Research Output per year

## Research Output

## Leftover hash lemma, revisited

Barak, B., Dodis, Y., Krawczyk, H., Pereira, O., Pietrzak, K., Standaert, F. X. & Yu, Y., Jan 1 2011,*Advances in Cryptology - CRYPTO 2011 - 31st Annual Cryptology Conference, Proceedings.*Springer Verlag, p. 1-20 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6841 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Privacy amplification and non-malleable extractors via character sums

Dodis, Y., Li, X., Wooley, T. D. & Zuckerman, D., Dec 1 2011,*Proceedings - 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science, FOCS 2011.*p. 668-677 10 p. 6108229. (Proceedings - Annual IEEE Symposium on Foundations of Computer Science, FOCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Storing secrets on continually leaky devices

Dodis, Y., Lewko, A., Waters, B. & Wichs, D., Dec 1 2011,*Proceedings - 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science, FOCS 2011.*p. 688-697 10 p. 6108231. (Proceedings - Annual IEEE Symposium on Foundations of Computer Science, FOCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## A domain extender for the ideal cipher

Coron, J. S., Dodis, Y., Mandal, A. & Seurin, Y., Mar 25 2010,*Theory of Cryptography - 7th Theory of Cryptography Conference, TCC 2010, Proceedings.*p. 273-289 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5978 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Changing base without losing space

Dodis, Y., Patrascu, M. & Thorup, M., Jul 23 2010,*STOC'10 - Proceedings of the 2010 ACM International Symposium on Theory of Computing.*p. 593-602 10 p. (Proceedings of the Annual ACM Symposium on Theory of Computing).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Concealment and its applications to authenticated encryption

Dodis, Y., 2010,*Practical signcryption.*Dent, A. & Zheng, Y. (eds.). Springer

Research output: Chapter in Book/Report/Conference proceeding › Chapter (peer-reviewed)

## Cryptography against continuous memory attacks

Dodis, Y., Haralambiev, K., López-Alt, A. & Wichs, D., Dec 1 2010,*Proceedings - 2010 IEEE 51st Annual Symposium on Foundations of Computer Science, FOCS 2010.*p. 511-520 10 p. 5671302. (Proceedings - Annual IEEE Symposium on Foundations of Computer Science, FOCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Efficient public-key cryptography in the presence of key leakage

Dodis, Y., Haralambiev, K., López-Alt, A. & Wichs, D., Dec 1 2010,*Advances in Cryptology, ASIACRYPT 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings.*p. 613-631 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6477 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Leakage-resilient pseudorandom functions and side-channel attacks on feistel networks

Dodis, Y. & Pietrzak, K., Sep 29 2010,*Advances in Cryptology - CRYPTO 2010 - 30th Annual Cryptology Conference, Proceedings.*p. 21-40 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6223 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Practical leakage-resilient identity-based encryption from simple assumptions

Chow, S. S. M., Dodis, Y., Rouselakis, Y. & Waters, B., Dec 16 2010,*CCS'10 - Proceedings of the 17th ACM Conference on Computer and Communications Security.*p. 152-161 10 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Public-key encryption in the bounded-retrieval model

Alwen, J., Dodis, Y., Naor, M., Segev, G., Walfish, S. & Wichs, D., Jul 21 2010,*Advances in Cryptology - Eurocrypt 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings.*p. 113-134 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6110 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Public-key encryption schemes with auxiliary inputs

Dodis, Y., Goldwasser, S., Tauman Kalai, Y., Peikert, C. & Vaikuntanathan, V., Mar 25 2010,*Theory of Cryptography - 7th Theory of Cryptography Conference, TCC 2010, Proceedings.*p. 361-381 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5978 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Survey: Leakage resilience and the bounded retrieval model

Alwen, J., Dodis, Y. & Wichs, D., Nov 12 2010,*Information Theoretic Security - 4th International Conference, ICITS 2009, Revised Selected Papers.*p. 1-18 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5973 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Composability and on-line deniability of authentication

Dodis, Y., Katz, J., Smith, A. & Walfish, S., Nov 9 2009,*Theory of Cryptography - 6th Theory of Cryptography Conference, TCC 2009, Proceedings.*p. 146-162 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5444 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Forward-secure hierarchical IBE with applications to broadcast encryption

Yao, D., Fazio, N., Dodis, Y. & Lysyanskaya, A., 2009,*Identity-Based Cryptography.*IOS Press, p. 100-118 19 p. (Cryptology and Information Security Series; vol. 2).

Research output: Chapter in Book/Report/Conference proceeding › Chapter

## Indifferentiability of permutation-based compression functions and tree-based modes of operation, with applications to MD6

Dodis, Y., Reyzin, L., Rivest, R. L. & Shen, E., Nov 11 2009,*Fast Software Encryption - 16th International Workshop, FSE 2009, Revised Selected Papers.*p. 104-121 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5665 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Leakage-resilient public-key cryptography in the bounded-retrieval model

Alwen, J., Dodis, Y. & Wichs, D., Oct 29 2009,*Advances in Cryptology - CRYPTO 2009 - 29th Annual International Cryptology Conference, Proceedings.*p. 36-54 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5677 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Message authentication codes from unpredictable block ciphers

Dodis, Y. & Steinberger, J., Oct 29 2009,*Advances in Cryptology - CRYPTO 2009 - 29th Annual International Cryptology Conference, Proceedings.*p. 267-285 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5677 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Non-malleable extractors and symmetric key cryptography from weak secrets

Dodis, Y. & Wichs, D., Nov 9 2009,*STOC'09 - Proceedings of the 2009 ACM International Symposium on Theory of Computing.*p. 601-610 10 p. (Proceedings of the Annual ACM Symposium on Theory of Computing).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## On cryptography with auxiliary input

Dodis, Y., Kalai, Y. T. & Lovett, S., Nov 9 2009,*STOC'09 - Proceedings of the 2009 ACM International Symposium on Theory of Computing.*p. 621-630 10 p. (Proceedings of the Annual ACM Symposium on Theory of Computing).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Proofs of Retrievability via Hardness Amplification

Dodis, Y., Vadhan, S. & Wichs, D., Nov 9 2009,*Theory of Cryptography - 6th Theory of Cryptography Conference, TCC 2009, Proceedings.*p. 109-127 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5444 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Salvaging merkle-damgard for practical applications

Dodis, Y., Ristenpart, T. & Shrimpton, T., Jul 23 2009,*Advances in Cryptology - EUROCRYPT 2009 - 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings.*p. 371-388 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5479 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Security amplification for interactive cryptographic primitives

Dodis, Y., Impagliazzo, R., Jaiswal, R. & Kabanets, V., Nov 16 2009,*Theory of Cryptography - 6th Theory of Cryptography Conference, TCC 2009, Proceedings.*p. 128-145 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5444 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## A new mode of operation for block ciphers and length-preserving MACs

Dodis, Y., Pietrzak, K. & Puniya, P., Jun 5 2008,*Advances in Cryptology - EUROCRYPT 2008 - 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings.*p. 198-219 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4965 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Detection of algebraic manipulation with applications to robust secret sharing and fuzzy extractors

Cramer, R., Dodis, Y., Fehr, S., Padró, C. & Wichs, D., Jun 5 2008,*Advances in Cryptology - EUROCRYPT 2008 - 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings.*p. 471-488 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4965 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Efficient constructions of composable commitments and zero-knowledge proofs

Dodis, Y., Shoup, V. & Walfish, S., Sep 22 2008,*Advances in Cryptology - CRYPTO 2008 - 28th Annual International Cryptology Conference, Proceedings.*p. 515-535 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5157 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Forward-secure hierarchical IBE with applications to broadcast encryption schemes

Dodis, Y., Yao, D., Fazio, N. & Lysyanskaya, A., 2008,*Identity-based cryptography.*Joye, M. & Neven, G. (eds.). IOS Press, (Cryptology and Information Security Series).

Research output: Chapter in Book/Report/Conference proceeding › Chapter (peer-reviewed)

## Fuzzy extractors: How to generate strong keys from biometrics and other noisy data

Dodis, Y., Ostrovsky, R., Reyzin, L. & Smith, A., Nov 7 2008, In : SIAM Journal on Computing. 38, 1, p. 97-139 43 p.Research output: Contribution to journal › Article

## Getting the best out of existing hash functions; Or what if we are stuck with SHA?

Dodis, Y. & Puniya, P., Jun 30 2008,*Applied Cryptography and Network Security - 6th International Conference, ACNS 2008, Proceedings.*p. 156-173 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5037 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Optimistic fair exchange in a multi-user setting

Dodis, Y., Lee, P. J. & Yum, D. H., Jun 2 2008, In : Journal of Universal Computer Science. 14, 3, p. 318-346 29 p.Research output: Contribution to journal › Article

## Cryptography and game theory

Dodis, Y. & Rabin, T., Jan 1 2007,*Algorithmic Game Theory.*Cambridge University Press, Vol. 9780521872829. p. 181-206 26 p.

Research output: Chapter in Book/Report/Conference proceeding › Chapter

## Does privacy require true randomness?

Bosley, C. & Dodis, Y., Dec 1 2007,*Theory of Cryptography - 4th Theory of Cryptography Conference, TCC 2007, Proceedings.*p. 1-20 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4392 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Feistel networks made public, and applications

Dodis, Y. & Puniya, P., Dec 1 2007,*Advances in Cryptology - EUROCRYPT 2007 - 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings.*p. 534-554 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4515 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Fuzzy extractors

Dodis, Y., Reyzin, L. & Smith, A., Dec 1 2007,*Security with Noisy Data: On Private Biometrics, Secure Key Storage and Anti-Counterfeiting.*Springer London, p. 79-99 21 p.

Research output: Chapter in Book/Report/Conference proceeding › Chapter

## Improving the security of MACs via randomized message preprocessing

Dodis, Y. & Pietrzak, K., Dec 1 2007,*Fast Software Encryption - 14th International Workshop, FSE 2007.*p. 414-433 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4593 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Intrusion-resilient key exchange in the bounded retrieval model

Cash, D., Ding, Y. Z., Dodis, Y., Lee, W., Lipton, R. & Walfish, S., Dec 1 2007,*Theory of Cryptography - 4th Theory of Cryptography Conference, TCC 2007, Proceedings.*p. 479-498 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4392 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Optimistic fair exchange in a multi-user setting

Dodis, Y., Lee, P. J. & Yum, D. H., Dec 1 2007,*Public Key Cryptography - PKC 2007 - 10th International Conference on Practice and Theory in Public-Key Cryptography, Proceedings.*p. 118-133 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4450 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Universally composable security with global setup

Canetti, R., Dodis, Y., Pass, R. & Walfish, S., Dec 1 2007,*Theory of Cryptography - 4th Theory of Cryptography Conference, TCC 2007, Proceedings.*p. 61-85 25 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4392 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Bottleneck links, variable demand, and the tragedy of the commons

Cole, R., Dodis, Y. & Roughgarden, T., 2006,*Proceedings of the Seventeenth Annual ACM-SIAM Symposium on Discrete Algorithms.*p. 668-677 10 p.

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## How much can taxes help selfish routing?

Cole, R., Dodis, Y. & Roughgarden, T., May 1 2006, In : Journal of Computer and System Sciences. 72, 3, p. 444-467 24 p.Research output: Contribution to journal › Article

## Mercurial commitments: Minimal assumptions and efficient constructions

Catalano, D., Dodis, Y. & Visconti, I., Jul 7 2006,*Theory of Cryptography: Third Theory of Cryptography Conference, TCC 2006, Proceedings.*p. 120-144 25 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3876 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Merkle-damgård revisited: How to construct a hash function

Coron, J. S., Dodis, Y., Malinaud, C. & Puniya, P., Jun 23 2006,*Advances in Cryptology - CRYPTO 2005 - 25th Annual International Cryptology Conference, Proceedings.*p. 430-448 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3621 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## On the generic insecurity of the full domain hash

Dodis, Y., Oliveira, R. & Pietrzak, K., Jun 23 2006,*Advances in Cryptology - CRYPTO 2005 - 25th Annual International Cryptology Conference, Proceedings.*p. 449-466 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3621 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## On the impossibility of extracting classical randomness using a quantum computer

Dodis, Y. & Renner, R., Jan 1 2006,*Automata, Languages and Programming - 33rd International Colloquium, ICALP 2006, Proceedings.*Springer Verlag, p. 204-215 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4052 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## On the relation between the Ideal Cipher and the Random Oracle Models

Dodis, Y. & Puniya, P., Jul 7 2006,*Theory of Cryptography: Third Theory of Cryptography Conference, TCC 2006, Proceedings.*p. 184-206 23 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3876 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Public key cryptography - PKC 2006

Dodis, Y. (ed.), Yung, M. (ed.), Kiayias, A. (ed.) & Malkin, T. (ed.), 2006,*9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings.*Springer

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Robust fuzzy extractors and authenticated key agreement from close secrets

Dodis, Y., Katz, J., Reyzin, L. & Smith, A., Jan 1 2006,*Advances in Cryptology - CRYPTO 2006 - 26th Annual International Cryptology Conference, Proceedings.*Springer Verlag, p. 232-250 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4117 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Separating sources for encryption and secret sharing

Dodis, Y., Pietrzak, K. & Przydatek, B., Jul 7 2006,*Theory of Cryptography: Third Theory of Cryptography Conference, TCC 2006, Proceedings.*p. 601-616 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3876 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Threshold and proactive pseudo-random permutations

Dodis, Y., Yampolskiy, A. & Yung, M., Jul 7 2006,*Theory of Cryptography: Third Theory of Cryptography Conference, TCC 2006, Proceedings.*p. 542-560 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3876 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## A new design criteria for hash-functions

Coron, J. S., Dodis, Y., Malinaud, C. & Puniya, P., Nov 2005,*NIST Cryptographic Hash Workshop.*

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution