No photo of Yevgeniy Dodis

Yevgeniy Dodis

Professor of Computer Science

    19982019

    Research output per year

    If you made any changes in Pure these will be visible here soon.

    Research Output

    2019

    Reusable Non-Interactive Secure Computation

    Chase, M., Dodis, Y., Ishai, Y., Kraschewski, D., Liu, T., Ostrovsky, R. & Vaikuntanathan, V., Jan 1 2019, Advances in Cryptology – CRYPTO 2019 - 39th Annual International Cryptology Conference, Proceedings. Micciancio, D. & Boldyreva, A. (eds.). Springer-Verlag, p. 462-488 27 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11694 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Seedless Fruit Is the Sweetest: Random Number Generation, Revisited

    Coretti, S., Dodis, Y., Karthikeyan, H. & Tessaro, S., Jan 1 2019, Advances in Cryptology – CRYPTO 2019 - 39th Annual International Cryptology Conference, Proceedings. Micciancio, D. & Boldyreva, A. (eds.). Springer-Verlag, p. 205-234 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11692 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    The double ratchet: Security notions, proofs, and modularization for the signal protocol

    Alwen, J., Coretti, S. & Dodis, Y., Jan 1 2019, Advances in Cryptology – EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Ishai, Y. & Rijmen, V. (eds.). Springer-Verlag, p. 129-158 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11476 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2018

    Fast message franking: From invisible salamanders to encryptment

    Dodis, Y., Grubbs, P., Ristenpart, T. & Woodage, J., Jan 1 2018, Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, 2018, Proceedings. Boldyreva, A. & Shacham, H. (eds.). Springer-Verlag, p. 155-186 32 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10991 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Non-malleable codes from additive combinatorics

    Aggarwal, D., Dodis, Y. & Lovett, S., Jan 1 2018, In : SIAM Journal on Computing. 47, 2, p. 524-546 23 p.

    Research output: Contribution to journalArticle

    Non-uniform bounds in the random-permutation, ideal-cipher, and generic-group models

    Coretti, S., Dodis, Y. & Guo, S., Jan 1 2018, Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, 2018, Proceedings. Boldyreva, A. & Shacham, H. (eds.). Springer-Verlag, p. 693-721 29 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10991 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Provable security of (tweakable) block ciphers based on substitution-permutation networks

    Cogliati, B., Dodis, Y., Katz, J., Lee, J., Steinberger, J., Thiruvengadam, A. & Zhang, Z., Jan 1 2018, Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, 2018, Proceedings. Boldyreva, A. & Shacham, H. (eds.). Springer-Verlag, p. 722-753 32 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10991 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Random oracles and non-uniformity

    Coretti, S., Dodis, Y., Guo, S. & Steinberger, J., Jan 1 2018, Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2018 Proceedings. Springer-Verlag, p. 227-258 32 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10820 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2017

    A new distribution-sensitive secure sketch and popularity-proportional hashing

    Woodage, J., Chatterjee, R., Dodis, Y., Juels, A. & Ristenpart, T., 2017, Advances in Cryptology – CRYPTO 2017 - 37th Annual International Cryptology Conference, Proceedings. Springer Verlag, Vol. 10403 LNCS. p. 682-710 29 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10403 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Fixing cracks in the concrete: Random oracles with auxiliary input, revisited

    Dodis, Y., Guo, S. & Katz, J., 2017, Advances in Cryptology – EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Springer Verlag, Vol. 10211 LNCS. p. 473-495 23 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10211 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Unilaterally-authenticated key exchange

    Dodis, Y. & Fiore, D., Jan 1 2017, Financial Cryptography and Data Security - 21st International Conference, FC 2017, Revised Selected Papers. Kiayias, A. (ed.). Springer Verlag, p. 542-560 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10322 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2016

    How to Eat Your Entropy and Have it Too: Optimal Recovery Strategies for Compromised RNGs

    Dodis, Y., Shamir, A., Stephens-Davidowitz, N. & Wichs, D., Nov 14 2016, (Accepted/In press) In : Algorithmica. p. 1-37 37 p.

    Research output: Contribution to journalArticle

    Indifferentiability of confusion-diffusion networks

    Dodis, Y., Stam, M., Steinberger, J. & Liu, T., 2016, Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Springer Verlag, Vol. 9666. p. 679-704 26 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9666).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Interactive coding for interactive proofs

    Bishop, A. & Dodis, Y., 2016, Theory of Cryptography - 3th International Conference, TCC 2016-A, Proceedings. Springer Verlag, Vol. 9563. p. 352-366 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9563).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Message transmission with reverse firewalls—Secure communication on corrupted machines

    Dodis, Y., Mironov, I. & Stephens-Davidowitz, N., 2016, Advances in Cryptology - 36th Annual International Cryptology Conference, CRYPTO 2016, Proceedings. Springer Verlag, Vol. 9814. p. 241-372 132 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9814).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Non-malleable encryption: Simpler, shorter, stronger

    Coretti, S., Dodis, Y., Tackmann, B. & Venturi, D., 2016, Theory of Cryptography - 13th International Conference, TCC 2016-A, Proceedings. Springer Verlag, Vol. 9562. p. 306-335 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9562).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Spooky encryption and its applications

    Dodis, Y., Halevi, S., Rothblum, R. D. & Wichs, D., 2016, Advances in Cryptology - 36th Annual International Cryptology Conference, CRYPTO 2016, Proceedings. Springer Verlag, Vol. 9816. p. 93-122 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9816).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2015

    A formal treatment of backdoored pseudorandom generators

    Dodis, Y., Ganesh, C., Golovnev, A., Juels, A. & Ristenpart, T., 2015, Advances in Cryptology – EUROCRYPT 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Springer Verlag, Vol. 9056. p. 101-126 26 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9056).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Incremental codes

    Dodis, Y. & Halevi, S., Jan 1 2015, Approximation, Randomization, and Combinatorial Optimization: Algorithms and Techniques - 4th International Workshop on Approximation, Algorithms for Combinatorial Optimization Problems, APPROX 2001 and 5th International Workshop on Randomization and Approximation Techniques in Computer Science, RANDOM 2001, Proceedings. Trevisan, L., Jansen, K., Goemans, M. & Rolim, J. D. P. (eds.). Springer Verlag, p. 75-90 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2129).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Non-malleable reductions and applications

    Aggarwal, D., Dodis, Y., Kazana, T. & Obremski, M., Jun 14 2015, STOC 2015 - Proceedings of the 2015 ACM Symposium on Theory of Computing. Association for Computing Machinery, Vol. 14-17-June-2015. p. 459-468 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    On randomness, codes and extractors in cryptography

    Dodis, Y., 2015, Progress in Cryptology – INDOCRYPT 2015 - 16th International Conference on Cryptology in India, Proceedings. Springer Verlag, Vol. 9462. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9462).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Preface

    Dodis, Y. & Nielsen, J. B., Jan 1 2015, In : Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9014, p. V-VI

    Research output: Contribution to journalEditorial

    Privacy with imperfect randomness

    Dodis, Y. & Yao, Y., 2015, Advances in Cryptology - CRYPTO 2015 - 35th Annual Cryptology Conference, Proceedings. Springer Verlag, Vol. 9216. p. 463-482 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9216).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Theory of Cryptography: 12th Theory of Cryptography Conference, TCC 2015 Warsaw, Poland, March 23-25, 2015 Proceedings, Part I

    Dodis, Y. & Nielsen, J. B., Jan 1 2015, Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Proceedings. Dodis, Y. & Nielsen, J. B. (eds.). Springer Verlag, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9014).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Theory of cryptography:12th Theory of cryptography conference, TCC 2015 warsaw, poland, march 23-25, 2015 proceedings, part II

    Dodis, Y. & Nielsen, J. B., Jan 1 2015, Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Proceedings. Dodis, Y. & Nielsen, J. B. (eds.). Springer Verlag, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2014

    Amplifying privacy in privacy amplification

    Aggarwal, D., Dodis, Y., Jafargholi, Z., Miles, E. & Reyzin, L., Jan 1 2014, Advances in Cryptology, CRYPTO 2014 - 34th Annual Cryptology Conference, Proceedings. PART 2 ed. Springer Verlag, p. 183-198 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8617 LNCS, no. PART 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    How to eat your entropy and have it too - Optimal recovery strategies for compromised RNGs

    Dodis, Y., Shamir, A., Stephens-Davidowitz, N. & Wichs, D., Jan 1 2014, Advances in Cryptology, CRYPTO 2014 - 34th Annual Cryptology Conference, Proceedings. PART 2 ed. Springer Verlag, p. 37-54 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8617 LNCS, no. PART 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Interactive encryption and message authentication

    Dodis, Y. & Fiore, D., Jan 1 2014, Security and Cryptography for Networks - 9th International Conference, SCN 2014, Proceedings. de Prisco, R. & Abdalla, M. (eds.). Springer Verlag, p. 494-513 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8642).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Key derivation without entropy waste

    Dodis, Y., Pietrzak, K. & Wichs, D., Jan 1 2014, Advances in Cryptology, EUROCRYPT 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Springer Verlag, p. 93-110 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8441 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Non-malleable codes from addictive combinatorics

    Aggarwal, D., Dodis, Y. & Lovett, S., Jun 2014, Symposium on Theory of Computing (STOC).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Privacy amplification and nonmalleable extractors via character sums

    Dodis, Y., Li, X., Wooley, T. D. & Zuckerman, D., 2014, In : SIAM Journal on Computing. 43, 2, p. 800-830 31 p.

    Research output: Contribution to journalArticle

    2013

    On continual leakage of discrete log representations

    Agrawal, S., Dodis, Y., Vaikuntanathan, V. & Wichs, D., Dec 1 2013, Advances in Cryptology, ASIACRYPT 2013 - 19th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. PART 2 ed. p. 401-420 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8270 LNCS, no. PART 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    On the indifferentiability of key-alternating ciphers

    Andreeva, E., Bogdanov, A., Dodis, Y., Mennink, B. & Steinberger, J. P., Sep 26 2013, Advances in Cryptology, CRYPTO 2013 - 33rd Annual Cryptology Conference, Proceedings. PART 1 ed. p. 531-550 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8042 LNCS, no. PART 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Overcoming weak expectations

    Dodis, Y. & Yu, Y., Jan 1 2013, Theory of Cryptography - 10th Theory of Cryptography Conference, TCC 2013, Proceedings. Springer Verlag, p. 1-22 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7785 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Security analysis of pseudo-random number generators with input: /dev/random is not robust

    Dodis, Y., Pointcheval, D., Ruhault, S., Vergniaud, D. & Wichs, D., Dec 9 2013, CCS 2013 - Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security. p. 647-658 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    The cost of cryptography

    Dodis, Y., Nov 2013, Nautilus Magazine, Issue 007 ("Waste").

    Research output: Contribution to specialist publicationArticle

    2012

    Bottleneck links, variable demand, and the tragedy of the commons

    Cole, R., Dodis, Y. & Roughgarden, T., Oct 1 2012, In : Networks. 60, 3, p. 194-203 10 p.

    Research output: Contribution to journalArticle

    Counterexamples to hardness amplification beyond negligible

    Dodis, Y., Jain, A., Moran, T. & Wichs, D., Mar 21 2012, Theory of Cryptography - 9th Theory of Cryptography Conference, TCC 2012, Proceedings. p. 476-493 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7194 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Differential privacy with imperfect randomness

    Dodis, Y., López-Alt, A., Mironov, I. & Vadhan, S., Sep 3 2012, Advances in Cryptology, CRYPTO 2012 - 32nd Annual Cryptology Conference, Proceedings. p. 497-516 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7417 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Key-insulated symmetric key cryptography and mitigating attacks against cryptographic cloud software

    Dodis, Y., Luo, W., Xu, S. & Yung, M., Dec 1 2012, ASIACCS 2012 - 7th ACM Symposium on Information, Computer and Communications Security. p. 57-58 2 p. (ASIACCS 2012 - 7th ACM Symposium on Information, Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Message authentication, revisited

    Dodis, Y., Kiltz, E., Pietrzak, K. & Wichs, D., Apr 26 2012, Advances in Cryptology, EUROCRYPT 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. p. 355-374 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7237 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    On the instantiability of hash-and-sign RSA signatures

    Dodis, Y., Haitner, I. & Tentes, A., Mar 21 2012, Theory of Cryptography - 9th Theory of Cryptography Conference, TCC 2012, Proceedings. p. 112-132 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7194 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Overcoming weak expectations

    Dodis, Y. & Yu, Y., Dec 1 2012, 2012 IEEE Information Theory Workshop, ITW 2012. p. 109-113 5 p. 6404636. (2012 IEEE Information Theory Workshop, ITW 2012).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Randomness condensers for efficiently samplable, seed-dependent sources

    Dodis, Y., Ristenpart, T. & Vadhan, S., Mar 21 2012, Theory of Cryptography - 9th Theory of Cryptography Conference, TCC 2012, Proceedings. p. 618-635 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7194 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Robust fuzzy extractors and authenticated key agreement from close secrets

    Dodis, Y., Kanukurthi, B., Katz, J., Reyzin, L. & Smith, A., Aug 30 2012, In : IEEE Transactions on Information Theory. 58, 9, p. 6207-6222 16 p., 6203415.

    Research output: Contribution to journalArticle

    Shannon impossibility, revisited

    Dodis, Y., Aug 20 2012, Information Theoretic Security - 6th International Conference, ICITS 2012, Proceedings. p. 100-110 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7412 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    To hash or not to hash again? (In)differentiability results for H 2 and HMAC

    Dodis, Y., Ristenpart, T., Steinberger, J. & Tessaro, S., Sep 3 2012, Advances in Cryptology, CRYPTO 2012 - 32nd Annual Cryptology Conference, Proceedings. p. 348-366 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7417 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2011

    Domain extension for MACs beyond the birthday barrier

    Dodis, Y. & Steinberger, J., Jun 9 2011, Advances in Cryptology - EUROCRYPT 2011, 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. p. 323-342 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6632 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution