No photo of Yevgeniy Dodis

Yevgeniy Dodis

Professor of Computer Science

    1998 …2025

    Research activity per year

    Search results

    • 2016

      Spooky encryption and its applications

      Dodis, Y., Halevi, S., Rothblum, R. D. & Wichs, D., 2016, Advances in Cryptology - 36th Annual International Cryptology Conference, CRYPTO 2016, Proceedings. Robshaw, M. & Katz, J. (eds.). Springer Verlag, p. 93-122 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9816).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • 2015

      A formal treatment of backdoored pseudorandom generators

      Dodis, Y., Ganesh, C., Golovnev, A., Juels, A. & Ristenpart, T., 2015, Advances in Cryptology – EUROCRYPT 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Fischlin, M. & Oswald, E. (eds.). Springer Verlag, p. 101-126 26 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9056).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      Open Access
    • Incremental codes

      Dodis, Y. & Halevi, S., 2015, Approximation, Randomization, and Combinatorial Optimization: Algorithms and Techniques - 4th International Workshop on Approximation, Algorithms for Combinatorial Optimization Problems, APPROX 2001 and 5th International Workshop on Randomization and Approximation Techniques in Computer Science, RANDOM 2001, Proceedings. Trevisan, L., Jansen, K., Goemans, M. & Rolim, J. D. P. (eds.). Springer Verlag, p. 75-90 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2129).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Non-malleable reductions and applications

      Aggarwal, D., Dodis, Y., Kazana, T. & Obremski, M., Jun 14 2015, STOC 2015 - Proceedings of the 2015 ACM Symposium on Theory of Computing. Association for Computing Machinery, p. 459-468 10 p. (Proceedings of the Annual ACM Symposium on Theory of Computing; vol. 14-17-June-2015).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      Open Access
    • On randomness, codes and extractors in cryptography

      Dodis, Y., 2015, Progress in Cryptology – INDOCRYPT 2015 - 16th International Conference on Cryptology in India, Proceedings. Biryukov, A. & Goyal, V. (eds.). Springer Verlag, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9462).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Preface

      Dodis, Y. & Nielsen, J. B., 2015, In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9014, p. V-VI

      Research output: Contribution to journalEditorialpeer-review

    • Preface

      Dodis, Y. & Nielsen, J. B., 2015, In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9015

      Research output: Contribution to journalEditorialpeer-review

    • Privacy with imperfect randomness

      Dodis, Y. & Yao, Y., 2015, Advances in Cryptology - CRYPTO 2015 - 35th Annual Cryptology Conference, Proceedings. Springer Verlag, p. 463-482 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9216).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      Open Access
    • Privacy with imperfect randomness

      Dodis, Y. & Yao, Y., 2015, Advances in Cryptology - CRYPTO 2015 - 35th Annual Cryptology Conference, Proceedings. Robshaw, M. & Gennaro, R. (eds.). Springer Verlag, p. 463-482 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9216).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Theory of Cryptography: 12th Theory of Cryptography Conference, TCC 2015 Warsaw, Poland, March 23-25, 2015 Proceedings, Part I

      Dodis, Y. & Nielsen, J. B., 2015, Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Proceedings. Dodis, Y. & Nielsen, J. B. (eds.). Springer Verlag, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9014).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Theory of cryptography:12th Theory of cryptography conference, TCC 2015 warsaw, poland, march 23-25, 2015 proceedings, part II

      Dodis, Y. & Nielsen, J. B., 2015, Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Proceedings. Dodis, Y. & Nielsen, J. B. (eds.). Springer Verlag, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9015).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • 2014

      Amplifying privacy in privacy amplification

      Aggarwal, D., Dodis, Y., Jafargholi, Z., Miles, E. & Reyzin, L., 2014, Advances in Cryptology, CRYPTO 2014 - 34th Annual Cryptology Conference, Proceedings. PART 2 ed. Springer Verlag, p. 183-198 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8617 LNCS, no. PART 2).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • How to eat your entropy and have it too - Optimal recovery strategies for compromised RNGs

      Dodis, Y., Shamir, A., Stephens-Davidowitz, N. & Wichs, D., 2014, Advances in Cryptology, CRYPTO 2014 - 34th Annual Cryptology Conference, Proceedings. PART 2 ed. Springer Verlag, p. 37-54 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8617 LNCS, no. PART 2).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Interactive encryption and message authentication

      Dodis, Y. & Fiore, D., 2014, Security and Cryptography for Networks - 9th International Conference, SCN 2014, Proceedings. Abdalla, M. & de Prisco, R. (eds.). Springer Verlag, p. 494-513 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8642).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Key derivation without entropy waste

      Dodis, Y., Pietrzak, K. & Wichs, D., 2014, Advances in Cryptology, EUROCRYPT 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Springer Verlag, p. 93-110 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8441 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Non-malleable codes from addictive combinatorics

      Aggarwal, D., Dodis, Y. & Lovett, S., Jun 2014, Symposium on Theory of Computing (STOC).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Privacy amplification and nonmalleable extractors via character sums

      Dodis, Y., Li, X., Wooley, T. D. & Zuckerman, D., 2014, In: SIAM Journal on Computing. 43, 2, p. 800-830 31 p.

      Research output: Contribution to journalArticlepeer-review

      Open Access
    • 2013

      On continual leakage of discrete log representations

      Agrawal, S., Dodis, Y., Vaikuntanathan, V. & Wichs, D., 2013, Advances in Cryptology, ASIACRYPT 2013 - 19th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. PART 2 ed. p. 401-420 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8270 LNCS, no. PART 2).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • On the indifferentiability of key-alternating ciphers

      Andreeva, E., Bogdanov, A., Dodis, Y., Mennink, B. & Steinberger, J. P., 2013, Advances in Cryptology, CRYPTO 2013 - 33rd Annual Cryptology Conference, Proceedings. PART 1 ed. p. 531-550 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8042 LNCS, no. PART 1).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Overcoming weak expectations

      Dodis, Y. & Yu, Y., 2013, Theory of Cryptography - 10th Theory of Cryptography Conference, TCC 2013, Proceedings. Springer Verlag, p. 1-22 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7785 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Security analysis of pseudo-random number generators with input: /dev/random is not robust

      Dodis, Y., Pointcheval, D., Ruhault, S., Vergniaud, D. & Wichs, D., 2013, CCS 2013 - Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security. p. 647-658 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • The cost of cryptography

      Dodis, Y., Nov 2013, Nautilus Magazine, Issue 007 ("Waste").

      Research output: Contribution to specialist publicationArticle

    • 2012

      Bottleneck links, variable demand, and the tragedy of the commons

      Cole, R., Dodis, Y. & Roughgarden, T., Oct 2012, In: Networks. 60, 3, p. 194-203 10 p.

      Research output: Contribution to journalArticlepeer-review

    • Counterexamples to hardness amplification beyond negligible

      Dodis, Y., Jain, A., Moran, T. & Wichs, D., 2012, Theory of Cryptography - 9th Theory of Cryptography Conference, TCC 2012, Proceedings. p. 476-493 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7194 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Differential privacy with imperfect randomness

      Dodis, Y., López-Alt, A., Mironov, I. & Vadhan, S., 2012, Advances in Cryptology, CRYPTO 2012 - 32nd Annual Cryptology Conference, Proceedings. p. 497-516 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7417 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Key-insulated symmetric key cryptography and mitigating attacks against cryptographic cloud software

      Dodis, Y., Luo, W., Xu, S. & Yung, M., 2012, ASIACCS 2012 - 7th ACM Symposium on Information, Computer and Communications Security. p. 57-58 2 p. (ASIACCS 2012 - 7th ACM Symposium on Information, Computer and Communications Security).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      Open Access
    • Message authentication, revisited

      Dodis, Y., Kiltz, E., Pietrzak, K. & Wichs, D., 2012, Advances in Cryptology, EUROCRYPT 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. p. 355-374 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7237 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • On the instantiability of hash-and-sign RSA signatures

      Dodis, Y., Haitner, I. & Tentes, A., 2012, Theory of Cryptography - 9th Theory of Cryptography Conference, TCC 2012, Proceedings. p. 112-132 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7194 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Overcoming weak expectations

      Dodis, Y. & Yu, Y., 2012, 2012 IEEE Information Theory Workshop, ITW 2012. p. 109-113 5 p. 6404636. (2012 IEEE Information Theory Workshop, ITW 2012).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Randomness condensers for efficiently samplable, seed-dependent sources

      Dodis, Y., Ristenpart, T. & Vadhan, S., 2012, Theory of Cryptography - 9th Theory of Cryptography Conference, TCC 2012, Proceedings. p. 618-635 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7194 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Robust fuzzy extractors and authenticated key agreement from close secrets

      Dodis, Y., Kanukurthi, B., Katz, J., Reyzin, L. & Smith, A., 2012, In: IEEE Transactions on Information Theory. 58, 9, p. 6207-6222 16 p., 6203415.

      Research output: Contribution to journalArticlepeer-review

      Open Access
    • Shannon impossibility, revisited

      Dodis, Y., 2012, Information Theoretic Security - 6th International Conference, ICITS 2012, Proceedings. p. 100-110 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7412 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • To hash or not to hash again? (In)differentiability results for H 2 and HMAC

      Dodis, Y., Ristenpart, T., Steinberger, J. & Tessaro, S., 2012, Advances in Cryptology, CRYPTO 2012 - 32nd Annual Cryptology Conference, Proceedings. p. 348-366 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7417 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • 2011

      Domain extension for MACs beyond the birthday barrier

      Dodis, Y. & Steinberger, J., 2011, Advances in Cryptology - EUROCRYPT 2011, 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. p. 323-342 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6632 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Leftover hash lemma, revisited

      Barak, B., Dodis, Y., Krawczyk, H., Pereira, O., Pietrzak, K., Standaert, F. X. & Yu, Y., 2011, Advances in Cryptology - CRYPTO 2011 - 31st Annual Cryptology Conference, Proceedings. Springer Verlag, p. 1-20 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6841 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Privacy amplification and non-malleable extractors via character sums

      Dodis, Y., Li, X., Wooley, T. D. & Zuckerman, D., 2011, Proceedings - 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science, FOCS 2011. p. 668-677 10 p. 6108229. (Proceedings - Annual IEEE Symposium on Foundations of Computer Science, FOCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      Open Access
    • Storing secrets on continually leaky devices

      Dodis, Y., Lewko, A., Waters, B. & Wichs, D., 2011, Proceedings - 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science, FOCS 2011. p. 688-697 10 p. 6108231. (Proceedings - Annual IEEE Symposium on Foundations of Computer Science, FOCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      Open Access
    • 2010

      A domain extender for the ideal cipher

      Coron, J. S., Dodis, Y., Mandal, A. & Seurin, Y., 2010, Theory of Cryptography - 7th Theory of Cryptography Conference, TCC 2010, Proceedings. p. 273-289 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5978 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Changing base without losing space

      Dodis, Y., Patrascu, M. & Thorup, M., 2010, STOC'10 - Proceedings of the 2010 ACM International Symposium on Theory of Computing. p. 593-602 10 p. (Proceedings of the Annual ACM Symposium on Theory of Computing).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      Open Access
    • Concealment and its applications to authenticated encryption

      Dodis, Y., 2010, Practical signcryption. Dent, A. & Zheng, Y. (eds.). Springer

      Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)peer-review

    • Cryptography against continuous memory attacks

      Dodis, Y., Haralambiev, K., López-Alt, A. & Wichs, D., 2010, Proceedings - 2010 IEEE 51st Annual Symposium on Foundations of Computer Science, FOCS 2010. IEEE Computer Society, p. 511-520 10 p. 5671302. (Proceedings - Annual IEEE Symposium on Foundations of Computer Science, FOCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Efficient public-key cryptography in the presence of key leakage

      Dodis, Y., Haralambiev, K., López-Alt, A. & Wichs, D., 2010, Advances in Cryptology, ASIACRYPT 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Springer Verlag, p. 613-631 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6477 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Leakage-resilient pseudorandom functions and side-channel attacks on feistel networks

      Dodis, Y. & Pietrzak, K., 2010, Advances in Cryptology - CRYPTO 2010 - 30th Annual Cryptology Conference, Proceedings. p. 21-40 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6223 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Practical leakage-resilient identity-based encryption from simple assumptions

      Chow, S. S. M., Dodis, Y., Rouselakis, Y. & Waters, B., 2010, CCS'10 - Proceedings of the 17th ACM Conference on Computer and Communications Security. p. 152-161 10 p. (Proceedings of the ACM Conference on Computer and Communications Security).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Public-key encryption in the bounded-retrieval model

      Alwen, J., Dodis, Y., Naor, M., Segev, G., Walfish, S. & Wichs, D., 2010, Advances in Cryptology - Eurocrypt 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. p. 113-134 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6110 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Public-key encryption schemes with auxiliary inputs

      Dodis, Y., Goldwasser, S., Tauman Kalai, Y., Peikert, C. & Vaikuntanathan, V., 2010, Theory of Cryptography - 7th Theory of Cryptography Conference, TCC 2010, Proceedings. p. 361-381 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5978 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Survey: Leakage resilience and the bounded retrieval model

      Alwen, J., Dodis, Y. & Wichs, D., 2010, Information Theoretic Security - 4th International Conference, ICITS 2009, Revised Selected Papers. p. 1-18 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5973 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • 2009

      Composability and on-line deniability of authentication

      Dodis, Y., Katz, J., Smith, A. & Walfish, S., 2009, Theory of Cryptography - 6th Theory of Cryptography Conference, TCC 2009, Proceedings. p. 146-162 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5444 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Forward-secure hierarchical IBE with applications to broadcast encryption

      Yao, D., Fazio, N., Dodis, Y. & Lysyanskaya, A., 2009, Identity-Based Cryptography. IOS Press, p. 100-118 19 p. (Cryptology and Information Security Series; vol. 2).

      Research output: Chapter in Book/Report/Conference proceedingChapter

    • Indifferentiability of permutation-based compression functions and tree-based modes of operation, with applications to MD6

      Dodis, Y., Reyzin, L., Rivest, R. L. & Shen, E., 2009, Fast Software Encryption - 16th International Workshop, FSE 2009, Revised Selected Papers. p. 104-121 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5665 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Your message has successfully been sent.
    Your message was not sent due to an error.