No photo of Yevgeniy Dodis

Yevgeniy Dodis

Professor of Computer Science

    19982023

    Research activity per year

    Filter
    Conference contribution

    Search results

    • 2023

      End-to-End Encrypted Zoom Meetings: Proving Security and Strengthening Liveness

      Dodis, Y., Jost, D., Kesavan, B. & Marcedone, A., 2023, Advances in Cryptology – EUROCRYPT 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Hazay, C. & Stam, M. (eds.). Springer Science and Business Media Deutschland GmbH, p. 157-189 33 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14008 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Immunizing Backdoored PRGs

      Ball, M., Dodis, Y. & Goldin, E., 2023, Theory of Cryptography - 21st International Conference, TCC 2023, Proceedings. Rothblum, G. & Wee, H. (eds.). Springer Science and Business Media Deutschland GmbH, p. 153-182 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14371 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Random Oracle Combiners: Breaking the Concatenation Barrier for Collision-Resistance

      Dodis, Y., Ferguson, N., Goldin, E., Hall, P. & Pietrzak, K., 2023, Advances in Cryptology – CRYPTO 2023 - 43rd Annual International Cryptology Conference, CRYPTO 2023, Proceedings, Part II. Handschuh, H. & Lysyanskaya, A. (eds.). Springer Science and Business Media Deutschland GmbH, p. 514-546 33 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14082 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Security with Functional Re-encryption from CPA

      Dodis, Y., Halevi, S. & Wichs, D., 2023, Theory of Cryptography - 21st International Conference, TCC 2023, Proceedings. Rothblum, G. & Wee, H. (eds.). Springer Science and Business Media Deutschland GmbH, p. 279-305 27 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14370 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Speak Much, Remember Little: Cryptography in the Bounded Storage Model, Revisited

      Dodis, Y., Quach, W. & Wichs, D., 2023, Advances in Cryptology – EUROCRYPT 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Hazay, C. & Stam, M. (eds.). Springer Science and Business Media Deutschland GmbH, p. 86-116 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14004 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • 2022

      Authentication in the Bounded Storage Model

      Dodis, Y., Quach, W. & Wichs, D., 2022, Advances in Cryptology – EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2022, Proceedings. Dunkelman, O. & Dziembowski, S. (eds.). Springer Science and Business Media Deutschland GmbH, p. 737-766 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13277 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Encapsulated Search Index: Public-Key, Sub-linear, Distributed, and Delegatable

      Aronesty, E., Cash, D., Dodis, Y., Gallancy, D. H., Higley, C., Karthikeyan, H. & Tysor, O., 2022, Public-Key Cryptography - PKC 2022 - 25th IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings. Hanaoka, G., Shikata, J. & Watanabe, Y. (eds.). Springer Science and Business Media Deutschland GmbH, p. 256-285 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13178 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Forward-Secure Encryption with Fast Forwarding

      Dodis, Y., Jost, D. & Karthikeyan, H., 2022, Theory of Cryptography - 20th International Conference, TCC 2022, Proceedings. Kiltz, E. & Vaikuntanathan, V. (eds.). Springer Science and Business Media Deutschland GmbH, p. 3-32 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13748 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Multicast Key Agreement, Revisited

      Bienstock, A., Dodis, Y. & Tang, Y., 2022, Topics in Cryptology - CT-RSA 2022 - Cryptographers’ Track at the RSA Conference, 2022, Proceedings. Galbraith, S. D. (ed.). Springer Science and Business Media Deutschland GmbH, p. 1-25 25 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13161 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • On Seedless PRNGs and Premature Next

      Coretti, S., Dodis, Y., Karthikeyan, H., Stephens-Davidowitz, N. & Tessaro, S., Jul 1 2022, 3rd Conference on Information-Theoretic Cryptography, ITC 2022. Dachman-Soled, D. (ed.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, 9. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 230).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • On the Worst-Case Inefficiency of CGKA

      Bienstock, A., Dodis, Y., Garg, S., Grogan, G., Hajiabadi, M. & Rösler, P., 2022, Theory of Cryptography - 20th International Conference, TCC 2022, Proceedings. Kiltz, E. & Vaikuntanathan, V. (eds.). Springer Science and Business Media Deutschland GmbH, p. 213-243 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13748 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Revisiting Collision and Local Opening Analysis of ABR Hash

      Dhar, C., Dodis, Y. & Nandi, M., Jul 1 2022, 3rd Conference on Information-Theoretic Cryptography, ITC 2022. Dachman-Soled, D. (ed.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, 11. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 230).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Rotatable Zero Knowledge Sets: Post Compromise Secure Auditable Dictionaries with Application to Key Transparency

      Chen, B., Dodis, Y., Ghosh, E., Goldin, E., Kesavan, B., Marcedone, A. & Mou, M. E., 2022, Advances in Cryptology – ASIACRYPT 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, 2022, Proceedings. Agrawal, S. & Lin, D. (eds.). Springer Science and Business Media Deutschland GmbH, p. 547-580 34 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13793 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Small-Box Cryptography

      Dodis, Y., Karthikeyan, H. & Wichs, D., Jan 1 2022, 13th Innovations in Theoretical Computer Science Conference, ITCS 2022. Braverman, M. (ed.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, 56. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 215).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • 2021

      Doubly-affine extractors, and their applications

      Dodis, Y. & Yeo, K., Jul 1 2021, 2nd Conference on Information-Theoretic Cryptography, ITC 2021. Tessaro, S. (ed.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, 13. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 199).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Forward Secret Encrypted RAM: Lower Bounds and Applications

      Bienstock, A., Dodis, Y. & Yeo, K., 2021, Theory of Cryptography - 19th International Conference, TCC 2021, Proceedings. Nissim, K., Waters, B. & Waters, B. (eds.). Springer Science and Business Media Deutschland GmbH, p. 62-93 32 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13044 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Modular Design of Secure Group Messaging Protocols and the Security of MLS

      Alwen, J., Coretti, S., Dodis, Y. & Tselekounis, Y., Nov 12 2021, CCS 2021 - Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 1463-1483 21 p. (Proceedings of the ACM Conference on Computer and Communications Security).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • No Time to Hash: On Super-Efficient Entropy Accumulation

      Dodis, Y., Guo, S., Stephens-Davidowitz, N. & Xie, Z., 2021, Advances in Cryptology – CRYPTO 2021 - 41st Annual International Cryptology Conference, CRYPTO 2021, Proceedings. Malkin, T. & Peikert, C. (eds.). Springer Science and Business Media Deutschland GmbH, p. 548-576 29 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12828 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Online linear extractors for independent sources

      Dodis, Y., Guo, S., Stephens-Davidowitz, N. & Xie, Z., Jul 1 2021, 2nd Conference on Information-Theoretic Cryptography, ITC 2021. Tessaro, S. (ed.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, 14. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 199).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • T5: Hashing five inputs with three compression calls

      Dodis, Y., Khovratovich, D., Mouha, N. & Nandi, M., Jul 1 2021, 2nd Conference on Information-Theoretic Cryptography, ITC 2021. Tessaro, S. (ed.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, 24. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 199).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Updatable Public Key Encryption in the Standard Model

      Dodis, Y., Karthikeyan, H. & Wichs, D., 2021, Theory of Cryptography - 19th International Conference, TCC 2021, Proceedings. Nissim, K., Waters, B. & Waters, B. (eds.). Springer Science and Business Media Deutschland GmbH, p. 254-285 32 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13044 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • 2020

      Extracting randomness from extractor-dependent sources

      Dodis, Y., Vaikuntanathan, V. & Wichs, D., 2020, Advances in Cryptology – EUROCRYPT 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Canteaut, A. & Ishai, Y. (eds.). Springer, p. 313-342 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12105 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • On the price of concurrency in group ratcheting protocols

      Bienstock, A., Dodis, Y. & Rösler, P., 2020, Theory of Cryptography - 18th International Conference, TCC 2020, Proceedings. Pass, R. & Pietrzak, K. (eds.). Springer Science and Business Media Deutschland GmbH, p. 198-228 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12551 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Security analysis and improvements for the ietf mls standard for group messaging

      Alwen, J., Coretti, S., Dodis, Y. & Tselekounis, Y., 2020, Advances in Cryptology - CRYPTO 2020 - 40th Annual International Cryptology Conference, CRYPTO 2020, Proceedings. Micciancio, D. & Ristenpart, T. (eds.). Springer, p. 248-277 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12170 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Towards defeating backdoored random oracles: Indifferentiability with bounded adaptivity

      Dodis, Y., Farshim, P., Mazaheri, S. & Tessaro, S., 2020, Theory of Cryptography - 18th International Conference, TCC 2020, Proceedings. Pass, R. & Pietrzak, K. (eds.). Springer Science and Business Media Deutschland GmbH, p. 241-273 33 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12552 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • 2019

      Reusable Non-Interactive Secure Computation

      Chase, M., Dodis, Y., Ishai, Y., Kraschewski, D., Liu, T., Ostrovsky, R. & Vaikuntanathan, V., 2019, Advances in Cryptology – CRYPTO 2019 - 39th Annual International Cryptology Conference, Proceedings. Micciancio, D. & Boldyreva, A. (eds.). Springer Verlag, p. 462-488 27 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11694 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Seedless Fruit Is the Sweetest: Random Number Generation, Revisited

      Coretti, S., Dodis, Y., Karthikeyan, H. & Tessaro, S., 2019, Advances in Cryptology – CRYPTO 2019 - 39th Annual International Cryptology Conference, Proceedings. Micciancio, D. & Boldyreva, A. (eds.). Springer Verlag, p. 205-234 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11692 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • The double ratchet: Security notions, proofs, and modularization for the signal protocol

      Alwen, J., Coretti, S. & Dodis, Y., 2019, Advances in Cryptology – EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Rijmen, V. & Ishai, Y. (eds.). Springer Verlag, p. 129-158 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11476 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • 2018

      Fast message franking: From invisible salamanders to encryptment

      Dodis, Y., Grubbs, P., Ristenpart, T. & Woodage, J., 2018, Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, 2018, Proceedings. Boldyreva, A. & Shacham, H. (eds.). Springer Verlag, p. 155-186 32 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10991 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Non-uniform bounds in the random-permutation, ideal-cipher, and generic-group models

      Coretti, S., Dodis, Y. & Guo, S., 2018, Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, 2018, Proceedings. Boldyreva, A. & Shacham, H. (eds.). Springer Verlag, p. 693-721 29 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10991 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Provable security of (tweakable) block ciphers based on substitution-permutation networks

      Cogliati, B., Dodis, Y., Katz, J., Lee, J., Steinberger, J., Thiruvengadam, A. & Zhang, Z., 2018, Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, 2018, Proceedings. Boldyreva, A. & Shacham, H. (eds.). Springer Verlag, p. 722-753 32 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10991 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Random oracles and non-uniformity

      Coretti, S., Dodis, Y., Guo, S. & Steinberger, J., 2018, Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2018 Proceedings. Nielsen, J. B. & Rijmen, V. (eds.). Springer Verlag, p. 227-258 32 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10820 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • 2017

      A new distribution-sensitive secure sketch and popularity-proportional hashing

      Woodage, J., Chatterjee, R., Dodis, Y., Juels, A. & Ristenpart, T., 2017, Advances in Cryptology – CRYPTO 2017 - 37th Annual International Cryptology Conference, Proceedings. Katz, J. & Shacham, H. (eds.). Springer Verlag, p. 682-710 29 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10403 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Fixing cracks in the concrete: Random oracles with auxiliary input, revisited

      Dodis, Y., Guo, S. & Katz, J., 2017, Advances in Cryptology – EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Coron, J.-S. & Nielsen, J. B. (eds.). Springer Verlag, p. 473-495 23 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10211 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Unilaterally-authenticated key exchange

      Dodis, Y. & Fiore, D., 2017, Financial Cryptography and Data Security - 21st International Conference, FC 2017, Revised Selected Papers. Kiayias, A. (ed.). Springer Verlag, p. 542-560 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10322 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • 2016

      Indifferentiability of confusion-diffusion networks

      Dodis, Y., Stam, M., Steinberger, J. & Liu, T., 2016, Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Fischlin, M. & Coron, J.-S. (eds.). Springer Verlag, p. 679-704 26 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9666).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Interactive coding for interactive proofs

      Bishop, A. & Dodis, Y., 2016, Theory of Cryptography - 3th International Conference, TCC 2016-A, Proceedings. Kushilevitz, E. & Malkin, T. (eds.). Springer Verlag, p. 352-366 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9563).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      Open Access
    • Message transmission with reverse firewalls—Secure communication on corrupted machines

      Dodis, Y., Mironov, I. & Stephens-Davidowitz, N., 2016, Advances in Cryptology - 36th Annual International Cryptology Conference, CRYPTO 2016, Proceedings. Robshaw, M. & Katz, J. (eds.). Springer Verlag, p. 241-372 132 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9814).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Non-malleable encryption: Simpler, shorter, stronger

      Coretti, S., Dodis, Y., Tackmann, B. & Venturi, D., 2016, Theory of Cryptography - 13th International Conference, TCC 2016-A, Proceedings. Kushilevitz, E. & Malkin, T. (eds.). Springer Verlag, p. 306-335 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9562).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      Open Access
    • Spooky encryption and its applications

      Dodis, Y., Halevi, S., Rothblum, R. D. & Wichs, D., 2016, Advances in Cryptology - 36th Annual International Cryptology Conference, CRYPTO 2016, Proceedings. Robshaw, M. & Katz, J. (eds.). Springer Verlag, p. 93-122 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9816).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • 2015

      A formal treatment of backdoored pseudorandom generators

      Dodis, Y., Ganesh, C., Golovnev, A., Juels, A. & Ristenpart, T., 2015, Advances in Cryptology – EUROCRYPT 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Fischlin, M. & Oswald, E. (eds.). Springer Verlag, p. 101-126 26 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9056).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      Open Access
    • Incremental codes

      Dodis, Y. & Halevi, S., 2015, Approximation, Randomization, and Combinatorial Optimization: Algorithms and Techniques - 4th International Workshop on Approximation, Algorithms for Combinatorial Optimization Problems, APPROX 2001 and 5th International Workshop on Randomization and Approximation Techniques in Computer Science, RANDOM 2001, Proceedings. Trevisan, L., Jansen, K., Goemans, M. & Rolim, J. D. P. (eds.). Springer Verlag, p. 75-90 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2129).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Non-malleable reductions and applications

      Aggarwal, D., Dodis, Y., Kazana, T. & Obremski, M., Jun 14 2015, STOC 2015 - Proceedings of the 2015 ACM Symposium on Theory of Computing. Association for Computing Machinery, p. 459-468 10 p. (Proceedings of the Annual ACM Symposium on Theory of Computing; vol. 14-17-June-2015).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      Open Access
    • On randomness, codes and extractors in cryptography

      Dodis, Y., 2015, Progress in Cryptology – INDOCRYPT 2015 - 16th International Conference on Cryptology in India, Proceedings. Biryukov, A. & Goyal, V. (eds.). Springer Verlag, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9462).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Privacy with imperfect randomness

      Dodis, Y. & Yao, Y., 2015, Advances in Cryptology - CRYPTO 2015 - 35th Annual Cryptology Conference, Proceedings. Robshaw, M. & Gennaro, R. (eds.). Springer Verlag, p. 463-482 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9216).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Privacy with imperfect randomness

      Dodis, Y. & Yao, Y., 2015, Advances in Cryptology - CRYPTO 2015 - 35th Annual Cryptology Conference, Proceedings. Springer Verlag, p. 463-482 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9216).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      Open Access
    • Theory of Cryptography: 12th Theory of Cryptography Conference, TCC 2015 Warsaw, Poland, March 23-25, 2015 Proceedings, Part I

      Dodis, Y. & Nielsen, J. B., 2015, Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Proceedings. Dodis, Y. & Nielsen, J. B. (eds.). Springer Verlag, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9014).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Theory of cryptography:12th Theory of cryptography conference, TCC 2015 warsaw, poland, march 23-25, 2015 proceedings, part II

      Dodis, Y. & Nielsen, J. B., 2015, Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Proceedings. Dodis, Y. & Nielsen, J. B. (eds.). Springer Verlag, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9015).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • 2014

      Amplifying privacy in privacy amplification

      Aggarwal, D., Dodis, Y., Jafargholi, Z., Miles, E. & Reyzin, L., 2014, Advances in Cryptology, CRYPTO 2014 - 34th Annual Cryptology Conference, Proceedings. PART 2 ed. Springer Verlag, p. 183-198 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8617 LNCS, no. PART 2).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • How to eat your entropy and have it too - Optimal recovery strategies for compromised RNGs

      Dodis, Y., Shamir, A., Stephens-Davidowitz, N. & Wichs, D., 2014, Advances in Cryptology, CRYPTO 2014 - 34th Annual Cryptology Conference, Proceedings. PART 2 ed. Springer Verlag, p. 37-54 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8617 LNCS, no. PART 2).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Your message has successfully been sent.
    Your message was not sent due to an error.