The SCEAS System
| |||||||

## Search the dblp DataBase
Yevgeniy Dodis:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
## Publications of Author- Yevgeniy Dodis, Ariel Elbaz, Roberto Oliveira, Ran Raz
**Improved Randomness Extraction from Two Independent Sources.**[Citation Graph (0, 0)][DBLP] APPROX-RANDOM, 2004, pp:334-344 [Conf] - Yevgeniy Dodis, Nelly Fazio
**Public Key Broadcast Encryption for Stateless Receivers.**[Citation Graph (0, 0)][DBLP] Digital Rights Management Workshop, 2002, pp:61-80 [Conf] - Yevgeniy Dodis, Michael J. Freedman, Stanislaw Jarecki, Shabsi Walfish
**Versatile padding schemes for joint signature and encryption.**[Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2004, pp:344-353 [Conf] - Danfeng Yao, Nelly Fazio, Yevgeniy Dodis, Anna Lysyanskaya
**ID-based encryption for complex hierarchies with applications to forward security and broadcast encryption.**[Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2004, pp:354-363 [Conf] - Andris Ambainis, Harry Buhrman, Yevgeniy Dodis, Hein Röhrig
**Multiparty Quantum Coin Flipping.**[Citation Graph (0, 0)][DBLP] IEEE Conference on Computational Complexity, 2004, pp:250-259 [Conf] - Jean-Sébastien Coron, Yevgeniy Dodis, Cécile Malinaud, Prashant Puniya
**Merkle-Damgård Revisited: How to Construct a Hash Function.**[Citation Graph (0, 0)][DBLP] CRYPTO, 2005, pp:430-448 [Conf] - Yevgeniy Dodis, Rosario Gennaro, Johan Håstad, Hugo Krawczyk, Tal Rabin
**Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes.**[Citation Graph (0, 0)][DBLP] CRYPTO, 2004, pp:494-510 [Conf] - Yevgeniy Dodis, Shai Halevi, Tal Rabin
**A Cryptographic Solution to a Game Theoretic Problem.**[Citation Graph (0, 0)][DBLP] CRYPTO, 2000, pp:112-130 [Conf] - Yevgeniy Dodis, Silvio Micali
**Parallel Reducibility for Information-Theoretically Secure Computation.**[Citation Graph (0, 0)][DBLP] CRYPTO, 2000, pp:74-92 [Conf] - Yevgeniy Dodis, Roberto Oliveira, Krzysztof Pietrzak
**On the Generic Insecurity of the Full Domain Hash.**[Citation Graph (0, 0)][DBLP] CRYPTO, 2005, pp:449-466 [Conf] - Yevgeniy Dodis, Jonathan Katz, Leonid Reyzin, Adam Smith
**Robust Fuzzy Extractors and Authenticated Key Agreement from Close Secrets.**[Citation Graph (0, 0)][DBLP] CRYPTO, 2006, pp:232-250 [Conf] - Yevgeniy Dodis, Matthew K. Franklin, Jonathan Katz, Atsuko Miyaji, Moti Yung
**Intrusion-Resilient Public-Key Encryption.**[Citation Graph (0, 0)][DBLP] CT-RSA, 2003, pp:19-32 [Conf] - Yevgeniy Dodis, Matthew K. Franklin, Jonathan Katz, Atsuko Miyaji, Moti Yung
**A Generic Construction for Intrusion-Resilient Public-Key Encryption.**[Citation Graph (0, 0)][DBLP] CT-RSA, 2004, pp:81-98 [Conf] - Yevgeniy Dodis, Leonid Reyzin
**Breaking and repairing optimistic fair exchange from PODC 2003.**[Citation Graph (0, 0)][DBLP] Digital Rights Management Workshop, 2003, pp:47-54 [Conf] - Jee Hea An, Yevgeniy Dodis, Tal Rabin
**On the Security of Joint Signature and Encryption.**[Citation Graph (0, 0)][DBLP] EUROCRYPT, 2002, pp:83-107 [Conf] - Xavier Boyen, Yevgeniy Dodis, Jonathan Katz, Rafail Ostrovsky, Adam Smith
**Secure Remote Authentication Using Biometric Data.**[Citation Graph (0, 0)][DBLP] EUROCRYPT, 2005, pp:147-163 [Conf] - Ran Canetti, Yevgeniy Dodis, Shai Halevi, Eyal Kushilevitz, Amit Sahai
**Exposure-Resilient Functions and All-or-Nothing Transforms.**[Citation Graph (0, 0)][DBLP] EUROCRYPT, 2000, pp:453-469 [Conf] - Yevgeniy Dodis, Jee Hea An
**Concealment and Its Applications to Authenticated Encryption.**[Citation Graph (0, 0)][DBLP] EUROCRYPT, 2003, pp:312-329 [Conf] - Yevgeniy Dodis, Aggelos Kiayias, Antonio Nicolosi, Victor Shoup
**Anonymous Identification in Ad Hoc Groups.**[Citation Graph (0, 0)][DBLP] EUROCRYPT, 2004, pp:609-626 [Conf] - Yevgeniy Dodis, Jonathan Katz, Shouhuai Xu, Moti Yung
**Key-Insulated Public Key Cryptosystems.**[Citation Graph (0, 0)][DBLP] EUROCRYPT, 2002, pp:65-82 [Conf] - Yevgeniy Dodis, Silvio Micali
**Lower Bounds for Oblivious Transfer Reductions.**[Citation Graph (0, 0)][DBLP] EUROCRYPT, 1999, pp:42-55 [Conf] - Yevgeniy Dodis, Leonid Reyzin, Adam Smith
**Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data.**[Citation Graph (0, 0)][DBLP] EUROCRYPT, 2004, pp:523-540 [Conf] - Yevgeniy Dodis, Amit Sahai, Adam Smith
**On Perfect and Adaptive Security in Exposure-Resilient Cryptography.**[Citation Graph (0, 0)][DBLP] EUROCRYPT, 2001, pp:301-324 [Conf] - Yevgeniy Dodis, Dae Hyun Yum
**Time Capsule Signature.**[Citation Graph (0, 0)][DBLP] Financial Cryptography, 2005, pp:57-71 [Conf] - Yevgeniy Dodis, Shien Jin Ong, Manoj Prabhakaran, Amit Sahai
**On the (Im)possibility of Cryptography with Imperfect Randomness.**[Citation Graph (0, 0)][DBLP] FOCS, 2004, pp:196-205 [Conf] - Yevgeniy Dodis, Joel Spencer
**On the (non)Universality of the One-Time Pad.**[Citation Graph (0, 0)][DBLP] FOCS, 2002, pp:376-0 [Conf] - Yevgeniy Dodis
**New Imperfect Random Source with Applications to Coin-Flipping.**[Citation Graph (0, 0)][DBLP] ICALP, 2001, pp:297-309 [Conf] - Yevgeniy Dodis, Sanjeev Khanna
**Space Time Tradeoffs for Graph Properties.**[Citation Graph (0, 0)][DBLP] ICALP, 1999, pp:291-300 [Conf] - Yevgeniy Dodis, Renato Renner
**On the Impossibility of Extracting Classical Randomness Using a Quantum Computer.**[Citation Graph (0, 0)][DBLP] ICALP (2), 2006, pp:204-215 [Conf] - Antonio Nicolosi, Maxwell N. Krohn, Yevgeniy Dodis, David Mazières
**Proactive Two-Party Signatures for User Authentication.**[Citation Graph (0, 0)][DBLP] NDSS, 2003, pp:- [Conf] - Anca-Andreea Ivan, Yevgeniy Dodis
**Proxy Cryptography Revisited.**[Citation Graph (0, 0)][DBLP] NDSS, 2003, pp:- [Conf] - Yevgeniy Dodis
**Efficient Construction of (Distributed) Verifiable Random Functions.**[Citation Graph (0, 0)][DBLP] Public Key Cryptography, 2003, pp:1-17 [Conf] - Yevgeniy Dodis, Nelly Fazio
**Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack.**[Citation Graph (0, 0)][DBLP] Public Key Cryptography, 2003, pp:100-115 [Conf] - Yevgeniy Dodis, Jonathan Katz, Shouhuai Xu, Moti Yung
**Strong Key-Insulated Signature Schemes.**[Citation Graph (0, 0)][DBLP] Public Key Cryptography, 2003, pp:130-144 [Conf] - Yevgeniy Dodis, Aleksandr Yampolskiy
**A Verifiable Random Function with Short Proofs and Keys.**[Citation Graph (0, 0)][DBLP] Public Key Cryptography, 2005, pp:416-431 [Conf] - Yevgeniy Dodis, Nelly Fazio, Aggelos Kiayias, Moti Yung
**Scalable public-key tracing and revoking.**[Citation Graph (0, 0)][DBLP] PODC, 2003, pp:190-199 [Conf] - Yevgeniy Dodis, Oded Goldreich, Eric Lehman, Sofya Raskhodnikova, Dana Ron, Alex Samorodnitsky
**Improved Testing Algorithms for Monotonicity.**[Citation Graph (0, 0)][DBLP] RANDOM-APPROX, 1999, pp:97-108 [Conf] - Yevgeniy Dodis, Shai Halevi
**Incremental Codes.**[Citation Graph (0, 0)][DBLP] RANDOM-APPROX, 2001, pp:75-89 [Conf] - Yevgeniy Dodis, Roberto Oliveira
**On Extracting Private Randomness over a Public Channel.**[Citation Graph (0, 0)][DBLP] RANDOM-APPROX, 2003, pp:252-263 [Conf] - Yevgeniy Dodis, Leonid Reyzin
**On the Power of Claw-Free Permutations.**[Citation Graph (0, 0)][DBLP] SCN, 2002, pp:55-73 [Conf] - Richard Cole, Yevgeniy Dodis, Tim Roughgarden
**How much can taxes help selfish routing?**[Citation Graph (0, 0)][DBLP] ACM Conference on Electronic Commerce, 2003, pp:98-107 [Conf] - Yevgeniy Dodis, Moti Yung
**Exposure-Resilience for Free: The Hierarchical ID-based Encryption Case.**[Citation Graph (0, 0)][DBLP] IEEE Security in Storage Workshop, 2002, pp:45-52 [Conf] - Richard Cole, Yevgeniy Dodis, Tim Roughgarden
**Bottleneck links, variable demand, and the tragedy of the commons.**[Citation Graph (0, 0)][DBLP] SODA, 2006, pp:668-677 [Conf] - Yevgeniy Dodis, Venkatesan Guruswami, Sanjeev Khanna
**The 2-Catalog Segmentation Problem.**[Citation Graph (0, 0)][DBLP] SODA, 1999, pp:897-898 [Conf] - Yevgeniy Dodis, Peter Winkler
**Universal configurations in light-flipping games.**[Citation Graph (0, 0)][DBLP] SODA, 2001, pp:926-927 [Conf] - Richard Cole, Yevgeniy Dodis, Tim Roughgarden
**Pricing network edges for heterogeneous selfish users.**[Citation Graph (0, 0)][DBLP] STOC, 2003, pp:521-530 [Conf] - Yevgeniy Dodis, Sanjeev Khanna
**Design Networks with Bounded Pairwise Distance.**[Citation Graph (0, 0)][DBLP] STOC, 1999, pp:750-759 [Conf] - Yevgeniy Dodis, Adam Smith
**Correcting errors without leaking partial information.**[Citation Graph (0, 0)][DBLP] STOC, 2005, pp:654-663 [Conf] - Dario Catalano, Yevgeniy Dodis, Ivan Visconti
**Mercurial Commitments: Minimal Assumptions and Efficient Constructions.**[Citation Graph (0, 0)][DBLP] TCC, 2006, pp:120-144 [Conf] - Ran Canetti, Yevgeniy Dodis, Rafael Pass, Shabsi Walfish
**Universally Composable Security with Global Setup.**[Citation Graph (0, 0)][DBLP] TCC, 2007, pp:61-85 [Conf] - Yevgeniy Dodis, Jonathan Katz
**Chosen-Ciphertext Security of Multiple Encryption.**[Citation Graph (0, 0)][DBLP] TCC, 2005, pp:188-209 [Conf] - Yevgeniy Dodis, Prashant Puniya
**On the Relation Between the Ideal Cipher and the Random Oracle Models.**[Citation Graph (0, 0)][DBLP] TCC, 2006, pp:184-206 [Conf] - Yevgeniy Dodis, Krzysztof Pietrzak, Bartosz Przydatek
**Separating Sources for Encryption and Secret Sharing.**[Citation Graph (0, 0)][DBLP] TCC, 2006, pp:601-616 [Conf] - Yevgeniy Dodis, Adam Smith
**Entropic Security and the Encryption of High Entropy Messages.**[Citation Graph (0, 0)][DBLP] TCC, 2005, pp:556-577 [Conf] - Yevgeniy Dodis, Aleksandr Yampolskiy, Moti Yung
**Threshold and Proactive Pseudo-Random Permutations.**[Citation Graph (0, 0)][DBLP] TCC, 2006, pp:542-560 [Conf] - David Cash, Yan Zong Ding, Yevgeniy Dodis, Wenke Lee, Richard J. Lipton, Shabsi Walfish
**Intrusion-Resilient Key Exchange in the Bounded Retrieval Model.**[Citation Graph (0, 0)][DBLP] TCC, 2007, pp:479-498 [Conf] - Carl Bosley, Yevgeniy Dodis
**Does Privacy Require True Randomness?**[Citation Graph (0, 0)][DBLP] TCC, 2007, pp:1-20 [Conf] - Andris Ambainis, Harry Buhrman, Yevgeniy Dodis, Hein Röhrig
**Multiparty Quantum Coin Flipping**[Citation Graph (0, 0)][DBLP] CoRR, 2003, v:0, n:, pp:- [Journal] - Yevgeniy Dodis, Nelly Fazio, Aggelos Kiayias, Moti Yung
**Scalable public-key tracing and revoking.**[Citation Graph (0, 0)][DBLP] Distributed Computing, 2005, v:17, n:4, pp:323-347 [Journal] - Yevgeniy Dodis
**Impossibility of Black-Box Reduction from Non-Adaptively to Adaptively Secure Coin-Flipping**[Citation Graph (0, 0)][DBLP] Electronic Colloquium on Computational Complexity (ECCC), 2000, v:7, n:39, pp:- [Journal] - Yevgeniy Dodis, Oded Goldreich, Eric Lehman, Sofya Raskhodnikova, Dana Ron, Alex Samorodnitsky
**Improved Testing Algorithms for Monotonicity.**[Citation Graph (0, 0)][DBLP] Electronic Colloquium on Computational Complexity (ECCC), 1999, v:6, n:17, pp:- [Journal] - Richard Cole, Yevgeniy Dodis, Tim Roughgarden
**How much can taxes help selfish routing?**[Citation Graph (0, 0)][DBLP] J. Comput. Syst. Sci., 2006, v:72, n:3, pp:444-467 [Journal] - Yevgeniy Dodis, Prashant Puniya
**Feistel Networks Made Public, and Applications.**[Citation Graph (0, 0)][DBLP] EUROCRYPT, 2007, pp:534-554 [Conf] - Yevgeniy Dodis, Krzysztof Pietrzak
**Improving the Security of MACs Via Randomized Message Preprocessing.**[Citation Graph (0, 0)][DBLP] FSE, 2007, pp:414-433 [Conf] - Yevgeniy Dodis, Pil Joong Lee, Dae Hyun Yum
**Optimistic Fair Exchange in a Multi-user Setting.**[Citation Graph (0, 0)][DBLP] Public Key Cryptography, 2007, pp:118-133 [Conf] - Yevgeniy Dodis, Rafail Ostrovsky, Leonid Reyzin, Adam Smith
**Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data**[Citation Graph (0, 0)][DBLP] CoRR, 2006, v:0, n:, pp:- [Journal] **Getting the Best Out of Existing Hash Functions; or What if We Are Stuck with SHA?.**[Citation Graph (, )][DBLP]**Efficient Constructions of Composable Commitments and Zero-Knowledge Proofs.**[Citation Graph (, )][DBLP]**Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model.**[Citation Graph (, )][DBLP]**Message Authentication Codes from Unpredictable Block Ciphers.**[Citation Graph (, )][DBLP]**Leakage-Resilient Pseudorandom Functions and Side-Channel Attacks on Feistel Networks.**[Citation Graph (, )][DBLP]**Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors.**[Citation Graph (, )][DBLP]**A New Mode of Operation for Block Ciphers and Length-Preserving MACs.**[Citation Graph (, )][DBLP]**Salvaging Merkle-Damgård for Practical Applications.**[Citation Graph (, )][DBLP]**Public-Key Encryption in the Bounded-Retrieval Model.**[Citation Graph (, )][DBLP]**Indifferentiability of Permutation-Based Compression Functions and Tree-Based Modes of Operation, with Applications to MD6.**[Citation Graph (, )][DBLP]**On cryptography with auxiliary input.**[Citation Graph (, )][DBLP]**Non-malleable extractors and symmetric key cryptography from weak secrets.**[Citation Graph (, )][DBLP]**Changing base without losing space.**[Citation Graph (, )][DBLP]**Composability and On-Line Deniability of Authentication.**[Citation Graph (, )][DBLP]**Security Amplification for InteractiveCryptographic Primitives.**[Citation Graph (, )][DBLP]**Proofs of Retrievability via Hardness Amplification.**[Citation Graph (, )][DBLP]**Public-Key Encryption Schemes with Auxiliary Inputs.**[Citation Graph (, )][DBLP]**A Domain Extender for the Ideal Cipher.**[Citation Graph (, )][DBLP]**Survey: Leakage Resilience and the Bounded Retrieval Model.**[Citation Graph (, )][DBLP]**Does Privacy Require True Randomness?.**[Citation Graph (, )][DBLP]
Search in 0.029secs, Finished in 0.031secs | |||||||

| |||||||

| |||||||

System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002 for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002 |