Edit Profile (opens in new tab) Dodis, Yevgeniy Compute Distance To: Compute Author ID: dodis.yevgeniy Published as: Dodis, Yevgeniy; Dodis, Y. External Links: MGP Documents Indexed: 123 Publications since 1999 3 Contributions as Editor Co-Authors: 139 Co-Authors with 120 Joint Publications 3,139 Co-Co-Authors all top 5 Co-Authors 4 single-authored 16 Wichs, Daniel 11 Katz, Jonathan N. 8 Pietrzak, Krzysztof 8 Yung, Moti 7 Reyzin, Leonid 7 Steinberger, John P. 6 Coretti, Sandro 6 Ristenpart, Thomas 5 Fazio, Nelly 5 Puniya, Prashant 5 Walfish, Shabsi 4 Aggarwal, Divesh 4 Alwen, Joël 4 Cole, Richard John 4 Guo, Siyao 4 Halevi, Shai 4 Kiayias, Aggelos 4 Rabin, Tal 4 Roughgarden, Tim 4 Stephens-Davidowitz, Noah 4 Vaikuntanathan, Vinod 3 Lovett, Shachar 3 Oliveira, Roberto Imbuzeiro 3 Ostrovsky, Rafail 3 Tessaro, Stefano 3 Vadhan, Salil P. 3 Yum, Dae Hyun 2 An, Jee Hea 2 Canetti, Ran 2 Coron, Jean-Sébastien 2 Fiore, Dario 2 Franklin, Matthew K. 2 Juels, Ari 2 Khanna, Sanjeev 2 Krawczyk, Hugo 2 Lee, Pil Joong 2 Liu, Tianren 2 López-Alt, Adriana 2 Micali, Silvio 2 Mironov, Ilya 2 Miyaji, Atsuko 2 Nielsen, Jesper Buus 2 Shamir, Adi 2 Shoup, Victor 2 Tackmann, Björn 2 Tauman Kalai, Yael 2 Venturi, Daniele 2 Woodage, Joanne 2 Wooley, Trevor D. 2 Xu, Shouhuai 2 Yampolskiy, Aleksandr 2 Yu, Yu 2 Zuckerman, David 1 Agrawal, Shweta 1 Andreeva, Elena Anatol’evna 1 Barak, Boaz 1 Bienstock, Alexander 1 Bishop, Allison 1 Bogdanov, Andrey 1 Bosley, Carl 1 Boyen, Xavier 1 Cash, David M. 1 Catalano, Dario 1 Chase, Melissa 1 Chatterjee, Rahul 1 Cogliati, Benoît 1 Cramer, Ronald John Fitzgerald 1 Ding, Yan Zong 1 Elbaz, Ariel 1 Farshim, Pooya 1 Fehr, Serge 1 Ganesh, Chaya 1 Gennaro, Rosario 1 Goldreich, Oded 1 Goldwasser, Shafi 1 Golovnev, Alexander 1 Grubbs, Paul 1 Guruswami, Venkatesan 1 Haitner, Iftach 1 Haralambiev, Kristiyan 1 Håstad, Johan Torkel 1 Impagliazzo, Russell 1 Ishai, Yuval 1 Jafargholi, Zahra 1 Jain, Abhishek 1 Jaiswal, Ragesh 1 Kabanets, Valentine 1 Kanukurthi, Bhavana 1 Karthikeyan, Harish 1 Kazana, Tomasz 1 Kiltz, Eike 1 Kraschewski, Daniel 1 Lee, Jooyoung 1 Lee, Wenke 1 Lehman, Eric 1 Lipton, Richard J. 1 Lysyanskaya, Anna 1 Malinaud, Cécile 1 Malkin, Tal G. 1 Mandal, Avradip ...and 39 more Co-Authors all top 5 Serials 3 SIAM Journal on Computing 3 Lecture Notes in Computer Science 1 IEEE Transactions on Information Theory 1 Journal of Computer and System Sciences 1 Networks 1 Algorithmica 1 Journal of Cryptology 1 Distributed Computing 1 Journal of Universal Computer Science all top 5 Fields 114 Information and communication theory, circuits (94-XX) 48 Computer science (68-XX) 8 Game theory, economics, finance, and other social and behavioral sciences (91-XX) 4 Numerical analysis (65-XX) 3 General and overarching topics; collections (00-XX) 3 Operations research, mathematical programming (90-XX) 1 Combinatorics (05-XX) 1 Number theory (11-XX) 1 Probability theory and stochastic processes (60-XX) 1 Quantum theory (81-XX) Publications by Year all cited Publications top 5 cited Publications Citations contained in zbMATH Open 114 Publications have been cited 1,480 times in 946 Documents Cited by ▼ Year ▼ Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. Zbl 1165.94326Dodis, Yevgeniy; Ostrovsky, Rafail; Reyzin, Leonid; Smith, Adam 97 2008 Merkle-Damgård revisited: How to construct a hash function. Zbl 1145.94436Coron, Jean-Sébastien; Dodis, Yevgeniy; Malinaud, Cécile; Puniya, Prashant 54 2005 Leakage-resilient public-key cryptography in the bounded-retrieval model. Zbl 1252.94041Alwen, Joël; Dodis, Yevgeniy; Wichs, Daniel 52 2009 Efficient public-key cryptography in the presence of key leakage. Zbl 1290.94064Dodis, Yevgeniy; Haralambiev, Kristiyan; López-Alt, Adriana; Wichs, Daniel 51 2010 On the security of joint signature and encryption. Zbl 1055.94511An, Jee Hea; Dodis, Yevgeniy; Rabin, Tal 44 2002 Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. Zbl 1122.94368Dodis, Yevgeniy; Reyzin, Leonid; Smith, Adam 42 2004 Universally composable security with global setup. Zbl 1129.94014Canetti, Ran; Dodis, Yevgeniy; Pass, Rafael; Walfish, Shabsi 42 2007 How much can taxes help selfish routing? Zbl 1103.68018Cole, Richard; Dodis, Yevgeniy; Roughgarden, Tim 40 2006 Detection of algebraic manipulation with applications to robust secret sharing and fuzzy extractors. Zbl 1149.94333Cramer, Ronald; Dodis, Yevgeniy; Fehr, Serge; Padró, Carles; Wichs, Daniel 39 2008 Public key broadcast encryption for stateless receivers. Zbl 1327.94041Dodis, Yevgeniy; Fazio, Nelly 36 2003 On cryptography with auxiliary input. Zbl 1304.94046Dodis, Yevgeniy; Kalai, Yael Tauman; Lovett, Shachar 34 2009 Public-key encryption in the bounded-retrieval model. Zbl 1279.94051Alwen, Joël; Dodis, Yevgeniy; Naor, Moni; Segev, Gil; Walfish, Shabsi; Wichs, Daniel 33 2010 Public-key encryption schemes with auxiliary inputs. Zbl 1274.94062Dodis, Yevgeniy; Goldwasser, Shafi; Tauman Kalai, Yael; Peikert, Chris; Vaikuntanathan, Vinod 33 2010 Improved testing algorithms for monotonicity. Zbl 0949.68178Dodis, Yevgeniy; Goldreich, Oded; Lehman, Eric; Raskhodnikova, Sofya; Ron, Dana; Samorodnitsky, Alex 32 1999 A verifiable random function with short proofs and keys. Zbl 1081.94521Dodis, Yevgeniy; Yampolskiy, Aleksandr 30 2005 Key-insulated public key cryptosystems. Zbl 1055.94012Dodis, Yevgeniy; Katz, Jonathan; Xu, Shouhuai; Yung, Moti 29 2002 Design networks with bounded pairwise distance. Zbl 1345.90032Dodis, Yevgeniy; Khanna, Sanjeev 27 1999 Pricing network edges for heterogeneous selfish users. Zbl 1192.68032Cole, Richard; Dodis, Yevgeniy; Roughgarden, Tim 27 2003 Public key trace and revoke scheme secure against adaptive chosen ciphertext attack. Zbl 1033.94522Dodis, Yevgeniy; Fazio, Nelly 26 2002 Correcting errors without leaking partial information. Zbl 1192.94118Dodis, Yevgeniy; Smith, Adam 24 2005 Anonymous identification in ad hoc groups. Zbl 1122.94414Dodis, Yevgeniy; Kiayias, Aggelos; Nicolosi, Antonio; Shoup, Victor 23 2004 Strong key-insulated signature schemes. Zbl 1033.94555Dodis, Yevgeniy; Katz, Jonathan; Xu, Shouhuai; Yung, Moti 23 2002 On the generic insecurity of the full domain hash. Zbl 1145.94440Dodis, Yevgeniy; Oliveira, Roberto; Pietrzak, Krzysztof 20 2005 Non-malleable codes from additive combinatorics (extended abstract). Zbl 1315.94142Aggarwal, Divesh; Dodis, Yevgeniy; Lovett, Shachar 19 2014 Spooky encryption and its applications. Zbl 1406.94045Dodis, Yevgeniy; Halevi, Shai; Rothblum, Ron D.; Wichs, Daniel 17 2016 Storing secrets on continually leaky devices. Zbl 1292.94055Dodis, Yevgeniy; Lewko, Allison; Waters, Brent; Wichs, Daniel 17 2011 Chosen-ciphertext security of multiple encryption. Zbl 1079.94545Dodis, Yevgeniy; Katz, Jonathan 16 2005 Overcoming weak expectations. Zbl 1296.94107Dodis, Yevgeniy; Yu, Yu 16 2013 A formal treatment of backdoored pseudorandom generators. Zbl 1365.94423Dodis, Yevgeniy; Ganesh, Chaya; Golovnev, Alexander; Juels, Ari; Ristenpart, Thomas 15 2015 On the indifferentiability of key-alternating ciphers. Zbl 1310.94124Andreeva, Elena; Bogdanov, Andrey; Dodis, Yevgeniy; Mennink, Bart; Steinberger, John P. 15 2013 Non-malleable reductions and applications. Zbl 1321.94139Aggarwal, Divesh; Dodis, Yevgeniy; Kazana, Tomasz; Obremski, Maciej 14 2015 Robust fuzzy extractors and authenticated key agreement from close secrets. Zbl 1161.94440Dodis, Yevgeniy; Katz, Jonathan; Reyzin, Leonid; Smith, Adam 14 2006 A cryptographic solution to a game theoretic problem. Zbl 1001.91002Dodis, Yevgeniy; Halevi, Shai; Rabin, Tal 14 2000 Exposure-resilient functions and all-or-nothing transforms. Zbl 1082.94508Canetti, Ran; Dodis, Yevgeniy; Halevi, Shai 14 2000 Non-malleable encryption: simpler, shorter, stronger. Zbl 1388.94043Coretti, Sandro; Dodis, Yevgeniy; Tackmann, Björn; Venturi, Daniele 14 2016 Survey: leakage resilience and the bounded retrieval model. Zbl 1282.94031Alwen, Joël; Dodis, Yevgeniy; Wichs, Daniel 13 2010 Salvaging Merkle-Damgård for practical applications. Zbl 1239.94047Dodis, Yevgeniy; Ristenpart, Thomas; Shrimpton, Thomas 13 2009 Secure remote authentication using biometric data. Zbl 1137.94365Boyen, Xavier; Dodis, Yevgeniy; Katz, Jonathan; Ostrovsky, Rafail; Smith, Adam 13 2005 Leakage-resilient pseudorandom functions and side-channel attacks on Feistel networks. Zbl 1280.94047Dodis, Yevgeniy; Pietrzak, Krzysztof 12 2010 Optimistic fair exchange in a multi-user setting. Zbl 1127.94345Dodis, Yevgeniy; Lee, Pil Joong; Yum, Dae Hyun 12 2007 Improved randomness extraction from two independent sources. Zbl 1106.68036Dodis, Yevgeniy; Elbaz, Ariel; Oliveira, Roberto; Raz, Ran 12 2004 A domain extender for the ideal cipher. Zbl 1274.94054Coron, Jean-Sébastien; Dodis, Yevgeniy; Mandal, Avradip; Seurin, Yannick 12 2010 Leftover hash lemma, revisited. Zbl 1287.94047Barak, Boaz; Dodis, Yevgeniy; Krawczyk, Hugo; Pereira, Olivier; Pietrzak, Krzysztof; Standaert, François-Xavier; Yu, Yu 12 2011 Changing base without losing space. Zbl 1293.68118Dodis, Yevgeniy; Patrascu, Mihai; Thorup, Mikkel 12 2010 Randomness extraction and key derivation using the CBC, cascade and HMAC modes. Zbl 1104.68470Dodis, Yevgeniy; Gennaro, Rosario; Håstad, Johan; Krawczyk, Hugo; Rabin, Tal 11 2004 Message authentication, revisited. Zbl 1297.94117Dodis, Yevgeniy; Kiltz, Eike; Pietrzak, Krzysztof; Wichs, Daniel 11 2012 Non-malleable extractors and symmetric key cryptography from weak secrets. Zbl 1304.94048Dodis, Yevgeniy; Wichs, Daniel 11 2009 Message transmission with reverse firewalls – secure communication on corrupted machines. Zbl 1378.94039Dodis, Yevgeniy; Mironov, Ilya; Stephens-Davidowitz, Noah 10 2016 Intrusion-resilient public-key encryption. Zbl 1039.94515Dodis, Yevgeniy; Franklin, Matt; Katz, Jonathan; Miyaji, Atsuko; Yung, Moti 10 2003 Universal configurations in light-flipping games. Zbl 1004.91015Dodis, Yevgeniy; Winkler, Peter 9 2001 Bottleneck links, variable demand, and the tragedy of the commons. Zbl 1192.91040Cole, Richard; Dodis, Yevgeniy; Roughgarden, Tim 9 2006 Proofs of retrievability via hardness amplification. Zbl 1213.68246Dodis, Yevgeniy; Vadhan, Salil; Wichs, Daniel 9 2009 On the relation between the ideal cipher and the random oracle models. Zbl 1112.94009Dodis, Yevgeniy; Puniya, Prashant 9 2006 Entropic security and the encryption of high entropy messages. Zbl 1080.94523Dodis, Yevgeniy; Smith, Adam 9 2005 Intrusion-resilient key exchange in the bounded retrieval model. Zbl 1156.94338Cash, David; Ding, Yan Zong; Dodis, Yevgeniy; Lee, Wenke; Lipton, Richard; Walfish, Shabsi 9 2007 On continual leakage of discrete log representations. Zbl 1326.94069Agrawal, Shweta; Dodis, Yevgeniy; Vaikuntanathan, Vinod; Wichs, Daniel 9 2013 Efficient construction of (distributed) verifiable random functions. Zbl 1033.94521Dodis, Yevgeniy 9 2002 Mercurial commitments: minimal assumptions and efficient constructions. Zbl 1112.94006Catalano, Dario; Dodis, Yevgeniy; Visconti, Ivan 8 2006 Randomness condensers for efficiently samplable, seed-dependent sources. Zbl 1304.94047Dodis, Yevgeniy; Ristenpart, Thomas; Vadhan, Salil 7 2012 Message authentication codes from unpredictable block ciphers. Zbl 1252.94058Dodis, Yevgeniy; Steinberger, John 7 2009 Theory of cryptography. 12th theory of cryptography conference, TCC 2015, Warsaw, Poland, March 23–25, 2015. Proceedings, Part II. Zbl 1312.94004 7 2015 Key derivation without entropy waste. Zbl 1326.94085Dodis, Yevgeniy; Pietrzak, Krzysztof; Wichs, Daniel 7 2014 On extracting private randomness over a public channel. Zbl 1279.68350Dodis, Yevgeniy; Oliveira, Roberto 6 2003 Indifferentiability of permutation-based compression functions and tree-based modes of operation, with applications to MD6. Zbl 1248.94065Dodis, Yevgeniy; Reyzin, Leonid; Rivest, Ronald L.; Shen, Emily 6 2009 To hash or not to hash again? (In)differentiability results for \(H^2\) and HMAC. Zbl 1296.94106Dodis, Yevgeniy; Ristenpart, Thomas; Steinberger, John; Tessaro, Stefano 6 2012 Domain extension for MACs beyond the birthday barrier. Zbl 1281.94022Dodis, Yevgeniy; Steinberger, John 6 2011 Provable security of (tweakable) block ciphers based on substitution-permutation networks. Zbl 1444.94055Cogliati, Benoît; Dodis, Yevgeniy; Katz, Jonathan; Lee, Jooyoung; Steinberger, John; Thiruvengadam, Aishwarya; Zhang, Zhe 5 2018 Efficient constructions of composable commitments and zero-knowledge proofs. Zbl 1183.94030Dodis, Yevgeniy; Shoup, Victor; Walfish, Shabsi 5 2008 A generic construction for intrusion-resilient public-key encryption. Zbl 1196.94048Dodis, Yevgeniy; Franklin, Matt; Katz, Jonathan; Miyaji, Atsuko; Yung, Moti 5 2004 Time capsule signature. Zbl 1120.94316Dodis, Yevgeniy; Yum, Dae Hyun 5 2005 On the instantiability of hash-and-sign RSA signatures. Zbl 1303.94078Dodis, Yevgeniy; Haitner, Iftach; Tentes, Aris 5 2012 On perfect and adaptive security in exposure-resilient cryptography. Zbl 0981.94014Dodis, Yevgeniy; Sahai, Amit; Smith, Adam 5 2001 The double ratchet: security notions, proofs, and modularization for the Signal protocol. Zbl 1470.94101Alwen, Joël; Coretti, Sandro; Dodis, Yevgeniy 5 2019 A new mode of operation for block ciphers and length-preserving MACs. Zbl 1149.94311Dodis, Yevgeniy; Pietrzak, Krzysztof; Puniya, Prashant 5 2008 How to eat your entropy and have it too – optimal recovery strategies for compromised RNGs. Zbl 1334.94073Dodis, Yevgeniy; Shamir, Adi; Stephens-Davidowitz, Noah; Wichs, Daniel 5 2014 Reusable non-interactive secure computation. Zbl 07178324Chase, Melissa; Dodis, Yevgeniy; Ishai, Yuval; Kraschewski, Daniel; Liu, Tianren; Ostrovsky, Rafail; Vaikuntanathan, Vinod 5 2019 Security amplification for interactive cryptographic primitives. Zbl 1213.94098Dodis, Yevgeniy; Impagliazzo, Russell; Jaiswal, Ragesh; Kabanets, Valentine 4 2009 Composability and on-line deniability of authentication. Zbl 1213.94155Dodis, Yevgeniy; Katz, Jonathan; Smith, Adam; Walfish, Shabsi 4 2009 Indifferentiability of confusion-diffusion networks. Zbl 1371.94632Dodis, Yevgeniy; Stam, Martijn; Steinberger, John; Liu, Tianren 4 2016 Bottleneck links, variable demand, and the tragedy of the commons. Zbl 1269.91028Cole, Richard; Dodis, Yevgeniy; Roughgarden, Tim 4 2012 On the power of claw-free permutations. Zbl 1022.68051Dodis, Yevgeniy; Reyzin, Leonid 4 2003 Concealment and its applications to authenticated encryption. Zbl 1038.94528Dodis, Yevgeniy; An, Jee Hea 4 2003 Getting the best out of existing hash functions; or what if we are stuck with SHA? Zbl 1319.94061Dodis, Yevgeniy; Puniya, Prashant 4 2008 Privacy with imperfect randomness. Zbl 1369.94529Dodis, Yevgeniy; Yao, Yanqing 4 2015 Robust fuzzy extractors and authenticated key agreement from close secrets. Zbl 1364.94577Dodis, Yevgeniy; Kanukurthi, Bhavana; Katz, Jonathan; Reyzin, Leonid; Smith, Adam 4 2012 Fixing cracks in the concrete: random oracles with auxiliary input, revisited. Zbl 1415.94424Dodis, Yevgeniy; Guo, Siyao; Katz, Jonathan 4 2017 Random oracles and non-uniformity. Zbl 1423.94063Coretti, Sandro; Dodis, Yevgeniy; Guo, Siyao; Steinberger, John 3 2018 Non-malleable codes from additive combinatorics. Zbl 1401.94233Aggarwal, Divesh; Dodis, Yevgeniy; Lovett, Shachar 3 2018 Lower bounds for oblivious transfer reductions. Zbl 0932.68044Dodis, Yevgeniy; Micali, Silvio 3 1999 The 2-catalog segmentation problem. Zbl 0937.68157Dodis, Yevgeniy; Guruswami, Venkatesan; Khanna, Sanjeev 3 1999 A new distribution-sensitive secure sketch and popularity-proportional hashing. Zbl 1418.94064Woodage, Joanne; Chatterjee, Rahul; Dodis, Yevgeniy; Juels, Ari; Ristenpart, Thomas 3 2017 Extracting randomness from extractor-dependent sources. Zbl 1479.94160Dodis, Yevgeniy; Vaikuntanathan, Vinod; Wichs, Daniel 3 2020 Non-uniform bounds in the random-permutation, ideal-cipher, and generic-group models. Zbl 1444.94058Coretti, Sandro; Dodis, Yevgeniy; Guo, Siyao 2 2018 Threshold and proactive pseudo-random permutations. Zbl 1113.65006Dodis, Yevgeniy; Yampolskiy, Aleksandr; Yung, Moti 2 2006 Does privacy require true randomness? Zbl 1129.94042Bosley, Carl; Dodis, Yevgeniy 2 2007 Parallel reducibility for information-theoretically secure computation. Zbl 0989.68555Dodis, Yevgeniy; Micali, Silvio 2 2000 Counterexamples to hardness amplification beyond negligible. Zbl 1304.68072Dodis, Yevgeniy; Jain, Abhishek; Moran, Tal; Wichs, Daniel 2 2012 Differential privacy with imperfect randomness. Zbl 1296.94105Dodis, Yevgeniy; López-Alt, Adriana; Mironov, Ilya; Vadhan, Salil 2 2012 Shannon impossibility, revisited. Zbl 1295.94054Dodis, Yevgeniy 2 2012 Cryptography and game theory. Zbl 1151.91329Dodis, Yevgeniy; Rabin, Tal 2 2007 Extracting randomness from extractor-dependent sources. Zbl 1479.94160Dodis, Yevgeniy; Vaikuntanathan, Vinod; Wichs, Daniel 3 2020 The double ratchet: security notions, proofs, and modularization for the Signal protocol. Zbl 1470.94101Alwen, Joël; Coretti, Sandro; Dodis, Yevgeniy 5 2019 Reusable non-interactive secure computation. Zbl 07178324Chase, Melissa; Dodis, Yevgeniy; Ishai, Yuval; Kraschewski, Daniel; Liu, Tianren; Ostrovsky, Rafail; Vaikuntanathan, Vinod 5 2019 Seedless fruit is the sweetest: random number generation, revisited. Zbl 1472.94048Coretti, Sandro; Dodis, Yevgeniy; Karthikeyan, Harish; Tessaro, Stefano 2 2019 Provable security of (tweakable) block ciphers based on substitution-permutation networks. Zbl 1444.94055Cogliati, Benoît; Dodis, Yevgeniy; Katz, Jonathan; Lee, Jooyoung; Steinberger, John; Thiruvengadam, Aishwarya; Zhang, Zhe 5 2018 Random oracles and non-uniformity. Zbl 1423.94063Coretti, Sandro; Dodis, Yevgeniy; Guo, Siyao; Steinberger, John 3 2018 Non-malleable codes from additive combinatorics. Zbl 1401.94233Aggarwal, Divesh; Dodis, Yevgeniy; Lovett, Shachar 3 2018 Non-uniform bounds in the random-permutation, ideal-cipher, and generic-group models. Zbl 1444.94058Coretti, Sandro; Dodis, Yevgeniy; Guo, Siyao 2 2018 Fixing cracks in the concrete: random oracles with auxiliary input, revisited. Zbl 1415.94424Dodis, Yevgeniy; Guo, Siyao; Katz, Jonathan 4 2017 A new distribution-sensitive secure sketch and popularity-proportional hashing. Zbl 1418.94064Woodage, Joanne; Chatterjee, Rahul; Dodis, Yevgeniy; Juels, Ari; Ristenpart, Thomas 3 2017 How to eat your entropy and have it too: optimal recovery strategies for compromised RNGs. Zbl 1405.94032Dodis, Yevgeniy; Shamir, Adi; Stephens-Davidowitz, Noah; Wichs, Daniel 1 2017 Spooky encryption and its applications. Zbl 1406.94045Dodis, Yevgeniy; Halevi, Shai; Rothblum, Ron D.; Wichs, Daniel 17 2016 Non-malleable encryption: simpler, shorter, stronger. Zbl 1388.94043Coretti, Sandro; Dodis, Yevgeniy; Tackmann, Björn; Venturi, Daniele 14 2016 Message transmission with reverse firewalls – secure communication on corrupted machines. Zbl 1378.94039Dodis, Yevgeniy; Mironov, Ilya; Stephens-Davidowitz, Noah 10 2016 Indifferentiability of confusion-diffusion networks. Zbl 1371.94632Dodis, Yevgeniy; Stam, Martijn; Steinberger, John; Liu, Tianren 4 2016 Interactive coding for interactive proofs. Zbl 1382.94068Bishop, Allison; Dodis, Yevgeniy 1 2016 A formal treatment of backdoored pseudorandom generators. Zbl 1365.94423Dodis, Yevgeniy; Ganesh, Chaya; Golovnev, Alexander; Juels, Ari; Ristenpart, Thomas 15 2015 Non-malleable reductions and applications. Zbl 1321.94139Aggarwal, Divesh; Dodis, Yevgeniy; Kazana, Tomasz; Obremski, Maciej 14 2015 Theory of cryptography. 12th theory of cryptography conference, TCC 2015, Warsaw, Poland, March 23–25, 2015. Proceedings, Part II. Zbl 1312.94004 7 2015 Privacy with imperfect randomness. Zbl 1369.94529Dodis, Yevgeniy; Yao, Yanqing 4 2015 Non-malleable codes from additive combinatorics (extended abstract). Zbl 1315.94142Aggarwal, Divesh; Dodis, Yevgeniy; Lovett, Shachar 19 2014 Key derivation without entropy waste. Zbl 1326.94085Dodis, Yevgeniy; Pietrzak, Krzysztof; Wichs, Daniel 7 2014 How to eat your entropy and have it too – optimal recovery strategies for compromised RNGs. Zbl 1334.94073Dodis, Yevgeniy; Shamir, Adi; Stephens-Davidowitz, Noah; Wichs, Daniel 5 2014 Privacy amplification and nonmalleable extractors via character sums. Zbl 1302.94043Dodis, Yevgeniy; Li, Xin; Wooley, Trevor D.; Zuckerman, David 2 2014 Amplifying privacy in privacy amplification. Zbl 1334.94054Aggarwal, Divesh; Dodis, Yevgeniy; Jafargholi, Zahra; Miles, Eric; Reyzin, Leonid 1 2014 Interactive encryption and message authentication. Zbl 1378.94038Dodis, Yevgeniy; Fiore, Dario 1 2014 Overcoming weak expectations. Zbl 1296.94107Dodis, Yevgeniy; Yu, Yu 16 2013 On the indifferentiability of key-alternating ciphers. Zbl 1310.94124Andreeva, Elena; Bogdanov, Andrey; Dodis, Yevgeniy; Mennink, Bart; Steinberger, John P. 15 2013 On continual leakage of discrete log representations. Zbl 1326.94069Agrawal, Shweta; Dodis, Yevgeniy; Vaikuntanathan, Vinod; Wichs, Daniel 9 2013 Message authentication, revisited. Zbl 1297.94117Dodis, Yevgeniy; Kiltz, Eike; Pietrzak, Krzysztof; Wichs, Daniel 11 2012 Randomness condensers for efficiently samplable, seed-dependent sources. Zbl 1304.94047Dodis, Yevgeniy; Ristenpart, Thomas; Vadhan, Salil 7 2012 To hash or not to hash again? (In)differentiability results for \(H^2\) and HMAC. Zbl 1296.94106Dodis, Yevgeniy; Ristenpart, Thomas; Steinberger, John; Tessaro, Stefano 6 2012 On the instantiability of hash-and-sign RSA signatures. Zbl 1303.94078Dodis, Yevgeniy; Haitner, Iftach; Tentes, Aris 5 2012 Bottleneck links, variable demand, and the tragedy of the commons. Zbl 1269.91028Cole, Richard; Dodis, Yevgeniy; Roughgarden, Tim 4 2012 Robust fuzzy extractors and authenticated key agreement from close secrets. Zbl 1364.94577Dodis, Yevgeniy; Kanukurthi, Bhavana; Katz, Jonathan; Reyzin, Leonid; Smith, Adam 4 2012 Counterexamples to hardness amplification beyond negligible. Zbl 1304.68072Dodis, Yevgeniy; Jain, Abhishek; Moran, Tal; Wichs, Daniel 2 2012 Differential privacy with imperfect randomness. Zbl 1296.94105Dodis, Yevgeniy; López-Alt, Adriana; Mironov, Ilya; Vadhan, Salil 2 2012 Shannon impossibility, revisited. Zbl 1295.94054Dodis, Yevgeniy 2 2012 Storing secrets on continually leaky devices. Zbl 1292.94055Dodis, Yevgeniy; Lewko, Allison; Waters, Brent; Wichs, Daniel 17 2011 Leftover hash lemma, revisited. Zbl 1287.94047Barak, Boaz; Dodis, Yevgeniy; Krawczyk, Hugo; Pereira, Olivier; Pietrzak, Krzysztof; Standaert, François-Xavier; Yu, Yu 12 2011 Domain extension for MACs beyond the birthday barrier. Zbl 1281.94022Dodis, Yevgeniy; Steinberger, John 6 2011 Privacy amplification and non-malleable extractors via character sums. Zbl 1292.94169Dodis, Yevgeniy; Li, Xin; Wooley, Trevor D.; Zuckerman, David 1 2011 Efficient public-key cryptography in the presence of key leakage. Zbl 1290.94064Dodis, Yevgeniy; Haralambiev, Kristiyan; López-Alt, Adriana; Wichs, Daniel 51 2010 Public-key encryption in the bounded-retrieval model. Zbl 1279.94051Alwen, Joël; Dodis, Yevgeniy; Naor, Moni; Segev, Gil; Walfish, Shabsi; Wichs, Daniel 33 2010 Public-key encryption schemes with auxiliary inputs. Zbl 1274.94062Dodis, Yevgeniy; Goldwasser, Shafi; Tauman Kalai, Yael; Peikert, Chris; Vaikuntanathan, Vinod 33 2010 Survey: leakage resilience and the bounded retrieval model. Zbl 1282.94031Alwen, Joël; Dodis, Yevgeniy; Wichs, Daniel 13 2010 Leakage-resilient pseudorandom functions and side-channel attacks on Feistel networks. Zbl 1280.94047Dodis, Yevgeniy; Pietrzak, Krzysztof 12 2010 A domain extender for the ideal cipher. Zbl 1274.94054Coron, Jean-Sébastien; Dodis, Yevgeniy; Mandal, Avradip; Seurin, Yannick 12 2010 Changing base without losing space. Zbl 1293.68118Dodis, Yevgeniy; Patrascu, Mihai; Thorup, Mikkel 12 2010 Concealment and its applications to authenticated encryption. Zbl 1217.68087Dodis, Yevgeniy 1 2010 Leakage-resilient public-key cryptography in the bounded-retrieval model. Zbl 1252.94041Alwen, Joël; Dodis, Yevgeniy; Wichs, Daniel 52 2009 On cryptography with auxiliary input. Zbl 1304.94046Dodis, Yevgeniy; Kalai, Yael Tauman; Lovett, Shachar 34 2009 Salvaging Merkle-Damgård for practical applications. Zbl 1239.94047Dodis, Yevgeniy; Ristenpart, Thomas; Shrimpton, Thomas 13 2009 Non-malleable extractors and symmetric key cryptography from weak secrets. Zbl 1304.94048Dodis, Yevgeniy; Wichs, Daniel 11 2009 Proofs of retrievability via hardness amplification. Zbl 1213.68246Dodis, Yevgeniy; Vadhan, Salil; Wichs, Daniel 9 2009 Message authentication codes from unpredictable block ciphers. Zbl 1252.94058Dodis, Yevgeniy; Steinberger, John 7 2009 Indifferentiability of permutation-based compression functions and tree-based modes of operation, with applications to MD6. Zbl 1248.94065Dodis, Yevgeniy; Reyzin, Leonid; Rivest, Ronald L.; Shen, Emily 6 2009 Security amplification for interactive cryptographic primitives. Zbl 1213.94098Dodis, Yevgeniy; Impagliazzo, Russell; Jaiswal, Ragesh; Kabanets, Valentine 4 2009 Composability and on-line deniability of authentication. Zbl 1213.94155Dodis, Yevgeniy; Katz, Jonathan; Smith, Adam; Walfish, Shabsi 4 2009 Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. Zbl 1165.94326Dodis, Yevgeniy; Ostrovsky, Rafail; Reyzin, Leonid; Smith, Adam 97 2008 Detection of algebraic manipulation with applications to robust secret sharing and fuzzy extractors. Zbl 1149.94333Cramer, Ronald; Dodis, Yevgeniy; Fehr, Serge; Padró, Carles; Wichs, Daniel 39 2008 Efficient constructions of composable commitments and zero-knowledge proofs. Zbl 1183.94030Dodis, Yevgeniy; Shoup, Victor; Walfish, Shabsi 5 2008 A new mode of operation for block ciphers and length-preserving MACs. Zbl 1149.94311Dodis, Yevgeniy; Pietrzak, Krzysztof; Puniya, Prashant 5 2008 Getting the best out of existing hash functions; or what if we are stuck with SHA? Zbl 1319.94061Dodis, Yevgeniy; Puniya, Prashant 4 2008 Universally composable security with global setup. Zbl 1129.94014Canetti, Ran; Dodis, Yevgeniy; Pass, Rafael; Walfish, Shabsi 42 2007 Optimistic fair exchange in a multi-user setting. Zbl 1127.94345Dodis, Yevgeniy; Lee, Pil Joong; Yum, Dae Hyun 12 2007 Intrusion-resilient key exchange in the bounded retrieval model. Zbl 1156.94338Cash, David; Ding, Yan Zong; Dodis, Yevgeniy; Lee, Wenke; Lipton, Richard; Walfish, Shabsi 9 2007 Does privacy require true randomness? Zbl 1129.94042Bosley, Carl; Dodis, Yevgeniy 2 2007 Cryptography and game theory. Zbl 1151.91329Dodis, Yevgeniy; Rabin, Tal 2 2007 Improving the security of MACs via randomized message preprocessing. Zbl 1186.94434Dodis, Yevgeniy; Pietrzak, Krzysztof 2 2007 Feistel networks made public, and applications. Zbl 1141.94350Dodis, Yevgeniy; Puniya, Prashant 1 2007 How much can taxes help selfish routing? Zbl 1103.68018Cole, Richard; Dodis, Yevgeniy; Roughgarden, Tim 40 2006 Robust fuzzy extractors and authenticated key agreement from close secrets. Zbl 1161.94440Dodis, Yevgeniy; Katz, Jonathan; Reyzin, Leonid; Smith, Adam 14 2006 Bottleneck links, variable demand, and the tragedy of the commons. Zbl 1192.91040Cole, Richard; Dodis, Yevgeniy; Roughgarden, Tim 9 2006 On the relation between the ideal cipher and the random oracle models. Zbl 1112.94009Dodis, Yevgeniy; Puniya, Prashant 9 2006 Mercurial commitments: minimal assumptions and efficient constructions. Zbl 1112.94006Catalano, Dario; Dodis, Yevgeniy; Visconti, Ivan 8 2006 Threshold and proactive pseudo-random permutations. Zbl 1113.65006Dodis, Yevgeniy; Yampolskiy, Aleksandr; Yung, Moti 2 2006 Separating sources for encryption and secret sharing. Zbl 1113.94007Dodis, Yevgeniy; Pietrzak, Krzysztof; Przydatek, Bartosz 1 2006 Public key cryptography – PKC 2006. 9th international conference on theory and practice of public-key cryptography, New York, NY, USA, April 24–26, 2006. Proceedings. Zbl 1102.94003 1 2006 Merkle-Damgård revisited: How to construct a hash function. Zbl 1145.94436Coron, Jean-Sébastien; Dodis, Yevgeniy; Malinaud, Cécile; Puniya, Prashant 54 2005 A verifiable random function with short proofs and keys. Zbl 1081.94521Dodis, Yevgeniy; Yampolskiy, Aleksandr 30 2005 Correcting errors without leaking partial information. Zbl 1192.94118Dodis, Yevgeniy; Smith, Adam 24 2005 On the generic insecurity of the full domain hash. Zbl 1145.94440Dodis, Yevgeniy; Oliveira, Roberto; Pietrzak, Krzysztof 20 2005 Chosen-ciphertext security of multiple encryption. Zbl 1079.94545Dodis, Yevgeniy; Katz, Jonathan 16 2005 Secure remote authentication using biometric data. Zbl 1137.94365Boyen, Xavier; Dodis, Yevgeniy; Katz, Jonathan; Ostrovsky, Rafail; Smith, Adam 13 2005 Entropic security and the encryption of high entropy messages. Zbl 1080.94523Dodis, Yevgeniy; Smith, Adam 9 2005 Time capsule signature. Zbl 1120.94316Dodis, Yevgeniy; Yum, Dae Hyun 5 2005 Scalable public-key tracing and revoking. Zbl 1264.94108Dodis, Yevgeniy; Fazio, Nelly; Kiayias, Aggelos; Yung, Moti 1 2005 Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. Zbl 1122.94368Dodis, Yevgeniy; Reyzin, Leonid; Smith, Adam 42 2004 Anonymous identification in ad hoc groups. Zbl 1122.94414Dodis, Yevgeniy; Kiayias, Aggelos; Nicolosi, Antonio; Shoup, Victor 23 2004 Improved randomness extraction from two independent sources. Zbl 1106.68036Dodis, Yevgeniy; Elbaz, Ariel; Oliveira, Roberto; Raz, Ran 12 2004 Randomness extraction and key derivation using the CBC, cascade and HMAC modes. Zbl 1104.68470Dodis, Yevgeniy; Gennaro, Rosario; Håstad, Johan; Krawczyk, Hugo; Rabin, Tal 11 2004 A generic construction for intrusion-resilient public-key encryption. Zbl 1196.94048Dodis, Yevgeniy; Franklin, Matt; Katz, Jonathan; Miyaji, Atsuko; Yung, Moti 5 2004 Public key broadcast encryption for stateless receivers. Zbl 1327.94041Dodis, Yevgeniy; Fazio, Nelly 36 2003 Pricing network edges for heterogeneous selfish users. Zbl 1192.68032Cole, Richard; Dodis, Yevgeniy; Roughgarden, Tim 27 2003 Intrusion-resilient public-key encryption. Zbl 1039.94515Dodis, Yevgeniy; Franklin, Matt; Katz, Jonathan; Miyaji, Atsuko; Yung, Moti 10 2003 On extracting private randomness over a public channel. Zbl 1279.68350Dodis, Yevgeniy; Oliveira, Roberto 6 2003 On the power of claw-free permutations. Zbl 1022.68051Dodis, Yevgeniy; Reyzin, Leonid 4 2003 Concealment and its applications to authenticated encryption. Zbl 1038.94528Dodis, Yevgeniy; An, Jee Hea 4 2003 Scalable public-key tracing and revoking. Zbl 1321.94106Dodis, Yevgeniy; Fazio, Nelly; Kiayias, Aggelos; Yung, Moti 1 2003 ...and 14 more Documents all cited Publications top 5 cited Publications all top 5 Cited by 1,539 Authors 20 Mu, Yi 19 Susilo, Willy 18 Venturi, Daniele 15 Bellare, Mihir 15 Libert, Benoît 14 Dodis, Yevgeniy 14 Yung, Moti 13 Canetti, Ran 13 Tessaro, Stefano 12 Hanaoka, Goichiro 12 Liu, Shengli 12 Pietrzak, Krzysztof 12 Yang, Bo 12 Yang, Guomin 11 Hazay, Carmit 11 Hofheinz, Dennis 11 Ishai, Yuval 11 Reyzin, Leonid 10 Ostrovsky, Rafail 10 Pass, Rafael 10 Skorski, Maciej 10 Vaikuntanathan, Vinod 10 Wichs, Daniel 9 Dachman-Soled, Dana 9 Kiltz, Eike 9 Weng, Jian 9 Zhou, Yanwei 8 Bitansky, Nir 8 Chen, Rongmao 8 Chen, Yu 8 Emura, Keita 8 Faonio, Antonio 8 Gu, Dawu 8 Katz, Jonathan N. 8 Mennink, Bart 8 Nielsen, Jesper Buus 8 Segev, Gil 8 Venkitasubramaniam, Muthuramakrishnan 8 Waters, Brent 8 Wong, Duncan S. 7 Au, Man Ho 7 Faust, Sebastian 7 Goldwasser, Shafi 7 Guo, Chun 7 Guo, Fuchun 7 Harks, Tobias 7 Huang, Qiong 7 Khurana, Dakshita 7 Li, Jiguo 7 Lin, Huijia 7 Paterson, Maura Beth 7 Raskhodnikova, Sofya 7 Seurin, Yannick 7 Zhang, Jiang 7 Zhang, Mingwu 6 Boyle, Elette 6 Brakerski, Zvika 6 Camenisch, Jan L. 6 Damgård, Ivan Bjerre 6 Goyal, Vipul 6 Hao, Rong 6 Kiayias, Aggelos 6 Klimm, Max 6 Komargodski, Ilan 6 Lindell, Yehuda 6 Long, Yu 6 Nandi, Mridul 6 O’Neill, Adam 6 Rothblum, Guy N. 6 Schröder, Dominique 6 Seo, Jae Hong 6 Stam, Martijn 6 Stinson, Douglas Robert 6 Tanaka, Keisuke 6 Visconti, Ivan 6 Wee, Hoeteck 6 Yu, Jia 5 Abdalla, Michel 5 Benhamouda, Fabrice 5 Boneh, Dan 5 Boyen, Xavier 5 Cash, David M. 5 Chen, Kefei 5 Cheng, Xiangguo 5 Chow, Sherman S. M. 5 Fotakis, Dimitris A. 5 Fouque, Pierre-Alain 5 Groth, Jens 5 Guo, Siyao 5 Han, Shuai 5 Jager, Tibor 5 Kanukurthi, Bhavana 5 Lee, Kwangsu 5 Lin, Dongdai 5 Liu, Joseph K. K. 5 Lu, Yang 5 Masny, Daniel 5 Matsuda, Takahiro 5 Nutov, Zeev 5 Park, Jonghwan ...and 1,439 more Authors all top 5 Cited in 93 Serials 97 Journal of Cryptology 72 Theoretical Computer Science 55 Designs, Codes and Cryptography 34 Information Sciences 20 Algorithmica 18 SIAM Journal on Computing 14 Journal of Mathematical Cryptology 12 Information Processing Letters 12 Journal of Computer and System Sciences 10 Discrete Mathematics 10 Information and Computation 9 International Journal of Foundations of Computer Science 7 Games and Economic Behavior 7 Theory of Computing Systems 7 Journal of Shanghai Jiaotong University (Science) 7 Cryptography and Communications 6 Discrete Applied Mathematics 6 Frontiers of Computer Science 5 European Journal of Operational Research 5 Distributed Computing 5 Computational Complexity 5 Journal of Combinatorial Optimization 4 Combinatorica 4 Soft Computing 4 Journal of Discrete Mathematical Sciences & Cryptography 4 Advances in Mathematics of Communications 4 Matematicheskie Voprosy Kriptografii 3 Operations Research 3 Operations Research Letters 3 Mathematical and Computer Modelling 3 SIAM Journal on Discrete Mathematics 3 Mathematical Programming. Series A. Series B 3 Informatica (Vilnius) 3 Science in China. Series F 2 Mathematics of Operations Research 2 Naval Research Logistics 2 Networks 2 Random Structures & Algorithms 2 MSCS. Mathematical Structures in Computer Science 2 Quantum Information Processing 2 Journal of Discrete Algorithms 2 International Journal of Quantum Information 2 Groups, Complexity, Cryptology 2 Science China. Mathematics 2 Science China. Information Sciences 1 Acta Informatica 1 American Mathematical Monthly 1 Artificial Intelligence 1 Computers & Mathematics with Applications 1 Rocky Mountain Journal of Mathematics 1 Applied Mathematics and Computation 1 Archiv der Mathematik 1 Computing 1 International Journal of Game Theory 1 Journal of Combinatorial Theory. Series A 1 Journal of Economic Theory 1 Journal of Optimization Theory and Applications 1 Theory and Decision 1 Cryptologia 1 European Journal of Combinatorics 1 Social Choice and Welfare 1 Journal of Computer Science and Technology 1 New Generation Computing 1 Journal of Parallel and Distributed Computing 1 Annals of Operations Research 1 Pattern Recognition 1 Applicable Algebra in Engineering, Communication and Computing 1 Journal of Nonlinear Science 1 Journal of Algebraic Combinatorics 1 Tatra Mountains Mathematical Publications 1 Formal Methods in System Design 1 Journal of Computer and Systems Sciences International 1 The Electronic Journal of Combinatorics 1 Annals of Mathematics and Artificial Intelligence 1 Mathematical Problems in Engineering 1 Nonlinear Dynamics 1 Journal of Inequalities and Applications 1 Journal of the ACM 1 Wuhan University Journal of Natural Sciences (WUJNS) 1 Annals of Mathematics. Second Series 1 Journal of Systems Science and Complexity 1 Sādhanā 1 Multiscale Modeling & Simulation 1 Discrete Optimization 1 Journal of Industrial and Management Optimization 1 Journal of Zhejiang University. Science A 1 Algorithms 1 Statistics Surveys 1 Symmetry 1 Dynamic Games and Applications 1 EURO Journal on Computational Optimization 1 Journal of Logical and Algebraic Methods in Programming 1 Journal of Computational and Engineering Mathematics all top 5 Cited in 23 Fields 734 Information and communication theory, circuits (94-XX) 313 Computer science (68-XX) 70 Game theory, economics, finance, and other social and behavioral sciences (91-XX) 58 Operations research, mathematical programming (90-XX) 55 Combinatorics (05-XX) 21 Quantum theory (81-XX) 17 Number theory (11-XX) 8 Numerical analysis (65-XX) 7 Algebraic geometry (14-XX) 4 Group theory and generalizations (20-XX) 4 Probability theory and stochastic processes (60-XX) 3 Dynamical systems and ergodic theory (37-XX) 3 Statistics (62-XX) 2 Order, lattices, ordered algebraic structures (06-XX) 2 Linear and multilinear algebra; matrix theory (15-XX) 1 Special functions (33-XX) 1 Calculus of variations and optimal control; optimization (49-XX) 1 Geometry (51-XX) 1 Convex and discrete geometry (52-XX) 1 Algebraic topology (55-XX) 1 Global analysis, analysis on manifolds (58-XX) 1 Fluid mechanics (76-XX) 1 Statistical mechanics, structure of matter (82-XX) Citations by Year