Please, send your comments and questions to
dodis
cs.nyu.edu
Click here for
Research Papers
(in reverse chronological order)
Surveys, Book Chapters, Invited Papers, Thesis, etc.
Yevgeniy Dodis
,
"The Cost of Cryptography"
(full paper),
short
version
appeared at
Nautilus Magazine
, Issue 007 ("Waste"), November 2013.
Yevgeniy Dodis
and Yu Yu,
"Overcoming Weak Expectations"
(
.ps
) (invited paper),
Information Theory Workshop (ITW)
, September 2012.
Yevgeniy Dodis
,
"Shannon Impossibility, Revisited"
(
.ps
),
International Conference on Information Theoretic Security (ICITS)
, August 2012.
Joel Alwen,
Yevgeniy Dodis
and Danuiel Wichs,
"Survey: Leakage-Resilience and the Bounded Retrieval Model"
(
.ps
),
invited paper to
International Conference on Information Theoretic Security
, 2009.
Yevgeniy Dodis
and Tal Rabin,
"Cryptography and Game Theory"
(
.ps
),
invited book chapter in
"Algorithmic Game Theory"
(username: agt1user, password: cam2agt), 2007.
Yevgeniy Dodis
,
"Concealment and Its Applications to Authenticated Encryption"
(
.ps
),
invited book chapter in "Practical Signcryption"
, 2007.
Yevgeniy Dodis
, Leonid Reyzin and Adam Smith,
"Fuzzy Extractors"
(
.ps
),
invited book chapter in "Security with Noisy Data"
, 2007.
Jean-Sebastian Coron,
Yevgeniy Dodis
, Cecile Malinaud and Prashant Puniya,
"A New Design Criteria for Hash-Functions"
(
.ps
),
NIST Cryptographic Hash Workshop
, November 2005.
Yevgeniy Dodis
,
"On Extractors, Error-Correction and Hiding All Partial Information"
(
.ps
) (invited paper),
Information Theory Workshop (ITW)
, October 2005.
Yevgeniy Dodis
,
"Signcryption (Short Survey)"
(
.ps
),
Encyclopedia of Cryptography and Security
(updated version), 2005.
Richard Cole,
Yevgeniy Dodis
and Tim Roughgarden,
"Pricing Networks with Selfish Routing"
(
.ps
) (survey),
Workshop on Economics of Peer-to-Peer Systems
, June 2003.
Yevgeniy Dodis
,
"Fault-Tolerant Leader Election and Collective Coin-Flipping in the Full Information Model"
,
manuscript
, April, 2000.
Yevgeniy Dodis
and Matthias Ruhl,
"GM-Security and Semantic Security Revisited"
(
.ps
),
manuscript
, Febuary, 1999.
[
PhD Thesis
]
"Exposure-Resilient Cryptography"
(
.ps
),
Massachussetts Institute of Technology
, August 2000.
[
Master's Thesis
]
"Space-Time Tradeoffs for Graph Properties"
(
.ps
),
Massachussetts Institute of Technology
, May 1998.
Back to main page.