Research Output per year

## Research Output

## Improved testing algorithms for monotonicity

Dodis, Y., Goldreich, O., Lehman, E., Raskhodnikova, S., Ron, D. & Samorodnitsky, A., Jan 1 1999,*Randomization, Approximation, and Combinatorial Optimization: Algorithms and Techniques - 3rd International Workshop on Randomization and Approximation Techniques in Computer Science and 2nd International Workshop on Approximation Algorithms for Combinatorial Optimization Problems, RANDOM-APPROX 1999, Proceedings.*Rolim, J. D. P., Sinclair, A., Hochbaum, D. & Jansen, K. (eds.). Springer Verlag, p. 97-108 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1671).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Lower bounds for oblivious transfer reductions

Dodis, Y. & Micali, S., May 1999,*Advances in Cryptology - EUROCRYPT.*

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Space-time tradeoffs for graph properties

Dodis, Y. & Khanna, S., Jan 1 1999,*Automata, Languages and Programming - 26th International Colloquium, ICALP 1999, Proceedings.*Springer Verlag, p. 291-300 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1644 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## A cryptographic solution to a game theoretic problem

Dodis, Y., Halevi, S. & Rabin, T., Jan 1 2000,*Advances in Cryptology - CRYPTO 2000 - 20th Annual International Cryptology Conference, Proceedings.*Bellare, M. (ed.). Springer Verlag, p. 112-130 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1880).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Exposure-resilient functions and all-or-nothing transforms

Canetti, R., Dodis, Y., Halevi, S., Kushilevitz, E. & Sahai, A., May 2000,*Advances in Cryptology - EUROCRYPT.*

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Parallel reducibility for information-theoretically secure computation

Dodis, Y. & Micali, S., Aug 2000,*Advances in Cryptology - CRYPTO.*

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Incremental codes

Dodis, Y. & Halevi, S., Aug 2001,*Workshop on Approximation Algorithms for Combinatorial Optimization Problems (APPROX).*

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## New imperfect random source with applications to coin-flipping

Dodis, Y., Dec 1 2001,*Automata, Languages and Programming - 28th International Colloquium, ICALP 2001, Proceedings.*p. 297-309 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2076 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## On perfect and adaptive security in exposure-resilient cryptography

Dodis, Y., Sahai, A. & Smith, A., Jan 1 2001,*Advances in Cryptology - EUROCRYPT 2001 - International Conference on the Theory and Application of Cryptographic Techniques, Proceedings.*Pfitzmann, B. (ed.). Springer Verlag, p. 301-324 24 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2045).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Universal configurations in light-flipping games

Dodis, Y. & Winkler, P., Dec 1 2001,*Proceedings of the 12th Annual ACM-SIAM Symposium on Discrete Algorithms.*p. 926-927 2 p. (Proceedings of the Annual ACM-SIAM Symposium on Discrete Algorithms).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Efficient construction of (distributed) verifiable random functions

Dodis, Y., Jan 1 2002,*Public Key Cryptography - PKC 2003 - 6th International Workshop on Practice and Theory in Public Key Cryptography, Proceedings.*Desmedt, Y. G. (ed.). Springer Verlag, p. 1-17 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2567).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Key-insulated public key cryptosystems

Dodis, Y., Katz, J., Xu, S. & Yung, M., Jan 1 2002,*Advances in Cryptology - EUROCRYPT 2002 - International Conference on the Theory and Applications of Cryptographic Techniques, 2002, Proceedings.*Knudsen, L. R. (ed.). Springer Verlag, p. 65-82 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2332).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## On the (non)universality of the one-time pad

Dodis, Y. & Spencer, J., 2002,*Annual Symposium on Foundations of Computer Science - Proceedings.*Martin, D. C. (ed.). p. 376-385 10 p.

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## On the power of claw-free permutations

Dodis, Y. & Reyzin, L., Jul 2002,*Conference on Security in Communication Networks.*

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## On the security of joint signature and encryption

An, J. H., Dodis, Y. & Rabin, T., Jan 1 2002,*Advances in Cryptology - EUROCRYPT 2002 - International Conference on the Theory and Applications of Cryptographic Techniques, 2002, Proceedings.*Knudsen, L. R. (ed.). Springer Verlag, p. 83-107 25 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2332).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Public key broadcast encryption for stateless receivers

Dodis, Y. & Fazio, N., Nov 2002,*ACM Workshop on Digital Rights Management.*

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Breaking and repairing optimistic fair exchange from PODC 2003

Dodis, Y. & Reyzin, L., Jan 1 2003,*DRM 2003: Proceedings of the Third ACM Workshop on Digital Rights Management.*Association for Computing Machinery (ACM), p. 47-54 8 p. (DRM 2003: Proceedings of the Third ACM Workshop on Digital Rights Management).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Exposure-resilience for free: The hierarchical ID-based encryption case

Dodis, Y. & Yung, M., Jan 1 2003,*Proceedings - 1st International IEEE Security in Storage Workshop, SISW 2002.*Institute of Electrical and Electronics Engineers Inc., p. 45-52 8 p. 1183509. (Proceedings - 1st International IEEE Security in Storage Workshop, SISW 2002).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Fully scalable public-key traitor tracing

Dodis, Y., Fazio, N., Kiayias, A. & Yung, M., Jul 2003,*Principles of Distributed Computing (PODC).*

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## How much can taxes help selfish routing?

Cole, R., Dodis, Y. & Roughgarden, T., 2003,*Proceedings of the ACM Conference on Electronic Commerce.*p. 98-107 10 p.

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Pricing network edges for heterogeneous selfish users

Cole, R., Dodis, Y. & Roughgarden, T., 2003,*Conference Proceedings of the Annual ACM Symposium on Theory of Computing.*p. 521-530 10 p.

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Pricing networks with selfish routing (survey)

Cole, R., Dodis, Y. & Roughgarden, T., Jun 2003,*Workshop on Economics of Peer-to-Peer Systems.*

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Proactive two-party signatures for user authentication

Nicolosi, A., Krohn, M., Dodis, Y. & Mazieres, D., Feb 2003,*Network and Distributed System Security Symposium (NDSS).*

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Proxy cryptography revisted

Ivan, A. & Dodis, Y., Feb 2003,*Network and Distributed System Security Symposium (NDSS).*

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Scalable Public-Key Tracing and Revoking

Dodis, Y., Fazio, N., Kiayias, A. & Yung, M., 2003,*Proceedings of the Twenty-Second Annual ACM Symposium on Principles of Distributed Computing, PODC 2003.*Vol. 22. p. 190-199 10 p.

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Fully-simulatable multiparty computation

Dodis, Y., Pass, R. & Walfish, S., Oct 2004,*Workshop on Secure Multiparty Protocols (SMP 2004).*

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## ID-based encryption for complex hierarchies with applications to forward security and broadcast encryption

Yao, D., Dodis, Y., Fazio, N. & Lysyanskaya, A., 2004,*Proceedings of the ACM Conference on Computer and Communications Security.*Pfitzmann, B. & Liu, P. (eds.). p. 354-363 10 p.

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## A new design criteria for hash-functions

Coron, J. S., Dodis, Y., Malinaud, C. & Puniya, P., Nov 2005,*NIST Cryptographic Hash Workshop.*

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## A verifiable random function with short proofs and keys

Dodis, Y. & Yampolskiy, A., 2005,*Lecture Notes in Computer Science.*Vaudenay, S. (ed.). Vol. 3386. p. 416-431 16 p.

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Chosen-ciphertext security of multiple encryption

Dodis, Y. & Katz, J., 2005,*Lecture Notes in Computer Science.*Kilian, J. (ed.). Vol. 3378. p. 188-209 22 p.

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## On extractors, error-correction and hiding all partial information

Dodis, Y., 2005,*2005 IEEE Information Theory Workshop on Theory and Practice in Information-Theoretic Security.*Vol. 2005. p. 74-79 6 p. 1543961

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Time capsule signature

Dodis, Y. & Yum, D. H., 2005,*Lecture Notes in Computer Science.*Patrick, A. S. & Yung, M. (eds.). Vol. 3570. p. 57-71 15 p.

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Bottleneck links, variable demand, and the tragedy of the commons

Cole, R., Dodis, Y. & Roughgarden, T., 2006,*Proceedings of the Seventeenth Annual ACM-SIAM Symposium on Discrete Algorithms.*p. 668-677 10 p.

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Mercurial commitments: Minimal assumptions and efficient constructions

Catalano, D., Dodis, Y. & Visconti, I., Jul 7 2006,*Theory of Cryptography: Third Theory of Cryptography Conference, TCC 2006, Proceedings.*p. 120-144 25 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3876 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Merkle-damgård revisited: How to construct a hash function

Coron, J. S., Dodis, Y., Malinaud, C. & Puniya, P., Jun 23 2006,*Advances in Cryptology - CRYPTO 2005 - 25th Annual International Cryptology Conference, Proceedings.*p. 430-448 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3621 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## On the generic insecurity of the full domain hash

Dodis, Y., Oliveira, R. & Pietrzak, K., Jun 23 2006,*Advances in Cryptology - CRYPTO 2005 - 25th Annual International Cryptology Conference, Proceedings.*p. 449-466 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3621 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## On the impossibility of extracting classical randomness using a quantum computer

Dodis, Y. & Renner, R., Jan 1 2006,*Automata, Languages and Programming - 33rd International Colloquium, ICALP 2006, Proceedings.*Springer Verlag, p. 204-215 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4052 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## On the relation between the Ideal Cipher and the Random Oracle Models

Dodis, Y. & Puniya, P., Jul 7 2006,*Theory of Cryptography: Third Theory of Cryptography Conference, TCC 2006, Proceedings.*p. 184-206 23 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3876 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Public key cryptography - PKC 2006

Dodis, Y. (ed.), Yung, M. (ed.), Kiayias, A. (ed.) & Malkin, T. (ed.), 2006,*9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings.*Springer

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Robust fuzzy extractors and authenticated key agreement from close secrets

Dodis, Y., Katz, J., Reyzin, L. & Smith, A., Jan 1 2006,*Advances in Cryptology - CRYPTO 2006 - 26th Annual International Cryptology Conference, Proceedings.*Springer Verlag, p. 232-250 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4117 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Separating sources for encryption and secret sharing

Dodis, Y., Pietrzak, K. & Przydatek, B., Jul 7 2006,*Theory of Cryptography: Third Theory of Cryptography Conference, TCC 2006, Proceedings.*p. 601-616 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3876 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Threshold and proactive pseudo-random permutations

Dodis, Y., Yampolskiy, A. & Yung, M., Jul 7 2006,*Theory of Cryptography: Third Theory of Cryptography Conference, TCC 2006, Proceedings.*p. 542-560 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3876 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Does privacy require true randomness?

Bosley, C. & Dodis, Y., Dec 1 2007,*Theory of Cryptography - 4th Theory of Cryptography Conference, TCC 2007, Proceedings.*p. 1-20 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4392 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Feistel networks made public, and applications

Dodis, Y. & Puniya, P., Jan 1 2007,*Advances in Cryptology - EUROCRYPT 2007 - 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings.*Springer Verlag, p. 534-554 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4515 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Improving the security of MACs via randomized message preprocessing

Dodis, Y. & Pietrzak, K., Dec 1 2007,*Fast Software Encryption - 14th International Workshop, FSE 2007.*p. 414-433 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4593 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Intrusion-resilient key exchange in the bounded retrieval model

Cash, D., Ding, Y. Z., Dodis, Y., Lee, W., Lipton, R. & Walfish, S., Dec 1 2007,*Theory of Cryptography - 4th Theory of Cryptography Conference, TCC 2007, Proceedings.*p. 479-498 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4392 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Optimistic fair exchange in a multi-user setting

Dodis, Y., Lee, P. J. & Yum, D. H., Dec 1 2007,*Public Key Cryptography - PKC 2007 - 10th International Conference on Practice and Theory in Public-Key Cryptography, Proceedings.*p. 118-133 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4450 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Universally composable security with global setup

Canetti, R., Dodis, Y., Pass, R. & Walfish, S., Dec 1 2007,*Theory of Cryptography - 4th Theory of Cryptography Conference, TCC 2007, Proceedings.*p. 61-85 25 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4392 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## A new mode of operation for block ciphers and length-preserving MACs

Dodis, Y., Pietrzak, K. & Puniya, P., Jun 5 2008,*Advances in Cryptology - EUROCRYPT 2008 - 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings.*p. 198-219 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4965 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Detection of algebraic manipulation with applications to robust secret sharing and fuzzy extractors

Cramer, R., Dodis, Y., Fehr, S., Padró, C. & Wichs, D., Jun 5 2008,*Advances in Cryptology - EUROCRYPT 2008 - 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings.*p. 471-488 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4965 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution