Yevgeniy Dodis - Publications

Affiliations: 
New York University, New York, NY, United States 
Area:
Computer Science

50 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2016 Coretti S, Dodis Y, Tackmann B, Venturi D. Non-malleable encryption: Simpler, shorter, stronger Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9562: 306-335. DOI: 10.1007/S00145-020-09361-0  0.392
2016 Dodis Y, Mironov I, Stephens-Davidowitz N. Message transmission with reverse firewalls—Secure communication on corrupted machines Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9814: 241-372. DOI: 10.1007/978-3-662-53018-4_13  0.341
2016 Dodis Y, Halevi S, Rothblum RD, Wichs D. Spooky encryption and its applications Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9816: 93-122. DOI: 10.1007/978-3-662-53015-3_4  0.697
2015 Dodis Y, Ganesh C, Golovnev A, Juels A, Ristenpart T. A formal treatment of backdoored pseudorandom generators Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9056: 101-126. DOI: 10.1007/978-3-662-46800-5_5  0.331
2014 Dodis Y, Shamir A, Stephens-Davidowitz N, Wichs D. How to eat your entropy and have it too - Optimal recovery strategies for compromised RNGs Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8617: 37-54. DOI: 10.1007/S00453-016-0239-3  0.692
2014 Dodis Y, Pietrzak K, Wichs D. Key derivation without entropy waste Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8441: 93-110. DOI: 10.1007/978-3-642-55220-5_6  0.603
2014 Dodis Y, Fiore D. Interactive encryption and message authentication Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8642: 494-513.  0.324
2013 Dodis Y, Pointcheval D, Ruhault S, Vergniaud D, Wichs D. Security analysis of pseudo-random number generators with input: /dev/random is not robust Proceedings of the Acm Conference On Computer and Communications Security. 647-658. DOI: 10.1145/2508859.2516653  0.703
2013 Agrawal S, Dodis Y, Vaikuntanathan V, Wichs D. On continual leakage of discrete log representations Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8270: 401-420. DOI: 10.1007/978-3-642-42045-0_21  0.607
2012 Dodis Y, Kanukurthi B, Katz J, Reyzin L, Smith A. Robust fuzzy extractors and authenticated key agreement from close secrets Ieee Transactions On Information Theory. 58: 6207-6222. DOI: 10.1109/Tit.2012.2200290  0.306
2012 Dodis Y. Shannon impossibility, revisited Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7412: 100-110. DOI: 10.1007/978-3-642-32284-6_6  0.318
2012 Dodis Y, Kiltz E, Pietrzak K, Wichs D. Message authentication, revisited Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7237: 355-374. DOI: 10.1007/978-3-642-29011-4_22  0.675
2012 Dodis Y, Haitner I, Tentes A. On the instantiability of hash-and-sign RSA signatures Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7194: 112-132. DOI: 10.1007/978-3-642-28914-9_7  0.64
2012 Dodis Y, Jain A, Moran T, Wichs D. Counterexamples to hardness amplification beyond negligible Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7194: 476-493. DOI: 10.1007/978-3-642-28914-9_27  0.583
2011 Dodis Y, Lewko A, Waters B, Wichs D. Storing secrets on continually leaky devices Proceedings - Annual Ieee Symposium On Foundations of Computer Science, Focs. 688-697. DOI: 10.1109/FOCS.2011.35  0.663
2010 Chow SSM, Dodis Y, Rouselakis Y, Waters B. Practical leakage-resilient identity-based encryption from simple assumptions Proceedings of the Acm Conference On Computer and Communications Security. 152-161. DOI: 10.1145/1866307.1866325  0.329
2010 Dodis Y, Haralambiev K, López-Alt A, Wichs D. Cryptography against continuous memory attacks Proceedings - Annual Ieee Symposium On Foundations of Computer Science, Focs. 511-520. DOI: 10.1109/FOCS.2010.56  0.61
2010 Dodis Y, Haralambiev K, López-Alt A, Wichs D. Efficient public-key cryptography in the presence of key leakage Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6477: 613-631. DOI: 10.1007/978-3-642-17373-8_35  0.655
2010 Alwen J, Dodis Y, Wichs D. Survey: Leakage resilience and the bounded retrieval model Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5973: 1-18. DOI: 10.1007/978-3-642-14496-7_1  0.758
2010 Alwen J, Dodis Y, Naor M, Segev G, Walfish S, Wichs D. Public-key encryption in the bounded-retrieval model Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6110: 113-134. DOI: 10.1007/978-3-642-13190-5_6  0.775
2010 Dodis Y, Goldwasser S, Tauman Kalai Y, Peikert C, Vaikuntanathan V. Public-key encryption schemes with auxiliary inputs Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5978: 361-381. DOI: 10.1007/978-3-642-11799-2_22  0.332
2009 Yao D, Fazio N, Dodis Y, Lysyanskaya A. Forward-secure hierarchical IBE with applications to broadcast encryption Cryptology and Information Security Series. 2: 100-118. DOI: 10.3233/978-1-58603-947-9-100  0.631
2009 Dodis Y, Kalai YT, Lovett S. On cryptography with auxiliary input Proceedings of the Annual Acm Symposium On Theory of Computing. 621-630. DOI: 10.1145/1536414.1536498  0.313
2009 Dodis Y, Wichs D. Non-malleable extractors and symmetric key cryptography from weak secrets Proceedings of the Annual Acm Symposium On Theory of Computing. 601-610. DOI: 10.1145/1536414.1536496  0.635
2009 Alwen J, Dodis Y, Wichs D. Leakage-resilient public-key cryptography in the bounded-retrieval model Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5677: 36-54. DOI: 10.1007/978-3-642-03356-8_3  0.785
2009 Dodis Y, Vadhan S, Wichs D. Proofs of Retrievability via Hardness Amplification Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5444: 109-127. DOI: 10.1007/978-3-642-00457-5_8  0.684
2009 Dodis Y, Katz J, Smith A, Walfish S. Composability and on-line deniability of authentication Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5444: 146-162. DOI: 10.1007/978-3-642-00457-5_10  0.659
2008 Dodis Y, Ostrovsky R, Reyzin L, Smith A. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data Siam Journal On Computing. 38: 97-139. DOI: 10.1137/060651380  0.39
2008 Dodis Y, Shoup V, Walfish S. Efficient constructions of composable commitments and zero-knowledge proofs Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5157: 515-535. DOI: 10.1007/978-3-540-85174-5_29  0.576
2008 Cramer R, Dodis Y, Fehr S, Padró C, Wichs D. Detection of algebraic manipulation with applications to robust secret sharing and fuzzy extractors Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4965: 471-488. DOI: 10.1007/978-3-540-78967-3_27  0.679
2008 Dodis Y, Pietrzak K, Puniya P. A new mode of operation for block ciphers and length-preserving MACs Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4965: 198-219. DOI: 10.1007/978-3-540-78967-3_12  0.716
2008 Dodis Y, Puniya P. Getting the best out of existing hash functions; Or what if we are stuck with SHA? Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5037: 156-173. DOI: 10.1007/978-3-540-68914-0_10  0.738
2007 Canetti R, Dodis Y, Pass R, Walfish S. Universally composable security with global setup Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4392: 61-85.  0.662
2007 Dodis Y, Puniya P. Feistel networks made public, and applications Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4515: 534-554.  0.722
2007 Cash D, Ding YZ, Dodis Y, Lee W, Lipton R, Walfish S. Intrusion-resilient key exchange in the bounded retrieval model Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4392: 479-498.  0.689
2007 Bosley C, Dodis Y. Does privacy require true randomness? Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4392: 1-20.  0.671
2006 Dodis Y, Puniya P. On the relation between the Ideal Cipher and the Random Oracle Models Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3876: 184-206. DOI: 10.1007/11681878_10  0.774
2006 Coron JS, Dodis Y, Malinaud C, Puniya P. Merkle-damgård revisited: How to construct a hash function Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3621: 430-448.  0.769
2005 Dodis Y, Smith A. Entropic security and the encryption of high entropy messages Lecture Notes in Computer Science. 3378: 556-577.  0.336
2005 Dodis Y, Yampolskiy A. A verifiable random function with short proofs and keys Lecture Notes in Computer Science. 3386: 416-431.  0.313
2005 Boyen X, Dodis Y, Katz J, Ostrovsky R, Smith A. Secure remote authentication using biometric data Lecture Notes in Computer Science. 3494: 147-163.  0.306
2004 Dodis Y, Jarecki S, Freedman MJ, Walfish S. Versatile padding schemes for joint signature and encryption Proceedings of the Acm Conference On Computer and Communications Security. 344-353.  0.604
2004 Yao D, Dodis Y, Fazio N, Lysyanskaya A. ID-based encryption for complex hierarchies with applications to forward security and broadcast encryption Proceedings of the Acm Conference On Computer and Communications Security. 354-363.  0.629
2004 Dodis Y, Franklin M, Katz J, Miyaji A, Yung M. A generic construction for intrusion-resilient public-key encryption Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2964: 81-98.  0.369
2003 Dodis Y, Fazio N, Kiayias A, Yung M. Scalable Public-Key Tracing and Revoking Proceedings of the Annual Acm Symposium On Principles of Distributed Computing. 22: 190-199. DOI: 10.1007/S00446-004-0120-5  0.633
2003 Dodis Y, Fazio N. Public key broadcast encryption for stateless receivers Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2696: 61-80.  0.593
2003 Dodis Y, Fazio N. Public key trace and revoke scheme secure against adaptive chosen ciphertext attack Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2567: 100-115.  0.621
2003 Dodis Y, Franklin M, Katz J, Miyaji A, Yung M. Intrusion-resilient public-key encryption Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2612: 19-32.  0.352
2002 An JH, Dodis Y, Rabin T. On the security of joint signature and encryption Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2332: 83-107.  0.322
2002 Dodis Y, Katz J, Xu S, Yung M. Key-insulated public key cryptosystems Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2332: 65-82.  0.307
Show low-probability matches.