No photo of Yevgeniy Dodis

Yevgeniy Dodis

Professor of Computer Science

    1998 …2025

    Research activity per year

    Search results

    • 2025

      Compact Key Storage in the Standard Model

      Dodis, Y. & Jost, D., 2025, Theory of Cryptography - 22nd International Conference, TCC 2024, Proceedings. Boyle, E., Boyle, E. & Mahmoody, M. (eds.). Springer Science and Business Media Deutschland GmbH, p. 444-475 32 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 15364 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Interval Key-Encapsulation Mechanism

      Bienstock, A., Dodis, Y., Rösler, P. & Wichs, D., 2025, Advances in Cryptology – ASIACRYPT 2024 - 30th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Chung, K.-M. & Sasaki, Y. (eds.). Springer Science and Business Media Deutschland GmbH, p. 361-393 33 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 15485 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • 2024

      Compact Key Storage: A Modern Approach to Key Backup and Delegation

      Dodis, Y., Jost, D. & Marcedone, A., 2024, Advances in Cryptology – CRYPTO 2024 - 44th Annual International Cryptology Conference, Proceedings. Reyzin, L. & Stebila, D. (eds.). Springer Science and Business Media Deutschland GmbH, p. 75-109 35 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14921 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • How to Simulate Random Oracles with Auxiliary Input

      Dodis, Y., Jain, A., Lin, H., Luo, J. & Wichs, D., 2024, Proceedings - 2024 IEEE 65th Annual Symposium on Foundations of Computer Science, FOCS 2024. IEEE Computer Society, p. 1207-1230 24 p. (Proceedings - Annual IEEE Symposium on Foundations of Computer Science, FOCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • 2023

      End-to-End Encrypted Zoom Meetings: Proving Security and Strengthening Liveness

      Dodis, Y., Jost, D., Kesavan, B. & Marcedone, A., 2023, Advances in Cryptology – EUROCRYPT 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Hazay, C. & Stam, M. (eds.). Springer Science and Business Media Deutschland GmbH, p. 157-189 33 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14008 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Immunizing Backdoored PRGs

      Ball, M., Dodis, Y. & Goldin, E., 2023, Theory of Cryptography - 21st International Conference, TCC 2023, Proceedings. Rothblum, G. & Wee, H. (eds.). Springer Science and Business Media Deutschland GmbH, p. 153-182 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14371 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Random Oracle Combiners: Breaking the Concatenation Barrier for Collision-Resistance

      Dodis, Y., Ferguson, N., Goldin, E., Hall, P. & Pietrzak, K., 2023, Advances in Cryptology – CRYPTO 2023 - 43rd Annual International Cryptology Conference, CRYPTO 2023, Proceedings, Part II. Handschuh, H. & Lysyanskaya, A. (eds.). Springer Science and Business Media Deutschland GmbH, p. 514-546 33 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14082 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Security with Functional Re-encryption from CPA

      Dodis, Y., Halevi, S. & Wichs, D., 2023, Theory of Cryptography - 21st International Conference, TCC 2023, Proceedings. Rothblum, G. & Wee, H. (eds.). Springer Science and Business Media Deutschland GmbH, p. 279-305 27 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14370 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Speak Much, Remember Little: Cryptography in the Bounded Storage Model, Revisited

      Dodis, Y., Quach, W. & Wichs, D., 2023, Advances in Cryptology – EUROCRYPT 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Hazay, C. & Stam, M. (eds.). Springer Science and Business Media Deutschland GmbH, p. 86-116 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14004 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • 2022

      Authentication in the Bounded Storage Model

      Dodis, Y., Quach, W. & Wichs, D., 2022, Advances in Cryptology – EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2022, Proceedings. Dunkelman, O. & Dziembowski, S. (eds.). Springer Science and Business Media Deutschland GmbH, p. 737-766 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13277 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Encapsulated Search Index: Public-Key, Sub-linear, Distributed, and Delegatable

      Aronesty, E., Cash, D., Dodis, Y., Gallancy, D. H., Higley, C., Karthikeyan, H. & Tysor, O., 2022, Public-Key Cryptography - PKC 2022 - 25th IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings. Hanaoka, G., Shikata, J. & Watanabe, Y. (eds.). Springer Science and Business Media Deutschland GmbH, p. 256-285 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13178 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Forward-Secure Encryption with Fast Forwarding

      Dodis, Y., Jost, D. & Karthikeyan, H., 2022, Theory of Cryptography - 20th International Conference, TCC 2022, Proceedings. Kiltz, E. & Vaikuntanathan, V. (eds.). Springer Science and Business Media Deutschland GmbH, p. 3-32 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13748 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Multicast Key Agreement, Revisited

      Bienstock, A., Dodis, Y. & Tang, Y., 2022, Topics in Cryptology - CT-RSA 2022 - Cryptographers’ Track at the RSA Conference, 2022, Proceedings. Galbraith, S. D. (ed.). Springer Science and Business Media Deutschland GmbH, p. 1-25 25 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13161 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • On Seedless PRNGs and Premature Next

      Coretti, S., Dodis, Y., Karthikeyan, H., Stephens-Davidowitz, N. & Tessaro, S., Jul 1 2022, 3rd Conference on Information-Theoretic Cryptography, ITC 2022. Dachman-Soled, D. (ed.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, 9. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 230).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • On the Worst-Case Inefficiency of CGKA

      Bienstock, A., Dodis, Y., Garg, S., Grogan, G., Hajiabadi, M. & Rösler, P., 2022, Theory of Cryptography - 20th International Conference, TCC 2022, Proceedings. Kiltz, E. & Vaikuntanathan, V. (eds.). Springer Science and Business Media Deutschland GmbH, p. 213-243 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13748 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Preface

      Dodis, Y. & Shrimpton, T., 2022, In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 13510 LNCS, p. v-vii

      Research output: Contribution to journalEditorialpeer-review

    • Preface

      Dodis, Y. & Shrimpton, T., 2022, In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 13507 LNCS, p. v-vii

      Research output: Contribution to journalEditorialpeer-review

    • Preface

      Dodis, Y. & Shrimpton, T., 2022, In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 13508 LNCS, p. v-vii

      Research output: Contribution to journalEditorialpeer-review

    • Preface

      Dodis, Y. & Shrimpton, T., 2022, In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 13509 LNCS, p. v-vii

      Research output: Contribution to journalEditorialpeer-review

    • Revisiting Collision and Local Opening Analysis of ABR Hash

      Dhar, C., Dodis, Y. & Nandi, M., Jul 1 2022, 3rd Conference on Information-Theoretic Cryptography, ITC 2022. Dachman-Soled, D. (ed.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, 11. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 230).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Rotatable Zero Knowledge Sets: Post Compromise Secure Auditable Dictionaries with Application to Key Transparency

      Chen, B., Dodis, Y., Ghosh, E., Goldin, E., Kesavan, B., Marcedone, A. & Mou, M. E., 2022, Advances in Cryptology – ASIACRYPT 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, 2022, Proceedings. Agrawal, S. & Lin, D. (eds.). Springer Science and Business Media Deutschland GmbH, p. 547-580 34 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13793 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Small-Box Cryptography

      Dodis, Y., Karthikeyan, H. & Wichs, D., Jan 1 2022, 13th Innovations in Theoretical Computer Science Conference, ITCS 2022. Braverman, M. (ed.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, 56. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 215).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • 2021

      Doubly-affine extractors, and their applications

      Dodis, Y. & Yeo, K., Jul 1 2021, 2nd Conference on Information-Theoretic Cryptography, ITC 2021. Tessaro, S. (ed.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, 13. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 199).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Forward Secret Encrypted RAM: Lower Bounds and Applications

      Bienstock, A., Dodis, Y. & Yeo, K., 2021, Theory of Cryptography - 19th International Conference, TCC 2021, Proceedings. Nissim, K., Waters, B. & Waters, B. (eds.). Springer Science and Business Media Deutschland GmbH, p. 62-93 32 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13044 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Modular Design of Secure Group Messaging Protocols and the Security of MLS

      Alwen, J., Coretti, S., Dodis, Y. & Tselekounis, Y., Nov 12 2021, CCS 2021 - Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 1463-1483 21 p. (Proceedings of the ACM Conference on Computer and Communications Security).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • No Time to Hash: On Super-Efficient Entropy Accumulation

      Dodis, Y., Guo, S., Stephens-Davidowitz, N. & Xie, Z., 2021, Advances in Cryptology – CRYPTO 2021 - 41st Annual International Cryptology Conference, CRYPTO 2021, Proceedings. Malkin, T. & Peikert, C. (eds.). Springer Science and Business Media Deutschland GmbH, p. 548-576 29 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12828 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Online linear extractors for independent sources

      Dodis, Y., Guo, S., Stephens-Davidowitz, N. & Xie, Z., Jul 1 2021, 2nd Conference on Information-Theoretic Cryptography, ITC 2021. Tessaro, S. (ed.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, 14. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 199).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • T5: Hashing five inputs with three compression calls

      Dodis, Y., Khovratovich, D., Mouha, N. & Nandi, M., Jul 1 2021, 2nd Conference on Information-Theoretic Cryptography, ITC 2021. Tessaro, S. (ed.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, 24. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 199).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Updatable Public Key Encryption in the Standard Model

      Dodis, Y., Karthikeyan, H. & Wichs, D., 2021, Theory of Cryptography - 19th International Conference, TCC 2021, Proceedings. Nissim, K., Waters, B. & Waters, B. (eds.). Springer Science and Business Media Deutschland GmbH, p. 254-285 32 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13044 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • 2020

      Extracting randomness from extractor-dependent sources

      Dodis, Y., Vaikuntanathan, V. & Wichs, D., 2020, Advances in Cryptology – EUROCRYPT 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Canteaut, A. & Ishai, Y. (eds.). Springer, p. 313-342 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12105 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Non-malleable Encryption: Simpler, Shorter, Stronger

      Coretti, S., Dodis, Y., Maurer, U., Tackmann, B. & Venturi, D., Oct 1 2020, In: Journal of Cryptology. 33, 4, p. 1984-2033 50 p.

      Research output: Contribution to journalArticlepeer-review

    • On the price of concurrency in group ratcheting protocols

      Bienstock, A., Dodis, Y. & Rösler, P., 2020, Theory of Cryptography - 18th International Conference, TCC 2020, Proceedings. Pass, R. & Pietrzak, K. (eds.). Springer Science and Business Media Deutschland GmbH, p. 198-228 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12551 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Security analysis and improvements for the ietf mls standard for group messaging

      Alwen, J., Coretti, S., Dodis, Y. & Tselekounis, Y., 2020, Advances in Cryptology - CRYPTO 2020 - 40th Annual International Cryptology Conference, CRYPTO 2020, Proceedings. Micciancio, D. & Ristenpart, T. (eds.). Springer, p. 248-277 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12170 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Towards defeating backdoored random oracles: Indifferentiability with bounded adaptivity

      Dodis, Y., Farshim, P., Mazaheri, S. & Tessaro, S., 2020, Theory of Cryptography - 18th International Conference, TCC 2020, Proceedings. Pass, R. & Pietrzak, K. (eds.). Springer Science and Business Media Deutschland GmbH, p. 241-273 33 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12552 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • 2019

      Reusable Non-Interactive Secure Computation

      Chase, M., Dodis, Y., Ishai, Y., Kraschewski, D., Liu, T., Ostrovsky, R. & Vaikuntanathan, V., 2019, Advances in Cryptology – CRYPTO 2019 - 39th Annual International Cryptology Conference, Proceedings. Micciancio, D. & Boldyreva, A. (eds.). Springer Verlag, p. 462-488 27 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11694 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Seedless Fruit Is the Sweetest: Random Number Generation, Revisited

      Coretti, S., Dodis, Y., Karthikeyan, H. & Tessaro, S., 2019, Advances in Cryptology – CRYPTO 2019 - 39th Annual International Cryptology Conference, Proceedings. Micciancio, D. & Boldyreva, A. (eds.). Springer Verlag, p. 205-234 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11692 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • The double ratchet: Security notions, proofs, and modularization for the signal protocol

      Alwen, J., Coretti, S. & Dodis, Y., 2019, Advances in Cryptology – EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Rijmen, V. & Ishai, Y. (eds.). Springer Verlag, p. 129-158 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11476 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • 2018

      Fast message franking: From invisible salamanders to encryptment

      Dodis, Y., Grubbs, P., Ristenpart, T. & Woodage, J., 2018, Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, 2018, Proceedings. Boldyreva, A. & Shacham, H. (eds.). Springer Verlag, p. 155-186 32 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10991 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Non-malleable codes from additive combinatorics

      Aggarwal, D., Dodis, Y. & Lovett, S., 2018, In: SIAM Journal on Computing. 47, 2, p. 524-546 23 p.

      Research output: Contribution to journalArticlepeer-review

      Open Access
    • Non-uniform bounds in the random-permutation, ideal-cipher, and generic-group models

      Coretti, S., Dodis, Y. & Guo, S., 2018, Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, 2018, Proceedings. Boldyreva, A. & Shacham, H. (eds.). Springer Verlag, p. 693-721 29 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10991 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Provable security of (tweakable) block ciphers based on substitution-permutation networks

      Cogliati, B., Dodis, Y., Katz, J., Lee, J., Steinberger, J., Thiruvengadam, A. & Zhang, Z., 2018, Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, 2018, Proceedings. Boldyreva, A. & Shacham, H. (eds.). Springer Verlag, p. 722-753 32 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10991 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Random oracles and non-uniformity

      Coretti, S., Dodis, Y., Guo, S. & Steinberger, J., 2018, Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2018 Proceedings. Nielsen, J. B. & Rijmen, V. (eds.). Springer Verlag, p. 227-258 32 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10820 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • 2017

      A new distribution-sensitive secure sketch and popularity-proportional hashing

      Woodage, J., Chatterjee, R., Dodis, Y., Juels, A. & Ristenpart, T., 2017, Advances in Cryptology – CRYPTO 2017 - 37th Annual International Cryptology Conference, Proceedings. Katz, J. & Shacham, H. (eds.). Springer Verlag, p. 682-710 29 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10403 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Fixing cracks in the concrete: Random oracles with auxiliary input, revisited

      Dodis, Y., Guo, S. & Katz, J., 2017, Advances in Cryptology – EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Coron, J.-S. & Nielsen, J. B. (eds.). Springer Verlag, p. 473-495 23 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10211 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • How to Eat Your Entropy and Have it Too: Optimal Recovery Strategies for Compromised RNGs

      Dodis, Y., Shamir, A., Stephens-Davidowitz, N. & Wichs, D., Dec 1 2017, In: Algorithmica. 79, 4, p. 1196-1232 37 p.

      Research output: Contribution to journalArticlepeer-review

      Open Access
    • Unilaterally-authenticated key exchange

      Dodis, Y. & Fiore, D., 2017, Financial Cryptography and Data Security - 21st International Conference, FC 2017, Revised Selected Papers. Kiayias, A. (ed.). Springer Verlag, p. 542-560 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10322 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • 2016

      Indifferentiability of confusion-diffusion networks

      Dodis, Y., Stam, M., Steinberger, J. & Liu, T., 2016, Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Fischlin, M. & Coron, J.-S. (eds.). Springer Verlag, p. 679-704 26 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9666).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Interactive coding for interactive proofs

      Bishop, A. & Dodis, Y., 2016, Theory of Cryptography - 3th International Conference, TCC 2016-A, Proceedings. Kushilevitz, E. & Malkin, T. (eds.). Springer Verlag, p. 352-366 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9563).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      Open Access
    • Message transmission with reverse firewalls—Secure communication on corrupted machines

      Dodis, Y., Mironov, I. & Stephens-Davidowitz, N., 2016, Advances in Cryptology - 36th Annual International Cryptology Conference, CRYPTO 2016, Proceedings. Robshaw, M. & Katz, J. (eds.). Springer Verlag, p. 241-372 132 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9814).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Non-malleable encryption: Simpler, shorter, stronger

      Coretti, S., Dodis, Y., Tackmann, B. & Venturi, D., 2016, Theory of Cryptography - 13th International Conference, TCC 2016-A, Proceedings. Kushilevitz, E. & Malkin, T. (eds.). Springer Verlag, p. 306-335 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9562).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Your message has successfully been sent.
    Your message was not sent due to an error.