Please, send your comments and questions to dodiscs.nyu.edu


Research Papers (in Reverse Chronological Order)

  1. Yevgeniy Dodis, Shai Halevi and Daniel Wichs,
    "Security with Functional Re-Encryption from CPA",
    Theory of Cryptography Conference (TCC), November 2023.

  2. Marshall Ball, Yevgeniy Dodis and Eli Goldin,
    "Immunizing Backdoored PRGs",
    Theory of Cryptography Conference (TCC), November 2023.

  3. Yevgeniy Dodis, Niels Ferguson, Eli Goldin, Peter Hall, and Krzysztof Pietrzak,
    "Random Oracle Combiners: Breaking the Concatenation Barrier for Collision-Resistance",
    Advances in Cryptology - CRYPTO, August 2023.

  4. Yevgeniy Dodis, Willy Quach and Daniel Wichs,
    "Speak Much, Remember Little: Cryptography in the Bounded Storage Model, Revisited",
    Advances in Cryptology - EUROCRYPT, April 2023.

  5. Yevgeniy Dodis, Daniel Jost, Balachandar Kesavan and Antonio Marcedone,
    "End-to-End Encrypted Meetings: Proving Security and Strengthening Liveness",
    Advances in Cryptology - EUROCRYPT, April 2023.

  6. Brian Chen, Yevgeniy Dodis, Esha Ghosh, Eli Goldin, Balachandar Kesavan, Antonio Marcedone and Merry Ember Mou,
    "Rotatable Zero Knowledge Sets: Post Compromise Secure Auditable Dictionaries with application to Key Transparency",
    Advances in Cryptology - ASIACRYPT, December 2022.

  7. Yevgeniy Dodis, Daniel Jost and Harish Karthikeyan,
    "Forward-Secure Encryption with Fast Forwarding",
    Theory of Cryptography Conference (TCC), November 2022.

  8. Alexander Bienstock, Yevgeniy Dodis, Sanjam Garg, Garrison Grogan, Mohammad Hajiabadi and Paul Rosler,
    "On the Worst-Case Inefficiency of CGKA",
    Theory of Cryptography Conference (TCC), November 2022.

  9. Sandro Coretti, Yevgeniy Dodis, Harish Karthikeyan, Noah Stephens-Davidowitz and Stefano Tessaro,
    "On Seedless PRNGs and Premature Next",
    Conference on Information-Theoretic Cryptography (ITC), July 2022.

  10. Chandranan Dhar, Yevgeniy Dodis and Mridul Nandi,
    "Revisiting Collision and Local Opening Analysis of ABR Hash",
    Conference on Information-Theoretic Cryptography (ITC), July 2022.

  11. Yevgeniy Dodis, Willy Quach and Daniel Wichs,
    "Authentication in the Bounded Storage Model",
    Advances in Cryptology - EUROCRYPT, June 2022.

  12. Erik Aronesty, David Cash, Yevgeniy Dodis, Daniel H. Gallancy, Christopher Higley, Harish Karthikeyan and Oren Tysor,
    "Encapsulated Search Index : Public-Key, Sub-linear, Distributed, and Delegatable",
    Public-Key Cryptography (PKC) Conference, March 2022.

  13. Alexander Bienstock, Yevgeniy Dodis and Yi Tang,
    "Multicast Key Agreement, Revisited",
    CT-RSA Conference, February 2022.

  14. Yevgeniy Dodis, Harish Karthikeyan and Daniel Wichs,
    "Small-Box Cryptography",
    Innovations in Theoretical Computer Science (ITCS), February 2022.

  15. Yiannis Tselekounis, Sandro Coretti, Joel Alwen and Yevgeniy Dodis,
    "Modular Design of Secure Group Messaging Protocols and the Security of MLS",
    ACM Conference on Computer and Communication Security (CCS), November 2021.

  16. Alexander Bienstock, Yevgeniy Dodis and Kevin Yeo,
    "Forward Secret Encrypted RAM: Lower Bounds and Applications",
    Theory of Cryptography Conference (TCC), November 2021.

  17. Yevgeniy Dodis, Harish Karthikeyan and Daniel Wichs,
    "Updatable Public Key Encryption in the Standard Model",
    Theory of Cryptography Conference (TCC), November 2021.

  18. Yevgeniy Dodis, Siyao Guo, Noah Stephens-Davidowitz and Zhiye Xie,
    "No Time to Hash: On Super-Efficient Entropy Accumulation",
    Advances in Cryptology - CRYPTO, August 2021.

  19. Yevgeniy Dodis, Dmitry Khovratovich, Nicky Mouha and Mridul Nandi,
    "T5: Hashing Five Inputs with Three Compression Calls",
    Conference on Information-Theoretic Cryptography (ITC), July 2021.

  20. Yevgeniy Dodis, Siyao Guo, Noah Stephens-Davidowitz and Zhiye Xie,
    "Online Linear Extractors for Independent Sources",
    Conference on Information-Theoretic Cryptography (ITC), July 2021.

  21. Yevgeniy Dodis and Kevin Yeo,
    "Doubly-Affine Extractors, and their Applications",
    Conference on Information-Theoretic Cryptography (ITC), July 2021.

  22. Alexander Bienstock, Yevgeniy Dodis and Paul Rosler,
    "Resolving Concurrency in Group Ratcheting Protocols",
    Real World Cryptography (RWC), January 2021.

  23. Alexander Bienstock, Yevgeniy Dodis and Paul Rosler,
    "On the Price of Concurrency in Group Ratcheting Protocols",
    Theory of Cryptography Conference (TCC), November 2020.

  24. Yevgeniy Dodis, Pooya Farshim, Sogol Mazaheri and Stefano Tessaro,
    "Towards Defeating Backdoored Random Oracles: Indifferentiability with Bounded Adaptivity",
    Theory of Cryptography Conference (TCC), November 2020.

  25. Joel Alwen, Sandro Coretti, Yevgeniy Dodis and Yiannis Tselekounis,
    "Security Analysis and Improvements for the IETF MLS Standard for Group Messaging",
    Advances in Cryptology - CRYPTO, August 2020.

  26. Yevgeniy Dodis, Vinod Vaikuntanathan and Daniel Wichs,
    "Extracting Randomness from Extractor-Dependent Sources",
    Advances in Cryptology - EUROCRYPT, May 2020.

  27. Joel Alwen, Sandro Coretti, Yevgeniy Dodis and Yiannis Tselekounis,
    "Security Analysis and Improvements for the IETF MLS Standard for Group Messaging" (announcement),
    Real World Cryptography (RWC), January 2020.

  28. Sandro Coretti, Yevgeniy Dodis, Harish Karthikeyan and Stefano Tessaro,
    "Seedless Fruit is the Sweetest: Random Number Generation, Revisited",
    Advances in Cryptology - CRYPTO, August 2019.

  29. Melissa Chase, Yevgeniy Dodis, Yuval Ishai, Daniel Kraschewski, Tianren Liu, Rafail Ostrovsky and Vinod Vaikuntanathan,
    "Reusable Non-Interactive Secure Computation",
    Advances in Cryptology - CRYPTO, August 2019.

  30. Joel Alwen, Sandro Coretti and Yevgeniy Dodis,
    "The Double Ratchet: Security Notions, Proofs, and Modularization for the Signal Protocol",
    Advances in Cryptology - EUROCRYPT, May 2019.

  31. Sandro Coretti, Yevgeniy Dodis and Siyao Guo,
    "Non-Uniform Bounds in the Random-Permutation, Ideal-Cipher, and Generic-Group Models",
    Advances in Cryptology - CRYPTO, August 2018.

  32. Benoit Cogliati, Yevgeniy Dodis, Jonathan Katz, Jooyoung Lee, John Steinberger, Aishwarya Thiruvengadam and Zhe Zhang,
    "Provable Security of (Tweakable) Block Ciphers Based on Substitution-Permutation Networks",
    Advances in Cryptology - CRYPTO, August 2018.

  33. Yevgeniy Dodis, Paul Grubbs, Thomas Ristenpart and Joanne Woodage,
    "Fast Message Franking: From Invisible Salamanders to Encryptment",
    Advances in Cryptology - CRYPTO, August 2018.

  34. Sandro Coretti, Yevgeniy Dodis, Siyao Guo and John Steinberger,
    "Random Oracles and Non-Uniformity",
    Advances in Cryptology - EUROCRYPT, May 2018.

  35. Joanne Woodage, Rahul Chatterjee, Yevgeniy Dodis, Ari Juels and Thomas Ristenpart,
    "A New Distribution-Sensitive Secure Sketch and Popularity-Proportional Hashing",
    Advances in Cryptology - CRYPTO, August 2017.

  36. Yevgeniy Dodis, Siyao Guo and Jonathan Katz,
    "Fixing Cracks in the Concrete: Random Oracles with Auxiliary Input, Revisited",
    Advances in Cryptology - EUROCRYPT, May 2017.

  37. Yevgeniy Dodis and Dario Fiore,
    "Unilaterally-Authenticated Key Exchange",
    Financial Cryptography and Data Security Conference (FC), April 2017.

  38. Yevgeniy Dodis, Shai Halevi, Ron D. Rothblum and Daniel Wichs,
    "Spooky Encryption and its Applications",
    Advances in Cryptology - CRYPTO, August 2016.

  39. Yevgeniy Dodis, Ilya Mironov and Noah Stephens-Dawidivitz,
    "Message Transmission with Reverse Firewalls--Secure Communication on Corrupted Machines",
    Advances in Cryptology - CRYPTO, August 2016.

  40. Yevgeniy Dodis, Tianren Liu, Martijn Stam and John Steinberger,
    "Indifferentiability of Confusion-Diffusion Networks",
    Advances in Cryptology - EUROCRYPT, May 2016.

  41. Sandro Coretti, Yevgeniy Dodis, Ueli Maurer, Bjorn Tackmann and Daniele Venturi,
    "Non-Malleable Encryption: Simpler, Shorter, Stronger",
    Journal of Cryptology (JoC), August 2020.
    Earlier version (without Ueli Maurer) containing part of this paper appeared at
    Theory of Cryptography Conference (TCC), January 2016.

  42. Allison Bishop and Yevgeniy Dodis,
    "Interactive Coding for Interactive Protocols",
    Theory of Cryptography Conference (TCC), January 2016.

  43. Yevgeniy Dodis and Yanquing Yao,
    "Privacy with Imperfect Randomness",
    Advances in Cryptology - CRYPTO, August 2015.

  44. Divesh Aggarwal, Yevgeniy Dodis, Tomasz Kazana and Maciej Obremski,
    "Non-malleable Reductions and Applications",
    Symposium on Theory of Computing (STOC), June 2015.

  45. Yevgeniy Dodis, Chaya Ganesh, Alexander Golovnev, Ari Juels and Thomas Ristenpart,
    "A Formal Treatment of Backdoored Pseudorandom Generators",
    Advances in Cryptology - EUROCRYPT, April 2015.
    See also Bristol Crypto blog.

  46. Yevgeniy Dodis and Dario Fiore,
    "Interactive Encryption and Message Authentication",
    Conference on Security in Communication Networks (SCN), September 2014.

  47. Yevgeniy Dodis, Noah Stephens-Dawidivitz, Adi Shamir and Daniel Wichs,
    "How to Eat Your Entropy and Have it Too -- Optimal Recovery Strategies for Compromised RNGs",
    Advances in Cryptology - CRYPTO, August 2014.
    See also Bruce Schneier blog.

  48. Divesh Aggarwal, Yevgeniy Dodis, Zahra Jafargholi, Eric Miles and Leonid Reyzin,
    "Amplifying Privacy in Privacy Amplification",
    Advances in Cryptology - CRYPTO, August 2014.

  49. Divesh Aggarwal, Yevgeniy Dodis and Shachar Lovett,
    "Non-malleable Codes from Additive Combinatorics",
    Symposium on Theory of Computing (STOC), June 2014.

  50. Yevgeniy Dodis, Krzysztof Pietrzak and Daniel Wichs,
    "Key Derivation Without Entropy Waste",
    Advances in Cryptology - EUROCRYPT, May 2014.

  51. Shweta Agrawal, Yevgeniy Dodis, Vinod Vaikuntanathan and Daniel Wichs,
    "On Continual Leakage of Discrete Log Representations",
    Advances in Cryptology - ASIACRYPT, December 2013.

  52. Yevgeniy Dodis, David Pointcheval, Sylvain Ruhault, Damien Vergnaud and Daniel Wichs,
    "Security Analysis of Pseudo-Random Number Generators with Input: /dev/random is not Robust",
    ACM Conference on Computer and Communication Security (CCS), November 2013.
    See also Slashdot post and Bruce Schneier blog.

  53. Elena Andreeva, Andrey Bogdanov, Yevgeniy Dodis, Bart Mennink and John P. Steinberger,
    "On the Indifferentiability of Key-Alternating Ciphers",
    Advances in Cryptology - CRYPTO, August 2013.

  54. Yevgeniy Dodis and Yu Yu,
    "Overcoming Weak Expectations",
    Theory of Cryptography Conference (TCC), March 2013.

  55. Yevgeniy Dodis and Yu Yu,
    "Overcoming Weak Expectations" (invited paper),
    Information Theory Workshop (ITW), September 2012.

  56. Yevgeniy Dodis, Adriana Lopez-Alt, Ilya Mironov and Salil Vadhan,
    "Differential Privacy with Imperfect Randomness",
    Advances in Cryptology - CRYPTO, August 2012.

  57. Yevgeniy Dodis, Tom Ristenpart, John Steinberger and Stefano Tessaro,
    "To Hash or Not to Hash Again? (In)differentiability Results for H^2 and HMAC",
    Advances in Cryptology - CRYPTO, August 2012.

  58. Yevgeniy Dodis,
    "Shannon Impossibility, Revisited",
    International Conference on Information Theoretic Security (ICITS), August 2012.

  59. Yevgeniy Dodis, Weiliang Luo, Shouhuai Xu and Moti Yung,
    "Key-Insulated Symmetric Key Cryptography and Mitigating Attacks against Cryptographic Cloud Software",
    ACM Symposium on Information, Computer and Communications Security (ASIACCS), May 2012.

  60. Yevgeniy Dodis, Eike Kiltz, Krzysztof Pietrzak and Daniel Wichs,
    "Message Authentication, Revisited",
    Advances in Cryptology - EUROCRYPT, April 2012.

  61. Yevgeniy Dodis, Thomas Ristenpart and Salil Vadhan,
    "Randomness Condensers for Efficiently Samplable, Seed-Dependent Sources",
    Theory of Cryptography Conference (TCC), March 2012.

  62. Yevgeniy Dodis, Abhishek Jain, Tal Moran and Daniel Wichs,
    "Counterexamples to Hardness Amplification Beyond Negligible",
    Theory of Cryptography Conference (TCC), March 2012.

  63. Yevgeniy Dodis, Iftach Haitner and Aris Tentes,
    "On the Instantiability of Hash-and-Sign RSA Signatures",
    Theory of Cryptography Conference (TCC), March 2012.

  64. Yevgeniy Dodis, Xin Li, Trevor D. Wooley, and David Zuckerman,
    "Privacy Amplification and Non-Malleable Extractors Via Character Sums",
    Foundations of Computer Science (FOCS), October 2011.

  65. Yevgeniy Dodis, Allison Lewko, Brent Waters and Daniel Wichs,
    "Storing Secrets on Continually Leaky Devices",
    Foundations of Computer Science (FOCS), October 2011.

  66. Boaz Barak, Yevgeniy Dodis, Hugo Krawczyk, Olivier Pereira, Krzysztof Pietrzak, Francois-Xavier Standaert and Yu Yu,
    "Leftover Hash Lemma, Revisited",
    Advances in Cryptology - CRYPTO, August 2011.
    Mentioned in the New Yorker magazine (right column, page 4)

  67. Yevgeniy Dodis and John Steinberger,
    "Domain Extension for MACs beyond the Birthday Barrier",
    Advances in Cryptology - EUROCRYPT, May 2011.

  68. Yevgeniy Dodis, Kristiyan Haralambiev, Adriana Lopez-Alt and Daniel Wichs,
    "Efficient Public-Key Cryptography in the Presence of Key Leakage",
    Advances in Cryptology - ASIACRYPT, December 2010.

  69. Yevgeniy Dodis, Kristiyan Haralambiev, Adriana Lopez-Alt and Daniel Wichs,
    "Cryptography Against Continuous Memory Attacks",
    Foundations of Computer Science (FOCS), October 2010.

  70. Sherman Chow, Yevgeniy Dodis, Yannis Rouselakis and BrentWaters,
    "Practical Leakage-Resilient Identity-Based Encryption from Simple Assumptions",
    ACM Conference on Computer and Communication Security (CCS), October 2010.

  71. Yevgeniy Dodis and Krzysztof Pietrzak,
    "Leakage-Resilient Pseudorandom Functions and Side-Channel Attacks on Feistel Networks",
    Advances in Cryptology - CRYPTO, August 2010.

  72. Yevgeniy Dodis, Mihai Patrascu and Mikkel Thurup,
    "Changing Base Without Losing Space",
    Symposium on Theory of Computing (STOC), June 2010.

  73. Joel Alwen, Yevgeniy Dodis, Moni Naor, Gil Segev, Shabsi Walfish and Daniel Wichs,
    "Public-Key Encryption in the Bounded-Retrieval Model",
    Advances in Cryptology - EUROCRYPT, May 2010.

  74. Yevgeniy Dodis, Shafi Goldwasser, Yael Kalai, Chris Peikert and Vinod Vaikuntanathan,
    "Public-key Encryption Schemes with Auxiliary Inputs",
    Theory of Cryptography Conference (TCC), February 2010.

  75. Jean-Sebastien Coron, Yevgeniy Dodis, Avradip Mandal and Yannick Seurin,
    "A Domain Extender for the Ideal Cipher",
    Theory of Cryptography Conference (TCC), February 2010.

  76. Joel Alwen, Yevgeniy Dodis and Danuiel Wichs,
    "Survey: Leakage-Resilience and the Bounded Retrieval Model",
    invited paper to International Conference on Information Theoretic Security (ICITS), 2009.

  77. Joel Alwen, Yevgeniy Dodis and Daniel Wichs,
    "Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model",
    Advances in Cryptology - CRYPTO, August 2009.

  78. Yevgeniy Dodis and John Steinberger,
    "Message Authentication Codes from Unpredictable Block Ciphers",
    Advances in Cryptology - CRYPTO, August 2009.

  79. Yevgeniy Dodis and Daniel Wichs,
    "Non-malleable Extractors and Symmetric Key Cryptography from Weak Secrets",
    Symposium on Theory of Computing (STOC), May 2009.

  80. Yevgeniy Dodis, Yael Tauman Kalai and Shachar Lovett,
    "On Cryptography with Auxiliary Input",
    Symposium on Theory of Computing (STOC), May 2009.

  81. Yevgeniy Dodis, Thomas Ristenpart and Thomas Shrimpton,
    "Salvaging Merkle-Damgard for Practical Applications",
    Advances in Cryptology - EUROCRYPT, April 2009.

  82. Yevgeniy Dodis, Salil Vadhan and Daniel Wichs,
    "Proofs of Retrievability via Hardness Amplification",
    Theory of Cryptography Conference (TCC), March 2009.

  83. Yevgeniy Dodis, Russell Impagliazzo, Ragesh Jaiswal and Valentine Kabanets,
    "Security Amplification for Interactive Cryptographic Primitives",
    Theory of Cryptography Conference (TCC), March 2009.

  84. Yevgeniy Dodis, Jonathan Katz, Adam Smith and Shabsi Walfish,
    "Composability and On-Line Deniability of Authentication",
    Theory of Cryptography Conference (TCC), March 2009.

  85. Yevgeniy Dodis, Leonid Reyzin, Ronald Rivest and Emily Shen,
    "Indifferentiability of Permutation-Based Compression Functions and Tree-Based Modes of Operation, with Applications to MD6",
    Workshop on Fast Software Encryption (FSE), February 2009.

  86. Yevgeniy Dodis, Victor Shoup and Shabsi Walfish,
    "Efficient Constructions of Composable Commitments and Zero-Knowledge Proofs",
    Advances in Cryptology - CRYPTO, August 2008.

  87. Yevgeniy Dodis and Prashant Puniya,
    "Getting the Best Out of Existing Hash Functions or What if We Are Stuck with SHA?",
    Applied Cryptography and Network Security (ACNS) Conference, June 2008.

  88. Yevgeniy Dodis, Krzysztof Pietrzak and Prashant Puniya,
    "A New Mode of Operation for Block Ciphers and Length-Preserving MACs",
    Advances in Cryptology - EUROCRYPT, April 2008.

  89. Ronald Cramer, Yevgeniy Dodis, Serge Fehr, Carles Padro and Daniel Wichs,
    "Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors",
    Advances in Cryptology - EUROCRYPT, April 2008.

  90. Yevgeniy Dodis and Tal Rabin,
    "Cryptography and Game Theory",
    invited book chapter in "Algorithmic Game Theory" (username: agt1user, password: cam2agt), 2007.

  91. Yevgeniy Dodis,
    "Concealment and Its Applications to Authenticated Encryption",
    invited book chapter in "Practical Signcryption", 2007.

  92. Yevgeniy Dodis, Leonid Reyzin and Adam Smith,
    "Fuzzy Extractors",
    invited book chapter in "Security with Noisy Data", 2007.

  93. Yevgeniy Dodis and Prashant Puniya,
    "Feistel Networks made Public, and Applications",
    Advances in Cryptology - EUROCRYPT, May 2007.

  94. Yevgeniy Dodis, Pil Joong Lee and Dae Hyun Yum,
    "Optimistic Fair Exchange in a Multi-User Setting",
    Workshop on Public Key Cryptography (PKC), April 2007.

  95. Yevgeniy Dodis and Krzysztof Pietrzak,
    "Improving the Security of MACs via Randomized Message Preprocessing",
    Workshop on Fast Software Encryption (FSE), March 2007.

  96. Carl Bosley and Yevgeniy Dodis,
    "Does Privacy Require True Randomness?",
    Theory of Cryptography Conference (TCC), February 2007.

  97. Ran Canetti, Yevgeniy Dodis, Rafael Pass and Shabsi Walfish,
    "Universally Composable Security with Global Setup",
    Theory of Cryptography Conference (TCC), February 2007.

  98. David Cash, Yan Zong Ding, Yevgeniy Dodis, Wenke Lee, Richard Lipton and Shabsi Walfish,
    "Intrusion-Resilient Key Exchange in the Bounded Retrieval Model",
    Theory of Cryptography Conference (TCC), February 2007.

  99. Yevgeniy Dodis, Bhavana Kanukurthi, Jonathan Katz, Leonid Reyzin and Adam Smith,
    "Robust Fuzzy Extractors and Authenticated Key Agreement from Close Secrets",
    IEEE Transactions on Information Theory, 2012.
    Preliminary version (without Bhavana Kanukurthi) appeared in Advances in Cryptology - CRYPTO, August 2006.

  100. Yevgeniy Dodis and Renato Renner,
    "On the Impossibility of Extracting Classical Randomness Using a Quantum Computer",
    International Colloquium on Automata, Languages and Programming (ICALP), July 2006.

  101. Dario Catalano, Yevgeniy Dodis and Ivan Visconti,
    "Mercurial Commitments: Minimal Assumptions and Efficient Constructions",
    Theory of Cryptography Conference (TCC), March 2006.

    Part of this joint work is the following paper:
    Yevgeniy Dodis,
    "Minimal Assumptions for Efficient Mercurial Commitments",
    Cryptography EPrint Archive, report 2005/438.

  102. Yevgeniy Dodis, Krzysztof Pietrzak and Bartosz Przydatek
    "Separating Sources for Encryption and Secret-Sharing",
    Theory of Cryptography Conference (TCC), March 2006.

  103. Yevgeniy Dodis and Prashant Puniya,
    "On the Relation between the Ideal Cipher and the Random Oracle Models",
    Theory of Cryptography Conference (TCC), March 2006.

  104. Yevgeniy Dodis, Aleksandr Yampolskiy and Moti Yung,
    "Threshold and Proactive Pseudorandom Permutations",
    Theory of Cryptography Conference (TCC), March 2006.

  105. Richard Cole, Yevgeniy Dodis and Tim Roughgarden,
    "Bottleneck Links, Variable Demand, and the Tragedy of the Commons",
    ACM/SIAM Symposium on Discrete Algorithms (SODA), January 2006.

  106. Jean-Sebastian Coron, Yevgeniy Dodis, Cecile Malinaud and Prashant Puniya,
    "A New Design Criteria for Hash-Functions",
    NIST Cryptographic Hash Workshop, November 2005.

  107. Yevgeniy Dodis,
    "On Extractors, Error-Correction and Hiding All Partial Information" (invited paper),
    Information Theory Workshop (ITW), October 2005.

  108. Yevgeniy Dodis,
    "Signcryption (Short Survey)",
    Encyclopedia of Cryptography and Security (updated version), 2005.

  109. Yevgeniy Dodis, Roberto Oliveira and Krzystof Pietrzak,
    "On the Generic Insecurity of the Full Domain Hash",
    Advances in Cryptology - CRYPTO, August 2005.

  110. Jean-Sebastian Coron, Yevgeniy Dodis, Cecile Malinaud and Prashant Puniya,
    "Merkle-Damgard Revisited : how to Construct a Hash Function",
    Advances in Cryptology - CRYPTO, August 2005.

  111. Yevgeniy Dodis and Adam Smith,
    "Correcting Errors Without Leaking Partial Information",
    Symposium on Theory of Computing (STOC), May 2005.

  112. Xavier Boyen, Yevgeniy Dodis, Jonathan Katz, Rafail Ostrovsky and Adam Smith,
    "Secure Remote Authentication Using Biometrics",
    Advances in Cryptology - EUROCRYPT, May 2005.

  113. Yevgeniy Dodis and Dae Hyun Yum,
    "Time Capsule Signature",
    Financial Cryptography and Data Security Conference (FC), March 2005.

  114. Yevgeniy Dodis and Adam Smith,
    "Entropic Security and the Encryption of High-Entropy Messages",
    Theory of Cryptography Conference (TCC), February 2005.

  115. Yevgeniy Dodis and Jonathan Katz,
    "Chosen Ciphertext Security For Multiple Encryption",
    Theory of Cryptography Conference (TCC), February 2005.

  116. Yevgeniy Dodis and Aleksandr Yampolskiy,
    "A Verifiable Random Function With Short Proofs and Keys", (winner of Best Paper Award)
    Workshop on Public Key Cryptography (PKC), January 2005.

  117. Danfeng Yao, Nelly Fazio, Yevgeniy Dodis and Anna Lysyanskaya,
    "ID-Based Encryption for Complex Hierarchies with Applications to Forward Security and Broadcast Encryption",
    ACM Conference on Computer and Communication Security (CCS), October 2004.

  118. Yevgeniy Dodis, Michael J. Freedman, Stanislaw Jarecki and Shabsi Walfish,
    "Versatile Padding Schemes for Joint Signature and Encryption",
    ACM Conference on Computer and Communication Security (CCS), October 2004.

  119. Yevgeniy Dodis, Shien Jin Ong, Manoj Prabhakaran and Amit Sahai,
    "On the (Im)possibility of Cryptography with Imperfect Randomness",
    Foundations of Computer Science (FOCS), October 2004.

  120. Yevgeniy Dodis, Ariel Elbaz, Roberto Oliveira and Ran Raz,
    "Improved Randomness Extraction from Two Independent Sources",
    International Workshop on Randomization and Approximation Techniques in Computer Science (RANDOM), August 2004.

  121. Yevgeniy Dodis, Rosario Gennaro, Johan Hastad, Hugo Krawczyk and Tal Rabin,
    "Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes",
    Advances in Cryptology - CRYPTO, August 2004.

  122. Andris Ambainis, Harry Buhrman, Yevgeniy Dodis and Hein Röhrig,
    "Multiparty Quantum Coin Flipping",
    Conference on Computational Complexity (CCC), June 2004.

  123. Yevgeniy Dodis, Aggelos Kiayias, Antonio Nicolosi and Victor Shoup,
    "Anonymous Identification in Ad-Hoc Groups",
    Advances in Cryptology - EUROCRYPT, May 2004.

  124. Yevgeniy Dodis, Rafail Ostrovsky, Leonid Reyzin and Adam Smith,
    "Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data",
    SIAM Journal of Computing, 38(1):97--139, 2008.
    Preliminary version (without Rafail Ostrovsky) appeared in Advances in Cryptology - EUROCRYPT, May 2004.

  125. Yevgeniy Dodis, Matt Franklin, Jonathan Katz, Atsuko Miyaji and Moti Yung,
    "A Generic Construction for Intrusion-Resilient Public-Key Encryption",
    RSA Conference, Cryptography Track (CT-RSA), February 2004.

  126. Yevgeniy Dodis and Leonid Reyzin,
    "Breaking and Repairing Optimistic Fair Exchange from PODC 2003",
    ACM Workshop on Digital Rights Management (DRM), October 2003.

  127. Yevgeniy Dodis and Roberto Oliveira,
    "On Extracting Private Randomness over a Public Channel",
    International Workshop on Randomization and Approximation Techniques in Computer Science (RANDOM), August 2003.

  128. Yevgeniy Dodis, Nelly Fazio, Aggelos Kiayias and Moti Yung,
    "Scalable Public-Key Tracing and Revoking",
    Principles of Distributed Computing (PODC), July 2003.

  129. Richard Cole, Yevgeniy Dodis and Tim Roughgarden,
    "Pricing Networks with Selfish Routing" (survey),
    Workshop on Economics of Peer-to-Peer Systems, June 2003.

  130. Richard Cole, Yevgeniy Dodis and Tim Roughgarden,
    "Pricing Network Edges for Heterogeneous Selfish Users",
    ACM Symposium on Theory of Computing (STOC), June 2003.

  131. Richard Cole, Yevgeniy Dodis and Tim Roughgarden,
    "How Much Can Taxes Help Selfish Routing?",
    ACM Conference on Electronic Commerce (EC), June 2003.

  132. Yevgeniy Dodis and Jee Hea An,
    "Concealment and Its Applications to Authenticated Encryption",
    Advances in Cryptology - EUROCRYPT, May 2003.

  133. Yevgeniy Dodis, Matt Franklin, Jonathan Katz, Atsuko Miyaji and Moti Yung,
    "Intrusion-Resilient Public-Key Encryption",
    RSA Conference, Cryptography Track (CT-RSA), April 2003.

  134. Yevgeniy Dodis, Max Krohn, David Mazieres and Antonio Nicolosi,
    "Proactive Two-Party Signatures for User Authentication",
    Network and Distributed System Security Symposium (NDSS), February 2003.

  135. Yevgeniy Dodis and Anca Ivan,
    "Proxy Cryptography Revisited",
    Network and Distributed System Security Symposium (NDSS), February 2003.

  136. Yevgeniy Dodis,
    "Efficient Construction of (Distributed) Verifiable Random Functions",
    Workshop on Public Key Cryptography (PKC) , January 2003.

  137. Yevgeniy Dodis, Jonathan Katz, and Moti Yung,
    "Strong Key-Insulated Signature Schemes",
    Workshop on Public Key Cryptography (PKC), January 2003.

  138. Yevgeniy Dodis and Nelly Fazio,
    "Public Key Broadcast Encryption Secure Against Adaptive Chosen Ciphertext Attack",
    Workshop on Public Key Cryptography (PKC) , January 2003.

  139. Yevgeniy Dodis and Moti Yung,
    "Exposure-Resilience for Free: the Case of Hierarchical ID-based Encryption",
    IEEE International Security In Storage Workshop (SISW), December 2002.

  140. Yevgeniy Dodis and Nelly Fazio,
    "Public Key Broadcast Encryption for Stateless Receivers",
    ACM Workshop on Digital Rights Management (DRM), November 2002.

  141. Yevgeniy Dodis and Joel Spencer,
    "On the (non)Universality of the One-Time Pad",
    Foundations of Computer Science (FOCS), November 2002.

  142. Yevgeniy Dodis and Leonid Reyzin,
    "On the Power of Claw-Free Permutations",
    Conference on Security in Communication Networks (SCN), July 2002.

  143. Jee Hea An, Yevgeniy Dodis and Tal Rabin,
    "On the Security of Joint Signature and Encryption",
    Advances in Cryptology - EUROCRYPT, May 2002.

  144. Yevgeniy Dodis, Jonathan Katz, Shouhuai Xu, and Moti Yung,
    "Key-Insulated Public Key Cryptosystems",
    Advances in Cryptology - EUROCRYPT, May 2002.

  145. Yevgeniy Dodis and Shai Halevi,
    "Incremental Codes",
    International Workshop on Approximation Algorithms for Combinatorial Optimization Problems (APPROX), August 2001.

  146. Yevgeniy Dodis,
    "New Imperfect Random Source with Applications to Coin-Flipping",
    International Colloquium on Automata, Languages and Programming (ICALP), July 2001.

  147. Yevgeniy Dodis, Amit Sahai and Adam Smith,
    "On Perfect and Adaptive Security in Exposure-Resilient Cryptography",
    Advances in Cryptology - EUROCRYPT, May 2001.

  148. Yevgeniy Dodis and Peter Winkler,
    "Universal Configurations for Light-Flipping Games",
    (Short Form), ACM/SIAM Symposium on Discrete Algorithms (SODA), January 2001.

  149. Yevgeniy Dodis,
    "Impossibility of Black-Box Reduction from Non-Adaptively to Adaptively Secure Coin-Flipping",
    Electronim Colloquium of Computational Complexity (ECCC), report 039, 2000. [Abstract]

  150. Yevgeniy Dodis and Silvio Micali,
    "Parallel Reducibility for Information-Theoretically Secure Computation",
    Advances in Cryptology - CRYPTO, August 2000. [Abstract]

  151. Yevgeniy Dodis, Shai Halevi and Tal Rabin,
    "A Cryptographic Solution to a Game Theoretic Problem",
    Advances in Cryptology - CRYPTO, August 2000. [Abstract]

  152. Ran Canetti, Yevgeniy Dodis, Shai Halevi, Eyal Kushilevitz and Amit Sahai,
    "Exposure-Resilient Functions and All-Or-Nothing Transforms",
    Advances in Cryptology - EUROCRYPT, May 2000. [Abstract]

  153. Yevgeniy Dodis, Oded Goldreich, Eric Lehman, Sofya Raskhodnikova, Dana Ron, and Alex Samorodnitsky,
    "Improved Testing Algorithms for Monotonicity",
    International Workshop on Randomization and Approximation Techniques in Computer Science (RANDOM), August 1999.

  154. Yevgeniy Dodis and Sanjeev Khanna,
    "Space-Time Tradeoffs for Graph Properties (extended abstract)",
    International Colloquium on Automata, Languages and Programming (ICALP), July 1999.

  155. Yevgeniy Dodis and Silvio Micali,
    "Lower Bounds for Oblivious Transfer Reductions",
    Advances in Cryptology - EUROCRYPT, May 1999. [Abstract]

  156. Yevgeniy Dodis and Sanjeev Khanna,
    "Designing Networks with Bounded Pairwise Distance",
    ACM Symposium on Theory of Computing (STOC), May 1999.

  157. Yevgeniy Dodis, Venkatesan Guruswami and Sanjeev Khanna,
    "The 2-Catalog Segmentation Problem",
    (Short Form), ACM/SIAM Symposium on Discrete Algorithms (SODA), January 1999.

  158. Yevgeniy Dodis, "Geodesics on Orbifolds", undergraduate research project published in the Geometry Center Annual Research Report, summer 1994. Visit Orbifold Pinball for more information.

Back to main page.