No photo of Yevgeniy Dodis

Yevgeniy Dodis

Professor of Computer Science

    19982019

    Research output per year

    If you made any changes in Pure these will be visible here soon.

    Research Output

    Filter
    Conference contribution
    Conference contribution

    A cryptographic solution to a game theoretic problem

    Dodis, Y., Halevi, S. & Rabin, T., Jan 1 2000, Advances in Cryptology - CRYPTO 2000 - 20th Annual International Cryptology Conference, Proceedings. Bellare, M. (ed.). Springer Verlag, p. 112-130 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1880).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    A domain extender for the ideal cipher

    Coron, J. S., Dodis, Y., Mandal, A. & Seurin, Y., Mar 25 2010, Theory of Cryptography - 7th Theory of Cryptography Conference, TCC 2010, Proceedings. p. 273-289 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5978 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    A formal treatment of backdoored pseudorandom generators

    Dodis, Y., Ganesh, C., Golovnev, A., Juels, A. & Ristenpart, T., Jan 1 2015, Advances in Cryptology – EUROCRYPT 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Fischlin, M. & Oswald, E. (eds.). Springer Verlag, p. 101-126 26 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9056).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Amplifying privacy in privacy amplification

    Aggarwal, D., Dodis, Y., Jafargholi, Z., Miles, E. & Reyzin, L., Jan 1 2014, Advances in Cryptology, CRYPTO 2014 - 34th Annual Cryptology Conference, Proceedings. PART 2 ed. Springer Verlag, p. 183-198 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8617 LNCS, no. PART 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    A new design criteria for hash-functions

    Coron, J. S., Dodis, Y., Malinaud, C. & Puniya, P., Nov 2005, NIST Cryptographic Hash Workshop.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    A new distribution-sensitive secure sketch and popularity-proportional hashing

    Woodage, J., Chatterjee, R., Dodis, Y., Juels, A. & Ristenpart, T., Jan 1 2017, Advances in Cryptology – CRYPTO 2017 - 37th Annual International Cryptology Conference, Proceedings. Katz, J. & Shacham, H. (eds.). Springer Verlag, p. 682-710 29 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10403 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    A new mode of operation for block ciphers and length-preserving MACs

    Dodis, Y., Pietrzak, K. & Puniya, P., Jun 5 2008, Advances in Cryptology - EUROCRYPT 2008 - 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. p. 198-219 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4965 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    A verifiable random function with short proofs and keys

    Dodis, Y. & Yampolskiy, A., 2005, Lecture Notes in Computer Science. Vaudenay, S. (ed.). Vol. 3386. p. 416-431 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Bottleneck links, variable demand, and the tragedy of the commons

    Cole, R., Dodis, Y. & Roughgarden, T., 2006, Proceedings of the Seventeenth Annual ACM-SIAM Symposium on Discrete Algorithms. p. 668-677 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Breaking and repairing optimistic fair exchange from PODC 2003

    Dodis, Y. & Reyzin, L., Jan 1 2003, DRM 2003: Proceedings of the Third ACM Workshop on Digital Rights Management. Association for Computing Machinery (ACM), p. 47-54 8 p. (DRM 2003: Proceedings of the Third ACM Workshop on Digital Rights Management).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Changing base without losing space

    Dodis, Y., Patrascu, M. & Thorup, M., Jul 23 2010, STOC'10 - Proceedings of the 2010 ACM International Symposium on Theory of Computing. p. 593-602 10 p. (Proceedings of the Annual ACM Symposium on Theory of Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Chosen-ciphertext security of multiple encryption

    Dodis, Y. & Katz, J., 2005, Lecture Notes in Computer Science. Kilian, J. (ed.). Vol. 3378. p. 188-209 22 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Composability and on-line deniability of authentication

    Dodis, Y., Katz, J., Smith, A. & Walfish, S., Nov 9 2009, Theory of Cryptography - 6th Theory of Cryptography Conference, TCC 2009, Proceedings. p. 146-162 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5444 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Counterexamples to hardness amplification beyond negligible

    Dodis, Y., Jain, A., Moran, T. & Wichs, D., Mar 21 2012, Theory of Cryptography - 9th Theory of Cryptography Conference, TCC 2012, Proceedings. p. 476-493 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7194 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Cryptography against continuous memory attacks

    Dodis, Y., Haralambiev, K., López-Alt, A. & Wichs, D., Dec 1 2010, Proceedings - 2010 IEEE 51st Annual Symposium on Foundations of Computer Science, FOCS 2010. p. 511-520 10 p. 5671302. (Proceedings - Annual IEEE Symposium on Foundations of Computer Science, FOCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Detection of algebraic manipulation with applications to robust secret sharing and fuzzy extractors

    Cramer, R., Dodis, Y., Fehr, S., Padró, C. & Wichs, D., Jun 5 2008, Advances in Cryptology - EUROCRYPT 2008 - 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. p. 471-488 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4965 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Differential privacy with imperfect randomness

    Dodis, Y., López-Alt, A., Mironov, I. & Vadhan, S., Sep 3 2012, Advances in Cryptology, CRYPTO 2012 - 32nd Annual Cryptology Conference, Proceedings. p. 497-516 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7417 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Does privacy require true randomness?

    Bosley, C. & Dodis, Y., Dec 1 2007, Theory of Cryptography - 4th Theory of Cryptography Conference, TCC 2007, Proceedings. p. 1-20 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4392 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Domain extension for MACs beyond the birthday barrier

    Dodis, Y. & Steinberger, J., Jun 9 2011, Advances in Cryptology - EUROCRYPT 2011, 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. p. 323-342 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6632 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Efficient construction of (distributed) verifiable random functions

    Dodis, Y., Jan 1 2002, Public Key Cryptography - PKC 2003 - 6th International Workshop on Practice and Theory in Public Key Cryptography, Proceedings. Desmedt, Y. G. (ed.). Springer Verlag, p. 1-17 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2567).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Efficient constructions of composable commitments and zero-knowledge proofs

    Dodis, Y., Shoup, V. & Walfish, S., Sep 22 2008, Advances in Cryptology - CRYPTO 2008 - 28th Annual International Cryptology Conference, Proceedings. p. 515-535 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5157 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Efficient public-key cryptography in the presence of key leakage

    Dodis, Y., Haralambiev, K., López-Alt, A. & Wichs, D., Dec 1 2010, Advances in Cryptology, ASIACRYPT 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. p. 613-631 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6477 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Exposure-resilience for free: The hierarchical ID-based encryption case

    Dodis, Y. & Yung, M., Jan 1 2003, Proceedings - 1st International IEEE Security in Storage Workshop, SISW 2002. Institute of Electrical and Electronics Engineers Inc., p. 45-52 8 p. 1183509. (Proceedings - 1st International IEEE Security in Storage Workshop, SISW 2002).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Exposure-resilient functions and all-or-nothing transforms

    Canetti, R., Dodis, Y., Halevi, S., Kushilevitz, E. & Sahai, A., May 2000, Advances in Cryptology - EUROCRYPT.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Fast message franking: From invisible salamanders to encryptment

    Dodis, Y., Grubbs, P., Ristenpart, T. & Woodage, J., Jan 1 2018, Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, 2018, Proceedings. Boldyreva, A. & Shacham, H. (eds.). Springer Verlag, p. 155-186 32 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10991 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Feistel networks made public, and applications

    Dodis, Y. & Puniya, P., Jan 1 2007, Advances in Cryptology - EUROCRYPT 2007 - 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Springer Verlag, p. 534-554 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4515 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access

    Fixing cracks in the concrete: Random oracles with auxiliary input, revisited

    Dodis, Y., Guo, S. & Katz, J., Jan 1 2017, Advances in Cryptology – EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Nielsen, J. B. & Coron, J-S. (eds.). Springer Verlag, p. 473-495 23 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10211 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Fully scalable public-key traitor tracing

    Dodis, Y., Fazio, N., Kiayias, A. & Yung, M., Jul 2003, Principles of Distributed Computing (PODC).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Fully-simulatable multiparty computation

    Dodis, Y., Pass, R. & Walfish, S., Oct 2004, Workshop on Secure Multiparty Protocols (SMP 2004).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Getting the best out of existing hash functions; Or what if we are stuck with SHA?

    Dodis, Y. & Puniya, P., Jun 30 2008, Applied Cryptography and Network Security - 6th International Conference, ACNS 2008, Proceedings. p. 156-173 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5037 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    How much can taxes help selfish routing?

    Cole, R., Dodis, Y. & Roughgarden, T., 2003, Proceedings of the ACM Conference on Electronic Commerce. p. 98-107 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    How to eat your entropy and have it too - Optimal recovery strategies for compromised RNGs

    Dodis, Y., Shamir, A., Stephens-Davidowitz, N. & Wichs, D., Jan 1 2014, Advances in Cryptology, CRYPTO 2014 - 34th Annual Cryptology Conference, Proceedings. PART 2 ed. Springer Verlag, p. 37-54 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8617 LNCS, no. PART 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    ID-based encryption for complex hierarchies with applications to forward security and broadcast encryption

    Yao, D., Dodis, Y., Fazio, N. & Lysyanskaya, A., 2004, Proceedings of the ACM Conference on Computer and Communications Security. Pfitzmann, B. & Liu, P. (eds.). p. 354-363 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Improved testing algorithms for monotonicity

    Dodis, Y., Goldreich, O., Lehman, E., Raskhodnikova, S., Ron, D. & Samorodnitsky, A., Jan 1 1999, Randomization, Approximation, and Combinatorial Optimization: Algorithms and Techniques - 3rd International Workshop on Randomization and Approximation Techniques in Computer Science and 2nd International Workshop on Approximation Algorithms for Combinatorial Optimization Problems, RANDOM-APPROX 1999, Proceedings. Rolim, J. D. P., Sinclair, A., Hochbaum, D. & Jansen, K. (eds.). Springer Verlag, p. 97-108 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1671).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Improving the security of MACs via randomized message preprocessing

    Dodis, Y. & Pietrzak, K., Dec 1 2007, Fast Software Encryption - 14th International Workshop, FSE 2007. p. 414-433 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4593 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Incremental codes

    Dodis, Y. & Halevi, S., Jan 1 2015, Approximation, Randomization, and Combinatorial Optimization: Algorithms and Techniques - 4th International Workshop on Approximation, Algorithms for Combinatorial Optimization Problems, APPROX 2001 and 5th International Workshop on Randomization and Approximation Techniques in Computer Science, RANDOM 2001, Proceedings. Trevisan, L., Jansen, K., Goemans, M. & Rolim, J. D. P. (eds.). Springer Verlag, p. 75-90 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2129).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Incremental codes

    Dodis, Y. & Halevi, S., Aug 2001, Workshop on Approximation Algorithms for Combinatorial Optimization Problems (APPROX).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Indifferentiability of confusion-diffusion networks

    Dodis, Y., Stam, M., Steinberger, J. & Liu, T., Jan 1 2016, Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Fischlin, M. & Coron, J-S. (eds.). Springer Verlag, p. 679-704 26 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9666).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Indifferentiability of permutation-based compression functions and tree-based modes of operation, with applications to MD6

    Dodis, Y., Reyzin, L., Rivest, R. L. & Shen, E., Nov 11 2009, Fast Software Encryption - 16th International Workshop, FSE 2009, Revised Selected Papers. p. 104-121 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5665 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Interactive coding for interactive proofs

    Bishop, A. & Dodis, Y., Jan 1 2016, Theory of Cryptography - 3th International Conference, TCC 2016-A, Proceedings. Malkin, T. & Kushilevitz, E. (eds.). Springer Verlag, p. 352-366 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9563).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Interactive encryption and message authentication

    Dodis, Y. & Fiore, D., Jan 1 2014, Security and Cryptography for Networks - 9th International Conference, SCN 2014, Proceedings. Abdalla, M. & de Prisco, R. (eds.). Springer Verlag, p. 494-513 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8642).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Intrusion-resilient key exchange in the bounded retrieval model

    Cash, D., Ding, Y. Z., Dodis, Y., Lee, W., Lipton, R. & Walfish, S., Dec 1 2007, Theory of Cryptography - 4th Theory of Cryptography Conference, TCC 2007, Proceedings. p. 479-498 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4392 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Key derivation without entropy waste

    Dodis, Y., Pietrzak, K. & Wichs, D., Jan 1 2014, Advances in Cryptology, EUROCRYPT 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Springer Verlag, p. 93-110 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8441 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Key-insulated public key cryptosystems

    Dodis, Y., Katz, J., Xu, S. & Yung, M., Jan 1 2002, Advances in Cryptology - EUROCRYPT 2002 - International Conference on the Theory and Applications of Cryptographic Techniques, 2002, Proceedings. Knudsen, L. R. (ed.). Springer Verlag, p. 65-82 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2332).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access

    Key-insulated symmetric key cryptography and mitigating attacks against cryptographic cloud software

    Dodis, Y., Luo, W., Xu, S. & Yung, M., Dec 1 2012, ASIACCS 2012 - 7th ACM Symposium on Information, Computer and Communications Security. p. 57-58 2 p. (ASIACCS 2012 - 7th ACM Symposium on Information, Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Leakage-resilient pseudorandom functions and side-channel attacks on feistel networks

    Dodis, Y. & Pietrzak, K., Sep 29 2010, Advances in Cryptology - CRYPTO 2010 - 30th Annual Cryptology Conference, Proceedings. p. 21-40 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6223 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Leakage-resilient public-key cryptography in the bounded-retrieval model

    Alwen, J., Dodis, Y. & Wichs, D., Oct 29 2009, Advances in Cryptology - CRYPTO 2009 - 29th Annual International Cryptology Conference, Proceedings. p. 36-54 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5677 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Leftover hash lemma, revisited

    Barak, B., Dodis, Y., Krawczyk, H., Pereira, O., Pietrzak, K., Standaert, F. X. & Yu, Y., Jan 1 2011, Advances in Cryptology - CRYPTO 2011 - 31st Annual Cryptology Conference, Proceedings. Springer Verlag, p. 1-20 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6841 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Lower bounds for oblivious transfer reductions

    Dodis, Y. & Micali, S., May 1999, Advances in Cryptology - EUROCRYPT.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Mercurial commitments: Minimal assumptions and efficient constructions

    Catalano, D., Dodis, Y. & Visconti, I., Jul 7 2006, Theory of Cryptography: Third Theory of Cryptography Conference, TCC 2006, Proceedings. p. 120-144 25 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3876 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution