rosario Gennaro, Johan Håstad, Hugo Krawczyk, Tal Rabin:
Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes. CRYPTO 2004: 494-510 - [c34]Yevgeniy Dodis, Matthew K. Franklin, Jonathan Katz, Atsuko Miyaji, Moti Yung:
A Generic Construction for Intrusion-Resilient Public-Key Encryption. CT-RSA 2004: 81-98 - [c33]Yevgeniy Dodis, Leonid Reyzin, Adam D. Smith:
Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data. EUROCRYPT 2004: 523-540 - [c32]Yevgeniy Dodis, Aggelos Kiayias, Antonio Nicolosi, Victor Shoup:
Anonymous Identification in Ad Hoc Groups. EUROCRYPT 2004: 609-626 - [c31]Yevgeniy Dodis, Shien Jin Ong, Manoj Prabhakaran, Amit Sahai:
On the (Im)possibility of Cryptography with Imperfect Randomness. FOCS 2004: 196-205 - [i16]Yevgeniy Dodis, Michael J. Freedman, Stanislaw Jarecki, Shabsi Walfish:
Optimal Signcryption from Any Trapdoor Permutation. IACR Cryptol. ePrint Arch. 2004: 20 (2004) - [i15]Yevgeniy Dodis, Nelly Fazio, Aggelos Kiayias, Moti Yung:
Scalable Public-Key Tracing and Revoking. IACR Cryptol. ePrint Arch. 2004: 160 (2004) - [i14]Danfeng Yao, Nelly Fazio, Yevgeniy Dodis, Anna Lysyanskaya:
ID-Based Encryption for Complex Hierarchies with Applications to Forward Security and Broadcast Encryption. IACR Cryptol. ePrint Arch. 2004: 212 (2004) - [i13]Yevgeniy Dodis, Adam D. Smith:
Entropic Security and the Encryption of High Entropy Messages. IACR Cryptol. ePrint Arch. 2004: 219 (2004) - [i12]Yevgeniy Dodis, Aleksandr Yampolskiy:
A Verifiable Random Function With Short Proofs and Keys. IACR Cryptol. ePrint Arch. 2004: 310 (2004) - 2003
- [c30]Yevgeniy Dodis, Matthew K. Franklin, Jonathan Katz, Atsuko Miyaji, Moti Yung:
Intrusion-Resilient Public-Key Encryption. CT-RSA 2003: 19-32 - [c29]Yevgeniy Dodis, Leonid Reyzin:
Breaking and repairing optimistic fair exchange from PODC 2003. Digital Rights Management Workshop 2003: 47-54 - [c28]Yevgeniy Dodis, Jee Hea An:
Concealment and Its Applications to Authenticated Encryption. EUROCRYPT 2003: 312-329 - [c27]Anca-Andreea Ivan, Yevgeniy Dodis:
Proxy Cryptography Revisited. NDSS 2003 - [c26]Antonio Nicolosi, Maxwell N. Krohn, Yevgeniy Dodis, David Mazières:
Proactive Two-Party Signatures for User Authentication. NDSS 2003 - [c25]Yevgeniy Dodis:
Efficient Construction of (Distributed) Verifiable Random Functions. Public Key Cryptography 2003: 1-17 - [c24]Yevgeniy Dodis, Nelly Fazio:
Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack. Public Key Cryptography 2003: 100-115 - [c23]Yevgeniy Dodis, Jonathan Katz, Shouhuai Xu, Moti Yung:
Strong Key-Insulated Signature Schemes. Public Key Cryptography 2003: 130-144 - [c22]Yevgeniy Dodis, Nelly Fazio, Aggelos Kiayias, Moti Yung:
Scalable public-key tracing and revoking. PODC 2003: 190-199 - [c21]Yevgeniy Dodis, Roberto Oliveira:
On Extracting Private Randomness over a Public Channel. RANDOM-APPROX 2003: 252-263 - [c20]Richard Cole, Yevgeniy Dodis, Tim Roughgarden:
How much can taxes help selfish routing? EC 2003: 98-107 - [c19]Richard Cole, Yevgeniy Dodis, Tim Roughgarden:
Pricing network edges for heterogeneous selfish users. STOC 2003: 521-530 - [i11]Andris Ambainis, Harry Buhrman, Yevgeniy Dodis, Hein Röhrig:
Multiparty Quantum Coin Flipping. CoRR quant-ph/0304112 (2003) - [i10]Yevgeniy Dodis, Jee Hea An:
Concealment and its Applications to Authenticated Encryption. IACR Cryptol. ePrint Arch. 2003: 50 (2003) - [i9]Yevgeniy Dodis, Nelly Fazio:
Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack. IACR Cryptol. ePrint Arch. 2003: 95 (2003) - [i8]Yevgeniy Dodis, Leonid Reyzin:
Breaking and Repairing Optimistic Fair Exchange from PODC 2003. IACR Cryptol. ePrint Arch. 2003: 146 (2003) - [i7]Yevgeniy Dodis, Rafail Ostrovsky, Leonid Reyzin, Adam D. Smith:
Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data. IACR Cryptol. ePrint Arch. 2003: 235 (2003) - 2002
- [c18]Yevgeniy Dodis, Nelly Fazio:
Public Key Broadcast Encryption for Stateless Receivers. Digital Rights Management Workshop 2002: 61-80 - [c17]Yevgeniy Dodis, Jonathan Katz, Shouhuai Xu, Moti Yung:
Key-Insulated Public Key Cryptosystems. EUROCRYPT 2002: 65-82 - [c16]Jee Hea An, Yevgeniy Dodis, Tal Rabin:
On the Security of Joint Signature and Encryption. EUROCRYPT 2002: 83-107 - [c15]Yevgeniy Dodis, Joel Spencer:
On the (non)Universality of the One-Time Pad. FOCS 2002: 376- - [c14]Yevgeniy Dodis, Leonid Reyzin:
On the Power of Claw-Free Permutations. SCN 2002: 55-73 - [c13]Yevgeniy Dodis, Moti Yung:
Exposure-Resilience for Free: The Hierarchical ID-based Encryption Case. IEEE Security in Storage Workshop 2002: 45-52 - [i6]Jee Hea An, Yevgeniy Dodis, Tal Rabin:
On the Security of Joint Signature and Encryption. IACR Cryptol. ePrint Arch. 2002: 46 (2002) - [i5]Yevgeniy Dodis, Jonathan Katz, Shouhuai Xu, Moti Yung:
Key-Insulated Public-Key Cryptosystems. IACR Cryptol. ePrint Arch. 2002: 77 (2002) - [i4]Yevgeniy Dodis, Leonid Reyzin:
On the Power of Claw-Free Permutations. IACR Cryptol. ePrint Arch. 2002: 103 (2002) - [i3]Yevgeniy Dodis:
Efficient Construction of (Distributed) Verifiable Random Functions. IACR Cryptol. ePrint Arch. 2002: 133 (2002) - 2001
- [c12]Yevgeniy Dodis, Amit Sahai, Adam D. Smith:
On Perfect and Adaptive Security in Exposure-Resilient Cryptography. EUROCRYPT 2001: 301-324 - [c11]Yevgeniy Dodis:
New Imperfect Random Source with Applications to Coin-Flipping. ICALP 2001: 297-309 - [c10]Yevgeniy Dodis, Shai Halevi:
Incremental Codes. RANDOM-APPROX 2001: 75-89 - [c9]Yevgeniy Dodis, Peter Winkler:
Universal configurations in light-flipping games. SODA 2001: 926-927 - 2000
- [b1]Yevgeniy Dodis:
Exposure-resilient cryptography. Massachusetts Institute of Technology, Cambridge, MA, USA, 2000 - [c8]Yevgeniy Dodis, Silvio Micali:
Parallel Reducibility for Information-Theoretically Secure Computation. CRYPTO 2000: 74-92 - [c7]Yevgeniy Dodis, Shai Halevi, Tal Rabin:
A Cryptographic Solution to a Game Theoretic Problem. CRYPTO 2000: 112-130 - [c6]Ran Canetti, Yevgeniy Dodis, Shai Halevi, Eyal Kushilevitz, Amit Sahai:
Exposure-Resilient Functions and All-or-Nothing Transforms. EUROCRYPT 2000: 453-469 - [i2]Yevgeniy Dodis:
Impossibility of Black-Box Reduction from Non-Adaptively to Adaptively Secure Coin-Flipping. Electron. Colloquium Comput. Complex. TR00 (2000)
1990 – 1999
- 1999
- [c5]Yevgeniy Dodis, Silvio Micali:
Lower Bounds for Oblivious Transfer Reductions. EUROCRYPT 1999: 42-55 - [c4]Yevgeniy Dodis, Sanjeev Khanna:
Space Time Tradeoffs for Graph Properties. ICALP 1999: 291-300 - [c3]Yevgeniy Dodis, Oded Goldreich, Eric Lehman, Sofya Raskhodnikova, Dana Ron, Alex Samorodnitsky:
Improved Testing Algorithms for Monotonicity. RANDOM-APPROX 1999: 97-108 - [c2]Yevgeniy Dodis, Venkatesan Guruswami, Sanjeev Khanna:
The 2-Catalog Segmentation Problem. SODA 1999: 897-898 - [c1]Yevgeniy Dodis, Sanjeev Khanna:
Design Networks with Bounded Pairwise Distance. STOC 1999: 750-759 - [i1]Yevgeniy Dodis, Oded Goldreich, Eric Lehman, Sofya Raskhodnikova, Dana Ron, Alex Samorodnitsky:
Improved Testing Algorithms for Monotonicity. Electron. Colloquium Comput. Complex. TR99 (1999)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint