No photo of Yevgeniy Dodis

Yevgeniy Dodis

Professor of Computer Science

    19982019
    If you made any changes in Pure, your changes will be visible here soon.

    Research Output 1998 2019

    Filter
    Article
    2018

    Non-malleable codes from additive combinatorics

    Aggarwal, D., Dodis, Y. & Lovett, S., Jan 1 2018, In : SIAM Journal on Computing. 47, 2, p. 524-546 23 p.

    Research output: Contribution to journalArticle

    Additive Combinatorics
    Error detection
    Error correction
    Zero-knowledge Proof
    Vector spaces
    2016

    How to Eat Your Entropy and Have it Too: Optimal Recovery Strategies for Compromised RNGs

    Dodis, Y., Shamir, A., Stephens-Davidowitz, N. & Wichs, D., Nov 14 2016, (Accepted/In press) In : Algorithmica. p. 1-37 37 p.

    Research output: Contribution to journalArticle

    Optimal Recovery
    Random number Generator
    Entropy
    Recovery
    Timing
    Imperfect
    Randomness
    Cryptography
    Privacy
    Secret Sharing Scheme
    2014

    Privacy amplification and nonmalleable extractors via character sums

    Dodis, Y., Li, X., Wooley, T. D. & Zuckerman, D., 2014, In : SIAM Journal on Computing. 43, 2, p. 800-830 31 p.

    Research output: Contribution to journalArticle

    Character Sums
    Extractor
    Amplification
    Privacy
    Entropy
    2013

    The cost of cryptography

    Dodis, Y., Nov 2013, Nautilus Magazine, Issue 007 ("Waste").

    Research output: Contribution to specialist publicationArticle

    2012

    Bottleneck links, variable demand, and the tragedy of the commons

    Cole, R., Dodis, Y. & Roughgarden, T., Oct 2012, In : Networks. 60, 3, p. 194-203 10 p.

    Research output: Contribution to journalArticle

    Costs
    Routing protocols
    Throughput

    Robust fuzzy extractors and authenticated key agreement from close secrets

    Dodis, Y., Kanukurthi, B., Katz, J., Reyzin, L. & Smith, A., 2012, In : IEEE Transactions on Information Theory. 58, 9, p. 6207-6222 16 p., 6203415.

    Research output: Contribution to journalArticle

    entropy
    Entropy
    Biometrics
    Authentication
    biometrics
    2008

    Fuzzy extractors: How to generate strong keys from biometrics and other noisy data

    Dodis, Y., Ostrovsky, R., Reyzin, L. & Smith, A., 2008, In : SIAM Journal on Computing. 38, 1, p. 97-139 43 p.

    Research output: Contribution to journalArticle

    Extractor
    Noisy Data
    Biometrics
    Hamming distance
    Difference Set

    Optimistic fair exchange in a multi-user setting

    Dodis, Y., Lee, P. J. & Yum, D. H., 2008, In : Journal of Universal Computer Science. 14, 3, p. 318-346 29 p.

    Research output: Contribution to journalArticle

    Fair Exchange
    Security Model
    Cryptography
    Multisignature
    One-way Function
    2006

    How much can taxes help selfish routing?

    Cole, R., Dodis, Y. & Roughgarden, T., May 2006, In : Journal of Computer and System Sciences. 72, 3, p. 444-467 24 p.

    Research output: Contribution to journalArticle

    Selfish Routing
    Tax
    Taxation
    Latency
    Costs
    2005

    Scalable public-key tracing and revoking

    Dodis, Y., Fazio, N., Kiayias, A. & Yung, M., May 2005, In : Distributed Computing. 17, 4, p. 323-347 25 p.

    Research output: Contribution to journalArticle

    Traitor Tracing
    Public key
    Tracing
    Formal Model
    Cryptography
    2004
    Public Key Encryption
    Cryptography
    Homomorphic
    Generalise
    Ring Signature
    Population
    Group Signature
    Identification Scheme
    Identification (control systems)
    Extractor
    Noisy Data
    Biometrics
    Hamming distance
    Difference Set
    Entropy
    Randomness
    Extractor
    Seeds
    Seed
    Randomness
    Cascade
    Noise
    Seeds
    Extractor
    2003
    Authenticated Encryption
    Cryptography
    Equipment and Supplies
    Paradigm
    Binders

    Intrusion-resilient public-key encryption

    Dodis, Y., Franklin, M., Katz, J., Miyaji, A. & Yung, M., 2003, In : Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2612, p. 19-32 14 p.

    Research output: Contribution to journalArticle

    Public Key Encryption
    Cryptography
    Encryption
    Forward Security
    Insulation
    Entropy
    Randomness
    Extractor
    Privacy
    Amplification
    Claw-free
    Hoof and Claw
    Permutation
    Signature Scheme
    Random Oracle
    Broadcast Encryption
    Public Key Encryption
    Cryptography
    Receiver
    Public key
    Public key
    Trace
    Attack
    Cryptography
    Traitor Tracing
    Signature Scheme
    Equipment and Supplies
    Signature
    Random Oracle Model
    Cell Phones