×
Compute Distance To:
Author ID: dodis.yevgeniy Recent zbMATH articles by "Dodis, Yevgeniy"
Published as: Dodis, Yevgeniy; Dodis, Y.
External Links: MGP
all top 5

Co-Authors

4 single-authored
16 Wichs, Daniel
11 Katz, Jonathan N.
8 Pietrzak, Krzysztof
8 Yung, Moti
7 Reyzin, Leonid
7 Steinberger, John P.
6 Coretti, Sandro
6 Ristenpart, Thomas
5 Fazio, Nelly
5 Puniya, Prashant
5 Walfish, Shabsi
4 Aggarwal, Divesh
4 Alwen, Joël
4 Cole, Richard John
4 Guo, Siyao
4 Halevi, Shai
4 Kiayias, Aggelos
4 Rabin, Tal
4 Roughgarden, Tim
4 Stephens-Davidowitz, Noah
4 Vaikuntanathan, Vinod
3 Lovett, Shachar
3 Oliveira, Roberto Imbuzeiro
3 Ostrovsky, Rafail
3 Tessaro, Stefano
3 Vadhan, Salil P.
3 Yum, Dae Hyun
2 An, Jee Hea
2 Canetti, Ran
2 Coron, Jean-Sébastien
2 Fiore, Dario
2 Franklin, Matthew K.
2 Juels, Ari
2 Khanna, Sanjeev
2 Krawczyk, Hugo
2 Lee, Pil Joong
2 Liu, Tianren
2 López-Alt, Adriana
2 Micali, Silvio
2 Mironov, Ilya
2 Miyaji, Atsuko
2 Nielsen, Jesper Buus
2 Shamir, Adi
2 Shoup, Victor
2 Tackmann, Björn
2 Tauman Kalai, Yael
2 Venturi, Daniele
2 Woodage, Joanne
2 Wooley, Trevor D.
2 Xu, Shouhuai
2 Yampolskiy, Aleksandr
2 Yu, Yu
2 Zuckerman, David
1 Agrawal, Shweta
1 Andreeva, Elena Anatol’evna
1 Barak, Boaz
1 Bienstock, Alexander
1 Bishop, Allison
1 Bogdanov, Andrey
1 Bosley, Carl
1 Boyen, Xavier
1 Cash, David M.
1 Catalano, Dario
1 Chase, Melissa
1 Chatterjee, Rahul
1 Cogliati, Benoît
1 Cramer, Ronald John Fitzgerald
1 Ding, Yan Zong
1 Elbaz, Ariel
1 Farshim, Pooya
1 Fehr, Serge
1 Ganesh, Chaya
1 Gennaro, Rosario
1 Goldreich, Oded
1 Goldwasser, Shafi
1 Golovnev, Alexander
1 Grubbs, Paul
1 Guruswami, Venkatesan
1 Haitner, Iftach
1 Haralambiev, Kristiyan
1 Håstad, Johan Torkel
1 Impagliazzo, Russell
1 Ishai, Yuval
1 Jafargholi, Zahra
1 Jain, Abhishek
1 Jaiswal, Ragesh
1 Kabanets, Valentine
1 Kanukurthi, Bhavana
1 Karthikeyan, Harish
1 Kazana, Tomasz
1 Kiltz, Eike
1 Kraschewski, Daniel
1 Lee, Jooyoung
1 Lee, Wenke
1 Lehman, Eric
1 Lipton, Richard J.
1 Lysyanskaya, Anna
1 Malinaud, Cécile
1 Malkin, Tal G.
1 Mandal, Avradip
...and 39 more Co-Authors

Publications by Year

Citations contained in zbMATH Open

114 Publications have been cited 1,480 times in 946 Documents Cited by Year
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. Zbl 1165.94326
Dodis, Yevgeniy; Ostrovsky, Rafail; Reyzin, Leonid; Smith, Adam
97
2008
Merkle-Damgård revisited: How to construct a hash function. Zbl 1145.94436
Coron, Jean-Sébastien; Dodis, Yevgeniy; Malinaud, Cécile; Puniya, Prashant
54
2005
Leakage-resilient public-key cryptography in the bounded-retrieval model. Zbl 1252.94041
Alwen, Joël; Dodis, Yevgeniy; Wichs, Daniel
52
2009
Efficient public-key cryptography in the presence of key leakage. Zbl 1290.94064
Dodis, Yevgeniy; Haralambiev, Kristiyan; López-Alt, Adriana; Wichs, Daniel
51
2010
On the security of joint signature and encryption. Zbl 1055.94511
An, Jee Hea; Dodis, Yevgeniy; Rabin, Tal
44
2002
Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. Zbl 1122.94368
Dodis, Yevgeniy; Reyzin, Leonid; Smith, Adam
42
2004
Universally composable security with global setup. Zbl 1129.94014
Canetti, Ran; Dodis, Yevgeniy; Pass, Rafael; Walfish, Shabsi
42
2007
How much can taxes help selfish routing? Zbl 1103.68018
Cole, Richard; Dodis, Yevgeniy; Roughgarden, Tim
40
2006
Detection of algebraic manipulation with applications to robust secret sharing and fuzzy extractors. Zbl 1149.94333
Cramer, Ronald; Dodis, Yevgeniy; Fehr, Serge; Padró, Carles; Wichs, Daniel
39
2008
Public key broadcast encryption for stateless receivers. Zbl 1327.94041
Dodis, Yevgeniy; Fazio, Nelly
36
2003
On cryptography with auxiliary input. Zbl 1304.94046
Dodis, Yevgeniy; Kalai, Yael Tauman; Lovett, Shachar
34
2009
Public-key encryption in the bounded-retrieval model. Zbl 1279.94051
Alwen, Joël; Dodis, Yevgeniy; Naor, Moni; Segev, Gil; Walfish, Shabsi; Wichs, Daniel
33
2010
Public-key encryption schemes with auxiliary inputs. Zbl 1274.94062
Dodis, Yevgeniy; Goldwasser, Shafi; Tauman Kalai, Yael; Peikert, Chris; Vaikuntanathan, Vinod
33
2010
Improved testing algorithms for monotonicity. Zbl 0949.68178
Dodis, Yevgeniy; Goldreich, Oded; Lehman, Eric; Raskhodnikova, Sofya; Ron, Dana; Samorodnitsky, Alex
32
1999
A verifiable random function with short proofs and keys. Zbl 1081.94521
Dodis, Yevgeniy; Yampolskiy, Aleksandr
30
2005
Key-insulated public key cryptosystems. Zbl 1055.94012
Dodis, Yevgeniy; Katz, Jonathan; Xu, Shouhuai; Yung, Moti
29
2002
Design networks with bounded pairwise distance. Zbl 1345.90032
Dodis, Yevgeniy; Khanna, Sanjeev
27
1999
Pricing network edges for heterogeneous selfish users. Zbl 1192.68032
Cole, Richard; Dodis, Yevgeniy; Roughgarden, Tim
27
2003
Public key trace and revoke scheme secure against adaptive chosen ciphertext attack. Zbl 1033.94522
Dodis, Yevgeniy; Fazio, Nelly
26
2002
Correcting errors without leaking partial information. Zbl 1192.94118
Dodis, Yevgeniy; Smith, Adam
24
2005
Anonymous identification in ad hoc groups. Zbl 1122.94414
Dodis, Yevgeniy; Kiayias, Aggelos; Nicolosi, Antonio; Shoup, Victor
23
2004
Strong key-insulated signature schemes. Zbl 1033.94555
Dodis, Yevgeniy; Katz, Jonathan; Xu, Shouhuai; Yung, Moti
23
2002
On the generic insecurity of the full domain hash. Zbl 1145.94440
Dodis, Yevgeniy; Oliveira, Roberto; Pietrzak, Krzysztof
20
2005
Non-malleable codes from additive combinatorics (extended abstract). Zbl 1315.94142
Aggarwal, Divesh; Dodis, Yevgeniy; Lovett, Shachar
19
2014
Spooky encryption and its applications. Zbl 1406.94045
Dodis, Yevgeniy; Halevi, Shai; Rothblum, Ron D.; Wichs, Daniel
17
2016
Storing secrets on continually leaky devices. Zbl 1292.94055
Dodis, Yevgeniy; Lewko, Allison; Waters, Brent; Wichs, Daniel
17
2011
Chosen-ciphertext security of multiple encryption. Zbl 1079.94545
Dodis, Yevgeniy; Katz, Jonathan
16
2005
Overcoming weak expectations. Zbl 1296.94107
Dodis, Yevgeniy; Yu, Yu
16
2013
A formal treatment of backdoored pseudorandom generators. Zbl 1365.94423
Dodis, Yevgeniy; Ganesh, Chaya; Golovnev, Alexander; Juels, Ari; Ristenpart, Thomas
15
2015
On the indifferentiability of key-alternating ciphers. Zbl 1310.94124
Andreeva, Elena; Bogdanov, Andrey; Dodis, Yevgeniy; Mennink, Bart; Steinberger, John P.
15
2013
Non-malleable reductions and applications. Zbl 1321.94139
Aggarwal, Divesh; Dodis, Yevgeniy; Kazana, Tomasz; Obremski, Maciej
14
2015
Robust fuzzy extractors and authenticated key agreement from close secrets. Zbl 1161.94440
Dodis, Yevgeniy; Katz, Jonathan; Reyzin, Leonid; Smith, Adam
14
2006
A cryptographic solution to a game theoretic problem. Zbl 1001.91002
Dodis, Yevgeniy; Halevi, Shai; Rabin, Tal
14
2000
Exposure-resilient functions and all-or-nothing transforms. Zbl 1082.94508
Canetti, Ran; Dodis, Yevgeniy; Halevi, Shai
14
2000
Non-malleable encryption: simpler, shorter, stronger. Zbl 1388.94043
Coretti, Sandro; Dodis, Yevgeniy; Tackmann, Björn; Venturi, Daniele
14
2016
Survey: leakage resilience and the bounded retrieval model. Zbl 1282.94031
Alwen, Joël; Dodis, Yevgeniy; Wichs, Daniel
13
2010
Salvaging Merkle-Damgård for practical applications. Zbl 1239.94047
Dodis, Yevgeniy; Ristenpart, Thomas; Shrimpton, Thomas
13
2009
Secure remote authentication using biometric data. Zbl 1137.94365
Boyen, Xavier; Dodis, Yevgeniy; Katz, Jonathan; Ostrovsky, Rafail; Smith, Adam
13
2005
Leakage-resilient pseudorandom functions and side-channel attacks on Feistel networks. Zbl 1280.94047
Dodis, Yevgeniy; Pietrzak, Krzysztof
12
2010
Optimistic fair exchange in a multi-user setting. Zbl 1127.94345
Dodis, Yevgeniy; Lee, Pil Joong; Yum, Dae Hyun
12
2007
Improved randomness extraction from two independent sources. Zbl 1106.68036
Dodis, Yevgeniy; Elbaz, Ariel; Oliveira, Roberto; Raz, Ran
12
2004
A domain extender for the ideal cipher. Zbl 1274.94054
Coron, Jean-Sébastien; Dodis, Yevgeniy; Mandal, Avradip; Seurin, Yannick
12
2010
Leftover hash lemma, revisited. Zbl 1287.94047
Barak, Boaz; Dodis, Yevgeniy; Krawczyk, Hugo; Pereira, Olivier; Pietrzak, Krzysztof; Standaert, François-Xavier; Yu, Yu
12
2011
Changing base without losing space. Zbl 1293.68118
Dodis, Yevgeniy; Patrascu, Mihai; Thorup, Mikkel
12
2010
Randomness extraction and key derivation using the CBC, cascade and HMAC modes. Zbl 1104.68470
Dodis, Yevgeniy; Gennaro, Rosario; Håstad, Johan; Krawczyk, Hugo; Rabin, Tal
11
2004
Message authentication, revisited. Zbl 1297.94117
Dodis, Yevgeniy; Kiltz, Eike; Pietrzak, Krzysztof; Wichs, Daniel
11
2012
Non-malleable extractors and symmetric key cryptography from weak secrets. Zbl 1304.94048
Dodis, Yevgeniy; Wichs, Daniel
11
2009
Message transmission with reverse firewalls – secure communication on corrupted machines. Zbl 1378.94039
Dodis, Yevgeniy; Mironov, Ilya; Stephens-Davidowitz, Noah
10
2016
Intrusion-resilient public-key encryption. Zbl 1039.94515
Dodis, Yevgeniy; Franklin, Matt; Katz, Jonathan; Miyaji, Atsuko; Yung, Moti
10
2003
Universal configurations in light-flipping games. Zbl 1004.91015
Dodis, Yevgeniy; Winkler, Peter
9
2001
Bottleneck links, variable demand, and the tragedy of the commons. Zbl 1192.91040
Cole, Richard; Dodis, Yevgeniy; Roughgarden, Tim
9
2006
Proofs of retrievability via hardness amplification. Zbl 1213.68246
Dodis, Yevgeniy; Vadhan, Salil; Wichs, Daniel
9
2009
On the relation between the ideal cipher and the random oracle models. Zbl 1112.94009
Dodis, Yevgeniy; Puniya, Prashant
9
2006
Entropic security and the encryption of high entropy messages. Zbl 1080.94523
Dodis, Yevgeniy; Smith, Adam
9
2005
Intrusion-resilient key exchange in the bounded retrieval model. Zbl 1156.94338
Cash, David; Ding, Yan Zong; Dodis, Yevgeniy; Lee, Wenke; Lipton, Richard; Walfish, Shabsi
9
2007
On continual leakage of discrete log representations. Zbl 1326.94069
Agrawal, Shweta; Dodis, Yevgeniy; Vaikuntanathan, Vinod; Wichs, Daniel
9
2013
Efficient construction of (distributed) verifiable random functions. Zbl 1033.94521
Dodis, Yevgeniy
9
2002
Mercurial commitments: minimal assumptions and efficient constructions. Zbl 1112.94006
Catalano, Dario; Dodis, Yevgeniy; Visconti, Ivan
8
2006
Randomness condensers for efficiently samplable, seed-dependent sources. Zbl 1304.94047
Dodis, Yevgeniy; Ristenpart, Thomas; Vadhan, Salil
7
2012
Message authentication codes from unpredictable block ciphers. Zbl 1252.94058
Dodis, Yevgeniy; Steinberger, John
7
2009
Theory of cryptography. 12th theory of cryptography conference, TCC 2015, Warsaw, Poland, March 23–25, 2015. Proceedings, Part II. Zbl 1312.94004
7
2015
Key derivation without entropy waste. Zbl 1326.94085
Dodis, Yevgeniy; Pietrzak, Krzysztof; Wichs, Daniel
7
2014
On extracting private randomness over a public channel. Zbl 1279.68350
Dodis, Yevgeniy; Oliveira, Roberto
6
2003
Indifferentiability of permutation-based compression functions and tree-based modes of operation, with applications to MD6. Zbl 1248.94065
Dodis, Yevgeniy; Reyzin, Leonid; Rivest, Ronald L.; Shen, Emily
6
2009
To hash or not to hash again? (In)differentiability results for \(H^2\) and HMAC. Zbl 1296.94106
Dodis, Yevgeniy; Ristenpart, Thomas; Steinberger, John; Tessaro, Stefano
6
2012
Domain extension for MACs beyond the birthday barrier. Zbl 1281.94022
Dodis, Yevgeniy; Steinberger, John
6
2011
Provable security of (tweakable) block ciphers based on substitution-permutation networks. Zbl 1444.94055
Cogliati, Benoît; Dodis, Yevgeniy; Katz, Jonathan; Lee, Jooyoung; Steinberger, John; Thiruvengadam, Aishwarya; Zhang, Zhe
5
2018
Efficient constructions of composable commitments and zero-knowledge proofs. Zbl 1183.94030
Dodis, Yevgeniy; Shoup, Victor; Walfish, Shabsi
5
2008
A generic construction for intrusion-resilient public-key encryption. Zbl 1196.94048
Dodis, Yevgeniy; Franklin, Matt; Katz, Jonathan; Miyaji, Atsuko; Yung, Moti
5
2004
Time capsule signature. Zbl 1120.94316
Dodis, Yevgeniy; Yum, Dae Hyun
5
2005
On the instantiability of hash-and-sign RSA signatures. Zbl 1303.94078
Dodis, Yevgeniy; Haitner, Iftach; Tentes, Aris
5
2012
On perfect and adaptive security in exposure-resilient cryptography. Zbl 0981.94014
Dodis, Yevgeniy; Sahai, Amit; Smith, Adam
5
2001
The double ratchet: security notions, proofs, and modularization for the Signal protocol. Zbl 1470.94101
Alwen, Joël; Coretti, Sandro; Dodis, Yevgeniy
5
2019
A new mode of operation for block ciphers and length-preserving MACs. Zbl 1149.94311
Dodis, Yevgeniy; Pietrzak, Krzysztof; Puniya, Prashant
5
2008
How to eat your entropy and have it too – optimal recovery strategies for compromised RNGs. Zbl 1334.94073
Dodis, Yevgeniy; Shamir, Adi; Stephens-Davidowitz, Noah; Wichs, Daniel
5
2014
Reusable non-interactive secure computation. Zbl 07178324
Chase, Melissa; Dodis, Yevgeniy; Ishai, Yuval; Kraschewski, Daniel; Liu, Tianren; Ostrovsky, Rafail; Vaikuntanathan, Vinod
5
2019
Security amplification for interactive cryptographic primitives. Zbl 1213.94098
Dodis, Yevgeniy; Impagliazzo, Russell; Jaiswal, Ragesh; Kabanets, Valentine
4
2009
Composability and on-line deniability of authentication. Zbl 1213.94155
Dodis, Yevgeniy; Katz, Jonathan; Smith, Adam; Walfish, Shabsi
4
2009
Indifferentiability of confusion-diffusion networks. Zbl 1371.94632
Dodis, Yevgeniy; Stam, Martijn; Steinberger, John; Liu, Tianren
4
2016
Bottleneck links, variable demand, and the tragedy of the commons. Zbl 1269.91028
Cole, Richard; Dodis, Yevgeniy; Roughgarden, Tim
4
2012
On the power of claw-free permutations. Zbl 1022.68051
Dodis, Yevgeniy; Reyzin, Leonid
4
2003
Concealment and its applications to authenticated encryption. Zbl 1038.94528
Dodis, Yevgeniy; An, Jee Hea
4
2003
Getting the best out of existing hash functions; or what if we are stuck with SHA? Zbl 1319.94061
Dodis, Yevgeniy; Puniya, Prashant
4
2008
Privacy with imperfect randomness. Zbl 1369.94529
Dodis, Yevgeniy; Yao, Yanqing
4
2015
Robust fuzzy extractors and authenticated key agreement from close secrets. Zbl 1364.94577
Dodis, Yevgeniy; Kanukurthi, Bhavana; Katz, Jonathan; Reyzin, Leonid; Smith, Adam
4
2012
Fixing cracks in the concrete: random oracles with auxiliary input, revisited. Zbl 1415.94424
Dodis, Yevgeniy; Guo, Siyao; Katz, Jonathan
4
2017
Random oracles and non-uniformity. Zbl 1423.94063
Coretti, Sandro; Dodis, Yevgeniy; Guo, Siyao; Steinberger, John
3
2018
Non-malleable codes from additive combinatorics. Zbl 1401.94233
Aggarwal, Divesh; Dodis, Yevgeniy; Lovett, Shachar
3
2018
Lower bounds for oblivious transfer reductions. Zbl 0932.68044
Dodis, Yevgeniy; Micali, Silvio
3
1999
The 2-catalog segmentation problem. Zbl 0937.68157
Dodis, Yevgeniy; Guruswami, Venkatesan; Khanna, Sanjeev
3
1999
A new distribution-sensitive secure sketch and popularity-proportional hashing. Zbl 1418.94064
Woodage, Joanne; Chatterjee, Rahul; Dodis, Yevgeniy; Juels, Ari; Ristenpart, Thomas
3
2017
Extracting randomness from extractor-dependent sources. Zbl 1479.94160
Dodis, Yevgeniy; Vaikuntanathan, Vinod; Wichs, Daniel
3
2020
Non-uniform bounds in the random-permutation, ideal-cipher, and generic-group models. Zbl 1444.94058
Coretti, Sandro; Dodis, Yevgeniy; Guo, Siyao
2
2018
Threshold and proactive pseudo-random permutations. Zbl 1113.65006
Dodis, Yevgeniy; Yampolskiy, Aleksandr; Yung, Moti
2
2006
Does privacy require true randomness? Zbl 1129.94042
Bosley, Carl; Dodis, Yevgeniy
2
2007
Parallel reducibility for information-theoretically secure computation. Zbl 0989.68555
Dodis, Yevgeniy; Micali, Silvio
2
2000
Counterexamples to hardness amplification beyond negligible. Zbl 1304.68072
Dodis, Yevgeniy; Jain, Abhishek; Moran, Tal; Wichs, Daniel
2
2012
Differential privacy with imperfect randomness. Zbl 1296.94105
Dodis, Yevgeniy; López-Alt, Adriana; Mironov, Ilya; Vadhan, Salil
2
2012
Shannon impossibility, revisited. Zbl 1295.94054
Dodis, Yevgeniy
2
2012
Cryptography and game theory. Zbl 1151.91329
Dodis, Yevgeniy; Rabin, Tal
2
2007
Extracting randomness from extractor-dependent sources. Zbl 1479.94160
Dodis, Yevgeniy; Vaikuntanathan, Vinod; Wichs, Daniel
3
2020
The double ratchet: security notions, proofs, and modularization for the Signal protocol. Zbl 1470.94101
Alwen, Joël; Coretti, Sandro; Dodis, Yevgeniy
5
2019
Reusable non-interactive secure computation. Zbl 07178324
Chase, Melissa; Dodis, Yevgeniy; Ishai, Yuval; Kraschewski, Daniel; Liu, Tianren; Ostrovsky, Rafail; Vaikuntanathan, Vinod
5
2019
Seedless fruit is the sweetest: random number generation, revisited. Zbl 1472.94048
Coretti, Sandro; Dodis, Yevgeniy; Karthikeyan, Harish; Tessaro, Stefano
2
2019
Provable security of (tweakable) block ciphers based on substitution-permutation networks. Zbl 1444.94055
Cogliati, Benoît; Dodis, Yevgeniy; Katz, Jonathan; Lee, Jooyoung; Steinberger, John; Thiruvengadam, Aishwarya; Zhang, Zhe
5
2018
Random oracles and non-uniformity. Zbl 1423.94063
Coretti, Sandro; Dodis, Yevgeniy; Guo, Siyao; Steinberger, John
3
2018
Non-malleable codes from additive combinatorics. Zbl 1401.94233
Aggarwal, Divesh; Dodis, Yevgeniy; Lovett, Shachar
3
2018
Non-uniform bounds in the random-permutation, ideal-cipher, and generic-group models. Zbl 1444.94058
Coretti, Sandro; Dodis, Yevgeniy; Guo, Siyao
2
2018
Fixing cracks in the concrete: random oracles with auxiliary input, revisited. Zbl 1415.94424
Dodis, Yevgeniy; Guo, Siyao; Katz, Jonathan
4
2017
A new distribution-sensitive secure sketch and popularity-proportional hashing. Zbl 1418.94064
Woodage, Joanne; Chatterjee, Rahul; Dodis, Yevgeniy; Juels, Ari; Ristenpart, Thomas
3
2017
How to eat your entropy and have it too: optimal recovery strategies for compromised RNGs. Zbl 1405.94032
Dodis, Yevgeniy; Shamir, Adi; Stephens-Davidowitz, Noah; Wichs, Daniel
1
2017
Spooky encryption and its applications. Zbl 1406.94045
Dodis, Yevgeniy; Halevi, Shai; Rothblum, Ron D.; Wichs, Daniel
17
2016
Non-malleable encryption: simpler, shorter, stronger. Zbl 1388.94043
Coretti, Sandro; Dodis, Yevgeniy; Tackmann, Björn; Venturi, Daniele
14
2016
Message transmission with reverse firewalls – secure communication on corrupted machines. Zbl 1378.94039
Dodis, Yevgeniy; Mironov, Ilya; Stephens-Davidowitz, Noah
10
2016
Indifferentiability of confusion-diffusion networks. Zbl 1371.94632
Dodis, Yevgeniy; Stam, Martijn; Steinberger, John; Liu, Tianren
4
2016
Interactive coding for interactive proofs. Zbl 1382.94068
Bishop, Allison; Dodis, Yevgeniy
1
2016
A formal treatment of backdoored pseudorandom generators. Zbl 1365.94423
Dodis, Yevgeniy; Ganesh, Chaya; Golovnev, Alexander; Juels, Ari; Ristenpart, Thomas
15
2015
Non-malleable reductions and applications. Zbl 1321.94139
Aggarwal, Divesh; Dodis, Yevgeniy; Kazana, Tomasz; Obremski, Maciej
14
2015
Theory of cryptography. 12th theory of cryptography conference, TCC 2015, Warsaw, Poland, March 23–25, 2015. Proceedings, Part II. Zbl 1312.94004
7
2015
Privacy with imperfect randomness. Zbl 1369.94529
Dodis, Yevgeniy; Yao, Yanqing
4
2015
Non-malleable codes from additive combinatorics (extended abstract). Zbl 1315.94142
Aggarwal, Divesh; Dodis, Yevgeniy; Lovett, Shachar
19
2014
Key derivation without entropy waste. Zbl 1326.94085
Dodis, Yevgeniy; Pietrzak, Krzysztof; Wichs, Daniel
7
2014
How to eat your entropy and have it too – optimal recovery strategies for compromised RNGs. Zbl 1334.94073
Dodis, Yevgeniy; Shamir, Adi; Stephens-Davidowitz, Noah; Wichs, Daniel
5
2014
Privacy amplification and nonmalleable extractors via character sums. Zbl 1302.94043
Dodis, Yevgeniy; Li, Xin; Wooley, Trevor D.; Zuckerman, David
2
2014
Amplifying privacy in privacy amplification. Zbl 1334.94054
Aggarwal, Divesh; Dodis, Yevgeniy; Jafargholi, Zahra; Miles, Eric; Reyzin, Leonid
1
2014
Interactive encryption and message authentication. Zbl 1378.94038
Dodis, Yevgeniy; Fiore, Dario
1
2014
Overcoming weak expectations. Zbl 1296.94107
Dodis, Yevgeniy; Yu, Yu
16
2013
On the indifferentiability of key-alternating ciphers. Zbl 1310.94124
Andreeva, Elena; Bogdanov, Andrey; Dodis, Yevgeniy; Mennink, Bart; Steinberger, John P.
15
2013
On continual leakage of discrete log representations. Zbl 1326.94069
Agrawal, Shweta; Dodis, Yevgeniy; Vaikuntanathan, Vinod; Wichs, Daniel
9
2013
Message authentication, revisited. Zbl 1297.94117
Dodis, Yevgeniy; Kiltz, Eike; Pietrzak, Krzysztof; Wichs, Daniel
11
2012
Randomness condensers for efficiently samplable, seed-dependent sources. Zbl 1304.94047
Dodis, Yevgeniy; Ristenpart, Thomas; Vadhan, Salil
7
2012
To hash or not to hash again? (In)differentiability results for \(H^2\) and HMAC. Zbl 1296.94106
Dodis, Yevgeniy; Ristenpart, Thomas; Steinberger, John; Tessaro, Stefano
6
2012
On the instantiability of hash-and-sign RSA signatures. Zbl 1303.94078
Dodis, Yevgeniy; Haitner, Iftach; Tentes, Aris
5
2012
Bottleneck links, variable demand, and the tragedy of the commons. Zbl 1269.91028
Cole, Richard; Dodis, Yevgeniy; Roughgarden, Tim
4
2012
Robust fuzzy extractors and authenticated key agreement from close secrets. Zbl 1364.94577
Dodis, Yevgeniy; Kanukurthi, Bhavana; Katz, Jonathan; Reyzin, Leonid; Smith, Adam
4
2012
Counterexamples to hardness amplification beyond negligible. Zbl 1304.68072
Dodis, Yevgeniy; Jain, Abhishek; Moran, Tal; Wichs, Daniel
2
2012
Differential privacy with imperfect randomness. Zbl 1296.94105
Dodis, Yevgeniy; López-Alt, Adriana; Mironov, Ilya; Vadhan, Salil
2
2012
Shannon impossibility, revisited. Zbl 1295.94054
Dodis, Yevgeniy
2
2012
Storing secrets on continually leaky devices. Zbl 1292.94055
Dodis, Yevgeniy; Lewko, Allison; Waters, Brent; Wichs, Daniel
17
2011
Leftover hash lemma, revisited. Zbl 1287.94047
Barak, Boaz; Dodis, Yevgeniy; Krawczyk, Hugo; Pereira, Olivier; Pietrzak, Krzysztof; Standaert, François-Xavier; Yu, Yu
12
2011
Domain extension for MACs beyond the birthday barrier. Zbl 1281.94022
Dodis, Yevgeniy; Steinberger, John
6
2011
Privacy amplification and non-malleable extractors via character sums. Zbl 1292.94169
Dodis, Yevgeniy; Li, Xin; Wooley, Trevor D.; Zuckerman, David
1
2011
Efficient public-key cryptography in the presence of key leakage. Zbl 1290.94064
Dodis, Yevgeniy; Haralambiev, Kristiyan; López-Alt, Adriana; Wichs, Daniel
51
2010
Public-key encryption in the bounded-retrieval model. Zbl 1279.94051
Alwen, Joël; Dodis, Yevgeniy; Naor, Moni; Segev, Gil; Walfish, Shabsi; Wichs, Daniel
33
2010
Public-key encryption schemes with auxiliary inputs. Zbl 1274.94062
Dodis, Yevgeniy; Goldwasser, Shafi; Tauman Kalai, Yael; Peikert, Chris; Vaikuntanathan, Vinod
33
2010
Survey: leakage resilience and the bounded retrieval model. Zbl 1282.94031
Alwen, Joël; Dodis, Yevgeniy; Wichs, Daniel
13
2010
Leakage-resilient pseudorandom functions and side-channel attacks on Feistel networks. Zbl 1280.94047
Dodis, Yevgeniy; Pietrzak, Krzysztof
12
2010
A domain extender for the ideal cipher. Zbl 1274.94054
Coron, Jean-Sébastien; Dodis, Yevgeniy; Mandal, Avradip; Seurin, Yannick
12
2010
Changing base without losing space. Zbl 1293.68118
Dodis, Yevgeniy; Patrascu, Mihai; Thorup, Mikkel
12
2010
Concealment and its applications to authenticated encryption. Zbl 1217.68087
Dodis, Yevgeniy
1
2010
Leakage-resilient public-key cryptography in the bounded-retrieval model. Zbl 1252.94041
Alwen, Joël; Dodis, Yevgeniy; Wichs, Daniel
52
2009
On cryptography with auxiliary input. Zbl 1304.94046
Dodis, Yevgeniy; Kalai, Yael Tauman; Lovett, Shachar
34
2009
Salvaging Merkle-Damgård for practical applications. Zbl 1239.94047
Dodis, Yevgeniy; Ristenpart, Thomas; Shrimpton, Thomas
13
2009
Non-malleable extractors and symmetric key cryptography from weak secrets. Zbl 1304.94048
Dodis, Yevgeniy; Wichs, Daniel
11
2009
Proofs of retrievability via hardness amplification. Zbl 1213.68246
Dodis, Yevgeniy; Vadhan, Salil; Wichs, Daniel
9
2009
Message authentication codes from unpredictable block ciphers. Zbl 1252.94058
Dodis, Yevgeniy; Steinberger, John
7
2009
Indifferentiability of permutation-based compression functions and tree-based modes of operation, with applications to MD6. Zbl 1248.94065
Dodis, Yevgeniy; Reyzin, Leonid; Rivest, Ronald L.; Shen, Emily
6
2009
Security amplification for interactive cryptographic primitives. Zbl 1213.94098
Dodis, Yevgeniy; Impagliazzo, Russell; Jaiswal, Ragesh; Kabanets, Valentine
4
2009
Composability and on-line deniability of authentication. Zbl 1213.94155
Dodis, Yevgeniy; Katz, Jonathan; Smith, Adam; Walfish, Shabsi
4
2009
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. Zbl 1165.94326
Dodis, Yevgeniy; Ostrovsky, Rafail; Reyzin, Leonid; Smith, Adam
97
2008
Detection of algebraic manipulation with applications to robust secret sharing and fuzzy extractors. Zbl 1149.94333
Cramer, Ronald; Dodis, Yevgeniy; Fehr, Serge; Padró, Carles; Wichs, Daniel
39
2008
Efficient constructions of composable commitments and zero-knowledge proofs. Zbl 1183.94030
Dodis, Yevgeniy; Shoup, Victor; Walfish, Shabsi
5
2008
A new mode of operation for block ciphers and length-preserving MACs. Zbl 1149.94311
Dodis, Yevgeniy; Pietrzak, Krzysztof; Puniya, Prashant
5
2008
Getting the best out of existing hash functions; or what if we are stuck with SHA? Zbl 1319.94061
Dodis, Yevgeniy; Puniya, Prashant
4
2008
Universally composable security with global setup. Zbl 1129.94014
Canetti, Ran; Dodis, Yevgeniy; Pass, Rafael; Walfish, Shabsi
42
2007
Optimistic fair exchange in a multi-user setting. Zbl 1127.94345
Dodis, Yevgeniy; Lee, Pil Joong; Yum, Dae Hyun
12
2007
Intrusion-resilient key exchange in the bounded retrieval model. Zbl 1156.94338
Cash, David; Ding, Yan Zong; Dodis, Yevgeniy; Lee, Wenke; Lipton, Richard; Walfish, Shabsi
9
2007
Does privacy require true randomness? Zbl 1129.94042
Bosley, Carl; Dodis, Yevgeniy
2
2007
Cryptography and game theory. Zbl 1151.91329
Dodis, Yevgeniy; Rabin, Tal
2
2007
Improving the security of MACs via randomized message preprocessing. Zbl 1186.94434
Dodis, Yevgeniy; Pietrzak, Krzysztof
2
2007
Feistel networks made public, and applications. Zbl 1141.94350
Dodis, Yevgeniy; Puniya, Prashant
1
2007
How much can taxes help selfish routing? Zbl 1103.68018
Cole, Richard; Dodis, Yevgeniy; Roughgarden, Tim
40
2006
Robust fuzzy extractors and authenticated key agreement from close secrets. Zbl 1161.94440
Dodis, Yevgeniy; Katz, Jonathan; Reyzin, Leonid; Smith, Adam
14
2006
Bottleneck links, variable demand, and the tragedy of the commons. Zbl 1192.91040
Cole, Richard; Dodis, Yevgeniy; Roughgarden, Tim
9
2006
On the relation between the ideal cipher and the random oracle models. Zbl 1112.94009
Dodis, Yevgeniy; Puniya, Prashant
9
2006
Mercurial commitments: minimal assumptions and efficient constructions. Zbl 1112.94006
Catalano, Dario; Dodis, Yevgeniy; Visconti, Ivan
8
2006
Threshold and proactive pseudo-random permutations. Zbl 1113.65006
Dodis, Yevgeniy; Yampolskiy, Aleksandr; Yung, Moti
2
2006
Separating sources for encryption and secret sharing. Zbl 1113.94007
Dodis, Yevgeniy; Pietrzak, Krzysztof; Przydatek, Bartosz
1
2006
Public key cryptography – PKC 2006. 9th international conference on theory and practice of public-key cryptography, New York, NY, USA, April 24–26, 2006. Proceedings. Zbl 1102.94003
1
2006
Merkle-Damgård revisited: How to construct a hash function. Zbl 1145.94436
Coron, Jean-Sébastien; Dodis, Yevgeniy; Malinaud, Cécile; Puniya, Prashant
54
2005
A verifiable random function with short proofs and keys. Zbl 1081.94521
Dodis, Yevgeniy; Yampolskiy, Aleksandr
30
2005
Correcting errors without leaking partial information. Zbl 1192.94118
Dodis, Yevgeniy; Smith, Adam
24
2005
On the generic insecurity of the full domain hash. Zbl 1145.94440
Dodis, Yevgeniy; Oliveira, Roberto; Pietrzak, Krzysztof
20
2005
Chosen-ciphertext security of multiple encryption. Zbl 1079.94545
Dodis, Yevgeniy; Katz, Jonathan
16
2005
Secure remote authentication using biometric data. Zbl 1137.94365
Boyen, Xavier; Dodis, Yevgeniy; Katz, Jonathan; Ostrovsky, Rafail; Smith, Adam
13
2005
Entropic security and the encryption of high entropy messages. Zbl 1080.94523
Dodis, Yevgeniy; Smith, Adam
9
2005
Time capsule signature. Zbl 1120.94316
Dodis, Yevgeniy; Yum, Dae Hyun
5
2005
Scalable public-key tracing and revoking. Zbl 1264.94108
Dodis, Yevgeniy; Fazio, Nelly; Kiayias, Aggelos; Yung, Moti
1
2005
Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. Zbl 1122.94368
Dodis, Yevgeniy; Reyzin, Leonid; Smith, Adam
42
2004
Anonymous identification in ad hoc groups. Zbl 1122.94414
Dodis, Yevgeniy; Kiayias, Aggelos; Nicolosi, Antonio; Shoup, Victor
23
2004
Improved randomness extraction from two independent sources. Zbl 1106.68036
Dodis, Yevgeniy; Elbaz, Ariel; Oliveira, Roberto; Raz, Ran
12
2004
Randomness extraction and key derivation using the CBC, cascade and HMAC modes. Zbl 1104.68470
Dodis, Yevgeniy; Gennaro, Rosario; Håstad, Johan; Krawczyk, Hugo; Rabin, Tal
11
2004
A generic construction for intrusion-resilient public-key encryption. Zbl 1196.94048
Dodis, Yevgeniy; Franklin, Matt; Katz, Jonathan; Miyaji, Atsuko; Yung, Moti
5
2004
Public key broadcast encryption for stateless receivers. Zbl 1327.94041
Dodis, Yevgeniy; Fazio, Nelly
36
2003
Pricing network edges for heterogeneous selfish users. Zbl 1192.68032
Cole, Richard; Dodis, Yevgeniy; Roughgarden, Tim
27
2003
Intrusion-resilient public-key encryption. Zbl 1039.94515
Dodis, Yevgeniy; Franklin, Matt; Katz, Jonathan; Miyaji, Atsuko; Yung, Moti
10
2003
On extracting private randomness over a public channel. Zbl 1279.68350
Dodis, Yevgeniy; Oliveira, Roberto
6
2003
On the power of claw-free permutations. Zbl 1022.68051
Dodis, Yevgeniy; Reyzin, Leonid
4
2003
Concealment and its applications to authenticated encryption. Zbl 1038.94528
Dodis, Yevgeniy; An, Jee Hea
4
2003
Scalable public-key tracing and revoking. Zbl 1321.94106
Dodis, Yevgeniy; Fazio, Nelly; Kiayias, Aggelos; Yung, Moti
1
2003
...and 14 more Documents
all top 5

Cited by 1,539 Authors

20 Mu, Yi
19 Susilo, Willy
18 Venturi, Daniele
15 Bellare, Mihir
15 Libert, Benoît
14 Dodis, Yevgeniy
14 Yung, Moti
13 Canetti, Ran
13 Tessaro, Stefano
12 Hanaoka, Goichiro
12 Liu, Shengli
12 Pietrzak, Krzysztof
12 Yang, Bo
12 Yang, Guomin
11 Hazay, Carmit
11 Hofheinz, Dennis
11 Ishai, Yuval
11 Reyzin, Leonid
10 Ostrovsky, Rafail
10 Pass, Rafael
10 Skorski, Maciej
10 Vaikuntanathan, Vinod
10 Wichs, Daniel
9 Dachman-Soled, Dana
9 Kiltz, Eike
9 Weng, Jian
9 Zhou, Yanwei
8 Bitansky, Nir
8 Chen, Rongmao
8 Chen, Yu
8 Emura, Keita
8 Faonio, Antonio
8 Gu, Dawu
8 Katz, Jonathan N.
8 Mennink, Bart
8 Nielsen, Jesper Buus
8 Segev, Gil
8 Venkitasubramaniam, Muthuramakrishnan
8 Waters, Brent
8 Wong, Duncan S.
7 Au, Man Ho
7 Faust, Sebastian
7 Goldwasser, Shafi
7 Guo, Chun
7 Guo, Fuchun
7 Harks, Tobias
7 Huang, Qiong
7 Khurana, Dakshita
7 Li, Jiguo
7 Lin, Huijia
7 Paterson, Maura Beth
7 Raskhodnikova, Sofya
7 Seurin, Yannick
7 Zhang, Jiang
7 Zhang, Mingwu
6 Boyle, Elette
6 Brakerski, Zvika
6 Camenisch, Jan L.
6 Damgård, Ivan Bjerre
6 Goyal, Vipul
6 Hao, Rong
6 Kiayias, Aggelos
6 Klimm, Max
6 Komargodski, Ilan
6 Lindell, Yehuda
6 Long, Yu
6 Nandi, Mridul
6 O’Neill, Adam
6 Rothblum, Guy N.
6 Schröder, Dominique
6 Seo, Jae Hong
6 Stam, Martijn
6 Stinson, Douglas Robert
6 Tanaka, Keisuke
6 Visconti, Ivan
6 Wee, Hoeteck
6 Yu, Jia
5 Abdalla, Michel
5 Benhamouda, Fabrice
5 Boneh, Dan
5 Boyen, Xavier
5 Cash, David M.
5 Chen, Kefei
5 Cheng, Xiangguo
5 Chow, Sherman S. M.
5 Fotakis, Dimitris A.
5 Fouque, Pierre-Alain
5 Groth, Jens
5 Guo, Siyao
5 Han, Shuai
5 Jager, Tibor
5 Kanukurthi, Bhavana
5 Lee, Kwangsu
5 Lin, Dongdai
5 Liu, Joseph K. K.
5 Lu, Yang
5 Masny, Daniel
5 Matsuda, Takahiro
5 Nutov, Zeev
5 Park, Jonghwan
...and 1,439 more Authors
all top 5

Cited in 93 Serials

97 Journal of Cryptology
72 Theoretical Computer Science
55 Designs, Codes and Cryptography
34 Information Sciences
20 Algorithmica
18 SIAM Journal on Computing
14 Journal of Mathematical Cryptology
12 Information Processing Letters
12 Journal of Computer and System Sciences
10 Discrete Mathematics
10 Information and Computation
9 International Journal of Foundations of Computer Science
7 Games and Economic Behavior
7 Theory of Computing Systems
7 Journal of Shanghai Jiaotong University (Science)
7 Cryptography and Communications
6 Discrete Applied Mathematics
6 Frontiers of Computer Science
5 European Journal of Operational Research
5 Distributed Computing
5 Computational Complexity
5 Journal of Combinatorial Optimization
4 Combinatorica
4 Soft Computing
4 Journal of Discrete Mathematical Sciences & Cryptography
4 Advances in Mathematics of Communications
4 Matematicheskie Voprosy Kriptografii
3 Operations Research
3 Operations Research Letters
3 Mathematical and Computer Modelling
3 SIAM Journal on Discrete Mathematics
3 Mathematical Programming. Series A. Series B
3 Informatica (Vilnius)
3 Science in China. Series F
2 Mathematics of Operations Research
2 Naval Research Logistics
2 Networks
2 Random Structures & Algorithms
2 MSCS. Mathematical Structures in Computer Science
2 Quantum Information Processing
2 Journal of Discrete Algorithms
2 International Journal of Quantum Information
2 Groups, Complexity, Cryptology
2 Science China. Mathematics
2 Science China. Information Sciences
1 Acta Informatica
1 American Mathematical Monthly
1 Artificial Intelligence
1 Computers & Mathematics with Applications
1 Rocky Mountain Journal of Mathematics
1 Applied Mathematics and Computation
1 Archiv der Mathematik
1 Computing
1 International Journal of Game Theory
1 Journal of Combinatorial Theory. Series A
1 Journal of Economic Theory
1 Journal of Optimization Theory and Applications
1 Theory and Decision
1 Cryptologia
1 European Journal of Combinatorics
1 Social Choice and Welfare
1 Journal of Computer Science and Technology
1 New Generation Computing
1 Journal of Parallel and Distributed Computing
1 Annals of Operations Research
1 Pattern Recognition
1 Applicable Algebra in Engineering, Communication and Computing
1 Journal of Nonlinear Science
1 Journal of Algebraic Combinatorics
1 Tatra Mountains Mathematical Publications
1 Formal Methods in System Design
1 Journal of Computer and Systems Sciences International
1 The Electronic Journal of Combinatorics
1 Annals of Mathematics and Artificial Intelligence
1 Mathematical Problems in Engineering
1 Nonlinear Dynamics
1 Journal of Inequalities and Applications
1 Journal of the ACM
1 Wuhan University Journal of Natural Sciences (WUJNS)
1 Annals of Mathematics. Second Series
1 Journal of Systems Science and Complexity
1 Sādhanā
1 Multiscale Modeling & Simulation
1 Discrete Optimization
1 Journal of Industrial and Management Optimization
1 Journal of Zhejiang University. Science A
1 Algorithms
1 Statistics Surveys
1 Symmetry
1 Dynamic Games and Applications
1 EURO Journal on Computational Optimization
1 Journal of Logical and Algebraic Methods in Programming
1 Journal of Computational and Engineering Mathematics

Citations by Year