dblp.uni-trier.dewww.uni-trier.de

Yevgeniy Dodis

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2009
79EEYevgeniy Dodis, Thomas Ristenpart, Thomas Shrimpton: Salvaging Merkle-Damgård for Practical Applications. EUROCRYPT 2009: 371-388
78EEYevgeniy Dodis, Salil P. Vadhan, Daniel Wichs: Proofs of Retrievability via Hardness Amplification. TCC 2009: 109-127
77EEYevgeniy Dodis, Russell Impagliazzo, Ragesh Jaiswal, Valentine Kabanets: Security Amplification for InteractiveCryptographic Primitives. TCC 2009: 128-145
76EEYevgeniy Dodis, Jonathan Katz, Adam Smith, Shabsi Walfish: Composability and On-Line Deniability of Authentication. TCC 2009: 146-162
2008
75EEYevgeniy Dodis, Prashant Puniya: Getting the Best Out of Existing Hash Functions; or What if We Are Stuck with SHA?. ACNS 2008: 156-173
74EEYevgeniy Dodis, Victor Shoup, Shabsi Walfish: Efficient Constructions of Composable Commitments and Zero-Knowledge Proofs. CRYPTO 2008: 515-535
73EEYevgeniy Dodis, Krzysztof Pietrzak, Prashant Puniya: A New Mode of Operation for Block Ciphers and Length-Preserving MACs. EUROCRYPT 2008: 198-219
72EERonald Cramer, Yevgeniy Dodis, Serge Fehr, Carles Padró, Daniel Wichs: Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors. EUROCRYPT 2008: 471-488
71 Yevgeniy Dodis, Pil Joong Lee, Dae Hyun Yum: Optimistic Fair Exchange in a Multi-user Setting. J. UCS 14(3): 318-346 (2008)
70EEYevgeniy Dodis, Rafail Ostrovsky, Leonid Reyzin, Adam Smith: Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data. SIAM J. Comput. 38(1): 97-139 (2008)
2007
69EEYevgeniy Dodis, Prashant Puniya: Feistel Networks Made Public, and Applications. EUROCRYPT 2007: 534-554
68EEYevgeniy Dodis, Krzysztof Pietrzak: Improving the Security of MACs Via Randomized Message Preprocessing. FSE 2007: 414-433
67EEYevgeniy Dodis, Pil Joong Lee, Dae Hyun Yum: Optimistic Fair Exchange in a Multi-user Setting. Public Key Cryptography 2007: 118-133
66EECarl Bosley, Yevgeniy Dodis: Does Privacy Require True Randomness? TCC 2007: 1-20
65EEDavid Cash, Yan Zong Ding, Yevgeniy Dodis, Wenke Lee, Richard J. Lipton, Shabsi Walfish: Intrusion-Resilient Key Exchange in the Bounded Retrieval Model. TCC 2007: 479-498
64EERan Canetti, Yevgeniy Dodis, Rafael Pass, Shabsi Walfish: Universally Composable Security with Global Setup. TCC 2007: 61-85
2006
63 Moti Yung, Yevgeniy Dodis, Aggelos Kiayias, Tal Malkin: Public Key Cryptography - PKC 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings Springer 2006
62EEYevgeniy Dodis, Jonathan Katz, Leonid Reyzin, Adam Smith: Robust Fuzzy Extractors and Authenticated Key Agreement from Close Secrets. CRYPTO 2006: 232-250
61EEYevgeniy Dodis, Renato Renner: On the Impossibility of Extracting Classical Randomness Using a Quantum Computer. ICALP (2) 2006: 204-215
60EERichard Cole, Yevgeniy Dodis, Tim Roughgarden: Bottleneck links, variable demand, and the tragedy of the commons. SODA 2006: 668-677
59EEDario Catalano, Yevgeniy Dodis, Ivan Visconti: Mercurial Commitments: Minimal Assumptions and Efficient Constructions. TCC 2006: 120-144
58EEYevgeniy Dodis, Prashant Puniya: On the Relation Between the Ideal Cipher and the Random Oracle Models. TCC 2006: 184-206
57EEYevgeniy Dodis, Aleksandr Yampolskiy, Moti Yung: Threshold and Proactive Pseudo-Random Permutations. TCC 2006: 542-560
56EEYevgeniy Dodis, Krzysztof Pietrzak, Bartosz Przydatek: Separating Sources for Encryption and Secret Sharing. TCC 2006: 601-616
55EEYevgeniy Dodis, Rafail Ostrovsky, Leonid Reyzin, Adam Smith: Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data CoRR abs/cs/0602007: (2006)
54EECarl Bosley, Yevgeniy Dodis: Does Privacy Require True Randomness?. Electronic Colloquium on Computational Complexity (ECCC) 13(114): (2006)
53EERichard Cole, Yevgeniy Dodis, Tim Roughgarden: How much can taxes help selfish routing? J. Comput. Syst. Sci. 72(3): 444-467 (2006)
2005
52EEJean-Sébastien Coron, Yevgeniy Dodis, Cécile Malinaud, Prashant Puniya: Merkle-Damgård Revisited: How to Construct a Hash Function. CRYPTO 2005: 430-448
51EEYevgeniy Dodis, Roberto Oliveira, Krzysztof Pietrzak: On the Generic Insecurity of the Full Domain Hash. CRYPTO 2005: 449-466
50EEXavier Boyen, Yevgeniy Dodis, Jonathan Katz, Rafail Ostrovsky, Adam Smith: Secure Remote Authentication Using Biometric Data. EUROCRYPT 2005: 147-163
49EEYevgeniy Dodis, Dae Hyun Yum: Time Capsule Signature. Financial Cryptography 2005: 57-71
48EEYevgeniy Dodis, Aleksandr Yampolskiy: A Verifiable Random Function with Short Proofs and Keys. Public Key Cryptography 2005: 416-431
47EEYevgeniy Dodis, Adam Smith: Correcting errors without leaking partial information. STOC 2005: 654-663
46EEYevgeniy Dodis, Jonathan Katz: Chosen-Ciphertext Security of Multiple Encryption. TCC 2005: 188-209
45EEYevgeniy Dodis, Adam Smith: Entropic Security and the Encryption of High Entropy Messages. TCC 2005: 556-577
44EEYevgeniy Dodis: Signcryption. Encyclopedia of Cryptography and Security 2005
43EEYevgeniy Dodis, Nelly Fazio, Aggelos Kiayias, Moti Yung: Scalable public-key tracing and revoking. Distributed Computing 17(4): 323-347 (2005)
2004
42EEYevgeniy Dodis, Michael J. Freedman, Stanislaw Jarecki, Shabsi Walfish: Versatile padding schemes for joint signature and encryption. ACM Conference on Computer and Communications Security 2004: 344-353
41EEDanfeng Yao, Nelly Fazio, Yevgeniy Dodis, Anna Lysyanskaya: ID-based encryption for complex hierarchies with applications to forward security and broadcast encryption. ACM Conference on Computer and Communications Security 2004: 354-363
40EEYevgeniy Dodis, Ariel Elbaz, Roberto Oliveira, Ran Raz: Improved Randomness Extraction from Two Independent Sources. APPROX-RANDOM 2004: 334-344
39EEYevgeniy Dodis, Rosario Gennaro, Johan Håstad, Hugo Krawczyk, Tal Rabin: Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes. CRYPTO 2004: 494-510
38EEYevgeniy Dodis, Matthew K. Franklin, Jonathan Katz, Atsuko Miyaji, Moti Yung: A Generic Construction for Intrusion-Resilient Public-Key Encryption. CT-RSA 2004: 81-98
37EEYevgeniy Dodis, Leonid Reyzin, Adam Smith: Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data. EUROCRYPT 2004: 523-540
36EEYevgeniy Dodis, Aggelos Kiayias, Antonio Nicolosi, Victor Shoup: Anonymous Identification in Ad Hoc Groups. EUROCRYPT 2004: 609-626
35EEYevgeniy Dodis, Shien Jin Ong, Manoj Prabhakaran, Amit Sahai: On the (Im)possibility of Cryptography with Imperfect Randomness. FOCS 2004: 196-205
34EEAndris Ambainis, Harry Buhrman, Yevgeniy Dodis, Hein Röhrig: Multiparty Quantum Coin Flipping. IEEE Conference on Computational Complexity 2004: 250-259
2003
33EERichard Cole, Yevgeniy Dodis, Tim Roughgarden: How much can taxes help selfish routing? ACM Conference on Electronic Commerce 2003: 98-107
32EEYevgeniy Dodis, Matthew K. Franklin, Jonathan Katz, Atsuko Miyaji, Moti Yung: Intrusion-Resilient Public-Key Encryption. CT-RSA 2003: 19-32
31EEYevgeniy Dodis, Leonid Reyzin: Breaking and repairing optimistic fair exchange from PODC 2003. Digital Rights Management Workshop 2003: 47-54
30EEYevgeniy Dodis, Jee Hea An: Concealment and Its Applications to Authenticated Encryption. EUROCRYPT 2003: 312-329
29EEAntonio Nicolosi, Maxwell N. Krohn, Yevgeniy Dodis, David Mazières: Proactive Two-Party Signatures for User Authentication. NDSS 2003
28EEAnca-Andreea Ivan, Yevgeniy Dodis: Proxy Cryptography Revisited. NDSS 2003
27EEYevgeniy Dodis, Nelly Fazio, Aggelos Kiayias, Moti Yung: Scalable public-key tracing and revoking. PODC 2003: 190-199
26EEYevgeniy Dodis: Efficient Construction of (Distributed) Verifiable Random Functions. Public Key Cryptography 2003: 1-17
25EEYevgeniy Dodis, Nelly Fazio: Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack. Public Key Cryptography 2003: 100-115
24EEYevgeniy Dodis, Jonathan Katz, Shouhuai Xu, Moti Yung: Strong Key-Insulated Signature Schemes. Public Key Cryptography 2003: 130-144
23EEYevgeniy Dodis, Roberto Oliveira: On Extracting Private Randomness over a Public Channel. RANDOM-APPROX 2003: 252-263
22EERichard Cole, Yevgeniy Dodis, Tim Roughgarden: Pricing network edges for heterogeneous selfish users. STOC 2003: 521-530
21EEAndris Ambainis, Harry Buhrman, Yevgeniy Dodis, Hein Röhrig: Multiparty Quantum Coin Flipping CoRR quant-ph/0304112: (2003)
2002
20EEYevgeniy Dodis, Nelly Fazio: Public Key Broadcast Encryption for Stateless Receivers. Digital Rights Management Workshop 2002: 61-80
19EEYevgeniy Dodis, Jonathan Katz, Shouhuai Xu, Moti Yung: Key-Insulated Public Key Cryptosystems. EUROCRYPT 2002: 65-82
18EEJee Hea An, Yevgeniy Dodis, Tal Rabin: On the Security of Joint Signature and Encryption. EUROCRYPT 2002: 83-107
17EEYevgeniy Dodis, Joel Spencer: On the (non)Universality of the One-Time Pad. FOCS 2002: 376-
16EEYevgeniy Dodis, Moti Yung: Exposure-Resilience for Free: The Hierarchical ID-based Encryption Case. IEEE Security in Storage Workshop 2002: 45-52
15EEYevgeniy Dodis, Leonid Reyzin: On the Power of Claw-Free Permutations. SCN 2002: 55-73
2001
14EEYevgeniy Dodis, Amit Sahai, Adam Smith: On Perfect and Adaptive Security in Exposure-Resilient Cryptography. EUROCRYPT 2001: 301-324
13EEYevgeniy Dodis: New Imperfect Random Source with Applications to Coin-Flipping. ICALP 2001: 297-309
12EEYevgeniy Dodis, Shai Halevi: Incremental Codes. RANDOM-APPROX 2001: 75-89
11EEYevgeniy Dodis, Peter Winkler: Universal configurations in light-flipping games. SODA 2001: 926-927
2000
10EEYevgeniy Dodis, Shai Halevi, Tal Rabin: A Cryptographic Solution to a Game Theoretic Problem. CRYPTO 2000: 112-130
9EEYevgeniy Dodis, Silvio Micali: Parallel Reducibility for Information-Theoretically Secure Computation. CRYPTO 2000: 74-92
8EERan Canetti, Yevgeniy Dodis, Shai Halevi, Eyal Kushilevitz, Amit Sahai: Exposure-Resilient Functions and All-or-Nothing Transforms. EUROCRYPT 2000: 453-469
7EEYevgeniy Dodis: Impossibility of Black-Box Reduction from Non-Adaptively to Adaptively Secure Coin-Flipping Electronic Colloquium on Computational Complexity (ECCC) 7(39): (2000)
1999
6EEYevgeniy Dodis, Silvio Micali: Lower Bounds for Oblivious Transfer Reductions. EUROCRYPT 1999: 42-55
5EEYevgeniy Dodis, Sanjeev Khanna: Space Time Tradeoffs for Graph Properties. ICALP 1999: 291-300
4 Yevgeniy Dodis, Oded Goldreich, Eric Lehman, Sofya Raskhodnikova, Dana Ron, Alex Samorodnitsky: Improved Testing Algorithms for Monotonicity. RANDOM-APPROX 1999: 97-108
3EEYevgeniy Dodis, Venkatesan Guruswami, Sanjeev Khanna: The 2-Catalog Segmentation Problem. SODA 1999: 897-898
2EEYevgeniy Dodis, Sanjeev Khanna: Design Networks with Bounded Pairwise Distance. STOC 1999: 750-759
1EEYevgeniy Dodis, Oded Goldreich, Eric Lehman, Sofya Raskhodnikova, Dana Ron, Alex Samorodnitsky: Improved Testing Algorithms for Monotonicity. Electronic Colloquium on Computational Complexity (ECCC) 6(17): (1999)

Coauthor Index

1Andris Ambainis [21] [34]
2Jee Hea An [18] [30]
3Carl Bosley [54] [66]
4Xavier Boyen [50]
5Harry Buhrman [21] [34]
6Ran Canetti [8] [64]
7David Cash [65]
8Dario Catalano [59]
9Richard Cole [22] [33] [53] [60]
10Jean-Sébastien Coron [52]
11Ronald Cramer [72]
12Yan Zong Ding [65]
13Ariel Elbaz [40]
14Nelly Fazio [20] [25] [27] [41] [43]
15Serge Fehr [72]
16Matthew K. Franklin [32] [38]
17Michael J. Freedman [42]
18Rosario Gennaro [39]
19Oded Goldreich [1] [4]
20Venkatesan Guruswami [3]
21Shai Halevi [8] [10] [12]
22Johan Håstad [39]
23Russell Impagliazzo [77]
24Anca-Andreea Ivan [28]
25Ragesh Jaiswal [77]
26Stanislaw Jarecki [42]
27Valentine Kabanets [77]
28Jonathan Katz [19] [24] [32] [38] [46] [50] [62] [76]
29Sanjeev Khanna [2] [3] [5]
30Aggelos Kiayias [27] [36] [43] [63]
31Hugo Krawczyk [39]
32Maxwell N. Krohn [29]
33Eyal Kushilevitz [8]
34Pil Joong Lee [67] [71]
35Wenke Lee [65]
36Eric Lehman [1] [4]
37Richard J. Lipton [65]
38Anna Lysyanskaya [41]
39Cécile Malinaud [52]
40Tal Malkin [63]
41David Mazières [29]
42Silvio Micali [6] [9]
43Atsuko Miyaji [32] [38]
44Antonio Nicolosi [29] [36]
45Roberto Oliveira [23] [40] [51]
46Shien Jin Ong [35]
47Rafail Ostrovsky [50] [55] [70]
48Carles Padró [72]
49Rafael Pass [64]
50Krzysztof Pietrzak [51] [56] [68] [73]
51Manoj Prabhakaran [35]
52Bartosz Przydatek [56]
53Prashant Puniya [52] [58] [69] [73] [75]
54Tal Rabin [10] [18] [39]
55Sofya Raskhodnikova [1] [4]
56Ran Raz [40]
57Renato Renner [61]
58Leonid Reyzin [15] [31] [37] [55] [62] [70]
59Thomas Ristenpart [79]
60Hein Röhrig [21] [34]
61Dana Ron [1] [4]
62Tim Roughgarden [22] [33] [53] [60]
63Amit Sahai [8] [14] [35]
64Alex Samorodnitsky [1] [4]
65Victor Shoup [36] [74]
66Thomas Shrimpton [79]
67Adam Smith [14] [37] [45] [47] [50] [55] [62] [70] [76]
68Joel H. Spencer (Joel Spencer) [17]
69Salil P. Vadhan [78]
70Ivan Visconti [59]
71Shabsi Walfish [42] [64] [65] [74] [76]
72Daniel Wichs [72] [78]
73Peter Winkler (Peter M. Winkler) [11]
74Shouhuai Xu [19] [24]
75Aleksandr Yampolskiy [48] [57]
76Danfeng Yao (Danfeng (Daphne) Yao) [41]
77Dae Hyun Yum [49] [67] [71]
78Moti Yung (Mordechai M. Yung) [16] [19] [24] [27] [32] [38] [43] [57] [63]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)