2009 | ||
---|---|---|
79 | EE | Yevgeniy Dodis, Thomas Ristenpart, Thomas Shrimpton: Salvaging Merkle-Damgård for Practical Applications. EUROCRYPT 2009: 371-388 |
78 | EE | Yevgeniy Dodis, Salil P. Vadhan, Daniel Wichs: Proofs of Retrievability via Hardness Amplification. TCC 2009: 109-127 |
77 | EE | Yevgeniy Dodis, Russell Impagliazzo, Ragesh Jaiswal, Valentine Kabanets: Security Amplification for InteractiveCryptographic Primitives. TCC 2009: 128-145 |
76 | EE | Yevgeniy Dodis, Jonathan Katz, Adam Smith, Shabsi Walfish: Composability and On-Line Deniability of Authentication. TCC 2009: 146-162 |
2008 | ||
75 | EE | Yevgeniy Dodis, Prashant Puniya: Getting the Best Out of Existing Hash Functions; or What if We Are Stuck with SHA?. ACNS 2008: 156-173 |
74 | EE | Yevgeniy Dodis, Victor Shoup, Shabsi Walfish: Efficient Constructions of Composable Commitments and Zero-Knowledge Proofs. CRYPTO 2008: 515-535 |
73 | EE | Yevgeniy Dodis, Krzysztof Pietrzak, Prashant Puniya: A New Mode of Operation for Block Ciphers and Length-Preserving MACs. EUROCRYPT 2008: 198-219 |
72 | EE | Ronald Cramer, Yevgeniy Dodis, Serge Fehr, Carles Padró, Daniel Wichs: Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors. EUROCRYPT 2008: 471-488 |
71 | Yevgeniy Dodis, Pil Joong Lee, Dae Hyun Yum: Optimistic Fair Exchange in a Multi-user Setting. J. UCS 14(3): 318-346 (2008) | |
70 | EE | Yevgeniy Dodis, Rafail Ostrovsky, Leonid Reyzin, Adam Smith: Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data. SIAM J. Comput. 38(1): 97-139 (2008) |
2007 | ||
69 | EE | Yevgeniy Dodis, Prashant Puniya: Feistel Networks Made Public, and Applications. EUROCRYPT 2007: 534-554 |
68 | EE | Yevgeniy Dodis, Krzysztof Pietrzak: Improving the Security of MACs Via Randomized Message Preprocessing. FSE 2007: 414-433 |
67 | EE | Yevgeniy Dodis, Pil Joong Lee, Dae Hyun Yum: Optimistic Fair Exchange in a Multi-user Setting. Public Key Cryptography 2007: 118-133 |
66 | EE | Carl Bosley, Yevgeniy Dodis: Does Privacy Require True Randomness? TCC 2007: 1-20 |
65 | EE | David Cash, Yan Zong Ding, Yevgeniy Dodis, Wenke Lee, Richard J. Lipton, Shabsi Walfish: Intrusion-Resilient Key Exchange in the Bounded Retrieval Model. TCC 2007: 479-498 |
64 | EE | Ran Canetti, Yevgeniy Dodis, Rafael Pass, Shabsi Walfish: Universally Composable Security with Global Setup. TCC 2007: 61-85 |
2006 | ||
63 | Moti Yung, Yevgeniy Dodis, Aggelos Kiayias, Tal Malkin: Public Key Cryptography - PKC 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings Springer 2006 | |
62 | EE | Yevgeniy Dodis, Jonathan Katz, Leonid Reyzin, Adam Smith: Robust Fuzzy Extractors and Authenticated Key Agreement from Close Secrets. CRYPTO 2006: 232-250 |
61 | EE | Yevgeniy Dodis, Renato Renner: On the Impossibility of Extracting Classical Randomness Using a Quantum Computer. ICALP (2) 2006: 204-215 |
60 | EE | Richard Cole, Yevgeniy Dodis, Tim Roughgarden: Bottleneck links, variable demand, and the tragedy of the commons. SODA 2006: 668-677 |
59 | EE | Dario Catalano, Yevgeniy Dodis, Ivan Visconti: Mercurial Commitments: Minimal Assumptions and Efficient Constructions. TCC 2006: 120-144 |
58 | EE | Yevgeniy Dodis, Prashant Puniya: On the Relation Between the Ideal Cipher and the Random Oracle Models. TCC 2006: 184-206 |
57 | EE | Yevgeniy Dodis, Aleksandr Yampolskiy, Moti Yung: Threshold and Proactive Pseudo-Random Permutations. TCC 2006: 542-560 |
56 | EE | Yevgeniy Dodis, Krzysztof Pietrzak, Bartosz Przydatek: Separating Sources for Encryption and Secret Sharing. TCC 2006: 601-616 |
55 | EE | Yevgeniy Dodis, Rafail Ostrovsky, Leonid Reyzin, Adam Smith: Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data CoRR abs/cs/0602007: (2006) |
54 | EE | Carl Bosley, Yevgeniy Dodis: Does Privacy Require True Randomness?. Electronic Colloquium on Computational Complexity (ECCC) 13(114): (2006) |
53 | EE | Richard Cole, Yevgeniy Dodis, Tim Roughgarden: How much can taxes help selfish routing? J. Comput. Syst. Sci. 72(3): 444-467 (2006) |
2005 | ||
52 | EE | Jean-Sébastien Coron, Yevgeniy Dodis, Cécile Malinaud, Prashant Puniya: Merkle-Damgård Revisited: How to Construct a Hash Function. CRYPTO 2005: 430-448 |
51 | EE | Yevgeniy Dodis, Roberto Oliveira, Krzysztof Pietrzak: On the Generic Insecurity of the Full Domain Hash. CRYPTO 2005: 449-466 |
50 | EE | Xavier Boyen, Yevgeniy Dodis, Jonathan Katz, Rafail Ostrovsky, Adam Smith: Secure Remote Authentication Using Biometric Data. EUROCRYPT 2005: 147-163 |
49 | EE | Yevgeniy Dodis, Dae Hyun Yum: Time Capsule Signature. Financial Cryptography 2005: 57-71 |
48 | EE | Yevgeniy Dodis, Aleksandr Yampolskiy: A Verifiable Random Function with Short Proofs and Keys. Public Key Cryptography 2005: 416-431 |
47 | EE | Yevgeniy Dodis, Adam Smith: Correcting errors without leaking partial information. STOC 2005: 654-663 |
46 | EE | Yevgeniy Dodis, Jonathan Katz: Chosen-Ciphertext Security of Multiple Encryption. TCC 2005: 188-209 |
45 | EE | Yevgeniy Dodis, Adam Smith: Entropic Security and the Encryption of High Entropy Messages. TCC 2005: 556-577 |
44 | EE | Yevgeniy Dodis: Signcryption. Encyclopedia of Cryptography and Security 2005 |
43 | EE | Yevgeniy Dodis, Nelly Fazio, Aggelos Kiayias, Moti Yung: Scalable public-key tracing and revoking. Distributed Computing 17(4): 323-347 (2005) |
2004 | ||
42 | EE | Yevgeniy Dodis, Michael J. Freedman, Stanislaw Jarecki, Shabsi Walfish: Versatile padding schemes for joint signature and encryption. ACM Conference on Computer and Communications Security 2004: 344-353 |
41 | EE | Danfeng Yao, Nelly Fazio, Yevgeniy Dodis, Anna Lysyanskaya: ID-based encryption for complex hierarchies with applications to forward security and broadcast encryption. ACM Conference on Computer and Communications Security 2004: 354-363 |
40 | EE | Yevgeniy Dodis, Ariel Elbaz, Roberto Oliveira, Ran Raz: Improved Randomness Extraction from Two Independent Sources. APPROX-RANDOM 2004: 334-344 |
39 | EE | Yevgeniy Dodis, Rosario Gennaro, Johan Håstad, Hugo Krawczyk, Tal Rabin: Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes. CRYPTO 2004: 494-510 |
38 | EE | Yevgeniy Dodis, Matthew K. Franklin, Jonathan Katz, Atsuko Miyaji, Moti Yung: A Generic Construction for Intrusion-Resilient Public-Key Encryption. CT-RSA 2004: 81-98 |
37 | EE | Yevgeniy Dodis, Leonid Reyzin, Adam Smith: Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data. EUROCRYPT 2004: 523-540 |
36 | EE | Yevgeniy Dodis, Aggelos Kiayias, Antonio Nicolosi, Victor Shoup: Anonymous Identification in Ad Hoc Groups. EUROCRYPT 2004: 609-626 |
35 | EE | Yevgeniy Dodis, Shien Jin Ong, Manoj Prabhakaran, Amit Sahai: On the (Im)possibility of Cryptography with Imperfect Randomness. FOCS 2004: 196-205 |
34 | EE | Andris Ambainis, Harry Buhrman, Yevgeniy Dodis, Hein Röhrig: Multiparty Quantum Coin Flipping. IEEE Conference on Computational Complexity 2004: 250-259 |
2003 | ||
33 | EE | Richard Cole, Yevgeniy Dodis, Tim Roughgarden: How much can taxes help selfish routing? ACM Conference on Electronic Commerce 2003: 98-107 |
32 | EE | Yevgeniy Dodis, Matthew K. Franklin, Jonathan Katz, Atsuko Miyaji, Moti Yung: Intrusion-Resilient Public-Key Encryption. CT-RSA 2003: 19-32 |
31 | EE | Yevgeniy Dodis, Leonid Reyzin: Breaking and repairing optimistic fair exchange from PODC 2003. Digital Rights Management Workshop 2003: 47-54 |
30 | EE | Yevgeniy Dodis, Jee Hea An: Concealment and Its Applications to Authenticated Encryption. EUROCRYPT 2003: 312-329 |
29 | EE | Antonio Nicolosi, Maxwell N. Krohn, Yevgeniy Dodis, David Mazières: Proactive Two-Party Signatures for User Authentication. NDSS 2003 |
28 | EE | Anca-Andreea Ivan, Yevgeniy Dodis: Proxy Cryptography Revisited. NDSS 2003 |
27 | EE | Yevgeniy Dodis, Nelly Fazio, Aggelos Kiayias, Moti Yung: Scalable public-key tracing and revoking. PODC 2003: 190-199 |
26 | EE | Yevgeniy Dodis: Efficient Construction of (Distributed) Verifiable Random Functions. Public Key Cryptography 2003: 1-17 |
25 | EE | Yevgeniy Dodis, Nelly Fazio: Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack. Public Key Cryptography 2003: 100-115 |
24 | EE | Yevgeniy Dodis, Jonathan Katz, Shouhuai Xu, Moti Yung: Strong Key-Insulated Signature Schemes. Public Key Cryptography 2003: 130-144 |
23 | EE | Yevgeniy Dodis, Roberto Oliveira: On Extracting Private Randomness over a Public Channel. RANDOM-APPROX 2003: 252-263 |
22 | EE | Richard Cole, Yevgeniy Dodis, Tim Roughgarden: Pricing network edges for heterogeneous selfish users. STOC 2003: 521-530 |
21 | EE | Andris Ambainis, Harry Buhrman, Yevgeniy Dodis, Hein Röhrig: Multiparty Quantum Coin Flipping CoRR quant-ph/0304112: (2003) |
2002 | ||
20 | EE | Yevgeniy Dodis, Nelly Fazio: Public Key Broadcast Encryption for Stateless Receivers. Digital Rights Management Workshop 2002: 61-80 |
19 | EE | Yevgeniy Dodis, Jonathan Katz, Shouhuai Xu, Moti Yung: Key-Insulated Public Key Cryptosystems. EUROCRYPT 2002: 65-82 |
18 | EE | Jee Hea An, Yevgeniy Dodis, Tal Rabin: On the Security of Joint Signature and Encryption. EUROCRYPT 2002: 83-107 |
17 | EE | Yevgeniy Dodis, Joel Spencer: On the (non)Universality of the One-Time Pad. FOCS 2002: 376- |
16 | EE | Yevgeniy Dodis, Moti Yung: Exposure-Resilience for Free: The Hierarchical ID-based Encryption Case. IEEE Security in Storage Workshop 2002: 45-52 |
15 | EE | Yevgeniy Dodis, Leonid Reyzin: On the Power of Claw-Free Permutations. SCN 2002: 55-73 |
2001 | ||
14 | EE | Yevgeniy Dodis, Amit Sahai, Adam Smith: On Perfect and Adaptive Security in Exposure-Resilient Cryptography. EUROCRYPT 2001: 301-324 |
13 | EE | Yevgeniy Dodis: New Imperfect Random Source with Applications to Coin-Flipping. ICALP 2001: 297-309 |
12 | EE | Yevgeniy Dodis, Shai Halevi: Incremental Codes. RANDOM-APPROX 2001: 75-89 |
11 | EE | Yevgeniy Dodis, Peter Winkler: Universal configurations in light-flipping games. SODA 2001: 926-927 |
2000 | ||
10 | EE | Yevgeniy Dodis, Shai Halevi, Tal Rabin: A Cryptographic Solution to a Game Theoretic Problem. CRYPTO 2000: 112-130 |
9 | EE | Yevgeniy Dodis, Silvio Micali: Parallel Reducibility for Information-Theoretically Secure Computation. CRYPTO 2000: 74-92 |
8 | EE | Ran Canetti, Yevgeniy Dodis, Shai Halevi, Eyal Kushilevitz, Amit Sahai: Exposure-Resilient Functions and All-or-Nothing Transforms. EUROCRYPT 2000: 453-469 |
7 | EE | Yevgeniy Dodis: Impossibility of Black-Box Reduction from Non-Adaptively to Adaptively Secure Coin-Flipping Electronic Colloquium on Computational Complexity (ECCC) 7(39): (2000) |
1999 | ||
6 | EE | Yevgeniy Dodis, Silvio Micali: Lower Bounds for Oblivious Transfer Reductions. EUROCRYPT 1999: 42-55 |
5 | EE | Yevgeniy Dodis, Sanjeev Khanna: Space Time Tradeoffs for Graph Properties. ICALP 1999: 291-300 |
4 | Yevgeniy Dodis, Oded Goldreich, Eric Lehman, Sofya Raskhodnikova, Dana Ron, Alex Samorodnitsky: Improved Testing Algorithms for Monotonicity. RANDOM-APPROX 1999: 97-108 | |
3 | EE | Yevgeniy Dodis, Venkatesan Guruswami, Sanjeev Khanna: The 2-Catalog Segmentation Problem. SODA 1999: 897-898 |
2 | EE | Yevgeniy Dodis, Sanjeev Khanna: Design Networks with Bounded Pairwise Distance. STOC 1999: 750-759 |
1 | EE | Yevgeniy Dodis, Oded Goldreich, Eric Lehman, Sofya Raskhodnikova, Dana Ron, Alex Samorodnitsky: Improved Testing Algorithms for Monotonicity. Electronic Colloquium on Computational Complexity (ECCC) 6(17): (1999) |