No photo of Yevgeniy Dodis

Yevgeniy Dodis

Professor of Computer Science

    19982019
    If you made any changes in Pure, your changes will be visible here soon.

    Research Output 1998 2019

    2011

    Leftover hash lemma, revisited

    Barak, B., Dodis, Y., Krawczyk, H., Pereira, O., Pietrzak, K., Standaert, F. X. & Yu, Y., 2011, Advances in Cryptology - CRYPTO 2011 - 31st Annual Cryptology Conference, Proceedings. Vol. 6841 LNCS. p. 1-20 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6841 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Entropy Loss
    Lemma
    Entropy
    Seed
    Expand

    Privacy amplification and non-malleable extractors via character sums

    Dodis, Y., Li, X., Wooley, T. D. & Zuckerman, D., 2011, Proceedings - 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science, FOCS 2011. p. 668-677 10 p. 6108229

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Amplification
    Entropy
    Polynomials
    Seed
    Gold

    Storing secrets on continually leaky devices

    Dodis, Y., Lewko, A., Waters, B. & Wichs, D., 2011, Proceedings - 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science, FOCS 2011. p. 688-697 10 p. 6108231

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Cryptography
    Communication
    Water
    2010

    A domain extender for the ideal cipher

    Coron, J. S., Dodis, Y., Mandal, A. & Seurin, Y., 2010, Theory of Cryptography - 7th Theory of Cryptography Conference, TCC 2010, Proceedings. Vol. 5978 LNCS. p. 273-289 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5978 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Random Oracle
    Block Cipher
    Standard Model
    Attack

    Changing base without losing space

    Dodis, Y., Patrascu, M. & Thorup, M., 2010, STOC'10 - Proceedings of the 2010 ACM International Symposium on Theory of Computing. p. 593-602 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Hash functions
    Authentication
    Decoding
    Data structures
    Hardness

    Concealment and its applications to authenticated encryption

    Dodis, Y., 2010, Practical signcryption. Dent, A. & Zheng, Y. (eds.). Springer

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

    Cryptography against continuous memory attacks

    Dodis, Y., Haralambiev, K., López-Alt, A. & Wichs, D., 2010, Proceedings - 2010 IEEE 51st Annual Symposium on Foundations of Computer Science, FOCS 2010. p. 511-520 10 p. 5671302

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Cryptography
    Data storage equipment

    Efficient public-key cryptography in the presence of key leakage

    Dodis, Y., Haralambiev, K., López-Alt, A. & Wichs, D., 2010, Advances in Cryptology, ASIACRYPT 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Vol. 6477 LNCS. p. 613-631 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6477 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Public key cryptography
    Public Key Cryptography
    Leakage
    Encryption
    Cryptography

    Leakage-resilient pseudorandom functions and side-channel attacks on feistel networks

    Dodis, Y. & Pietrzak, K., 2010, Advances in Cryptology - CRYPTO 2010 - 30th Annual Cryptology Conference, Proceedings. Vol. 6223 LNCS. p. 21-40 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6223 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Resilient Functions
    Pseudorandom Function
    Side Channel Attacks
    Leakage
    Query

    Practical leakage-resilient identity-based encryption from simple assumptions

    Chow, S. S. M., Dodis, Y., Rouselakis, Y. & Waters, B., 2010, CCS'10 - Proceedings of the 17th ACM Conference on Computer and Communications Security. p. 152-161 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Cryptography
    Water
    Composite materials

    Public-key encryption in the bounded-retrieval model

    Alwen, J., Dodis, Y., Naor, M., Segev, G., Walfish, S. & Wichs, D., 2010, Advances in Cryptology - Eurocrypt 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Vol. 6110 LNCS. p. 113-134 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6110 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Public Key Encryption
    Identity-based
    Proof System
    Cryptography
    Retrieval

    Public-key encryption schemes with auxiliary inputs

    Dodis, Y., Goldwasser, S., Tauman Kalai, Y., Peikert, C. & Vaikuntanathan, V., 2010, Theory of Cryptography - 7th Theory of Cryptography Conference, TCC 2010, Proceedings. Vol. 5978 LNCS. p. 361-381 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5978 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Public Key Encryption
    Cryptography
    Public-key Cryptosystem
    Diffie-Hellman
    Theorem

    Survey: Leakage resilience and the bounded retrieval model

    Alwen, J., Dodis, Y. & Wichs, D., 2010, Information Theoretic Security - 4th International Conference, ICITS 2009, Revised Selected Papers. Vol. 5973 LNCS. p. 1-18 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5973 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Resilience
    Leakage
    Retrieval
    Cryptography
    Surveying
    2009

    Composability and on-line deniability of authentication

    Dodis, Y., Katz, J., Smith, A. & Walfish, S., 2009, Theory of Cryptography - 6th Theory of Cryptography Conference, TCC 2009, Proceedings. Vol. 5444 LNCS. p. 146-162 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5444 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Authentication
    Universal Composability
    Message Authentication
    Completion
    Receiver

    Forward-secure hierarchical IBE with applications to broadcast encryption

    Yao, D., Fazio, N., Dodis, Y. & Lysyanskaya, A., 2009, Identity-Based Cryptography. Vol. 2. p. 100-118 19 p. (Cryptology and Information Security Series; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    Cryptography
    Access control
    Joining

    Indifferentiability of permutation-based compression functions and tree-based modes of operation, with applications to MD6

    Dodis, Y., Reyzin, L., Rivest, R. L. & Shen, E., 2009, Fast Software Encryption - 16th International Workshop, FSE 2009, Revised Selected Papers. Vol. 5665 LNCS. p. 104-121 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5665 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Compression Function
    Hash functions
    Modes of Operation
    Permutation
    Random Oracle

    Leakage-resilient public-key cryptography in the bounded-retrieval model

    Alwen, J., Dodis, Y. & Wichs, D., 2009, Advances in Cryptology - CRYPTO 2009 - 29th Annual International Cryptology Conference, Proceedings. Vol. 5677 LNCS. p. 36-54 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5677 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Public key cryptography
    Public Key Cryptography
    Leakage
    Cryptography
    Retrieval

    Message authentication codes from unpredictable block ciphers

    Dodis, Y. & Steinberger, J., 2009, Advances in Cryptology - CRYPTO 2009 - 29th Annual International Cryptology Conference, Proceedings. Vol. 5677 LNCS. p. 267-285 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5677 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Message Authentication Code
    Pseudorandom Function
    Block Ciphers
    Block Cipher
    Authentication

    Non-malleable extractors and symmetric key cryptography from weak secrets

    Dodis, Y. & Wichs, D., 2009, STOC'09 - Proceedings of the 2009 ACM International Symposium on Theory of Computing. p. 601-610 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Cryptography
    Seed
    Entropy
    Communication
    Uncertainty

    On cryptography with auxiliary input

    Dodis, Y., Kalai, Y. T. & Lovett, S., 2009, STOC'09 - Proceedings of the 2009 ACM International Symposium on Theory of Computing. p. 621-630 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Cryptography
    Entropy

    Proofs of Retrievability via Hardness Amplification

    Dodis, Y., Vadhan, S. & Wichs, D., 2009, Theory of Cryptography - 6th Theory of Cryptography Conference, TCC 2009, Proceedings. Vol. 5444 LNCS. p. 109-127 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5444 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Amplification
    Hardness
    Servers
    Audit
    Server

    Salvaging merkle-damgard for practical applications

    Dodis, Y., Ristenpart, T. & Shrimpton, T., 2009, Advances in Cryptology - EUROCRYPT 2009 - 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Vol. 5479 LNCS. p. 371-388 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5479 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Salvaging
    Hash Function
    Compression Function
    Hash functions
    Random Oracle

    Security amplification for interactive cryptographic primitives

    Dodis, Y., Impagliazzo, R., Jaiswal, R. & Kabanets, V., 2009, Theory of Cryptography - 6th Theory of Cryptography Conference, TCC 2009, Proceedings. Vol. 5444 LNCS. p. 128-145 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5444 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Amplification
    Authentication
    Cryptography
    Message Authentication Code
    Pseudorandom Function
    2008

    A new mode of operation for block ciphers and length-preserving MACs

    Dodis, Y., Pietrzak, K. & Puniya, P., 2008, Advances in Cryptology - EUROCRYPT 2008 - 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Vol. 4965 LNCS. p. 198-219 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4965 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Block Ciphers
    Modes of Operation
    Hash functions
    Block Cipher
    Even permutation

    Detection of algebraic manipulation with applications to robust secret sharing and fuzzy extractors

    Cramer, R., Dodis, Y., Fehr, S., Padró, C. & Wichs, D., 2008, Advances in Cryptology - EUROCRYPT 2008 - 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Vol. 4965 LNCS. p. 471-488 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4965 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Extractor
    Secret Sharing
    Manipulation
    Equipment and Supplies
    Secret Sharing Scheme

    Efficient constructions of composable commitments and zero-knowledge proofs

    Dodis, Y., Shoup, V. & Walfish, S., 2008, Advances in Cryptology - CRYPTO 2008 - 28th Annual International Cryptology Conference, Proceedings. Vol. 5157 LNCS. p. 515-535 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5157 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Universal Composability
    Zero-knowledge Proof
    Random Oracle
    Zero-knowledge
    Cryptographic Protocols

    Forward-secure hierarchical IBE with applications to broadcast encryption schemes

    Dodis, Y., Yao, D., Fazio, N. & Lysyanskaya, A., 2008, Identity-based cryptography. Joye, M. & Neven, G. (eds.). IOS Press, (Cryptology and Information Security Series).

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

    Fuzzy extractors: How to generate strong keys from biometrics and other noisy data

    Dodis, Y., Ostrovsky, R., Reyzin, L. & Smith, A., 2008, In : SIAM Journal on Computing. 38, 1, p. 97-139 43 p.

    Research output: Contribution to journalArticle

    Extractor
    Noisy Data
    Biometrics
    Hamming distance
    Difference Set

    Getting the best out of existing hash functions; Or what if we are stuck with SHA?

    Dodis, Y. & Puniya, P., 2008, Applied Cryptography and Network Security - 6th International Conference, ACNS 2008, Proceedings. Vol. 5037 LNCS. p. 156-173 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5037 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Hash functions
    Hash Function
    Modes of Operation
    Cascade
    Compression Function

    Optimistic fair exchange in a multi-user setting

    Dodis, Y., Lee, P. J. & Yum, D. H., 2008, In : Journal of Universal Computer Science. 14, 3, p. 318-346 29 p.

    Research output: Contribution to journalArticle

    Fair Exchange
    Security Model
    Cryptography
    Multisignature
    One-way Function
    2007

    Cryptography and game theory

    Dodis, Y. & Rabin, T., Jan 1 2007, Algorithmic Game Theory. Cambridge University Press, p. 181-206 26 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

    Game theory
    Cryptography

    Does privacy require true randomness?

    Bosley, C. & Dodis, Y., 2007, Theory of Cryptography - 4th Theory of Cryptography Conference, TCC 2007, Proceedings. Vol. 4392 LNCS. p. 1-20 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4392 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Privacy
    Randomness
    Entropy
    Encryption
    Cryptography

    Feistel networks made public, and applications

    Dodis, Y. & Puniya, P., 2007, Advances in Cryptology - EUROCRYPT 2007 - 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Vol. 4515 LNCS. p. 534-554 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4515 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Logarithmic
    Message Authentication Code
    Sufficient
    Pseudorandomness
    Scenarios

    Fuzzy extractors

    Dodis, Y., Reyzin, L. & Smith, A., 2007, Security with Noisy Data: On Private Biometrics, Secure Key Storage and Anti-Counterfeiting. Springer London, p. 79-99 21 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

    Biometrics

    Improving the security of MACs via randomized message preprocessing

    Dodis, Y. & Pietrzak, K., 2007, Fast Software Encryption - 14th International Workshop, FSE 2007. Vol. 4593 LNCS. p. 414-433 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4593 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Hash functions
    Hash Function
    Preprocessing
    Salts
    Polynomial Evaluation

    Intrusion-resilient key exchange in the bounded retrieval model

    Cash, D., Ding, Y. Z., Dodis, Y., Lee, W., Lipton, R. & Walfish, S., 2007, Theory of Cryptography - 4th Theory of Cryptography Conference, TCC 2007, Proceedings. Vol. 4392 LNCS. p. 479-498 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4392 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Key Exchange
    Authenticated Key Exchange
    Retrieval
    Random Oracle
    Model

    Optimistic fair exchange in a multi-user setting

    Dodis, Y., Lee, P. J. & Yum, D. H., 2007, Public Key Cryptography - PKC 2007 - 10th International Conference on Practice and Theory in Public-Key Cryptography, Proceedings. Vol. 4450 LNCS. p. 118-133 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4450 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Fair Exchange
    Security Model
    Cryptography
    Multisignature
    One-way Function

    Universally composable security with global setup

    Canetti, R., Dodis, Y., Pass, R. & Walfish, S., 2007, Theory of Cryptography - 4th Theory of Cryptography Conference, TCC 2007, Proceedings. Vol. 4392 LNCS. p. 61-85 25 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4392 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Access to Information
    Hardness
    Zero-knowledge
    Cryptographic Protocols
    Requirements
    2006

    Bottleneck links, variable demand, and the tragedy of the commons

    Cole, R., Dodis, Y. & Roughgarden, T., 2006, Proceedings of the Seventeenth Annual ACM-SIAM Symposium on Discrete Algorithms. p. 668-677 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Price of Anarchy
    Agglomeration
    Aggregation Function
    Resources
    Norm

    How much can taxes help selfish routing?

    Cole, R., Dodis, Y. & Roughgarden, T., May 2006, In : Journal of Computer and System Sciences. 72, 3, p. 444-467 24 p.

    Research output: Contribution to journalArticle

    Selfish Routing
    Tax
    Taxation
    Latency
    Costs

    Mercurial commitments: Minimal assumptions and efficient constructions

    Catalano, D., Dodis, Y. & Visconti, I., 2006, Theory of Cryptography: Third Theory of Cryptography Conference, TCC 2006, Proceedings. Vol. 3876 LNCS. p. 120-144 25 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3876 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Hash functions
    Flavors
    Zero-knowledge
    Commitment
    Imply

    Merkle-damgård revisited: How to construct a hash function

    Coron, J. S., Dodis, Y., Malinaud, C. & Puniya, P., 2006, Advances in Cryptology - CRYPTO 2005 - 25th Annual International Cryptology Conference, Proceedings. Vol. 3621 LNCS. p. 430-448 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3621 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Hash functions
    Hash Function
    Random Oracle
    SHA-1
    Compression Function

    On the generic insecurity of the full domain hash

    Dodis, Y., Oliveira, R. & Pietrzak, K., 2006, Advances in Cryptology - CRYPTO 2005 - 25th Annual International Cryptology Conference, Proceedings. Vol. 3621 LNCS. p. 449-466 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3621 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Hoof and Claw
    Permutation
    Random Oracle
    Claw-free
    Random Oracle Model

    On the impossibility of extracting classical randomness using a quantum computer

    Dodis, Y. & Renner, R., 2006, Automata, Languages and Programming - 33rd International Colloquium, ICALP 2006, Proceedings. Vol. 4052 LNCS. p. 204-215 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4052 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Quantum computers
    Quantum Computer
    Randomness
    Quantum Computation
    Measurement errors

    On the relation between the Ideal Cipher and the Random Oracle Models

    Dodis, Y. & Puniya, P., 2006, Theory of Cryptography: Third Theory of Cryptography Conference, TCC 2006, Proceedings. Vol. 3876 LNCS. p. 184-206 23 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3876 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Random Oracle Model
    Random Oracle
    Block Cipher
    Cryptosystem
    Cryptography

    Public key cryptography - PKC 2006

    Dodis, Y. (ed.), Yung, M. (ed.), Kiayias, A. (ed.) & Malkin, T. (ed.), 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings. Springer

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Robust fuzzy extractors and authenticated key agreement from close secrets

    Dodis, Y., Katz, J., Reyzin, L. & Smith, A., 2006, Advances in Cryptology - CRYPTO 2006 - 26th Annual International Cryptology Conference, Proceedings. Vol. 4117 LNCS. p. 232-250 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4117 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Key Agreement
    Extractor
    Exceed
    Entropy
    Random Oracle

    Separating sources for encryption and secret sharing

    Dodis, Y., Pietrzak, K. & Przydatek, B., 2006, Theory of Cryptography: Third Theory of Cryptography Conference, TCC 2006, Proceedings. Vol. 3876 LNCS. p. 601-616 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3876 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Secret Sharing
    Entropy
    Encryption
    Cryptography
    Randomness

    Threshold and proactive pseudo-random permutations

    Dodis, Y., Yampolskiy, A. & Yung, M., 2006, Theory of Cryptography: Third Theory of Cryptography Conference, TCC 2006, Proceedings. Vol. 3876 LNCS. p. 542-560 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3876 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Random Permutation
    Network protocols
    Servers
    Server
    Pseudorandom Function
    2005

    A new design criteria for hash-functions

    Coron, J. S., Dodis, Y., Malinaud, C. & Puniya, P., Nov 2005, NIST Cryptographic Hash Workshop.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution