BibTeX records: Yevgeniy Dodis

download as .bib file

@inproceedings{DBLP:conf/crypto/DodisFGHP23,
  author       = {Yevgeniy Dodis and
                  Niels Ferguson and
                  Eli Goldin and
                  Peter Hall and
                  Krzysztof Pietrzak},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Random Oracle Combiners: Breaking the Concatenation Barrier for Collision-Resistance},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14082},
  pages        = {514--546},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38545-2\_17},
  doi          = {10.1007/978-3-031-38545-2\_17},
  timestamp    = {Mon, 14 Aug 2023 16:16:25 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DodisFGHP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/DodisQW23,
  author       = {Yevgeniy Dodis and
                  Willy Quach and
                  Daniel Wichs},
  editor       = {Carmit Hazay and
                  Martijn Stam},
  title        = {Speak Much, Remember Little: Cryptography in the Bounded Storage Model,
                  Revisited},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Lyon, France, April 23-27, 2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14004},
  pages        = {86--116},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-30545-0\_4},
  doi          = {10.1007/978-3-031-30545-0\_4},
  timestamp    = {Thu, 20 Apr 2023 11:35:01 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/DodisQW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/DodisJKM23,
  author       = {Yevgeniy Dodis and
                  Daniel Jost and
                  Balachandar Kesavan and
                  Antonio Marcedone},
  editor       = {Carmit Hazay and
                  Martijn Stam},
  title        = {End-to-End Encrypted Zoom Meetings: Proving Security and Strengthening
                  Liveness},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Lyon, France, April 23-27, 2023, Proceedings, Part {V}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14008},
  pages        = {157--189},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-30589-4\_6},
  doi          = {10.1007/978-3-031-30589-4\_6},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/DodisJKM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BallDG23,
  author       = {Marshall Ball and
                  Yevgeniy Dodis and
                  Eli Goldin},
  editor       = {Guy N. Rothblum and
                  Hoeteck Wee},
  title        = {Immunizing Backdoored PRGs},
  booktitle    = {Theory of Cryptography - 21st International Conference, {TCC} 2023,
                  Taipei, Taiwan, November 29 - December 2, 2023, Proceedings, Part
                  {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14371},
  pages        = {153--182},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-48621-0\_6},
  doi          = {10.1007/978-3-031-48621-0\_6},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/BallDG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/DodisHW23,
  author       = {Yevgeniy Dodis and
                  Shai Halevi and
                  Daniel Wichs},
  editor       = {Guy N. Rothblum and
                  Hoeteck Wee},
  title        = {Security with Functional Re-encryption from {CPA}},
  booktitle    = {Theory of Cryptography - 21st International Conference, {TCC} 2023,
                  Taipei, Taiwan, November 29 - December 2, 2023, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14370},
  pages        = {279--305},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-48618-0\_10},
  doi          = {10.1007/978-3-031-48618-0\_10},
  timestamp    = {Wed, 06 Dec 2023 13:56:15 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/DodisHW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DodisFGHP23,
  author       = {Yevgeniy Dodis and
                  Niels Ferguson and
                  Eli Goldin and
                  Peter Hall and
                  Krzysztof Pietrzak},
  title        = {Random Oracle Combiners: Breaking the Concatenation Barrier for Collision-Resistance},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1041},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1041},
  timestamp    = {Fri, 04 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DodisFGHP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DodisHW23,
  author       = {Yevgeniy Dodis and
                  Shai Halevi and
                  Daniel Wichs},
  title        = {Security with Functional Re-Encryption from {CPA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1443},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1443},
  timestamp    = {Sat, 07 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DodisHW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BallDG23,
  author       = {Marshall Ball and
                  Yevgeniy Dodis and
                  Eli Goldin},
  title        = {Immunizing Backdoored PRGs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1778},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1778},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BallDG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DodisJKM23,
  author       = {Yevgeniy Dodis and
                  Daniel Jost and
                  Balachandar Kesavan and
                  Antonio Marcedone},
  title        = {End-to-End Encrypted Zoom Meetings: Proving Security and Strengthening
                  Liveness},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1829},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1829},
  timestamp    = {Fri, 08 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/DodisJKM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/ChenDGGKMM22,
  author       = {Brian Chen and
                  Yevgeniy Dodis and
                  Esha Ghosh and
                  Eli Goldin and
                  Balachandar Kesavan and
                  Antonio Marcedone and
                  Merry Ember Mou},
  editor       = {Shweta Agrawal and
                  Dongdai Lin},
  title        = {Rotatable Zero Knowledge Sets - Post Compromise Secure Auditable Dictionaries
                  with Application to Key Transparency},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2022 - 28th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Taipei, Taiwan, December 5-9, 2022, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13793},
  pages        = {547--580},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22969-5\_19},
  doi          = {10.1007/978-3-031-22969-5\_19},
  timestamp    = {Fri, 03 Feb 2023 17:07:14 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/ChenDGGKMM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/citc/CorettiDKST22,
  author       = {Sandro Coretti and
                  Yevgeniy Dodis and
                  Harish Karthikeyan and
                  Noah Stephens{-}Davidowitz and
                  Stefano Tessaro},
  editor       = {Dana Dachman{-}Soled},
  title        = {On Seedless PRNGs and Premature Next},
  booktitle    = {3rd Conference on Information-Theoretic Cryptography, {ITC} 2022,
                  July 5-7, 2022, Cambridge, MA, {USA}},
  series       = {LIPIcs},
  volume       = {230},
  pages        = {9:1--9:20},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2022},
  url          = {https://doi.org/10.4230/LIPIcs.ITC.2022.9},
  doi          = {10.4230/LIPICS.ITC.2022.9},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/citc/CorettiDKST22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/citc/DharDN22,
  author       = {Chandranan Dhar and
                  Yevgeniy Dodis and
                  Mridul Nandi},
  editor       = {Dana Dachman{-}Soled},
  title        = {Revisiting Collision and Local Opening Analysis of {ABR} Hash},
  booktitle    = {3rd Conference on Information-Theoretic Cryptography, {ITC} 2022,
                  July 5-7, 2022, Cambridge, MA, {USA}},
  series       = {LIPIcs},
  volume       = {230},
  pages        = {11:1--11:22},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2022},
  url          = {https://doi.org/10.4230/LIPIcs.ITC.2022.11},
  doi          = {10.4230/LIPICS.ITC.2022.11},
  timestamp    = {Thu, 30 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/citc/DharDN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/BienstockDT22,
  author       = {Alexander Bienstock and
                  Yevgeniy Dodis and
                  Yi Tang},
  editor       = {Steven D. Galbraith},
  title        = {Multicast Key Agreement, Revisited},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2022 - Cryptographers' Track at the
                  {RSA} Conference 2022, Virtual Event, March 1-2, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13161},
  pages        = {1--25},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-95312-6\_1},
  doi          = {10.1007/978-3-030-95312-6\_1},
  timestamp    = {Thu, 03 Feb 2022 09:28:38 +0100},
  biburl       = {https://dblp.org/rec/conf/ctrsa/BienstockDT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/DodisQW22,
  author       = {Yevgeniy Dodis and
                  Willy Quach and
                  Daniel Wichs},
  editor       = {Orr Dunkelman and
                  Stefan Dziembowski},
  title        = {Authentication in the Bounded Storage Model},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13277},
  pages        = {737--766},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-07082-2\_26},
  doi          = {10.1007/978-3-031-07082-2\_26},
  timestamp    = {Tue, 31 May 2022 17:23:10 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/DodisQW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/innovations/DodisKW22,
  author       = {Yevgeniy Dodis and
                  Harish Karthikeyan and
                  Daniel Wichs},
  editor       = {Mark Braverman},
  title        = {Small-Box Cryptography},
  booktitle    = {13th Innovations in Theoretical Computer Science Conference, {ITCS}
                  2022, January 31 - February 3, 2022, Berkeley, CA, {USA}},
  series       = {LIPIcs},
  volume       = {215},
  pages        = {56:1--56:25},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2022},
  url          = {https://doi.org/10.4230/LIPIcs.ITCS.2022.56},
  doi          = {10.4230/LIPICS.ITCS.2022.56},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/innovations/DodisKW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AronestyCDGHKT22,
  author       = {Erik Aronesty and
                  David Cash and
                  Yevgeniy Dodis and
                  Daniel H. Gallancy and
                  Christopher Higley and
                  Harish Karthikeyan and
                  Oren Tysor},
  editor       = {Goichiro Hanaoka and
                  Junji Shikata and
                  Yohei Watanabe},
  title        = {Encapsulated Search Index: Public-Key, Sub-linear, Distributed, and
                  Delegatable},
  booktitle    = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Virtual Event,
                  March 8-11, 2022, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13178},
  pages        = {256--285},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-97131-1\_9},
  doi          = {10.1007/978-3-030-97131-1\_9},
  timestamp    = {Thu, 10 Mar 2022 11:26:10 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/AronestyCDGHKT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/DodisJK22,
  author       = {Yevgeniy Dodis and
                  Daniel Jost and
                  Harish Karthikeyan},
  editor       = {Eike Kiltz and
                  Vinod Vaikuntanathan},
  title        = {Forward-Secure Encryption with Fast Forwarding},
  booktitle    = {Theory of Cryptography - 20th International Conference, {TCC} 2022,
                  Chicago, IL, USA, November 7-10, 2022, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13748},
  pages        = {3--32},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22365-5\_1},
  doi          = {10.1007/978-3-031-22365-5\_1},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/DodisJK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BienstockDGGHR22,
  author       = {Alexander Bienstock and
                  Yevgeniy Dodis and
                  Sanjam Garg and
                  Garrison Grogan and
                  Mohammad Hajiabadi and
                  Paul R{\"{o}}sler},
  editor       = {Eike Kiltz and
                  Vinod Vaikuntanathan},
  title        = {On the Worst-Case Inefficiency of {CGKA}},
  booktitle    = {Theory of Cryptography - 20th International Conference, {TCC} 2022,
                  Chicago, IL, USA, November 7-10, 2022, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13748},
  pages        = {213--243},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22365-5\_8},
  doi          = {10.1007/978-3-031-22365-5\_8},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/BienstockDGGHR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2022-1,
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13507},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15802-5},
  doi          = {10.1007/978-3-031-15802-5},
  isbn         = {978-3-031-15801-8},
  timestamp    = {Wed, 19 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/2022-1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2022-2,
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13508},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15979-4},
  doi          = {10.1007/978-3-031-15979-4},
  isbn         = {978-3-031-15978-7},
  timestamp    = {Wed, 19 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/2022-2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2022-3,
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13509},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15982-4},
  doi          = {10.1007/978-3-031-15982-4},
  isbn         = {978-3-031-15981-7},
  timestamp    = {Wed, 19 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/2022-3.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2022-4,
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13510},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15985-5},
  doi          = {10.1007/978-3-031-15985-5},
  isbn         = {978-3-031-15984-8},
  timestamp    = {Wed, 19 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/2022-4.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DodisKW22,
  author       = {Yevgeniy Dodis and
                  Harish Karthikeyan and
                  Daniel Wichs},
  title        = {Updatable Public Key Encryption in the Standard Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {68},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/068},
  timestamp    = {Fri, 18 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/DodisKW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DodisKW22a,
  author       = {Yevgeniy Dodis and
                  Harish Karthikeyan and
                  Daniel Wichs},
  title        = {Small-Box Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {69},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/069},
  timestamp    = {Fri, 18 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/DodisKW22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AronestyCDGHKT22,
  author       = {Erik Aronesty and
                  David Cash and
                  Yevgeniy Dodis and
                  Daniel H. Gallancy and
                  Christopher Higley and
                  Harish Karthikeyan and
                  Oren Tysor},
  title        = {Encapsulated Search Index: Public-Key, Sub-linear, Distributed, and
                  Delegatable},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {71},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/071},
  timestamp    = {Fri, 18 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/AronestyCDGHKT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CorettiDKST22,
  author       = {Sandro Coretti and
                  Yevgeniy Dodis and
                  Harish Karthikeyan and
                  Noah Stephens{-}Davidowitz and
                  Stefano Tessaro},
  title        = {On Seedless PRNGs and Premature Next},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {558},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/558},
  timestamp    = {Mon, 16 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CorettiDKST22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DodisQW22,
  author       = {Yevgeniy Dodis and
                  Willy Quach and
                  Daniel Wichs},
  title        = {Authentication in the Bounded Storage Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {690},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/690},
  timestamp    = {Mon, 20 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DodisQW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DodisJK22,
  author       = {Yevgeniy Dodis and
                  Daniel Jost and
                  Harish Karthikeyan},
  title        = {Forward-Secure Encryption with Fast Forwarding},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1233},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1233},
  timestamp    = {Thu, 13 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DodisJK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BienstockDGGHR22,
  author       = {Alexander Bienstock and
                  Yevgeniy Dodis and
                  Sanjam Garg and
                  Garrison Grogan and
                  Mohammad Hajiabadi and
                  Paul R{\"{o}}sler},
  title        = {On the Worst-Case Inefficiency of {CGKA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1237},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1237},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BienstockDGGHR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenDGGKMM22,
  author       = {Brian Chen and
                  Yevgeniy Dodis and
                  Esha Ghosh and
                  Eli Goldin and
                  Balachandar Kesavan and
                  Antonio Marcedone and
                  Merry Ember Mou},
  title        = {Rotatable Zero Knowledge Sets: Post Compromise Secure Auditable Dictionaries
                  with application to Key Transparency},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1264},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1264},
  timestamp    = {Sat, 22 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenDGGKMM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AlwenCDT21,
  author       = {Jo{\"{e}}l Alwen and
                  Sandro Coretti and
                  Yevgeniy Dodis and
                  Yiannis Tselekounis},
  editor       = {Yongdae Kim and
                  Jong Kim and
                  Giovanni Vigna and
                  Elaine Shi},
  title        = {Modular Design of Secure Group Messaging Protocols and the Security
                  of {MLS}},
  booktitle    = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, Republic of Korea, November 15 - 19, 2021},
  pages        = {1463--1483},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3460120.3484820},
  doi          = {10.1145/3460120.3484820},
  timestamp    = {Tue, 16 Nov 2021 12:59:46 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/AlwenCDT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/citc/DodisY21,
  author       = {Yevgeniy Dodis and
                  Kevin Yeo},
  editor       = {Stefano Tessaro},
  title        = {Doubly-Affine Extractors, and Their Applications},
  booktitle    = {2nd Conference on Information-Theoretic Cryptography, {ITC} 2021,
                  July 23-26, 2021, Virtual Conference},
  series       = {LIPIcs},
  volume       = {199},
  pages        = {13:1--13:23},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2021},
  url          = {https://doi.org/10.4230/LIPIcs.ITC.2021.13},
  doi          = {10.4230/LIPICS.ITC.2021.13},
  timestamp    = {Thu, 16 Sep 2021 15:58:53 +0200},
  biburl       = {https://dblp.org/rec/conf/citc/DodisY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/citc/DodisGSX21,
  author       = {Yevgeniy Dodis and
                  Siyao Guo and
                  Noah Stephens{-}Davidowitz and
                  Zhiye Xie},
  editor       = {Stefano Tessaro},
  title        = {Online Linear Extractors for Independent Sources},
  booktitle    = {2nd Conference on Information-Theoretic Cryptography, {ITC} 2021,
                  July 23-26, 2021, Virtual Conference},
  series       = {LIPIcs},
  volume       = {199},
  pages        = {14:1--14:14},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2021},
  url          = {https://doi.org/10.4230/LIPIcs.ITC.2021.14},
  doi          = {10.4230/LIPICS.ITC.2021.14},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/citc/DodisGSX21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/citc/DodisKMN21,
  author       = {Yevgeniy Dodis and
                  Dmitry Khovratovich and
                  Nicky Mouha and
                  Mridul Nandi},
  editor       = {Stefano Tessaro},
  title        = {T{\unicode{8325}}: Hashing Five Inputs with Three Compression Calls},
  booktitle    = {2nd Conference on Information-Theoretic Cryptography, {ITC} 2021,
                  July 23-26, 2021, Virtual Conference},
  series       = {LIPIcs},
  volume       = {199},
  pages        = {24:1--24:23},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2021},
  url          = {https://doi.org/10.4230/LIPIcs.ITC.2021.24},
  doi          = {10.4230/LIPICS.ITC.2021.24},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/citc/DodisKMN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DodisGSX21,
  author       = {Yevgeniy Dodis and
                  Siyao Guo and
                  Noah Stephens{-}Davidowitz and
                  Zhiye Xie},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {No Time to Hash: On Super-Efficient Entropy Accumulation},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12828},
  pages        = {548--576},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84259-8\_19},
  doi          = {10.1007/978-3-030-84259-8\_19},
  timestamp    = {Mon, 16 Aug 2021 09:08:12 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DodisGSX21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BienstockDY21,
  author       = {Alexander Bienstock and
                  Yevgeniy Dodis and
                  Kevin Yeo},
  editor       = {Kobbi Nissim and
                  Brent Waters},
  title        = {Forward Secret Encrypted {RAM:} Lower Bounds and Applications},
  booktitle    = {Theory of Cryptography - 19th International Conference, {TCC} 2021,
                  Raleigh, NC, USA, November 8-11, 2021, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13044},
  pages        = {62--93},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90456-2\_3},
  doi          = {10.1007/978-3-030-90456-2\_3},
  timestamp    = {Mon, 08 Nov 2021 11:51:39 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/BienstockDY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/DodisKW21,
  author       = {Yevgeniy Dodis and
                  Harish Karthikeyan and
                  Daniel Wichs},
  editor       = {Kobbi Nissim and
                  Brent Waters},
  title        = {Updatable Public Key Encryption in the Standard Model},
  booktitle    = {Theory of Cryptography - 19th International Conference, {TCC} 2021,
                  Raleigh, NC, USA, November 8-11, 2021, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13044},
  pages        = {254--285},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90456-2\_9},
  doi          = {10.1007/978-3-030-90456-2\_9},
  timestamp    = {Mon, 08 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/DodisKW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BienstockDY21,
  author       = {Alexander Bienstock and
                  Yevgeniy Dodis and
                  Kevin Yeo},
  title        = {Forward Secret Encrypted {RAM:} Lower Bounds and Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {244},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/244},
  timestamp    = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BienstockDY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DodisKMN21,
  author       = {Yevgeniy Dodis and
                  Dmitry Khovratovich and
                  Nicky Mouha and
                  Mridul Nandi},
  title        = {{T5:} Hashing Five Inputs with Three Compression Calls},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {373},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/373},
  timestamp    = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DodisKMN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DodisGSX21,
  author       = {Yevgeniy Dodis and
                  Siyao Guo and
                  Noah Stephens{-}Davidowitz and
                  Zhiye Xie},
  title        = {No Time to Hash: On Superefficient Entropy Accumulation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {523},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/523},
  timestamp    = {Tue, 04 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DodisGSX21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DodisY21,
  author       = {Yevgeniy Dodis and
                  Kevin Yeo},
  title        = {Doubly-Affine Extractors, and their Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {637},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/637},
  timestamp    = {Mon, 07 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DodisY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DodisGSX21a,
  author       = {Yevgeniy Dodis and
                  Siyao Guo and
                  Noah Stephens{-}Davidowitz and
                  Zhiye Xie},
  title        = {Online Linear Extractors for Independent Sources},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1002},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1002},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DodisGSX21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlwenCDT21,
  author       = {Jo{\"{e}}l Alwen and
                  Sandro Coretti and
                  Yevgeniy Dodis and
                  Yiannis Tselekounis},
  title        = {Modular Design of Secure Group Messaging Protocols and the Security
                  of {MLS}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1083},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1083},
  timestamp    = {Mon, 06 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlwenCDT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DodisQW21,
  author       = {Yevgeniy Dodis and
                  Willy Quach and
                  Daniel Wichs},
  title        = {Speak Much, Remember Little: Cryptography in the Bounded Storage Model,
                  Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1270},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1270},
  timestamp    = {Mon, 25 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DodisQW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BienstockDT21,
  author       = {Alexander Bienstock and
                  Yevgeniy Dodis and
                  Yi Tang},
  title        = {Multicast Key Agreement, Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1570},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1570},
  timestamp    = {Fri, 10 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BienstockDT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/CorettiDMTV20,
  author       = {Sandro Coretti and
                  Yevgeniy Dodis and
                  Ueli Maurer and
                  Bj{\"{o}}rn Tackmann and
                  Daniele Venturi},
  title        = {Non-malleable Encryption: Simpler, Shorter, Stronger},
  journal      = {J. Cryptol.},
  volume       = {33},
  number       = {4},
  pages        = {1984--2033},
  year         = {2020},
  url          = {https://doi.org/10.1007/s00145-020-09361-0},
  doi          = {10.1007/S00145-020-09361-0},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/CorettiDMTV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AlwenCDT20,
  author       = {Jo{\"{e}}l Alwen and
                  Sandro Coretti and
                  Yevgeniy Dodis and
                  Yiannis Tselekounis},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {Security Analysis and Improvements for the {IETF} {MLS} Standard for
                  Group Messaging},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12170},
  pages        = {248--277},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56784-2\_9},
  doi          = {10.1007/978-3-030-56784-2\_9},
  timestamp    = {Wed, 12 Aug 2020 14:16:56 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AlwenCDT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/DodisVW20,
  author       = {Yevgeniy Dodis and
                  Vinod Vaikuntanathan and
                  Daniel Wichs},
  editor       = {Anne Canteaut and
                  Yuval Ishai},
  title        = {Extracting Randomness from Extractor-Dependent Sources},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12105},
  pages        = {313--342},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-45721-1\_12},
  doi          = {10.1007/978-3-030-45721-1\_12},
  timestamp    = {Mon, 04 May 2020 14:27:11 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/DodisVW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BienstockDR20,
  author       = {Alexander Bienstock and
                  Yevgeniy Dodis and
                  Paul R{\"{o}}sler},
  editor       = {Rafael Pass and
                  Krzysztof Pietrzak},
  title        = {On the Price of Concurrency in Group Ratcheting Protocols},
  booktitle    = {Theory of Cryptography - 18th International Conference, {TCC} 2020,
                  Durham, NC, USA, November 16-19, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12551},
  pages        = {198--228},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64378-2\_8},
  doi          = {10.1007/978-3-030-64378-2\_8},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/BienstockDR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/DodisFMT20,
  author       = {Yevgeniy Dodis and
                  Pooya Farshim and
                  Sogol Mazaheri and
                  Stefano Tessaro},
  editor       = {Rafael Pass and
                  Krzysztof Pietrzak},
  title        = {Towards Defeating Backdoored Random Oracles: Indifferentiability with
                  Bounded Adaptivity},
  booktitle    = {Theory of Cryptography - 18th International Conference, {TCC} 2020,
                  Durham, NC, USA, November 16-19, 2020, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12552},
  pages        = {241--273},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64381-2\_9},
  doi          = {10.1007/978-3-030-64381-2\_9},
  timestamp    = {Tue, 15 Dec 2020 12:05:01 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/DodisFMT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BienstockDR20,
  author       = {Alexander Bienstock and
                  Yevgeniy Dodis and
                  Paul R{\"{o}}sler},
  title        = {On the Price of Concurrency in Group Ratcheting Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1171},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1171},
  timestamp    = {Wed, 30 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BienstockDR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DodisFMT20,
  author       = {Yevgeniy Dodis and
                  Pooya Farshim and
                  Sogol Mazaheri and
                  Stefano Tessaro},
  title        = {Towards Defeating Backdoored Random Oracles: Indifferentiability with
                  Bounded Adaptivity},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1199},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1199},
  timestamp    = {Fri, 30 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/DodisFMT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CorettiDKT19,
  author       = {Sandro Coretti and
                  Yevgeniy Dodis and
                  Harish Karthikeyan and
                  Stefano Tessaro},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {Seedless Fruit Is the Sweetest: Random Number Generation, Revisited},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11692},
  pages        = {205--234},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26948-7\_8},
  doi          = {10.1007/978-3-030-26948-7\_8},
  timestamp    = {Fri, 09 Aug 2019 14:20:22 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CorettiDKT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ChaseDIKLOV19,
  author       = {Melissa Chase and
                  Yevgeniy Dodis and
                  Yuval Ishai and
                  Daniel Kraschewski and
                  Tianren Liu and
                  Rafail Ostrovsky and
                  Vinod Vaikuntanathan},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {Reusable Non-Interactive Secure Computation},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11694},
  pages        = {462--488},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26954-8\_15},
  doi          = {10.1007/978-3-030-26954-8\_15},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/ChaseDIKLOV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/AlwenCD19,
  author       = {Jo{\"{e}}l Alwen and
                  Sandro Coretti and
                  Yevgeniy Dodis},
  editor       = {Yuval Ishai and
                  Vincent Rijmen},
  title        = {The Double Ratchet: Security Notions, Proofs, and Modularization for
                  the Signal Protocol},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11476},
  pages        = {129--158},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-17653-2\_5},
  doi          = {10.1007/978-3-030-17653-2\_5},
  timestamp    = {Tue, 14 May 2019 13:47:56 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/AlwenCD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DodisGRW19,
  author       = {Yevgeniy Dodis and
                  Paul Grubbs and
                  Thomas Ristenpart and
                  Joanne Woodage},
  title        = {Fast Message Franking: From Invisible Salamanders to Encryptment},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {16},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/016},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DodisGRW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CorettiDKT19,
  author       = {Sandro Coretti and
                  Yevgeniy Dodis and
                  Harish Karthikeyan and
                  Stefano Tessaro},
  title        = {Seedless Fruit is the Sweetest: Random Number Generation, Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {198},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/198},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CorettiDKT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlwenCDT19,
  author       = {Jo{\"{e}}l Alwen and
                  Sandro Coretti and
                  Yevgeniy Dodis and
                  Yiannis Tselekounis},
  title        = {Security Analysis and Improvements for the {IETF} {MLS} Standard for
                  Group Messaging},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1189},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1189},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlwenCDT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DodisVW19,
  author       = {Yevgeniy Dodis and
                  Vinod Vaikuntanathan and
                  Daniel Wichs},
  title        = {Extracting Randomness from Extractor-Dependent Sources},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1339},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1339},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DodisVW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamcomp/AggarwalDL18,
  author       = {Divesh Aggarwal and
                  Yevgeniy Dodis and
                  Shachar Lovett},
  title        = {Non-Malleable Codes from Additive Combinatorics},
  journal      = {{SIAM} J. Comput.},
  volume       = {47},
  number       = {2},
  pages        = {524--546},
  year         = {2018},
  url          = {https://doi.org/10.1137/140985251},
  doi          = {10.1137/140985251},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/siamcomp/AggarwalDL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DodisGRW18,
  author       = {Yevgeniy Dodis and
                  Paul Grubbs and
                  Thomas Ristenpart and
                  Joanne Woodage},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {Fast Message Franking: From Invisible Salamanders to Encryptment},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10991},
  pages        = {155--186},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96884-1\_6},
  doi          = {10.1007/978-3-319-96884-1\_6},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DodisGRW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CorettiDG18,
  author       = {Sandro Coretti and
                  Yevgeniy Dodis and
                  Siyao Guo},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {Non-Uniform Bounds in the Random-Permutation, Ideal-Cipher, and Generic-Group
                  Models},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10991},
  pages        = {693--721},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96884-1\_23},
  doi          = {10.1007/978-3-319-96884-1\_23},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CorettiDG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CogliatiDKLSTZ18,
  author       = {Beno{\^{\i}}t Cogliati and
                  Yevgeniy Dodis and
                  Jonathan Katz and
                  Jooyoung Lee and
                  John P. Steinberger and
                  Aishwarya Thiruvengadam and
                  Zhe Zhang},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {Provable Security of (Tweakable) Block Ciphers Based on Substitution-Permutation
                  Networks},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10991},
  pages        = {722--753},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96884-1\_24},
  doi          = {10.1007/978-3-319-96884-1\_24},
  timestamp    = {Mon, 06 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/CogliatiDKLSTZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CorettiDGS18,
  author       = {Sandro Coretti and
                  Yevgeniy Dodis and
                  Siyao Guo and
                  John P. Steinberger},
  editor       = {Jesper Buus Nielsen and
                  Vincent Rijmen},
  title        = {Random Oracles and Non-uniformity},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10820},
  pages        = {227--258},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-78381-9\_9},
  doi          = {10.1007/978-3-319-78381-9\_9},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/CorettiDGS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CorettiDG18,
  author       = {Sandro Coretti and
                  Yevgeniy Dodis and
                  Siyao Guo},
  title        = {Non-Uniform Bounds in the Random-Permutation, Ideal-Cipher, and Generic-Group
                  Models},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {226},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/226},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CorettiDG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChaseDIKLOV18,
  author       = {Melissa Chase and
                  Yevgeniy Dodis and
                  Yuval Ishai and
                  Daniel Kraschewski and
                  Tianren Liu and
                  Rafail Ostrovsky and
                  Vinod Vaikuntanathan},
  title        = {Reusable Non-Interactive Secure Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {940},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/940},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChaseDIKLOV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlwenCD18,
  author       = {Jo{\"{e}}l Alwen and
                  Sandro Coretti and
                  Yevgeniy Dodis},
  title        = {The Double Ratchet: Security Notions, Proofs, and Modularization for
                  the Signal Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1037},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1037},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlwenCD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/algorithmica/DodisSSW17,
  author       = {Yevgeniy Dodis and
                  Adi Shamir and
                  Noah Stephens{-}Davidowitz and
                  Daniel Wichs},
  title        = {How to Eat Your Entropy and Have it Too: Optimal Recovery Strategies
                  for Compromised RNGs},
  journal      = {Algorithmica},
  volume       = {79},
  number       = {4},
  pages        = {1196--1232},
  year         = {2017},
  url          = {https://doi.org/10.1007/s00453-016-0239-3},
  doi          = {10.1007/S00453-016-0239-3},
  timestamp    = {Mon, 09 Oct 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/algorithmica/DodisSSW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ciss/Dodis17,
  author       = {Yevgeniy Dodis},
  title        = {Basing cryptography on biometrics and other noisy data},
  booktitle    = {51st Annual Conference on Information Sciences and Systems, {CISS}
                  2017, Baltimore, MD, USA, March 22-24, 2017},
  pages        = {1},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CISS.2017.7926183},
  doi          = {10.1109/CISS.2017.7926183},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/ciss/Dodis17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/WoodageCDJR17,
  author       = {Joanne Woodage and
                  Rahul Chatterjee and
                  Yevgeniy Dodis and
                  Ari Juels and
                  Thomas Ristenpart},
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {A New Distribution-Sensitive Secure Sketch and Popularity-Proportional
                  Hashing},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10403},
  pages        = {682--710},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63697-9\_23},
  doi          = {10.1007/978-3-319-63697-9\_23},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/WoodageCDJR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/DodisGK17,
  author       = {Yevgeniy Dodis and
                  Siyao Guo and
                  Jonathan Katz},
  editor       = {Jean{-}S{\'{e}}bastien Coron and
                  Jesper Buus Nielsen},
  title        = {Fixing Cracks in the Concrete: Random Oracles with Auxiliary Input,
                  Revisited},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Paris, France, April 30 - May 4, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10211},
  pages        = {473--495},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-56614-6\_16},
  doi          = {10.1007/978-3-319-56614-6\_16},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/DodisGK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/DodisF17,
  author       = {Yevgeniy Dodis and
                  Dario Fiore},
  editor       = {Aggelos Kiayias},
  title        = {Unilaterally-Authenticated Key Exchange},
  booktitle    = {Financial Cryptography and Data Security - 21st International Conference,
                  {FC} 2017, Sliema, Malta, April 3-7, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10322},
  pages        = {542--560},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70972-7\_31},
  doi          = {10.1007/978-3-319-70972-7\_31},
  timestamp    = {Thu, 06 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/DodisF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DodisKSTZ17,
  author       = {Yevgeniy Dodis and
                  Jonathan Katz and
                  John P. Steinberger and
                  Aishwarya Thiruvengadam and
                  Zhe Zhang},
  title        = {Provable Security of Substitution-Permutation Networks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {16},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/016},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DodisKSTZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DodisF17,
  author       = {Yevgeniy Dodis and
                  Dario Fiore},
  title        = {Unilaterally-Authenticated Key Exchange},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {109},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/109},
  timestamp    = {Thu, 06 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DodisF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WoodageCDJR17,
  author       = {Joanne Woodage and
                  Rahul Chatterjee and
                  Yevgeniy Dodis and
                  Ari Juels and
                  Thomas Ristenpart},
  title        = {A New Distribution Sensitive Secure Sketch and a Comparison Between
                  Approaches to Typo-Tolerant Authentication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {542},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/542},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WoodageCDJR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CorettiDGS17,
  author       = {Sandro Coretti and
                  Yevgeniy Dodis and
                  Siyao Guo and
                  John P. Steinberger},
  title        = {Random Oracles and Non-Uniformity},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {937},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/937},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CorettiDGS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DodisHRW16,
  author       = {Yevgeniy Dodis and
                  Shai Halevi and
                  Ron D. Rothblum and
                  Daniel Wichs},
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {Spooky Encryption and Its Applications},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9816},
  pages        = {93--122},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53015-3\_4},
  doi          = {10.1007/978-3-662-53015-3\_4},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DodisHRW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DodisMS16,
  author       = {Yevgeniy Dodis and
                  Ilya Mironov and
                  Noah Stephens{-}Davidowitz},
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {Message Transmission with Reverse Firewalls - Secure Communication
                  on Corrupted Machines},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9814},
  pages        = {341--372},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53018-4\_13},
  doi          = {10.1007/978-3-662-53018-4\_13},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DodisMS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/DodisSSL16,
  author       = {Yevgeniy Dodis and
                  Martijn Stam and
                  John P. Steinberger and
                  Tianren Liu},
  editor       = {Marc Fischlin and
                  Jean{-}S{\'{e}}bastien Coron},
  title        = {Indifferentiability of Confusion-Diffusion Networks},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Vienna, Austria, May 8-12, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9666},
  pages        = {679--704},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49896-5\_24},
  doi          = {10.1007/978-3-662-49896-5\_24},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/DodisSSL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/CorettiDTV16,
  author       = {Sandro Coretti and
                  Yevgeniy Dodis and
                  Bj{\"{o}}rn Tackmann and
                  Daniele Venturi},
  editor       = {Eyal Kushilevitz and
                  Tal Malkin},
  title        = {Non-Malleable Encryption: Simpler, Shorter, Stronger},
  booktitle    = {Theory of Cryptography - 13th International Conference, {TCC} 2016-A,
                  Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9562},
  pages        = {306--335},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49096-9\_13},
  doi          = {10.1007/978-3-662-49096-9\_13},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/CorettiDTV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BishopD16,
  author       = {Allison Bishop and
                  Yevgeniy Dodis},
  editor       = {Eyal Kushilevitz and
                  Tal Malkin},
  title        = {Interactive Coding for Interactive Proofs},
  booktitle    = {Theory of Cryptography - 13th International Conference, {TCC} 2016-A,
                  Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9563},
  pages        = {352--366},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49099-0\_13},
  doi          = {10.1007/978-3-662-49099-0\_13},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/BishopD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DodisHRW16,
  author       = {Yevgeniy Dodis and
                  Shai Halevi and
                  Ron D. Rothblum and
                  Daniel Wichs},
  title        = {Spooky Encryption and its Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {272},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/272},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DodisHRW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DodisGGJR16,
  author       = {Yevgeniy Dodis and
                  Chaya Ganesh and
                  Alexander Golovnev and
                  Ari Juels and
                  Thomas Ristenpart},
  title        = {A Formal Treatment of Backdoored Pseudorandom Generators},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {306},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/306},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DodisGGJR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DodisY15,
  author       = {Yevgeniy Dodis and
                  Yanqing Yao},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {Privacy with Imperfect Randomness},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9216},
  pages        = {463--482},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48000-7\_23},
  doi          = {10.1007/978-3-662-48000-7\_23},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DodisY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/DodisGGJR15,
  author       = {Yevgeniy Dodis and
                  Chaya Ganesh and
                  Alexander Golovnev and
                  Ari Juels and
                  Thomas Ristenpart},
  editor       = {Elisabeth Oswald and
                  Marc Fischlin},
  title        = {A Formal Treatment of Backdoored Pseudorandom Generators},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9056},
  pages        = {101--126},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46800-5\_5},
  doi          = {10.1007/978-3-662-46800-5\_5},
  timestamp    = {Thu, 14 Oct 2021 09:58:16 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/DodisGGJR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/AggarwalDKO15,
  author       = {Divesh Aggarwal and
                  Yevgeniy Dodis and
                  Tomasz Kazana and
                  Maciej Obremski},
  editor       = {Rocco A. Servedio and
                  Ronitt Rubinfeld},
  title        = {Non-malleable Reductions and Applications},
  booktitle    = {Proceedings of the Forty-Seventh Annual {ACM} on Symposium on Theory
                  of Computing, {STOC} 2015, Portland, OR, USA, June 14-17, 2015},
  pages        = {459--468},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2746539.2746544},
  doi          = {10.1145/2746539.2746544},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/AggarwalDKO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/tcc/2015-1,
  editor       = {Yevgeniy Dodis and
                  Jesper Buus Nielsen},
  title        = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC}
                  2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9014},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46494-6},
  doi          = {10.1007/978-3-662-46494-6},
  isbn         = {978-3-662-46493-9},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/2015-1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/tcc/2015-2,
  editor       = {Yevgeniy Dodis and
                  Jesper Buus Nielsen},
  title        = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC}
                  2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9015},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46497-7},
  doi          = {10.1007/978-3-662-46497-7},
  isbn         = {978-3-662-46496-0},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/2015-2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DodisMS15,
  author       = {Yevgeniy Dodis and
                  Ilya Mironov and
                  Noah Stephens{-}Davidowitz},
  title        = {Message Transmission with Reverse Firewalls - Secure Communication
                  on Corrupted Machines},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {548},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/548},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DodisMS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DodisLSS15,
  author       = {Yevgeniy Dodis and
                  Tianren Liu and
                  Martijn Stam and
                  John P. Steinberger},
  title        = {Indifferentiability of Confusion-Diffusion Networks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {680},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/680},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DodisLSS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CorettiDTV15,
  author       = {Sandro Coretti and
                  Yevgeniy Dodis and
                  Bj{\"{o}}rn Tackmann and
                  Daniele Venturi},
  title        = {Non-Malleable Encryption: Simpler, Shorter, Stronger},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {772},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/772},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CorettiDTV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamcomp/DodisLWZ14,
  author       = {Yevgeniy Dodis and
                  Xin Li and
                  Trevor D. Wooley and
                  David Zuckerman},
  title        = {Privacy Amplification and Nonmalleable Extractors Via Character Sums},
  journal      = {{SIAM} J. Comput.},
  volume       = {43},
  number       = {2},
  pages        = {800--830},
  year         = {2014},
  url          = {https://doi.org/10.1137/120868414},
  doi          = {10.1137/120868414},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/siamcomp/DodisLWZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DodisSSW14,
  author       = {Yevgeniy Dodis and
                  Adi Shamir and
                  Noah Stephens{-}Davidowitz and
                  Daniel Wichs},
  editor       = {Juan A. Garay and
                  Rosario Gennaro},
  title        = {How to Eat Your Entropy and Have It Too - Optimal Recovery Strategies
                  for Compromised RNGs},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8617},
  pages        = {37--54},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44381-1\_3},
  doi          = {10.1007/978-3-662-44381-1\_3},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DodisSSW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AggarwalDJMR14,
  author       = {Divesh Aggarwal and
                  Yevgeniy Dodis and
                  Zahra Jafargholi and
                  Eric Miles and
                  Leonid Reyzin},
  editor       = {Juan A. Garay and
                  Rosario Gennaro},
  title        = {Amplifying Privacy in Privacy Amplification},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8617},
  pages        = {183--198},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44381-1\_11},
  doi          = {10.1007/978-3-662-44381-1\_11},
  timestamp    = {Wed, 03 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AggarwalDJMR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/DodisPW14,
  author       = {Yevgeniy Dodis and
                  Krzysztof Pietrzak and
                  Daniel Wichs},
  editor       = {Phong Q. Nguyen and
                  Elisabeth Oswald},
  title        = {Key Derivation without Entropy Waste},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Copenhagen, Denmark, May 11-15, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8441},
  pages        = {93--110},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-55220-5\_6},
  doi          = {10.1007/978-3-642-55220-5\_6},
  timestamp    = {Thu, 14 Oct 2021 09:58:16 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/DodisPW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/DodisF14,
  author       = {Yevgeniy Dodis and
                  Dario Fiore},
  editor       = {Michel Abdalla and
                  Roberto De Prisco},
  title        = {Interactive Encryption and Message Authentication},
  booktitle    = {Security and Cryptography for Networks - 9th International Conference,
                  {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8642},
  pages        = {494--513},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10879-7\_28},
  doi          = {10.1007/978-3-319-10879-7\_28},
  timestamp    = {Thu, 23 Jun 2022 19:58:57 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/DodisF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/AggarwalDL14,
  author       = {Divesh Aggarwal and
                  Yevgeniy Dodis and
                  Shachar Lovett},
  editor       = {David B. Shmoys},
  title        = {Non-malleable codes from additive combinatorics},
  booktitle    = {Symposium on Theory of Computing, {STOC} 2014, New York, NY, USA,
                  May 31 - June 03, 2014},
  pages        = {774--783},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2591796.2591804},
  doi          = {10.1145/2591796.2591804},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/AggarwalDL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/AggarwalDKO14,
  author       = {Divesh Aggarwal and
                  Yevgeniy Dodis and
                  Tomasz Kazana and
                  Maciej Obremski},
  title        = {Non-malleable Reductions and Applications},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR14-128}},
  year         = {2014},
  url          = {https://eccc.weizmann.ac.il/report/2014/128},
  eprinttype    = {ECCC},
  eprint       = {TR14-128},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/AggarwalDKO14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DodisSSW14,
  author       = {Yevgeniy Dodis and
                  Adi Shamir and
                  Noah Stephens{-}Davidowitz and
                  Daniel Wichs},
  title        = {How to Eat Your Entropy and Have it Too - Optimal Recovery Strategies
                  for Compromised RNGs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {167},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/167},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DodisSSW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DodisY14,
  author       = {Yevgeniy Dodis and
                  Yanqing Yao},
  title        = {Privacy and Imperfect Randomness},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {623},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/623},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DodisY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AggarwalDKO14a,
  author       = {Divesh Aggarwal and
                  Yevgeniy Dodis and
                  Tomasz Kazana and
                  Maciej Obremski},
  title        = {Non-malleable Reductions and Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {821},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/821},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AggarwalDKO14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DodisL14,
  author       = {Yevgeniy Dodis and
                  Allison Bishop Lewko},
  title        = {Interactive Coding for Interactive Proofs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {827},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/827},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DodisL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/AgrawalDVW13,
  author       = {Shweta Agrawal and
                  Yevgeniy Dodis and
                  Vinod Vaikuntanathan and
                  Daniel Wichs},
  editor       = {Kazue Sako and
                  Palash Sarkar},
  title        = {On Continual Leakage of Discrete Log Representations},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2013 - 19th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Bengaluru, India, December 1-5, 2013, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8270},
  pages        = {401--420},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-42045-0\_21},
  doi          = {10.1007/978-3-642-42045-0\_21},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/AgrawalDVW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DodisPRVW13,
  author       = {Yevgeniy Dodis and
                  David Pointcheval and
                  Sylvain Ruhault and
                  Damien Vergnaud and
                  Daniel Wichs},
  editor       = {Ahmad{-}Reza Sadeghi and
                  Virgil D. Gligor and
                  Moti Yung},
  title        = {Security analysis of pseudo-random number generators with input: /dev/random
                  is not robust},
  booktitle    = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security,
                  CCS'13, Berlin, Germany, November 4-8, 2013},
  pages        = {647--658},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2508859.2516653},
  doi          = {10.1145/2508859.2516653},
  timestamp    = {Tue, 10 Nov 2020 19:58:06 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/DodisPRVW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AndreevaBDMS13,
  author       = {Elena Andreeva and
                  Andrey Bogdanov and
                  Yevgeniy Dodis and
                  Bart Mennink and
                  John P. Steinberger},
  editor       = {Ran Canetti and
                  Juan A. Garay},
  title        = {On the Indifferentiability of Key-Alternating Ciphers},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8042},
  pages        = {531--550},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40041-4\_29},
  doi          = {10.1007/978-3-642-40041-4\_29},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AndreevaBDMS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/DodisY13,
  author       = {Yevgeniy Dodis and
                  Yu Yu},
  editor       = {Amit Sahai},
  title        = {Overcoming Weak Expectations},
  booktitle    = {Theory of Cryptography - 10th Theory of Cryptography Conference, {TCC}
                  2013, Tokyo, Japan, March 3-6, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7785},
  pages        = {1--22},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36594-2\_1},
  doi          = {10.1007/978-3-642-36594-2\_1},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/DodisY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/AggarwalDL13,
  author       = {Divesh Aggarwal and
                  Yevgeniy Dodis and
                  Shachar Lovett},
  title        = {Non-malleable Codes from Additive Combinatorics},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR13-081}},
  year         = {2013},
  url          = {https://eccc.weizmann.ac.il/report/2013/081},
  eprinttype    = {ECCC},
  eprint       = {TR13-081},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/AggarwalDL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AndreevaBDMS13,
  author       = {Elena Andreeva and
                  Andrey Bogdanov and
                  Yevgeniy Dodis and
                  Bart Mennink and
                  John P. Steinberger},
  title        = {On the Indifferentiability of Key-Alternating Ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {61},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/061},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AndreevaBDMS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AggarwalDL13,
  author       = {Divesh Aggarwal and
                  Yevgeniy Dodis and
                  Shachar Lovett},
  title        = {Non-malleable Codes from Additive Combinatorics},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {201},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/201},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AggarwalDL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DodisPRVW13,
  author       = {Yevgeniy Dodis and
                  David Pointcheval and
                  Sylvain Ruhault and
                  Damien Vergnaud and
                  Daniel Wichs},
  title        = {Security Analysis of Pseudo-Random Number Generators with Input: /dev/random
                  is not Robust},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {338},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/338},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DodisPRVW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DodisRST13,
  author       = {Yevgeniy Dodis and
                  Thomas Ristenpart and
                  John P. Steinberger and
                  Stefano Tessaro},
  title        = {To Hash or Not to Hash Again? (In)differentiability Results for H\({}^{\mbox{2}}\)
                  and {HMAC}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {382},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/382},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DodisRST13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DodisPW13,
  author       = {Yevgeniy Dodis and
                  Krzysztof Pietrzak and
                  Daniel Wichs},
  title        = {Key Derivation Without Entropy Waste},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {708},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/708},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DodisPW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AggarwalDJMR13,
  author       = {Divesh Aggarwal and
                  Yevgeniy Dodis and
                  Zahra Jafargholi and
                  Eric Miles and
                  Leonid Reyzin},
  title        = {Amplifying Privacy in Privacy Amplification},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {723},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/723},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AggarwalDJMR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DodisF13,
  author       = {Yevgeniy Dodis and
                  Dario Fiore},
  title        = {Interactive Encryption, Message Authentication, and Anonymous Key
                  Exchange},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {817},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/817},
  timestamp    = {Thu, 06 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DodisF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/networks/ColeDR12,
  author       = {Richard Cole and
                  Yevgeniy Dodis and
                  Tim Roughgarden},
  title        = {Bottleneck links, variable demand, and the tragedy of the commons},
  journal      = {Networks},
  volume       = {60},
  number       = {3},
  pages        = {194--203},
  year         = {2012},
  url          = {https://doi.org/10.1002/net.21458},
  doi          = {10.1002/NET.21458},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/networks/ColeDR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/DodisKKRS12,
  author       = {Yevgeniy Dodis and
                  Bhavana Kanukurthi and
                  Jonathan Katz and
                  Leonid Reyzin and
                  Adam D. Smith},
  title        = {Robust Fuzzy Extractors and Authenticated Key Agreement From Close
                  Secrets},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {58},
  number       = {9},
  pages        = {6207--6222},
  year         = {2012},
  url          = {https://doi.org/10.1109/TIT.2012.2200290},
  doi          = {10.1109/TIT.2012.2200290},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/DodisKKRS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DodisLXY12,
  author       = {Yevgeniy Dodis and
                  Weiliang Luo and
                  Shouhuai Xu and
                  Moti Yung},
  editor       = {Heung Youl Youm and
                  Yoojae Won},
  title        = {Key-insulated symmetric key cryptography and mitigating attacks against
                  cryptographic cloud software},
  booktitle    = {7th {ACM} Symposium on Information, Compuer and Communications Security,
                  {ASIACCS} '12, Seoul, Korea, May 2-4, 2012},
  pages        = {57--58},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2414456.2414489},
  doi          = {10.1145/2414456.2414489},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/DodisLXY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DodisRST12,
  author       = {Yevgeniy Dodis and
                  Thomas Ristenpart and
                  John P. Steinberger and
                  Stefano Tessaro},
  editor       = {Reihaneh Safavi{-}Naini and
                  Ran Canetti},
  title        = {To Hash or Not to Hash Again? (In)Differentiability Results for {H}
                  2 and {HMAC}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 19-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7417},
  pages        = {348--366},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32009-5\_21},
  doi          = {10.1007/978-3-642-32009-5\_21},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DodisRST12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DodisLMV12,
  author       = {Yevgeniy Dodis and
                  Adriana L{\'{o}}pez{-}Alt and
                  Ilya Mironov and
                  Salil P. Vadhan},
  editor       = {Reihaneh Safavi{-}Naini and
                  Ran Canetti},
  title        = {Differential Privacy with Imperfect Randomness},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 19-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7417},
  pages        = {497--516},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32009-5\_29},
  doi          = {10.1007/978-3-642-32009-5\_29},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/DodisLMV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/DodisKPW12,
  author       = {Yevgeniy Dodis and
                  Eike Kiltz and
                  Krzysztof Pietrzak and
                  Daniel Wichs},
  editor       = {David Pointcheval and
                  Thomas Johansson},
  title        = {Message Authentication, Revisited},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2012 - 31st Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Cambridge, UK, April 15-19, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7237},
  pages        = {355--374},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29011-4\_22},
  doi          = {10.1007/978-3-642-29011-4\_22},
  timestamp    = {Sun, 12 Nov 2023 02:15:08 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/DodisKPW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/Dodis12,
  author       = {Yevgeniy Dodis},
  editor       = {Adam D. Smith},
  title        = {Shannon Impossibility, Revisited},
  booktitle    = {Information Theoretic Security - 6th International Conference, {ICITS}
                  2012, Montreal, QC, Canada, August 15-17, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7412},
  pages        = {100--110},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32284-6\_6},
  doi          = {10.1007/978-3-642-32284-6\_6},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/Dodis12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itw/DodisY12,
  author       = {Yevgeniy Dodis and
                  Yu Yu},
  title        = {Overcoming weak expectations},
  booktitle    = {2012 {IEEE} Information Theory Workshop, Lausanne, Switzerland, September
                  3-7, 2012},
  pages        = {109--113},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/ITW.2012.6404636},
  doi          = {10.1109/ITW.2012.6404636},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/itw/DodisY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/DodisHT12,
  author       = {Yevgeniy Dodis and
                  Iftach Haitner and
                  Aris Tentes},
  editor       = {Ronald Cramer},
  title        = {On the Instantiability of Hash-and-Sign {RSA} Signatures},
  booktitle    = {Theory of Cryptography - 9th Theory of Cryptography Conference, {TCC}
                  2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7194},
  pages        = {112--132},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-28914-9\_7},
  doi          = {10.1007/978-3-642-28914-9\_7},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/DodisHT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/DodisJMW12,
  author       = {Yevgeniy Dodis and
                  Abhishek Jain and
                  Tal Moran and
                  Daniel Wichs},
  editor       = {Ronald Cramer},
  title        = {Counterexamples to Hardness Amplification beyond Negligible},
  booktitle    = {Theory of Cryptography - 9th Theory of Cryptography Conference, {TCC}
                  2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7194},
  pages        = {476--493},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-28914-9\_27},
  doi          = {10.1007/978-3-642-28914-9\_27},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/DodisJMW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/DodisRV12,
  author       = {Yevgeniy Dodis and
                  Thomas Ristenpart and
                  Salil P. Vadhan},
  editor       = {Ronald Cramer},
  title        = {Randomness Condensers for Efficiently Samplable, Seed-Dependent Sources},
  booktitle    = {Theory of Cryptography - 9th Theory of Cryptography Conference, {TCC}
                  2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7194},
  pages        = {618--635},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-28914-9\_35},
  doi          = {10.1007/978-3-642-28914-9\_35},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/DodisRV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DodisJMW12,
  author       = {Yevgeniy Dodis and
                  Abhishek Jain and
                  Tal Moran and
                  Daniel Wichs},
  title        = {Counterexamples to Hardness Amplification Beyond Negligible},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {32},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/032},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DodisJMW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Dodis12,
  author       = {Yevgeniy Dodis},
  title        = {Beating Shannon requires {BOTH} efficient adversaries {AND} non-zero
                  advantage},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {53},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/053},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Dodis12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DodisKPW12,
  author       = {Yevgeniy Dodis and
                  Eike Kiltz and
                  Krzysztof Pietrzak and
                  Daniel Wichs},
  title        = {Message Authentication, Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {59},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/059},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DodisKPW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgrawalDVW12,
  author       = {Shweta Agrawal and
                  Yevgeniy Dodis and
                  Vinod Vaikuntanathan and
                  Daniel Wichs},
  title        = {On Continual Leakage of Discrete Log Representations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {367},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/367},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AgrawalDVW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DodisLMV12,
  author       = {Yevgeniy Dodis and
                  Adriana L{\'{o}}pez{-}Alt and
                  Ilya Mironov and
                  Salil P. Vadhan},
  title        = {Differential Privacy with Imperfect Randomness},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {435},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/435},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DodisLMV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BarakDKPPSY11,
  author       = {Boaz Barak and
                  Yevgeniy Dodis and
                  Hugo Krawczyk and
                  Olivier Pereira and
                  Krzysztof Pietrzak and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Yu Yu},
  editor       = {Phillip Rogaway},
  title        = {Leftover Hash Lemma, Revisited},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2011 - 31st Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 14-18, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6841},
  pages        = {1--20},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22792-9\_1},
  doi          = {10.1007/978-3-642-22792-9\_1},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BarakDKPPSY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/DodisS11,
  author       = {Yevgeniy Dodis and
                  John P. Steinberger},
  editor       = {Kenneth G. Paterson},
  title        = {Domain Extension for MACs Beyond the Birthday Barrier},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Tallinn, Estonia, May 15-19, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6632},
  pages        = {323--342},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-20465-4\_19},
  doi          = {10.1007/978-3-642-20465-4\_19},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/DodisS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/DodisLWZ11,
  author       = {Yevgeniy Dodis and
                  Xin Li and
                  Trevor D. Wooley and
                  David Zuckerman},
  editor       = {Rafail Ostrovsky},
  title        = {Privacy Amplification and Non-malleable Extractors via Character Sums},
  booktitle    = {{IEEE} 52nd Annual Symposium on Foundations of Computer Science, {FOCS}
                  2011, Palm Springs, CA, USA, October 22-25, 2011},
  pages        = {668--677},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/FOCS.2011.67},
  doi          = {10.1109/FOCS.2011.67},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/focs/DodisLWZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/DodisLWW11,
  author       = {Yevgeniy Dodis and
                  Allison B. Lewko and
                  Brent Waters and
                  Daniel Wichs},
  editor       = {Rafail Ostrovsky},
  title        = {Storing Secrets on Continually Leaky Devices},
  booktitle    = {{IEEE} 52nd Annual Symposium on Foundations of Computer Science, {FOCS}
                  2011, Palm Springs, CA, USA, October 22-25, 2011},
  pages        = {688--697},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/FOCS.2011.35},
  doi          = {10.1109/FOCS.2011.35},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/DodisLWW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Dodis11,
  author       = {Yevgeniy Dodis},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Signcryption},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {1210--1215},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_156},
  doi          = {10.1007/978-1-4419-5906-5\_156},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Dodis11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DodisHT11,
  author       = {Yevgeniy Dodis and
                  Iftach Haitner and
                  Aris Tentes},
  title        = {On the (In)Security of {RSA} Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {87},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/087},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DodisHT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BarakDKPPSY11,
  author       = {Boaz Barak and
                  Yevgeniy Dodis and
                  Hugo Krawczyk and
                  Olivier Pereira and
                  Krzysztof Pietrzak and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Yu Yu},
  title        = {Leftover Hash Lemma, Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {88},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/088},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BarakDKPPSY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DodisLWW11,
  author       = {Yevgeniy Dodis and
                  Allison B. Lewko and
                  Brent Waters and
                  Daniel Wichs},
  title        = {Storing Secrets on Continually Leaky Devices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {369},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/369},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DodisLWW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/DodisHLW10,
  author       = {Yevgeniy Dodis and
                  Kristiyan Haralambiev and
                  Adriana L{\'{o}}pez{-}Alt and
                  Daniel Wichs},
  editor       = {Masayuki Abe},
  title        = {Efficient Public-Key Cryptography in the Presence of Key Leakage},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2010 - 16th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Singapore, December 5-9, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6477},
  pages        = {613--631},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17373-8\_35},
  doi          = {10.1007/978-3-642-17373-8\_35},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/DodisHLW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ChowDRW10,
  author       = {Sherman S. M. Chow and
                  Yevgeniy Dodis and
                  Yannis Rouselakis and
                  Brent Waters},
  editor       = {Ehab Al{-}Shaer and
                  Angelos D. Keromytis and
                  Vitaly Shmatikov},
  title        = {Practical leakage-resilient identity-based encryption from simple
                  assumptions},
  booktitle    = {Proceedings of the 17th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2010, Chicago, Illinois, USA, October 4-8, 2010},
  pages        = {152--161},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1866307.1866325},
  doi          = {10.1145/1866307.1866325},
  timestamp    = {Tue, 10 Nov 2020 20:00:21 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ChowDRW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DodisP10,
  author       = {Yevgeniy Dodis and
                  Krzysztof Pietrzak},
  editor       = {Tal Rabin},
  title        = {Leakage-Resilient Pseudorandom Functions and Side-Channel Attacks
                  on Feistel Networks},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 15-19, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6223},
  pages        = {21--40},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14623-7\_2},
  doi          = {10.1007/978-3-642-14623-7\_2},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DodisP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/AlwenDNSWW10,
  author       = {Jo{\"{e}}l Alwen and
                  Yevgeniy Dodis and
                  Moni Naor and
                  Gil Segev and
                  Shabsi Walfish and
                  Daniel Wichs},
  editor       = {Henri Gilbert},
  title        = {Public-Key Encryption in the Bounded-Retrieval Model},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2010, 29th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Monaco / French Riviera, May 30 - June 3, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6110},
  pages        = {113--134},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13190-5\_6},
  doi          = {10.1007/978-3-642-13190-5\_6},
  timestamp    = {Sun, 16 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/AlwenDNSWW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/DodisHLW10,
  author       = {Yevgeniy Dodis and
                  Kristiyan Haralambiev and
                  Adriana L{\'{o}}pez{-}Alt and
                  Daniel Wichs},
  title        = {Cryptography against Continuous Memory Attacks},
  booktitle    = {51th Annual {IEEE} Symposium on Foundations of Computer Science, {FOCS}
                  2010, October 23-26, 2010, Las Vegas, Nevada, {USA}},
  pages        = {511--520},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/FOCS.2010.56},
  doi          = {10.1109/FOCS.2010.56},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/DodisHLW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/DodisPT10,
  author       = {Yevgeniy Dodis and
                  Mihai P{u{a}}tra{c{s}}cu and
                  Mikkel Thorup},
  editor       = {Leonard J. Schulman},
  title        = {Changing base without losing space},
  booktitle    = {Proceedings of the 42nd {ACM} Symposium on Theory of Computing, {STOC}
                  2010, Cambridge, Massachusetts, USA, 5-8 June 2010},
  pages        = {593--602},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1806689.1806771},
  doi          = {10.1145/1806689.1806771},
  timestamp    = {Mon, 26 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/DodisPT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/CoronDMS10,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Yevgeniy Dodis and
                  Avradip Mandal and
                  Yannick Seurin},
  editor       = {Daniele Micciancio},
  title        = {A Domain Extender for the Ideal Cipher},
  booktitle    = {Theory of Cryptography, 7th Theory of Cryptography Conference, {TCC}
                  2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5978},
  pages        = {273--289},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-11799-2\_17},
  doi          = {10.1007/978-3-642-11799-2\_17},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/CoronDMS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/DodisGKPV10,
  author       = {Yevgeniy Dodis and
                  Shafi Goldwasser and
                  Yael Tauman Kalai and
                  Chris Peikert and
                  Vinod Vaikuntanathan},
  editor       = {Daniele Micciancio},
  title        = {Public-Key Encryption Schemes with Auxiliary Inputs},
  booktitle    = {Theory of Cryptography, 7th Theory of Cryptography Conference, {TCC}
                  2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5978},
  pages        = {361--381},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-11799-2\_22},
  doi          = {10.1007/978-3-642-11799-2\_22},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/DodisGKPV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/Dodis10,
  author       = {Yevgeniy Dodis},
  editor       = {Alexander W. Dent and
                  Yuliang Zheng},
  title        = {Concealment and Its Applications to Authenticated Encryption},
  booktitle    = {Practical Signcryption},
  series       = {Information Security and Cryptography},
  pages        = {149--173},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-540-89411-7\_8},
  doi          = {10.1007/978-3-540-89411-7\_8},
  timestamp    = {Tue, 30 Nov 2021 15:21:24 +0100},
  biburl       = {https://dblp.org/rec/series/isc/Dodis10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DodisHLW10,
  author       = {Yevgeniy Dodis and
                  Kristiyan Haralambiev and
                  Adriana L{\'{o}}pez{-}Alt and
                  Daniel Wichs},
  title        = {Efficient Public-Key Cryptography in the Presence of Key Leakage},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {154},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/154},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DodisHLW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DodisHLW10a,
  author       = {Yevgeniy Dodis and
                  Kristiyan Haralambiev and
                  Adriana L{\'{o}}pez{-}Alt and
                  Daniel Wichs},
  title        = {Cryptography Against Continuous Memory Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {196},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/196},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DodisHLW10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DodisKKRS10,
  author       = {Yevgeniy Dodis and
                  Bhavana Kanukurthi and
                  Jonathan Katz and
                  Leonid Reyzin and
                  Adam D. Smith},
  title        = {Robust Fuzzy Extractors and Authenticated Key Agreement from Close
                  Secrets},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {456},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/456},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DodisKKRS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AlwenDW09,
  author       = {Jo{\"{e}}l Alwen and
                  Yevgeniy Dodis and
                  Daniel Wichs},
  editor       = {Shai Halevi},
  title        = {Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval
                  Model},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2009, 29th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5677},
  pages        = {36--54},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03356-8\_3},
  doi          = {10.1007/978-3-642-03356-8\_3},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AlwenDW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DodisS09,
  author       = {Yevgeniy Dodis and
                  John P. Steinberger},
  editor       = {Shai Halevi},
  title        = {Message Authentication Codes from Unpredictable Block Ciphers},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2009, 29th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5677},
  pages        = {267--285},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03356-8\_16},
  doi          = {10.1007/978-3-642-03356-8\_16},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DodisS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/DodisRS09,
  author       = {Yevgeniy Dodis and
                  Thomas Ristenpart and
                  Thomas Shrimpton},
  editor       = {Antoine Joux},
  title        = {Salvaging Merkle-Damg{\aa}rd for Practical Applications},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2009, 28th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Cologne, Germany, April 26-30, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5479},
  pages        = {371--388},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-01001-9\_22},
  doi          = {10.1007/978-3-642-01001-9\_22},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/DodisRS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/DodisRRS09,
  author       = {Yevgeniy Dodis and
                  Leonid Reyzin and
                  Ronald L. Rivest and
                  Emily Shen},
  editor       = {Orr Dunkelman},
  title        = {Indifferentiability of Permutation-Based Compression Functions and
                  Tree-Based Modes of Operation, with Applications to {MD6}},
  booktitle    = {Fast Software Encryption, 16th International Workshop, {FSE} 2009,
                  Leuven, Belgium, February 22-25, 2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5665},
  pages        = {104--121},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03317-9\_7},
  doi          = {10.1007/978-3-642-03317-9\_7},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/DodisRRS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/AlwenDW09,
  author       = {Jo{\"{e}}l Alwen and
                  Yevgeniy Dodis and
                  Daniel Wichs},
  editor       = {Kaoru Kurosawa},
  title        = {Survey: Leakage Resilience and the Bounded Retrieval Model},
  booktitle    = {Information Theoretic Security, 4th International Conference, {ICITS}
                  2009, Shizuoka, Japan, December 3-6, 2009. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5973},
  pages        = {1--18},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-14496-7\_1},
  doi          = {10.1007/978-3-642-14496-7\_1},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/AlwenDW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/DodisW09,
  author       = {Yevgeniy Dodis and
                  Daniel Wichs},
  editor       = {Michael Mitzenmacher},
  title        = {Non-malleable extractors and symmetric key cryptography from weak
                  secrets},
  booktitle    = {Proceedings of the 41st Annual {ACM} Symposium on Theory of Computing,
                  {STOC} 2009, Bethesda, MD, USA, May 31 - June 2, 2009},
  pages        = {601--610},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1536414.1536496},
  doi          = {10.1145/1536414.1536496},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/DodisW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/DodisKL09,
  author       = {Yevgeniy Dodis and
                  Yael Tauman Kalai and
                  Shachar Lovett},
  editor       = {Michael Mitzenmacher},
  title        = {On cryptography with auxiliary input},
  booktitle    = {Proceedings of the 41st Annual {ACM} Symposium on Theory of Computing,
                  {STOC} 2009, Bethesda, MD, USA, May 31 - June 2, 2009},
  pages        = {621--630},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1536414.1536498},
  doi          = {10.1145/1536414.1536498},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stoc/DodisKL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/DodisVW09,
  author       = {Yevgeniy Dodis and
                  Salil P. Vadhan and
                  Daniel Wichs},
  editor       = {Omer Reingold},
  title        = {Proofs of Retrievability via Hardness Amplification},
  booktitle    = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC}
                  2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5444},
  pages        = {109--127},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00457-5\_8},
  doi          = {10.1007/978-3-642-00457-5\_8},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/DodisVW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/DodisIJK09,
  author       = {Yevgeniy Dodis and
                  Russell Impagliazzo and
                  Ragesh Jaiswal and
                  Valentine Kabanets},
  editor       = {Omer Reingold},
  title        = {Security Amplification for InteractiveCryptographic Primitives},
  booktitle    = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC}
                  2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5444},
  pages        = {128--145},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00457-5\_9},
  doi          = {10.1007/978-3-642-00457-5\_9},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/DodisIJK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/DodisKSW09,
  author       = {Yevgeniy Dodis and
                  Jonathan Katz and
                  Adam D. Smith and
                  Shabsi Walfish},
  editor       = {Omer Reingold},
  title        = {Composability and On-Line Deniability of Authentication},
  booktitle    = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC}
                  2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5444},
  pages        = {146--162},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00457-5\_10},
  doi          = {10.1007/978-3-642-00457-5\_10},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/DodisKSW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ciss/YaoFDL09,
  author       = {Danfeng (Daphne) Yao and
                  Nelly Fazio and
                  Yevgeniy Dodis and
                  Anna Lysyanskaya},
  editor       = {Marc Joye and
                  Gregory Neven},
  title        = {Forward-Secure Hierarchical {IBE} with Applications to Broadcast Encryption},
  booktitle    = {Identity-Based Cryptography},
  series       = {Cryptology and Information Security Series},
  volume       = {2},
  pages        = {100--118},
  publisher    = {{IOS} Press},
  year         = {2009},
  url          = {https://doi.org/10.3233/978-1-58603-947-9-100},
  doi          = {10.3233/978-1-58603-947-9-100},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ciss/YaoFDL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DodisVW09,
  author       = {Yevgeniy Dodis and
                  Salil P. Vadhan and
                  Daniel Wichs},
  title        = {Proofs of Retrievability via Hardness Amplification},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {41},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/041},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DodisVW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlwenDW09,
  author       = {Jo{\"{e}}l Alwen and
                  Yevgeniy Dodis and
                  Daniel Wichs},
  title        = {Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval
                  Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {160},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/160},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlwenDW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DodisRS09,
  author       = {Yevgeniy Dodis and
                  Thomas Ristenpart and
                  Thomas Shrimpton},
  title        = {Salvaging Merkle-Damgard for Practical Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {177},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/177},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DodisRS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CoronDMS09,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Yevgeniy Dodis and
                  Avradip Mandal and
                  Yannick Seurin},
  title        = {A Domain Extender for the Ideal Cipher},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {356},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/356},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CoronDMS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlwenDNSWW09,
  author       = {Jo{\"{e}}l Alwen and
                  Yevgeniy Dodis and
                  Moni Naor and
                  Gil Segev and
                  Shabsi Walfish and
                  Daniel Wichs},
  title        = {Public-Key Encryption in the Bounded-Retrieval Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {512},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/512},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlwenDNSWW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jucs/DodisLY08,
  author       = {Yevgeniy Dodis and
                  Pil Joong Lee and
                  Dae Hyun Yum},
  title        = {Optimistic Fair Exchange in a Multi-user Setting},
  journal      = {J. Univers. Comput. Sci.},
  volume       = {14},
  number       = {3},
  pages        = {318--346},
  year         = {2008},
  url          = {https://doi.org/10.3217/jucs-014-03-0318},
  doi          = {10.3217/JUCS-014-03-0318},
  timestamp    = {Thu, 07 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jucs/DodisLY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamcomp/DodisORS08,
  author       = {Yevgeniy Dodis and
                  Rafail Ostrovsky and
                  Leonid Reyzin and
                  Adam D. Smith},
  title        = {Fuzzy Extractors: How to Generate Strong Keys from Biometrics and
                  Other Noisy Data},
  journal      = {{SIAM} J. Comput.},
  volume       = {38},
  number       = {1},
  pages        = {97--139},
  year         = {2008},
  url          = {https://doi.org/10.1137/060651380},
  doi          = {10.1137/060651380},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/siamcomp/DodisORS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/DodisP08,
  author       = {Yevgeniy Dodis and
                  Prashant Puniya},
  editor       = {Steven M. Bellovin and
                  Rosario Gennaro and
                  Angelos D. Keromytis and
                  Moti Yung},
  title        = {Getting the Best Out of Existing Hash Functions; or What if We Are
                  Stuck with SHA?},
  booktitle    = {Applied Cryptography and Network Security, 6th International Conference,
                  {ACNS} 2008, New York, NY, USA, June 3-6, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5037},
  pages        = {156--173},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68914-0\_10},
  doi          = {10.1007/978-3-540-68914-0\_10},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/DodisP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DodisSW08,
  author       = {Yevgeniy Dodis and
                  Victor Shoup and
                  Shabsi Walfish},
  editor       = {David A. Wagner},
  title        = {Efficient Constructions of Composable Commitments and Zero-Knowledge
                  Proofs},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2008, 28th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5157},
  pages        = {515--535},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85174-5\_29},
  doi          = {10.1007/978-3-540-85174-5\_29},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DodisSW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/DodisPP08,
  author       = {Yevgeniy Dodis and
                  Krzysztof Pietrzak and
                  Prashant Puniya},
  editor       = {Nigel P. Smart},
  title        = {A New Mode of Operation for Block Ciphers and Length-Preserving MACs},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2008, 27th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Istanbul, Turkey, April 13-17, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4965},
  pages        = {198--219},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78967-3\_12},
  doi          = {10.1007/978-3-540-78967-3\_12},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/DodisPP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CramerDFPW08,
  author       = {Ronald Cramer and
                  Yevgeniy Dodis and
                  Serge Fehr and
                  Carles Padr{\'{o}} and
                  Daniel Wichs},
  editor       = {Nigel P. Smart},
  title        = {Detection of Algebraic Manipulation with Applications to Robust Secret
                  Sharing and Fuzzy Extractors},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2008, 27th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Istanbul, Turkey, April 13-17, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4965},
  pages        = {471--488},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78967-3\_27},
  doi          = {10.1007/978-3-540-78967-3\_27},
  timestamp    = {Fri, 02 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/CramerDFPW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CramerDFPW08,
  author       = {Ronald Cramer and
                  Yevgeniy Dodis and
                  Serge Fehr and
                  Carles Padr{\'{o}} and
                  Daniel Wichs},
  title        = {Detection of Algebraic Manipulation with Applications to Robust Secret
                  Sharing and Fuzzy Extractors},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {30},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/030},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CramerDFPW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DodisW08,
  author       = {Yevgeniy Dodis and
                  Daniel Wichs},
  title        = {Non-Malleable Extractors and Symmetric Key Cryptography from Weak
                  Secrets},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {503},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/503},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DodisW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/DodisP07,
  author       = {Yevgeniy Dodis and
                  Prashant Puniya},
  editor       = {Moni Naor},
  title        = {Feistel Networks Made Public, and Applications},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2007, 26th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Barcelona, Spain, May 20-24, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4515},
  pages        = {534--554},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72540-4\_31},
  doi          = {10.1007/978-3-540-72540-4\_31},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/DodisP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/DodisP07,
  author       = {Yevgeniy Dodis and
                  Krzysztof Pietrzak},
  editor       = {Alex Biryukov},
  title        = {Improving the Security of MACs Via Randomized Message Preprocessing},
  booktitle    = {Fast Software Encryption, 14th International Workshop, {FSE} 2007,
                  Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4593},
  pages        = {414--433},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74619-5\_26},
  doi          = {10.1007/978-3-540-74619-5\_26},
  timestamp    = {Sun, 25 Oct 2020 23:06:50 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/DodisP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/DodisLY07,
  author       = {Yevgeniy Dodis and
                  Pil Joong Lee and
                  Dae Hyun Yum},
  editor       = {Tatsuaki Okamoto and
                  Xiaoyun Wang},
  title        = {Optimistic Fair Exchange in a Multi-user Setting},
  booktitle    = {Public Key Cryptography - {PKC} 2007, 10th International Conference
                  on Practice and Theory in Public-Key Cryptography, Beijing, China,
                  April 16-20, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4450},
  pages        = {118--133},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-71677-8\_9},
  doi          = {10.1007/978-3-540-71677-8\_9},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/DodisLY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BosleyD07,
  author       = {Carl Bosley and
                  Yevgeniy Dodis},
  editor       = {Salil P. Vadhan},
  title        = {Does Privacy Require True Randomness?},
  booktitle    = {Theory of Cryptography, 4th Theory of Cryptography Conference, {TCC}
                  2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4392},
  pages        = {1--20},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-70936-7\_1},
  doi          = {10.1007/978-3-540-70936-7\_1},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/BosleyD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/CanettiDPW07,
  author       = {Ran Canetti and
                  Yevgeniy Dodis and
                  Rafael Pass and
                  Shabsi Walfish},
  editor       = {Salil P. Vadhan},
  title        = {Universally Composable Security with Global Setup},
  booktitle    = {Theory of Cryptography, 4th Theory of Cryptography Conference, {TCC}
                  2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4392},
  pages        = {61--85},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-70936-7\_4},
  doi          = {10.1007/978-3-540-70936-7\_4},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/CanettiDPW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/CashDDLLW07,
  author       = {David Cash and
                  Yan Zong Ding and
                  Yevgeniy Dodis and
                  Wenke Lee and
                  Richard J. Lipton and
                  Shabsi Walfish},
  editor       = {Salil P. Vadhan},
  title        = {Intrusion-Resilient Key Exchange in the Bounded Retrieval Model},
  booktitle    = {Theory of Cryptography, 4th Theory of Cryptography Conference, {TCC}
                  2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4392},
  pages        = {479--498},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-70936-7\_26},
  doi          = {10.1007/978-3-540-70936-7\_26},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/CashDDLLW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DodisLY07,
  author       = {Yevgeniy Dodis and
                  Pil Joong Lee and
                  Dae Hyun Yum},
  title        = {Optimistic Fair Exchange in a Multi-user Setting},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {182},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/182},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DodisLY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcss/ColeDR06,
  author       = {Richard Cole and
                  Yevgeniy Dodis and
                  Tim Roughgarden},
  title        = {How much can taxes help selfish routing?},
  journal      = {J. Comput. Syst. Sci.},
  volume       = {72},
  number       = {3},
  pages        = {444--467},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.jcss.2005.09.010},
  doi          = {10.1016/J.JCSS.2005.09.010},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcss/ColeDR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DodisKRS06,
  author       = {Yevgeniy Dodis and
                  Jonathan Katz and
                  Leonid Reyzin and
                  Adam D. Smith},
  editor       = {Cynthia Dwork},
  title        = {Robust Fuzzy Extractors and Authenticated Key Agreement from Close
                  Secrets},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2006, 26th Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 20-24,
                  2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4117},
  pages        = {232--250},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11818175\_14},
  doi          = {10.1007/11818175\_14},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DodisKRS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/DodisR06,
  author       = {Yevgeniy Dodis and
                  Renato Renner},
  editor       = {Michele Bugliesi and
                  Bart Preneel and
                  Vladimiro Sassone and
                  Ingo Wegener},
  title        = {On the Impossibility of Extracting Classical Randomness Using a Quantum
                  Computer},
  booktitle    = {Automata, Languages and Programming, 33rd International Colloquium,
                  {ICALP} 2006, Venice, Italy, July 10-14, 2006, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4052},
  pages        = {204--215},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11787006\_18},
  doi          = {10.1007/11787006\_18},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/DodisR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soda/ColeDR06,
  author       = {Richard Cole and
                  Yevgeniy Dodis and
                  Tim Roughgarden},
  title        = {Bottleneck links, variable demand, and the tragedy of the commons},
  booktitle    = {Proceedings of the Seventeenth Annual {ACM-SIAM} Symposium on Discrete
                  Algorithms, {SODA} 2006, Miami, Florida, USA, January 22-26, 2006},
  pages        = {668--677},
  publisher    = {{ACM} Press},
  year         = {2006},
  url          = {http://dl.acm.org/citation.cfm?id=1109557.1109630},
  timestamp    = {Thu, 19 Mar 2015 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/soda/ColeDR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/CatalanoDV06,
  author       = {Dario Catalano and
                  Yevgeniy Dodis and
                  Ivan Visconti},
  editor       = {Shai Halevi and
                  Tal Rabin},
  title        = {Mercurial Commitments: Minimal Assumptions and Efficient Constructions},
  booktitle    = {Theory of Cryptography, Third Theory of Cryptography Conference, {TCC}
                  2006, New York, NY, USA, March 4-7, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3876},
  pages        = {120--144},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11681878\_7},
  doi          = {10.1007/11681878\_7},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/CatalanoDV06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/DodisP06,
  author       = {Yevgeniy Dodis and
                  Prashant Puniya},
  editor       = {Shai Halevi and
                  Tal Rabin},
  title        = {On the Relation Between the Ideal Cipher and the Random Oracle Models},
  booktitle    = {Theory of Cryptography, Third Theory of Cryptography Conference, {TCC}
                  2006, New York, NY, USA, March 4-7, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3876},
  pages        = {184--206},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11681878\_10},
  doi          = {10.1007/11681878\_10},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/DodisP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/DodisYY06,
  author       = {Yevgeniy Dodis and
                  Aleksandr Yampolskiy and
                  Moti Yung},
  editor       = {Shai Halevi and
                  Tal Rabin},
  title        = {Threshold and Proactive Pseudo-Random Permutations},
  booktitle    = {Theory of Cryptography, Third Theory of Cryptography Conference, {TCC}
                  2006, New York, NY, USA, March 4-7, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3876},
  pages        = {542--560},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11681878\_28},
  doi          = {10.1007/11681878\_28},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/DodisYY06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/DodisPP06,
  author       = {Yevgeniy Dodis and
                  Krzysztof Pietrzak and
                  Bartosz Przydatek},
  editor       = {Shai Halevi and
                  Tal Rabin},
  title        = {Separating Sources for Encryption and Secret Sharing},
  booktitle    = {Theory of Cryptography, Third Theory of Cryptography Conference, {TCC}
                  2006, New York, NY, USA, March 4-7, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3876},
  pages        = {601--616},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11681878\_31},
  doi          = {10.1007/11681878\_31},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/DodisPP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/2006,
  editor       = {Moti Yung and
                  Yevgeniy Dodis and
                  Aggelos Kiayias and
                  Tal Malkin},
  title        = {Public Key Cryptography - {PKC} 2006, 9th International Conference
                  on Theory and Practice of Public-Key Cryptography, New York, NY, USA,
                  April 24-26, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3958},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11745853},
  doi          = {10.1007/11745853},
  isbn         = {3-540-33851-9},
  timestamp    = {Fri, 01 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/2006.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-cs-0602007,
  author       = {Yevgeniy Dodis and
                  Rafail Ostrovsky and
                  Leonid Reyzin and
                  Adam D. Smith},
  title        = {Fuzzy Extractors: How to Generate Strong Keys from Biometrics and
                  Other Noisy Data},
  journal      = {CoRR},
  volume       = {abs/cs/0602007},
  year         = {2006},
  url          = {http://arxiv.org/abs/cs/0602007},
  eprinttype    = {arXiv},
  eprint       = {cs/0602007},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-cs-0602007.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/BosleyD06,
  author       = {Carl Bosley and
                  Yevgeniy Dodis},
  title        = {Does Privacy Require True Randomness?},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR06-114}},
  year         = {2006},
  url          = {https://eccc.weizmann.ac.il/eccc-reports/2006/TR06-114/index.html},
  eprinttype    = {ECCC},
  eprint       = {TR06-114},
  timestamp    = {Wed, 28 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/BosleyD06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DodisYY06,
  author       = {Yevgeniy Dodis and
                  Aleksandr Yampolskiy and
                  Moti Yung},
  title        = {Threshold and Proactive Pseudo-Random Permutations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {17},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/017},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DodisYY06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DodisP06,
  author       = {Yevgeniy Dodis and
                  Prashant Puniya},
  title        = {Verifiable Random Permutations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {78},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/078},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DodisP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BosleyD06,
  author       = {Carl Bosley and
                  Yevgeniy Dodis},
  title        = {Does Privacy Require True Randomness?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {283},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/283},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BosleyD06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanettiDPW06,
  author       = {Ran Canetti and
                  Yevgeniy Dodis and
                  Rafael Pass and
                  Shabsi Walfish},
  title        = {Universally Composable Security with Global Setup},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {432},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/432},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CanettiDPW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dc/DodisFKY05,
  author       = {Yevgeniy Dodis and
                  Nelly Fazio and
                  Aggelos Kiayias and
                  Moti Yung},
  title        = {Scalable public-key tracing and revoking},
  journal      = {Distributed Comput.},
  volume       = {17},
  number       = {4},
  pages        = {323--347},
  year         = {2005},
  url          = {https://doi.org/10.1007/s00446-004-0120-5},
  doi          = {10.1007/S00446-004-0120-5},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dc/DodisFKY05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CoronDMP05,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Yevgeniy Dodis and
                  C{\'{e}}cile Malinaud and
                  Prashant Puniya},
  editor       = {Victor Shoup},
  title        = {Merkle-Damg{\aa}rd Revisited: How to Construct a Hash Function},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2005: 25th Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 14-18,
                  2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3621},
  pages        = {430--448},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11535218\_26},
  doi          = {10.1007/11535218\_26},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CoronDMP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DodisOP05,
  author       = {Yevgeniy Dodis and
                  Roberto Oliveira and
                  Krzysztof Pietrzak},
  editor       = {Victor Shoup},
  title        = {On the Generic Insecurity of the Full Domain Hash},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2005: 25th Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 14-18,
                  2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3621},
  pages        = {449--466},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11535218\_27},
  doi          = {10.1007/11535218\_27},
  timestamp    = {Thu, 22 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/DodisOP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BoyenDKOS05,
  author       = {Xavier Boyen and
                  Yevgeniy Dodis and
                  Jonathan Katz and
                  Rafail Ostrovsky and
                  Adam D. Smith},
  editor       = {Ronald Cramer},
  title        = {Secure Remote Authentication Using Biometric Data},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Aarhus, Denmark, May 22-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3494},
  pages        = {147--163},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11426639\_9},
  doi          = {10.1007/11426639\_9},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BoyenDKOS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/DodisY05,
  author       = {Yevgeniy Dodis and
                  Dae Hyun Yum},
  editor       = {Andrew S. Patrick and
                  Moti Yung},
  title        = {Time Capsule Signature},
  booktitle    = {Financial Cryptography and Data Security, 9th International Conference,
                  {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March
                  3, 2005, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3570},
  pages        = {57--71},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11507840\_6},
  doi          = {10.1007/11507840\_6},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/DodisY05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/Dodis05,
  author       = {Yevgeniy Dodis},
  title        = {On extractors, error-correction and hiding all partial information},
  booktitle    = {{IEEE} Information Theory Workshop on Theory and Practice in Information-Theoretic
                  Security, {ICITS} 2005, Awaji Island, Japan, October 16-19, 2005},
  pages        = {74--79},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/ITWTPI.2005.1543961},
  doi          = {10.1109/ITWTPI.2005.1543961},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/Dodis05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/DodisY05,
  author       = {Yevgeniy Dodis and
                  Aleksandr Yampolskiy},
  editor       = {Serge Vaudenay},
  title        = {A Verifiable Random Function with Short Proofs and Keys},
  booktitle    = {Public Key Cryptography - {PKC} 2005, 8th International Workshop on
                  Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland,
                  January 23-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3386},
  pages        = {416--431},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-30580-4\_28},
  doi          = {10.1007/978-3-540-30580-4\_28},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/DodisY05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/DodisS05,
  author       = {Yevgeniy Dodis and
                  Adam D. Smith},
  editor       = {Harold N. Gabow and
                  Ronald Fagin},
  title        = {Correcting errors without leaking partial information},
  booktitle    = {Proceedings of the 37th Annual {ACM} Symposium on Theory of Computing,
                  Baltimore, MD, USA, May 22-24, 2005},
  pages        = {654--663},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1060590.1060688},
  doi          = {10.1145/1060590.1060688},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/DodisS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/DodisK05,
  author       = {Yevgeniy Dodis and
                  Jonathan Katz},
  editor       = {Joe Kilian},
  title        = {Chosen-Ciphertext Security of Multiple Encryption},
  booktitle    = {Theory of Cryptography, Second Theory of Cryptography Conference,
                  {TCC} 2005, Cambridge, MA, USA, February 10-12, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3378},
  pages        = {188--209},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-30576-7\_11},
  doi          = {10.1007/978-3-540-30576-7\_11},
  timestamp    = {Sun, 02 Jun 2019 21:21:22 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/DodisK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/DodisS05,
  author       = {Yevgeniy Dodis and
                  Adam D. Smith},
  editor       = {Joe Kilian},
  title        = {Entropic Security and the Encryption of High Entropy Messages},
  booktitle    = {Theory of Cryptography, Second Theory of Cryptography Conference,
                  {TCC} 2005, Cambridge, MA, USA, February 10-12, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3378},
  pages        = {556--577},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-30576-7\_30},
  doi          = {10.1007/978-3-540-30576-7\_30},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/DodisS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Dodis05,
  author       = {Yevgeniy Dodis},
  editor       = {Henk C. A. van Tilborg},
  title        = {Signcryption},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_398},
  doi          = {10.1007/0-387-23483-7\_398},
  timestamp    = {Thu, 27 Jun 2019 15:50:13 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Dodis05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Dodis05,
  author       = {Yevgeniy Dodis},
  title        = {Minimal Assumptions for Efficient Mercurial Commitments},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {438},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/438},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Dodis05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/approx/DodisEOR04,
  author       = {Yevgeniy Dodis and
                  Ariel Elbaz and
                  Roberto Oliveira and
                  Ran Raz},
  editor       = {Klaus Jansen and
                  Sanjeev Khanna and
                  Jos{\'{e}} D. P. Rolim and
                  Dana Ron},
  title        = {Improved Randomness Extraction from Two Independent Sources},
  booktitle    = {Approximation, Randomization, and Combinatorial Optimization, Algorithms
                  and Techniques, 7th International Workshop on Approximation Algorithms
                  for Combinatorial Optimization Problems, {APPROX} 2004, and 8th International
                  Workshop on Randomization and Computation, {RANDOM} 2004, Cambridge,
                  MA, USA, August 22-24, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3122},
  pages        = {334--344},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-27821-4\_30},
  doi          = {10.1007/978-3-540-27821-4\_30},
  timestamp    = {Tue, 21 Sep 2021 09:36:24 +0200},
  biburl       = {https://dblp.org/rec/conf/approx/DodisEOR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DodisFJW04,
  author       = {Yevgeniy Dodis and
                  Michael J. Freedman and
                  Stanislaw Jarecki and
                  Shabsi Walfish},
  editor       = {Vijayalakshmi Atluri and
                  Birgit Pfitzmann and
                  Patrick D. McDaniel},
  title        = {Versatile padding schemes for joint signature and encryption},
  booktitle    = {Proceedings of the 11th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2004, Washington, DC, USA, October 25-29, 2004},
  pages        = {344--353},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1030083.1030129},
  doi          = {10.1145/1030083.1030129},
  timestamp    = {Fri, 13 Nov 2020 16:10:44 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/DodisFJW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/YaoFDL04,
  author       = {Danfeng Yao and
                  Nelly Fazio and
                  Yevgeniy Dodis and
                  Anna Lysyanskaya},
  editor       = {Vijayalakshmi Atluri and
                  Birgit Pfitzmann and
                  Patrick D. McDaniel},
  title        = {ID-based encryption for complex hierarchies with applications to forward
                  security and broadcast encryption},
  booktitle    = {Proceedings of the 11th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2004, Washington, DC, USA, October 25-29, 2004},
  pages        = {354--363},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1030083.1030130},
  doi          = {10.1145/1030083.1030130},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/YaoFDL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/coco/AmbainisBDR04,
  author       = {Andris Ambainis and
                  Harry Buhrman and
                  Yevgeniy Dodis and
                  Hein R{\"{o}}hrig},
  title        = {Multiparty Quantum Coin Flipping},
  booktitle    = {19th Annual {IEEE} Conference on Computational Complexity {(CCC} 2004),
                  21-24 June 2004, Amherst, MA, {USA}},
  pages        = {250--259},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/CCC.2004.1313848},
  doi          = {10.1109/CCC.2004.1313848},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/coco/AmbainisBDR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DodisGHKR04,
  author       = {Yevgeniy Dodis and
                  Rosario Gennaro and
                  Johan H{\aa}stad and
                  Hugo Krawczyk and
                  Tal Rabin},
  editor       = {Matthew K. Franklin},
  title        = {Randomness Extraction and Key Derivation Using the CBC, Cascade and
                  {HMAC} Modes},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2004, 24th Annual International
                  CryptologyConference, Santa Barbara, California, USA, August 15-19,
                  2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3152},
  pages        = {494--510},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-28628-8\_30},
  doi          = {10.1007/978-3-540-28628-8\_30},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DodisGHKR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/DodisFKMY04,
  author       = {Yevgeniy Dodis and
                  Matthew K. Franklin and
                  Jonathan Katz and
                  Atsuko Miyaji and
                  Moti Yung},
  editor       = {Tatsuaki Okamoto},
  title        = {A Generic Construction for Intrusion-Resilient Public-Key Encryption},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2004, The Cryptographers' Track at
                  the {RSA} Conference 2004, San Francisco, CA, USA, February 23-27,
                  2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2964},
  pages        = {81--98},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24660-2\_7},
  doi          = {10.1007/978-3-540-24660-2\_7},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/DodisFKMY04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/DodisRS04,
  author       = {Yevgeniy Dodis and
                  Leonid Reyzin and
                  Adam D. Smith},
  editor       = {Christian Cachin and
                  Jan Camenisch},
  title        = {Fuzzy Extractors: How to Generate Strong Keys from Biometrics and
                  Other Noisy Data},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2004, International Conference
                  on the Theory and Applications of Cryptographic Techniques, Interlaken,
                  Switzerland, May 2-6, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3027},
  pages        = {523--540},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24676-3\_31},
  doi          = {10.1007/978-3-540-24676-3\_31},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/DodisRS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/DodisKNS04,
  author       = {Yevgeniy Dodis and
                  Aggelos Kiayias and
                  Antonio Nicolosi and
                  Victor Shoup},
  editor       = {Christian Cachin and
                  Jan Camenisch},
  title        = {Anonymous Identification in Ad Hoc Groups},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2004, International Conference
                  on the Theory and Applications of Cryptographic Techniques, Interlaken,
                  Switzerland, May 2-6, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3027},
  pages        = {609--626},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24676-3\_36},
  doi          = {10.1007/978-3-540-24676-3\_36},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/DodisKNS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/DodisOPS04,
  author       = {Yevgeniy Dodis and
                  Shien Jin Ong and
                  Manoj Prabhakaran and
                  Amit Sahai},
  title        = {On the (Im)possibility of Cryptography with Imperfect Randomness},
  booktitle    = {45th Symposium on Foundations of Computer Science {(FOCS} 2004), 17-19
                  October 2004, Rome, Italy, Proceedings},
  pages        = {196--205},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/FOCS.2004.44},
  doi          = {10.1109/FOCS.2004.44},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/focs/DodisOPS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DodisFJW04,
  author       = {Yevgeniy Dodis and
                  Michael J. Freedman and
                  Stanislaw Jarecki and
                  Shabsi Walfish},
  title        = {Optimal Signcryption from Any Trapdoor Permutation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {20},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/020},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DodisFJW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DodisFKY04,
  author       = {Yevgeniy Dodis and
                  Nelly Fazio and
                  Aggelos Kiayias and
                  Moti Yung},
  title        = {Scalable Public-Key Tracing and Revoking},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {160},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/160},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DodisFKY04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YaoFDL04,
  author       = {Danfeng Yao and
                  Nelly Fazio and
                  Yevgeniy Dodis and
                  Anna Lysyanskaya},
  title        = {ID-Based Encryption for Complex Hierarchies with Applications to Forward
                  Security and Broadcast Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {212},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/212},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YaoFDL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DodisS04,
  author       = {Yevgeniy Dodis and
                  Adam D. Smith},
  title        = {Entropic Security and the Encryption of High Entropy Messages},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {219},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/219},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DodisS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DodisY04,
  author       = {Yevgeniy Dodis and
                  Aleksandr Yampolskiy},
  title        = {A Verifiable Random Function With Short Proofs and Keys},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {310},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/310},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DodisY04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/DodisFKMY03,
  author       = {Yevgeniy Dodis and
                  Matthew K. Franklin and
                  Jonathan Katz and
                  Atsuko Miyaji and
                  Moti Yung},
  editor       = {Marc Joye},
  title        = {Intrusion-Resilient Public-Key Encryption},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2003, The Cryptographers' Track at
                  the {RSA} Conference 2003, San Francisco, CA, USA, April 13-17, 2003,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2612},
  pages        = {19--32},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-36563-X\_2},
  doi          = {10.1007/3-540-36563-X\_2},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/DodisFKMY03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/DodisR03,
  author       = {Yevgeniy Dodis and
                  Leonid Reyzin},
  editor       = {Moti Yung},
  title        = {Breaking and repairing optimistic fair exchange from {PODC} 2003},
  booktitle    = {Proceedings of the 2003 {ACM} workshop on Digital rights management
                  2003, Washington, DC, USA, October 27, 2003},
  pages        = {47--54},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/947380.947387},
  doi          = {10.1145/947380.947387},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/DodisR03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/DodisA03,
  author       = {Yevgeniy Dodis and
                  Jee Hea An},
  editor       = {Eli Biham},
  title        = {Concealment and Its Applications to Authenticated Encryption},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2003, International Conference
                  on the Theory and Applications of Cryptographic Techniques, Warsaw,
                  Poland, May 4-8, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2656},
  pages        = {312--329},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-39200-9\_19},
  doi          = {10.1007/3-540-39200-9\_19},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/DodisA03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/IvanD03,
  author       = {Anca{-}Andreea Ivan and
                  Yevgeniy Dodis},
  title        = {Proxy Cryptography Revisited},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2003, San Diego, California, {USA}},
  publisher    = {The Internet Society},
  year         = {2003},
  url          = {https://www.ndss-symposium.org/ndss2003/proxy-cryptography-revisited/},
  timestamp    = {Mon, 01 Feb 2021 08:42:24 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/IvanD03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/NicolosiKDM03,
  author       = {Antonio Nicolosi and
                  Maxwell N. Krohn and
                  Yevgeniy Dodis and
                  David Mazi{\`{e}}res},
  title        = {Proactive Two-Party Signatures for User Authentication},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2003, San Diego, California, {USA}},
  publisher    = {The Internet Society},
  year         = {2003},
  url          = {https://www.ndss-symposium.org/ndss2003/proactive-two-party-signatures-user-authentication/},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/NicolosiKDM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Dodis03,
  author       = {Yevgeniy Dodis},
  editor       = {Yvo Desmedt},
  title        = {Efficient Construction of (Distributed) Verifiable Random Functions},
  booktitle    = {Public Key Cryptography - {PKC} 2003, 6th International Workshop on
                  Theory and Practice in Public Key Cryptography, Miami, FL, USA, January
                  6-8, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2567},
  pages        = {1--17},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-36288-6\_1},
  doi          = {10.1007/3-540-36288-6\_1},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Dodis03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/DodisF03,
  author       = {Yevgeniy Dodis and
                  Nelly Fazio},
  editor       = {Yvo Desmedt},
  title        = {Public Key Trace and Revoke Scheme Secure against Adaptive Chosen
                  Ciphertext Attack},
  booktitle    = {Public Key Cryptography - {PKC} 2003, 6th International Workshop on
                  Theory and Practice in Public Key Cryptography, Miami, FL, USA, January
                  6-8, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2567},
  pages        = {100--115},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-36288-6\_8},
  doi          = {10.1007/3-540-36288-6\_8},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/DodisF03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/DodisKXY03,
  author       = {Yevgeniy Dodis and
                  Jonathan Katz and
                  Shouhuai Xu and
                  Moti Yung},
  editor       = {Yvo Desmedt},
  title        = {Strong Key-Insulated Signature Schemes},
  booktitle    = {Public Key Cryptography - {PKC} 2003, 6th International Workshop on
                  Theory and Practice in Public Key Cryptography, Miami, FL, USA, January
                  6-8, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2567},
  pages        = {130--144},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-36288-6\_10},
  doi          = {10.1007/3-540-36288-6\_10},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/DodisKXY03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/podc/DodisFKY03,
  author       = {Yevgeniy Dodis and
                  Nelly Fazio and
                  Aggelos Kiayias and
                  Moti Yung},
  editor       = {Elizabeth Borowsky and
                  Sergio Rajsbaum},
  title        = {Scalable public-key tracing and revoking},
  booktitle    = {Proceedings of the Twenty-Second {ACM} Symposium on Principles of
                  Distributed Computing, {PODC} 2003, Boston, Massachusetts, USA, July
                  13-16, 2003},
  pages        = {190--199},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/872035.872062},
  doi          = {10.1145/872035.872062},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/podc/DodisFKY03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/random/DodisO03,
  author       = {Yevgeniy Dodis and
                  Roberto Oliveira},
  editor       = {Sanjeev Arora and
                  Klaus Jansen and
                  Jos{\'{e}} D. P. Rolim and
                  Amit Sahai},
  title        = {On Extracting Private Randomness over a Public Channel},
  booktitle    = {Approximation, Randomization, and Combinatorial Optimization: Algorithms
                  and Techniques, 6th International Workshop on Approximation Algorithms
                  for Combinatorial Optimization Problems, {APPROX} 2003 and 7th International
                  Workshop on Randomization and Approximation Techniques in Computer
                  Science, {RANDOM} 2003, Princeton, NJ, USA, August 24-26, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2764},
  pages        = {252--263},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45198-3\_22},
  doi          = {10.1007/978-3-540-45198-3\_22},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/random/DodisO03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigecom/ColeDR03,
  author       = {Richard Cole and
                  Yevgeniy Dodis and
                  Tim Roughgarden},
  editor       = {Daniel A. Menasc{\'{e}} and
                  Noam Nisan},
  title        = {How much can taxes help selfish routing?},
  booktitle    = {Proceedings 4th {ACM} Conference on Electronic Commerce (EC-2003),
                  San Diego, California, USA, June 9-12, 2003},
  pages        = {98--107},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/779928.779941},
  doi          = {10.1145/779928.779941},
  timestamp    = {Tue, 27 Nov 2018 11:56:48 +0100},
  biburl       = {https://dblp.org/rec/conf/sigecom/ColeDR03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/ColeDR03,
  author       = {Richard Cole and
                  Yevgeniy Dodis and
                  Tim Roughgarden},
  editor       = {Lawrence L. Larmore and
                  Michel X. Goemans},
  title        = {Pricing network edges for heterogeneous selfish users},
  booktitle    = {Proceedings of the 35th Annual {ACM} Symposium on Theory of Computing,
                  June 9-11, 2003, San Diego, CA, {USA}},
  pages        = {521--530},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/780542.780618},
  doi          = {10.1145/780542.780618},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/ColeDR03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/quant-ph-0304112,
  author       = {Andris Ambainis and
                  Harry Buhrman and
                  Yevgeniy Dodis and
                  Hein R{\"{o}}hrig},
  title        = {Multiparty Quantum Coin Flipping},
  journal      = {CoRR},
  volume       = {quant-ph/0304112},
  year         = {2003},
  url          = {http://arxiv.org/abs/quant-ph/0304112},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/quant-ph-0304112.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DodisA03,
  author       = {Yevgeniy Dodis and
                  Jee Hea An},
  title        = {Concealment and its Applications to Authenticated Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {50},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/050},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DodisA03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DodisF03,
  author       = {Yevgeniy Dodis and
                  Nelly Fazio},
  title        = {Public Key Trace and Revoke Scheme Secure against Adaptive Chosen
                  Ciphertext Attack},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {95},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/095},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DodisF03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DodisR03,
  author       = {Yevgeniy Dodis and
                  Leonid Reyzin},
  title        = {Breaking and Repairing Optimistic Fair Exchange from {PODC} 2003},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {146},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/146},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DodisR03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DodisORS03,
  author       = {Yevgeniy Dodis and
                  Rafail Ostrovsky and
                  Leonid Reyzin and
                  Adam D. Smith},
  title        = {Fuzzy Extractors: How to Generate Strong Keys from Biometrics and
                  Other Noisy Data},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {235},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/235},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DodisORS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DodisF02,
  author       = {Yevgeniy Dodis and
                  Nelly Fazio},
  editor       = {Joan Feigenbaum},
  title        = {Public Key Broadcast Encryption for Stateless Receivers},
  booktitle    = {Security and Privacy in Digital Rights Management, {ACM} {CCS-9} Workshop,
                  {DRM} 2002, Washington, DC, USA, November 18, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2696},
  pages        = {61--80},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/978-3-540-44993-5\_5},
  doi          = {10.1007/978-3-540-44993-5\_5},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/DodisF02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/DodisKXY02,
  author       = {Yevgeniy Dodis and
                  Jonathan Katz and
                  Shouhuai Xu and
                  Moti Yung},
  editor       = {Lars R. Knudsen},
  title        = {Key-Insulated Public Key Cryptosystems},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2002, International Conference
                  on the Theory and Applications of Cryptographic Techniques, Amsterdam,
                  The Netherlands, April 28 - May 2, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2332},
  pages        = {65--82},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-46035-7\_5},
  doi          = {10.1007/3-540-46035-7\_5},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/DodisKXY02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/AnDR02,
  author       = {Jee Hea An and
                  Yevgeniy Dodis and
                  Tal Rabin},
  editor       = {Lars R. Knudsen},
  title        = {On the Security of Joint Signature and Encryption},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2002, International Conference
                  on the Theory and Applications of Cryptographic Techniques, Amsterdam,
                  The Netherlands, April 28 - May 2, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2332},
  pages        = {83--107},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-46035-7\_6},
  doi          = {10.1007/3-540-46035-7\_6},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/AnDR02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/DodisS02,
  author       = {Yevgeniy Dodis and
                  Joel Spencer},
  title        = {On the (non)Universality of the One-Time Pad},
  booktitle    = {43rd Symposium on Foundations of Computer Science {(FOCS} 2002), 16-19
                  November 2002, Vancouver, BC, Canada, Proceedings},
  pages        = {376},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/SFCS.2002.1181962},
  doi          = {10.1109/SFCS.2002.1181962},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/DodisS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/DodisR02,
  author       = {Yevgeniy Dodis and
                  Leonid Reyzin},
  editor       = {Stelvio Cimato and
                  Clemente Galdi and
                  Giuseppe Persiano},
  title        = {On the Power of Claw-Free Permutations},
  booktitle    = {Security in Communication Networks, Third International Conference,
                  {SCN} 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2576},
  pages        = {55--73},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36413-7\_5},
  doi          = {10.1007/3-540-36413-7\_5},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/DodisR02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sisw/DodisY02,
  author       = {Yevgeniy Dodis and
                  Moti Yung},
  title        = {Exposure-Resilience for Free: The Hierarchical ID-based Encryption
                  Case},
  booktitle    = {Proceedings of the First International {IEEE} Security in Storage
                  Workshop, {SISW} 2002, Greenbelt, Maryland, USA, December 11, 2002},
  pages        = {45--52},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/SISW.2002.1183509},
  doi          = {10.1109/SISW.2002.1183509},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sisw/DodisY02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AnDR02,
  author       = {Jee Hea An and
                  Yevgeniy Dodis and
                  Tal Rabin},
  title        = {On the Security of Joint Signature and Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {46},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/046},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AnDR02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DodisKXY02,
  author       = {Yevgeniy Dodis and
                  Jonathan Katz and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {Key-Insulated Public-Key Cryptosystems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {77},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/077},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DodisKXY02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DodisR02,
  author       = {Yevgeniy Dodis and
                  Leonid Reyzin},
  title        = {On the Power of Claw-Free Permutations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {103},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/103},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DodisR02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Dodis02,
  author       = {Yevgeniy Dodis},
  title        = {Efficient Construction of (Distributed) Verifiable Random Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {133},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/133},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Dodis02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/DodisSS01,
  author       = {Yevgeniy Dodis and
                  Amit Sahai and
                  Adam D. Smith},
  editor       = {Birgit Pfitzmann},
  title        = {On Perfect and Adaptive Security in Exposure-Resilient Cryptography},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2001, International Conference
                  on the Theory and Application of Cryptographic Techniques, Innsbruck,
                  Austria, May 6-10, 2001, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {2045},
  pages        = {301--324},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44987-6\_19},
  doi          = {10.1007/3-540-44987-6\_19},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/DodisSS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/Dodis01,
  author       = {Yevgeniy Dodis},
  editor       = {Fernando Orejas and
                  Paul G. Spirakis and
                  Jan van Leeuwen},
  title        = {New Imperfect Random Source with Applications to Coin-Flipping},
  booktitle    = {Automata, Languages and Programming, 28th International Colloquium,
                  {ICALP} 2001, Crete, Greece, July 8-12, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2076},
  pages        = {297--309},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-48224-5\_25},
  doi          = {10.1007/3-540-48224-5\_25},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/Dodis01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/random/DodisH01,
  author       = {Yevgeniy Dodis and
                  Shai Halevi},
  editor       = {Michel X. Goemans and
                  Klaus Jansen and
                  Jos{\'{e}} D. P. Rolim and
                  Luca Trevisan},
  title        = {Incremental Codes},
  booktitle    = {Approximation, Randomization and Combinatorial Optimization: Algorithms
                  and Techniques, 4th International Workshop on Approximation Algorithms
                  for Combinatorial Optimization Problems, {APPROX} 2001 and 5th International
                  Workshop on Randomization and Approximation Techniques in Computer
                  Science, {RANDOM} 2001 Berkeley, CA, USA, August 18-20, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2129},
  pages        = {75--89},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44666-4\_12},
  doi          = {10.1007/3-540-44666-4\_12},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/random/DodisH01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soda/DodisW01,
  author       = {Yevgeniy Dodis and
                  Peter Winkler},
  editor       = {S. Rao Kosaraju},
  title        = {Universal configurations in light-flipping games},
  booktitle    = {Proceedings of the Twelfth Annual Symposium on Discrete Algorithms,
                  January 7-9, 2001, Washington, DC, {USA}},
  pages        = {926--927},
  publisher    = {{ACM/SIAM}},
  year         = {2001},
  url          = {http://dl.acm.org/citation.cfm?id=365411.365812},
  timestamp    = {Mon, 23 Oct 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/soda/DodisW01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/ndltd/Dodis00,
  author       = {Yevgeniy Dodis},
  title        = {Exposure-resilient cryptography},
  school       = {Massachusetts Institute of Technology, Cambridge, MA, {USA}},
  year         = {2000},
  url          = {https://hdl.handle.net/1721.1/86613},
  timestamp    = {Wed, 04 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/ndltd/Dodis00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DodisM00,
  author       = {Yevgeniy Dodis and
                  Silvio Micali},
  editor       = {Mihir Bellare},
  title        = {Parallel Reducibility for Information-Theoretically Secure Computation},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2000, 20th Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 20-24,
                  2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1880},
  pages        = {74--92},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44598-6\_5},
  doi          = {10.1007/3-540-44598-6\_5},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DodisM00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DodisHR00,
  author       = {Yevgeniy Dodis and
                  Shai Halevi and
                  Tal Rabin},
  editor       = {Mihir Bellare},
  title        = {A Cryptographic Solution to a Game Theoretic Problem},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2000, 20th Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 20-24,
                  2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1880},
  pages        = {112--130},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44598-6\_7},
  doi          = {10.1007/3-540-44598-6\_7},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DodisHR00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CanettiDHKS00,
  author       = {Ran Canetti and
                  Yevgeniy Dodis and
                  Shai Halevi and
                  Eyal Kushilevitz and
                  Amit Sahai},
  editor       = {Bart Preneel},
  title        = {Exposure-Resilient Functions and All-or-Nothing Transforms},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2000, International Conference
                  on the Theory and Application of Cryptographic Techniques, Bruges,
                  Belgium, May 14-18, 2000, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1807},
  pages        = {453--469},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-45539-6\_33},
  doi          = {10.1007/3-540-45539-6\_33},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/CanettiDHKS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/ECCC-TR00-039,
  author       = {Yevgeniy Dodis},
  title        = {Impossibility of Black-Box Reduction from Non-Adaptively to Adaptively
                  Secure Coin-Flipping},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR00-039}},
  year         = {2000},
  url          = {https://eccc.weizmann.ac.il/eccc-reports/2000/TR00-039/index.html},
  eprinttype    = {ECCC},
  eprint       = {TR00-039},
  timestamp    = {Wed, 28 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/ECCC-TR00-039.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/DodisM99,
  author       = {Yevgeniy Dodis and
                  Silvio Micali},
  editor       = {Jacques Stern},
  title        = {Lower Bounds for Oblivious Transfer Reductions},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '99, International Conference
                  on the Theory and Application of Cryptographic Techniques, Prague,
                  Czech Republic, May 2-6, 1999, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1592},
  pages        = {42--55},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48910-X\_4},
  doi          = {10.1007/3-540-48910-X\_4},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/DodisM99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/DodisK99,
  author       = {Yevgeniy Dodis and
                  Sanjeev Khanna},
  editor       = {Jir{\'{\i}} Wiedermann and
                  Peter van Emde Boas and
                  Mogens Nielsen},
  title        = {Space Time Tradeoffs for Graph Properties},
  booktitle    = {Automata, Languages and Programming, 26th International Colloquium,
                  ICALP'99, Prague, Czech Republic, July 11-15, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1644},
  pages        = {291--300},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48523-6\_26},
  doi          = {10.1007/3-540-48523-6\_26},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/DodisK99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/random/DodisGLRRS99,
  author       = {Yevgeniy Dodis and
                  Oded Goldreich and
                  Eric Lehman and
                  Sofya Raskhodnikova and
                  Dana Ron and
                  Alex Samorodnitsky},
  editor       = {Dorit S. Hochbaum and
                  Klaus Jansen and
                  Jos{\'{e}} D. P. Rolim and
                  Alistair Sinclair},
  title        = {Improved Testing Algorithms for Monotonicity},
  booktitle    = {Randomization, Approximation, and Combinatorial Algorithms and Techniques,
                  Third International Workshop on Randomization and Approximation Techniques
                  in Computer Science, and Second International Workshop on Approximation
                  Algorithms for Combinatorial Optimization Problems RANDOM-APPROX'99,
                  Berkeley, CA, USA, August 8-11, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1671},
  pages        = {97--108},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/978-3-540-48413-4\_10},
  doi          = {10.1007/978-3-540-48413-4\_10},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/random/DodisGLRRS99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soda/DodisGK99,
  author       = {Yevgeniy Dodis and
                  Venkatesan Guruswami and
                  Sanjeev Khanna},
  editor       = {Robert Endre Tarjan and
                  Tandy J. Warnow},
  title        = {The 2-Catalog Segmentation Problem},
  booktitle    = {Proceedings of the Tenth Annual {ACM-SIAM} Symposium on Discrete Algorithms,
                  17-19 January 1999, Baltimore, Maryland, {USA}},
  pages        = {897--898},
  publisher    = {{ACM/SIAM}},
  year         = {1999},
  url          = {http://dl.acm.org/citation.cfm?id=314500.315075},
  timestamp    = {Thu, 05 Jul 2018 07:29:57 +0200},
  biburl       = {https://dblp.org/rec/conf/soda/DodisGK99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/DodisK99,
  author       = {Yevgeniy Dodis and
                  Sanjeev Khanna},
  editor       = {Jeffrey Scott Vitter and
                  Lawrence L. Larmore and
                  Frank Thomson Leighton},
  title        = {Design Networks with Bounded Pairwise Distance},
  booktitle    = {Proceedings of the Thirty-First Annual {ACM} Symposium on Theory of
                  Computing, May 1-4, 1999, Atlanta, Georgia, {USA}},
  pages        = {750--759},
  publisher    = {{ACM}},
  year         = {1999},
  url          = {https://doi.org/10.1145/301250.301447},
  doi          = {10.1145/301250.301447},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/DodisK99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/ECCC-TR99-017,
  author       = {Yevgeniy Dodis and
                  Oded Goldreich and
                  Eric Lehman and
                  Sofya Raskhodnikova and
                  Dana Ron and
                  Alex Samorodnitsky},
  title        = {Improved Testing Algorithms for Monotonicity},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR99-017}},
  year         = {1999},
  url          = {https://eccc.weizmann.ac.il/eccc-reports/1999/TR99-017/index.html},
  eprinttype    = {ECCC},
  eprint       = {TR99-017},
  timestamp    = {Wed, 28 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/ECCC-TR99-017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics