No photo of Yevgeniy Dodis

Yevgeniy Dodis

Professor of Computer Science

    1998 …2025

    Research activity per year

    Search results

    • 2009

      Leakage-resilient public-key cryptography in the bounded-retrieval model

      Alwen, J., Dodis, Y. & Wichs, D., 2009, Advances in Cryptology - CRYPTO 2009 - 29th Annual International Cryptology Conference, Proceedings. p. 36-54 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5677 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Message authentication codes from unpredictable block ciphers

      Dodis, Y. & Steinberger, J., 2009, Advances in Cryptology - CRYPTO 2009 - 29th Annual International Cryptology Conference, Proceedings. p. 267-285 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5677 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Non-malleable extractors and symmetric key cryptography from weak secrets

      Dodis, Y. & Wichs, D., 2009, STOC'09 - Proceedings of the 2009 ACM International Symposium on Theory of Computing. p. 601-610 10 p. (Proceedings of the Annual ACM Symposium on Theory of Computing).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • On cryptography with auxiliary input

      Dodis, Y., Kalai, Y. T. & Lovett, S., 2009, STOC'09 - Proceedings of the 2009 ACM International Symposium on Theory of Computing. p. 621-630 10 p. (Proceedings of the Annual ACM Symposium on Theory of Computing).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Proofs of Retrievability via Hardness Amplification

      Dodis, Y., Vadhan, S. & Wichs, D., 2009, Theory of Cryptography - 6th Theory of Cryptography Conference, TCC 2009, Proceedings. p. 109-127 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5444 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Salvaging merkle-damgard for practical applications

      Dodis, Y., Ristenpart, T. & Shrimpton, T., 2009, Advances in Cryptology - EUROCRYPT 2009 - 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. p. 371-388 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5479 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Security amplification for interactive cryptographic primitives

      Dodis, Y., Impagliazzo, R., Jaiswal, R. & Kabanets, V., 2009, Theory of Cryptography - 6th Theory of Cryptography Conference, TCC 2009, Proceedings. p. 128-145 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5444 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • 2008

      A new mode of operation for block ciphers and length-preserving MACs

      Dodis, Y., Pietrzak, K. & Puniya, P., 2008, Advances in Cryptology - EUROCRYPT 2008 - 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. p. 198-219 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4965 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Detection of algebraic manipulation with applications to robust secret sharing and fuzzy extractors

      Cramer, R., Dodis, Y., Fehr, S., Padró, C. & Wichs, D., 2008, Advances in Cryptology - EUROCRYPT 2008 - 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. p. 471-488 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4965 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Efficient constructions of composable commitments and zero-knowledge proofs

      Dodis, Y., Shoup, V. & Walfish, S., 2008, Advances in Cryptology - CRYPTO 2008 - 28th Annual International Cryptology Conference, Proceedings. p. 515-535 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5157 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Forward-secure hierarchical IBE with applications to broadcast encryption schemes

      Dodis, Y., Yao, D., Fazio, N. & Lysyanskaya, A., 2008, Identity-based cryptography. Joye, M. & Neven, G. (eds.). IOS Press, (Cryptology and Information Security Series).

      Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)peer-review

    • Fuzzy extractors: How to generate strong keys from biometrics and other noisy data

      Dodis, Y., Ostrovsky, R., Reyzin, L. & Smith, A., 2008, In: SIAM Journal on Computing. 38, 1, p. 97-139 43 p.

      Research output: Contribution to journalArticlepeer-review

    • Getting the best out of existing hash functions; Or what if we are stuck with SHA?

      Dodis, Y. & Puniya, P., 2008, Applied Cryptography and Network Security - 6th International Conference, ACNS 2008, Proceedings. p. 156-173 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5037 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Optimistic fair exchange in a multi-user setting

      Dodis, Y., Lee, P. J. & Yum, D. H., 2008, In: Journal of Universal Computer Science. 14, 3, p. 318-346 29 p.

      Research output: Contribution to journalArticlepeer-review

    • 2007

      Cryptography and game theory

      Dodis, Y. & Rabin, T., Jan 1 2007, Algorithmic Game Theory. Cambridge University Press, Vol. 9780521872829. p. 181-206 26 p.

      Research output: Chapter in Book/Report/Conference proceedingChapter

    • Does privacy require true randomness?

      Bosley, C. & Dodis, Y., 2007, Theory of Cryptography - 4th Theory of Cryptography Conference, TCC 2007, Proceedings. Springer Verlag, p. 1-20 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4392 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      Open Access
    • Feistel networks made public, and applications

      Dodis, Y. & Puniya, P., 2007, Advances in Cryptology - EUROCRYPT 2007 - 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Springer Verlag, p. 534-554 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4515 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      Open Access
    • Fuzzy extractors

      Dodis, Y., Reyzin, L. & Smith, A., 2007, Security with Noisy Data: On Private Biometrics, Secure Key Storage and Anti-Counterfeiting. Springer London, p. 79-99 21 p.

      Research output: Chapter in Book/Report/Conference proceedingChapter

    • Improving the security of MACs via randomized message preprocessing

      Dodis, Y. & Pietrzak, K., 2007, Fast Software Encryption - 14th International Workshop, FSE 2007. Springer Verlag, p. 414-433 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4593 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Intrusion-resilient key exchange in the bounded retrieval model

      Cash, D., Ding, Y. Z., Dodis, Y., Lee, W., Lipton, R. & Walfish, S., 2007, Theory of Cryptography - 4th Theory of Cryptography Conference, TCC 2007, Proceedings. Springer Verlag, p. 479-498 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4392 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      Open Access
    • Optimistic fair exchange in a multi-user setting

      Dodis, Y., Lee, P. J. & Yum, D. H., 2007, Public Key Cryptography - PKC 2007 - 10th International Conference on Practice and Theory in Public-Key Cryptography, Proceedings. Springer Verlag, p. 118-133 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4450 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      Open Access
    • Universally composable security with global setup

      Canetti, R., Dodis, Y., Pass, R. & Walfish, S., 2007, Theory of Cryptography - 4th Theory of Cryptography Conference, TCC 2007, Proceedings. Springer Verlag, p. 61-85 25 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4392 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      Open Access
    • 2006

      Bottleneck links, variable demand, and the tragedy of the commons

      Cole, R., Dodis, Y. & Roughgarden, T., 2006, Proceedings of the Seventeenth Annual ACM-SIAM Symposium on Discrete Algorithms. p. 668-677 10 p.

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • How much can taxes help selfish routing?

      Cole, R., Dodis, Y. & Roughgarden, T., May 2006, In: Journal of Computer and System Sciences. 72, 3, p. 444-467 24 p.

      Research output: Contribution to journalArticlepeer-review

    • Mercurial commitments: Minimal assumptions and efficient constructions

      Catalano, D., Dodis, Y. & Visconti, I., 2006, Theory of Cryptography: Third Theory of Cryptography Conference, TCC 2006, Proceedings. p. 120-144 25 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3876 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Merkle-damgård revisited: How to construct a hash function

      Coron, J. S., Dodis, Y., Malinaud, C. & Puniya, P., 2006, Advances in Cryptology - CRYPTO 2005 - 25th Annual International Cryptology Conference, Proceedings. p. 430-448 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3621 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • On the generic insecurity of the full domain hash

      Dodis, Y., Oliveira, R. & Pietrzak, K., 2006, Advances in Cryptology - CRYPTO 2005 - 25th Annual International Cryptology Conference, Proceedings. p. 449-466 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3621 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • On the impossibility of extracting classical randomness using a quantum computer

      Dodis, Y. & Renner, R., 2006, Automata, Languages and Programming - 33rd International Colloquium, ICALP 2006, Proceedings. Springer Verlag, p. 204-215 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4052 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      Open Access
    • On the relation between the Ideal Cipher and the Random Oracle Models

      Dodis, Y. & Puniya, P., 2006, Theory of Cryptography: Third Theory of Cryptography Conference, TCC 2006, Proceedings. p. 184-206 23 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3876 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Public key cryptography - PKC 2006

      Dodis, Y. (Editor), Yung, M. (Editor), Kiayias, A. (Editor) & Malkin, T. (Editor), 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings. Springer

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Robust fuzzy extractors and authenticated key agreement from close secrets

      Dodis, Y., Katz, J., Reyzin, L. & Smith, A., 2006, Advances in Cryptology - CRYPTO 2006 - 26th Annual International Cryptology Conference, Proceedings. Springer Verlag, p. 232-250 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4117 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      Open Access
    • Separating sources for encryption and secret sharing

      Dodis, Y., Pietrzak, K. & Przydatek, B., 2006, Theory of Cryptography: Third Theory of Cryptography Conference, TCC 2006, Proceedings. p. 601-616 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3876 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Threshold and proactive pseudo-random permutations

      Dodis, Y., Yampolskiy, A. & Yung, M., 2006, Theory of Cryptography: Third Theory of Cryptography Conference, TCC 2006, Proceedings. p. 542-560 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3876 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • 2005

      A new design criteria for hash-functions

      Coron, J. S., Dodis, Y., Malinaud, C. & Puniya, P., Nov 2005, NIST Cryptographic Hash Workshop.

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • A verifiable random function with short proofs and keys

      Dodis, Y. & Yampolskiy, A., 2005, Lecture Notes in Computer Science. Vaudenay, S. (ed.). Vol. 3386. p. 416-431 16 p.

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Chosen-ciphertext security of multiple encryption

      Dodis, Y. & Katz, J., 2005, Lecture Notes in Computer Science. Kilian, J. (ed.). Vol. 3378. p. 188-209 22 p.

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Correcting errors without leaking partial information

      Dodis, Y. & Smith, A., 2005, In: Proceedings of the Annual ACM Symposium on Theory of Computing. p. 654-663 10 p.

      Research output: Contribution to journalConference articlepeer-review

    • Entropic security and the encryption of high entropy messages

      Dodis, Y. & Smith, A., 2005, In: Lecture Notes in Computer Science. 3378, p. 556-577 22 p.

      Research output: Contribution to journalConference articlepeer-review

    • On extractors, error-correction and hiding all partial information

      Dodis, Y., 2005, 2005 IEEE Information Theory Workshop on Theory and Practice in Information-Theoretic Security. Vol. 2005. p. 74-79 6 p. 1543961

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Scalable public-key tracing and revoking

      Dodis, Y., Fazio, N., Kiayias, A. & Yung, M., May 2005, In: Distributed Computing. 17, 4, p. 323-347 25 p.

      Research output: Contribution to journalArticlepeer-review

    • Secure remote authentication using biometric data

      Boyen, X., Dodis, Y., Katz, J., Ostrovsky, R. & Smith, A., 2005, In: Lecture Notes in Computer Science. 3494, p. 147-163 17 p.

      Research output: Contribution to journalConference articlepeer-review

      Open Access
    • Signcryption

      Dodis, Y., 2005, Encyclopedia of cryptography and security. van Tilborg, H. C. A. (ed.). Kluwer Academic Publishers

      Research output: Chapter in Book/Report/Conference proceedingEntry for encyclopedia/dictionary

    • Time capsule signature

      Dodis, Y. & Yum, D. H., 2005, Lecture Notes in Computer Science. Patrick, A. S. & Yung, M. (eds.). Vol. 3570. p. 57-71 15 p.

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • 2004

      A generic construction for intrusion-resilient public-key encryption

      Dodis, Y., Franklin, M., Katz, J., Miyaji, A. & Yung, M., Dec 1 2004, In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2964, p. 81-98 18 p.

      Research output: Contribution to journalArticlepeer-review

    • Anonymous identification in ad hoc groups

      Dodis, Y., Kiayias, A., Nicolosi, A. & Shoup, V., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Cachin, C. & Camenisch, J. (eds.). Springer Verlag, p. 609-626 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3027).

      Research output: Chapter in Book/Report/Conference proceedingChapter

      Open Access
    • Fully-simulatable multiparty computation

      Dodis, Y., Pass, R. & Walfish, S., Oct 2004, Workshop on Secure Multiparty Protocols (SMP 2004).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Fuzzy extractors: How to generate strong keys from biometrics and other noisy data

      Dodis, Y., Reyzin, L. & Smith, A., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Cachin, C. & Camenisch, J. (eds.). Springer Verlag, p. 523-540 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3027).

      Research output: Chapter in Book/Report/Conference proceedingChapter

      Open Access
    • ID-based encryption for complex hierarchies with applications to forward security and broadcast encryption

      Yao, D., Dodis, Y., Fazio, N. & Lysyanskaya, A., 2004, Proceedings of the ACM Conference on Computer and Communications Security. Pfitzmann, B. & Liu, P. (eds.). p. 354-363 10 p.

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Improved randomness extraction from two independent sources

      Dodis, Y., Elbaz, A., Oliveira, R. & Raz, R., 2004, In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3122, p. 334-344 11 p.

      Research output: Contribution to journalArticlepeer-review

    • Multiparty quantum coin flipping

      Ambainis, A., Buhrman, H., Dodis, Y. & Röhrig, H., 2004, In: Proceedings of the Annual IEEE Conference on Computational Complexity. 19, p. 250-259 10 p.

      Research output: Contribution to journalConference articlepeer-review

    Your message has successfully been sent.
    Your message was not sent due to an error.