No photo of Yevgeniy Dodis

Yevgeniy Dodis

Professor of Computer Science

19982019
If you made any changes in Pure, your changes will be visible here soon.

Research Output 1998 2019

2019

Reusable Non-Interactive Secure Computation

Chase, M., Dodis, Y., Ishai, Y., Kraschewski, D., Liu, T., Ostrovsky, R. & Vaikuntanathan, V., Jan 1 2019, Advances in Cryptology – CRYPTO 2019 - 39th Annual International Cryptology Conference, Proceedings. Micciancio, D. & Boldyreva, A. (eds.). Springer-Verlag, p. 462-488 27 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11694 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Secure Computation
Oblivious Transfer
Function evaluation
Network protocols
Linear Function

Seedless Fruit Is the Sweetest: Random Number Generation, Revisited

Coretti, S., Dodis, Y., Karthikeyan, H. & Tessaro, S., Jan 1 2019, Advances in Cryptology – CRYPTO 2019 - 39th Annual International Cryptology Conference, Proceedings. Micciancio, D. & Boldyreva, A. (eds.). Springer-Verlag, p. 205-234 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11692 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Random number generation
Random number Generation
Fruit
Fruits
Entropy

The double ratchet: Security notions, proofs, and modularization for the signal protocol

Alwen, J., Coretti, S. & Dodis, Y., Jan 1 2019, Advances in Cryptology – EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Ishai, Y. & Rijmen, V. (eds.). Springer-Verlag, p. 129-158 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11476 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Modularization
Security Proof
Ratchet
Cryptography
Text messaging
2018

Fast message franking: From invisible salamanders to encryptment

Dodis, Y., Grubbs, P., Ristenpart, T. & Woodage, J., Jan 1 2018, Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, 2018, Proceedings. Boldyreva, A. & Shacham, H. (eds.). Springer-Verlag, p. 155-186 32 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10991 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Authenticated Encryption
Cryptography
Hash functions
Hash Function
Transform

Non-malleable codes from additive combinatorics

Aggarwal, D., Dodis, Y. & Lovett, S., Jan 1 2018, In : SIAM Journal on Computing. 47, 2, p. 524-546 23 p.

Research output: Contribution to journalArticle

Additive Combinatorics
Error detection
Error correction
Zero-knowledge Proof
Vector spaces

Non-uniform bounds in the random-permutation, ideal-cipher, and generic-group models

Coretti, S., Dodis, Y. & Guo, S., Jan 1 2018, Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, 2018, Proceedings. Boldyreva, A. & Shacham, H. (eds.). Springer-Verlag, p. 693-721 29 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10991 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cipher
Random Permutation
Preprocessing
Model
Attack

Provable security of (tweakable) block ciphers based on substitution-permutation networks

Cogliati, B., Dodis, Y., Katz, J., Lee, J., Steinberger, J., Thiruvengadam, A. & Zhang, Z., Jan 1 2018, Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, 2018, Proceedings. Boldyreva, A. & Shacham, H. (eds.). Springer-Verlag, p. 722-753 32 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10991 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Provable Security
Block Ciphers
Substitution
Permutation
Substitution reactions

Random oracles and non-uniformity

Coretti, S., Dodis, Y., Guo, S. & Steinberger, J., Jan 1 2018, Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2018 Proceedings. Springer-Verlag, p. 227-258 32 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10820 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Random Oracle
Random Oracle Model
Non-uniformity
Security Proof
Sampling
2017

A new distribution-sensitive secure sketch and popularity-proportional hashing

Woodage, J., Chatterjee, R., Dodis, Y., Juels, A. & Ristenpart, T., 2017, Advances in Cryptology – CRYPTO 2017 - 37th Annual International Cryptology Conference, Proceedings. Springer Verlag, Vol. 10403 LNCS. p. 682-710 29 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10403 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Hashing
Directly proportional
Password
Authentication
Hash functions

Fixing cracks in the concrete: Random oracles with auxiliary input, revisited

Dodis, Y., Guo, S. & Katz, J., 2017, Advances in Cryptology – EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Springer Verlag, Vol. 10211 LNCS. p. 473-495 23 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10211 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Random Oracle
Crack
Auxiliary Information
Concretes
Function generators

Unilaterally-authenticated key exchange

Dodis, Y. & Fiore, D., Jan 1 2017, Financial Cryptography and Data Security - 21st International Conference, FC 2017, Revised Selected Papers. Springer Verlag, Vol. 10322 LNCS. p. 542-560 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10322 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Authenticated Key Exchange
Cryptography
Public Key Encryption
Encryption
Key Exchange
2016

How to Eat Your Entropy and Have it Too: Optimal Recovery Strategies for Compromised RNGs

Dodis, Y., Shamir, A., Stephens-Davidowitz, N. & Wichs, D., Nov 14 2016, (Accepted/In press) In : Algorithmica. p. 1-37 37 p.

Research output: Contribution to journalArticle

Optimal Recovery
Random number Generator
Entropy
Recovery
Timing

Indifferentiability of confusion-diffusion networks

Dodis, Y., Stam, M., Steinberger, J. & Liu, T., 2016, Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Springer Verlag, Vol. 9666. p. 679-704 26 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9666).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Random Permutation
Block Ciphers
Hash functions
Hash Function
Sufficient

Interactive coding for interactive proofs

Bishop, A. & Dodis, Y., 2016, Theory of Cryptography - 3th International Conference, TCC 2016-A, Proceedings. Springer Verlag, Vol. 9563. p. 352-366 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9563).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Interactive Proofs
Communication Channels
Coding
Interactive Proof Systems
Communication

Message transmission with reverse firewalls—Secure communication on corrupted machines

Dodis, Y., Mironov, I. & Stephens-Davidowitz, N., 2016, Advances in Cryptology - 36th Annual International Cryptology Conference, CRYPTO 2016, Proceedings. Springer Verlag, Vol. 9814. p. 241-372 132 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9814).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Firewall
Reverse
Communication
Cryptography
Key Agreement

Non-malleable encryption: Simpler, shorter, stronger

Coretti, S., Dodis, Y., Tackmann, B. & Venturi, D., 2016, Theory of Cryptography - 13th International Conference, TCC 2016-A, Proceedings. Springer Verlag, Vol. 9562. p. 306-335 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9562).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Encryption
Cryptography
Non-malleability
Public Key Encryption
Strengthening

Spooky encryption and its applications

Dodis, Y., Halevi, S., Rothblum, R. D. & Wichs, D., 2016, Advances in Cryptology - 36th Annual International Cryptology Conference, CRYPTO 2016, Proceedings. Springer Verlag, Vol. 9816. p. 93-122 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9816).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Encryption
Cryptography
Public key
Homomorphic Encryption
Additive Function
2015

A formal treatment of backdoored pseudorandom generators

Dodis, Y., Ganesh, C., Golovnev, A., Juels, A. & Ristenpart, T., 2015, Advances in Cryptology – EUROCRYPT 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Springer Verlag, Vol. 9056. p. 101-126 26 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9056).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Pseudorandom Generator
Hash functions
Cryptography
Hash Function
Output

Incremental codes

Dodis, Y. & Halevi, S., 2015, Approximation, Randomization, and Combinatorial Optimization: Algorithms and Techniques - 4th International Workshop on Approximation, Algorithms for Combinatorial Optimization Problems, APPROX 2001 and 5th International Workshop on Randomization and Approximation Techniques in Computer Science, RANDOM 2001, Proceedings. Springer Verlag, Vol. 2129. p. 75-90 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2129).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Competitive Ratio
Minimum Distance
Prefix
Interval
Unordered

Non-malleable reductions and applications

Aggarwal, D., Dodis, Y., Kazana, T. & Obremski, M., Jun 14 2015, STOC 2015 - Proceedings of the 2015 ACM Symposium on Theory of Computing. Association for Computing Machinery, Vol. 14-17-June-2015. p. 459-468 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Error detection
Error correction
Chemical analysis
Amplification

On randomness, codes and extractors in cryptography

Dodis, Y., 2015, Progress in Cryptology – INDOCRYPT 2015 - 16th International Conference on Cryptology in India, Proceedings. Springer Verlag, Vol. 9462. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9462).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Extractor
Cryptography
Randomness
Randomness Extractors
Imperfect

Privacy with imperfect randomness

Dodis, Y. & Yao, Y., 2015, Advances in Cryptology - CRYPTO 2015 - 35th Annual Cryptology Conference, Proceedings. Springer Verlag, Vol. 9216. p. 463-482 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9216).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Imperfect
Randomness
Cryptography
Privacy
Secret Sharing Scheme
Imperfect
Randomness
Cryptography
Privacy
Secret Sharing Scheme

Theory of cryptography: 12th Theory of cryptography conference, TCC 2015 warsaw, poland, march 23-25, 2015 proceedings, part II

Dodis, Y. & Nielsen, J. B., 2015, Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Proceedings. Springer Verlag, Vol. 9015. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9015).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography

Theory of Cryptography: 12th Theory of Cryptography Conference, TCC 2015 Warsaw, Poland, March 23-25, 2015 Proceedings, Part I

Dodis, Y. & Nielsen, J. B., 2015, Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Proceedings. Springer Verlag, Vol. 9014. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9014).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
2014

Amplifying privacy in privacy amplification

Aggarwal, D., Dodis, Y., Jafargholi, Z., Miles, E. & Reyzin, L., 2014, Advances in Cryptology, CRYPTO 2014 - 34th Annual Cryptology Conference, Proceedings. PART 2 ed. Springer Verlag, Vol. 8617 LNCS. p. 183-198 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8617 LNCS, no. PART 2).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Amplification
Privacy
Entropy
Entropy Loss
Retrieval

How to eat your entropy and have it too - Optimal recovery strategies for compromised RNGs

Dodis, Y., Shamir, A., Stephens-Davidowitz, N. & Wichs, D., 2014, Advances in Cryptology, CRYPTO 2014 - 34th Annual Cryptology Conference, Proceedings. PART 2 ed. Springer Verlag, Vol. 8617 LNCS. p. 37-54 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8617 LNCS, no. PART 2).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Optimal Recovery
Random number Generator
Entropy
Recovery
Timing

Interactive encryption and message authentication

Dodis, Y. & Fiore, D., 2014, Security and Cryptography for Networks - 9th International Conference, SCN 2014, Proceedings. Springer Verlag, Vol. 8642. p. 494-513 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8642).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Message Authentication
Public Key Encryption
Authentication
Encryption
Cryptography

Key derivation without entropy waste

Dodis, Y., Pietrzak, K. & Wichs, D., 2014, Advances in Cryptology, EUROCRYPT 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Springer Verlag, Vol. 8441 LNCS. p. 93-110 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8441 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Entropy
Extractor
One-way Function
Beat
Randomness Extractors

Non-malleable codes from addictive combinatorics

Aggarwal, D., Dodis, Y. & Lovett, S., Jun 2014, Symposium on Theory of Computing (STOC).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Privacy amplification and nonmalleable extractors via character sums

Dodis, Y., Li, X., Wooley, T. D. & Zuckerman, D., 2014, In : SIAM Journal on Computing. 43, 2, p. 800-830 31 p.

Research output: Contribution to journalArticle

Character Sums
Extractor
Amplification
Privacy
Entropy
2013

On continual leakage of discrete log representations

Agrawal, S., Dodis, Y., Vaikuntanathan, V. & Wichs, D., 2013, Advances in Cryptology, ASIACRYPT 2013 - 19th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. PART 2 ed. Vol. 8270 LNCS. p. 401-420 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8270 LNCS, no. PART 2).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Leakage
Cryptography
Resilient Functions
One-way Function
Public Key Encryption

On the indifferentiability of key-alternating ciphers

Andreeva, E., Bogdanov, A., Dodis, Y., Mennink, B. & Steinberger, J. P., 2013, Advances in Cryptology, CRYPTO 2013 - 33rd Annual Cryptology Conference, Proceedings. PART 1 ed. Vol. 8042 LNCS. p. 531-550 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8042 LNCS, no. PART 1).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
Random Permutation
Advanced Encryption Standard
Block Cipher
Permutation

Overcoming weak expectations

Dodis, Y. & Yu, Y., 2013, Theory of Cryptography - 10th Theory of Cryptography Conference, TCC 2013, Proceedings. Vol. 7785 LNCS. p. 1-22 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7785 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Entropy
Entropy Loss
Upper bound
Cryptography
Seed

Security analysis of pseudo-random number generators with input: /dev/random is not robust

Dodis, Y., Pointcheval, D., Ruhault, S., Vergniaud, D. & Wichs, D., 2013, CCS 2013 - Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security. p. 647-658 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Entropy
Cryptography
Linux

The cost of cryptography

Dodis, Y., Nov 2013, Nautilus Magazine, Issue 007 ("Waste").

Research output: Contribution to specialist publicationArticle

2012

Bottleneck links, variable demand, and the tragedy of the commons

Cole, R., Dodis, Y. & Roughgarden, T., Oct 2012, In : Networks. 60, 3, p. 194-203 10 p.

Research output: Contribution to journalArticle

Costs
Routing protocols
Throughput

Counterexamples to hardness amplification beyond negligible

Dodis, Y., Jain, A., Moran, T. & Wichs, D., 2012, Theory of Cryptography - 9th Theory of Cryptography Conference, TCC 2012, Proceedings. Vol. 7194 LNCS. p. 476-493 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7194 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Amplification
Hardness
Direct Product
Counterexample
One-way Function

Differential privacy with imperfect randomness

Dodis, Y., López-Alt, A., Mironov, I. & Vadhan, S., 2012, Advances in Cryptology, CRYPTO 2012 - 32nd Annual Cryptology Conference, Proceedings. Vol. 7417 LNCS. p. 497-516 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7417 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Imperfect
Randomness
Privacy
Additive noise
Cryptography

Key-insulated symmetric key cryptography and mitigating attacks against cryptographic cloud software

Dodis, Y., Luo, W., Xu, S. & Yung, M., 2012, ASIACCS 2012 - 7th ACM Symposium on Information, Computer and Communications Security. p. 57-58 2 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
Malware
Virtual machine

Message authentication, revisited

Dodis, Y., Kiltz, E., Pietrzak, K. & Wichs, D., 2012, Advances in Cryptology, EUROCRYPT 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Vol. 7237 LNCS. p. 355-374 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7237 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Message Authentication
Message Authentication Code
Pseudorandom Function
Authentication
Attack

On the instantiability of hash-and-sign RSA signatures

Dodis, Y., Haitner, I. & Tentes, A., 2012, Theory of Cryptography - 9th Theory of Cryptography Conference, TCC 2012, Proceedings. Vol. 7194 LNCS. p. 112-132 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7194 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Signature Scheme
Signature
Hash functions
Multiplicative
Hash Function

Overcoming weak expectations

Dodis, Y. & Yu, Y., 2012, 2012 IEEE Information Theory Workshop, ITW 2012. p. 109-113 5 p. 6404636

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Entropy
Cryptography
Seed

Randomness condensers for efficiently samplable, seed-dependent sources

Dodis, Y., Ristenpart, T. & Vadhan, S., 2012, Theory of Cryptography - 9th Theory of Cryptography Conference, TCC 2012, Proceedings. Vol. 7194 LNCS. p. 618-635 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7194 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Randomness
Seed
Entropy
Dependent
Logarithmic

Robust fuzzy extractors and authenticated key agreement from close secrets

Dodis, Y., Kanukurthi, B., Katz, J., Reyzin, L. & Smith, A., 2012, In : IEEE Transactions on Information Theory. 58, 9, p. 6207-6222 16 p., 6203415.

Research output: Contribution to journalArticle

entropy
Entropy
Biometrics
Authentication
biometrics

Shannon impossibility, revisited

Dodis, Y., 2012, Information Theoretic Security - 6th International Conference, ICITS 2012, Proceedings. Vol. 7412 LNCS. p. 100-110 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7412 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Encryption
Cryptography
Limiting
One-way Function
Sufficient

To hash or not to hash again? (In)differentiability results for H 2 and HMAC

Dodis, Y., Ristenpart, T., Steinberger, J. & Tessaro, S., 2012, Advances in Cryptology, CRYPTO 2012 - 32nd Annual Cryptology Conference, Proceedings. Vol. 7417 LNCS. p. 348-366 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7417 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Hash functions
Differentiability
Simulators
Concretes
Random Oracle
2011

Domain extension for MACs beyond the birthday barrier

Dodis, Y. & Steinberger, J., 2011, Advances in Cryptology - EUROCRYPT 2011, 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Vol. 6632 LNCS. p. 323-342 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6632 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Query
Design