No photo of Yevgeniy Dodis

Yevgeniy Dodis

Professor of Computer Science

    19982019

    Research output per year

    If you made any changes in Pure these will be visible here soon.

    Research Output

    Filter
    Article
    2018

    Non-malleable codes from additive combinatorics

    Aggarwal, D., Dodis, Y. & Lovett, S., Jan 1 2018, In : SIAM Journal on Computing. 47, 2, p. 524-546 23 p.

    Research output: Contribution to journalArticle

    2017

    How to Eat Your Entropy and Have it Too: Optimal Recovery Strategies for Compromised RNGs

    Dodis, Y., Shamir, A., Stephens-Davidowitz, N. & Wichs, D., Dec 1 2017, In : Algorithmica. 79, 4, p. 1196-1232 37 p.

    Research output: Contribution to journalArticle

    2014

    Privacy amplification and nonmalleable extractors via character sums

    Dodis, Y., Li, X., Wooley, T. D. & Zuckerman, D., 2014, In : SIAM Journal on Computing. 43, 2, p. 800-830 31 p.

    Research output: Contribution to journalArticle

    2013

    The cost of cryptography

    Dodis, Y., Nov 2013, Nautilus Magazine, Issue 007 ("Waste").

    Research output: Contribution to specialist publicationArticle

    2012

    Bottleneck links, variable demand, and the tragedy of the commons

    Cole, R., Dodis, Y. & Roughgarden, T., Oct 1 2012, In : Networks. 60, 3, p. 194-203 10 p.

    Research output: Contribution to journalArticle

    Robust fuzzy extractors and authenticated key agreement from close secrets

    Dodis, Y., Kanukurthi, B., Katz, J., Reyzin, L. & Smith, A., Aug 30 2012, In : IEEE Transactions on Information Theory. 58, 9, p. 6207-6222 16 p., 6203415.

    Research output: Contribution to journalArticle

    2008

    Fuzzy extractors: How to generate strong keys from biometrics and other noisy data

    Dodis, Y., Ostrovsky, R., Reyzin, L. & Smith, A., Nov 7 2008, In : SIAM Journal on Computing. 38, 1, p. 97-139 43 p.

    Research output: Contribution to journalArticle

    Optimistic fair exchange in a multi-user setting

    Dodis, Y., Lee, P. J. & Yum, D. H., Jun 2 2008, In : Journal of Universal Computer Science. 14, 3, p. 318-346 29 p.

    Research output: Contribution to journalArticle

    2006

    How much can taxes help selfish routing?

    Cole, R., Dodis, Y. & Roughgarden, T., May 1 2006, In : Journal of Computer and System Sciences. 72, 3, p. 444-467 24 p.

    Research output: Contribution to journalArticle

    2005

    Scalable public-key tracing and revoking

    Dodis, Y., Fazio, N., Kiayias, A. & Yung, M., May 1 2005, In : Distributed Computing. 17, 4, p. 323-347 25 p.

    Research output: Contribution to journalArticle

    2004
    2003

    Intrusion-resilient public-key encryption

    Dodis, Y., Franklin, M., Katz, J., Miyaji, A. & Yung, M., Dec 1 2003, In : Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2612, p. 19-32 14 p.

    Research output: Contribution to journalArticle

    Strong key-insulated signature schemes

    Dodis, Y., Katz, J., Xu, S. & Yung, M., Dec 1 2003, In : Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2567, p. 130-144 15 p.

    Research output: Contribution to journalArticle