Research Output per year

## Research Output

## Practical leakage-resilient identity-based encryption from simple assumptions

Chow, S. S. M., Dodis, Y., Rouselakis, Y. & Waters, B., Dec 16 2010,*CCS'10 - Proceedings of the 17th ACM Conference on Computer and Communications Security.*p. 152-161 10 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Public-key encryption in the bounded-retrieval model

Alwen, J., Dodis, Y., Naor, M., Segev, G., Walfish, S. & Wichs, D., Jul 21 2010,*Advances in Cryptology - Eurocrypt 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings.*p. 113-134 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6110 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Public-key encryption schemes with auxiliary inputs

Dodis, Y., Goldwasser, S., Tauman Kalai, Y., Peikert, C. & Vaikuntanathan, V., Mar 25 2010,*Theory of Cryptography - 7th Theory of Cryptography Conference, TCC 2010, Proceedings.*p. 361-381 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5978 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Survey: Leakage resilience and the bounded retrieval model

Alwen, J., Dodis, Y. & Wichs, D., Nov 12 2010,*Information Theoretic Security - 4th International Conference, ICITS 2009, Revised Selected Papers.*p. 1-18 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5973 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Composability and on-line deniability of authentication

Dodis, Y., Katz, J., Smith, A. & Walfish, S., Nov 9 2009,*Theory of Cryptography - 6th Theory of Cryptography Conference, TCC 2009, Proceedings.*p. 146-162 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5444 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Indifferentiability of permutation-based compression functions and tree-based modes of operation, with applications to MD6

Dodis, Y., Reyzin, L., Rivest, R. L. & Shen, E., Nov 11 2009,*Fast Software Encryption - 16th International Workshop, FSE 2009, Revised Selected Papers.*p. 104-121 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5665 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Leakage-resilient public-key cryptography in the bounded-retrieval model

Alwen, J., Dodis, Y. & Wichs, D., Oct 29 2009,*Advances in Cryptology - CRYPTO 2009 - 29th Annual International Cryptology Conference, Proceedings.*p. 36-54 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5677 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Message authentication codes from unpredictable block ciphers

Dodis, Y. & Steinberger, J., Oct 29 2009,*Advances in Cryptology - CRYPTO 2009 - 29th Annual International Cryptology Conference, Proceedings.*p. 267-285 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5677 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Non-malleable extractors and symmetric key cryptography from weak secrets

Dodis, Y. & Wichs, D., Nov 9 2009,*STOC'09 - Proceedings of the 2009 ACM International Symposium on Theory of Computing.*p. 601-610 10 p. (Proceedings of the Annual ACM Symposium on Theory of Computing).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## On cryptography with auxiliary input

Dodis, Y., Kalai, Y. T. & Lovett, S., Nov 9 2009,*STOC'09 - Proceedings of the 2009 ACM International Symposium on Theory of Computing.*p. 621-630 10 p. (Proceedings of the Annual ACM Symposium on Theory of Computing).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Proofs of Retrievability via Hardness Amplification

Dodis, Y., Vadhan, S. & Wichs, D., Nov 9 2009,*Theory of Cryptography - 6th Theory of Cryptography Conference, TCC 2009, Proceedings.*p. 109-127 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5444 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Salvaging merkle-damgard for practical applications

Dodis, Y., Ristenpart, T. & Shrimpton, T., Jul 23 2009,*Advances in Cryptology - EUROCRYPT 2009 - 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings.*p. 371-388 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5479 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Security amplification for interactive cryptographic primitives

Dodis, Y., Impagliazzo, R., Jaiswal, R. & Kabanets, V., Nov 16 2009,*Theory of Cryptography - 6th Theory of Cryptography Conference, TCC 2009, Proceedings.*p. 128-145 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5444 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## A new mode of operation for block ciphers and length-preserving MACs

Dodis, Y., Pietrzak, K. & Puniya, P., Jun 5 2008,*Advances in Cryptology - EUROCRYPT 2008 - 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings.*p. 198-219 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4965 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Detection of algebraic manipulation with applications to robust secret sharing and fuzzy extractors

Cramer, R., Dodis, Y., Fehr, S., Padró, C. & Wichs, D., Jun 5 2008,*Advances in Cryptology - EUROCRYPT 2008 - 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings.*p. 471-488 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4965 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Efficient constructions of composable commitments and zero-knowledge proofs

Dodis, Y., Shoup, V. & Walfish, S., Sep 22 2008,*Advances in Cryptology - CRYPTO 2008 - 28th Annual International Cryptology Conference, Proceedings.*p. 515-535 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5157 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Getting the best out of existing hash functions; Or what if we are stuck with SHA?

Dodis, Y. & Puniya, P., Jun 30 2008,*Applied Cryptography and Network Security - 6th International Conference, ACNS 2008, Proceedings.*p. 156-173 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5037 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Does privacy require true randomness?

Bosley, C. & Dodis, Y., Dec 1 2007,*Theory of Cryptography - 4th Theory of Cryptography Conference, TCC 2007, Proceedings.*p. 1-20 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4392 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Feistel networks made public, and applications

Dodis, Y. & Puniya, P., Jan 1 2007,*Advances in Cryptology - EUROCRYPT 2007 - 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings.*Springer Verlag, p. 534-554 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4515 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Improving the security of MACs via randomized message preprocessing

Dodis, Y. & Pietrzak, K., Dec 1 2007,*Fast Software Encryption - 14th International Workshop, FSE 2007.*p. 414-433 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4593 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Intrusion-resilient key exchange in the bounded retrieval model

Cash, D., Ding, Y. Z., Dodis, Y., Lee, W., Lipton, R. & Walfish, S., Dec 1 2007,*Theory of Cryptography - 4th Theory of Cryptography Conference, TCC 2007, Proceedings.*p. 479-498 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4392 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Optimistic fair exchange in a multi-user setting

Dodis, Y., Lee, P. J. & Yum, D. H., Dec 1 2007,*Public Key Cryptography - PKC 2007 - 10th International Conference on Practice and Theory in Public-Key Cryptography, Proceedings.*p. 118-133 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4450 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Universally composable security with global setup

Canetti, R., Dodis, Y., Pass, R. & Walfish, S., Dec 1 2007,*Theory of Cryptography - 4th Theory of Cryptography Conference, TCC 2007, Proceedings.*p. 61-85 25 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4392 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Bottleneck links, variable demand, and the tragedy of the commons

Cole, R., Dodis, Y. & Roughgarden, T., 2006,*Proceedings of the Seventeenth Annual ACM-SIAM Symposium on Discrete Algorithms.*p. 668-677 10 p.

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Mercurial commitments: Minimal assumptions and efficient constructions

Catalano, D., Dodis, Y. & Visconti, I., Jul 7 2006,*Theory of Cryptography: Third Theory of Cryptography Conference, TCC 2006, Proceedings.*p. 120-144 25 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3876 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Merkle-damgård revisited: How to construct a hash function

Coron, J. S., Dodis, Y., Malinaud, C. & Puniya, P., Jun 23 2006,*Advances in Cryptology - CRYPTO 2005 - 25th Annual International Cryptology Conference, Proceedings.*p. 430-448 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3621 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## On the generic insecurity of the full domain hash

Dodis, Y., Oliveira, R. & Pietrzak, K., Jun 23 2006,*Advances in Cryptology - CRYPTO 2005 - 25th Annual International Cryptology Conference, Proceedings.*p. 449-466 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3621 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## On the impossibility of extracting classical randomness using a quantum computer

Dodis, Y. & Renner, R., Jan 1 2006,*Automata, Languages and Programming - 33rd International Colloquium, ICALP 2006, Proceedings.*Springer Verlag, p. 204-215 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4052 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## On the relation between the Ideal Cipher and the Random Oracle Models

Dodis, Y. & Puniya, P., Jul 7 2006,*Theory of Cryptography: Third Theory of Cryptography Conference, TCC 2006, Proceedings.*p. 184-206 23 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3876 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Public key cryptography - PKC 2006

Dodis, Y. (ed.), Yung, M. (ed.), Kiayias, A. (ed.) & Malkin, T. (ed.), 2006,*9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings.*Springer

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Robust fuzzy extractors and authenticated key agreement from close secrets

Dodis, Y., Katz, J., Reyzin, L. & Smith, A., Jan 1 2006,*Advances in Cryptology - CRYPTO 2006 - 26th Annual International Cryptology Conference, Proceedings.*Springer Verlag, p. 232-250 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4117 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Separating sources for encryption and secret sharing

Dodis, Y., Pietrzak, K. & Przydatek, B., Jul 7 2006,*Theory of Cryptography: Third Theory of Cryptography Conference, TCC 2006, Proceedings.*p. 601-616 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3876 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Threshold and proactive pseudo-random permutations

Dodis, Y., Yampolskiy, A. & Yung, M., Jul 7 2006,*Theory of Cryptography: Third Theory of Cryptography Conference, TCC 2006, Proceedings.*p. 542-560 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3876 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## A new design criteria for hash-functions

Coron, J. S., Dodis, Y., Malinaud, C. & Puniya, P., Nov 2005,*NIST Cryptographic Hash Workshop.*

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## A verifiable random function with short proofs and keys

Dodis, Y. & Yampolskiy, A., 2005,*Lecture Notes in Computer Science.*Vaudenay, S. (ed.). Vol. 3386. p. 416-431 16 p.

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Chosen-ciphertext security of multiple encryption

Dodis, Y. & Katz, J., 2005,*Lecture Notes in Computer Science.*Kilian, J. (ed.). Vol. 3378. p. 188-209 22 p.

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## On extractors, error-correction and hiding all partial information

Dodis, Y., 2005,*2005 IEEE Information Theory Workshop on Theory and Practice in Information-Theoretic Security.*Vol. 2005. p. 74-79 6 p. 1543961

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Time capsule signature

Dodis, Y. & Yum, D. H., 2005,*Lecture Notes in Computer Science.*Patrick, A. S. & Yung, M. (eds.). Vol. 3570. p. 57-71 15 p.

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Fully-simulatable multiparty computation

Dodis, Y., Pass, R. & Walfish, S., Oct 2004,*Workshop on Secure Multiparty Protocols (SMP 2004).*

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## ID-based encryption for complex hierarchies with applications to forward security and broadcast encryption

Yao, D., Dodis, Y., Fazio, N. & Lysyanskaya, A., 2004,*Proceedings of the ACM Conference on Computer and Communications Security.*Pfitzmann, B. & Liu, P. (eds.). p. 354-363 10 p.

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Breaking and repairing optimistic fair exchange from PODC 2003

Dodis, Y. & Reyzin, L., Jan 1 2003,*DRM 2003: Proceedings of the Third ACM Workshop on Digital Rights Management.*Association for Computing Machinery (ACM), p. 47-54 8 p. (DRM 2003: Proceedings of the Third ACM Workshop on Digital Rights Management).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Exposure-resilience for free: The hierarchical ID-based encryption case

Dodis, Y. & Yung, M., Jan 1 2003,*Proceedings - 1st International IEEE Security in Storage Workshop, SISW 2002.*Institute of Electrical and Electronics Engineers Inc., p. 45-52 8 p. 1183509. (Proceedings - 1st International IEEE Security in Storage Workshop, SISW 2002).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Fully scalable public-key traitor tracing

Dodis, Y., Fazio, N., Kiayias, A. & Yung, M., Jul 2003,*Principles of Distributed Computing (PODC).*

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## How much can taxes help selfish routing?

Cole, R., Dodis, Y. & Roughgarden, T., 2003,*Proceedings of the ACM Conference on Electronic Commerce.*p. 98-107 10 p.

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Pricing network edges for heterogeneous selfish users

Cole, R., Dodis, Y. & Roughgarden, T., 2003,*Conference Proceedings of the Annual ACM Symposium on Theory of Computing.*p. 521-530 10 p.

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Pricing networks with selfish routing (survey)

Cole, R., Dodis, Y. & Roughgarden, T., Jun 2003,*Workshop on Economics of Peer-to-Peer Systems.*

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Proactive two-party signatures for user authentication

Nicolosi, A., Krohn, M., Dodis, Y. & Mazieres, D., Feb 2003,*Network and Distributed System Security Symposium (NDSS).*

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Proxy cryptography revisted

Ivan, A. & Dodis, Y., Feb 2003,*Network and Distributed System Security Symposium (NDSS).*

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Scalable Public-Key Tracing and Revoking

Dodis, Y., Fazio, N., Kiayias, A. & Yung, M., 2003,*Proceedings of the Twenty-Second Annual ACM Symposium on Principles of Distributed Computing, PODC 2003.*Vol. 22. p. 190-199 10 p.

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

## Efficient construction of (distributed) verifiable random functions

Dodis, Y., Jan 1 2002,*Public Key Cryptography - PKC 2003 - 6th International Workshop on Practice and Theory in Public Key Cryptography, Proceedings.*Desmedt, Y. G. (ed.). Springer Verlag, p. 1-17 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2567).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution