No photo of Yevgeniy Dodis

Yevgeniy Dodis

Professor of Computer Science

    19982019
    If you made any changes in Pure these will be visible here soon.

    Research Output

    Other report
    Entry for encyclopedia/dictionary

    Signcryption

    Dodis, Y., 2005, Encyclopedia of cryptography and security. van Tilborg, H. C. A. (ed.). Kluwer Academic Publishers

    Research output: Chapter in Book/Report/Conference proceedingEntry for encyclopedia/dictionary

    Conference contribution

    2-Catalog segmentation problem

    Dodis, Y., Guruswami, V. & Khanna, S., 1999, Proceedings of the Annual ACM-SIAM Symposium on Discrete Algorithms. Anon (ed.). SIAM

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    A cryptographic solution to a game theoretic problem

    Dodis, Y., Halevi, S. & Rabin, T., 2000, Advances in Cryptology - CRYPTO 2000 - 20th Annual International Cryptology Conference, Proceedings. Springer Verlag, Vol. 1880. p. 112-130 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1880).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    A domain extender for the ideal cipher

    Coron, J. S., Dodis, Y., Mandal, A. & Seurin, Y., 2010, Theory of Cryptography - 7th Theory of Cryptography Conference, TCC 2010, Proceedings. Vol. 5978 LNCS. p. 273-289 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5978 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    A formal treatment of backdoored pseudorandom generators

    Dodis, Y., Ganesh, C., Golovnev, A., Juels, A. & Ristenpart, T., 2015, Advances in Cryptology – EUROCRYPT 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Springer Verlag, Vol. 9056. p. 101-126 26 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9056).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Amplifying privacy in privacy amplification

    Aggarwal, D., Dodis, Y., Jafargholi, Z., Miles, E. & Reyzin, L., 2014, Advances in Cryptology, CRYPTO 2014 - 34th Annual Cryptology Conference, Proceedings. PART 2 ed. Springer Verlag, Vol. 8617 LNCS. p. 183-198 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8617 LNCS, no. PART 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    A new design criteria for hash-functions

    Coron, J. S., Dodis, Y., Malinaud, C. & Puniya, P., Nov 2005, NIST Cryptographic Hash Workshop.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    A new distribution-sensitive secure sketch and popularity-proportional hashing

    Woodage, J., Chatterjee, R., Dodis, Y., Juels, A. & Ristenpart, T., 2017, Advances in Cryptology – CRYPTO 2017 - 37th Annual International Cryptology Conference, Proceedings. Springer Verlag, Vol. 10403 LNCS. p. 682-710 29 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10403 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    A new mode of operation for block ciphers and length-preserving MACs

    Dodis, Y., Pietrzak, K. & Puniya, P., 2008, Advances in Cryptology - EUROCRYPT 2008 - 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Vol. 4965 LNCS. p. 198-219 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4965 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    A verifiable random function with short proofs and keys

    Dodis, Y. & Yampolskiy, A., 2005, Lecture Notes in Computer Science. Vaudenay, S. (ed.). Vol. 3386. p. 416-431 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Bottleneck links, variable demand, and the tragedy of the commons

    Cole, R., Dodis, Y. & Roughgarden, T., 2006, Proceedings of the Seventeenth Annual ACM-SIAM Symposium on Discrete Algorithms. p. 668-677 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Breaking and repairing optimistic fair exchange from PODC 2003

    Dodis, Y. & Reyzin, L., 2003, DRM 2003: Proceedings of the Third ACM Workshop on Digital Rights Management. Yung, M. (ed.). p. 47-54 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Changing base without losing space

    Dodis, Y., Patrascu, M. & Thorup, M., 2010, STOC'10 - Proceedings of the 2010 ACM International Symposium on Theory of Computing. p. 593-602 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Chosen-ciphertext security of multiple encryption

    Dodis, Y. & Katz, J., 2005, Lecture Notes in Computer Science. Kilian, J. (ed.). Vol. 3378. p. 188-209 22 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Composability and on-line deniability of authentication

    Dodis, Y., Katz, J., Smith, A. & Walfish, S., 2009, Theory of Cryptography - 6th Theory of Cryptography Conference, TCC 2009, Proceedings. Vol. 5444 LNCS. p. 146-162 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5444 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Correcting errors without leaking partial information

    Dodis, Y. & Smith, A., 2005, Proceedings of the Annual ACM Symposium on Theory of Computing. p. 654-663 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Counterexamples to hardness amplification beyond negligible

    Dodis, Y., Jain, A., Moran, T. & Wichs, D., 2012, Theory of Cryptography - 9th Theory of Cryptography Conference, TCC 2012, Proceedings. Vol. 7194 LNCS. p. 476-493 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7194 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Cryptography against continuous memory attacks

    Dodis, Y., Haralambiev, K., López-Alt, A. & Wichs, D., 2010, Proceedings - 2010 IEEE 51st Annual Symposium on Foundations of Computer Science, FOCS 2010. p. 511-520 10 p. 5671302

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Detection of algebraic manipulation with applications to robust secret sharing and fuzzy extractors

    Cramer, R., Dodis, Y., Fehr, S., Padró, C. & Wichs, D., 2008, Advances in Cryptology - EUROCRYPT 2008 - 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Vol. 4965 LNCS. p. 471-488 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4965 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Differential privacy with imperfect randomness

    Dodis, Y., López-Alt, A., Mironov, I. & Vadhan, S., 2012, Advances in Cryptology, CRYPTO 2012 - 32nd Annual Cryptology Conference, Proceedings. Vol. 7417 LNCS. p. 497-516 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7417 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Does privacy require true randomness?

    Bosley, C. & Dodis, Y., 2007, Theory of Cryptography - 4th Theory of Cryptography Conference, TCC 2007, Proceedings. Vol. 4392 LNCS. p. 1-20 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4392 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Domain extension for MACs beyond the birthday barrier

    Dodis, Y. & Steinberger, J., 2011, Advances in Cryptology - EUROCRYPT 2011, 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Vol. 6632 LNCS. p. 323-342 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6632 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Efficient construction of (distributed) verifiable random functions

    Dodis, Y., 2002, Public Key Cryptography - PKC 2003 - 6th International Workshop on Practice and Theory in Public Key Cryptography, Proceedings. Springer Verlag, Vol. 2567. p. 1-17 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2567).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Efficient constructions of composable commitments and zero-knowledge proofs

    Dodis, Y., Shoup, V. & Walfish, S., 2008, Advances in Cryptology - CRYPTO 2008 - 28th Annual International Cryptology Conference, Proceedings. Vol. 5157 LNCS. p. 515-535 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5157 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Efficient public-key cryptography in the presence of key leakage

    Dodis, Y., Haralambiev, K., López-Alt, A. & Wichs, D., 2010, Advances in Cryptology, ASIACRYPT 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Vol. 6477 LNCS. p. 613-631 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6477 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Entropic security and the encryption of high entropy messages

    Dodis, Y. & Smith, A., 2005, Lecture Notes in Computer Science. Kilian, J. (ed.). Vol. 3378. p. 556-577 22 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Exposure-resilience for free: The hierarchical ID-based encryption case

    Dodis, Y. & Yung, M., 2003, Proceedings - 1st International IEEE Security in Storage Workshop, SISW 2002. Institute of Electrical and Electronics Engineers Inc., p. 45-52 8 p. 1183509

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Exposure-resilient functions and all-or-nothing transforms

    Canetti, R., Dodis, Y., Halevi, S., Kushilevitz, E. & Sahai, A., May 2000, Advances in Cryptology - EUROCRYPT.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Fast message franking: From invisible salamanders to encryptment

    Dodis, Y., Grubbs, P., Ristenpart, T. & Woodage, J., Jan 1 2018, Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, 2018, Proceedings. Boldyreva, A. & Shacham, H. (eds.). Springer-Verlag, p. 155-186 32 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10991 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Feistel networks made public, and applications

    Dodis, Y. & Puniya, P., 2007, Advances in Cryptology - EUROCRYPT 2007 - 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Vol. 4515 LNCS. p. 534-554 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4515 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Fixing cracks in the concrete: Random oracles with auxiliary input, revisited

    Dodis, Y., Guo, S. & Katz, J., 2017, Advances in Cryptology – EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Springer Verlag, Vol. 10211 LNCS. p. 473-495 23 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10211 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Fully scalable public-key traitor tracing

    Dodis, Y., Fazio, N., Kiayias, A. & Yung, M., Jul 2003, Principles of Distributed Computing (PODC).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Fully-simulatable multiparty computation

    Dodis, Y., Pass, R. & Walfish, S., Oct 2004, Workshop on Secure Multiparty Protocols (SMP 2004).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Getting the best out of existing hash functions; Or what if we are stuck with SHA?

    Dodis, Y. & Puniya, P., 2008, Applied Cryptography and Network Security - 6th International Conference, ACNS 2008, Proceedings. Vol. 5037 LNCS. p. 156-173 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5037 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    How much can taxes help selfish routing?

    Cole, R., Dodis, Y. & Roughgarden, T., 2003, Proceedings of the ACM Conference on Electronic Commerce. p. 98-107 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    How to eat your entropy and have it too - Optimal recovery strategies for compromised RNGs

    Dodis, Y., Shamir, A., Stephens-Davidowitz, N. & Wichs, D., 2014, Advances in Cryptology, CRYPTO 2014 - 34th Annual Cryptology Conference, Proceedings. PART 2 ed. Springer Verlag, Vol. 8617 LNCS. p. 37-54 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8617 LNCS, no. PART 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    ID-based encryption for complex hierarchies with applications to forward security and broadcast encryption

    Yao, D., Dodis, Y., Fazio, N. & Lysyanskaya, A., 2004, Proceedings of the ACM Conference on Computer and Communications Security. Pfitzmann, B. & Liu, P. (eds.). p. 354-363 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Improved testing algorithms for monotonicity

    Dodis, Y., Goldreich, O., Lehman, E., Raskhodnikova, S., Ron, D. & Samorodnitsky, A., 1999, Randomization, Approximation, and Combinatorial Optimization: Algorithms and Techniques - 3rd International Workshop on Randomization and Approximation Techniques in Computer Science and 2nd International Workshop on Approximation Algorithms for Combinatorial Optimization Problems, RANDOM-APPROX 1999, Proceedings. Springer Verlag, Vol. 1671. p. 97-108 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1671).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Improving the security of MACs via randomized message preprocessing

    Dodis, Y. & Pietrzak, K., 2007, Fast Software Encryption - 14th International Workshop, FSE 2007. Vol. 4593 LNCS. p. 414-433 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4593 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Incremental codes

    Dodis, Y. & Halevi, S., Aug 2001, Workshop on Approximation Algorithms for Combinatorial Optimization Problems (APPROX).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Incremental codes

    Dodis, Y. & Halevi, S., 2015, Approximation, Randomization, and Combinatorial Optimization: Algorithms and Techniques - 4th International Workshop on Approximation, Algorithms for Combinatorial Optimization Problems, APPROX 2001 and 5th International Workshop on Randomization and Approximation Techniques in Computer Science, RANDOM 2001, Proceedings. Springer Verlag, Vol. 2129. p. 75-90 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2129).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Indifferentiability of confusion-diffusion networks

    Dodis, Y., Stam, M., Steinberger, J. & Liu, T., 2016, Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Springer Verlag, Vol. 9666. p. 679-704 26 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9666).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Indifferentiability of permutation-based compression functions and tree-based modes of operation, with applications to MD6

    Dodis, Y., Reyzin, L., Rivest, R. L. & Shen, E., 2009, Fast Software Encryption - 16th International Workshop, FSE 2009, Revised Selected Papers. Vol. 5665 LNCS. p. 104-121 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5665 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Interactive coding for interactive proofs

    Bishop, A. & Dodis, Y., 2016, Theory of Cryptography - 3th International Conference, TCC 2016-A, Proceedings. Springer Verlag, Vol. 9563. p. 352-366 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9563).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Interactive encryption and message authentication

    Dodis, Y. & Fiore, D., 2014, Security and Cryptography for Networks - 9th International Conference, SCN 2014, Proceedings. Springer Verlag, Vol. 8642. p. 494-513 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8642).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Intrusion-resilient key exchange in the bounded retrieval model

    Cash, D., Ding, Y. Z., Dodis, Y., Lee, W., Lipton, R. & Walfish, S., 2007, Theory of Cryptography - 4th Theory of Cryptography Conference, TCC 2007, Proceedings. Vol. 4392 LNCS. p. 479-498 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4392 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Key derivation without entropy waste

    Dodis, Y., Pietrzak, K. & Wichs, D., 2014, Advances in Cryptology, EUROCRYPT 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Springer Verlag, Vol. 8441 LNCS. p. 93-110 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8441 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Key-insulated public key cryptosystems

    Dodis, Y., Katz, J., Xu, S. & Yung, M., 2002, Advances in Cryptology - EUROCRYPT 2002 - International Conference on the Theory and Applications of Cryptographic Techniques, 2002, Proceedings. Springer Verlag, Vol. 2332. p. 65-82 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2332).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution