No photo of Yevgeniy Dodis

Yevgeniy Dodis

Professor of Computer Science

19982019
If you made any changes in Pure, your changes will be visible here soon.

Fingerprint Weighted list of dominant concepts in the researcher's publications (titles and abstracts).

  • 4 Similar Profiles
Cryptography Engineering & Materials Science
Hash functions Engineering & Materials Science
Entropy Engineering & Materials Science
Randomness Mathematics
Extractor Mathematics
Encryption Mathematics
Hash Function Mathematics
Public Key Encryption Mathematics

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 1998 2019

Reusable Non-Interactive Secure Computation

Chase, M., Dodis, Y., Ishai, Y., Kraschewski, D., Liu, T., Ostrovsky, R. & Vaikuntanathan, V., Jan 1 2019, Advances in Cryptology – CRYPTO 2019 - 39th Annual International Cryptology Conference, Proceedings. Micciancio, D. & Boldyreva, A. (eds.). Springer-Verlag, p. 462-488 27 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11694 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Secure Computation
Oblivious Transfer
Function evaluation
Network protocols
Linear Function

Seedless Fruit Is the Sweetest: Random Number Generation, Revisited

Coretti, S., Dodis, Y., Karthikeyan, H. & Tessaro, S., Jan 1 2019, Advances in Cryptology – CRYPTO 2019 - 39th Annual International Cryptology Conference, Proceedings. Micciancio, D. & Boldyreva, A. (eds.). Springer-Verlag, p. 205-234 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11692 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Random number generation
Random number Generation
Fruit
Fruits
Entropy

The double ratchet: Security notions, proofs, and modularization for the signal protocol

Alwen, J., Coretti, S. & Dodis, Y., Jan 1 2019, Advances in Cryptology – EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Ishai, Y. & Rijmen, V. (eds.). Springer-Verlag, p. 129-158 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11476 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Modularization
Security Proof
Ratchet
Cryptography
Text messaging

Fast message franking: From invisible salamanders to encryptment

Dodis, Y., Grubbs, P., Ristenpart, T. & Woodage, J., Jan 1 2018, Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, 2018, Proceedings. Boldyreva, A. & Shacham, H. (eds.). Springer-Verlag, p. 155-186 32 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10991 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Authenticated Encryption
Cryptography
Hash functions
Hash Function
Transform

Non-malleable codes from additive combinatorics

Aggarwal, D., Dodis, Y. & Lovett, S., Jan 1 2018, In : SIAM Journal on Computing. 47, 2, p. 524-546 23 p.

Research output: Contribution to journalArticle

Additive Combinatorics
Error detection
Error correction
Zero-knowledge Proof
Vector spaces