Please, send your comments and questions to dodiscs.nyu.edu


Surveys, Book Chapters, Invited Papers, Thesis, etc.

  1. Yevgeniy Dodis,
    "The Cost of Cryptography" (full paper),
    short version appeared at Nautilus Magazine, Issue 007 ("Waste"), November 2013.

  2. Yevgeniy Dodis and Yu Yu,
    "Overcoming Weak Expectations" (.ps) (invited paper),
    Information Theory Workshop (ITW), September 2012.

  3. Yevgeniy Dodis,
    "Shannon Impossibility, Revisited" (.ps),
    International Conference on Information Theoretic Security (ICITS), August 2012.

  4. Joel Alwen, Yevgeniy Dodis and Danuiel Wichs,
    "Survey: Leakage-Resilience and the Bounded Retrieval Model" (.ps),
    invited paper to International Conference on Information Theoretic Security, 2009.

  5. Yevgeniy Dodis and Tal Rabin,
    "Cryptography and Game Theory" (.ps),
    invited book chapter in "Algorithmic Game Theory" (username: agt1user, password: cam2agt), 2007.

  6. Yevgeniy Dodis,
    "Concealment and Its Applications to Authenticated Encryption" (.ps),
    invited book chapter in "Practical Signcryption", 2007.

  7. Yevgeniy Dodis, Leonid Reyzin and Adam Smith,
    "Fuzzy Extractors" (.ps),
    invited book chapter in "Security with Noisy Data", 2007.

  8. Jean-Sebastian Coron, Yevgeniy Dodis, Cecile Malinaud and Prashant Puniya,
    "A New Design Criteria for Hash-Functions" (.ps),
    NIST Cryptographic Hash Workshop, November 2005.

  9. Yevgeniy Dodis,
    "On Extractors, Error-Correction and Hiding All Partial Information" (.ps) (invited paper),
    Information Theory Workshop (ITW), October 2005.

  10. Yevgeniy Dodis,
    "Signcryption (Short Survey)" (.ps),
    Encyclopedia of Cryptography and Security (updated version), 2005.

  11. Richard Cole, Yevgeniy Dodis and Tim Roughgarden,
    "Pricing Networks with Selfish Routing" (.ps) (survey),
    Workshop on Economics of Peer-to-Peer Systems, June 2003.

  12. Yevgeniy Dodis and Matthias Ruhl,
    "GM-Security and Semantic Security Revisited" (.ps),
    manuscript, Febuary, 1999.

  13. [PhD Thesis] "Exposure-Resilient Cryptography" (.ps),
    Massachussetts Institute of Technology, August 2000.

  14. [Master's Thesis] "Space-Time Tradeoffs for Graph Properties" (.ps),
    Massachussetts Institute of Technology, May 1998.


Back to main page.