No photo of Yevgeniy Dodis

Yevgeniy Dodis

Professor of Computer Science

    19982019

    Research output per year

    If you made any changes in Pure these will be visible here soon.

    Research Output

    2005

    A verifiable random function with short proofs and keys

    Dodis, Y. & Yampolskiy, A., 2005, Lecture Notes in Computer Science. Vaudenay, S. (ed.). Vol. 3386. p. 416-431 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Chosen-ciphertext security of multiple encryption

    Dodis, Y. & Katz, J., 2005, Lecture Notes in Computer Science. Kilian, J. (ed.). Vol. 3378. p. 188-209 22 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Correcting errors without leaking partial information

    Dodis, Y. & Smith, A., Dec 1 2005, In : Proceedings of the Annual ACM Symposium on Theory of Computing. p. 654-663 10 p.

    Research output: Contribution to journalConference article

    Entropic security and the encryption of high entropy messages

    Dodis, Y. & Smith, A., Sep 9 2005, In : Lecture Notes in Computer Science. 3378, p. 556-577 22 p.

    Research output: Contribution to journalConference article

    On extractors, error-correction and hiding all partial information

    Dodis, Y., 2005, 2005 IEEE Information Theory Workshop on Theory and Practice in Information-Theoretic Security. Vol. 2005. p. 74-79 6 p. 1543961

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Scalable public-key tracing and revoking

    Dodis, Y., Fazio, N., Kiayias, A. & Yung, M., May 1 2005, In : Distributed Computing. 17, 4, p. 323-347 25 p.

    Research output: Contribution to journalArticle

    Secure remote authentication using biometric data

    Boyen, X., Dodis, Y., Katz, J., Ostrovsky, R. & Smith, A., Sep 26 2005, In : Lecture Notes in Computer Science. 3494, p. 147-163 17 p.

    Research output: Contribution to journalConference article

    Signcryption

    Dodis, Y., 2005, Encyclopedia of cryptography and security. van Tilborg, H. C. A. (ed.). Kluwer Academic Publishers

    Research output: Chapter in Book/Report/Conference proceedingEntry for encyclopedia/dictionary

    Time capsule signature

    Dodis, Y. & Yum, D. H., 2005, Lecture Notes in Computer Science. Patrick, A. S. & Yung, M. (eds.). Vol. 3570. p. 57-71 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2004

    Fully-simulatable multiparty computation

    Dodis, Y., Pass, R. & Walfish, S., Oct 2004, Workshop on Secure Multiparty Protocols (SMP 2004).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    ID-based encryption for complex hierarchies with applications to forward security and broadcast encryption

    Yao, D., Dodis, Y., Fazio, N. & Lysyanskaya, A., 2004, Proceedings of the ACM Conference on Computer and Communications Security. Pfitzmann, B. & Liu, P. (eds.). p. 354-363 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Multiparty quantum coin flipping

    Ambainis, A., Buhrman, H., Dodis, Y. & Röhrig, H., Oct 18 2004, In : Proceedings of the Annual IEEE Conference on Computational Complexity. 19, p. 250-259 10 p.

    Research output: Contribution to journalConference article

    On the (Im)possibility of cryptography with imperfect randomness

    Dodis, Y., Prabhakaran, M., Ong, S. J. & Sahai, A., Dec 1 2004, In : Proceedings - Annual IEEE Symposium on Foundations of Computer Science, FOCS. p. 196-205 10 p.

    Research output: Contribution to journalConference article

    Randomness extraction and key derivation using the CBC, Cascade and HMAC Modes

    Dodis, Y., Gennaro, R., Håstad, J., Krawczyk, H. & Rabin, T., Jan 1 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Franklin, M. (ed.). Springer Verlag, p. 494-510 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3152).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    Versatile padding schemes for joint signature and encryption

    Dodis, Y., Jarecki, S., Freedman, M. J. & Walfish, S., Dec 1 2004, In : Proceedings of the ACM Conference on Computer and Communications Security. p. 344-353 10 p.

    Research output: Contribution to journalConference article

    2003

    Breaking and repairing optimistic fair exchange from PODC 2003

    Dodis, Y. & Reyzin, L., Dec 1 2003, DRM 2003: Proceedings of the Third ACM Workshop on Digital Rights Management. Yung, M. (ed.). p. 47-54 8 p. (DRM 2003: Proceedings of the Third ACM Workshop on Digital Rights Management).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Exposure-resilience for free: The hierarchical ID-based encryption case

    Dodis, Y. & Yung, M., Jan 1 2003, Proceedings - 1st International IEEE Security in Storage Workshop, SISW 2002. Institute of Electrical and Electronics Engineers Inc., p. 45-52 8 p. 1183509. (Proceedings - 1st International IEEE Security in Storage Workshop, SISW 2002).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Fully scalable public-key traitor tracing

    Dodis, Y., Fazio, N., Kiayias, A. & Yung, M., Jul 2003, Principles of Distributed Computing (PODC).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    How much can taxes help selfish routing?

    Cole, R., Dodis, Y. & Roughgarden, T., 2003, Proceedings of the ACM Conference on Electronic Commerce. p. 98-107 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Intrusion-resilient public-key encryption

    Dodis, Y., Franklin, M., Katz, J., Miyaji, A. & Yung, M., Dec 1 2003, In : Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2612, p. 19-32 14 p.

    Research output: Contribution to journalArticle

    Pricing network edges for heterogeneous selfish users

    Cole, R., Dodis, Y. & Roughgarden, T., 2003, Conference Proceedings of the Annual ACM Symposium on Theory of Computing. p. 521-530 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Pricing networks with selfish routing (survey)

    Cole, R., Dodis, Y. & Roughgarden, T., Jun 2003, Workshop on Economics of Peer-to-Peer Systems.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Proactive two-party signatures for user authentication

    Nicolosi, A., Krohn, M., Dodis, Y. & Mazieres, D., Feb 2003, Network and Distributed System Security Symposium (NDSS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Proxy cryptography revisted

    Ivan, A. & Dodis, Y., Feb 2003, Network and Distributed System Security Symposium (NDSS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Scalable Public-Key Tracing and Revoking

    Dodis, Y., Fazio, N., Kiayias, A. & Yung, M., 2003, Proceedings of the Twenty-Second Annual ACM Symposium on Principles of Distributed Computing, PODC 2003. Vol. 22. p. 190-199 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Strong key-insulated signature schemes

    Dodis, Y., Katz, J., Xu, S. & Yung, M., Dec 1 2003, In : Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2567, p. 130-144 15 p.

    Research output: Contribution to journalArticle

    2002

    Efficient construction of (distributed) verifiable random functions

    Dodis, Y., Jan 1 2002, Public Key Cryptography - PKC 2003 - 6th International Workshop on Practice and Theory in Public Key Cryptography, Proceedings. Desmedt, Y. G. (ed.). Springer Verlag, p. 1-17 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2567).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Key-insulated public key cryptosystems

    Dodis, Y., Katz, J., Xu, S. & Yung, M., Jan 1 2002, Advances in Cryptology - EUROCRYPT 2002 - International Conference on the Theory and Applications of Cryptographic Techniques, 2002, Proceedings. Knudsen, L. R. (ed.). Springer Verlag, p. 65-82 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2332).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    On the (non)universality of the one-time pad

    Dodis, Y. & Spencer, J., 2002, Annual Symposium on Foundations of Computer Science - Proceedings. Martin, D. C. (ed.). p. 376-385 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    On the power of claw-free permutations

    Dodis, Y. & Reyzin, L., Jul 2002, Conference on Security in Communication Networks.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    On the security of joint signature and encryption

    An, J. H., Dodis, Y. & Rabin, T., Jan 1 2002, Advances in Cryptology - EUROCRYPT 2002 - International Conference on the Theory and Applications of Cryptographic Techniques, 2002, Proceedings. Knudsen, L. R. (ed.). Springer Verlag, p. 83-107 25 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2332).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Public key broadcast encryption for stateless receivers

    Dodis, Y. & Fazio, N., Nov 2002, ACM Workshop on Digital Rights Management.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2001

    Incremental codes

    Dodis, Y. & Halevi, S., Aug 2001, Workshop on Approximation Algorithms for Combinatorial Optimization Problems (APPROX).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    New imperfect random source with applications to coin-flipping

    Dodis, Y., Dec 1 2001, Automata, Languages and Programming - 28th International Colloquium, ICALP 2001, Proceedings. p. 297-309 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2076 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    On perfect and adaptive security in exposure-resilient cryptography

    Dodis, Y., Sahai, A. & Smith, A., Jan 1 2001, Advances in Cryptology - EUROCRYPT 2001 - International Conference on the Theory and Application of Cryptographic Techniques, Proceedings. Pfitzmann, B. (ed.). Springer Verlag, p. 301-324 24 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2045).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Universal configurations in light-flipping games

    Dodis, Y. & Winkler, P., Dec 1 2001, Proceedings of the 12th Annual ACM-SIAM Symposium on Discrete Algorithms. p. 926-927 2 p. (Proceedings of the Annual ACM-SIAM Symposium on Discrete Algorithms).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2000

    A cryptographic solution to a game theoretic problem

    Dodis, Y., Halevi, S. & Rabin, T., Jan 1 2000, Advances in Cryptology - CRYPTO 2000 - 20th Annual International Cryptology Conference, Proceedings. Bellare, M. (ed.). Springer Verlag, p. 112-130 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1880).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Exposure-resilient functions and all-or-nothing transforms

    Canetti, R., Dodis, Y., Halevi, S., Kushilevitz, E. & Sahai, A., May 2000, Advances in Cryptology - EUROCRYPT.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Parallel reducibility for information-theoretically secure computation

    Dodis, Y. & Micali, S., Aug 2000, Advances in Cryptology - CRYPTO.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1999

    2-Catalog segmentation problem

    Dodis, Y., Guruswami, V. & Khanna, S., Jan 1 1999, p. S897-S898.

    Research output: Contribution to conferencePaper