No photo of Yevgeniy Dodis

Yevgeniy Dodis

Professor of Computer Science

    19982023

    Research activity per year

    Filter
    Chapter

    Search results

    • 2009

      Forward-secure hierarchical IBE with applications to broadcast encryption

      Yao, D., Fazio, N., Dodis, Y. & Lysyanskaya, A., 2009, Identity-Based Cryptography. IOS Press, p. 100-118 19 p. (Cryptology and Information Security Series; vol. 2).

      Research output: Chapter in Book/Report/Conference proceedingChapter

    • 2007

      Cryptography and game theory

      Dodis, Y. & Rabin, T., Jan 1 2007, Algorithmic Game Theory. Cambridge University Press, Vol. 9780521872829. p. 181-206 26 p.

      Research output: Chapter in Book/Report/Conference proceedingChapter

    • Fuzzy extractors

      Dodis, Y., Reyzin, L. & Smith, A., 2007, Security with Noisy Data: On Private Biometrics, Secure Key Storage and Anti-Counterfeiting. Springer London, p. 79-99 21 p.

      Research output: Chapter in Book/Report/Conference proceedingChapter

    • 2004

      Anonymous identification in ad hoc groups

      Dodis, Y., Kiayias, A., Nicolosi, A. & Shoup, V., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Cachin, C. & Camenisch, J. (eds.). Springer Verlag, p. 609-626 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3027).

      Research output: Chapter in Book/Report/Conference proceedingChapter

      Open Access
    • Fuzzy extractors: How to generate strong keys from biometrics and other noisy data

      Dodis, Y., Reyzin, L. & Smith, A., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Cachin, C. & Camenisch, J. (eds.). Springer Verlag, p. 523-540 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3027).

      Research output: Chapter in Book/Report/Conference proceedingChapter

      Open Access
    • Randomness extraction and key derivation using the CBC, Cascade and HMAC Modes

      Dodis, Y., Gennaro, R., Håstad, J., Krawczyk, H. & Rabin, T., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Franklin, M. (ed.). Springer Verlag, p. 494-510 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3152).

      Research output: Chapter in Book/Report/Conference proceedingChapter

      Open Access
    Your message has successfully been sent.
    Your message was not sent due to an error.