No photo of Yevgeniy Dodis

Yevgeniy Dodis

Professor of Computer Science

    19982019
    If you made any changes in Pure, your changes will be visible here soon.

    Fingerprint Weighted list of dominant concepts in the researcher's publications (titles and abstracts).

    • 4 Similar Profiles
    Cryptography Engineering & Materials Science
    Hash functions Engineering & Materials Science
    Entropy Engineering & Materials Science
    Randomness Mathematics
    Extractor Mathematics
    Encryption Mathematics
    Hash Function Mathematics
    Public Key Encryption Mathematics

    Network Recent external collaboration on country level. Dive into details by clicking on the dots.

    Research Output 1998 2019

    Reusable Non-Interactive Secure Computation

    Chase, M., Dodis, Y., Ishai, Y., Kraschewski, D., Liu, T., Ostrovsky, R. & Vaikuntanathan, V., Jan 1 2019, Advances in Cryptology – CRYPTO 2019 - 39th Annual International Cryptology Conference, Proceedings. Micciancio, D. & Boldyreva, A. (eds.). Springer-Verlag, p. 462-488 27 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11694 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Secure Computation
    Oblivious Transfer
    Function evaluation
    Network protocols
    Linear Function

    Seedless Fruit Is the Sweetest: Random Number Generation, Revisited

    Coretti, S., Dodis, Y., Karthikeyan, H. & Tessaro, S., Jan 1 2019, Advances in Cryptology – CRYPTO 2019 - 39th Annual International Cryptology Conference, Proceedings. Micciancio, D. & Boldyreva, A. (eds.). Springer-Verlag, p. 205-234 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11692 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Random number generation
    Random number Generation
    Fruit
    Fruits
    Entropy

    The double ratchet: Security notions, proofs, and modularization for the signal protocol

    Alwen, J., Coretti, S. & Dodis, Y., Jan 1 2019, Advances in Cryptology – EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Ishai, Y. & Rijmen, V. (eds.). Springer-Verlag, p. 129-158 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11476 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Modularization
    Security Proof
    Ratchet
    Cryptography
    Text messaging

    Fast message franking: From invisible salamanders to encryptment

    Dodis, Y., Grubbs, P., Ristenpart, T. & Woodage, J., Jan 1 2018, Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, 2018, Proceedings. Boldyreva, A. & Shacham, H. (eds.). Springer-Verlag, p. 155-186 32 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10991 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Authenticated Encryption
    Cryptography
    Hash functions
    Hash Function
    Transform

    Non-malleable codes from additive combinatorics

    Aggarwal, D., Dodis, Y. & Lovett, S., Jan 1 2018, In : SIAM Journal on Computing. 47, 2, p. 524-546 23 p.

    Research output: Contribution to journalArticle

    Additive Combinatorics
    Error detection
    Error correction
    Zero-knowledge Proof
    Vector spaces