No photo of Yevgeniy Dodis

Yevgeniy Dodis

Professor of Computer Science

    19982019
    If you made any changes in Pure, your changes will be visible here soon.

    Research Output 1998 2019

    Filter
    Conference contribution
    2019

    Reusable Non-Interactive Secure Computation

    Chase, M., Dodis, Y., Ishai, Y., Kraschewski, D., Liu, T., Ostrovsky, R. & Vaikuntanathan, V., Jan 1 2019, Advances in Cryptology – CRYPTO 2019 - 39th Annual International Cryptology Conference, Proceedings. Micciancio, D. & Boldyreva, A. (eds.). Springer-Verlag, p. 462-488 27 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11694 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Secure Computation
    Oblivious Transfer
    Function evaluation
    Network protocols
    Linear Function

    Seedless Fruit Is the Sweetest: Random Number Generation, Revisited

    Coretti, S., Dodis, Y., Karthikeyan, H. & Tessaro, S., Jan 1 2019, Advances in Cryptology – CRYPTO 2019 - 39th Annual International Cryptology Conference, Proceedings. Micciancio, D. & Boldyreva, A. (eds.). Springer-Verlag, p. 205-234 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11692 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Random number generation
    Random number Generation
    Fruit
    Fruits
    Entropy

    The double ratchet: Security notions, proofs, and modularization for the signal protocol

    Alwen, J., Coretti, S. & Dodis, Y., Jan 1 2019, Advances in Cryptology – EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Ishai, Y. & Rijmen, V. (eds.). Springer-Verlag, p. 129-158 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11476 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Modularization
    Security Proof
    Ratchet
    Cryptography
    Text messaging
    2018

    Fast message franking: From invisible salamanders to encryptment

    Dodis, Y., Grubbs, P., Ristenpart, T. & Woodage, J., Jan 1 2018, Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, 2018, Proceedings. Boldyreva, A. & Shacham, H. (eds.). Springer-Verlag, p. 155-186 32 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10991 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Authenticated Encryption
    Cryptography
    Hash functions
    Hash Function
    Transform

    Non-uniform bounds in the random-permutation, ideal-cipher, and generic-group models

    Coretti, S., Dodis, Y. & Guo, S., Jan 1 2018, Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, 2018, Proceedings. Boldyreva, A. & Shacham, H. (eds.). Springer-Verlag, p. 693-721 29 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10991 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Cipher
    Random Permutation
    Preprocessing
    Model
    Attack

    Provable security of (tweakable) block ciphers based on substitution-permutation networks

    Cogliati, B., Dodis, Y., Katz, J., Lee, J., Steinberger, J., Thiruvengadam, A. & Zhang, Z., Jan 1 2018, Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, 2018, Proceedings. Boldyreva, A. & Shacham, H. (eds.). Springer-Verlag, p. 722-753 32 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10991 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Provable Security
    Block Ciphers
    Substitution
    Permutation
    Substitution reactions

    Random oracles and non-uniformity

    Coretti, S., Dodis, Y., Guo, S. & Steinberger, J., Jan 1 2018, Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2018 Proceedings. Springer-Verlag, p. 227-258 32 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10820 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Random Oracle
    Random Oracle Model
    Non-uniformity
    Security Proof
    Sampling
    2017

    A new distribution-sensitive secure sketch and popularity-proportional hashing

    Woodage, J., Chatterjee, R., Dodis, Y., Juels, A. & Ristenpart, T., 2017, Advances in Cryptology – CRYPTO 2017 - 37th Annual International Cryptology Conference, Proceedings. Springer Verlag, Vol. 10403 LNCS. p. 682-710 29 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10403 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Hashing
    Directly proportional
    Password
    Authentication
    Hash functions

    Fixing cracks in the concrete: Random oracles with auxiliary input, revisited

    Dodis, Y., Guo, S. & Katz, J., 2017, Advances in Cryptology – EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Springer Verlag, Vol. 10211 LNCS. p. 473-495 23 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10211 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Random Oracle
    Crack
    Auxiliary Information
    Concretes
    Function generators

    Unilaterally-authenticated key exchange

    Dodis, Y. & Fiore, D., Jan 1 2017, Financial Cryptography and Data Security - 21st International Conference, FC 2017, Revised Selected Papers. Springer Verlag, Vol. 10322 LNCS. p. 542-560 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10322 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Authenticated Key Exchange
    Cryptography
    Public Key Encryption
    Encryption
    Key Exchange
    2016

    Indifferentiability of confusion-diffusion networks

    Dodis, Y., Stam, M., Steinberger, J. & Liu, T., 2016, Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Springer Verlag, Vol. 9666. p. 679-704 26 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9666).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Random Permutation
    Block Ciphers
    Hash functions
    Hash Function
    Sufficient

    Interactive coding for interactive proofs

    Bishop, A. & Dodis, Y., 2016, Theory of Cryptography - 3th International Conference, TCC 2016-A, Proceedings. Springer Verlag, Vol. 9563. p. 352-366 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9563).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Interactive Proofs
    Communication Channels
    Coding
    Interactive Proof Systems
    Communication

    Message transmission with reverse firewalls—Secure communication on corrupted machines

    Dodis, Y., Mironov, I. & Stephens-Davidowitz, N., 2016, Advances in Cryptology - 36th Annual International Cryptology Conference, CRYPTO 2016, Proceedings. Springer Verlag, Vol. 9814. p. 241-372 132 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9814).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Firewall
    Reverse
    Communication
    Cryptography
    Key Agreement

    Non-malleable encryption: Simpler, shorter, stronger

    Coretti, S., Dodis, Y., Tackmann, B. & Venturi, D., 2016, Theory of Cryptography - 13th International Conference, TCC 2016-A, Proceedings. Springer Verlag, Vol. 9562. p. 306-335 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9562).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Encryption
    Cryptography
    Non-malleability
    Public Key Encryption
    Strengthening

    Spooky encryption and its applications

    Dodis, Y., Halevi, S., Rothblum, R. D. & Wichs, D., 2016, Advances in Cryptology - 36th Annual International Cryptology Conference, CRYPTO 2016, Proceedings. Springer Verlag, Vol. 9816. p. 93-122 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9816).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Encryption
    Cryptography
    Public key
    Homomorphic Encryption
    Additive Function
    2015

    A formal treatment of backdoored pseudorandom generators

    Dodis, Y., Ganesh, C., Golovnev, A., Juels, A. & Ristenpart, T., 2015, Advances in Cryptology – EUROCRYPT 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Springer Verlag, Vol. 9056. p. 101-126 26 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9056).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Pseudorandom Generator
    Hash functions
    Cryptography
    Hash Function
    Output

    Incremental codes

    Dodis, Y. & Halevi, S., 2015, Approximation, Randomization, and Combinatorial Optimization: Algorithms and Techniques - 4th International Workshop on Approximation, Algorithms for Combinatorial Optimization Problems, APPROX 2001 and 5th International Workshop on Randomization and Approximation Techniques in Computer Science, RANDOM 2001, Proceedings. Springer Verlag, Vol. 2129. p. 75-90 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2129).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Competitive Ratio
    Minimum Distance
    Prefix
    Interval
    Unordered

    Non-malleable reductions and applications

    Aggarwal, D., Dodis, Y., Kazana, T. & Obremski, M., Jun 14 2015, STOC 2015 - Proceedings of the 2015 ACM Symposium on Theory of Computing. Association for Computing Machinery, Vol. 14-17-June-2015. p. 459-468 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Error detection
    Error correction
    Chemical analysis
    Amplification

    On randomness, codes and extractors in cryptography

    Dodis, Y., 2015, Progress in Cryptology – INDOCRYPT 2015 - 16th International Conference on Cryptology in India, Proceedings. Springer Verlag, Vol. 9462. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9462).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Extractor
    Cryptography
    Randomness
    Randomness Extractors
    Imperfect

    Privacy with imperfect randomness

    Dodis, Y. & Yao, Y., 2015, Advances in Cryptology - CRYPTO 2015 - 35th Annual Cryptology Conference, Proceedings. Springer Verlag, Vol. 9216. p. 463-482 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9216).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Imperfect
    Randomness
    Cryptography
    Privacy
    Secret Sharing Scheme

    Theory of cryptography: 12th Theory of cryptography conference, TCC 2015 warsaw, poland, march 23-25, 2015 proceedings, part II

    Dodis, Y. & Nielsen, J. B., 2015, Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Proceedings. Springer Verlag, Vol. 9015. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Cryptography

    Theory of Cryptography: 12th Theory of Cryptography Conference, TCC 2015 Warsaw, Poland, March 23-25, 2015 Proceedings, Part I

    Dodis, Y. & Nielsen, J. B., 2015, Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Proceedings. Springer Verlag, Vol. 9014. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9014).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Cryptography
    2014

    Amplifying privacy in privacy amplification

    Aggarwal, D., Dodis, Y., Jafargholi, Z., Miles, E. & Reyzin, L., 2014, Advances in Cryptology, CRYPTO 2014 - 34th Annual Cryptology Conference, Proceedings. PART 2 ed. Springer Verlag, Vol. 8617 LNCS. p. 183-198 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8617 LNCS, no. PART 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Amplification
    Privacy
    Entropy
    Entropy Loss
    Retrieval

    How to eat your entropy and have it too - Optimal recovery strategies for compromised RNGs

    Dodis, Y., Shamir, A., Stephens-Davidowitz, N. & Wichs, D., 2014, Advances in Cryptology, CRYPTO 2014 - 34th Annual Cryptology Conference, Proceedings. PART 2 ed. Springer Verlag, Vol. 8617 LNCS. p. 37-54 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8617 LNCS, no. PART 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Optimal Recovery
    Random number Generator
    Entropy
    Recovery
    Timing

    Interactive encryption and message authentication

    Dodis, Y. & Fiore, D., 2014, Security and Cryptography for Networks - 9th International Conference, SCN 2014, Proceedings. Springer Verlag, Vol. 8642. p. 494-513 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8642).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Message Authentication
    Public Key Encryption
    Authentication
    Encryption
    Cryptography

    Key derivation without entropy waste

    Dodis, Y., Pietrzak, K. & Wichs, D., 2014, Advances in Cryptology, EUROCRYPT 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Springer Verlag, Vol. 8441 LNCS. p. 93-110 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8441 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Entropy
    Extractor
    One-way Function
    Beat
    Randomness Extractors

    Non-malleable codes from addictive combinatorics

    Aggarwal, D., Dodis, Y. & Lovett, S., Jun 2014, Symposium on Theory of Computing (STOC).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2013

    On continual leakage of discrete log representations

    Agrawal, S., Dodis, Y., Vaikuntanathan, V. & Wichs, D., 2013, Advances in Cryptology, ASIACRYPT 2013 - 19th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. PART 2 ed. Vol. 8270 LNCS. p. 401-420 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8270 LNCS, no. PART 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Leakage
    Cryptography
    Resilient Functions
    One-way Function
    Public Key Encryption

    On the indifferentiability of key-alternating ciphers

    Andreeva, E., Bogdanov, A., Dodis, Y., Mennink, B. & Steinberger, J. P., 2013, Advances in Cryptology, CRYPTO 2013 - 33rd Annual Cryptology Conference, Proceedings. PART 1 ed. Vol. 8042 LNCS. p. 531-550 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8042 LNCS, no. PART 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Cryptography
    Random Permutation
    Advanced Encryption Standard
    Block Cipher
    Permutation

    Overcoming weak expectations

    Dodis, Y. & Yu, Y., 2013, Theory of Cryptography - 10th Theory of Cryptography Conference, TCC 2013, Proceedings. Vol. 7785 LNCS. p. 1-22 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7785 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Entropy
    Entropy Loss
    Upper bound
    Cryptography
    Seed

    Security analysis of pseudo-random number generators with input: /dev/random is not robust

    Dodis, Y., Pointcheval, D., Ruhault, S., Vergniaud, D. & Wichs, D., 2013, CCS 2013 - Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security. p. 647-658 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Entropy
    Cryptography
    Linux
    2012

    Counterexamples to hardness amplification beyond negligible

    Dodis, Y., Jain, A., Moran, T. & Wichs, D., 2012, Theory of Cryptography - 9th Theory of Cryptography Conference, TCC 2012, Proceedings. Vol. 7194 LNCS. p. 476-493 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7194 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Amplification
    Hardness
    Direct Product
    Counterexample
    One-way Function

    Differential privacy with imperfect randomness

    Dodis, Y., López-Alt, A., Mironov, I. & Vadhan, S., 2012, Advances in Cryptology, CRYPTO 2012 - 32nd Annual Cryptology Conference, Proceedings. Vol. 7417 LNCS. p. 497-516 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7417 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Imperfect
    Randomness
    Privacy
    Additive noise
    Cryptography

    Key-insulated symmetric key cryptography and mitigating attacks against cryptographic cloud software

    Dodis, Y., Luo, W., Xu, S. & Yung, M., 2012, ASIACCS 2012 - 7th ACM Symposium on Information, Computer and Communications Security. p. 57-58 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Cryptography
    Malware
    Virtual machine

    Message authentication, revisited

    Dodis, Y., Kiltz, E., Pietrzak, K. & Wichs, D., 2012, Advances in Cryptology, EUROCRYPT 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Vol. 7237 LNCS. p. 355-374 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7237 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Message Authentication
    Message Authentication Code
    Pseudorandom Function
    Authentication
    Attack

    On the instantiability of hash-and-sign RSA signatures

    Dodis, Y., Haitner, I. & Tentes, A., 2012, Theory of Cryptography - 9th Theory of Cryptography Conference, TCC 2012, Proceedings. Vol. 7194 LNCS. p. 112-132 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7194 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Signature Scheme
    Signature
    Hash functions
    Multiplicative
    Hash Function

    Overcoming weak expectations

    Dodis, Y. & Yu, Y., 2012, 2012 IEEE Information Theory Workshop, ITW 2012. p. 109-113 5 p. 6404636

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Entropy
    Cryptography
    Seed

    Randomness condensers for efficiently samplable, seed-dependent sources

    Dodis, Y., Ristenpart, T. & Vadhan, S., 2012, Theory of Cryptography - 9th Theory of Cryptography Conference, TCC 2012, Proceedings. Vol. 7194 LNCS. p. 618-635 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7194 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Randomness
    Seed
    Entropy
    Dependent
    Logarithmic

    Shannon impossibility, revisited

    Dodis, Y., 2012, Information Theoretic Security - 6th International Conference, ICITS 2012, Proceedings. Vol. 7412 LNCS. p. 100-110 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7412 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Encryption
    Cryptography
    Limiting
    One-way Function
    Sufficient

    To hash or not to hash again? (In)differentiability results for H 2 and HMAC

    Dodis, Y., Ristenpart, T., Steinberger, J. & Tessaro, S., 2012, Advances in Cryptology, CRYPTO 2012 - 32nd Annual Cryptology Conference, Proceedings. Vol. 7417 LNCS. p. 348-366 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7417 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Hash functions
    Differentiability
    Simulators
    Concretes
    Random Oracle
    2011

    Domain extension for MACs beyond the birthday barrier

    Dodis, Y. & Steinberger, J., 2011, Advances in Cryptology - EUROCRYPT 2011, 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Vol. 6632 LNCS. p. 323-342 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6632 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Query
    Design

    Leftover hash lemma, revisited

    Barak, B., Dodis, Y., Krawczyk, H., Pereira, O., Pietrzak, K., Standaert, F. X. & Yu, Y., 2011, Advances in Cryptology - CRYPTO 2011 - 31st Annual Cryptology Conference, Proceedings. Vol. 6841 LNCS. p. 1-20 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6841 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Entropy Loss
    Lemma
    Entropy
    Seed
    Expand

    Privacy amplification and non-malleable extractors via character sums

    Dodis, Y., Li, X., Wooley, T. D. & Zuckerman, D., 2011, Proceedings - 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science, FOCS 2011. p. 668-677 10 p. 6108229

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Amplification
    Entropy
    Polynomials
    Seed
    Gold

    Storing secrets on continually leaky devices

    Dodis, Y., Lewko, A., Waters, B. & Wichs, D., 2011, Proceedings - 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science, FOCS 2011. p. 688-697 10 p. 6108231

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Cryptography
    Communication
    Water
    2010

    A domain extender for the ideal cipher

    Coron, J. S., Dodis, Y., Mandal, A. & Seurin, Y., 2010, Theory of Cryptography - 7th Theory of Cryptography Conference, TCC 2010, Proceedings. Vol. 5978 LNCS. p. 273-289 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5978 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Random Oracle
    Block Cipher
    Standard Model
    Attack

    Changing base without losing space

    Dodis, Y., Patrascu, M. & Thorup, M., 2010, STOC'10 - Proceedings of the 2010 ACM International Symposium on Theory of Computing. p. 593-602 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Hash functions
    Authentication
    Decoding
    Data structures
    Hardness

    Cryptography against continuous memory attacks

    Dodis, Y., Haralambiev, K., López-Alt, A. & Wichs, D., 2010, Proceedings - 2010 IEEE 51st Annual Symposium on Foundations of Computer Science, FOCS 2010. p. 511-520 10 p. 5671302

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Cryptography
    Data storage equipment

    Efficient public-key cryptography in the presence of key leakage

    Dodis, Y., Haralambiev, K., López-Alt, A. & Wichs, D., 2010, Advances in Cryptology, ASIACRYPT 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Vol. 6477 LNCS. p. 613-631 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6477 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Public key cryptography
    Public Key Cryptography
    Leakage
    Encryption
    Cryptography

    Leakage-resilient pseudorandom functions and side-channel attacks on feistel networks

    Dodis, Y. & Pietrzak, K., 2010, Advances in Cryptology - CRYPTO 2010 - 30th Annual Cryptology Conference, Proceedings. Vol. 6223 LNCS. p. 21-40 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6223 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Resilient Functions
    Pseudorandom Function
    Side Channel Attacks
    Leakage
    Query

    Practical leakage-resilient identity-based encryption from simple assumptions

    Chow, S. S. M., Dodis, Y., Rouselakis, Y. & Waters, B., 2010, CCS'10 - Proceedings of the 17th ACM Conference on Computer and Communications Security. p. 152-161 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Cryptography
    Water
    Composite materials