Yevgeniy Dodis

Professor of Computer Science

19982019
If you made any changes in Pure, your changes will be visible here soon.

Fingerprint Dive into the research topics where Yevgeniy Dodis is active. These topic labels come from the works of this person. Together they form a unique fingerprint.

  • 1 Similar Profiles
Cryptography Engineering & Materials Science
Hash functions Engineering & Materials Science
Entropy Engineering & Materials Science
Extractor Mathematics
Randomness Mathematics
Encryption Mathematics
Public Key Encryption Mathematics
Hash Function Mathematics

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 1998 2019

The double ratchet: Security notions, proofs, and modularization for the signal protocol

Alwen, J., Coretti, S. & Dodis, Y., Jan 1 2019, Advances in Cryptology – EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Ishai, Y. & Rijmen, V. (eds.). Springer-Verlag, p. 129-158 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11476 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Modularization
Security Proof
Ratchet
Cryptography
Text messaging

Fast message franking: From invisible salamanders to encryptment

Dodis, Y., Grubbs, P., Ristenpart, T. & Woodage, J., Jan 1 2018, Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, 2018, Proceedings. Boldyreva, A. & Shacham, H. (eds.). Springer-Verlag, p. 155-186 32 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10991 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Authenticated Encryption
Cryptography
Hash functions
Hash Function
Transform

Non-malleable codes from additive combinatorics

Aggarwal, D., Dodis, Y. & Lovett, S., Jan 1 2018, In : SIAM Journal on Computing. 47, 2, p. 524-546 23 p.

Research output: Contribution to journalArticle

Additive Combinatorics
Error detection
Error correction
Zero-knowledge Proof
Vector spaces

Non-uniform bounds in the random-permutation, ideal-cipher, and generic-group models

Coretti, S., Dodis, Y. & Guo, S., Jan 1 2018, Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, 2018, Proceedings. Boldyreva, A. & Shacham, H. (eds.). Springer-Verlag, p. 693-721 29 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10991 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cipher
Random Permutation
Preprocessing
Model
Attack

Provable security of (tweakable) block ciphers based on substitution-permutation networks

Cogliati, B., Dodis, Y., Katz, J., Lee, J., Steinberger, J., Thiruvengadam, A. & Zhang, Z., Jan 1 2018, Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, 2018, Proceedings. Boldyreva, A. & Shacham, H. (eds.). Springer-Verlag, p. 722-753 32 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10991 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Provable Security
Block Ciphers
Substitution
Permutation
Substitution reactions