No photo of Yevgeniy Dodis

Yevgeniy Dodis

Professor of Computer Science

    19982019

    Research output per year

    If you made any changes in Pure these will be visible here soon.

    Research Output

    Filter
    Conference contribution
    2010

    Practical leakage-resilient identity-based encryption from simple assumptions

    Chow, S. S. M., Dodis, Y., Rouselakis, Y. & Waters, B., Dec 16 2010, CCS'10 - Proceedings of the 17th ACM Conference on Computer and Communications Security. p. 152-161 10 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Public-key encryption in the bounded-retrieval model

    Alwen, J., Dodis, Y., Naor, M., Segev, G., Walfish, S. & Wichs, D., Jul 21 2010, Advances in Cryptology - Eurocrypt 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. p. 113-134 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6110 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Public-key encryption schemes with auxiliary inputs

    Dodis, Y., Goldwasser, S., Tauman Kalai, Y., Peikert, C. & Vaikuntanathan, V., Mar 25 2010, Theory of Cryptography - 7th Theory of Cryptography Conference, TCC 2010, Proceedings. p. 361-381 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5978 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Survey: Leakage resilience and the bounded retrieval model

    Alwen, J., Dodis, Y. & Wichs, D., Nov 12 2010, Information Theoretic Security - 4th International Conference, ICITS 2009, Revised Selected Papers. p. 1-18 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5973 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2009

    Composability and on-line deniability of authentication

    Dodis, Y., Katz, J., Smith, A. & Walfish, S., Nov 9 2009, Theory of Cryptography - 6th Theory of Cryptography Conference, TCC 2009, Proceedings. p. 146-162 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5444 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Indifferentiability of permutation-based compression functions and tree-based modes of operation, with applications to MD6

    Dodis, Y., Reyzin, L., Rivest, R. L. & Shen, E., Nov 11 2009, Fast Software Encryption - 16th International Workshop, FSE 2009, Revised Selected Papers. p. 104-121 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5665 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Leakage-resilient public-key cryptography in the bounded-retrieval model

    Alwen, J., Dodis, Y. & Wichs, D., Oct 29 2009, Advances in Cryptology - CRYPTO 2009 - 29th Annual International Cryptology Conference, Proceedings. p. 36-54 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5677 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Message authentication codes from unpredictable block ciphers

    Dodis, Y. & Steinberger, J., Oct 29 2009, Advances in Cryptology - CRYPTO 2009 - 29th Annual International Cryptology Conference, Proceedings. p. 267-285 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5677 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Non-malleable extractors and symmetric key cryptography from weak secrets

    Dodis, Y. & Wichs, D., Nov 9 2009, STOC'09 - Proceedings of the 2009 ACM International Symposium on Theory of Computing. p. 601-610 10 p. (Proceedings of the Annual ACM Symposium on Theory of Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    On cryptography with auxiliary input

    Dodis, Y., Kalai, Y. T. & Lovett, S., Nov 9 2009, STOC'09 - Proceedings of the 2009 ACM International Symposium on Theory of Computing. p. 621-630 10 p. (Proceedings of the Annual ACM Symposium on Theory of Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Proofs of Retrievability via Hardness Amplification

    Dodis, Y., Vadhan, S. & Wichs, D., Nov 9 2009, Theory of Cryptography - 6th Theory of Cryptography Conference, TCC 2009, Proceedings. p. 109-127 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5444 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Salvaging merkle-damgard for practical applications

    Dodis, Y., Ristenpart, T. & Shrimpton, T., Jul 23 2009, Advances in Cryptology - EUROCRYPT 2009 - 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. p. 371-388 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5479 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Security amplification for interactive cryptographic primitives

    Dodis, Y., Impagliazzo, R., Jaiswal, R. & Kabanets, V., Nov 16 2009, Theory of Cryptography - 6th Theory of Cryptography Conference, TCC 2009, Proceedings. p. 128-145 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5444 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2008

    A new mode of operation for block ciphers and length-preserving MACs

    Dodis, Y., Pietrzak, K. & Puniya, P., Jun 5 2008, Advances in Cryptology - EUROCRYPT 2008 - 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. p. 198-219 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4965 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Detection of algebraic manipulation with applications to robust secret sharing and fuzzy extractors

    Cramer, R., Dodis, Y., Fehr, S., Padró, C. & Wichs, D., Jun 5 2008, Advances in Cryptology - EUROCRYPT 2008 - 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. p. 471-488 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4965 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Efficient constructions of composable commitments and zero-knowledge proofs

    Dodis, Y., Shoup, V. & Walfish, S., Sep 22 2008, Advances in Cryptology - CRYPTO 2008 - 28th Annual International Cryptology Conference, Proceedings. p. 515-535 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5157 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Getting the best out of existing hash functions; Or what if we are stuck with SHA?

    Dodis, Y. & Puniya, P., Jun 30 2008, Applied Cryptography and Network Security - 6th International Conference, ACNS 2008, Proceedings. p. 156-173 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5037 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2007

    Does privacy require true randomness?

    Bosley, C. & Dodis, Y., Dec 1 2007, Theory of Cryptography - 4th Theory of Cryptography Conference, TCC 2007, Proceedings. p. 1-20 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4392 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Feistel networks made public, and applications

    Dodis, Y. & Puniya, P., Jan 1 2007, Advances in Cryptology - EUROCRYPT 2007 - 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Springer Verlag, p. 534-554 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4515 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access

    Improving the security of MACs via randomized message preprocessing

    Dodis, Y. & Pietrzak, K., Dec 1 2007, Fast Software Encryption - 14th International Workshop, FSE 2007. p. 414-433 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4593 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Intrusion-resilient key exchange in the bounded retrieval model

    Cash, D., Ding, Y. Z., Dodis, Y., Lee, W., Lipton, R. & Walfish, S., Dec 1 2007, Theory of Cryptography - 4th Theory of Cryptography Conference, TCC 2007, Proceedings. p. 479-498 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4392 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Optimistic fair exchange in a multi-user setting

    Dodis, Y., Lee, P. J. & Yum, D. H., Dec 1 2007, Public Key Cryptography - PKC 2007 - 10th International Conference on Practice and Theory in Public-Key Cryptography, Proceedings. p. 118-133 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4450 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Universally composable security with global setup

    Canetti, R., Dodis, Y., Pass, R. & Walfish, S., Dec 1 2007, Theory of Cryptography - 4th Theory of Cryptography Conference, TCC 2007, Proceedings. p. 61-85 25 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4392 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2006

    Bottleneck links, variable demand, and the tragedy of the commons

    Cole, R., Dodis, Y. & Roughgarden, T., 2006, Proceedings of the Seventeenth Annual ACM-SIAM Symposium on Discrete Algorithms. p. 668-677 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Mercurial commitments: Minimal assumptions and efficient constructions

    Catalano, D., Dodis, Y. & Visconti, I., Jul 7 2006, Theory of Cryptography: Third Theory of Cryptography Conference, TCC 2006, Proceedings. p. 120-144 25 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3876 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Merkle-damgård revisited: How to construct a hash function

    Coron, J. S., Dodis, Y., Malinaud, C. & Puniya, P., Jun 23 2006, Advances in Cryptology - CRYPTO 2005 - 25th Annual International Cryptology Conference, Proceedings. p. 430-448 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3621 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    On the generic insecurity of the full domain hash

    Dodis, Y., Oliveira, R. & Pietrzak, K., Jun 23 2006, Advances in Cryptology - CRYPTO 2005 - 25th Annual International Cryptology Conference, Proceedings. p. 449-466 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3621 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    On the impossibility of extracting classical randomness using a quantum computer

    Dodis, Y. & Renner, R., Jan 1 2006, Automata, Languages and Programming - 33rd International Colloquium, ICALP 2006, Proceedings. Springer Verlag, p. 204-215 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4052 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    On the relation between the Ideal Cipher and the Random Oracle Models

    Dodis, Y. & Puniya, P., Jul 7 2006, Theory of Cryptography: Third Theory of Cryptography Conference, TCC 2006, Proceedings. p. 184-206 23 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3876 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Public key cryptography - PKC 2006

    Dodis, Y. (ed.), Yung, M. (ed.), Kiayias, A. (ed.) & Malkin, T. (ed.), 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings. Springer

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Robust fuzzy extractors and authenticated key agreement from close secrets

    Dodis, Y., Katz, J., Reyzin, L. & Smith, A., Jan 1 2006, Advances in Cryptology - CRYPTO 2006 - 26th Annual International Cryptology Conference, Proceedings. Springer Verlag, p. 232-250 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4117 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Separating sources for encryption and secret sharing

    Dodis, Y., Pietrzak, K. & Przydatek, B., Jul 7 2006, Theory of Cryptography: Third Theory of Cryptography Conference, TCC 2006, Proceedings. p. 601-616 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3876 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Threshold and proactive pseudo-random permutations

    Dodis, Y., Yampolskiy, A. & Yung, M., Jul 7 2006, Theory of Cryptography: Third Theory of Cryptography Conference, TCC 2006, Proceedings. p. 542-560 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3876 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2005

    A new design criteria for hash-functions

    Coron, J. S., Dodis, Y., Malinaud, C. & Puniya, P., Nov 2005, NIST Cryptographic Hash Workshop.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    A verifiable random function with short proofs and keys

    Dodis, Y. & Yampolskiy, A., 2005, Lecture Notes in Computer Science. Vaudenay, S. (ed.). Vol. 3386. p. 416-431 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Chosen-ciphertext security of multiple encryption

    Dodis, Y. & Katz, J., 2005, Lecture Notes in Computer Science. Kilian, J. (ed.). Vol. 3378. p. 188-209 22 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    On extractors, error-correction and hiding all partial information

    Dodis, Y., 2005, 2005 IEEE Information Theory Workshop on Theory and Practice in Information-Theoretic Security. Vol. 2005. p. 74-79 6 p. 1543961

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Time capsule signature

    Dodis, Y. & Yum, D. H., 2005, Lecture Notes in Computer Science. Patrick, A. S. & Yung, M. (eds.). Vol. 3570. p. 57-71 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2004

    Fully-simulatable multiparty computation

    Dodis, Y., Pass, R. & Walfish, S., Oct 2004, Workshop on Secure Multiparty Protocols (SMP 2004).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    ID-based encryption for complex hierarchies with applications to forward security and broadcast encryption

    Yao, D., Dodis, Y., Fazio, N. & Lysyanskaya, A., 2004, Proceedings of the ACM Conference on Computer and Communications Security. Pfitzmann, B. & Liu, P. (eds.). p. 354-363 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2003

    Breaking and repairing optimistic fair exchange from PODC 2003

    Dodis, Y. & Reyzin, L., Jan 1 2003, DRM 2003: Proceedings of the Third ACM Workshop on Digital Rights Management. Association for Computing Machinery (ACM), p. 47-54 8 p. (DRM 2003: Proceedings of the Third ACM Workshop on Digital Rights Management).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Exposure-resilience for free: The hierarchical ID-based encryption case

    Dodis, Y. & Yung, M., Jan 1 2003, Proceedings - 1st International IEEE Security in Storage Workshop, SISW 2002. Institute of Electrical and Electronics Engineers Inc., p. 45-52 8 p. 1183509. (Proceedings - 1st International IEEE Security in Storage Workshop, SISW 2002).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Fully scalable public-key traitor tracing

    Dodis, Y., Fazio, N., Kiayias, A. & Yung, M., Jul 2003, Principles of Distributed Computing (PODC).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    How much can taxes help selfish routing?

    Cole, R., Dodis, Y. & Roughgarden, T., 2003, Proceedings of the ACM Conference on Electronic Commerce. p. 98-107 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Pricing network edges for heterogeneous selfish users

    Cole, R., Dodis, Y. & Roughgarden, T., 2003, Conference Proceedings of the Annual ACM Symposium on Theory of Computing. p. 521-530 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Pricing networks with selfish routing (survey)

    Cole, R., Dodis, Y. & Roughgarden, T., Jun 2003, Workshop on Economics of Peer-to-Peer Systems.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Proactive two-party signatures for user authentication

    Nicolosi, A., Krohn, M., Dodis, Y. & Mazieres, D., Feb 2003, Network and Distributed System Security Symposium (NDSS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Proxy cryptography revisted

    Ivan, A. & Dodis, Y., Feb 2003, Network and Distributed System Security Symposium (NDSS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Scalable Public-Key Tracing and Revoking

    Dodis, Y., Fazio, N., Kiayias, A. & Yung, M., 2003, Proceedings of the Twenty-Second Annual ACM Symposium on Principles of Distributed Computing, PODC 2003. Vol. 22. p. 190-199 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2002

    Efficient construction of (distributed) verifiable random functions

    Dodis, Y., Jan 1 2002, Public Key Cryptography - PKC 2003 - 6th International Workshop on Practice and Theory in Public Key Cryptography, Proceedings. Desmedt, Y. G. (ed.). Springer Verlag, p. 1-17 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2567).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution