Research Output per year

## Research Output

## A cryptographic solution to a game theoretic problem

Dodis, Y., Halevi, S. & Rabin, T., Jan 1 2000,*Advances in Cryptology - CRYPTO 2000 - 20th Annual International Cryptology Conference, Proceedings.*Bellare, M. (ed.). Springer Verlag, p. 112-130 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1880).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## A domain extender for the ideal cipher

Coron, J. S., Dodis, Y., Mandal, A. & Seurin, Y., Mar 25 2010,*Theory of Cryptography - 7th Theory of Cryptography Conference, TCC 2010, Proceedings.*p. 273-289 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5978 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## A formal treatment of backdoored pseudorandom generators

Dodis, Y., Ganesh, C., Golovnev, A., Juels, A. & Ristenpart, T., Jan 1 2015,*Advances in Cryptology – EUROCRYPT 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings.*Fischlin, M. & Oswald, E. (eds.). Springer Verlag, p. 101-126 26 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9056).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Amplifying privacy in privacy amplification

Aggarwal, D., Dodis, Y., Jafargholi, Z., Miles, E. & Reyzin, L., Jan 1 2014,*Advances in Cryptology, CRYPTO 2014 - 34th Annual Cryptology Conference, Proceedings.*PART 2 ed. Springer Verlag, p. 183-198 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8617 LNCS, no. PART 2).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## A new design criteria for hash-functions

Coron, J. S., Dodis, Y., Malinaud, C. & Puniya, P., Nov 2005,*NIST Cryptographic Hash Workshop.*

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## A new distribution-sensitive secure sketch and popularity-proportional hashing

Woodage, J., Chatterjee, R., Dodis, Y., Juels, A. & Ristenpart, T., Jan 1 2017,*Advances in Cryptology – CRYPTO 2017 - 37th Annual International Cryptology Conference, Proceedings.*Katz, J. & Shacham, H. (eds.). Springer Verlag, p. 682-710 29 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10403 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## A new mode of operation for block ciphers and length-preserving MACs

Dodis, Y., Pietrzak, K. & Puniya, P., Jun 5 2008,*Advances in Cryptology - EUROCRYPT 2008 - 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings.*p. 198-219 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4965 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## A verifiable random function with short proofs and keys

Dodis, Y. & Yampolskiy, A., 2005,*Lecture Notes in Computer Science.*Vaudenay, S. (ed.). Vol. 3386. p. 416-431 16 p.

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Bottleneck links, variable demand, and the tragedy of the commons

Cole, R., Dodis, Y. & Roughgarden, T., 2006,*Proceedings of the Seventeenth Annual ACM-SIAM Symposium on Discrete Algorithms.*p. 668-677 10 p.

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Breaking and repairing optimistic fair exchange from PODC 2003

Dodis, Y. & Reyzin, L., Jan 1 2003,*DRM 2003: Proceedings of the Third ACM Workshop on Digital Rights Management.*Association for Computing Machinery (ACM), p. 47-54 8 p. (DRM 2003: Proceedings of the Third ACM Workshop on Digital Rights Management).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Changing base without losing space

Dodis, Y., Patrascu, M. & Thorup, M., Jul 23 2010,*STOC'10 - Proceedings of the 2010 ACM International Symposium on Theory of Computing.*p. 593-602 10 p. (Proceedings of the Annual ACM Symposium on Theory of Computing).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Chosen-ciphertext security of multiple encryption

Dodis, Y. & Katz, J., 2005,*Lecture Notes in Computer Science.*Kilian, J. (ed.). Vol. 3378. p. 188-209 22 p.

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Composability and on-line deniability of authentication

Dodis, Y., Katz, J., Smith, A. & Walfish, S., Nov 9 2009,*Theory of Cryptography - 6th Theory of Cryptography Conference, TCC 2009, Proceedings.*p. 146-162 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5444 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Counterexamples to hardness amplification beyond negligible

Dodis, Y., Jain, A., Moran, T. & Wichs, D., Mar 21 2012,*Theory of Cryptography - 9th Theory of Cryptography Conference, TCC 2012, Proceedings.*p. 476-493 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7194 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Cryptography against continuous memory attacks

Dodis, Y., Haralambiev, K., López-Alt, A. & Wichs, D., Dec 1 2010,*Proceedings - 2010 IEEE 51st Annual Symposium on Foundations of Computer Science, FOCS 2010.*p. 511-520 10 p. 5671302. (Proceedings - Annual IEEE Symposium on Foundations of Computer Science, FOCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Detection of algebraic manipulation with applications to robust secret sharing and fuzzy extractors

Cramer, R., Dodis, Y., Fehr, S., Padró, C. & Wichs, D., Jun 5 2008,*Advances in Cryptology - EUROCRYPT 2008 - 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings.*p. 471-488 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4965 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Differential privacy with imperfect randomness

Dodis, Y., López-Alt, A., Mironov, I. & Vadhan, S., Sep 3 2012,*Advances in Cryptology, CRYPTO 2012 - 32nd Annual Cryptology Conference, Proceedings.*p. 497-516 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7417 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Does privacy require true randomness?

Bosley, C. & Dodis, Y., Dec 1 2007,*Theory of Cryptography - 4th Theory of Cryptography Conference, TCC 2007, Proceedings.*p. 1-20 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4392 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Domain extension for MACs beyond the birthday barrier

Dodis, Y. & Steinberger, J., Jun 9 2011,*Advances in Cryptology - EUROCRYPT 2011, 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings.*p. 323-342 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6632 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Efficient construction of (distributed) verifiable random functions

Dodis, Y., Jan 1 2002,*Public Key Cryptography - PKC 2003 - 6th International Workshop on Practice and Theory in Public Key Cryptography, Proceedings.*Desmedt, Y. G. (ed.). Springer Verlag, p. 1-17 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2567).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Efficient constructions of composable commitments and zero-knowledge proofs

Dodis, Y., Shoup, V. & Walfish, S., Sep 22 2008,*Advances in Cryptology - CRYPTO 2008 - 28th Annual International Cryptology Conference, Proceedings.*p. 515-535 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5157 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Efficient public-key cryptography in the presence of key leakage

Dodis, Y., Haralambiev, K., López-Alt, A. & Wichs, D., Dec 1 2010,*Advances in Cryptology, ASIACRYPT 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings.*p. 613-631 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6477 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Exposure-resilience for free: The hierarchical ID-based encryption case

Dodis, Y. & Yung, M., Jan 1 2003,*Proceedings - 1st International IEEE Security in Storage Workshop, SISW 2002.*Institute of Electrical and Electronics Engineers Inc., p. 45-52 8 p. 1183509. (Proceedings - 1st International IEEE Security in Storage Workshop, SISW 2002).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Exposure-resilient functions and all-or-nothing transforms

Canetti, R., Dodis, Y., Halevi, S., Kushilevitz, E. & Sahai, A., May 2000,*Advances in Cryptology - EUROCRYPT.*

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Fast message franking: From invisible salamanders to encryptment

Dodis, Y., Grubbs, P., Ristenpart, T. & Woodage, J., Jan 1 2018,*Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, 2018, Proceedings.*Boldyreva, A. & Shacham, H. (eds.). Springer Verlag, p. 155-186 32 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10991 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Feistel networks made public, and applications

Dodis, Y. & Puniya, P., Jan 1 2007,*Advances in Cryptology - EUROCRYPT 2007 - 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings.*Springer Verlag, p. 534-554 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4515 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Fixing cracks in the concrete: Random oracles with auxiliary input, revisited

Dodis, Y., Guo, S. & Katz, J., Jan 1 2017,*Advances in Cryptology – EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings.*Nielsen, J. B. & Coron, J-S. (eds.). Springer Verlag, p. 473-495 23 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10211 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Fully scalable public-key traitor tracing

Dodis, Y., Fazio, N., Kiayias, A. & Yung, M., Jul 2003,*Principles of Distributed Computing (PODC).*

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Fully-simulatable multiparty computation

Dodis, Y., Pass, R. & Walfish, S., Oct 2004,*Workshop on Secure Multiparty Protocols (SMP 2004).*

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Getting the best out of existing hash functions; Or what if we are stuck with SHA?

Dodis, Y. & Puniya, P., Jun 30 2008,*Applied Cryptography and Network Security - 6th International Conference, ACNS 2008, Proceedings.*p. 156-173 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5037 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## How much can taxes help selfish routing?

Cole, R., Dodis, Y. & Roughgarden, T., 2003,*Proceedings of the ACM Conference on Electronic Commerce.*p. 98-107 10 p.

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## How to eat your entropy and have it too - Optimal recovery strategies for compromised RNGs

Dodis, Y., Shamir, A., Stephens-Davidowitz, N. & Wichs, D., Jan 1 2014,*Advances in Cryptology, CRYPTO 2014 - 34th Annual Cryptology Conference, Proceedings.*PART 2 ed. Springer Verlag, p. 37-54 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8617 LNCS, no. PART 2).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## ID-based encryption for complex hierarchies with applications to forward security and broadcast encryption

Yao, D., Dodis, Y., Fazio, N. & Lysyanskaya, A., 2004,*Proceedings of the ACM Conference on Computer and Communications Security.*Pfitzmann, B. & Liu, P. (eds.). p. 354-363 10 p.

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Improved testing algorithms for monotonicity

Dodis, Y., Goldreich, O., Lehman, E., Raskhodnikova, S., Ron, D. & Samorodnitsky, A., Jan 1 1999,*Randomization, Approximation, and Combinatorial Optimization: Algorithms and Techniques - 3rd International Workshop on Randomization and Approximation Techniques in Computer Science and 2nd International Workshop on Approximation Algorithms for Combinatorial Optimization Problems, RANDOM-APPROX 1999, Proceedings.*Rolim, J. D. P., Sinclair, A., Hochbaum, D. & Jansen, K. (eds.). Springer Verlag, p. 97-108 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1671).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Improving the security of MACs via randomized message preprocessing

Dodis, Y. & Pietrzak, K., Dec 1 2007,*Fast Software Encryption - 14th International Workshop, FSE 2007.*p. 414-433 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4593 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Incremental codes

Dodis, Y. & Halevi, S., Jan 1 2015,*Approximation, Randomization, and Combinatorial Optimization: Algorithms and Techniques - 4th International Workshop on Approximation, Algorithms for Combinatorial Optimization Problems, APPROX 2001 and 5th International Workshop on Randomization and Approximation Techniques in Computer Science, RANDOM 2001, Proceedings.*Trevisan, L., Jansen, K., Goemans, M. & Rolim, J. D. P. (eds.). Springer Verlag, p. 75-90 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2129).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Incremental codes

Dodis, Y. & Halevi, S., Aug 2001,*Workshop on Approximation Algorithms for Combinatorial Optimization Problems (APPROX).*

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Indifferentiability of confusion-diffusion networks

Dodis, Y., Stam, M., Steinberger, J. & Liu, T., Jan 1 2016,*Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings.*Fischlin, M. & Coron, J-S. (eds.). Springer Verlag, p. 679-704 26 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9666).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Indifferentiability of permutation-based compression functions and tree-based modes of operation, with applications to MD6

Dodis, Y., Reyzin, L., Rivest, R. L. & Shen, E., Nov 11 2009,*Fast Software Encryption - 16th International Workshop, FSE 2009, Revised Selected Papers.*p. 104-121 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5665 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Interactive coding for interactive proofs

Bishop, A. & Dodis, Y., Jan 1 2016,*Theory of Cryptography - 3th International Conference, TCC 2016-A, Proceedings.*Malkin, T. & Kushilevitz, E. (eds.). Springer Verlag, p. 352-366 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9563).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Interactive encryption and message authentication

Dodis, Y. & Fiore, D., Jan 1 2014,*Security and Cryptography for Networks - 9th International Conference, SCN 2014, Proceedings.*Abdalla, M. & de Prisco, R. (eds.). Springer Verlag, p. 494-513 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8642).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Intrusion-resilient key exchange in the bounded retrieval model

Cash, D., Ding, Y. Z., Dodis, Y., Lee, W., Lipton, R. & Walfish, S., Dec 1 2007,*Theory of Cryptography - 4th Theory of Cryptography Conference, TCC 2007, Proceedings.*p. 479-498 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4392 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Key derivation without entropy waste

Dodis, Y., Pietrzak, K. & Wichs, D., Jan 1 2014,*Advances in Cryptology, EUROCRYPT 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings.*Springer Verlag, p. 93-110 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8441 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Key-insulated public key cryptosystems

Dodis, Y., Katz, J., Xu, S. & Yung, M., Jan 1 2002,*Advances in Cryptology - EUROCRYPT 2002 - International Conference on the Theory and Applications of Cryptographic Techniques, 2002, Proceedings.*Knudsen, L. R. (ed.). Springer Verlag, p. 65-82 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2332).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Key-insulated symmetric key cryptography and mitigating attacks against cryptographic cloud software

Dodis, Y., Luo, W., Xu, S. & Yung, M., Dec 1 2012,*ASIACCS 2012 - 7th ACM Symposium on Information, Computer and Communications Security.*p. 57-58 2 p. (ASIACCS 2012 - 7th ACM Symposium on Information, Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Leakage-resilient pseudorandom functions and side-channel attacks on feistel networks

Dodis, Y. & Pietrzak, K., Sep 29 2010,*Advances in Cryptology - CRYPTO 2010 - 30th Annual Cryptology Conference, Proceedings.*p. 21-40 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6223 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Leakage-resilient public-key cryptography in the bounded-retrieval model

Alwen, J., Dodis, Y. & Wichs, D., Oct 29 2009,*Advances in Cryptology - CRYPTO 2009 - 29th Annual International Cryptology Conference, Proceedings.*p. 36-54 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5677 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Leftover hash lemma, revisited

Barak, B., Dodis, Y., Krawczyk, H., Pereira, O., Pietrzak, K., Standaert, F. X. & Yu, Y., Jan 1 2011,*Advances in Cryptology - CRYPTO 2011 - 31st Annual Cryptology Conference, Proceedings.*Springer Verlag, p. 1-20 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6841 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Lower bounds for oblivious transfer reductions

Dodis, Y. & Micali, S., May 1999,*Advances in Cryptology - EUROCRYPT.*

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Mercurial commitments: Minimal assumptions and efficient constructions

Catalano, D., Dodis, Y. & Visconti, I., Jul 7 2006,*Theory of Cryptography: Third Theory of Cryptography Conference, TCC 2006, Proceedings.*p. 120-144 25 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3876 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution