No photo of Yevgeniy Dodis

Yevgeniy Dodis

Professor of Computer Science

    19982019

    Research output per year

    If you made any changes in Pure these will be visible here soon.

    Research Output

    2011

    Leftover hash lemma, revisited

    Barak, B., Dodis, Y., Krawczyk, H., Pereira, O., Pietrzak, K., Standaert, F. X. & Yu, Y., Jan 1 2011, Advances in Cryptology - CRYPTO 2011 - 31st Annual Cryptology Conference, Proceedings. Springer Verlag, p. 1-20 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6841 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Privacy amplification and non-malleable extractors via character sums

    Dodis, Y., Li, X., Wooley, T. D. & Zuckerman, D., Dec 1 2011, Proceedings - 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science, FOCS 2011. p. 668-677 10 p. 6108229. (Proceedings - Annual IEEE Symposium on Foundations of Computer Science, FOCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Storing secrets on continually leaky devices

    Dodis, Y., Lewko, A., Waters, B. & Wichs, D., Dec 1 2011, Proceedings - 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science, FOCS 2011. p. 688-697 10 p. 6108231. (Proceedings - Annual IEEE Symposium on Foundations of Computer Science, FOCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2010

    A domain extender for the ideal cipher

    Coron, J. S., Dodis, Y., Mandal, A. & Seurin, Y., Mar 25 2010, Theory of Cryptography - 7th Theory of Cryptography Conference, TCC 2010, Proceedings. p. 273-289 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5978 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Changing base without losing space

    Dodis, Y., Patrascu, M. & Thorup, M., Jul 23 2010, STOC'10 - Proceedings of the 2010 ACM International Symposium on Theory of Computing. p. 593-602 10 p. (Proceedings of the Annual ACM Symposium on Theory of Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Concealment and its applications to authenticated encryption

    Dodis, Y., 2010, Practical signcryption. Dent, A. & Zheng, Y. (eds.). Springer

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

    Cryptography against continuous memory attacks

    Dodis, Y., Haralambiev, K., López-Alt, A. & Wichs, D., Dec 1 2010, Proceedings - 2010 IEEE 51st Annual Symposium on Foundations of Computer Science, FOCS 2010. p. 511-520 10 p. 5671302. (Proceedings - Annual IEEE Symposium on Foundations of Computer Science, FOCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Efficient public-key cryptography in the presence of key leakage

    Dodis, Y., Haralambiev, K., López-Alt, A. & Wichs, D., Dec 1 2010, Advances in Cryptology, ASIACRYPT 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. p. 613-631 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6477 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Leakage-resilient pseudorandom functions and side-channel attacks on feistel networks

    Dodis, Y. & Pietrzak, K., Sep 29 2010, Advances in Cryptology - CRYPTO 2010 - 30th Annual Cryptology Conference, Proceedings. p. 21-40 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6223 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Practical leakage-resilient identity-based encryption from simple assumptions

    Chow, S. S. M., Dodis, Y., Rouselakis, Y. & Waters, B., Dec 16 2010, CCS'10 - Proceedings of the 17th ACM Conference on Computer and Communications Security. p. 152-161 10 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Public-key encryption in the bounded-retrieval model

    Alwen, J., Dodis, Y., Naor, M., Segev, G., Walfish, S. & Wichs, D., Jul 21 2010, Advances in Cryptology - Eurocrypt 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. p. 113-134 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6110 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Public-key encryption schemes with auxiliary inputs

    Dodis, Y., Goldwasser, S., Tauman Kalai, Y., Peikert, C. & Vaikuntanathan, V., Mar 25 2010, Theory of Cryptography - 7th Theory of Cryptography Conference, TCC 2010, Proceedings. p. 361-381 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5978 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Survey: Leakage resilience and the bounded retrieval model

    Alwen, J., Dodis, Y. & Wichs, D., Nov 12 2010, Information Theoretic Security - 4th International Conference, ICITS 2009, Revised Selected Papers. p. 1-18 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5973 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2009

    Composability and on-line deniability of authentication

    Dodis, Y., Katz, J., Smith, A. & Walfish, S., Nov 9 2009, Theory of Cryptography - 6th Theory of Cryptography Conference, TCC 2009, Proceedings. p. 146-162 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5444 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Forward-secure hierarchical IBE with applications to broadcast encryption

    Yao, D., Fazio, N., Dodis, Y. & Lysyanskaya, A., 2009, Identity-Based Cryptography. IOS Press, p. 100-118 19 p. (Cryptology and Information Security Series; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    Indifferentiability of permutation-based compression functions and tree-based modes of operation, with applications to MD6

    Dodis, Y., Reyzin, L., Rivest, R. L. & Shen, E., Nov 11 2009, Fast Software Encryption - 16th International Workshop, FSE 2009, Revised Selected Papers. p. 104-121 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5665 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Leakage-resilient public-key cryptography in the bounded-retrieval model

    Alwen, J., Dodis, Y. & Wichs, D., Oct 29 2009, Advances in Cryptology - CRYPTO 2009 - 29th Annual International Cryptology Conference, Proceedings. p. 36-54 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5677 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Message authentication codes from unpredictable block ciphers

    Dodis, Y. & Steinberger, J., Oct 29 2009, Advances in Cryptology - CRYPTO 2009 - 29th Annual International Cryptology Conference, Proceedings. p. 267-285 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5677 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Non-malleable extractors and symmetric key cryptography from weak secrets

    Dodis, Y. & Wichs, D., Nov 9 2009, STOC'09 - Proceedings of the 2009 ACM International Symposium on Theory of Computing. p. 601-610 10 p. (Proceedings of the Annual ACM Symposium on Theory of Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    On cryptography with auxiliary input

    Dodis, Y., Kalai, Y. T. & Lovett, S., Nov 9 2009, STOC'09 - Proceedings of the 2009 ACM International Symposium on Theory of Computing. p. 621-630 10 p. (Proceedings of the Annual ACM Symposium on Theory of Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Proofs of Retrievability via Hardness Amplification

    Dodis, Y., Vadhan, S. & Wichs, D., Nov 9 2009, Theory of Cryptography - 6th Theory of Cryptography Conference, TCC 2009, Proceedings. p. 109-127 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5444 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Salvaging merkle-damgard for practical applications

    Dodis, Y., Ristenpart, T. & Shrimpton, T., Jul 23 2009, Advances in Cryptology - EUROCRYPT 2009 - 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. p. 371-388 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5479 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Security amplification for interactive cryptographic primitives

    Dodis, Y., Impagliazzo, R., Jaiswal, R. & Kabanets, V., Nov 16 2009, Theory of Cryptography - 6th Theory of Cryptography Conference, TCC 2009, Proceedings. p. 128-145 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5444 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2008

    A new mode of operation for block ciphers and length-preserving MACs

    Dodis, Y., Pietrzak, K. & Puniya, P., Jun 5 2008, Advances in Cryptology - EUROCRYPT 2008 - 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. p. 198-219 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4965 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Detection of algebraic manipulation with applications to robust secret sharing and fuzzy extractors

    Cramer, R., Dodis, Y., Fehr, S., Padró, C. & Wichs, D., Jun 5 2008, Advances in Cryptology - EUROCRYPT 2008 - 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. p. 471-488 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4965 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Efficient constructions of composable commitments and zero-knowledge proofs

    Dodis, Y., Shoup, V. & Walfish, S., Sep 22 2008, Advances in Cryptology - CRYPTO 2008 - 28th Annual International Cryptology Conference, Proceedings. p. 515-535 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5157 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Forward-secure hierarchical IBE with applications to broadcast encryption schemes

    Dodis, Y., Yao, D., Fazio, N. & Lysyanskaya, A., 2008, Identity-based cryptography. Joye, M. & Neven, G. (eds.). IOS Press, (Cryptology and Information Security Series).

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

    Fuzzy extractors: How to generate strong keys from biometrics and other noisy data

    Dodis, Y., Ostrovsky, R., Reyzin, L. & Smith, A., Nov 7 2008, In : SIAM Journal on Computing. 38, 1, p. 97-139 43 p.

    Research output: Contribution to journalArticle

    Getting the best out of existing hash functions; Or what if we are stuck with SHA?

    Dodis, Y. & Puniya, P., Jun 30 2008, Applied Cryptography and Network Security - 6th International Conference, ACNS 2008, Proceedings. p. 156-173 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5037 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Optimistic fair exchange in a multi-user setting

    Dodis, Y., Lee, P. J. & Yum, D. H., Jun 2 2008, In : Journal of Universal Computer Science. 14, 3, p. 318-346 29 p.

    Research output: Contribution to journalArticle

    2007

    Cryptography and game theory

    Dodis, Y. & Rabin, T., Jan 1 2007, Algorithmic Game Theory. Cambridge University Press, Vol. 9780521872829. p. 181-206 26 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

    Does privacy require true randomness?

    Bosley, C. & Dodis, Y., Dec 1 2007, Theory of Cryptography - 4th Theory of Cryptography Conference, TCC 2007, Proceedings. p. 1-20 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4392 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Feistel networks made public, and applications

    Dodis, Y. & Puniya, P., Dec 1 2007, Advances in Cryptology - EUROCRYPT 2007 - 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. p. 534-554 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4515 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Fuzzy extractors

    Dodis, Y., Reyzin, L. & Smith, A., Dec 1 2007, Security with Noisy Data: On Private Biometrics, Secure Key Storage and Anti-Counterfeiting. Springer London, p. 79-99 21 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

    Improving the security of MACs via randomized message preprocessing

    Dodis, Y. & Pietrzak, K., Dec 1 2007, Fast Software Encryption - 14th International Workshop, FSE 2007. p. 414-433 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4593 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Intrusion-resilient key exchange in the bounded retrieval model

    Cash, D., Ding, Y. Z., Dodis, Y., Lee, W., Lipton, R. & Walfish, S., Dec 1 2007, Theory of Cryptography - 4th Theory of Cryptography Conference, TCC 2007, Proceedings. p. 479-498 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4392 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Optimistic fair exchange in a multi-user setting

    Dodis, Y., Lee, P. J. & Yum, D. H., Dec 1 2007, Public Key Cryptography - PKC 2007 - 10th International Conference on Practice and Theory in Public-Key Cryptography, Proceedings. p. 118-133 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4450 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Universally composable security with global setup

    Canetti, R., Dodis, Y., Pass, R. & Walfish, S., Dec 1 2007, Theory of Cryptography - 4th Theory of Cryptography Conference, TCC 2007, Proceedings. p. 61-85 25 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4392 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2006

    Bottleneck links, variable demand, and the tragedy of the commons

    Cole, R., Dodis, Y. & Roughgarden, T., 2006, Proceedings of the Seventeenth Annual ACM-SIAM Symposium on Discrete Algorithms. p. 668-677 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    How much can taxes help selfish routing?

    Cole, R., Dodis, Y. & Roughgarden, T., May 1 2006, In : Journal of Computer and System Sciences. 72, 3, p. 444-467 24 p.

    Research output: Contribution to journalArticle

    Mercurial commitments: Minimal assumptions and efficient constructions

    Catalano, D., Dodis, Y. & Visconti, I., Jul 7 2006, Theory of Cryptography: Third Theory of Cryptography Conference, TCC 2006, Proceedings. p. 120-144 25 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3876 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Merkle-damgård revisited: How to construct a hash function

    Coron, J. S., Dodis, Y., Malinaud, C. & Puniya, P., Jun 23 2006, Advances in Cryptology - CRYPTO 2005 - 25th Annual International Cryptology Conference, Proceedings. p. 430-448 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3621 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    On the generic insecurity of the full domain hash

    Dodis, Y., Oliveira, R. & Pietrzak, K., Jun 23 2006, Advances in Cryptology - CRYPTO 2005 - 25th Annual International Cryptology Conference, Proceedings. p. 449-466 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3621 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    On the impossibility of extracting classical randomness using a quantum computer

    Dodis, Y. & Renner, R., Jan 1 2006, Automata, Languages and Programming - 33rd International Colloquium, ICALP 2006, Proceedings. Springer Verlag, p. 204-215 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4052 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    On the relation between the Ideal Cipher and the Random Oracle Models

    Dodis, Y. & Puniya, P., Jul 7 2006, Theory of Cryptography: Third Theory of Cryptography Conference, TCC 2006, Proceedings. p. 184-206 23 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3876 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Public key cryptography - PKC 2006

    Dodis, Y. (ed.), Yung, M. (ed.), Kiayias, A. (ed.) & Malkin, T. (ed.), 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings. Springer

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Robust fuzzy extractors and authenticated key agreement from close secrets

    Dodis, Y., Katz, J., Reyzin, L. & Smith, A., Jan 1 2006, Advances in Cryptology - CRYPTO 2006 - 26th Annual International Cryptology Conference, Proceedings. Springer Verlag, p. 232-250 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4117 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Separating sources for encryption and secret sharing

    Dodis, Y., Pietrzak, K. & Przydatek, B., Jul 7 2006, Theory of Cryptography: Third Theory of Cryptography Conference, TCC 2006, Proceedings. p. 601-616 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3876 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Threshold and proactive pseudo-random permutations

    Dodis, Y., Yampolskiy, A. & Yung, M., Jul 7 2006, Theory of Cryptography: Third Theory of Cryptography Conference, TCC 2006, Proceedings. p. 542-560 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3876 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2005

    A new design criteria for hash-functions

    Coron, J. S., Dodis, Y., Malinaud, C. & Puniya, P., Nov 2005, NIST Cryptographic Hash Workshop.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution