No photo of Yevgeniy Dodis

Yevgeniy Dodis

Professor of Computer Science

19982019
If you made any changes in Pure, your changes will be visible here soon.

Research Output 1998 2019

Filter
Article
2018

Non-malleable codes from additive combinatorics

Aggarwal, D., Dodis, Y. & Lovett, S., Jan 1 2018, In : SIAM Journal on Computing. 47, 2, p. 524-546 23 p.

Research output: Contribution to journalArticle

Additive Combinatorics
Error detection
Error correction
Zero-knowledge Proof
Vector spaces
2016

How to Eat Your Entropy and Have it Too: Optimal Recovery Strategies for Compromised RNGs

Dodis, Y., Shamir, A., Stephens-Davidowitz, N. & Wichs, D., Nov 14 2016, (Accepted/In press) In : Algorithmica. p. 1-37 37 p.

Research output: Contribution to journalArticle

Optimal Recovery
Random number Generator
Entropy
Recovery
Timing
2015
Imperfect
Randomness
Cryptography
Privacy
Secret Sharing Scheme
2014

Privacy amplification and nonmalleable extractors via character sums

Dodis, Y., Li, X., Wooley, T. D. & Zuckerman, D., 2014, In : SIAM Journal on Computing. 43, 2, p. 800-830 31 p.

Research output: Contribution to journalArticle

Character Sums
Extractor
Amplification
Privacy
Entropy
2013

The cost of cryptography

Dodis, Y., Nov 2013, Nautilus Magazine, Issue 007 ("Waste").

Research output: Contribution to specialist publicationArticle

2012

Bottleneck links, variable demand, and the tragedy of the commons

Cole, R., Dodis, Y. & Roughgarden, T., Oct 2012, In : Networks. 60, 3, p. 194-203 10 p.

Research output: Contribution to journalArticle

Costs
Routing protocols
Throughput

Robust fuzzy extractors and authenticated key agreement from close secrets

Dodis, Y., Kanukurthi, B., Katz, J., Reyzin, L. & Smith, A., 2012, In : IEEE Transactions on Information Theory. 58, 9, p. 6207-6222 16 p., 6203415.

Research output: Contribution to journalArticle

entropy
Entropy
Biometrics
Authentication
biometrics
2008

Fuzzy extractors: How to generate strong keys from biometrics and other noisy data

Dodis, Y., Ostrovsky, R., Reyzin, L. & Smith, A., 2008, In : SIAM Journal on Computing. 38, 1, p. 97-139 43 p.

Research output: Contribution to journalArticle

Extractor
Noisy Data
Biometrics
Hamming distance
Difference Set

Optimistic fair exchange in a multi-user setting

Dodis, Y., Lee, P. J. & Yum, D. H., 2008, In : Journal of Universal Computer Science. 14, 3, p. 318-346 29 p.

Research output: Contribution to journalArticle

Fair Exchange
Security Model
Cryptography
Multisignature
One-way Function
2006

How much can taxes help selfish routing?

Cole, R., Dodis, Y. & Roughgarden, T., May 2006, In : Journal of Computer and System Sciences. 72, 3, p. 444-467 24 p.

Research output: Contribution to journalArticle

Selfish Routing
Tax
Taxation
Latency
Costs
2005

Scalable public-key tracing and revoking

Dodis, Y., Fazio, N., Kiayias, A. & Yung, M., May 2005, In : Distributed Computing. 17, 4, p. 323-347 25 p.

Research output: Contribution to journalArticle

Traitor Tracing
Public key
Tracing
Formal Model
Cryptography
2004
Public Key Encryption
Cryptography
Homomorphic
Generalise
Ring Signature
Population
Group Signature
Identification Scheme
Identification (control systems)
Extractor
Noisy Data
Biometrics
Hamming distance
Difference Set
Entropy
Randomness
Extractor
Seeds
Seed
Randomness
Cascade
Noise
Seeds
Extractor
2003
Authenticated Encryption
Cryptography
Equipment and Supplies
Paradigm
Binders

Intrusion-resilient public-key encryption

Dodis, Y., Franklin, M., Katz, J., Miyaji, A. & Yung, M., 2003, In : Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2612, p. 19-32 14 p.

Research output: Contribution to journalArticle

Public Key Encryption
Cryptography
Encryption
Forward Security
Insulation
Entropy
Randomness
Extractor
Privacy
Amplification
Claw-free
Hoof and Claw
Permutation
Signature Scheme
Random Oracle
Broadcast Encryption
Public Key Encryption
Cryptography
Receiver
Public key
Public key
Trace
Attack
Cryptography
Traitor Tracing
Signature Scheme
Equipment and Supplies
Signature
Random Oracle Model
Cell Phones