No photo of Yevgeniy Dodis

Yevgeniy Dodis

Professor of Computer Science

    19982019
    If you made any changes in Pure, your changes will be visible here soon.

    Research Output 1998 2019

    Conference contribution

    Does privacy require true randomness?

    Bosley, C. & Dodis, Y., 2007, Theory of Cryptography - 4th Theory of Cryptography Conference, TCC 2007, Proceedings. Vol. 4392 LNCS. p. 1-20 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4392 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Privacy
    Randomness
    Entropy
    Encryption
    Cryptography

    Domain extension for MACs beyond the birthday barrier

    Dodis, Y. & Steinberger, J., 2011, Advances in Cryptology - EUROCRYPT 2011, 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Vol. 6632 LNCS. p. 323-342 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6632 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Query
    Design

    Efficient construction of (distributed) verifiable random functions

    Dodis, Y., 2002, Public Key Cryptography - PKC 2003 - 6th International Workshop on Practice and Theory in Public Key Cryptography, Proceedings. Springer Verlag, Vol. 2567. p. 1-17 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2567).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Random Function
    Pseudorandom Function
    Diffie-Hellman
    Digital Signature
    Random Oracle Model

    Efficient constructions of composable commitments and zero-knowledge proofs

    Dodis, Y., Shoup, V. & Walfish, S., 2008, Advances in Cryptology - CRYPTO 2008 - 28th Annual International Cryptology Conference, Proceedings. Vol. 5157 LNCS. p. 515-535 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5157 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Universal Composability
    Zero-knowledge Proof
    Random Oracle
    Zero-knowledge
    Cryptographic Protocols

    Efficient public-key cryptography in the presence of key leakage

    Dodis, Y., Haralambiev, K., López-Alt, A. & Wichs, D., 2010, Advances in Cryptology, ASIACRYPT 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Vol. 6477 LNCS. p. 613-631 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6477 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Public key cryptography
    Public Key Cryptography
    Leakage
    Encryption
    Cryptography

    Entropic security and the encryption of high entropy messages

    Dodis, Y. & Smith, A., 2005, Lecture Notes in Computer Science. Kilian, J. (ed.). Vol. 3378. p. 556-577 22 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Cryptography
    Hash functions
    Entropy
    Semantics

    Exposure-resilience for free: The hierarchical ID-based encryption case

    Dodis, Y. & Yung, M., 2003, Proceedings - 1st International IEEE Security in Storage Workshop, SISW 2002. Institute of Electrical and Electronics Engineers Inc., p. 45-52 8 p. 1183509

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Cryptography
    Data storage equipment

    Exposure-resilient functions and all-or-nothing transforms

    Canetti, R., Dodis, Y., Halevi, S., Kushilevitz, E. & Sahai, A., May 2000, Advances in Cryptology - EUROCRYPT.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Fast message franking: From invisible salamanders to encryptment

    Dodis, Y., Grubbs, P., Ristenpart, T. & Woodage, J., Jan 1 2018, Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, 2018, Proceedings. Boldyreva, A. & Shacham, H. (eds.). Springer-Verlag, p. 155-186 32 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10991 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Authenticated Encryption
    Cryptography
    Hash functions
    Hash Function
    Transform

    Feistel networks made public, and applications

    Dodis, Y. & Puniya, P., 2007, Advances in Cryptology - EUROCRYPT 2007 - 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Vol. 4515 LNCS. p. 534-554 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4515 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Logarithmic
    Message Authentication Code
    Sufficient
    Pseudorandomness
    Scenarios

    Fixing cracks in the concrete: Random oracles with auxiliary input, revisited

    Dodis, Y., Guo, S. & Katz, J., 2017, Advances in Cryptology – EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Springer Verlag, Vol. 10211 LNCS. p. 473-495 23 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10211 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Random Oracle
    Crack
    Auxiliary Information
    Concretes
    Function generators

    Fully scalable public-key traitor tracing

    Dodis, Y., Fazio, N., Kiayias, A. & Yung, M., Jul 2003, Principles of Distributed Computing (PODC).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Fully-simulatable multiparty computation

    Dodis, Y., Pass, R. & Walfish, S., Oct 2004, Workshop on Secure Multiparty Protocols (SMP 2004).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Getting the best out of existing hash functions; Or what if we are stuck with SHA?

    Dodis, Y. & Puniya, P., 2008, Applied Cryptography and Network Security - 6th International Conference, ACNS 2008, Proceedings. Vol. 5037 LNCS. p. 156-173 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5037 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Hash functions
    Hash Function
    Modes of Operation
    Cascade
    Compression Function

    How much can taxes help selfish routing?

    Cole, R., Dodis, Y. & Roughgarden, T., 2003, Proceedings of the ACM Conference on Electronic Commerce. p. 98-107 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Taxation
    Costs
    Economics
    Tax
    Routing

    How to eat your entropy and have it too - Optimal recovery strategies for compromised RNGs

    Dodis, Y., Shamir, A., Stephens-Davidowitz, N. & Wichs, D., 2014, Advances in Cryptology, CRYPTO 2014 - 34th Annual Cryptology Conference, Proceedings. PART 2 ed. Springer Verlag, Vol. 8617 LNCS. p. 37-54 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8617 LNCS, no. PART 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Optimal Recovery
    Random number Generator
    Entropy
    Recovery
    Timing

    ID-based encryption for complex hierarchies with applications to forward security and broadcast encryption

    Yao, D., Dodis, Y., Fazio, N. & Lysyanskaya, A., 2004, Proceedings of the ACM Conference on Computer and Communications Security. Pfitzmann, B. & Liu, P. (eds.). p. 354-363 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Cryptography
    Access control
    Joining

    Improved testing algorithms for monotonicity

    Dodis, Y., Goldreich, O., Lehman, E., Raskhodnikova, S., Ron, D. & Samorodnitsky, A., 1999, Randomization, Approximation, and Combinatorial Optimization: Algorithms and Techniques - 3rd International Workshop on Randomization and Approximation Techniques in Computer Science and 2nd International Workshop on Approximation Algorithms for Combinatorial Optimization Problems, RANDOM-APPROX 1999, Proceedings. Springer Verlag, Vol. 1671. p. 97-108 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1671).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Monotonicity
    Monotone
    Query Complexity
    Testing
    Monotone Function

    Improving the security of MACs via randomized message preprocessing

    Dodis, Y. & Pietrzak, K., 2007, Fast Software Encryption - 14th International Workshop, FSE 2007. Vol. 4593 LNCS. p. 414-433 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4593 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Hash functions
    Hash Function
    Preprocessing
    Salts
    Polynomial Evaluation

    Incremental codes

    Dodis, Y. & Halevi, S., Aug 2001, Workshop on Approximation Algorithms for Combinatorial Optimization Problems (APPROX).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Incremental codes

    Dodis, Y. & Halevi, S., 2015, Approximation, Randomization, and Combinatorial Optimization: Algorithms and Techniques - 4th International Workshop on Approximation, Algorithms for Combinatorial Optimization Problems, APPROX 2001 and 5th International Workshop on Randomization and Approximation Techniques in Computer Science, RANDOM 2001, Proceedings. Springer Verlag, Vol. 2129. p. 75-90 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2129).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Competitive Ratio
    Minimum Distance
    Prefix
    Interval
    Unordered

    Indifferentiability of confusion-diffusion networks

    Dodis, Y., Stam, M., Steinberger, J. & Liu, T., 2016, Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Springer Verlag, Vol. 9666. p. 679-704 26 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9666).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Random Permutation
    Block Ciphers
    Hash functions
    Hash Function
    Sufficient

    Indifferentiability of permutation-based compression functions and tree-based modes of operation, with applications to MD6

    Dodis, Y., Reyzin, L., Rivest, R. L. & Shen, E., 2009, Fast Software Encryption - 16th International Workshop, FSE 2009, Revised Selected Papers. Vol. 5665 LNCS. p. 104-121 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5665 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Compression Function
    Hash functions
    Modes of Operation
    Permutation
    Random Oracle

    Interactive coding for interactive proofs

    Bishop, A. & Dodis, Y., 2016, Theory of Cryptography - 3th International Conference, TCC 2016-A, Proceedings. Springer Verlag, Vol. 9563. p. 352-366 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9563).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Interactive Proofs
    Communication Channels
    Coding
    Interactive Proof Systems
    Communication

    Interactive encryption and message authentication

    Dodis, Y. & Fiore, D., 2014, Security and Cryptography for Networks - 9th International Conference, SCN 2014, Proceedings. Springer Verlag, Vol. 8642. p. 494-513 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8642).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Message Authentication
    Public Key Encryption
    Authentication
    Encryption
    Cryptography

    Intrusion-resilient key exchange in the bounded retrieval model

    Cash, D., Ding, Y. Z., Dodis, Y., Lee, W., Lipton, R. & Walfish, S., 2007, Theory of Cryptography - 4th Theory of Cryptography Conference, TCC 2007, Proceedings. Vol. 4392 LNCS. p. 479-498 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4392 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Key Exchange
    Authenticated Key Exchange
    Retrieval
    Random Oracle
    Model

    Key derivation without entropy waste

    Dodis, Y., Pietrzak, K. & Wichs, D., 2014, Advances in Cryptology, EUROCRYPT 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Springer Verlag, Vol. 8441 LNCS. p. 93-110 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8441 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Entropy
    Extractor
    One-way Function
    Beat
    Randomness Extractors

    Key-insulated public key cryptosystems

    Dodis, Y., Katz, J., Xu, S. & Yung, M., 2002, Advances in Cryptology - EUROCRYPT 2002 - International Conference on the Theory and Applications of Cryptographic Techniques, 2002, Proceedings. Springer Verlag, Vol. 2332. p. 65-82 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2332).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Public-key Cryptosystem
    Cryptography
    Mobile devices
    Encryption
    Internet

    Key-insulated symmetric key cryptography and mitigating attacks against cryptographic cloud software

    Dodis, Y., Luo, W., Xu, S. & Yung, M., 2012, ASIACCS 2012 - 7th ACM Symposium on Information, Computer and Communications Security. p. 57-58 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Cryptography
    Malware
    Virtual machine

    Leakage-resilient pseudorandom functions and side-channel attacks on feistel networks

    Dodis, Y. & Pietrzak, K., 2010, Advances in Cryptology - CRYPTO 2010 - 30th Annual Cryptology Conference, Proceedings. Vol. 6223 LNCS. p. 21-40 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6223 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Resilient Functions
    Pseudorandom Function
    Side Channel Attacks
    Leakage
    Query

    Leakage-resilient public-key cryptography in the bounded-retrieval model

    Alwen, J., Dodis, Y. & Wichs, D., 2009, Advances in Cryptology - CRYPTO 2009 - 29th Annual International Cryptology Conference, Proceedings. Vol. 5677 LNCS. p. 36-54 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5677 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Public key cryptography
    Public Key Cryptography
    Leakage
    Cryptography
    Retrieval

    Leftover hash lemma, revisited

    Barak, B., Dodis, Y., Krawczyk, H., Pereira, O., Pietrzak, K., Standaert, F. X. & Yu, Y., 2011, Advances in Cryptology - CRYPTO 2011 - 31st Annual Cryptology Conference, Proceedings. Vol. 6841 LNCS. p. 1-20 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6841 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Entropy Loss
    Lemma
    Entropy
    Seed
    Expand

    Lower bounds for oblivious transfer reductions

    Dodis, Y. & Micali, S., May 1999, Advances in Cryptology - EUROCRYPT.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Mercurial commitments: Minimal assumptions and efficient constructions

    Catalano, D., Dodis, Y. & Visconti, I., 2006, Theory of Cryptography: Third Theory of Cryptography Conference, TCC 2006, Proceedings. Vol. 3876 LNCS. p. 120-144 25 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3876 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Hash functions
    Flavors
    Zero-knowledge
    Commitment
    Imply

    Merkle-damgård revisited: How to construct a hash function

    Coron, J. S., Dodis, Y., Malinaud, C. & Puniya, P., 2006, Advances in Cryptology - CRYPTO 2005 - 25th Annual International Cryptology Conference, Proceedings. Vol. 3621 LNCS. p. 430-448 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3621 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Hash functions
    Hash Function
    Random Oracle
    SHA-1
    Compression Function

    Message authentication, revisited

    Dodis, Y., Kiltz, E., Pietrzak, K. & Wichs, D., 2012, Advances in Cryptology, EUROCRYPT 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Vol. 7237 LNCS. p. 355-374 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7237 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Message Authentication
    Message Authentication Code
    Pseudorandom Function
    Authentication
    Attack

    Message authentication codes from unpredictable block ciphers

    Dodis, Y. & Steinberger, J., 2009, Advances in Cryptology - CRYPTO 2009 - 29th Annual International Cryptology Conference, Proceedings. Vol. 5677 LNCS. p. 267-285 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5677 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Message Authentication Code
    Pseudorandom Function
    Block Ciphers
    Block Cipher
    Authentication

    Message transmission with reverse firewalls—Secure communication on corrupted machines

    Dodis, Y., Mironov, I. & Stephens-Davidowitz, N., 2016, Advances in Cryptology - 36th Annual International Cryptology Conference, CRYPTO 2016, Proceedings. Springer Verlag, Vol. 9814. p. 241-372 132 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9814).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Firewall
    Reverse
    Communication
    Cryptography
    Key Agreement

    Multiparty quantum coin flipping

    Ambainis, A., Buhrman, H., Dodis, Y. & Röhrig, H., 2004, Proceedings of the Annual IEEE Conference on Computational Complexity. Vol. 19. p. 250-259 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Broadcast
    Broadcast Channel
    Upper and Lower Bounds
    Quantum Channel
    Pairwise

    New imperfect random source with applications to coin-flipping

    Dodis, Y., 2001, Automata, Languages and Programming - 28th International Colloquium, ICALP 2001, Proceedings. Vol. 2076 LNCS. p. 297-309 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2076 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Imperfect
    Measurement errors
    Random variables
    Defects
    Dependent Random Variables

    Non-malleable codes from addictive combinatorics

    Aggarwal, D., Dodis, Y. & Lovett, S., Jun 2014, Symposium on Theory of Computing (STOC).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Non-malleable encryption: Simpler, shorter, stronger

    Coretti, S., Dodis, Y., Tackmann, B. & Venturi, D., 2016, Theory of Cryptography - 13th International Conference, TCC 2016-A, Proceedings. Springer Verlag, Vol. 9562. p. 306-335 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9562).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Encryption
    Cryptography
    Non-malleability
    Public Key Encryption
    Strengthening

    Non-malleable extractors and symmetric key cryptography from weak secrets

    Dodis, Y. & Wichs, D., 2009, STOC'09 - Proceedings of the 2009 ACM International Symposium on Theory of Computing. p. 601-610 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Cryptography
    Seed
    Entropy
    Communication
    Uncertainty

    Non-malleable reductions and applications

    Aggarwal, D., Dodis, Y., Kazana, T. & Obremski, M., Jun 14 2015, STOC 2015 - Proceedings of the 2015 ACM Symposium on Theory of Computing. Association for Computing Machinery, Vol. 14-17-June-2015. p. 459-468 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Error detection
    Error correction
    Chemical analysis
    Amplification

    Non-uniform bounds in the random-permutation, ideal-cipher, and generic-group models

    Coretti, S., Dodis, Y. & Guo, S., Jan 1 2018, Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, 2018, Proceedings. Boldyreva, A. & Shacham, H. (eds.). Springer-Verlag, p. 693-721 29 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10991 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Cipher
    Random Permutation
    Preprocessing
    Model
    Attack

    On continual leakage of discrete log representations

    Agrawal, S., Dodis, Y., Vaikuntanathan, V. & Wichs, D., 2013, Advances in Cryptology, ASIACRYPT 2013 - 19th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. PART 2 ed. Vol. 8270 LNCS. p. 401-420 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8270 LNCS, no. PART 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Leakage
    Cryptography
    Resilient Functions
    One-way Function
    Public Key Encryption

    On cryptography with auxiliary input

    Dodis, Y., Kalai, Y. T. & Lovett, S., 2009, STOC'09 - Proceedings of the 2009 ACM International Symposium on Theory of Computing. p. 621-630 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Cryptography
    Entropy

    On extractors, error-correction and hiding all partial information

    Dodis, Y., 2005, 2005 IEEE Information Theory Workshop on Theory and Practice in Information-Theoretic Security. Vol. 2005. p. 74-79 6 p. 1543961

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Error correction
    Cryptography
    Entropy
    Hash functions
    Flavors

    On perfect and adaptive security in exposure-resilient cryptography

    Dodis, Y., Sahai, A. & Smith, A., 2001, Advances in Cryptology - EUROCRYPT 2001 - International Conference on the Theory and Application of Cryptographic Techniques, Proceedings. Springer Verlag, Vol. 2045. p. 301-324 24 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2045).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Resilient Functions
    Cryptography
    Transform
    Output
    Strings

    On randomness, codes and extractors in cryptography

    Dodis, Y., 2015, Progress in Cryptology – INDOCRYPT 2015 - 16th International Conference on Cryptology in India, Proceedings. Springer Verlag, Vol. 9462. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9462).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Extractor
    Cryptography
    Randomness
    Randomness Extractors
    Imperfect