2009 |
79 | EE | Yevgeniy Dodis,
Thomas Ristenpart,
Thomas Shrimpton:
Salvaging Merkle-Damgård for Practical Applications.
EUROCRYPT 2009: 371-388 |
78 | EE | Yevgeniy Dodis,
Salil P. Vadhan,
Daniel Wichs:
Proofs of Retrievability via Hardness Amplification.
TCC 2009: 109-127 |
77 | EE | Yevgeniy Dodis,
Russell Impagliazzo,
Ragesh Jaiswal,
Valentine Kabanets:
Security Amplification for InteractiveCryptographic Primitives.
TCC 2009: 128-145 |
76 | EE | Yevgeniy Dodis,
Jonathan Katz,
Adam Smith,
Shabsi Walfish:
Composability and On-Line Deniability of Authentication.
TCC 2009: 146-162 |
2008 |
75 | EE | Yevgeniy Dodis,
Prashant Puniya:
Getting the Best Out of Existing Hash Functions; or What if We Are Stuck with SHA?.
ACNS 2008: 156-173 |
74 | EE | Yevgeniy Dodis,
Victor Shoup,
Shabsi Walfish:
Efficient Constructions of Composable Commitments and Zero-Knowledge Proofs.
CRYPTO 2008: 515-535 |
73 | EE | Yevgeniy Dodis,
Krzysztof Pietrzak,
Prashant Puniya:
A New Mode of Operation for Block Ciphers and Length-Preserving MACs.
EUROCRYPT 2008: 198-219 |
72 | EE | Ronald Cramer,
Yevgeniy Dodis,
Serge Fehr,
Carles Padró,
Daniel Wichs:
Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors.
EUROCRYPT 2008: 471-488 |
71 | | Yevgeniy Dodis,
Pil Joong Lee,
Dae Hyun Yum:
Optimistic Fair Exchange in a Multi-user Setting.
J. UCS 14(3): 318-346 (2008) |
70 | EE | Yevgeniy Dodis,
Rafail Ostrovsky,
Leonid Reyzin,
Adam Smith:
Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data.
SIAM J. Comput. 38(1): 97-139 (2008) |
2007 |
69 | EE | Yevgeniy Dodis,
Prashant Puniya:
Feistel Networks Made Public, and Applications.
EUROCRYPT 2007: 534-554 |
68 | EE | Yevgeniy Dodis,
Krzysztof Pietrzak:
Improving the Security of MACs Via Randomized Message Preprocessing.
FSE 2007: 414-433 |
67 | EE | Yevgeniy Dodis,
Pil Joong Lee,
Dae Hyun Yum:
Optimistic Fair Exchange in a Multi-user Setting.
Public Key Cryptography 2007: 118-133 |
66 | EE | Carl Bosley,
Yevgeniy Dodis:
Does Privacy Require True Randomness?
TCC 2007: 1-20 |
65 | EE | David Cash,
Yan Zong Ding,
Yevgeniy Dodis,
Wenke Lee,
Richard J. Lipton,
Shabsi Walfish:
Intrusion-Resilient Key Exchange in the Bounded Retrieval Model.
TCC 2007: 479-498 |
64 | EE | Ran Canetti,
Yevgeniy Dodis,
Rafael Pass,
Shabsi Walfish:
Universally Composable Security with Global Setup.
TCC 2007: 61-85 |
2006 |
63 | | Moti Yung,
Yevgeniy Dodis,
Aggelos Kiayias,
Tal Malkin:
Public Key Cryptography - PKC 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings
Springer 2006 |
62 | EE | Yevgeniy Dodis,
Jonathan Katz,
Leonid Reyzin,
Adam Smith:
Robust Fuzzy Extractors and Authenticated Key Agreement from Close Secrets.
CRYPTO 2006: 232-250 |
61 | EE | Yevgeniy Dodis,
Renato Renner:
On the Impossibility of Extracting Classical Randomness Using a Quantum Computer.
ICALP (2) 2006: 204-215 |
60 | EE | Richard Cole,
Yevgeniy Dodis,
Tim Roughgarden:
Bottleneck links, variable demand, and the tragedy of the commons.
SODA 2006: 668-677 |
59 | EE | Dario Catalano,
Yevgeniy Dodis,
Ivan Visconti:
Mercurial Commitments: Minimal Assumptions and Efficient Constructions.
TCC 2006: 120-144 |
58 | EE | Yevgeniy Dodis,
Prashant Puniya:
On the Relation Between the Ideal Cipher and the Random Oracle Models.
TCC 2006: 184-206 |
57 | EE | Yevgeniy Dodis,
Aleksandr Yampolskiy,
Moti Yung:
Threshold and Proactive Pseudo-Random Permutations.
TCC 2006: 542-560 |
56 | EE | Yevgeniy Dodis,
Krzysztof Pietrzak,
Bartosz Przydatek:
Separating Sources for Encryption and Secret Sharing.
TCC 2006: 601-616 |
55 | EE | Yevgeniy Dodis,
Rafail Ostrovsky,
Leonid Reyzin,
Adam Smith:
Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
CoRR abs/cs/0602007: (2006) |
54 | EE | Carl Bosley,
Yevgeniy Dodis:
Does Privacy Require True Randomness?.
Electronic Colloquium on Computational Complexity (ECCC) 13(114): (2006) |
53 | EE | Richard Cole,
Yevgeniy Dodis,
Tim Roughgarden:
How much can taxes help selfish routing?
J. Comput. Syst. Sci. 72(3): 444-467 (2006) |
2005 |
52 | EE | Jean-Sébastien Coron,
Yevgeniy Dodis,
Cécile Malinaud,
Prashant Puniya:
Merkle-Damgård Revisited: How to Construct a Hash Function.
CRYPTO 2005: 430-448 |
51 | EE | Yevgeniy Dodis,
Roberto Oliveira,
Krzysztof Pietrzak:
On the Generic Insecurity of the Full Domain Hash.
CRYPTO 2005: 449-466 |
50 | EE | Xavier Boyen,
Yevgeniy Dodis,
Jonathan Katz,
Rafail Ostrovsky,
Adam Smith:
Secure Remote Authentication Using Biometric Data.
EUROCRYPT 2005: 147-163 |
49 | EE | Yevgeniy Dodis,
Dae Hyun Yum:
Time Capsule Signature.
Financial Cryptography 2005: 57-71 |
48 | EE | Yevgeniy Dodis,
Aleksandr Yampolskiy:
A Verifiable Random Function with Short Proofs and Keys.
Public Key Cryptography 2005: 416-431 |
47 | EE | Yevgeniy Dodis,
Adam Smith:
Correcting errors without leaking partial information.
STOC 2005: 654-663 |
46 | EE | Yevgeniy Dodis,
Jonathan Katz:
Chosen-Ciphertext Security of Multiple Encryption.
TCC 2005: 188-209 |
45 | EE | Yevgeniy Dodis,
Adam Smith:
Entropic Security and the Encryption of High Entropy Messages.
TCC 2005: 556-577 |
44 | EE | Yevgeniy Dodis:
Signcryption.
Encyclopedia of Cryptography and Security 2005 |
43 | EE | Yevgeniy Dodis,
Nelly Fazio,
Aggelos Kiayias,
Moti Yung:
Scalable public-key tracing and revoking.
Distributed Computing 17(4): 323-347 (2005) |
2004 |
42 | EE | Yevgeniy Dodis,
Michael J. Freedman,
Stanislaw Jarecki,
Shabsi Walfish:
Versatile padding schemes for joint signature and encryption.
ACM Conference on Computer and Communications Security 2004: 344-353 |
41 | EE | Danfeng Yao,
Nelly Fazio,
Yevgeniy Dodis,
Anna Lysyanskaya:
ID-based encryption for complex hierarchies with applications to forward security and broadcast encryption.
ACM Conference on Computer and Communications Security 2004: 354-363 |
40 | EE | Yevgeniy Dodis,
Ariel Elbaz,
Roberto Oliveira,
Ran Raz:
Improved Randomness Extraction from Two Independent Sources.
APPROX-RANDOM 2004: 334-344 |
39 | EE | Yevgeniy Dodis,
Rosario Gennaro,
Johan Håstad,
Hugo Krawczyk,
Tal Rabin:
Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes.
CRYPTO 2004: 494-510 |
38 | EE | Yevgeniy Dodis,
Matthew K. Franklin,
Jonathan Katz,
Atsuko Miyaji,
Moti Yung:
A Generic Construction for Intrusion-Resilient Public-Key Encryption.
CT-RSA 2004: 81-98 |
37 | EE | Yevgeniy Dodis,
Leonid Reyzin,
Adam Smith:
Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data.
EUROCRYPT 2004: 523-540 |
36 | EE | Yevgeniy Dodis,
Aggelos Kiayias,
Antonio Nicolosi,
Victor Shoup:
Anonymous Identification in Ad Hoc Groups.
EUROCRYPT 2004: 609-626 |
35 | EE | Yevgeniy Dodis,
Shien Jin Ong,
Manoj Prabhakaran,
Amit Sahai:
On the (Im)possibility of Cryptography with Imperfect Randomness.
FOCS 2004: 196-205 |
34 | EE | Andris Ambainis,
Harry Buhrman,
Yevgeniy Dodis,
Hein Röhrig:
Multiparty Quantum Coin Flipping.
IEEE Conference on Computational Complexity 2004: 250-259 |
2003 |
33 | EE | Richard Cole,
Yevgeniy Dodis,
Tim Roughgarden:
How much can taxes help selfish routing?
ACM Conference on Electronic Commerce 2003: 98-107 |
32 | EE | Yevgeniy Dodis,
Matthew K. Franklin,
Jonathan Katz,
Atsuko Miyaji,
Moti Yung:
Intrusion-Resilient Public-Key Encryption.
CT-RSA 2003: 19-32 |
31 | EE | Yevgeniy Dodis,
Leonid Reyzin:
Breaking and repairing optimistic fair exchange from PODC 2003.
Digital Rights Management Workshop 2003: 47-54 |
30 | EE | Yevgeniy Dodis,
Jee Hea An:
Concealment and Its Applications to Authenticated Encryption.
EUROCRYPT 2003: 312-329 |
29 | EE | Antonio Nicolosi,
Maxwell N. Krohn,
Yevgeniy Dodis,
David Mazières:
Proactive Two-Party Signatures for User Authentication.
NDSS 2003 |
28 | EE | Anca-Andreea Ivan,
Yevgeniy Dodis:
Proxy Cryptography Revisited.
NDSS 2003 |
27 | EE | Yevgeniy Dodis,
Nelly Fazio,
Aggelos Kiayias,
Moti Yung:
Scalable public-key tracing and revoking.
PODC 2003: 190-199 |
26 | EE | Yevgeniy Dodis:
Efficient Construction of (Distributed) Verifiable Random Functions.
Public Key Cryptography 2003: 1-17 |
25 | EE | Yevgeniy Dodis,
Nelly Fazio:
Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack.
Public Key Cryptography 2003: 100-115 |
24 | EE | Yevgeniy Dodis,
Jonathan Katz,
Shouhuai Xu,
Moti Yung:
Strong Key-Insulated Signature Schemes.
Public Key Cryptography 2003: 130-144 |
23 | EE | Yevgeniy Dodis,
Roberto Oliveira:
On Extracting Private Randomness over a Public Channel.
RANDOM-APPROX 2003: 252-263 |
22 | EE | Richard Cole,
Yevgeniy Dodis,
Tim Roughgarden:
Pricing network edges for heterogeneous selfish users.
STOC 2003: 521-530 |
21 | EE | Andris Ambainis,
Harry Buhrman,
Yevgeniy Dodis,
Hein Röhrig:
Multiparty Quantum Coin Flipping
CoRR quant-ph/0304112: (2003) |
2002 |
20 | EE | Yevgeniy Dodis,
Nelly Fazio:
Public Key Broadcast Encryption for Stateless Receivers.
Digital Rights Management Workshop 2002: 61-80 |
19 | EE | Yevgeniy Dodis,
Jonathan Katz,
Shouhuai Xu,
Moti Yung:
Key-Insulated Public Key Cryptosystems.
EUROCRYPT 2002: 65-82 |
18 | EE | Jee Hea An,
Yevgeniy Dodis,
Tal Rabin:
On the Security of Joint Signature and Encryption.
EUROCRYPT 2002: 83-107 |
17 | EE | Yevgeniy Dodis,
Joel Spencer:
On the (non)Universality of the One-Time Pad.
FOCS 2002: 376- |
16 | EE | Yevgeniy Dodis,
Moti Yung:
Exposure-Resilience for Free: The Hierarchical ID-based Encryption Case.
IEEE Security in Storage Workshop 2002: 45-52 |
15 | EE | Yevgeniy Dodis,
Leonid Reyzin:
On the Power of Claw-Free Permutations.
SCN 2002: 55-73 |
2001 |
14 | EE | Yevgeniy Dodis,
Amit Sahai,
Adam Smith:
On Perfect and Adaptive Security in Exposure-Resilient Cryptography.
EUROCRYPT 2001: 301-324 |
13 | EE | Yevgeniy Dodis:
New Imperfect Random Source with Applications to Coin-Flipping.
ICALP 2001: 297-309 |
12 | EE | Yevgeniy Dodis,
Shai Halevi:
Incremental Codes.
RANDOM-APPROX 2001: 75-89 |
11 | EE | Yevgeniy Dodis,
Peter Winkler:
Universal configurations in light-flipping games.
SODA 2001: 926-927 |
2000 |
10 | EE | Yevgeniy Dodis,
Shai Halevi,
Tal Rabin:
A Cryptographic Solution to a Game Theoretic Problem.
CRYPTO 2000: 112-130 |
9 | EE | Yevgeniy Dodis,
Silvio Micali:
Parallel Reducibility for Information-Theoretically Secure Computation.
CRYPTO 2000: 74-92 |
8 | EE | Ran Canetti,
Yevgeniy Dodis,
Shai Halevi,
Eyal Kushilevitz,
Amit Sahai:
Exposure-Resilient Functions and All-or-Nothing Transforms.
EUROCRYPT 2000: 453-469 |
7 | EE | Yevgeniy Dodis:
Impossibility of Black-Box Reduction from Non-Adaptively to Adaptively Secure Coin-Flipping
Electronic Colloquium on Computational Complexity (ECCC) 7(39): (2000) |
1999 |
6 | EE | Yevgeniy Dodis,
Silvio Micali:
Lower Bounds for Oblivious Transfer Reductions.
EUROCRYPT 1999: 42-55 |
5 | EE | Yevgeniy Dodis,
Sanjeev Khanna:
Space Time Tradeoffs for Graph Properties.
ICALP 1999: 291-300 |
4 | | Yevgeniy Dodis,
Oded Goldreich,
Eric Lehman,
Sofya Raskhodnikova,
Dana Ron,
Alex Samorodnitsky:
Improved Testing Algorithms for Monotonicity.
RANDOM-APPROX 1999: 97-108 |
3 | EE | Yevgeniy Dodis,
Venkatesan Guruswami,
Sanjeev Khanna:
The 2-Catalog Segmentation Problem.
SODA 1999: 897-898 |
2 | EE | Yevgeniy Dodis,
Sanjeev Khanna:
Design Networks with Bounded Pairwise Distance.
STOC 1999: 750-759 |
1 | EE | Yevgeniy Dodis,
Oded Goldreich,
Eric Lehman,
Sofya Raskhodnikova,
Dana Ron,
Alex Samorodnitsky:
Improved Testing Algorithms for Monotonicity.
Electronic Colloquium on Computational Complexity (ECCC) 6(17): (1999) |