The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Yevgeniy Dodis: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Yevgeniy Dodis, Ariel Elbaz, Roberto Oliveira, Ran Raz
    Improved Randomness Extraction from Two Independent Sources. [Citation Graph (0, 0)][DBLP]
    APPROX-RANDOM, 2004, pp:334-344 [Conf]
  2. Yevgeniy Dodis, Nelly Fazio
    Public Key Broadcast Encryption for Stateless Receivers. [Citation Graph (0, 0)][DBLP]
    Digital Rights Management Workshop, 2002, pp:61-80 [Conf]
  3. Yevgeniy Dodis, Michael J. Freedman, Stanislaw Jarecki, Shabsi Walfish
    Versatile padding schemes for joint signature and encryption. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2004, pp:344-353 [Conf]
  4. Danfeng Yao, Nelly Fazio, Yevgeniy Dodis, Anna Lysyanskaya
    ID-based encryption for complex hierarchies with applications to forward security and broadcast encryption. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2004, pp:354-363 [Conf]
  5. Andris Ambainis, Harry Buhrman, Yevgeniy Dodis, Hein Röhrig
    Multiparty Quantum Coin Flipping. [Citation Graph (0, 0)][DBLP]
    IEEE Conference on Computational Complexity, 2004, pp:250-259 [Conf]
  6. Jean-Sébastien Coron, Yevgeniy Dodis, Cécile Malinaud, Prashant Puniya
    Merkle-Damgård Revisited: How to Construct a Hash Function. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2005, pp:430-448 [Conf]
  7. Yevgeniy Dodis, Rosario Gennaro, Johan Håstad, Hugo Krawczyk, Tal Rabin
    Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2004, pp:494-510 [Conf]
  8. Yevgeniy Dodis, Shai Halevi, Tal Rabin
    A Cryptographic Solution to a Game Theoretic Problem. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2000, pp:112-130 [Conf]
  9. Yevgeniy Dodis, Silvio Micali
    Parallel Reducibility for Information-Theoretically Secure Computation. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2000, pp:74-92 [Conf]
  10. Yevgeniy Dodis, Roberto Oliveira, Krzysztof Pietrzak
    On the Generic Insecurity of the Full Domain Hash. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2005, pp:449-466 [Conf]
  11. Yevgeniy Dodis, Jonathan Katz, Leonid Reyzin, Adam Smith
    Robust Fuzzy Extractors and Authenticated Key Agreement from Close Secrets. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2006, pp:232-250 [Conf]
  12. Yevgeniy Dodis, Matthew K. Franklin, Jonathan Katz, Atsuko Miyaji, Moti Yung
    Intrusion-Resilient Public-Key Encryption. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2003, pp:19-32 [Conf]
  13. Yevgeniy Dodis, Matthew K. Franklin, Jonathan Katz, Atsuko Miyaji, Moti Yung
    A Generic Construction for Intrusion-Resilient Public-Key Encryption. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2004, pp:81-98 [Conf]
  14. Yevgeniy Dodis, Leonid Reyzin
    Breaking and repairing optimistic fair exchange from PODC 2003. [Citation Graph (0, 0)][DBLP]
    Digital Rights Management Workshop, 2003, pp:47-54 [Conf]
  15. Jee Hea An, Yevgeniy Dodis, Tal Rabin
    On the Security of Joint Signature and Encryption. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2002, pp:83-107 [Conf]
  16. Xavier Boyen, Yevgeniy Dodis, Jonathan Katz, Rafail Ostrovsky, Adam Smith
    Secure Remote Authentication Using Biometric Data. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2005, pp:147-163 [Conf]
  17. Ran Canetti, Yevgeniy Dodis, Shai Halevi, Eyal Kushilevitz, Amit Sahai
    Exposure-Resilient Functions and All-or-Nothing Transforms. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2000, pp:453-469 [Conf]
  18. Yevgeniy Dodis, Jee Hea An
    Concealment and Its Applications to Authenticated Encryption. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2003, pp:312-329 [Conf]
  19. Yevgeniy Dodis, Aggelos Kiayias, Antonio Nicolosi, Victor Shoup
    Anonymous Identification in Ad Hoc Groups. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2004, pp:609-626 [Conf]
  20. Yevgeniy Dodis, Jonathan Katz, Shouhuai Xu, Moti Yung
    Key-Insulated Public Key Cryptosystems. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2002, pp:65-82 [Conf]
  21. Yevgeniy Dodis, Silvio Micali
    Lower Bounds for Oblivious Transfer Reductions. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1999, pp:42-55 [Conf]
  22. Yevgeniy Dodis, Leonid Reyzin, Adam Smith
    Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2004, pp:523-540 [Conf]
  23. Yevgeniy Dodis, Amit Sahai, Adam Smith
    On Perfect and Adaptive Security in Exposure-Resilient Cryptography. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2001, pp:301-324 [Conf]
  24. Yevgeniy Dodis, Dae Hyun Yum
    Time Capsule Signature. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2005, pp:57-71 [Conf]
  25. Yevgeniy Dodis, Shien Jin Ong, Manoj Prabhakaran, Amit Sahai
    On the (Im)possibility of Cryptography with Imperfect Randomness. [Citation Graph (0, 0)][DBLP]
    FOCS, 2004, pp:196-205 [Conf]
  26. Yevgeniy Dodis, Joel Spencer
    On the (non)Universality of the One-Time Pad. [Citation Graph (0, 0)][DBLP]
    FOCS, 2002, pp:376-0 [Conf]
  27. Yevgeniy Dodis
    New Imperfect Random Source with Applications to Coin-Flipping. [Citation Graph (0, 0)][DBLP]
    ICALP, 2001, pp:297-309 [Conf]
  28. Yevgeniy Dodis, Sanjeev Khanna
    Space Time Tradeoffs for Graph Properties. [Citation Graph (0, 0)][DBLP]
    ICALP, 1999, pp:291-300 [Conf]
  29. Yevgeniy Dodis, Renato Renner
    On the Impossibility of Extracting Classical Randomness Using a Quantum Computer. [Citation Graph (0, 0)][DBLP]
    ICALP (2), 2006, pp:204-215 [Conf]
  30. Antonio Nicolosi, Maxwell N. Krohn, Yevgeniy Dodis, David Mazières
    Proactive Two-Party Signatures for User Authentication. [Citation Graph (0, 0)][DBLP]
    NDSS, 2003, pp:- [Conf]
  31. Anca-Andreea Ivan, Yevgeniy Dodis
    Proxy Cryptography Revisited. [Citation Graph (0, 0)][DBLP]
    NDSS, 2003, pp:- [Conf]
  32. Yevgeniy Dodis
    Efficient Construction of (Distributed) Verifiable Random Functions. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2003, pp:1-17 [Conf]
  33. Yevgeniy Dodis, Nelly Fazio
    Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2003, pp:100-115 [Conf]
  34. Yevgeniy Dodis, Jonathan Katz, Shouhuai Xu, Moti Yung
    Strong Key-Insulated Signature Schemes. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2003, pp:130-144 [Conf]
  35. Yevgeniy Dodis, Aleksandr Yampolskiy
    A Verifiable Random Function with Short Proofs and Keys. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2005, pp:416-431 [Conf]
  36. Yevgeniy Dodis, Nelly Fazio, Aggelos Kiayias, Moti Yung
    Scalable public-key tracing and revoking. [Citation Graph (0, 0)][DBLP]
    PODC, 2003, pp:190-199 [Conf]
  37. Yevgeniy Dodis, Oded Goldreich, Eric Lehman, Sofya Raskhodnikova, Dana Ron, Alex Samorodnitsky
    Improved Testing Algorithms for Monotonicity. [Citation Graph (0, 0)][DBLP]
    RANDOM-APPROX, 1999, pp:97-108 [Conf]
  38. Yevgeniy Dodis, Shai Halevi
    Incremental Codes. [Citation Graph (0, 0)][DBLP]
    RANDOM-APPROX, 2001, pp:75-89 [Conf]
  39. Yevgeniy Dodis, Roberto Oliveira
    On Extracting Private Randomness over a Public Channel. [Citation Graph (0, 0)][DBLP]
    RANDOM-APPROX, 2003, pp:252-263 [Conf]
  40. Yevgeniy Dodis, Leonid Reyzin
    On the Power of Claw-Free Permutations. [Citation Graph (0, 0)][DBLP]
    SCN, 2002, pp:55-73 [Conf]
  41. Richard Cole, Yevgeniy Dodis, Tim Roughgarden
    How much can taxes help selfish routing? [Citation Graph (0, 0)][DBLP]
    ACM Conference on Electronic Commerce, 2003, pp:98-107 [Conf]
  42. Yevgeniy Dodis, Moti Yung
    Exposure-Resilience for Free: The Hierarchical ID-based Encryption Case. [Citation Graph (0, 0)][DBLP]
    IEEE Security in Storage Workshop, 2002, pp:45-52 [Conf]
  43. Richard Cole, Yevgeniy Dodis, Tim Roughgarden
    Bottleneck links, variable demand, and the tragedy of the commons. [Citation Graph (0, 0)][DBLP]
    SODA, 2006, pp:668-677 [Conf]
  44. Yevgeniy Dodis, Venkatesan Guruswami, Sanjeev Khanna
    The 2-Catalog Segmentation Problem. [Citation Graph (0, 0)][DBLP]
    SODA, 1999, pp:897-898 [Conf]
  45. Yevgeniy Dodis, Peter Winkler
    Universal configurations in light-flipping games. [Citation Graph (0, 0)][DBLP]
    SODA, 2001, pp:926-927 [Conf]
  46. Richard Cole, Yevgeniy Dodis, Tim Roughgarden
    Pricing network edges for heterogeneous selfish users. [Citation Graph (0, 0)][DBLP]
    STOC, 2003, pp:521-530 [Conf]
  47. Yevgeniy Dodis, Sanjeev Khanna
    Design Networks with Bounded Pairwise Distance. [Citation Graph (0, 0)][DBLP]
    STOC, 1999, pp:750-759 [Conf]
  48. Yevgeniy Dodis, Adam Smith
    Correcting errors without leaking partial information. [Citation Graph (0, 0)][DBLP]
    STOC, 2005, pp:654-663 [Conf]
  49. Dario Catalano, Yevgeniy Dodis, Ivan Visconti
    Mercurial Commitments: Minimal Assumptions and Efficient Constructions. [Citation Graph (0, 0)][DBLP]
    TCC, 2006, pp:120-144 [Conf]
  50. Ran Canetti, Yevgeniy Dodis, Rafael Pass, Shabsi Walfish
    Universally Composable Security with Global Setup. [Citation Graph (0, 0)][DBLP]
    TCC, 2007, pp:61-85 [Conf]
  51. Yevgeniy Dodis, Jonathan Katz
    Chosen-Ciphertext Security of Multiple Encryption. [Citation Graph (0, 0)][DBLP]
    TCC, 2005, pp:188-209 [Conf]
  52. Yevgeniy Dodis, Prashant Puniya
    On the Relation Between the Ideal Cipher and the Random Oracle Models. [Citation Graph (0, 0)][DBLP]
    TCC, 2006, pp:184-206 [Conf]
  53. Yevgeniy Dodis, Krzysztof Pietrzak, Bartosz Przydatek
    Separating Sources for Encryption and Secret Sharing. [Citation Graph (0, 0)][DBLP]
    TCC, 2006, pp:601-616 [Conf]
  54. Yevgeniy Dodis, Adam Smith
    Entropic Security and the Encryption of High Entropy Messages. [Citation Graph (0, 0)][DBLP]
    TCC, 2005, pp:556-577 [Conf]
  55. Yevgeniy Dodis, Aleksandr Yampolskiy, Moti Yung
    Threshold and Proactive Pseudo-Random Permutations. [Citation Graph (0, 0)][DBLP]
    TCC, 2006, pp:542-560 [Conf]
  56. David Cash, Yan Zong Ding, Yevgeniy Dodis, Wenke Lee, Richard J. Lipton, Shabsi Walfish
    Intrusion-Resilient Key Exchange in the Bounded Retrieval Model. [Citation Graph (0, 0)][DBLP]
    TCC, 2007, pp:479-498 [Conf]
  57. Carl Bosley, Yevgeniy Dodis
    Does Privacy Require True Randomness? [Citation Graph (0, 0)][DBLP]
    TCC, 2007, pp:1-20 [Conf]
  58. Andris Ambainis, Harry Buhrman, Yevgeniy Dodis, Hein Röhrig
    Multiparty Quantum Coin Flipping [Citation Graph (0, 0)][DBLP]
    CoRR, 2003, v:0, n:, pp:- [Journal]
  59. Yevgeniy Dodis, Nelly Fazio, Aggelos Kiayias, Moti Yung
    Scalable public-key tracing and revoking. [Citation Graph (0, 0)][DBLP]
    Distributed Computing, 2005, v:17, n:4, pp:323-347 [Journal]
  60. Yevgeniy Dodis
    Impossibility of Black-Box Reduction from Non-Adaptively to Adaptively Secure Coin-Flipping [Citation Graph (0, 0)][DBLP]
    Electronic Colloquium on Computational Complexity (ECCC), 2000, v:7, n:39, pp:- [Journal]
  61. Yevgeniy Dodis, Oded Goldreich, Eric Lehman, Sofya Raskhodnikova, Dana Ron, Alex Samorodnitsky
    Improved Testing Algorithms for Monotonicity. [Citation Graph (0, 0)][DBLP]
    Electronic Colloquium on Computational Complexity (ECCC), 1999, v:6, n:17, pp:- [Journal]
  62. Richard Cole, Yevgeniy Dodis, Tim Roughgarden
    How much can taxes help selfish routing? [Citation Graph (0, 0)][DBLP]
    J. Comput. Syst. Sci., 2006, v:72, n:3, pp:444-467 [Journal]
  63. Yevgeniy Dodis, Prashant Puniya
    Feistel Networks Made Public, and Applications. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2007, pp:534-554 [Conf]
  64. Yevgeniy Dodis, Krzysztof Pietrzak
    Improving the Security of MACs Via Randomized Message Preprocessing. [Citation Graph (0, 0)][DBLP]
    FSE, 2007, pp:414-433 [Conf]
  65. Yevgeniy Dodis, Pil Joong Lee, Dae Hyun Yum
    Optimistic Fair Exchange in a Multi-user Setting. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2007, pp:118-133 [Conf]
  66. Yevgeniy Dodis, Rafail Ostrovsky, Leonid Reyzin, Adam Smith
    Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data [Citation Graph (0, 0)][DBLP]
    CoRR, 2006, v:0, n:, pp:- [Journal]

  67. Getting the Best Out of Existing Hash Functions; or What if We Are Stuck with SHA?. [Citation Graph (, )][DBLP]


  68. Efficient Constructions of Composable Commitments and Zero-Knowledge Proofs. [Citation Graph (, )][DBLP]


  69. Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model. [Citation Graph (, )][DBLP]


  70. Message Authentication Codes from Unpredictable Block Ciphers. [Citation Graph (, )][DBLP]


  71. Leakage-Resilient Pseudorandom Functions and Side-Channel Attacks on Feistel Networks. [Citation Graph (, )][DBLP]


  72. Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors. [Citation Graph (, )][DBLP]


  73. A New Mode of Operation for Block Ciphers and Length-Preserving MACs. [Citation Graph (, )][DBLP]


  74. Salvaging Merkle-Damgård for Practical Applications. [Citation Graph (, )][DBLP]


  75. Public-Key Encryption in the Bounded-Retrieval Model. [Citation Graph (, )][DBLP]


  76. Indifferentiability of Permutation-Based Compression Functions and Tree-Based Modes of Operation, with Applications to MD6. [Citation Graph (, )][DBLP]


  77. On cryptography with auxiliary input. [Citation Graph (, )][DBLP]


  78. Non-malleable extractors and symmetric key cryptography from weak secrets. [Citation Graph (, )][DBLP]


  79. Changing base without losing space. [Citation Graph (, )][DBLP]


  80. Composability and On-Line Deniability of Authentication. [Citation Graph (, )][DBLP]


  81. Security Amplification for InteractiveCryptographic Primitives. [Citation Graph (, )][DBLP]


  82. Proofs of Retrievability via Hardness Amplification. [Citation Graph (, )][DBLP]


  83. Public-Key Encryption Schemes with Auxiliary Inputs. [Citation Graph (, )][DBLP]


  84. A Domain Extender for the Ideal Cipher. [Citation Graph (, )][DBLP]


  85. Survey: Leakage Resilience and the Bounded Retrieval Model. [Citation Graph (, )][DBLP]


  86. Does Privacy Require True Randomness?. [Citation Graph (, )][DBLP]


Search in 0.000secs, Finished in 0.004secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002