×

zbMATH — the first resource for mathematics

Dodis, Yevgeniy

Compute Distance To:
Author ID: dodis.yevgeniy Recent zbMATH articles by "Dodis, Yevgeniy"
Published as: Dodis, Y.; Dodis, Yevgeniy
External Links: MGP · Wikidata
Documents Indexed: 121 Publications since 1999, including 3 Books
all top 5

Co-Authors

4 single-authored
15 Wichs, Daniel
11 Katz, Jonathan N.
8 Pietrzak, Krzysztof
8 Yung, Moti
7 Reyzin, Leonid
7 Steinberger, John P.
6 Coretti, Sandro
6 Ristenpart, Thomas
5 Fazio, Nelly
5 Puniya, Prashant
5 Walfish, Shabsi
4 Aggarwal, Divesh
4 Alwen, Joël
4 Cole, Richard John
4 Halevi, Shai
4 Kiayias, Aggelos
4 Rabin, Tal
4 Roughgarden, Tim
4 Smith, Adam T.
3 Guo, Siyao
3 Lovett, Shachar
3 Oliveira, Roberto Imbuzeiro
3 Ostrovsky, Rafail
3 Smith, Adam J.
3 Stephens-Davidowitz, Noah
3 Vadhan, Salil P.
3 Vaikuntanathan, Vinod
3 Yum, Dae Hyun
2 An, Jee Hea
2 Canetti, Ran
2 Coron, Jean-Sébastien
2 Franklin, Matthew K.
2 Juels, Ari
2 Khanna, Sanjeev
2 Krawczyk, Hugo
2 Lee, Pil Joong
2 Li, Xin
2 Liu, Tianren
2 López-Alt, Adriana
2 Micali, Silvio
2 Mironov, Ilya
2 Miyaji, Atsuko
2 Nielsen, Jesper Buus
2 Shamir, Adi
2 Shoup, Victor
2 Smith, Adam N. H.
2 Tackmann, Björn
2 Tauman Kalai, Yael
2 Tessaro, Stefano
2 Venturi, Daniele
2 Woodage, Joanne
2 Wooley, Trevor D.
2 Xu, Shouhuai
2 Yampolskiy, Aleksandr
2 Yu, Yu
2 Zuckerman, David
1 Agrawal, Shweta
1 Andreeva, Elena Anatol’evna
1 Barak, Boaz
1 Bishop, Allison
1 Bogdanov, Andrey
1 Bosley, Carl
1 Boyen, Xavier
1 Cash, David M.
1 Catalano, Dario
1 Chase, Melissa
1 Chatterjee, Rahul
1 Cogliati, Benoît
1 Cramer, Ronald John Fitzgerald
1 Ding, Yan Zong
1 Elbaz, Ariel
1 Fehr, Serge
1 Fiore, Dario
1 Ganesh, Chaya
1 Gennaro, Rosario
1 Goldreich, Oded
1 Goldwasser, Shafi
1 Golovnev, Alexander
1 Grubbs, Paul
1 Guruswami, Venkatesan
1 Haitner, Iftach
1 Haralambiev, Kristiyan
1 Håstad, Johan Torkel
1 Impagliazzo, Russell
1 Ishai, Yuval
1 Jafargholi, Zahra
1 Jain, Abhishek
1 Jaiswal, Ragesh
1 Kabanets, Valentine
1 Kanukurthi, Bhavana
1 Karthikeyan, Harish
1 Kazana, Tomasz
1 Kiltz, Eike
1 Kraschewski, Daniel
1 Lee, Jooyoung
1 Lee, Wenke
1 Lehman, Eric
1 Lewko, Allison Bishop
1 Lipton, Richard J.
1 Lysyanskaya, Anna
...and 39 more Co-Authors

Publications by Year

Citations contained in zbMATH

102 Publications have been cited 1,176 times in 759 Documents Cited by Year
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. Zbl 1165.94326
Dodis, Yevgeniy; Ostrovsky, Rafail; Reyzin, Leonid; Smith, Adam
70
2008
Merkle-Damgård revisited: How to construct a hash function. Zbl 1145.94436
Coron, Jean-Sébastien; Dodis, Yevgeniy; Malinaud, Cécile; Puniya, Prashant
48
2005
Leakage-resilient public-key cryptography in the bounded-retrieval model. Zbl 1252.94041
Alwen, Joël; Dodis, Yevgeniy; Wichs, Daniel
45
2009
On the security of joint signature and encryption. Zbl 1055.94511
An, Jee Hea; Dodis, Yevgeniy; Rabin, Tal
43
2002
Efficient public-key cryptography in the presence of key leakage. Zbl 1290.94064
Dodis, Yevgeniy; Haralambiev, Kristiyan; López-Alt, Adriana; Wichs, Daniel
42
2010
How much can taxes help selfish routing? Zbl 1103.68018
Cole, Richard; Dodis, Yevgeniy; Roughgarden, Tim
37
2006
Public key broadcast encryption for stateless receivers. Zbl 1327.94041
Dodis, Yevgeniy; Fazio, Nelly
35
2003
Detection of algebraic manipulation with applications to robust secret sharing and fuzzy extractors. Zbl 1149.94333
Cramer, Ronald; Dodis, Yevgeniy; Fehr, Serge; Padró, Carles; Wichs, Daniel
30
2008
Universally composable security with global setup. Zbl 1129.94014
Canetti, Ran; Dodis, Yevgeniy; Pass, Rafael; Walfish, Shabsi
30
2007
Public-key encryption in the bounded-retrieval model. Zbl 1279.94051
Alwen, Joël; Dodis, Yevgeniy; Naor, Moni; Segev, Gil; Walfish, Shabsi; Wichs, Daniel
27
2010
Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. Zbl 1122.94368
Dodis, Yevgeniy; Reyzin, Leonid; Smith, Adam
27
2004
Improved testing algorithms for monotonicity. Zbl 0949.68178
Dodis, Yevgeniy; Goldreich, Oded; Lehman, Eric; Raskhodnikova, Sofya; Ron, Dana; Samorodnitsky, Alex
27
1999
On cryptography with auxiliary input. Zbl 1304.94046
Dodis, Yevgeniy; Kalai, Yael Tauman; Lovett, Shachar
26
2009
A verifiable random function with short proofs and keys. Zbl 1081.94521
Dodis, Yevgeniy; Yampolskiy, Aleksandr
25
2005
Key-insulated public key cryptosystems. Zbl 1055.94012
Dodis, Yevgeniy; Katz, Jonathan; Xu, Shouhuai; Yung, Moti
25
2002
Public-key encryption schemes with auxiliary inputs. Zbl 1274.94062
Dodis, Yevgeniy; Goldwasser, Shafi; Tauman Kalai, Yael; Peikert, Chris; Vaikuntanathan, Vinod
24
2010
Pricing network edges for heterogeneous selfish users. Zbl 1192.68032
Cole, Richard; Dodis, Yevgeniy; Roughgarden, Tim
24
2003
Design networks with bounded pairwise distance. Zbl 1345.90032
Dodis, Yevgeniy; Khanna, Sanjeev
24
1999
Public key trace and revoke scheme secure against adaptive chosen ciphertext attack. Zbl 1033.94522
Dodis, Yevgeniy; Fazio, Nelly
23
2002
Strong key-insulated signature schemes. Zbl 1033.94555
Dodis, Yevgeniy; Katz, Jonathan; Xu, Shouhuai; Yung, Moti
22
2002
Correcting errors without leaking partial information. Zbl 1192.94118
Dodis, Yevgeniy; Smith, Adam
21
2005
Anonymous identification in ad hoc groups. Zbl 1122.94414
Dodis, Yevgeniy; Kiayias, Aggelos; Nicolosi, Antonio; Shoup, Victor
19
2004
Non-malleable codes from additive combinatorics (extended abstract). Zbl 1315.94142
Aggarwal, Divesh; Dodis, Yevgeniy; Lovett, Shachar
17
2014
Storing secrets on continually leaky devices. Zbl 1292.94055
Dodis, Yevgeniy; Lewko, Allison; Waters, Brent; Wichs, Daniel
17
2011
On the generic insecurity of the full domain hash. Zbl 1145.94440
Dodis, Yevgeniy; Oliveira, Roberto; Pietrzak, Krzysztof
17
2005
Chosen-ciphertext security of multiple encryption. Zbl 1079.94545
Dodis, Yevgeniy; Katz, Jonathan
15
2005
Non-malleable encryption: simpler, shorter, stronger. Zbl 1388.94043
Coretti, Sandro; Dodis, Yevgeniy; Tackmann, Björn; Venturi, Daniele
13
2016
On the indifferentiability of key-alternating ciphers. Zbl 1310.94124
Andreeva, Elena; Bogdanov, Andrey; Dodis, Yevgeniy; Mennink, Bart; Steinberger, John P.
13
2013
A formal treatment of backdoored pseudorandom generators. Zbl 1365.94423
Dodis, Yevgeniy; Ganesh, Chaya; Golovnev, Alexander; Juels, Ari; Ristenpart, Thomas
12
2015
Non-malleable reductions and applications. Zbl 1321.94139
Aggarwal, Divesh; Dodis, Yevgeniy; Kazana, Tomasz; Obremski, Maciej
12
2015
Survey: leakage resilience and the bounded retrieval model. Zbl 1282.94031
Alwen, Joël; Dodis, Yevgeniy; Wichs, Daniel
12
2010
A cryptographic solution to a game theoretic problem. Zbl 1001.91002
Dodis, Yevgeniy; Halevi, Shai; Rabin, Tal
12
2000
Salvaging Merkle-Damgård for practical applications. Zbl 1239.94047
Dodis, Yevgeniy; Ristenpart, Thomas; Shrimpton, Thomas
11
2009
Optimistic fair exchange in a multi-user setting. Zbl 1127.94345
Dodis, Yevgeniy; Lee, Pil Joong; Yum, Dae Hyun
11
2007
Randomness extraction and key derivation using the CBC, cascade and HMAC modes. Zbl 1104.68470
Dodis, Yevgeniy; Gennaro, Rosario; Håstad, Johan; Krawczyk, Hugo; Rabin, Tal
11
2004
Exposure-resilient functions and all-or-nothing transforms. Zbl 1082.94508
Canetti, Ran; Dodis, Yevgeniy; Halevi, Shai
11
2000
Overcoming weak expectations. Zbl 1296.94107
Dodis, Yevgeniy; Yu, Yu
10
2013
Leakage-resilient pseudorandom functions and side-channel attacks on Feistel networks. Zbl 1280.94047
Dodis, Yevgeniy; Pietrzak, Krzysztof
10
2010
Robust fuzzy extractors and authenticated key agreement from close secrets. Zbl 1161.94440
Dodis, Yevgeniy; Katz, Jonathan; Reyzin, Leonid; Smith, Adam
10
2006
Improved randomness extraction from two independent sources. Zbl 1106.68036
Dodis, Yevgeniy; Elbaz, Ariel; Oliveira, Roberto; Raz, Ran
10
2004
Intrusion-resilient public-key encryption. Zbl 1039.94515
Dodis, Yevgeniy; Franklin, Matt; Katz, Jonathan; Miyaji, Atsuko; Yung, Moti
10
2003
Non-malleable extractors and symmetric key cryptography from weak secrets. Zbl 1304.94048
Dodis, Yevgeniy; Wichs, Daniel
9
2009
Proofs of retrievability via hardness amplification. Zbl 1213.68246
Dodis, Yevgeniy; Vadhan, Salil; Wichs, Daniel
9
2009
Bottleneck links, variable demand, and the tragedy of the commons. Zbl 1192.91040
Cole, Richard; Dodis, Yevgeniy; Roughgarden, Tim
9
2006
On the relation between the ideal cipher and the random oracle models. Zbl 1112.94009
Dodis, Yevgeniy; Puniya, Prashant
9
2006
Secure remote authentication using biometric data. Zbl 1137.94365
Boyen, Xavier; Dodis, Yevgeniy; Katz, Jonathan; Ostrovsky, Rafail; Smith, Adam
9
2005
Entropic security and the encryption of high entropy messages. Zbl 1080.94523
Dodis, Yevgeniy; Smith, Adam
9
2005
Universal configurations in light-flipping games. Zbl 1004.91015
Dodis, Yevgeniy; Winkler, Peter
9
2001
Message authentication, revisited. Zbl 1297.94117
Dodis, Yevgeniy; Kiltz, Eike; Pietrzak, Krzysztof; Wichs, Daniel
8
2012
Changing base without losing space. Zbl 1293.68118
Dodis, Yevgeniy; Patrascu, Mihai; Thorup, Mikkel
8
2010
Intrusion-resilient key exchange in the bounded retrieval model. Zbl 1156.94338
Cash, David; Ding, Yan Zong; Dodis, Yevgeniy; Lee, Wenke; Lipton, Richard; Walfish, Shabsi
8
2007
Mercurial commitments: minimal assumptions and efficient constructions. Zbl 1112.94006
Catalano, Dario; Dodis, Yevgeniy; Visconti, Ivan
8
2006
Leftover hash lemma, revisited. Zbl 1287.94047
Barak, Boaz; Dodis, Yevgeniy; Krawczyk, Hugo; Pereira, Olivier; Pietrzak, Krzysztof; Standaert, François-Xavier; Yu, Yu
7
2011
A domain extender for the ideal cipher. Zbl 1274.94054
Coron, Jean-Sébastien; Dodis, Yevgeniy; Mandal, Avradip; Seurin, Yannick
7
2010
Efficient construction of (distributed) verifiable random functions. Zbl 1033.94521
Dodis, Yevgeniy
7
2002
Message transmission with reverse firewalls – secure communication on corrupted machines. Zbl 1378.94039
Dodis, Yevgeniy; Mironov, Ilya; Stephens-Davidowitz, Noah
6
2016
Spooky encryption and its applications. Zbl 1406.94045
Dodis, Yevgeniy; Halevi, Shai; Rothblum, Ron D.; Wichs, Daniel
6
2016
On continual leakage of discrete log representations. Zbl 1326.94069
Agrawal, Shweta; Dodis, Yevgeniy; Vaikuntanathan, Vinod; Wichs, Daniel
6
2013
Domain extension for MACs beyond the birthday barrier. Zbl 1281.94022
Dodis, Yevgeniy; Steinberger, John
6
2011
Theory of cryptography. 12th theory of cryptography conference, TCC 2015, Warsaw, Poland, March 23–25, 2015. Proceedings, Part II. Zbl 1312.94004
Dodis, Yevgeniy (ed.); Nielsen, Jesper Buus (ed.)
5
2015
Randomness condensers for efficiently samplable, seed-dependent sources. Zbl 1304.94047
Dodis, Yevgeniy; Ristenpart, Thomas; Vadhan, Salil
5
2012
Indifferentiability of permutation-based compression functions and tree-based modes of operation, with applications to MD6. Zbl 1248.94065
Dodis, Yevgeniy; Reyzin, Leonid; Rivest, Ronald L.; Shen, Emily
5
2009
Time capsule signature. Zbl 1120.94316
Dodis, Yevgeniy; Yum, Dae Hyun
5
2005
A generic construction for intrusion-resilient public-key encryption. Zbl 1196.94048
Dodis, Yevgeniy; Franklin, Matt; Katz, Jonathan; Miyaji, Atsuko; Yung, Moti
5
2004
Key derivation without entropy waste. Zbl 1326.94085
Dodis, Yevgeniy; Pietrzak, Krzysztof; Wichs, Daniel
4
2014
Bottleneck links, variable demand, and the tragedy of the commons. Zbl 1269.91028
Cole, Richard; Dodis, Yevgeniy; Roughgarden, Tim
4
2012
To hash or not to hash again? (In)differentiability results for \(H^2\) and HMAC. Zbl 1296.94106
Dodis, Yevgeniy; Ristenpart, Thomas; Steinberger, John; Tessaro, Stefano
4
2012
On the instantiability of hash-and-sign RSA signatures. Zbl 1303.94078
Dodis, Yevgeniy; Haitner, Iftach; Tentes, Aris
4
2012
Efficient constructions of composable commitments and zero-knowledge proofs. Zbl 1183.94030
Dodis, Yevgeniy; Shoup, Victor; Walfish, Shabsi
4
2008
Getting the best out of existing hash functions; or what if we are stuck with SHA? Zbl 1319.94061
Dodis, Yevgeniy; Puniya, Prashant
4
2008
A new mode of operation for block ciphers and length-preserving MACs. Zbl 1149.94311
Dodis, Yevgeniy; Pietrzak, Krzysztof; Puniya, Prashant
4
2008
On extracting private randomness over a public channel. Zbl 1279.68350
Dodis, Yevgeniy; Oliveira, Roberto
4
2003
Concealment and its applications to authenticated encryption. Zbl 1038.94528
Dodis, Yevgeniy; An, Jee Hea
4
2003
On the power of claw-free permutations. Zbl 1022.68051
Dodis, Yevgeniy; Reyzin, Leonid
4
2003
On perfect and adaptive security in exposure-resilient cryptography. Zbl 0981.94014
Dodis, Yevgeniy; Sahai, Amit; Smith, Adam
4
2001
Robust fuzzy extractors and authenticated key agreement from close secrets. Zbl 1364.94577
Dodis, Yevgeniy; Kanukurthi, Bhavana; Katz, Jonathan; Reyzin, Leonid; Smith, Adam
3
2012
Message authentication codes from unpredictable block ciphers. Zbl 1252.94058
Dodis, Yevgeniy; Steinberger, John
3
2009
The 2-catalog segmentation problem. Zbl 0937.68157
Dodis, Yevgeniy; Guruswami, Venkatesan; Khanna, Sanjeev
3
1999
How to eat your entropy and have it too – optimal recovery strategies for compromised RNGs. Zbl 1334.94073
Dodis, Yevgeniy; Shamir, Adi; Stephens-Davidowitz, Noah; Wichs, Daniel
2
2014
Privacy amplification and nonmalleable extractors via character sums. Zbl 1302.94043
Dodis, Yevgeniy; Li, Xin; Wooley, Trevor D.; Zuckerman, David
2
2014
Security amplification for interactive cryptographic primitives. Zbl 1213.94098
Dodis, Yevgeniy; Impagliazzo, Russell; Jaiswal, Ragesh; Kabanets, Valentine
2
2009
Improving the security of MACs via randomized message preprocessing. Zbl 1186.94434
Dodis, Yevgeniy; Pietrzak, Krzysztof
2
2007
Parallel reducibility for information-theoretically secure computation. Zbl 0989.68555
Dodis, Yevgeniy; Micali, Silvio
2
2000
Lower bounds for oblivious transfer reductions. Zbl 0932.68044
Dodis, Yevgeniy; Micali, Silvio
2
1999
The double ratchet: security notions, proofs, and modularization for the Signal protocol. Zbl 07162588
Alwen, Joël; Coretti, Sandro; Dodis, Yevgeniy
1
2019
Non-malleable codes from additive combinatorics. Zbl 1401.94233
Aggarwal, Divesh; Dodis, Yevgeniy; Lovett, Shachar
1
2018
A new distribution-sensitive secure sketch and popularity-proportional hashing. Zbl 1418.94064
Woodage, Joanne; Chatterjee, Rahul; Dodis, Yevgeniy; Juels, Ari; Ristenpart, Thomas
1
2017
Fixing cracks in the concrete: random oracles with auxiliary input, revisited. Zbl 1415.94424
Dodis, Yevgeniy; Guo, Siyao; Katz, Jonathan
1
2017
Interactive coding for interactive proofs. Zbl 1382.94068
Bishop, Allison; Dodis, Yevgeniy
1
2016
Privacy with imperfect randomness. Zbl 1369.94529
Dodis, Yevgeniy; Yao, Yanqing
1
2015
Interactive encryption and message authentication. Zbl 1378.94038
Dodis, Yevgeniy; Fiore, Dario
1
2014
Shannon impossibility, revisited. Zbl 1295.94054
Dodis, Yevgeniy
1
2012
Differential privacy with imperfect randomness. Zbl 1296.94105
Dodis, Yevgeniy; López-Alt, Adriana; Mironov, Ilya; Vadhan, Salil
1
2012
Privacy amplification and non-malleable extractors via character sums. Zbl 1292.94169
Dodis, Yevgeniy; Li, Xin; Wooley, Trevor D.; Zuckerman, David
1
2011
Concealment and its applications to authenticated encryption. Zbl 1217.68087
Dodis, Yevgeniy
1
2010
Composability and on-line deniability of authentication. Zbl 1213.94155
Dodis, Yevgeniy; Katz, Jonathan; Smith, Adam; Walfish, Shabsi
1
2009
Cryptography and game theory. Zbl 1151.91329
Dodis, Yevgeniy; Rabin, Tal
1
2007
Feistel networks made public, and applications. Zbl 1141.94350
Dodis, Yevgeniy; Puniya, Prashant
1
2007
Does privacy require true randomness? Zbl 1129.94042
Bosley, Carl; Dodis, Yevgeniy
1
2007
Public key cryptography – PKC 2006. 9th international conference on theory and practice of public-key cryptography, New York, NY, USA, April 24–26, 2006. Proceedings. Zbl 1102.94003
Yung, Moti (ed.); Dodis, Yevgeniy (ed.); Kiayias, Aggelos (ed.); Malkin, Tal (ed.)
1
2006
The double ratchet: security notions, proofs, and modularization for the Signal protocol. Zbl 07162588
Alwen, Joël; Coretti, Sandro; Dodis, Yevgeniy
1
2019
Non-malleable codes from additive combinatorics. Zbl 1401.94233
Aggarwal, Divesh; Dodis, Yevgeniy; Lovett, Shachar
1
2018
A new distribution-sensitive secure sketch and popularity-proportional hashing. Zbl 1418.94064
Woodage, Joanne; Chatterjee, Rahul; Dodis, Yevgeniy; Juels, Ari; Ristenpart, Thomas
1
2017
Fixing cracks in the concrete: random oracles with auxiliary input, revisited. Zbl 1415.94424
Dodis, Yevgeniy; Guo, Siyao; Katz, Jonathan
1
2017
Non-malleable encryption: simpler, shorter, stronger. Zbl 1388.94043
Coretti, Sandro; Dodis, Yevgeniy; Tackmann, Björn; Venturi, Daniele
13
2016
Message transmission with reverse firewalls – secure communication on corrupted machines. Zbl 1378.94039
Dodis, Yevgeniy; Mironov, Ilya; Stephens-Davidowitz, Noah
6
2016
Spooky encryption and its applications. Zbl 1406.94045
Dodis, Yevgeniy; Halevi, Shai; Rothblum, Ron D.; Wichs, Daniel
6
2016
Interactive coding for interactive proofs. Zbl 1382.94068
Bishop, Allison; Dodis, Yevgeniy
1
2016
A formal treatment of backdoored pseudorandom generators. Zbl 1365.94423
Dodis, Yevgeniy; Ganesh, Chaya; Golovnev, Alexander; Juels, Ari; Ristenpart, Thomas
12
2015
Non-malleable reductions and applications. Zbl 1321.94139
Aggarwal, Divesh; Dodis, Yevgeniy; Kazana, Tomasz; Obremski, Maciej
12
2015
Theory of cryptography. 12th theory of cryptography conference, TCC 2015, Warsaw, Poland, March 23–25, 2015. Proceedings, Part II. Zbl 1312.94004
Dodis, Yevgeniy (ed.); Nielsen, Jesper Buus (ed.)
5
2015
Privacy with imperfect randomness. Zbl 1369.94529
Dodis, Yevgeniy; Yao, Yanqing
1
2015
Non-malleable codes from additive combinatorics (extended abstract). Zbl 1315.94142
Aggarwal, Divesh; Dodis, Yevgeniy; Lovett, Shachar
17
2014
Key derivation without entropy waste. Zbl 1326.94085
Dodis, Yevgeniy; Pietrzak, Krzysztof; Wichs, Daniel
4
2014
How to eat your entropy and have it too – optimal recovery strategies for compromised RNGs. Zbl 1334.94073
Dodis, Yevgeniy; Shamir, Adi; Stephens-Davidowitz, Noah; Wichs, Daniel
2
2014
Privacy amplification and nonmalleable extractors via character sums. Zbl 1302.94043
Dodis, Yevgeniy; Li, Xin; Wooley, Trevor D.; Zuckerman, David
2
2014
Interactive encryption and message authentication. Zbl 1378.94038
Dodis, Yevgeniy; Fiore, Dario
1
2014
On the indifferentiability of key-alternating ciphers. Zbl 1310.94124
Andreeva, Elena; Bogdanov, Andrey; Dodis, Yevgeniy; Mennink, Bart; Steinberger, John P.
13
2013
Overcoming weak expectations. Zbl 1296.94107
Dodis, Yevgeniy; Yu, Yu
10
2013
On continual leakage of discrete log representations. Zbl 1326.94069
Agrawal, Shweta; Dodis, Yevgeniy; Vaikuntanathan, Vinod; Wichs, Daniel
6
2013
Message authentication, revisited. Zbl 1297.94117
Dodis, Yevgeniy; Kiltz, Eike; Pietrzak, Krzysztof; Wichs, Daniel
8
2012
Randomness condensers for efficiently samplable, seed-dependent sources. Zbl 1304.94047
Dodis, Yevgeniy; Ristenpart, Thomas; Vadhan, Salil
5
2012
Bottleneck links, variable demand, and the tragedy of the commons. Zbl 1269.91028
Cole, Richard; Dodis, Yevgeniy; Roughgarden, Tim
4
2012
To hash or not to hash again? (In)differentiability results for \(H^2\) and HMAC. Zbl 1296.94106
Dodis, Yevgeniy; Ristenpart, Thomas; Steinberger, John; Tessaro, Stefano
4
2012
On the instantiability of hash-and-sign RSA signatures. Zbl 1303.94078
Dodis, Yevgeniy; Haitner, Iftach; Tentes, Aris
4
2012
Robust fuzzy extractors and authenticated key agreement from close secrets. Zbl 1364.94577
Dodis, Yevgeniy; Kanukurthi, Bhavana; Katz, Jonathan; Reyzin, Leonid; Smith, Adam
3
2012
Shannon impossibility, revisited. Zbl 1295.94054
Dodis, Yevgeniy
1
2012
Differential privacy with imperfect randomness. Zbl 1296.94105
Dodis, Yevgeniy; López-Alt, Adriana; Mironov, Ilya; Vadhan, Salil
1
2012
Storing secrets on continually leaky devices. Zbl 1292.94055
Dodis, Yevgeniy; Lewko, Allison; Waters, Brent; Wichs, Daniel
17
2011
Leftover hash lemma, revisited. Zbl 1287.94047
Barak, Boaz; Dodis, Yevgeniy; Krawczyk, Hugo; Pereira, Olivier; Pietrzak, Krzysztof; Standaert, François-Xavier; Yu, Yu
7
2011
Domain extension for MACs beyond the birthday barrier. Zbl 1281.94022
Dodis, Yevgeniy; Steinberger, John
6
2011
Privacy amplification and non-malleable extractors via character sums. Zbl 1292.94169
Dodis, Yevgeniy; Li, Xin; Wooley, Trevor D.; Zuckerman, David
1
2011
Efficient public-key cryptography in the presence of key leakage. Zbl 1290.94064
Dodis, Yevgeniy; Haralambiev, Kristiyan; López-Alt, Adriana; Wichs, Daniel
42
2010
Public-key encryption in the bounded-retrieval model. Zbl 1279.94051
Alwen, Joël; Dodis, Yevgeniy; Naor, Moni; Segev, Gil; Walfish, Shabsi; Wichs, Daniel
27
2010
Public-key encryption schemes with auxiliary inputs. Zbl 1274.94062
Dodis, Yevgeniy; Goldwasser, Shafi; Tauman Kalai, Yael; Peikert, Chris; Vaikuntanathan, Vinod
24
2010
Survey: leakage resilience and the bounded retrieval model. Zbl 1282.94031
Alwen, Joël; Dodis, Yevgeniy; Wichs, Daniel
12
2010
Leakage-resilient pseudorandom functions and side-channel attacks on Feistel networks. Zbl 1280.94047
Dodis, Yevgeniy; Pietrzak, Krzysztof
10
2010
Changing base without losing space. Zbl 1293.68118
Dodis, Yevgeniy; Patrascu, Mihai; Thorup, Mikkel
8
2010
A domain extender for the ideal cipher. Zbl 1274.94054
Coron, Jean-Sébastien; Dodis, Yevgeniy; Mandal, Avradip; Seurin, Yannick
7
2010
Concealment and its applications to authenticated encryption. Zbl 1217.68087
Dodis, Yevgeniy
1
2010
Leakage-resilient public-key cryptography in the bounded-retrieval model. Zbl 1252.94041
Alwen, Joël; Dodis, Yevgeniy; Wichs, Daniel
45
2009
On cryptography with auxiliary input. Zbl 1304.94046
Dodis, Yevgeniy; Kalai, Yael Tauman; Lovett, Shachar
26
2009
Salvaging Merkle-Damgård for practical applications. Zbl 1239.94047
Dodis, Yevgeniy; Ristenpart, Thomas; Shrimpton, Thomas
11
2009
Non-malleable extractors and symmetric key cryptography from weak secrets. Zbl 1304.94048
Dodis, Yevgeniy; Wichs, Daniel
9
2009
Proofs of retrievability via hardness amplification. Zbl 1213.68246
Dodis, Yevgeniy; Vadhan, Salil; Wichs, Daniel
9
2009
Indifferentiability of permutation-based compression functions and tree-based modes of operation, with applications to MD6. Zbl 1248.94065
Dodis, Yevgeniy; Reyzin, Leonid; Rivest, Ronald L.; Shen, Emily
5
2009
Message authentication codes from unpredictable block ciphers. Zbl 1252.94058
Dodis, Yevgeniy; Steinberger, John
3
2009
Security amplification for interactive cryptographic primitives. Zbl 1213.94098
Dodis, Yevgeniy; Impagliazzo, Russell; Jaiswal, Ragesh; Kabanets, Valentine
2
2009
Composability and on-line deniability of authentication. Zbl 1213.94155
Dodis, Yevgeniy; Katz, Jonathan; Smith, Adam; Walfish, Shabsi
1
2009
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. Zbl 1165.94326
Dodis, Yevgeniy; Ostrovsky, Rafail; Reyzin, Leonid; Smith, Adam
70
2008
Detection of algebraic manipulation with applications to robust secret sharing and fuzzy extractors. Zbl 1149.94333
Cramer, Ronald; Dodis, Yevgeniy; Fehr, Serge; Padró, Carles; Wichs, Daniel
30
2008
Efficient constructions of composable commitments and zero-knowledge proofs. Zbl 1183.94030
Dodis, Yevgeniy; Shoup, Victor; Walfish, Shabsi
4
2008
Getting the best out of existing hash functions; or what if we are stuck with SHA? Zbl 1319.94061
Dodis, Yevgeniy; Puniya, Prashant
4
2008
A new mode of operation for block ciphers and length-preserving MACs. Zbl 1149.94311
Dodis, Yevgeniy; Pietrzak, Krzysztof; Puniya, Prashant
4
2008
Universally composable security with global setup. Zbl 1129.94014
Canetti, Ran; Dodis, Yevgeniy; Pass, Rafael; Walfish, Shabsi
30
2007
Optimistic fair exchange in a multi-user setting. Zbl 1127.94345
Dodis, Yevgeniy; Lee, Pil Joong; Yum, Dae Hyun
11
2007
Intrusion-resilient key exchange in the bounded retrieval model. Zbl 1156.94338
Cash, David; Ding, Yan Zong; Dodis, Yevgeniy; Lee, Wenke; Lipton, Richard; Walfish, Shabsi
8
2007
Improving the security of MACs via randomized message preprocessing. Zbl 1186.94434
Dodis, Yevgeniy; Pietrzak, Krzysztof
2
2007
Cryptography and game theory. Zbl 1151.91329
Dodis, Yevgeniy; Rabin, Tal
1
2007
Feistel networks made public, and applications. Zbl 1141.94350
Dodis, Yevgeniy; Puniya, Prashant
1
2007
Does privacy require true randomness? Zbl 1129.94042
Bosley, Carl; Dodis, Yevgeniy
1
2007
How much can taxes help selfish routing? Zbl 1103.68018
Cole, Richard; Dodis, Yevgeniy; Roughgarden, Tim
37
2006
Robust fuzzy extractors and authenticated key agreement from close secrets. Zbl 1161.94440
Dodis, Yevgeniy; Katz, Jonathan; Reyzin, Leonid; Smith, Adam
10
2006
Bottleneck links, variable demand, and the tragedy of the commons. Zbl 1192.91040
Cole, Richard; Dodis, Yevgeniy; Roughgarden, Tim
9
2006
On the relation between the ideal cipher and the random oracle models. Zbl 1112.94009
Dodis, Yevgeniy; Puniya, Prashant
9
2006
Mercurial commitments: minimal assumptions and efficient constructions. Zbl 1112.94006
Catalano, Dario; Dodis, Yevgeniy; Visconti, Ivan
8
2006
Public key cryptography – PKC 2006. 9th international conference on theory and practice of public-key cryptography, New York, NY, USA, April 24–26, 2006. Proceedings. Zbl 1102.94003
Yung, Moti (ed.); Dodis, Yevgeniy (ed.); Kiayias, Aggelos (ed.); Malkin, Tal (ed.)
1
2006
Merkle-Damgård revisited: How to construct a hash function. Zbl 1145.94436
Coron, Jean-Sébastien; Dodis, Yevgeniy; Malinaud, Cécile; Puniya, Prashant
48
2005
A verifiable random function with short proofs and keys. Zbl 1081.94521
Dodis, Yevgeniy; Yampolskiy, Aleksandr
25
2005
Correcting errors without leaking partial information. Zbl 1192.94118
Dodis, Yevgeniy; Smith, Adam
21
2005
On the generic insecurity of the full domain hash. Zbl 1145.94440
Dodis, Yevgeniy; Oliveira, Roberto; Pietrzak, Krzysztof
17
2005
Chosen-ciphertext security of multiple encryption. Zbl 1079.94545
Dodis, Yevgeniy; Katz, Jonathan
15
2005
Secure remote authentication using biometric data. Zbl 1137.94365
Boyen, Xavier; Dodis, Yevgeniy; Katz, Jonathan; Ostrovsky, Rafail; Smith, Adam
9
2005
Entropic security and the encryption of high entropy messages. Zbl 1080.94523
Dodis, Yevgeniy; Smith, Adam
9
2005
Time capsule signature. Zbl 1120.94316
Dodis, Yevgeniy; Yum, Dae Hyun
5
2005
Scalable public-key tracing and revoking. Zbl 1264.94108
Dodis, Yevgeniy; Fazio, Nelly; Kiayias, Aggelos; Yung, Moti
1
2005
Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. Zbl 1122.94368
Dodis, Yevgeniy; Reyzin, Leonid; Smith, Adam
27
2004
Anonymous identification in ad hoc groups. Zbl 1122.94414
Dodis, Yevgeniy; Kiayias, Aggelos; Nicolosi, Antonio; Shoup, Victor
19
2004
Randomness extraction and key derivation using the CBC, cascade and HMAC modes. Zbl 1104.68470
Dodis, Yevgeniy; Gennaro, Rosario; Håstad, Johan; Krawczyk, Hugo; Rabin, Tal
11
2004
Improved randomness extraction from two independent sources. Zbl 1106.68036
Dodis, Yevgeniy; Elbaz, Ariel; Oliveira, Roberto; Raz, Ran
10
2004
A generic construction for intrusion-resilient public-key encryption. Zbl 1196.94048
Dodis, Yevgeniy; Franklin, Matt; Katz, Jonathan; Miyaji, Atsuko; Yung, Moti
5
2004
Public key broadcast encryption for stateless receivers. Zbl 1327.94041
Dodis, Yevgeniy; Fazio, Nelly
35
2003
Pricing network edges for heterogeneous selfish users. Zbl 1192.68032
Cole, Richard; Dodis, Yevgeniy; Roughgarden, Tim
24
2003
Intrusion-resilient public-key encryption. Zbl 1039.94515
Dodis, Yevgeniy; Franklin, Matt; Katz, Jonathan; Miyaji, Atsuko; Yung, Moti
10
2003
On extracting private randomness over a public channel. Zbl 1279.68350
Dodis, Yevgeniy; Oliveira, Roberto
4
2003
Concealment and its applications to authenticated encryption. Zbl 1038.94528
Dodis, Yevgeniy; An, Jee Hea
4
2003
On the power of claw-free permutations. Zbl 1022.68051
Dodis, Yevgeniy; Reyzin, Leonid
4
2003
Scalable public-key tracing and revoking. Zbl 1321.94106
Dodis, Yevgeniy; Fazio, Nelly; Kiayias, Aggelos; Yung, Moti
1
2003
On the security of joint signature and encryption. Zbl 1055.94511
An, Jee Hea; Dodis, Yevgeniy; Rabin, Tal
43
2002
Key-insulated public key cryptosystems. Zbl 1055.94012
Dodis, Yevgeniy; Katz, Jonathan; Xu, Shouhuai; Yung, Moti
25
2002
Public key trace and revoke scheme secure against adaptive chosen ciphertext attack. Zbl 1033.94522
Dodis, Yevgeniy; Fazio, Nelly
23
2002
Strong key-insulated signature schemes. Zbl 1033.94555
Dodis, Yevgeniy; Katz, Jonathan; Xu, Shouhuai; Yung, Moti
22
2002
Efficient construction of (distributed) verifiable random functions. Zbl 1033.94521
Dodis, Yevgeniy
7
2002
Universal configurations in light-flipping games. Zbl 1004.91015
Dodis, Yevgeniy; Winkler, Peter
9
2001
On perfect and adaptive security in exposure-resilient cryptography. Zbl 0981.94014
Dodis, Yevgeniy; Sahai, Amit; Smith, Adam
4
2001
A cryptographic solution to a game theoretic problem. Zbl 1001.91002
Dodis, Yevgeniy; Halevi, Shai; Rabin, Tal
12
2000
Exposure-resilient functions and all-or-nothing transforms. Zbl 1082.94508
Canetti, Ran; Dodis, Yevgeniy; Halevi, Shai
11
2000
Parallel reducibility for information-theoretically secure computation. Zbl 0989.68555
Dodis, Yevgeniy; Micali, Silvio
2
2000
Improved testing algorithms for monotonicity. Zbl 0949.68178
Dodis, Yevgeniy; Goldreich, Oded; Lehman, Eric; Raskhodnikova, Sofya; Ron, Dana; Samorodnitsky, Alex
27
1999
Design networks with bounded pairwise distance. Zbl 1345.90032
Dodis, Yevgeniy; Khanna, Sanjeev
24
1999
...and 2 more Documents
all top 5

Cited by 1,311 Authors

19 Mu, Yi
17 Susilo, Willy
15 Venturi, Daniele
14 Bellare, Mihir
12 Dodis, Yevgeniy
12 Pietrzak, Krzysztof
11 Canetti, Ran
11 Hanaoka, Goichiro
11 Hofheinz, Dennis
11 Yang, Guomin
11 Yung, Moti
10 Libert, Benoît
10 Yang, Bo
9 Hazay, Carmit
9 Liu, Shengli
9 Ostrovsky, Rafail
9 Reyzin, Leonid
9 Tessaro, Stefano
8 Katz, Jonathan N.
8 Kiltz, Eike
8 Pass, Rafael
8 Weng, Jian
8 Wichs, Daniel
8 Wong, Duncan S.
7 Chen, Yu
7 Emura, Keita
7 Faonio, Antonio
7 Faust, Sebastian
7 Guo, Fuchun
7 Harks, Tobias
7 Ishai, Yuval
7 Li, Jiguo
7 Nielsen, Jesper Buus
7 Raskhodnikova, Sofya
7 Seurin, Yannick
7 Skorski, Maciej
7 Vaikuntanathan, Vinod
7 Waters, Brent
7 Zhou, Yanwei
6 Au, Man Ho
6 Bitansky, Nir
6 Chen, Kefei
6 Chen, Rongmao
6 Dachman-Soled, Dana
6 Goldwasser, Shafi
6 Hao, Rong
6 Huang, Qiong
6 Klimm, Max
6 Lindell, Yehuda
6 Long, Yu
6 Mennink, Bart
6 Paterson, Maura Beth
6 Rothblum, Guy N.
6 Segev, Gil
6 Stam, Martijn
6 Yu, Jia
5 Boneh, Dan
5 Camenisch, Jan L.
5 Cao, Zhenfu
5 Cash, David M.
5 Cheng, Xiangguo
5 Fotakis, Dimitris A.
5 Gu, Dawu
5 Lin, Dongdai
5 Lu, Yang
5 Nutov, Zeev
5 O’Neill, Adam
5 Park, Jonghwan
5 Paterson, Kenneth G.
5 Schröder, Dominique
5 Seo, Jae Hong
5 Shikata, Junji
5 Tanaka, Keisuke
5 Venkitasubramaniam, Muthuramakrishnan
5 Visconti, Ivan
5 Wee, Hoeteck
5 Zhang, Jiang
5 Zhang, Mingwu
5 Zhang, Yichen
5 Zhou, Hong-Sheng
4 Abdalla, Michel
4 Andreeva, Elena Anatol’evna
4 Boyle, Elette
4 Choi, Seung Geol
4 Chow, Sherman S. M.
4 Damgård, Ivan Bjerre
4 Dziembowski, Stefan
4 Fischer, Eldar
4 Groth, Jens
4 Haitner, Iftach
4 Han, Shuai
4 Herranz, Javier
4 Hu, Yupu
4 Kanukurthi, Bhavana
4 Kapron, Bruce M.
4 Komargodski, Ilan
4 Kong, Fanyu
4 Lee, Kwangsu
4 Liu, Joseph K. K.
4 Masny, Daniel
...and 1,211 more Authors
all top 5

Cited in 84 Serials

87 Journal of Cryptology
63 Theoretical Computer Science
46 Designs, Codes and Cryptography
30 Information Sciences
19 Algorithmica
14 SIAM Journal on Computing
12 Information Processing Letters
11 Journal of Computer and System Sciences
10 Discrete Mathematics
9 Information and Computation
9 International Journal of Foundations of Computer Science
9 Journal of Mathematical Cryptology
7 Games and Economic Behavior
7 Journal of Shanghai Jiaotong University (Science)
6 Discrete Applied Mathematics
6 Theory of Computing Systems
6 Cryptography and Communications
6 Frontiers of Computer Science
5 Computational Complexity
5 Journal of Combinatorial Optimization
4 Combinatorica
4 European Journal of Operational Research
4 Distributed Computing
4 Soft Computing
4 Science in China. Series F
4 Advances in Mathematics of Communications
3 Mathematical and Computer Modelling
3 SIAM Journal on Discrete Mathematics
3 Mathematical Programming. Series A. Series B
3 Science China. Information Sciences
2 Mathematics of Operations Research
2 Naval Research Logistics
2 Networks
2 Operations Research
2 Operations Research Letters
2 Random Structures & Algorithms
2 MSCS. Mathematical Structures in Computer Science
2 Quantum Information Processing
2 Journal of Discrete Algorithms
2 Groups, Complexity, Cryptology
2 Science China. Mathematics
1 Acta Informatica
1 American Mathematical Monthly
1 Artificial Intelligence
1 Computers & Mathematics with Applications
1 Rocky Mountain Journal of Mathematics
1 Applied Mathematics and Computation
1 Archiv der Mathematik
1 Computing
1 International Journal of Game Theory
1 Journal of Economic Theory
1 Journal of Optimization Theory and Applications
1 Theory and Decision
1 Cryptologia
1 European Journal of Combinatorics
1 Social Choice and Welfare
1 Journal of Computer Science and Technology
1 New Generation Computing
1 Journal of Parallel and Distributed Computing
1 Annals of Operations Research
1 Pattern Recognition
1 Applicable Algebra in Engineering, Communication and Computing
1 Journal of Nonlinear Science
1 Journal of Algebraic Combinatorics
1 Tatra Mountains Mathematical Publications
1 Formal Methods in System Design
1 Annals of Mathematics and Artificial Intelligence
1 Mathematical Problems in Engineering
1 Nonlinear Dynamics
1 Journal of Inequalities and Applications
1 Journal of the ACM
1 Wuhan University Journal of Natural Sciences (WUJNS)
1 Annals of Mathematics. Second Series
1 Journal of Systems Science and Complexity
1 Sādhanā
1 Multiscale Modeling & Simulation
1 International Journal of Quantum Information
1 Discrete Optimization
1 Journal of Industrial and Management Optimization
1 Journal of Zhejiang University. Science A
1 Algorithms
1 Symmetry
1 Dynamic Games and Applications
1 EURO Journal on Computational Optimization

Citations by Year

Wikidata Timeline

The data are displayed as stored in Wikidata under a Creative Commons CC0 License. Updates and corrections should be made in Wikidata.