Year |
Citation |
Score |
2016 |
Coretti S, Dodis Y, Tackmann B, Venturi D. Non-malleable encryption: Simpler, shorter, stronger Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9562: 306-335. DOI: 10.1007/S00145-020-09361-0 |
0.392 |
|
2016 |
Dodis Y, Mironov I, Stephens-Davidowitz N. Message transmission with reverse firewalls—Secure communication on corrupted machines Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9814: 241-372. DOI: 10.1007/978-3-662-53018-4_13 |
0.341 |
|
2016 |
Dodis Y, Halevi S, Rothblum RD, Wichs D. Spooky encryption and its applications Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9816: 93-122. DOI: 10.1007/978-3-662-53015-3_4 |
0.697 |
|
2015 |
Dodis Y, Ganesh C, Golovnev A, Juels A, Ristenpart T. A formal treatment of backdoored pseudorandom generators Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9056: 101-126. DOI: 10.1007/978-3-662-46800-5_5 |
0.331 |
|
2014 |
Dodis Y, Shamir A, Stephens-Davidowitz N, Wichs D. How to eat your entropy and have it too - Optimal recovery strategies for compromised RNGs Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8617: 37-54. DOI: 10.1007/S00453-016-0239-3 |
0.692 |
|
2014 |
Dodis Y, Pietrzak K, Wichs D. Key derivation without entropy waste Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8441: 93-110. DOI: 10.1007/978-3-642-55220-5_6 |
0.603 |
|
2014 |
Dodis Y, Fiore D. Interactive encryption and message authentication Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8642: 494-513. |
0.324 |
|
2013 |
Dodis Y, Pointcheval D, Ruhault S, Vergniaud D, Wichs D. Security analysis of pseudo-random number generators with input: /dev/random is not robust Proceedings of the Acm Conference On Computer and Communications Security. 647-658. DOI: 10.1145/2508859.2516653 |
0.703 |
|
2013 |
Agrawal S, Dodis Y, Vaikuntanathan V, Wichs D. On continual leakage of discrete log representations Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8270: 401-420. DOI: 10.1007/978-3-642-42045-0_21 |
0.607 |
|
2012 |
Dodis Y, Kanukurthi B, Katz J, Reyzin L, Smith A. Robust fuzzy extractors and authenticated key agreement from close secrets Ieee Transactions On Information Theory. 58: 6207-6222. DOI: 10.1109/Tit.2012.2200290 |
0.306 |
|
2012 |
Dodis Y. Shannon impossibility, revisited Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7412: 100-110. DOI: 10.1007/978-3-642-32284-6_6 |
0.318 |
|
2012 |
Dodis Y, Kiltz E, Pietrzak K, Wichs D. Message authentication, revisited Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7237: 355-374. DOI: 10.1007/978-3-642-29011-4_22 |
0.675 |
|
2012 |
Dodis Y, Haitner I, Tentes A. On the instantiability of hash-and-sign RSA signatures Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7194: 112-132. DOI: 10.1007/978-3-642-28914-9_7 |
0.64 |
|
2012 |
Dodis Y, Jain A, Moran T, Wichs D. Counterexamples to hardness amplification beyond negligible Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7194: 476-493. DOI: 10.1007/978-3-642-28914-9_27 |
0.583 |
|
2011 |
Dodis Y, Lewko A, Waters B, Wichs D. Storing secrets on continually leaky devices Proceedings - Annual Ieee Symposium On Foundations of Computer Science, Focs. 688-697. DOI: 10.1109/FOCS.2011.35 |
0.663 |
|
2010 |
Chow SSM, Dodis Y, Rouselakis Y, Waters B. Practical leakage-resilient identity-based encryption from simple assumptions Proceedings of the Acm Conference On Computer and Communications Security. 152-161. DOI: 10.1145/1866307.1866325 |
0.329 |
|
2010 |
Dodis Y, Haralambiev K, López-Alt A, Wichs D. Cryptography against continuous memory attacks Proceedings - Annual Ieee Symposium On Foundations of Computer Science, Focs. 511-520. DOI: 10.1109/FOCS.2010.56 |
0.61 |
|
2010 |
Dodis Y, Haralambiev K, López-Alt A, Wichs D. Efficient public-key cryptography in the presence of key leakage Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6477: 613-631. DOI: 10.1007/978-3-642-17373-8_35 |
0.655 |
|
2010 |
Alwen J, Dodis Y, Wichs D. Survey: Leakage resilience and the bounded retrieval model Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5973: 1-18. DOI: 10.1007/978-3-642-14496-7_1 |
0.758 |
|
2010 |
Alwen J, Dodis Y, Naor M, Segev G, Walfish S, Wichs D. Public-key encryption in the bounded-retrieval model Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6110: 113-134. DOI: 10.1007/978-3-642-13190-5_6 |
0.775 |
|
2010 |
Dodis Y, Goldwasser S, Tauman Kalai Y, Peikert C, Vaikuntanathan V. Public-key encryption schemes with auxiliary inputs Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5978: 361-381. DOI: 10.1007/978-3-642-11799-2_22 |
0.332 |
|
2009 |
Yao D, Fazio N, Dodis Y, Lysyanskaya A. Forward-secure hierarchical IBE with applications to broadcast encryption Cryptology and Information Security Series. 2: 100-118. DOI: 10.3233/978-1-58603-947-9-100 |
0.631 |
|
2009 |
Dodis Y, Kalai YT, Lovett S. On cryptography with auxiliary input Proceedings of the Annual Acm Symposium On Theory of Computing. 621-630. DOI: 10.1145/1536414.1536498 |
0.313 |
|
2009 |
Dodis Y, Wichs D. Non-malleable extractors and symmetric key cryptography from weak secrets Proceedings of the Annual Acm Symposium On Theory of Computing. 601-610. DOI: 10.1145/1536414.1536496 |
0.635 |
|
2009 |
Alwen J, Dodis Y, Wichs D. Leakage-resilient public-key cryptography in the bounded-retrieval model Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5677: 36-54. DOI: 10.1007/978-3-642-03356-8_3 |
0.785 |
|
2009 |
Dodis Y, Vadhan S, Wichs D. Proofs of Retrievability via Hardness Amplification Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5444: 109-127. DOI: 10.1007/978-3-642-00457-5_8 |
0.684 |
|
2009 |
Dodis Y, Katz J, Smith A, Walfish S. Composability and on-line deniability of authentication Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5444: 146-162. DOI: 10.1007/978-3-642-00457-5_10 |
0.659 |
|
2008 |
Dodis Y, Ostrovsky R, Reyzin L, Smith A. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data Siam Journal On Computing. 38: 97-139. DOI: 10.1137/060651380 |
0.39 |
|
2008 |
Dodis Y, Shoup V, Walfish S. Efficient constructions of composable commitments and zero-knowledge proofs Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5157: 515-535. DOI: 10.1007/978-3-540-85174-5_29 |
0.576 |
|
2008 |
Cramer R, Dodis Y, Fehr S, Padró C, Wichs D. Detection of algebraic manipulation with applications to robust secret sharing and fuzzy extractors Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4965: 471-488. DOI: 10.1007/978-3-540-78967-3_27 |
0.679 |
|
2008 |
Dodis Y, Pietrzak K, Puniya P. A new mode of operation for block ciphers and length-preserving MACs Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4965: 198-219. DOI: 10.1007/978-3-540-78967-3_12 |
0.716 |
|
2008 |
Dodis Y, Puniya P. Getting the best out of existing hash functions; Or what if we are stuck with SHA? Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5037: 156-173. DOI: 10.1007/978-3-540-68914-0_10 |
0.738 |
|
2007 |
Canetti R, Dodis Y, Pass R, Walfish S. Universally composable security with global setup Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4392: 61-85. |
0.662 |
|
2007 |
Dodis Y, Puniya P. Feistel networks made public, and applications Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4515: 534-554. |
0.722 |
|
2007 |
Cash D, Ding YZ, Dodis Y, Lee W, Lipton R, Walfish S. Intrusion-resilient key exchange in the bounded retrieval model Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4392: 479-498. |
0.689 |
|
2007 |
Bosley C, Dodis Y. Does privacy require true randomness? Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4392: 1-20. |
0.671 |
|
2006 |
Dodis Y, Puniya P. On the relation between the Ideal Cipher and the Random Oracle Models Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3876: 184-206. DOI: 10.1007/11681878_10 |
0.774 |
|
2006 |
Coron JS, Dodis Y, Malinaud C, Puniya P. Merkle-damgård revisited: How to construct a hash function Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3621: 430-448. |
0.769 |
|
2005 |
Dodis Y, Smith A. Entropic security and the encryption of high entropy messages Lecture Notes in Computer Science. 3378: 556-577. |
0.336 |
|
2005 |
Dodis Y, Yampolskiy A. A verifiable random function with short proofs and keys Lecture Notes in Computer Science. 3386: 416-431. |
0.313 |
|
2005 |
Boyen X, Dodis Y, Katz J, Ostrovsky R, Smith A. Secure remote authentication using biometric data Lecture Notes in Computer Science. 3494: 147-163. |
0.306 |
|
2004 |
Dodis Y, Jarecki S, Freedman MJ, Walfish S. Versatile padding schemes for joint signature and encryption Proceedings of the Acm Conference On Computer and Communications Security. 344-353. |
0.604 |
|
2004 |
Yao D, Dodis Y, Fazio N, Lysyanskaya A. ID-based encryption for complex hierarchies with applications to forward security and broadcast encryption Proceedings of the Acm Conference On Computer and Communications Security. 354-363. |
0.629 |
|
2004 |
Dodis Y, Franklin M, Katz J, Miyaji A, Yung M. A generic construction for intrusion-resilient public-key encryption Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2964: 81-98. |
0.369 |
|
2003 |
Dodis Y, Fazio N, Kiayias A, Yung M. Scalable Public-Key Tracing and Revoking Proceedings of the Annual Acm Symposium On Principles of Distributed Computing. 22: 190-199. DOI: 10.1007/S00446-004-0120-5 |
0.633 |
|
2003 |
Dodis Y, Fazio N. Public key broadcast encryption for stateless receivers Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2696: 61-80. |
0.593 |
|
2003 |
Dodis Y, Fazio N. Public key trace and revoke scheme secure against adaptive chosen ciphertext attack Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2567: 100-115. |
0.621 |
|
2003 |
Dodis Y, Franklin M, Katz J, Miyaji A, Yung M. Intrusion-resilient public-key encryption Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2612: 19-32. |
0.352 |
|
2002 |
An JH, Dodis Y, Rabin T. On the security of joint signature and encryption Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2332: 83-107. |
0.322 |
|
2002 |
Dodis Y, Katz J, Xu S, Yung M. Key-insulated public key cryptosystems Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2332: 65-82. |
0.307 |
|
Show low-probability matches. |