Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Yevgeniy Dodis
@inproceedings{DBLP:conf/crypto/DodisFGHP23, author = {Yevgeniy Dodis and Niels Ferguson and Eli Goldin and Peter Hall and Krzysztof Pietrzak}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Random Oracle Combiners: Breaking the Concatenation Barrier for Collision-Resistance}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14082}, pages = {514--546}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38545-2\_17}, doi = {10.1007/978-3-031-38545-2\_17}, timestamp = {Mon, 14 Aug 2023 16:16:25 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DodisFGHP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DodisQW23, author = {Yevgeniy Dodis and Willy Quach and Daniel Wichs}, editor = {Carmit Hazay and Martijn Stam}, title = {Speak Much, Remember Little: Cryptography in the Bounded Storage Model, Revisited}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14004}, pages = {86--116}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30545-0\_4}, doi = {10.1007/978-3-031-30545-0\_4}, timestamp = {Thu, 20 Apr 2023 11:35:01 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DodisQW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DodisJKM23, author = {Yevgeniy Dodis and Daniel Jost and Balachandar Kesavan and Antonio Marcedone}, editor = {Carmit Hazay and Martijn Stam}, title = {End-to-End Encrypted Zoom Meetings: Proving Security and Strengthening Liveness}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {V}}, series = {Lecture Notes in Computer Science}, volume = {14008}, pages = {157--189}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30589-4\_6}, doi = {10.1007/978-3-031-30589-4\_6}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DodisJKM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/BallDG23, author = {Marshall Ball and Yevgeniy Dodis and Eli Goldin}, editor = {Guy N. Rothblum and Hoeteck Wee}, title = {Immunizing Backdoored PRGs}, booktitle = {Theory of Cryptography - 21st International Conference, {TCC} 2023, Taipei, Taiwan, November 29 - December 2, 2023, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14371}, pages = {153--182}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-48621-0\_6}, doi = {10.1007/978-3-031-48621-0\_6}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/BallDG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/DodisHW23, author = {Yevgeniy Dodis and Shai Halevi and Daniel Wichs}, editor = {Guy N. Rothblum and Hoeteck Wee}, title = {Security with Functional Re-encryption from {CPA}}, booktitle = {Theory of Cryptography - 21st International Conference, {TCC} 2023, Taipei, Taiwan, November 29 - December 2, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14370}, pages = {279--305}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-48618-0\_10}, doi = {10.1007/978-3-031-48618-0\_10}, timestamp = {Wed, 06 Dec 2023 13:56:15 +0100}, biburl = {https://dblp.org/rec/conf/tcc/DodisHW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DodisFGHP23, author = {Yevgeniy Dodis and Niels Ferguson and Eli Goldin and Peter Hall and Krzysztof Pietrzak}, title = {Random Oracle Combiners: Breaking the Concatenation Barrier for Collision-Resistance}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1041}, year = {2023}, url = {https://eprint.iacr.org/2023/1041}, timestamp = {Fri, 04 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DodisFGHP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DodisHW23, author = {Yevgeniy Dodis and Shai Halevi and Daniel Wichs}, title = {Security with Functional Re-Encryption from {CPA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1443}, year = {2023}, url = {https://eprint.iacr.org/2023/1443}, timestamp = {Sat, 07 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DodisHW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BallDG23, author = {Marshall Ball and Yevgeniy Dodis and Eli Goldin}, title = {Immunizing Backdoored PRGs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1778}, year = {2023}, url = {https://eprint.iacr.org/2023/1778}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BallDG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DodisJKM23, author = {Yevgeniy Dodis and Daniel Jost and Balachandar Kesavan and Antonio Marcedone}, title = {End-to-End Encrypted Zoom Meetings: Proving Security and Strengthening Liveness}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1829}, year = {2023}, url = {https://eprint.iacr.org/2023/1829}, timestamp = {Fri, 08 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/DodisJKM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/ChenDGGKMM22, author = {Brian Chen and Yevgeniy Dodis and Esha Ghosh and Eli Goldin and Balachandar Kesavan and Antonio Marcedone and Merry Ember Mou}, editor = {Shweta Agrawal and Dongdai Lin}, title = {Rotatable Zero Knowledge Sets - Post Compromise Secure Auditable Dictionaries with Application to Key Transparency}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5-9, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13793}, pages = {547--580}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22969-5\_19}, doi = {10.1007/978-3-031-22969-5\_19}, timestamp = {Fri, 03 Feb 2023 17:07:14 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/ChenDGGKMM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/citc/CorettiDKST22, author = {Sandro Coretti and Yevgeniy Dodis and Harish Karthikeyan and Noah Stephens{-}Davidowitz and Stefano Tessaro}, editor = {Dana Dachman{-}Soled}, title = {On Seedless PRNGs and Premature Next}, booktitle = {3rd Conference on Information-Theoretic Cryptography, {ITC} 2022, July 5-7, 2022, Cambridge, MA, {USA}}, series = {LIPIcs}, volume = {230}, pages = {9:1--9:20}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2022}, url = {https://doi.org/10.4230/LIPIcs.ITC.2022.9}, doi = {10.4230/LIPICS.ITC.2022.9}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/citc/CorettiDKST22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/citc/DharDN22, author = {Chandranan Dhar and Yevgeniy Dodis and Mridul Nandi}, editor = {Dana Dachman{-}Soled}, title = {Revisiting Collision and Local Opening Analysis of {ABR} Hash}, booktitle = {3rd Conference on Information-Theoretic Cryptography, {ITC} 2022, July 5-7, 2022, Cambridge, MA, {USA}}, series = {LIPIcs}, volume = {230}, pages = {11:1--11:22}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2022}, url = {https://doi.org/10.4230/LIPIcs.ITC.2022.11}, doi = {10.4230/LIPICS.ITC.2022.11}, timestamp = {Thu, 30 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/citc/DharDN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/BienstockDT22, author = {Alexander Bienstock and Yevgeniy Dodis and Yi Tang}, editor = {Steven D. Galbraith}, title = {Multicast Key Agreement, Revisited}, booktitle = {Topics in Cryptology - {CT-RSA} 2022 - Cryptographers' Track at the {RSA} Conference 2022, Virtual Event, March 1-2, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13161}, pages = {1--25}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-95312-6\_1}, doi = {10.1007/978-3-030-95312-6\_1}, timestamp = {Thu, 03 Feb 2022 09:28:38 +0100}, biburl = {https://dblp.org/rec/conf/ctrsa/BienstockDT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DodisQW22, author = {Yevgeniy Dodis and Willy Quach and Daniel Wichs}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {Authentication in the Bounded Storage Model}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13277}, pages = {737--766}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-07082-2\_26}, doi = {10.1007/978-3-031-07082-2\_26}, timestamp = {Tue, 31 May 2022 17:23:10 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DodisQW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/innovations/DodisKW22, author = {Yevgeniy Dodis and Harish Karthikeyan and Daniel Wichs}, editor = {Mark Braverman}, title = {Small-Box Cryptography}, booktitle = {13th Innovations in Theoretical Computer Science Conference, {ITCS} 2022, January 31 - February 3, 2022, Berkeley, CA, {USA}}, series = {LIPIcs}, volume = {215}, pages = {56:1--56:25}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2022}, url = {https://doi.org/10.4230/LIPIcs.ITCS.2022.56}, doi = {10.4230/LIPICS.ITCS.2022.56}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/innovations/DodisKW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/AronestyCDGHKT22, author = {Erik Aronesty and David Cash and Yevgeniy Dodis and Daniel H. Gallancy and Christopher Higley and Harish Karthikeyan and Oren Tysor}, editor = {Goichiro Hanaoka and Junji Shikata and Yohei Watanabe}, title = {Encapsulated Search Index: Public-Key, Sub-linear, Distributed, and Delegatable}, booktitle = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Virtual Event, March 8-11, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13178}, pages = {256--285}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-97131-1\_9}, doi = {10.1007/978-3-030-97131-1\_9}, timestamp = {Thu, 10 Mar 2022 11:26:10 +0100}, biburl = {https://dblp.org/rec/conf/pkc/AronestyCDGHKT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/DodisJK22, author = {Yevgeniy Dodis and Daniel Jost and Harish Karthikeyan}, editor = {Eike Kiltz and Vinod Vaikuntanathan}, title = {Forward-Secure Encryption with Fast Forwarding}, booktitle = {Theory of Cryptography - 20th International Conference, {TCC} 2022, Chicago, IL, USA, November 7-10, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13748}, pages = {3--32}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22365-5\_1}, doi = {10.1007/978-3-031-22365-5\_1}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/DodisJK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/BienstockDGGHR22, author = {Alexander Bienstock and Yevgeniy Dodis and Sanjam Garg and Garrison Grogan and Mohammad Hajiabadi and Paul R{\"{o}}sler}, editor = {Eike Kiltz and Vinod Vaikuntanathan}, title = {On the Worst-Case Inefficiency of {CGKA}}, booktitle = {Theory of Cryptography - 20th International Conference, {TCC} 2022, Chicago, IL, USA, November 7-10, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13748}, pages = {213--243}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22365-5\_8}, doi = {10.1007/978-3-031-22365-5\_8}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/BienstockDGGHR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/crypto/2022-1, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13507}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15802-5}, doi = {10.1007/978-3-031-15802-5}, isbn = {978-3-031-15801-8}, timestamp = {Wed, 19 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/2022-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/crypto/2022-2, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13508}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15979-4}, doi = {10.1007/978-3-031-15979-4}, isbn = {978-3-031-15978-7}, timestamp = {Wed, 19 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/2022-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/crypto/2022-3, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13509}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15982-4}, doi = {10.1007/978-3-031-15982-4}, isbn = {978-3-031-15981-7}, timestamp = {Wed, 19 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/2022-3.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/crypto/2022-4, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {13510}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15985-5}, doi = {10.1007/978-3-031-15985-5}, isbn = {978-3-031-15984-8}, timestamp = {Wed, 19 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/2022-4.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DodisKW22, author = {Yevgeniy Dodis and Harish Karthikeyan and Daniel Wichs}, title = {Updatable Public Key Encryption in the Standard Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {68}, year = {2022}, url = {https://eprint.iacr.org/2022/068}, timestamp = {Fri, 18 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/DodisKW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DodisKW22a, author = {Yevgeniy Dodis and Harish Karthikeyan and Daniel Wichs}, title = {Small-Box Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {69}, year = {2022}, url = {https://eprint.iacr.org/2022/069}, timestamp = {Fri, 18 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/DodisKW22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AronestyCDGHKT22, author = {Erik Aronesty and David Cash and Yevgeniy Dodis and Daniel H. Gallancy and Christopher Higley and Harish Karthikeyan and Oren Tysor}, title = {Encapsulated Search Index: Public-Key, Sub-linear, Distributed, and Delegatable}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {71}, year = {2022}, url = {https://eprint.iacr.org/2022/071}, timestamp = {Fri, 18 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/AronestyCDGHKT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CorettiDKST22, author = {Sandro Coretti and Yevgeniy Dodis and Harish Karthikeyan and Noah Stephens{-}Davidowitz and Stefano Tessaro}, title = {On Seedless PRNGs and Premature Next}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {558}, year = {2022}, url = {https://eprint.iacr.org/2022/558}, timestamp = {Mon, 16 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CorettiDKST22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DodisQW22, author = {Yevgeniy Dodis and Willy Quach and Daniel Wichs}, title = {Authentication in the Bounded Storage Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {690}, year = {2022}, url = {https://eprint.iacr.org/2022/690}, timestamp = {Mon, 20 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DodisQW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DodisJK22, author = {Yevgeniy Dodis and Daniel Jost and Harish Karthikeyan}, title = {Forward-Secure Encryption with Fast Forwarding}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1233}, year = {2022}, url = {https://eprint.iacr.org/2022/1233}, timestamp = {Thu, 13 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DodisJK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BienstockDGGHR22, author = {Alexander Bienstock and Yevgeniy Dodis and Sanjam Garg and Garrison Grogan and Mohammad Hajiabadi and Paul R{\"{o}}sler}, title = {On the Worst-Case Inefficiency of {CGKA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1237}, year = {2022}, url = {https://eprint.iacr.org/2022/1237}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BienstockDGGHR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenDGGKMM22, author = {Brian Chen and Yevgeniy Dodis and Esha Ghosh and Eli Goldin and Balachandar Kesavan and Antonio Marcedone and Merry Ember Mou}, title = {Rotatable Zero Knowledge Sets: Post Compromise Secure Auditable Dictionaries with application to Key Transparency}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1264}, year = {2022}, url = {https://eprint.iacr.org/2022/1264}, timestamp = {Sat, 22 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenDGGKMM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AlwenCDT21, author = {Jo{\"{e}}l Alwen and Sandro Coretti and Yevgeniy Dodis and Yiannis Tselekounis}, editor = {Yongdae Kim and Jong Kim and Giovanni Vigna and Elaine Shi}, title = {Modular Design of Secure Group Messaging Protocols and the Security of {MLS}}, booktitle = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15 - 19, 2021}, pages = {1463--1483}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3460120.3484820}, doi = {10.1145/3460120.3484820}, timestamp = {Tue, 16 Nov 2021 12:59:46 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AlwenCDT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/citc/DodisY21, author = {Yevgeniy Dodis and Kevin Yeo}, editor = {Stefano Tessaro}, title = {Doubly-Affine Extractors, and Their Applications}, booktitle = {2nd Conference on Information-Theoretic Cryptography, {ITC} 2021, July 23-26, 2021, Virtual Conference}, series = {LIPIcs}, volume = {199}, pages = {13:1--13:23}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2021}, url = {https://doi.org/10.4230/LIPIcs.ITC.2021.13}, doi = {10.4230/LIPICS.ITC.2021.13}, timestamp = {Thu, 16 Sep 2021 15:58:53 +0200}, biburl = {https://dblp.org/rec/conf/citc/DodisY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/citc/DodisGSX21, author = {Yevgeniy Dodis and Siyao Guo and Noah Stephens{-}Davidowitz and Zhiye Xie}, editor = {Stefano Tessaro}, title = {Online Linear Extractors for Independent Sources}, booktitle = {2nd Conference on Information-Theoretic Cryptography, {ITC} 2021, July 23-26, 2021, Virtual Conference}, series = {LIPIcs}, volume = {199}, pages = {14:1--14:14}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2021}, url = {https://doi.org/10.4230/LIPIcs.ITC.2021.14}, doi = {10.4230/LIPICS.ITC.2021.14}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/citc/DodisGSX21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/citc/DodisKMN21, author = {Yevgeniy Dodis and Dmitry Khovratovich and Nicky Mouha and Mridul Nandi}, editor = {Stefano Tessaro}, title = {T{\unicode{8325}}: Hashing Five Inputs with Three Compression Calls}, booktitle = {2nd Conference on Information-Theoretic Cryptography, {ITC} 2021, July 23-26, 2021, Virtual Conference}, series = {LIPIcs}, volume = {199}, pages = {24:1--24:23}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2021}, url = {https://doi.org/10.4230/LIPIcs.ITC.2021.24}, doi = {10.4230/LIPICS.ITC.2021.24}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/citc/DodisKMN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DodisGSX21, author = {Yevgeniy Dodis and Siyao Guo and Noah Stephens{-}Davidowitz and Zhiye Xie}, editor = {Tal Malkin and Chris Peikert}, title = {No Time to Hash: On Super-Efficient Entropy Accumulation}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {12828}, pages = {548--576}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84259-8\_19}, doi = {10.1007/978-3-030-84259-8\_19}, timestamp = {Mon, 16 Aug 2021 09:08:12 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DodisGSX21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/BienstockDY21, author = {Alexander Bienstock and Yevgeniy Dodis and Kevin Yeo}, editor = {Kobbi Nissim and Brent Waters}, title = {Forward Secret Encrypted {RAM:} Lower Bounds and Applications}, booktitle = {Theory of Cryptography - 19th International Conference, {TCC} 2021, Raleigh, NC, USA, November 8-11, 2021, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13044}, pages = {62--93}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90456-2\_3}, doi = {10.1007/978-3-030-90456-2\_3}, timestamp = {Mon, 08 Nov 2021 11:51:39 +0100}, biburl = {https://dblp.org/rec/conf/tcc/BienstockDY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/DodisKW21, author = {Yevgeniy Dodis and Harish Karthikeyan and Daniel Wichs}, editor = {Kobbi Nissim and Brent Waters}, title = {Updatable Public Key Encryption in the Standard Model}, booktitle = {Theory of Cryptography - 19th International Conference, {TCC} 2021, Raleigh, NC, USA, November 8-11, 2021, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13044}, pages = {254--285}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90456-2\_9}, doi = {10.1007/978-3-030-90456-2\_9}, timestamp = {Mon, 08 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/DodisKW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BienstockDY21, author = {Alexander Bienstock and Yevgeniy Dodis and Kevin Yeo}, title = {Forward Secret Encrypted {RAM:} Lower Bounds and Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {244}, year = {2021}, url = {https://eprint.iacr.org/2021/244}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BienstockDY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DodisKMN21, author = {Yevgeniy Dodis and Dmitry Khovratovich and Nicky Mouha and Mridul Nandi}, title = {{T5:} Hashing Five Inputs with Three Compression Calls}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {373}, year = {2021}, url = {https://eprint.iacr.org/2021/373}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DodisKMN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DodisGSX21, author = {Yevgeniy Dodis and Siyao Guo and Noah Stephens{-}Davidowitz and Zhiye Xie}, title = {No Time to Hash: On Superefficient Entropy Accumulation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {523}, year = {2021}, url = {https://eprint.iacr.org/2021/523}, timestamp = {Tue, 04 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DodisGSX21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DodisY21, author = {Yevgeniy Dodis and Kevin Yeo}, title = {Doubly-Affine Extractors, and their Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {637}, year = {2021}, url = {https://eprint.iacr.org/2021/637}, timestamp = {Mon, 07 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DodisY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DodisGSX21a, author = {Yevgeniy Dodis and Siyao Guo and Noah Stephens{-}Davidowitz and Zhiye Xie}, title = {Online Linear Extractors for Independent Sources}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1002}, year = {2021}, url = {https://eprint.iacr.org/2021/1002}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DodisGSX21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlwenCDT21, author = {Jo{\"{e}}l Alwen and Sandro Coretti and Yevgeniy Dodis and Yiannis Tselekounis}, title = {Modular Design of Secure Group Messaging Protocols and the Security of {MLS}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1083}, year = {2021}, url = {https://eprint.iacr.org/2021/1083}, timestamp = {Mon, 06 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlwenCDT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DodisQW21, author = {Yevgeniy Dodis and Willy Quach and Daniel Wichs}, title = {Speak Much, Remember Little: Cryptography in the Bounded Storage Model, Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1270}, year = {2021}, url = {https://eprint.iacr.org/2021/1270}, timestamp = {Mon, 25 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DodisQW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BienstockDT21, author = {Alexander Bienstock and Yevgeniy Dodis and Yi Tang}, title = {Multicast Key Agreement, Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1570}, year = {2021}, url = {https://eprint.iacr.org/2021/1570}, timestamp = {Fri, 10 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BienstockDT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/CorettiDMTV20, author = {Sandro Coretti and Yevgeniy Dodis and Ueli Maurer and Bj{\"{o}}rn Tackmann and Daniele Venturi}, title = {Non-malleable Encryption: Simpler, Shorter, Stronger}, journal = {J. Cryptol.}, volume = {33}, number = {4}, pages = {1984--2033}, year = {2020}, url = {https://doi.org/10.1007/s00145-020-09361-0}, doi = {10.1007/S00145-020-09361-0}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/CorettiDMTV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AlwenCDT20, author = {Jo{\"{e}}l Alwen and Sandro Coretti and Yevgeniy Dodis and Yiannis Tselekounis}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {Security Analysis and Improvements for the {IETF} {MLS} Standard for Group Messaging}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12170}, pages = {248--277}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56784-2\_9}, doi = {10.1007/978-3-030-56784-2\_9}, timestamp = {Wed, 12 Aug 2020 14:16:56 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AlwenCDT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DodisVW20, author = {Yevgeniy Dodis and Vinod Vaikuntanathan and Daniel Wichs}, editor = {Anne Canteaut and Yuval Ishai}, title = {Extracting Randomness from Extractor-Dependent Sources}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12105}, pages = {313--342}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45721-1\_12}, doi = {10.1007/978-3-030-45721-1\_12}, timestamp = {Mon, 04 May 2020 14:27:11 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DodisVW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/BienstockDR20, author = {Alexander Bienstock and Yevgeniy Dodis and Paul R{\"{o}}sler}, editor = {Rafael Pass and Krzysztof Pietrzak}, title = {On the Price of Concurrency in Group Ratcheting Protocols}, booktitle = {Theory of Cryptography - 18th International Conference, {TCC} 2020, Durham, NC, USA, November 16-19, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12551}, pages = {198--228}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64378-2\_8}, doi = {10.1007/978-3-030-64378-2\_8}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/BienstockDR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/DodisFMT20, author = {Yevgeniy Dodis and Pooya Farshim and Sogol Mazaheri and Stefano Tessaro}, editor = {Rafael Pass and Krzysztof Pietrzak}, title = {Towards Defeating Backdoored Random Oracles: Indifferentiability with Bounded Adaptivity}, booktitle = {Theory of Cryptography - 18th International Conference, {TCC} 2020, Durham, NC, USA, November 16-19, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12552}, pages = {241--273}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64381-2\_9}, doi = {10.1007/978-3-030-64381-2\_9}, timestamp = {Tue, 15 Dec 2020 12:05:01 +0100}, biburl = {https://dblp.org/rec/conf/tcc/DodisFMT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BienstockDR20, author = {Alexander Bienstock and Yevgeniy Dodis and Paul R{\"{o}}sler}, title = {On the Price of Concurrency in Group Ratcheting Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1171}, year = {2020}, url = {https://eprint.iacr.org/2020/1171}, timestamp = {Wed, 30 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BienstockDR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DodisFMT20, author = {Yevgeniy Dodis and Pooya Farshim and Sogol Mazaheri and Stefano Tessaro}, title = {Towards Defeating Backdoored Random Oracles: Indifferentiability with Bounded Adaptivity}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1199}, year = {2020}, url = {https://eprint.iacr.org/2020/1199}, timestamp = {Fri, 30 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/DodisFMT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CorettiDKT19, author = {Sandro Coretti and Yevgeniy Dodis and Harish Karthikeyan and Stefano Tessaro}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Seedless Fruit Is the Sweetest: Random Number Generation, Revisited}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11692}, pages = {205--234}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26948-7\_8}, doi = {10.1007/978-3-030-26948-7\_8}, timestamp = {Fri, 09 Aug 2019 14:20:22 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CorettiDKT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ChaseDIKLOV19, author = {Melissa Chase and Yevgeniy Dodis and Yuval Ishai and Daniel Kraschewski and Tianren Liu and Rafail Ostrovsky and Vinod Vaikuntanathan}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Reusable Non-Interactive Secure Computation}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11694}, pages = {462--488}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26954-8\_15}, doi = {10.1007/978-3-030-26954-8\_15}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/ChaseDIKLOV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AlwenCD19, author = {Jo{\"{e}}l Alwen and Sandro Coretti and Yevgeniy Dodis}, editor = {Yuval Ishai and Vincent Rijmen}, title = {The Double Ratchet: Security Notions, Proofs, and Modularization for the Signal Protocol}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11476}, pages = {129--158}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17653-2\_5}, doi = {10.1007/978-3-030-17653-2\_5}, timestamp = {Tue, 14 May 2019 13:47:56 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AlwenCD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DodisGRW19, author = {Yevgeniy Dodis and Paul Grubbs and Thomas Ristenpart and Joanne Woodage}, title = {Fast Message Franking: From Invisible Salamanders to Encryptment}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {16}, year = {2019}, url = {https://eprint.iacr.org/2019/016}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DodisGRW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CorettiDKT19, author = {Sandro Coretti and Yevgeniy Dodis and Harish Karthikeyan and Stefano Tessaro}, title = {Seedless Fruit is the Sweetest: Random Number Generation, Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {198}, year = {2019}, url = {https://eprint.iacr.org/2019/198}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CorettiDKT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlwenCDT19, author = {Jo{\"{e}}l Alwen and Sandro Coretti and Yevgeniy Dodis and Yiannis Tselekounis}, title = {Security Analysis and Improvements for the {IETF} {MLS} Standard for Group Messaging}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1189}, year = {2019}, url = {https://eprint.iacr.org/2019/1189}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlwenCDT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DodisVW19, author = {Yevgeniy Dodis and Vinod Vaikuntanathan and Daniel Wichs}, title = {Extracting Randomness from Extractor-Dependent Sources}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1339}, year = {2019}, url = {https://eprint.iacr.org/2019/1339}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DodisVW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamcomp/AggarwalDL18, author = {Divesh Aggarwal and Yevgeniy Dodis and Shachar Lovett}, title = {Non-Malleable Codes from Additive Combinatorics}, journal = {{SIAM} J. Comput.}, volume = {47}, number = {2}, pages = {524--546}, year = {2018}, url = {https://doi.org/10.1137/140985251}, doi = {10.1137/140985251}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/siamcomp/AggarwalDL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DodisGRW18, author = {Yevgeniy Dodis and Paul Grubbs and Thomas Ristenpart and Joanne Woodage}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {Fast Message Franking: From Invisible Salamanders to Encryptment}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10991}, pages = {155--186}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96884-1\_6}, doi = {10.1007/978-3-319-96884-1\_6}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DodisGRW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CorettiDG18, author = {Sandro Coretti and Yevgeniy Dodis and Siyao Guo}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {Non-Uniform Bounds in the Random-Permutation, Ideal-Cipher, and Generic-Group Models}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10991}, pages = {693--721}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96884-1\_23}, doi = {10.1007/978-3-319-96884-1\_23}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CorettiDG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CogliatiDKLSTZ18, author = {Beno{\^{\i}}t Cogliati and Yevgeniy Dodis and Jonathan Katz and Jooyoung Lee and John P. Steinberger and Aishwarya Thiruvengadam and Zhe Zhang}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {Provable Security of (Tweakable) Block Ciphers Based on Substitution-Permutation Networks}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10991}, pages = {722--753}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96884-1\_24}, doi = {10.1007/978-3-319-96884-1\_24}, timestamp = {Mon, 06 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/CogliatiDKLSTZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CorettiDGS18, author = {Sandro Coretti and Yevgeniy Dodis and Siyao Guo and John P. Steinberger}, editor = {Jesper Buus Nielsen and Vincent Rijmen}, title = {Random Oracles and Non-uniformity}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10820}, pages = {227--258}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-78381-9\_9}, doi = {10.1007/978-3-319-78381-9\_9}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CorettiDGS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CorettiDG18, author = {Sandro Coretti and Yevgeniy Dodis and Siyao Guo}, title = {Non-Uniform Bounds in the Random-Permutation, Ideal-Cipher, and Generic-Group Models}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {226}, year = {2018}, url = {http://eprint.iacr.org/2018/226}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CorettiDG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChaseDIKLOV18, author = {Melissa Chase and Yevgeniy Dodis and Yuval Ishai and Daniel Kraschewski and Tianren Liu and Rafail Ostrovsky and Vinod Vaikuntanathan}, title = {Reusable Non-Interactive Secure Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {940}, year = {2018}, url = {https://eprint.iacr.org/2018/940}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChaseDIKLOV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlwenCD18, author = {Jo{\"{e}}l Alwen and Sandro Coretti and Yevgeniy Dodis}, title = {The Double Ratchet: Security Notions, Proofs, and Modularization for the Signal Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1037}, year = {2018}, url = {https://eprint.iacr.org/2018/1037}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlwenCD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/algorithmica/DodisSSW17, author = {Yevgeniy Dodis and Adi Shamir and Noah Stephens{-}Davidowitz and Daniel Wichs}, title = {How to Eat Your Entropy and Have it Too: Optimal Recovery Strategies for Compromised RNGs}, journal = {Algorithmica}, volume = {79}, number = {4}, pages = {1196--1232}, year = {2017}, url = {https://doi.org/10.1007/s00453-016-0239-3}, doi = {10.1007/S00453-016-0239-3}, timestamp = {Mon, 09 Oct 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/algorithmica/DodisSSW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ciss/Dodis17, author = {Yevgeniy Dodis}, title = {Basing cryptography on biometrics and other noisy data}, booktitle = {51st Annual Conference on Information Sciences and Systems, {CISS} 2017, Baltimore, MD, USA, March 22-24, 2017}, pages = {1}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CISS.2017.7926183}, doi = {10.1109/CISS.2017.7926183}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/ciss/Dodis17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/WoodageCDJR17, author = {Joanne Woodage and Rahul Chatterjee and Yevgeniy Dodis and Ari Juels and Thomas Ristenpart}, editor = {Jonathan Katz and Hovav Shacham}, title = {A New Distribution-Sensitive Secure Sketch and Popularity-Proportional Hashing}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10403}, pages = {682--710}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63697-9\_23}, doi = {10.1007/978-3-319-63697-9\_23}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/WoodageCDJR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DodisGK17, author = {Yevgeniy Dodis and Siyao Guo and Jonathan Katz}, editor = {Jean{-}S{\'{e}}bastien Coron and Jesper Buus Nielsen}, title = {Fixing Cracks in the Concrete: Random Oracles with Auxiliary Input, Revisited}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10211}, pages = {473--495}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-56614-6\_16}, doi = {10.1007/978-3-319-56614-6\_16}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DodisGK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/DodisF17, author = {Yevgeniy Dodis and Dario Fiore}, editor = {Aggelos Kiayias}, title = {Unilaterally-Authenticated Key Exchange}, booktitle = {Financial Cryptography and Data Security - 21st International Conference, {FC} 2017, Sliema, Malta, April 3-7, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10322}, pages = {542--560}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70972-7\_31}, doi = {10.1007/978-3-319-70972-7\_31}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/DodisF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DodisKSTZ17, author = {Yevgeniy Dodis and Jonathan Katz and John P. Steinberger and Aishwarya Thiruvengadam and Zhe Zhang}, title = {Provable Security of Substitution-Permutation Networks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {16}, year = {2017}, url = {http://eprint.iacr.org/2017/016}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DodisKSTZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DodisF17, author = {Yevgeniy Dodis and Dario Fiore}, title = {Unilaterally-Authenticated Key Exchange}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {109}, year = {2017}, url = {http://eprint.iacr.org/2017/109}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DodisF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WoodageCDJR17, author = {Joanne Woodage and Rahul Chatterjee and Yevgeniy Dodis and Ari Juels and Thomas Ristenpart}, title = {A New Distribution Sensitive Secure Sketch and a Comparison Between Approaches to Typo-Tolerant Authentication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {542}, year = {2017}, url = {http://eprint.iacr.org/2017/542}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WoodageCDJR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CorettiDGS17, author = {Sandro Coretti and Yevgeniy Dodis and Siyao Guo and John P. Steinberger}, title = {Random Oracles and Non-Uniformity}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {937}, year = {2017}, url = {http://eprint.iacr.org/2017/937}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CorettiDGS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DodisHRW16, author = {Yevgeniy Dodis and Shai Halevi and Ron D. Rothblum and Daniel Wichs}, editor = {Matthew Robshaw and Jonathan Katz}, title = {Spooky Encryption and Its Applications}, booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {9816}, pages = {93--122}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53015-3\_4}, doi = {10.1007/978-3-662-53015-3\_4}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DodisHRW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DodisMS16, author = {Yevgeniy Dodis and Ilya Mironov and Noah Stephens{-}Davidowitz}, editor = {Matthew Robshaw and Jonathan Katz}, title = {Message Transmission with Reverse Firewalls - Secure Communication on Corrupted Machines}, booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9814}, pages = {341--372}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53018-4\_13}, doi = {10.1007/978-3-662-53018-4\_13}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DodisMS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DodisSSL16, author = {Yevgeniy Dodis and Martijn Stam and John P. Steinberger and Tianren Liu}, editor = {Marc Fischlin and Jean{-}S{\'{e}}bastien Coron}, title = {Indifferentiability of Confusion-Diffusion Networks}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9666}, pages = {679--704}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49896-5\_24}, doi = {10.1007/978-3-662-49896-5\_24}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/DodisSSL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/CorettiDTV16, author = {Sandro Coretti and Yevgeniy Dodis and Bj{\"{o}}rn Tackmann and Daniele Venturi}, editor = {Eyal Kushilevitz and Tal Malkin}, title = {Non-Malleable Encryption: Simpler, Shorter, Stronger}, booktitle = {Theory of Cryptography - 13th International Conference, {TCC} 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9562}, pages = {306--335}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49096-9\_13}, doi = {10.1007/978-3-662-49096-9\_13}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/CorettiDTV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/BishopD16, author = {Allison Bishop and Yevgeniy Dodis}, editor = {Eyal Kushilevitz and Tal Malkin}, title = {Interactive Coding for Interactive Proofs}, booktitle = {Theory of Cryptography - 13th International Conference, {TCC} 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9563}, pages = {352--366}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49099-0\_13}, doi = {10.1007/978-3-662-49099-0\_13}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/BishopD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DodisHRW16, author = {Yevgeniy Dodis and Shai Halevi and Ron D. Rothblum and Daniel Wichs}, title = {Spooky Encryption and its Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {272}, year = {2016}, url = {http://eprint.iacr.org/2016/272}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DodisHRW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DodisGGJR16, author = {Yevgeniy Dodis and Chaya Ganesh and Alexander Golovnev and Ari Juels and Thomas Ristenpart}, title = {A Formal Treatment of Backdoored Pseudorandom Generators}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {306}, year = {2016}, url = {http://eprint.iacr.org/2016/306}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DodisGGJR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DodisY15, author = {Yevgeniy Dodis and Yanqing Yao}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Privacy with Imperfect Randomness}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9216}, pages = {463--482}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48000-7\_23}, doi = {10.1007/978-3-662-48000-7\_23}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DodisY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DodisGGJR15, author = {Yevgeniy Dodis and Chaya Ganesh and Alexander Golovnev and Ari Juels and Thomas Ristenpart}, editor = {Elisabeth Oswald and Marc Fischlin}, title = {A Formal Treatment of Backdoored Pseudorandom Generators}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9056}, pages = {101--126}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46800-5\_5}, doi = {10.1007/978-3-662-46800-5\_5}, timestamp = {Thu, 14 Oct 2021 09:58:16 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DodisGGJR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/AggarwalDKO15, author = {Divesh Aggarwal and Yevgeniy Dodis and Tomasz Kazana and Maciej Obremski}, editor = {Rocco A. Servedio and Ronitt Rubinfeld}, title = {Non-malleable Reductions and Applications}, booktitle = {Proceedings of the Forty-Seventh Annual {ACM} on Symposium on Theory of Computing, {STOC} 2015, Portland, OR, USA, June 14-17, 2015}, pages = {459--468}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2746539.2746544}, doi = {10.1145/2746539.2746544}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/AggarwalDKO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/tcc/2015-1, editor = {Yevgeniy Dodis and Jesper Buus Nielsen}, title = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC} 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9014}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46494-6}, doi = {10.1007/978-3-662-46494-6}, isbn = {978-3-662-46493-9}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/2015-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/tcc/2015-2, editor = {Yevgeniy Dodis and Jesper Buus Nielsen}, title = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC} 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9015}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46497-7}, doi = {10.1007/978-3-662-46497-7}, isbn = {978-3-662-46496-0}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/2015-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DodisMS15, author = {Yevgeniy Dodis and Ilya Mironov and Noah Stephens{-}Davidowitz}, title = {Message Transmission with Reverse Firewalls - Secure Communication on Corrupted Machines}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {548}, year = {2015}, url = {http://eprint.iacr.org/2015/548}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DodisMS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DodisLSS15, author = {Yevgeniy Dodis and Tianren Liu and Martijn Stam and John P. Steinberger}, title = {Indifferentiability of Confusion-Diffusion Networks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {680}, year = {2015}, url = {http://eprint.iacr.org/2015/680}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DodisLSS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CorettiDTV15, author = {Sandro Coretti and Yevgeniy Dodis and Bj{\"{o}}rn Tackmann and Daniele Venturi}, title = {Non-Malleable Encryption: Simpler, Shorter, Stronger}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {772}, year = {2015}, url = {http://eprint.iacr.org/2015/772}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CorettiDTV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamcomp/DodisLWZ14, author = {Yevgeniy Dodis and Xin Li and Trevor D. Wooley and David Zuckerman}, title = {Privacy Amplification and Nonmalleable Extractors Via Character Sums}, journal = {{SIAM} J. Comput.}, volume = {43}, number = {2}, pages = {800--830}, year = {2014}, url = {https://doi.org/10.1137/120868414}, doi = {10.1137/120868414}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/siamcomp/DodisLWZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DodisSSW14, author = {Yevgeniy Dodis and Adi Shamir and Noah Stephens{-}Davidowitz and Daniel Wichs}, editor = {Juan A. Garay and Rosario Gennaro}, title = {How to Eat Your Entropy and Have It Too - Optimal Recovery Strategies for Compromised RNGs}, booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8617}, pages = {37--54}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44381-1\_3}, doi = {10.1007/978-3-662-44381-1\_3}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DodisSSW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AggarwalDJMR14, author = {Divesh Aggarwal and Yevgeniy Dodis and Zahra Jafargholi and Eric Miles and Leonid Reyzin}, editor = {Juan A. Garay and Rosario Gennaro}, title = {Amplifying Privacy in Privacy Amplification}, booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8617}, pages = {183--198}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44381-1\_11}, doi = {10.1007/978-3-662-44381-1\_11}, timestamp = {Wed, 03 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AggarwalDJMR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DodisPW14, author = {Yevgeniy Dodis and Krzysztof Pietrzak and Daniel Wichs}, editor = {Phong Q. Nguyen and Elisabeth Oswald}, title = {Key Derivation without Entropy Waste}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8441}, pages = {93--110}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-55220-5\_6}, doi = {10.1007/978-3-642-55220-5\_6}, timestamp = {Thu, 14 Oct 2021 09:58:16 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DodisPW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/DodisF14, author = {Yevgeniy Dodis and Dario Fiore}, editor = {Michel Abdalla and Roberto De Prisco}, title = {Interactive Encryption and Message Authentication}, booktitle = {Security and Cryptography for Networks - 9th International Conference, {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8642}, pages = {494--513}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10879-7\_28}, doi = {10.1007/978-3-319-10879-7\_28}, timestamp = {Thu, 23 Jun 2022 19:58:57 +0200}, biburl = {https://dblp.org/rec/conf/scn/DodisF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/AggarwalDL14, author = {Divesh Aggarwal and Yevgeniy Dodis and Shachar Lovett}, editor = {David B. Shmoys}, title = {Non-malleable codes from additive combinatorics}, booktitle = {Symposium on Theory of Computing, {STOC} 2014, New York, NY, USA, May 31 - June 03, 2014}, pages = {774--783}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2591796.2591804}, doi = {10.1145/2591796.2591804}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/AggarwalDL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/AggarwalDKO14, author = {Divesh Aggarwal and Yevgeniy Dodis and Tomasz Kazana and Maciej Obremski}, title = {Non-malleable Reductions and Applications}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR14-128}}, year = {2014}, url = {https://eccc.weizmann.ac.il/report/2014/128}, eprinttype = {ECCC}, eprint = {TR14-128}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/AggarwalDKO14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DodisSSW14, author = {Yevgeniy Dodis and Adi Shamir and Noah Stephens{-}Davidowitz and Daniel Wichs}, title = {How to Eat Your Entropy and Have it Too - Optimal Recovery Strategies for Compromised RNGs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {167}, year = {2014}, url = {http://eprint.iacr.org/2014/167}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DodisSSW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DodisY14, author = {Yevgeniy Dodis and Yanqing Yao}, title = {Privacy and Imperfect Randomness}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {623}, year = {2014}, url = {http://eprint.iacr.org/2014/623}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DodisY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AggarwalDKO14a, author = {Divesh Aggarwal and Yevgeniy Dodis and Tomasz Kazana and Maciej Obremski}, title = {Non-malleable Reductions and Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {821}, year = {2014}, url = {http://eprint.iacr.org/2014/821}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AggarwalDKO14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DodisL14, author = {Yevgeniy Dodis and Allison Bishop Lewko}, title = {Interactive Coding for Interactive Proofs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {827}, year = {2014}, url = {http://eprint.iacr.org/2014/827}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DodisL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/AgrawalDVW13, author = {Shweta Agrawal and Yevgeniy Dodis and Vinod Vaikuntanathan and Daniel Wichs}, editor = {Kazue Sako and Palash Sarkar}, title = {On Continual Leakage of Discrete Log Representations}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2013 - 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8270}, pages = {401--420}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-42045-0\_21}, doi = {10.1007/978-3-642-42045-0\_21}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/AgrawalDVW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DodisPRVW13, author = {Yevgeniy Dodis and David Pointcheval and Sylvain Ruhault and Damien Vergnaud and Daniel Wichs}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Security analysis of pseudo-random number generators with input: /dev/random is not robust}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {647--658}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516653}, doi = {10.1145/2508859.2516653}, timestamp = {Tue, 10 Nov 2020 19:58:06 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DodisPRVW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AndreevaBDMS13, author = {Elena Andreeva and Andrey Bogdanov and Yevgeniy Dodis and Bart Mennink and John P. Steinberger}, editor = {Ran Canetti and Juan A. Garay}, title = {On the Indifferentiability of Key-Alternating Ciphers}, booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8042}, pages = {531--550}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40041-4\_29}, doi = {10.1007/978-3-642-40041-4\_29}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AndreevaBDMS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/DodisY13, author = {Yevgeniy Dodis and Yu Yu}, editor = {Amit Sahai}, title = {Overcoming Weak Expectations}, booktitle = {Theory of Cryptography - 10th Theory of Cryptography Conference, {TCC} 2013, Tokyo, Japan, March 3-6, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7785}, pages = {1--22}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36594-2\_1}, doi = {10.1007/978-3-642-36594-2\_1}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/DodisY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/AggarwalDL13, author = {Divesh Aggarwal and Yevgeniy Dodis and Shachar Lovett}, title = {Non-malleable Codes from Additive Combinatorics}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR13-081}}, year = {2013}, url = {https://eccc.weizmann.ac.il/report/2013/081}, eprinttype = {ECCC}, eprint = {TR13-081}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/AggarwalDL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AndreevaBDMS13, author = {Elena Andreeva and Andrey Bogdanov and Yevgeniy Dodis and Bart Mennink and John P. Steinberger}, title = {On the Indifferentiability of Key-Alternating Ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {61}, year = {2013}, url = {http://eprint.iacr.org/2013/061}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AndreevaBDMS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AggarwalDL13, author = {Divesh Aggarwal and Yevgeniy Dodis and Shachar Lovett}, title = {Non-malleable Codes from Additive Combinatorics}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {201}, year = {2013}, url = {http://eprint.iacr.org/2013/201}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AggarwalDL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DodisPRVW13, author = {Yevgeniy Dodis and David Pointcheval and Sylvain Ruhault and Damien Vergnaud and Daniel Wichs}, title = {Security Analysis of Pseudo-Random Number Generators with Input: /dev/random is not Robust}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {338}, year = {2013}, url = {http://eprint.iacr.org/2013/338}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DodisPRVW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DodisRST13, author = {Yevgeniy Dodis and Thomas Ristenpart and John P. Steinberger and Stefano Tessaro}, title = {To Hash or Not to Hash Again? (In)differentiability Results for H\({}^{\mbox{2}}\) and {HMAC}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {382}, year = {2013}, url = {http://eprint.iacr.org/2013/382}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DodisRST13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DodisPW13, author = {Yevgeniy Dodis and Krzysztof Pietrzak and Daniel Wichs}, title = {Key Derivation Without Entropy Waste}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {708}, year = {2013}, url = {http://eprint.iacr.org/2013/708}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DodisPW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AggarwalDJMR13, author = {Divesh Aggarwal and Yevgeniy Dodis and Zahra Jafargholi and Eric Miles and Leonid Reyzin}, title = {Amplifying Privacy in Privacy Amplification}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {723}, year = {2013}, url = {http://eprint.iacr.org/2013/723}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AggarwalDJMR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DodisF13, author = {Yevgeniy Dodis and Dario Fiore}, title = {Interactive Encryption, Message Authentication, and Anonymous Key Exchange}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {817}, year = {2013}, url = {http://eprint.iacr.org/2013/817}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DodisF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/networks/ColeDR12, author = {Richard Cole and Yevgeniy Dodis and Tim Roughgarden}, title = {Bottleneck links, variable demand, and the tragedy of the commons}, journal = {Networks}, volume = {60}, number = {3}, pages = {194--203}, year = {2012}, url = {https://doi.org/10.1002/net.21458}, doi = {10.1002/NET.21458}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/networks/ColeDR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/DodisKKRS12, author = {Yevgeniy Dodis and Bhavana Kanukurthi and Jonathan Katz and Leonid Reyzin and Adam D. Smith}, title = {Robust Fuzzy Extractors and Authenticated Key Agreement From Close Secrets}, journal = {{IEEE} Trans. Inf. Theory}, volume = {58}, number = {9}, pages = {6207--6222}, year = {2012}, url = {https://doi.org/10.1109/TIT.2012.2200290}, doi = {10.1109/TIT.2012.2200290}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/DodisKKRS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DodisLXY12, author = {Yevgeniy Dodis and Weiliang Luo and Shouhuai Xu and Moti Yung}, editor = {Heung Youl Youm and Yoojae Won}, title = {Key-insulated symmetric key cryptography and mitigating attacks against cryptographic cloud software}, booktitle = {7th {ACM} Symposium on Information, Compuer and Communications Security, {ASIACCS} '12, Seoul, Korea, May 2-4, 2012}, pages = {57--58}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2414456.2414489}, doi = {10.1145/2414456.2414489}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DodisLXY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DodisRST12, author = {Yevgeniy Dodis and Thomas Ristenpart and John P. Steinberger and Stefano Tessaro}, editor = {Reihaneh Safavi{-}Naini and Ran Canetti}, title = {To Hash or Not to Hash Again? (In)Differentiability Results for {H} 2 and {HMAC}}, booktitle = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7417}, pages = {348--366}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32009-5\_21}, doi = {10.1007/978-3-642-32009-5\_21}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DodisRST12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DodisLMV12, author = {Yevgeniy Dodis and Adriana L{\'{o}}pez{-}Alt and Ilya Mironov and Salil P. Vadhan}, editor = {Reihaneh Safavi{-}Naini and Ran Canetti}, title = {Differential Privacy with Imperfect Randomness}, booktitle = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7417}, pages = {497--516}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32009-5\_29}, doi = {10.1007/978-3-642-32009-5\_29}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/DodisLMV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DodisKPW12, author = {Yevgeniy Dodis and Eike Kiltz and Krzysztof Pietrzak and Daniel Wichs}, editor = {David Pointcheval and Thomas Johansson}, title = {Message Authentication, Revisited}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7237}, pages = {355--374}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29011-4\_22}, doi = {10.1007/978-3-642-29011-4\_22}, timestamp = {Sun, 12 Nov 2023 02:15:08 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/DodisKPW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/Dodis12, author = {Yevgeniy Dodis}, editor = {Adam D. Smith}, title = {Shannon Impossibility, Revisited}, booktitle = {Information Theoretic Security - 6th International Conference, {ICITS} 2012, Montreal, QC, Canada, August 15-17, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7412}, pages = {100--110}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32284-6\_6}, doi = {10.1007/978-3-642-32284-6\_6}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/icits/Dodis12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itw/DodisY12, author = {Yevgeniy Dodis and Yu Yu}, title = {Overcoming weak expectations}, booktitle = {2012 {IEEE} Information Theory Workshop, Lausanne, Switzerland, September 3-7, 2012}, pages = {109--113}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/ITW.2012.6404636}, doi = {10.1109/ITW.2012.6404636}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/itw/DodisY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/DodisHT12, author = {Yevgeniy Dodis and Iftach Haitner and Aris Tentes}, editor = {Ronald Cramer}, title = {On the Instantiability of Hash-and-Sign {RSA} Signatures}, booktitle = {Theory of Cryptography - 9th Theory of Cryptography Conference, {TCC} 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7194}, pages = {112--132}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-28914-9\_7}, doi = {10.1007/978-3-642-28914-9\_7}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/DodisHT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/DodisJMW12, author = {Yevgeniy Dodis and Abhishek Jain and Tal Moran and Daniel Wichs}, editor = {Ronald Cramer}, title = {Counterexamples to Hardness Amplification beyond Negligible}, booktitle = {Theory of Cryptography - 9th Theory of Cryptography Conference, {TCC} 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7194}, pages = {476--493}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-28914-9\_27}, doi = {10.1007/978-3-642-28914-9\_27}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/DodisJMW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/DodisRV12, author = {Yevgeniy Dodis and Thomas Ristenpart and Salil P. Vadhan}, editor = {Ronald Cramer}, title = {Randomness Condensers for Efficiently Samplable, Seed-Dependent Sources}, booktitle = {Theory of Cryptography - 9th Theory of Cryptography Conference, {TCC} 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7194}, pages = {618--635}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-28914-9\_35}, doi = {10.1007/978-3-642-28914-9\_35}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/DodisRV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DodisJMW12, author = {Yevgeniy Dodis and Abhishek Jain and Tal Moran and Daniel Wichs}, title = {Counterexamples to Hardness Amplification Beyond Negligible}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {32}, year = {2012}, url = {http://eprint.iacr.org/2012/032}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DodisJMW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Dodis12, author = {Yevgeniy Dodis}, title = {Beating Shannon requires {BOTH} efficient adversaries {AND} non-zero advantage}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {53}, year = {2012}, url = {http://eprint.iacr.org/2012/053}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Dodis12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DodisKPW12, author = {Yevgeniy Dodis and Eike Kiltz and Krzysztof Pietrzak and Daniel Wichs}, title = {Message Authentication, Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {59}, year = {2012}, url = {http://eprint.iacr.org/2012/059}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DodisKPW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrawalDVW12, author = {Shweta Agrawal and Yevgeniy Dodis and Vinod Vaikuntanathan and Daniel Wichs}, title = {On Continual Leakage of Discrete Log Representations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {367}, year = {2012}, url = {http://eprint.iacr.org/2012/367}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AgrawalDVW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DodisLMV12, author = {Yevgeniy Dodis and Adriana L{\'{o}}pez{-}Alt and Ilya Mironov and Salil P. Vadhan}, title = {Differential Privacy with Imperfect Randomness}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {435}, year = {2012}, url = {http://eprint.iacr.org/2012/435}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DodisLMV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BarakDKPPSY11, author = {Boaz Barak and Yevgeniy Dodis and Hugo Krawczyk and Olivier Pereira and Krzysztof Pietrzak and Fran{\c{c}}ois{-}Xavier Standaert and Yu Yu}, editor = {Phillip Rogaway}, title = {Leftover Hash Lemma, Revisited}, booktitle = {Advances in Cryptology - {CRYPTO} 2011 - 31st Annual Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6841}, pages = {1--20}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22792-9\_1}, doi = {10.1007/978-3-642-22792-9\_1}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BarakDKPPSY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DodisS11, author = {Yevgeniy Dodis and John P. Steinberger}, editor = {Kenneth G. Paterson}, title = {Domain Extension for MACs Beyond the Birthday Barrier}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6632}, pages = {323--342}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20465-4\_19}, doi = {10.1007/978-3-642-20465-4\_19}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DodisS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/DodisLWZ11, author = {Yevgeniy Dodis and Xin Li and Trevor D. Wooley and David Zuckerman}, editor = {Rafail Ostrovsky}, title = {Privacy Amplification and Non-malleable Extractors via Character Sums}, booktitle = {{IEEE} 52nd Annual Symposium on Foundations of Computer Science, {FOCS} 2011, Palm Springs, CA, USA, October 22-25, 2011}, pages = {668--677}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/FOCS.2011.67}, doi = {10.1109/FOCS.2011.67}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/focs/DodisLWZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/DodisLWW11, author = {Yevgeniy Dodis and Allison B. Lewko and Brent Waters and Daniel Wichs}, editor = {Rafail Ostrovsky}, title = {Storing Secrets on Continually Leaky Devices}, booktitle = {{IEEE} 52nd Annual Symposium on Foundations of Computer Science, {FOCS} 2011, Palm Springs, CA, USA, October 22-25, 2011}, pages = {688--697}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/FOCS.2011.35}, doi = {10.1109/FOCS.2011.35}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/DodisLWW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Dodis11, author = {Yevgeniy Dodis}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Signcryption}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {1210--1215}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_156}, doi = {10.1007/978-1-4419-5906-5\_156}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Dodis11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DodisHT11, author = {Yevgeniy Dodis and Iftach Haitner and Aris Tentes}, title = {On the (In)Security of {RSA} Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {87}, year = {2011}, url = {http://eprint.iacr.org/2011/087}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DodisHT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BarakDKPPSY11, author = {Boaz Barak and Yevgeniy Dodis and Hugo Krawczyk and Olivier Pereira and Krzysztof Pietrzak and Fran{\c{c}}ois{-}Xavier Standaert and Yu Yu}, title = {Leftover Hash Lemma, Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {88}, year = {2011}, url = {http://eprint.iacr.org/2011/088}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BarakDKPPSY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DodisLWW11, author = {Yevgeniy Dodis and Allison B. Lewko and Brent Waters and Daniel Wichs}, title = {Storing Secrets on Continually Leaky Devices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {369}, year = {2011}, url = {http://eprint.iacr.org/2011/369}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DodisLWW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/DodisHLW10, author = {Yevgeniy Dodis and Kristiyan Haralambiev and Adriana L{\'{o}}pez{-}Alt and Daniel Wichs}, editor = {Masayuki Abe}, title = {Efficient Public-Key Cryptography in the Presence of Key Leakage}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6477}, pages = {613--631}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17373-8\_35}, doi = {10.1007/978-3-642-17373-8\_35}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/DodisHLW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChowDRW10, author = {Sherman S. M. Chow and Yevgeniy Dodis and Yannis Rouselakis and Brent Waters}, editor = {Ehab Al{-}Shaer and Angelos D. Keromytis and Vitaly Shmatikov}, title = {Practical leakage-resilient identity-based encryption from simple assumptions}, booktitle = {Proceedings of the 17th {ACM} Conference on Computer and Communications Security, {CCS} 2010, Chicago, Illinois, USA, October 4-8, 2010}, pages = {152--161}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1866307.1866325}, doi = {10.1145/1866307.1866325}, timestamp = {Tue, 10 Nov 2020 20:00:21 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ChowDRW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DodisP10, author = {Yevgeniy Dodis and Krzysztof Pietrzak}, editor = {Tal Rabin}, title = {Leakage-Resilient Pseudorandom Functions and Side-Channel Attacks on Feistel Networks}, booktitle = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6223}, pages = {21--40}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14623-7\_2}, doi = {10.1007/978-3-642-14623-7\_2}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DodisP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AlwenDNSWW10, author = {Jo{\"{e}}l Alwen and Yevgeniy Dodis and Moni Naor and Gil Segev and Shabsi Walfish and Daniel Wichs}, editor = {Henri Gilbert}, title = {Public-Key Encryption in the Bounded-Retrieval Model}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30 - June 3, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6110}, pages = {113--134}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13190-5\_6}, doi = {10.1007/978-3-642-13190-5\_6}, timestamp = {Sun, 16 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AlwenDNSWW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/DodisHLW10, author = {Yevgeniy Dodis and Kristiyan Haralambiev and Adriana L{\'{o}}pez{-}Alt and Daniel Wichs}, title = {Cryptography against Continuous Memory Attacks}, booktitle = {51th Annual {IEEE} Symposium on Foundations of Computer Science, {FOCS} 2010, October 23-26, 2010, Las Vegas, Nevada, {USA}}, pages = {511--520}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/FOCS.2010.56}, doi = {10.1109/FOCS.2010.56}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/DodisHLW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/DodisPT10, author = {Yevgeniy Dodis and Mihai P{u{a}}tra{c{s}}cu and Mikkel Thorup}, editor = {Leonard J. Schulman}, title = {Changing base without losing space}, booktitle = {Proceedings of the 42nd {ACM} Symposium on Theory of Computing, {STOC} 2010, Cambridge, Massachusetts, USA, 5-8 June 2010}, pages = {593--602}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1806689.1806771}, doi = {10.1145/1806689.1806771}, timestamp = {Mon, 26 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/DodisPT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/CoronDMS10, author = {Jean{-}S{\'{e}}bastien Coron and Yevgeniy Dodis and Avradip Mandal and Yannick Seurin}, editor = {Daniele Micciancio}, title = {A Domain Extender for the Ideal Cipher}, booktitle = {Theory of Cryptography, 7th Theory of Cryptography Conference, {TCC} 2010, Zurich, Switzerland, February 9-11, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5978}, pages = {273--289}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-11799-2\_17}, doi = {10.1007/978-3-642-11799-2\_17}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/CoronDMS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/DodisGKPV10, author = {Yevgeniy Dodis and Shafi Goldwasser and Yael Tauman Kalai and Chris Peikert and Vinod Vaikuntanathan}, editor = {Daniele Micciancio}, title = {Public-Key Encryption Schemes with Auxiliary Inputs}, booktitle = {Theory of Cryptography, 7th Theory of Cryptography Conference, {TCC} 2010, Zurich, Switzerland, February 9-11, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5978}, pages = {361--381}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-11799-2\_22}, doi = {10.1007/978-3-642-11799-2\_22}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/DodisGKPV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/Dodis10, author = {Yevgeniy Dodis}, editor = {Alexander W. Dent and Yuliang Zheng}, title = {Concealment and Its Applications to Authenticated Encryption}, booktitle = {Practical Signcryption}, series = {Information Security and Cryptography}, pages = {149--173}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-540-89411-7\_8}, doi = {10.1007/978-3-540-89411-7\_8}, timestamp = {Tue, 30 Nov 2021 15:21:24 +0100}, biburl = {https://dblp.org/rec/series/isc/Dodis10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DodisHLW10, author = {Yevgeniy Dodis and Kristiyan Haralambiev and Adriana L{\'{o}}pez{-}Alt and Daniel Wichs}, title = {Efficient Public-Key Cryptography in the Presence of Key Leakage}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {154}, year = {2010}, url = {http://eprint.iacr.org/2010/154}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DodisHLW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DodisHLW10a, author = {Yevgeniy Dodis and Kristiyan Haralambiev and Adriana L{\'{o}}pez{-}Alt and Daniel Wichs}, title = {Cryptography Against Continuous Memory Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {196}, year = {2010}, url = {http://eprint.iacr.org/2010/196}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DodisHLW10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DodisKKRS10, author = {Yevgeniy Dodis and Bhavana Kanukurthi and Jonathan Katz and Leonid Reyzin and Adam D. Smith}, title = {Robust Fuzzy Extractors and Authenticated Key Agreement from Close Secrets}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {456}, year = {2010}, url = {http://eprint.iacr.org/2010/456}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DodisKKRS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AlwenDW09, author = {Jo{\"{e}}l Alwen and Yevgeniy Dodis and Daniel Wichs}, editor = {Shai Halevi}, title = {Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model}, booktitle = {Advances in Cryptology - {CRYPTO} 2009, 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5677}, pages = {36--54}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03356-8\_3}, doi = {10.1007/978-3-642-03356-8\_3}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AlwenDW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DodisS09, author = {Yevgeniy Dodis and John P. Steinberger}, editor = {Shai Halevi}, title = {Message Authentication Codes from Unpredictable Block Ciphers}, booktitle = {Advances in Cryptology - {CRYPTO} 2009, 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5677}, pages = {267--285}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03356-8\_16}, doi = {10.1007/978-3-642-03356-8\_16}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DodisS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DodisRS09, author = {Yevgeniy Dodis and Thomas Ristenpart and Thomas Shrimpton}, editor = {Antoine Joux}, title = {Salvaging Merkle-Damg{\aa}rd for Practical Applications}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5479}, pages = {371--388}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-01001-9\_22}, doi = {10.1007/978-3-642-01001-9\_22}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DodisRS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/DodisRRS09, author = {Yevgeniy Dodis and Leonid Reyzin and Ronald L. Rivest and Emily Shen}, editor = {Orr Dunkelman}, title = {Indifferentiability of Permutation-Based Compression Functions and Tree-Based Modes of Operation, with Applications to {MD6}}, booktitle = {Fast Software Encryption, 16th International Workshop, {FSE} 2009, Leuven, Belgium, February 22-25, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5665}, pages = {104--121}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03317-9\_7}, doi = {10.1007/978-3-642-03317-9\_7}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/DodisRRS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/AlwenDW09, author = {Jo{\"{e}}l Alwen and Yevgeniy Dodis and Daniel Wichs}, editor = {Kaoru Kurosawa}, title = {Survey: Leakage Resilience and the Bounded Retrieval Model}, booktitle = {Information Theoretic Security, 4th International Conference, {ICITS} 2009, Shizuoka, Japan, December 3-6, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5973}, pages = {1--18}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-14496-7\_1}, doi = {10.1007/978-3-642-14496-7\_1}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/icits/AlwenDW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/DodisW09, author = {Yevgeniy Dodis and Daniel Wichs}, editor = {Michael Mitzenmacher}, title = {Non-malleable extractors and symmetric key cryptography from weak secrets}, booktitle = {Proceedings of the 41st Annual {ACM} Symposium on Theory of Computing, {STOC} 2009, Bethesda, MD, USA, May 31 - June 2, 2009}, pages = {601--610}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1536414.1536496}, doi = {10.1145/1536414.1536496}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/DodisW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/DodisKL09, author = {Yevgeniy Dodis and Yael Tauman Kalai and Shachar Lovett}, editor = {Michael Mitzenmacher}, title = {On cryptography with auxiliary input}, booktitle = {Proceedings of the 41st Annual {ACM} Symposium on Theory of Computing, {STOC} 2009, Bethesda, MD, USA, May 31 - June 2, 2009}, pages = {621--630}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1536414.1536498}, doi = {10.1145/1536414.1536498}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stoc/DodisKL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/DodisVW09, author = {Yevgeniy Dodis and Salil P. Vadhan and Daniel Wichs}, editor = {Omer Reingold}, title = {Proofs of Retrievability via Hardness Amplification}, booktitle = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC} 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5444}, pages = {109--127}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00457-5\_8}, doi = {10.1007/978-3-642-00457-5\_8}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/DodisVW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/DodisIJK09, author = {Yevgeniy Dodis and Russell Impagliazzo and Ragesh Jaiswal and Valentine Kabanets}, editor = {Omer Reingold}, title = {Security Amplification for InteractiveCryptographic Primitives}, booktitle = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC} 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5444}, pages = {128--145}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00457-5\_9}, doi = {10.1007/978-3-642-00457-5\_9}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/DodisIJK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/DodisKSW09, author = {Yevgeniy Dodis and Jonathan Katz and Adam D. Smith and Shabsi Walfish}, editor = {Omer Reingold}, title = {Composability and On-Line Deniability of Authentication}, booktitle = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC} 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5444}, pages = {146--162}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00457-5\_10}, doi = {10.1007/978-3-642-00457-5\_10}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/DodisKSW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ciss/YaoFDL09, author = {Danfeng (Daphne) Yao and Nelly Fazio and Yevgeniy Dodis and Anna Lysyanskaya}, editor = {Marc Joye and Gregory Neven}, title = {Forward-Secure Hierarchical {IBE} with Applications to Broadcast Encryption}, booktitle = {Identity-Based Cryptography}, series = {Cryptology and Information Security Series}, volume = {2}, pages = {100--118}, publisher = {{IOS} Press}, year = {2009}, url = {https://doi.org/10.3233/978-1-58603-947-9-100}, doi = {10.3233/978-1-58603-947-9-100}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ciss/YaoFDL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DodisVW09, author = {Yevgeniy Dodis and Salil P. Vadhan and Daniel Wichs}, title = {Proofs of Retrievability via Hardness Amplification}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {41}, year = {2009}, url = {http://eprint.iacr.org/2009/041}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DodisVW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlwenDW09, author = {Jo{\"{e}}l Alwen and Yevgeniy Dodis and Daniel Wichs}, title = {Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {160}, year = {2009}, url = {http://eprint.iacr.org/2009/160}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlwenDW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DodisRS09, author = {Yevgeniy Dodis and Thomas Ristenpart and Thomas Shrimpton}, title = {Salvaging Merkle-Damgard for Practical Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {177}, year = {2009}, url = {http://eprint.iacr.org/2009/177}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DodisRS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CoronDMS09, author = {Jean{-}S{\'{e}}bastien Coron and Yevgeniy Dodis and Avradip Mandal and Yannick Seurin}, title = {A Domain Extender for the Ideal Cipher}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {356}, year = {2009}, url = {http://eprint.iacr.org/2009/356}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CoronDMS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlwenDNSWW09, author = {Jo{\"{e}}l Alwen and Yevgeniy Dodis and Moni Naor and Gil Segev and Shabsi Walfish and Daniel Wichs}, title = {Public-Key Encryption in the Bounded-Retrieval Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {512}, year = {2009}, url = {http://eprint.iacr.org/2009/512}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlwenDNSWW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jucs/DodisLY08, author = {Yevgeniy Dodis and Pil Joong Lee and Dae Hyun Yum}, title = {Optimistic Fair Exchange in a Multi-user Setting}, journal = {J. Univers. Comput. Sci.}, volume = {14}, number = {3}, pages = {318--346}, year = {2008}, url = {https://doi.org/10.3217/jucs-014-03-0318}, doi = {10.3217/JUCS-014-03-0318}, timestamp = {Thu, 07 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jucs/DodisLY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamcomp/DodisORS08, author = {Yevgeniy Dodis and Rafail Ostrovsky and Leonid Reyzin and Adam D. Smith}, title = {Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data}, journal = {{SIAM} J. Comput.}, volume = {38}, number = {1}, pages = {97--139}, year = {2008}, url = {https://doi.org/10.1137/060651380}, doi = {10.1137/060651380}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/siamcomp/DodisORS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/DodisP08, author = {Yevgeniy Dodis and Prashant Puniya}, editor = {Steven M. Bellovin and Rosario Gennaro and Angelos D. Keromytis and Moti Yung}, title = {Getting the Best Out of Existing Hash Functions; or What if We Are Stuck with SHA?}, booktitle = {Applied Cryptography and Network Security, 6th International Conference, {ACNS} 2008, New York, NY, USA, June 3-6, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5037}, pages = {156--173}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-68914-0\_10}, doi = {10.1007/978-3-540-68914-0\_10}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/DodisP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DodisSW08, author = {Yevgeniy Dodis and Victor Shoup and Shabsi Walfish}, editor = {David A. Wagner}, title = {Efficient Constructions of Composable Commitments and Zero-Knowledge Proofs}, booktitle = {Advances in Cryptology - {CRYPTO} 2008, 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5157}, pages = {515--535}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85174-5\_29}, doi = {10.1007/978-3-540-85174-5\_29}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DodisSW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DodisPP08, author = {Yevgeniy Dodis and Krzysztof Pietrzak and Prashant Puniya}, editor = {Nigel P. Smart}, title = {A New Mode of Operation for Block Ciphers and Length-Preserving MACs}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2008, 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4965}, pages = {198--219}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78967-3\_12}, doi = {10.1007/978-3-540-78967-3\_12}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DodisPP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CramerDFPW08, author = {Ronald Cramer and Yevgeniy Dodis and Serge Fehr and Carles Padr{\'{o}} and Daniel Wichs}, editor = {Nigel P. Smart}, title = {Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2008, 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4965}, pages = {471--488}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78967-3\_27}, doi = {10.1007/978-3-540-78967-3\_27}, timestamp = {Fri, 02 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CramerDFPW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CramerDFPW08, author = {Ronald Cramer and Yevgeniy Dodis and Serge Fehr and Carles Padr{\'{o}} and Daniel Wichs}, title = {Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {30}, year = {2008}, url = {http://eprint.iacr.org/2008/030}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CramerDFPW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DodisW08, author = {Yevgeniy Dodis and Daniel Wichs}, title = {Non-Malleable Extractors and Symmetric Key Cryptography from Weak Secrets}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {503}, year = {2008}, url = {http://eprint.iacr.org/2008/503}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DodisW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DodisP07, author = {Yevgeniy Dodis and Prashant Puniya}, editor = {Moni Naor}, title = {Feistel Networks Made Public, and Applications}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2007, 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4515}, pages = {534--554}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72540-4\_31}, doi = {10.1007/978-3-540-72540-4\_31}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DodisP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/DodisP07, author = {Yevgeniy Dodis and Krzysztof Pietrzak}, editor = {Alex Biryukov}, title = {Improving the Security of MACs Via Randomized Message Preprocessing}, booktitle = {Fast Software Encryption, 14th International Workshop, {FSE} 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4593}, pages = {414--433}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74619-5\_26}, doi = {10.1007/978-3-540-74619-5\_26}, timestamp = {Sun, 25 Oct 2020 23:06:50 +0100}, biburl = {https://dblp.org/rec/conf/fse/DodisP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/DodisLY07, author = {Yevgeniy Dodis and Pil Joong Lee and Dae Hyun Yum}, editor = {Tatsuaki Okamoto and Xiaoyun Wang}, title = {Optimistic Fair Exchange in a Multi-user Setting}, booktitle = {Public Key Cryptography - {PKC} 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4450}, pages = {118--133}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-71677-8\_9}, doi = {10.1007/978-3-540-71677-8\_9}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/DodisLY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/BosleyD07, author = {Carl Bosley and Yevgeniy Dodis}, editor = {Salil P. Vadhan}, title = {Does Privacy Require True Randomness?}, booktitle = {Theory of Cryptography, 4th Theory of Cryptography Conference, {TCC} 2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4392}, pages = {1--20}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-70936-7\_1}, doi = {10.1007/978-3-540-70936-7\_1}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/BosleyD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/CanettiDPW07, author = {Ran Canetti and Yevgeniy Dodis and Rafael Pass and Shabsi Walfish}, editor = {Salil P. Vadhan}, title = {Universally Composable Security with Global Setup}, booktitle = {Theory of Cryptography, 4th Theory of Cryptography Conference, {TCC} 2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4392}, pages = {61--85}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-70936-7\_4}, doi = {10.1007/978-3-540-70936-7\_4}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/CanettiDPW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/CashDDLLW07, author = {David Cash and Yan Zong Ding and Yevgeniy Dodis and Wenke Lee and Richard J. Lipton and Shabsi Walfish}, editor = {Salil P. Vadhan}, title = {Intrusion-Resilient Key Exchange in the Bounded Retrieval Model}, booktitle = {Theory of Cryptography, 4th Theory of Cryptography Conference, {TCC} 2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4392}, pages = {479--498}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-70936-7\_26}, doi = {10.1007/978-3-540-70936-7\_26}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/CashDDLLW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DodisLY07, author = {Yevgeniy Dodis and Pil Joong Lee and Dae Hyun Yum}, title = {Optimistic Fair Exchange in a Multi-user Setting}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {182}, year = {2007}, url = {http://eprint.iacr.org/2007/182}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DodisLY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcss/ColeDR06, author = {Richard Cole and Yevgeniy Dodis and Tim Roughgarden}, title = {How much can taxes help selfish routing?}, journal = {J. Comput. Syst. Sci.}, volume = {72}, number = {3}, pages = {444--467}, year = {2006}, url = {https://doi.org/10.1016/j.jcss.2005.09.010}, doi = {10.1016/J.JCSS.2005.09.010}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcss/ColeDR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DodisKRS06, author = {Yevgeniy Dodis and Jonathan Katz and Leonid Reyzin and Adam D. Smith}, editor = {Cynthia Dwork}, title = {Robust Fuzzy Extractors and Authenticated Key Agreement from Close Secrets}, booktitle = {Advances in Cryptology - {CRYPTO} 2006, 26th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4117}, pages = {232--250}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11818175\_14}, doi = {10.1007/11818175\_14}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DodisKRS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/DodisR06, author = {Yevgeniy Dodis and Renato Renner}, editor = {Michele Bugliesi and Bart Preneel and Vladimiro Sassone and Ingo Wegener}, title = {On the Impossibility of Extracting Classical Randomness Using a Quantum Computer}, booktitle = {Automata, Languages and Programming, 33rd International Colloquium, {ICALP} 2006, Venice, Italy, July 10-14, 2006, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {4052}, pages = {204--215}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11787006\_18}, doi = {10.1007/11787006\_18}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/icalp/DodisR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soda/ColeDR06, author = {Richard Cole and Yevgeniy Dodis and Tim Roughgarden}, title = {Bottleneck links, variable demand, and the tragedy of the commons}, booktitle = {Proceedings of the Seventeenth Annual {ACM-SIAM} Symposium on Discrete Algorithms, {SODA} 2006, Miami, Florida, USA, January 22-26, 2006}, pages = {668--677}, publisher = {{ACM} Press}, year = {2006}, url = {http://dl.acm.org/citation.cfm?id=1109557.1109630}, timestamp = {Thu, 19 Mar 2015 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/soda/ColeDR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/CatalanoDV06, author = {Dario Catalano and Yevgeniy Dodis and Ivan Visconti}, editor = {Shai Halevi and Tal Rabin}, title = {Mercurial Commitments: Minimal Assumptions and Efficient Constructions}, booktitle = {Theory of Cryptography, Third Theory of Cryptography Conference, {TCC} 2006, New York, NY, USA, March 4-7, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3876}, pages = {120--144}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11681878\_7}, doi = {10.1007/11681878\_7}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/CatalanoDV06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/DodisP06, author = {Yevgeniy Dodis and Prashant Puniya}, editor = {Shai Halevi and Tal Rabin}, title = {On the Relation Between the Ideal Cipher and the Random Oracle Models}, booktitle = {Theory of Cryptography, Third Theory of Cryptography Conference, {TCC} 2006, New York, NY, USA, March 4-7, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3876}, pages = {184--206}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11681878\_10}, doi = {10.1007/11681878\_10}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/DodisP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/DodisYY06, author = {Yevgeniy Dodis and Aleksandr Yampolskiy and Moti Yung}, editor = {Shai Halevi and Tal Rabin}, title = {Threshold and Proactive Pseudo-Random Permutations}, booktitle = {Theory of Cryptography, Third Theory of Cryptography Conference, {TCC} 2006, New York, NY, USA, March 4-7, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3876}, pages = {542--560}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11681878\_28}, doi = {10.1007/11681878\_28}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/DodisYY06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/DodisPP06, author = {Yevgeniy Dodis and Krzysztof Pietrzak and Bartosz Przydatek}, editor = {Shai Halevi and Tal Rabin}, title = {Separating Sources for Encryption and Secret Sharing}, booktitle = {Theory of Cryptography, Third Theory of Cryptography Conference, {TCC} 2006, New York, NY, USA, March 4-7, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3876}, pages = {601--616}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11681878\_31}, doi = {10.1007/11681878\_31}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/DodisPP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pkc/2006, editor = {Moti Yung and Yevgeniy Dodis and Aggelos Kiayias and Tal Malkin}, title = {Public Key Cryptography - {PKC} 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3958}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11745853}, doi = {10.1007/11745853}, isbn = {3-540-33851-9}, timestamp = {Fri, 01 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/2006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-cs-0602007, author = {Yevgeniy Dodis and Rafail Ostrovsky and Leonid Reyzin and Adam D. Smith}, title = {Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data}, journal = {CoRR}, volume = {abs/cs/0602007}, year = {2006}, url = {http://arxiv.org/abs/cs/0602007}, eprinttype = {arXiv}, eprint = {cs/0602007}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-cs-0602007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/BosleyD06, author = {Carl Bosley and Yevgeniy Dodis}, title = {Does Privacy Require True Randomness?}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR06-114}}, year = {2006}, url = {https://eccc.weizmann.ac.il/eccc-reports/2006/TR06-114/index.html}, eprinttype = {ECCC}, eprint = {TR06-114}, timestamp = {Wed, 28 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/BosleyD06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DodisYY06, author = {Yevgeniy Dodis and Aleksandr Yampolskiy and Moti Yung}, title = {Threshold and Proactive Pseudo-Random Permutations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {17}, year = {2006}, url = {http://eprint.iacr.org/2006/017}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DodisYY06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DodisP06, author = {Yevgeniy Dodis and Prashant Puniya}, title = {Verifiable Random Permutations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {78}, year = {2006}, url = {http://eprint.iacr.org/2006/078}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DodisP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BosleyD06, author = {Carl Bosley and Yevgeniy Dodis}, title = {Does Privacy Require True Randomness?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {283}, year = {2006}, url = {http://eprint.iacr.org/2006/283}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BosleyD06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CanettiDPW06, author = {Ran Canetti and Yevgeniy Dodis and Rafael Pass and Shabsi Walfish}, title = {Universally Composable Security with Global Setup}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {432}, year = {2006}, url = {http://eprint.iacr.org/2006/432}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CanettiDPW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dc/DodisFKY05, author = {Yevgeniy Dodis and Nelly Fazio and Aggelos Kiayias and Moti Yung}, title = {Scalable public-key tracing and revoking}, journal = {Distributed Comput.}, volume = {17}, number = {4}, pages = {323--347}, year = {2005}, url = {https://doi.org/10.1007/s00446-004-0120-5}, doi = {10.1007/S00446-004-0120-5}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dc/DodisFKY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CoronDMP05, author = {Jean{-}S{\'{e}}bastien Coron and Yevgeniy Dodis and C{\'{e}}cile Malinaud and Prashant Puniya}, editor = {Victor Shoup}, title = {Merkle-Damg{\aa}rd Revisited: How to Construct a Hash Function}, booktitle = {Advances in Cryptology - {CRYPTO} 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3621}, pages = {430--448}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11535218\_26}, doi = {10.1007/11535218\_26}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CoronDMP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DodisOP05, author = {Yevgeniy Dodis and Roberto Oliveira and Krzysztof Pietrzak}, editor = {Victor Shoup}, title = {On the Generic Insecurity of the Full Domain Hash}, booktitle = {Advances in Cryptology - {CRYPTO} 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3621}, pages = {449--466}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11535218\_27}, doi = {10.1007/11535218\_27}, timestamp = {Thu, 22 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/DodisOP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BoyenDKOS05, author = {Xavier Boyen and Yevgeniy Dodis and Jonathan Katz and Rafail Ostrovsky and Adam D. Smith}, editor = {Ronald Cramer}, title = {Secure Remote Authentication Using Biometric Data}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3494}, pages = {147--163}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11426639\_9}, doi = {10.1007/11426639\_9}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BoyenDKOS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/DodisY05, author = {Yevgeniy Dodis and Dae Hyun Yum}, editor = {Andrew S. Patrick and Moti Yung}, title = {Time Capsule Signature}, booktitle = {Financial Cryptography and Data Security, 9th International Conference, {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March 3, 2005, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3570}, pages = {57--71}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11507840\_6}, doi = {10.1007/11507840\_6}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/DodisY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/Dodis05, author = {Yevgeniy Dodis}, title = {On extractors, error-correction and hiding all partial information}, booktitle = {{IEEE} Information Theory Workshop on Theory and Practice in Information-Theoretic Security, {ICITS} 2005, Awaji Island, Japan, October 16-19, 2005}, pages = {74--79}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/ITWTPI.2005.1543961}, doi = {10.1109/ITWTPI.2005.1543961}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/icits/Dodis05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/DodisY05, author = {Yevgeniy Dodis and Aleksandr Yampolskiy}, editor = {Serge Vaudenay}, title = {A Verifiable Random Function with Short Proofs and Keys}, booktitle = {Public Key Cryptography - {PKC} 2005, 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3386}, pages = {416--431}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-30580-4\_28}, doi = {10.1007/978-3-540-30580-4\_28}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/DodisY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/DodisS05, author = {Yevgeniy Dodis and Adam D. Smith}, editor = {Harold N. Gabow and Ronald Fagin}, title = {Correcting errors without leaking partial information}, booktitle = {Proceedings of the 37th Annual {ACM} Symposium on Theory of Computing, Baltimore, MD, USA, May 22-24, 2005}, pages = {654--663}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1060590.1060688}, doi = {10.1145/1060590.1060688}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/DodisS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/DodisK05, author = {Yevgeniy Dodis and Jonathan Katz}, editor = {Joe Kilian}, title = {Chosen-Ciphertext Security of Multiple Encryption}, booktitle = {Theory of Cryptography, Second Theory of Cryptography Conference, {TCC} 2005, Cambridge, MA, USA, February 10-12, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3378}, pages = {188--209}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-30576-7\_11}, doi = {10.1007/978-3-540-30576-7\_11}, timestamp = {Sun, 02 Jun 2019 21:21:22 +0200}, biburl = {https://dblp.org/rec/conf/tcc/DodisK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/DodisS05, author = {Yevgeniy Dodis and Adam D. Smith}, editor = {Joe Kilian}, title = {Entropic Security and the Encryption of High Entropy Messages}, booktitle = {Theory of Cryptography, Second Theory of Cryptography Conference, {TCC} 2005, Cambridge, MA, USA, February 10-12, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3378}, pages = {556--577}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-30576-7\_30}, doi = {10.1007/978-3-540-30576-7\_30}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/DodisS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Dodis05, author = {Yevgeniy Dodis}, editor = {Henk C. A. van Tilborg}, title = {Signcryption}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_398}, doi = {10.1007/0-387-23483-7\_398}, timestamp = {Thu, 27 Jun 2019 15:50:13 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Dodis05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Dodis05, author = {Yevgeniy Dodis}, title = {Minimal Assumptions for Efficient Mercurial Commitments}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {438}, year = {2005}, url = {http://eprint.iacr.org/2005/438}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Dodis05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/approx/DodisEOR04, author = {Yevgeniy Dodis and Ariel Elbaz and Roberto Oliveira and Ran Raz}, editor = {Klaus Jansen and Sanjeev Khanna and Jos{\'{e}} D. P. Rolim and Dana Ron}, title = {Improved Randomness Extraction from Two Independent Sources}, booktitle = {Approximation, Randomization, and Combinatorial Optimization, Algorithms and Techniques, 7th International Workshop on Approximation Algorithms for Combinatorial Optimization Problems, {APPROX} 2004, and 8th International Workshop on Randomization and Computation, {RANDOM} 2004, Cambridge, MA, USA, August 22-24, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3122}, pages = {334--344}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-27821-4\_30}, doi = {10.1007/978-3-540-27821-4\_30}, timestamp = {Tue, 21 Sep 2021 09:36:24 +0200}, biburl = {https://dblp.org/rec/conf/approx/DodisEOR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DodisFJW04, author = {Yevgeniy Dodis and Michael J. Freedman and Stanislaw Jarecki and Shabsi Walfish}, editor = {Vijayalakshmi Atluri and Birgit Pfitzmann and Patrick D. McDaniel}, title = {Versatile padding schemes for joint signature and encryption}, booktitle = {Proceedings of the 11th {ACM} Conference on Computer and Communications Security, {CCS} 2004, Washington, DC, USA, October 25-29, 2004}, pages = {344--353}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1030083.1030129}, doi = {10.1145/1030083.1030129}, timestamp = {Fri, 13 Nov 2020 16:10:44 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DodisFJW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/YaoFDL04, author = {Danfeng Yao and Nelly Fazio and Yevgeniy Dodis and Anna Lysyanskaya}, editor = {Vijayalakshmi Atluri and Birgit Pfitzmann and Patrick D. McDaniel}, title = {ID-based encryption for complex hierarchies with applications to forward security and broadcast encryption}, booktitle = {Proceedings of the 11th {ACM} Conference on Computer and Communications Security, {CCS} 2004, Washington, DC, USA, October 25-29, 2004}, pages = {354--363}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1030083.1030130}, doi = {10.1145/1030083.1030130}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/YaoFDL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/coco/AmbainisBDR04, author = {Andris Ambainis and Harry Buhrman and Yevgeniy Dodis and Hein R{\"{o}}hrig}, title = {Multiparty Quantum Coin Flipping}, booktitle = {19th Annual {IEEE} Conference on Computational Complexity {(CCC} 2004), 21-24 June 2004, Amherst, MA, {USA}}, pages = {250--259}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/CCC.2004.1313848}, doi = {10.1109/CCC.2004.1313848}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/coco/AmbainisBDR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DodisGHKR04, author = {Yevgeniy Dodis and Rosario Gennaro and Johan H{\aa}stad and Hugo Krawczyk and Tal Rabin}, editor = {Matthew K. Franklin}, title = {Randomness Extraction and Key Derivation Using the CBC, Cascade and {HMAC} Modes}, booktitle = {Advances in Cryptology - {CRYPTO} 2004, 24th Annual International CryptologyConference, Santa Barbara, California, USA, August 15-19, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3152}, pages = {494--510}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-28628-8\_30}, doi = {10.1007/978-3-540-28628-8\_30}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DodisGHKR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/DodisFKMY04, author = {Yevgeniy Dodis and Matthew K. Franklin and Jonathan Katz and Atsuko Miyaji and Moti Yung}, editor = {Tatsuaki Okamoto}, title = {A Generic Construction for Intrusion-Resilient Public-Key Encryption}, booktitle = {Topics in Cryptology - {CT-RSA} 2004, The Cryptographers' Track at the {RSA} Conference 2004, San Francisco, CA, USA, February 23-27, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2964}, pages = {81--98}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24660-2\_7}, doi = {10.1007/978-3-540-24660-2\_7}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/DodisFKMY04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DodisRS04, author = {Yevgeniy Dodis and Leonid Reyzin and Adam D. Smith}, editor = {Christian Cachin and Jan Camenisch}, title = {Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2004, International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3027}, pages = {523--540}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24676-3\_31}, doi = {10.1007/978-3-540-24676-3\_31}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DodisRS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DodisKNS04, author = {Yevgeniy Dodis and Aggelos Kiayias and Antonio Nicolosi and Victor Shoup}, editor = {Christian Cachin and Jan Camenisch}, title = {Anonymous Identification in Ad Hoc Groups}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2004, International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3027}, pages = {609--626}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24676-3\_36}, doi = {10.1007/978-3-540-24676-3\_36}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DodisKNS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/DodisOPS04, author = {Yevgeniy Dodis and Shien Jin Ong and Manoj Prabhakaran and Amit Sahai}, title = {On the (Im)possibility of Cryptography with Imperfect Randomness}, booktitle = {45th Symposium on Foundations of Computer Science {(FOCS} 2004), 17-19 October 2004, Rome, Italy, Proceedings}, pages = {196--205}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/FOCS.2004.44}, doi = {10.1109/FOCS.2004.44}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/focs/DodisOPS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DodisFJW04, author = {Yevgeniy Dodis and Michael J. Freedman and Stanislaw Jarecki and Shabsi Walfish}, title = {Optimal Signcryption from Any Trapdoor Permutation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {20}, year = {2004}, url = {http://eprint.iacr.org/2004/020}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DodisFJW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DodisFKY04, author = {Yevgeniy Dodis and Nelly Fazio and Aggelos Kiayias and Moti Yung}, title = {Scalable Public-Key Tracing and Revoking}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {160}, year = {2004}, url = {http://eprint.iacr.org/2004/160}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DodisFKY04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YaoFDL04, author = {Danfeng Yao and Nelly Fazio and Yevgeniy Dodis and Anna Lysyanskaya}, title = {ID-Based Encryption for Complex Hierarchies with Applications to Forward Security and Broadcast Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {212}, year = {2004}, url = {http://eprint.iacr.org/2004/212}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YaoFDL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DodisS04, author = {Yevgeniy Dodis and Adam D. Smith}, title = {Entropic Security and the Encryption of High Entropy Messages}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {219}, year = {2004}, url = {http://eprint.iacr.org/2004/219}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DodisS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DodisY04, author = {Yevgeniy Dodis and Aleksandr Yampolskiy}, title = {A Verifiable Random Function With Short Proofs and Keys}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {310}, year = {2004}, url = {http://eprint.iacr.org/2004/310}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DodisY04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/DodisFKMY03, author = {Yevgeniy Dodis and Matthew K. Franklin and Jonathan Katz and Atsuko Miyaji and Moti Yung}, editor = {Marc Joye}, title = {Intrusion-Resilient Public-Key Encryption}, booktitle = {Topics in Cryptology - {CT-RSA} 2003, The Cryptographers' Track at the {RSA} Conference 2003, San Francisco, CA, USA, April 13-17, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2612}, pages = {19--32}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-36563-X\_2}, doi = {10.1007/3-540-36563-X\_2}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/DodisFKMY03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/DodisR03, author = {Yevgeniy Dodis and Leonid Reyzin}, editor = {Moti Yung}, title = {Breaking and repairing optimistic fair exchange from {PODC} 2003}, booktitle = {Proceedings of the 2003 {ACM} workshop on Digital rights management 2003, Washington, DC, USA, October 27, 2003}, pages = {47--54}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/947380.947387}, doi = {10.1145/947380.947387}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/DodisR03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DodisA03, author = {Yevgeniy Dodis and Jee Hea An}, editor = {Eli Biham}, title = {Concealment and Its Applications to Authenticated Encryption}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2003, International Conference on the Theory and Applications of Cryptographic Techniques, Warsaw, Poland, May 4-8, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2656}, pages = {312--329}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-39200-9\_19}, doi = {10.1007/3-540-39200-9\_19}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DodisA03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/IvanD03, author = {Anca{-}Andreea Ivan and Yevgeniy Dodis}, title = {Proxy Cryptography Revisited}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2003, San Diego, California, {USA}}, publisher = {The Internet Society}, year = {2003}, url = {https://www.ndss-symposium.org/ndss2003/proxy-cryptography-revisited/}, timestamp = {Mon, 01 Feb 2021 08:42:24 +0100}, biburl = {https://dblp.org/rec/conf/ndss/IvanD03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/NicolosiKDM03, author = {Antonio Nicolosi and Maxwell N. Krohn and Yevgeniy Dodis and David Mazi{\`{e}}res}, title = {Proactive Two-Party Signatures for User Authentication}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2003, San Diego, California, {USA}}, publisher = {The Internet Society}, year = {2003}, url = {https://www.ndss-symposium.org/ndss2003/proactive-two-party-signatures-user-authentication/}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/NicolosiKDM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Dodis03, author = {Yevgeniy Dodis}, editor = {Yvo Desmedt}, title = {Efficient Construction of (Distributed) Verifiable Random Functions}, booktitle = {Public Key Cryptography - {PKC} 2003, 6th International Workshop on Theory and Practice in Public Key Cryptography, Miami, FL, USA, January 6-8, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2567}, pages = {1--17}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-36288-6\_1}, doi = {10.1007/3-540-36288-6\_1}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Dodis03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/DodisF03, author = {Yevgeniy Dodis and Nelly Fazio}, editor = {Yvo Desmedt}, title = {Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack}, booktitle = {Public Key Cryptography - {PKC} 2003, 6th International Workshop on Theory and Practice in Public Key Cryptography, Miami, FL, USA, January 6-8, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2567}, pages = {100--115}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-36288-6\_8}, doi = {10.1007/3-540-36288-6\_8}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/DodisF03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/DodisKXY03, author = {Yevgeniy Dodis and Jonathan Katz and Shouhuai Xu and Moti Yung}, editor = {Yvo Desmedt}, title = {Strong Key-Insulated Signature Schemes}, booktitle = {Public Key Cryptography - {PKC} 2003, 6th International Workshop on Theory and Practice in Public Key Cryptography, Miami, FL, USA, January 6-8, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2567}, pages = {130--144}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-36288-6\_10}, doi = {10.1007/3-540-36288-6\_10}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/DodisKXY03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/podc/DodisFKY03, author = {Yevgeniy Dodis and Nelly Fazio and Aggelos Kiayias and Moti Yung}, editor = {Elizabeth Borowsky and Sergio Rajsbaum}, title = {Scalable public-key tracing and revoking}, booktitle = {Proceedings of the Twenty-Second {ACM} Symposium on Principles of Distributed Computing, {PODC} 2003, Boston, Massachusetts, USA, July 13-16, 2003}, pages = {190--199}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/872035.872062}, doi = {10.1145/872035.872062}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/podc/DodisFKY03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/random/DodisO03, author = {Yevgeniy Dodis and Roberto Oliveira}, editor = {Sanjeev Arora and Klaus Jansen and Jos{\'{e}} D. P. Rolim and Amit Sahai}, title = {On Extracting Private Randomness over a Public Channel}, booktitle = {Approximation, Randomization, and Combinatorial Optimization: Algorithms and Techniques, 6th International Workshop on Approximation Algorithms for Combinatorial Optimization Problems, {APPROX} 2003 and 7th International Workshop on Randomization and Approximation Techniques in Computer Science, {RANDOM} 2003, Princeton, NJ, USA, August 24-26, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2764}, pages = {252--263}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45198-3\_22}, doi = {10.1007/978-3-540-45198-3\_22}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/random/DodisO03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigecom/ColeDR03, author = {Richard Cole and Yevgeniy Dodis and Tim Roughgarden}, editor = {Daniel A. Menasc{\'{e}} and Noam Nisan}, title = {How much can taxes help selfish routing?}, booktitle = {Proceedings 4th {ACM} Conference on Electronic Commerce (EC-2003), San Diego, California, USA, June 9-12, 2003}, pages = {98--107}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/779928.779941}, doi = {10.1145/779928.779941}, timestamp = {Tue, 27 Nov 2018 11:56:48 +0100}, biburl = {https://dblp.org/rec/conf/sigecom/ColeDR03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/ColeDR03, author = {Richard Cole and Yevgeniy Dodis and Tim Roughgarden}, editor = {Lawrence L. Larmore and Michel X. Goemans}, title = {Pricing network edges for heterogeneous selfish users}, booktitle = {Proceedings of the 35th Annual {ACM} Symposium on Theory of Computing, June 9-11, 2003, San Diego, CA, {USA}}, pages = {521--530}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/780542.780618}, doi = {10.1145/780542.780618}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/ColeDR03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/quant-ph-0304112, author = {Andris Ambainis and Harry Buhrman and Yevgeniy Dodis and Hein R{\"{o}}hrig}, title = {Multiparty Quantum Coin Flipping}, journal = {CoRR}, volume = {quant-ph/0304112}, year = {2003}, url = {http://arxiv.org/abs/quant-ph/0304112}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/quant-ph-0304112.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DodisA03, author = {Yevgeniy Dodis and Jee Hea An}, title = {Concealment and its Applications to Authenticated Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {50}, year = {2003}, url = {http://eprint.iacr.org/2003/050}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DodisA03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DodisF03, author = {Yevgeniy Dodis and Nelly Fazio}, title = {Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {95}, year = {2003}, url = {http://eprint.iacr.org/2003/095}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DodisF03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DodisR03, author = {Yevgeniy Dodis and Leonid Reyzin}, title = {Breaking and Repairing Optimistic Fair Exchange from {PODC} 2003}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {146}, year = {2003}, url = {http://eprint.iacr.org/2003/146}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DodisR03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DodisORS03, author = {Yevgeniy Dodis and Rafail Ostrovsky and Leonid Reyzin and Adam D. Smith}, title = {Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {235}, year = {2003}, url = {http://eprint.iacr.org/2003/235}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DodisORS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DodisF02, author = {Yevgeniy Dodis and Nelly Fazio}, editor = {Joan Feigenbaum}, title = {Public Key Broadcast Encryption for Stateless Receivers}, booktitle = {Security and Privacy in Digital Rights Management, {ACM} {CCS-9} Workshop, {DRM} 2002, Washington, DC, USA, November 18, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2696}, pages = {61--80}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/978-3-540-44993-5\_5}, doi = {10.1007/978-3-540-44993-5\_5}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DodisF02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DodisKXY02, author = {Yevgeniy Dodis and Jonathan Katz and Shouhuai Xu and Moti Yung}, editor = {Lars R. Knudsen}, title = {Key-Insulated Public Key Cryptosystems}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28 - May 2, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2332}, pages = {65--82}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-46035-7\_5}, doi = {10.1007/3-540-46035-7\_5}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DodisKXY02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AnDR02, author = {Jee Hea An and Yevgeniy Dodis and Tal Rabin}, editor = {Lars R. Knudsen}, title = {On the Security of Joint Signature and Encryption}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28 - May 2, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2332}, pages = {83--107}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-46035-7\_6}, doi = {10.1007/3-540-46035-7\_6}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AnDR02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/DodisS02, author = {Yevgeniy Dodis and Joel Spencer}, title = {On the (non)Universality of the One-Time Pad}, booktitle = {43rd Symposium on Foundations of Computer Science {(FOCS} 2002), 16-19 November 2002, Vancouver, BC, Canada, Proceedings}, pages = {376}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/SFCS.2002.1181962}, doi = {10.1109/SFCS.2002.1181962}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/DodisS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/DodisR02, author = {Yevgeniy Dodis and Leonid Reyzin}, editor = {Stelvio Cimato and Clemente Galdi and Giuseppe Persiano}, title = {On the Power of Claw-Free Permutations}, booktitle = {Security in Communication Networks, Third International Conference, {SCN} 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2576}, pages = {55--73}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36413-7\_5}, doi = {10.1007/3-540-36413-7\_5}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/scn/DodisR02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sisw/DodisY02, author = {Yevgeniy Dodis and Moti Yung}, title = {Exposure-Resilience for Free: The Hierarchical ID-based Encryption Case}, booktitle = {Proceedings of the First International {IEEE} Security in Storage Workshop, {SISW} 2002, Greenbelt, Maryland, USA, December 11, 2002}, pages = {45--52}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/SISW.2002.1183509}, doi = {10.1109/SISW.2002.1183509}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sisw/DodisY02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AnDR02, author = {Jee Hea An and Yevgeniy Dodis and Tal Rabin}, title = {On the Security of Joint Signature and Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {46}, year = {2002}, url = {http://eprint.iacr.org/2002/046}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AnDR02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DodisKXY02, author = {Yevgeniy Dodis and Jonathan Katz and Shouhuai Xu and Moti Yung}, title = {Key-Insulated Public-Key Cryptosystems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {77}, year = {2002}, url = {http://eprint.iacr.org/2002/077}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DodisKXY02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DodisR02, author = {Yevgeniy Dodis and Leonid Reyzin}, title = {On the Power of Claw-Free Permutations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {103}, year = {2002}, url = {http://eprint.iacr.org/2002/103}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DodisR02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Dodis02, author = {Yevgeniy Dodis}, title = {Efficient Construction of (Distributed) Verifiable Random Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {133}, year = {2002}, url = {http://eprint.iacr.org/2002/133}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Dodis02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DodisSS01, author = {Yevgeniy Dodis and Amit Sahai and Adam D. Smith}, editor = {Birgit Pfitzmann}, title = {On Perfect and Adaptive Security in Exposure-Resilient Cryptography}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2001, International Conference on the Theory and Application of Cryptographic Techniques, Innsbruck, Austria, May 6-10, 2001, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {2045}, pages = {301--324}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44987-6\_19}, doi = {10.1007/3-540-44987-6\_19}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DodisSS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/Dodis01, author = {Yevgeniy Dodis}, editor = {Fernando Orejas and Paul G. Spirakis and Jan van Leeuwen}, title = {New Imperfect Random Source with Applications to Coin-Flipping}, booktitle = {Automata, Languages and Programming, 28th International Colloquium, {ICALP} 2001, Crete, Greece, July 8-12, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2076}, pages = {297--309}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-48224-5\_25}, doi = {10.1007/3-540-48224-5\_25}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/icalp/Dodis01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/random/DodisH01, author = {Yevgeniy Dodis and Shai Halevi}, editor = {Michel X. Goemans and Klaus Jansen and Jos{\'{e}} D. P. Rolim and Luca Trevisan}, title = {Incremental Codes}, booktitle = {Approximation, Randomization and Combinatorial Optimization: Algorithms and Techniques, 4th International Workshop on Approximation Algorithms for Combinatorial Optimization Problems, {APPROX} 2001 and 5th International Workshop on Randomization and Approximation Techniques in Computer Science, {RANDOM} 2001 Berkeley, CA, USA, August 18-20, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2129}, pages = {75--89}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44666-4\_12}, doi = {10.1007/3-540-44666-4\_12}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/random/DodisH01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soda/DodisW01, author = {Yevgeniy Dodis and Peter Winkler}, editor = {S. Rao Kosaraju}, title = {Universal configurations in light-flipping games}, booktitle = {Proceedings of the Twelfth Annual Symposium on Discrete Algorithms, January 7-9, 2001, Washington, DC, {USA}}, pages = {926--927}, publisher = {{ACM/SIAM}}, year = {2001}, url = {http://dl.acm.org/citation.cfm?id=365411.365812}, timestamp = {Mon, 23 Oct 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/soda/DodisW01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/ndltd/Dodis00, author = {Yevgeniy Dodis}, title = {Exposure-resilient cryptography}, school = {Massachusetts Institute of Technology, Cambridge, MA, {USA}}, year = {2000}, url = {https://hdl.handle.net/1721.1/86613}, timestamp = {Wed, 04 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/ndltd/Dodis00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DodisM00, author = {Yevgeniy Dodis and Silvio Micali}, editor = {Mihir Bellare}, title = {Parallel Reducibility for Information-Theoretically Secure Computation}, booktitle = {Advances in Cryptology - {CRYPTO} 2000, 20th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1880}, pages = {74--92}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44598-6\_5}, doi = {10.1007/3-540-44598-6\_5}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DodisM00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DodisHR00, author = {Yevgeniy Dodis and Shai Halevi and Tal Rabin}, editor = {Mihir Bellare}, title = {A Cryptographic Solution to a Game Theoretic Problem}, booktitle = {Advances in Cryptology - {CRYPTO} 2000, 20th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1880}, pages = {112--130}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44598-6\_7}, doi = {10.1007/3-540-44598-6\_7}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DodisHR00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CanettiDHKS00, author = {Ran Canetti and Yevgeniy Dodis and Shai Halevi and Eyal Kushilevitz and Amit Sahai}, editor = {Bart Preneel}, title = {Exposure-Resilient Functions and All-or-Nothing Transforms}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2000, International Conference on the Theory and Application of Cryptographic Techniques, Bruges, Belgium, May 14-18, 2000, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1807}, pages = {453--469}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-45539-6\_33}, doi = {10.1007/3-540-45539-6\_33}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CanettiDHKS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/ECCC-TR00-039, author = {Yevgeniy Dodis}, title = {Impossibility of Black-Box Reduction from Non-Adaptively to Adaptively Secure Coin-Flipping}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR00-039}}, year = {2000}, url = {https://eccc.weizmann.ac.il/eccc-reports/2000/TR00-039/index.html}, eprinttype = {ECCC}, eprint = {TR00-039}, timestamp = {Wed, 28 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/ECCC-TR00-039.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DodisM99, author = {Yevgeniy Dodis and Silvio Micali}, editor = {Jacques Stern}, title = {Lower Bounds for Oblivious Transfer Reductions}, booktitle = {Advances in Cryptology - {EUROCRYPT} '99, International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, May 2-6, 1999, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1592}, pages = {42--55}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48910-X\_4}, doi = {10.1007/3-540-48910-X\_4}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DodisM99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/DodisK99, author = {Yevgeniy Dodis and Sanjeev Khanna}, editor = {Jir{\'{\i}} Wiedermann and Peter van Emde Boas and Mogens Nielsen}, title = {Space Time Tradeoffs for Graph Properties}, booktitle = {Automata, Languages and Programming, 26th International Colloquium, ICALP'99, Prague, Czech Republic, July 11-15, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1644}, pages = {291--300}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48523-6\_26}, doi = {10.1007/3-540-48523-6\_26}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/icalp/DodisK99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/random/DodisGLRRS99, author = {Yevgeniy Dodis and Oded Goldreich and Eric Lehman and Sofya Raskhodnikova and Dana Ron and Alex Samorodnitsky}, editor = {Dorit S. Hochbaum and Klaus Jansen and Jos{\'{e}} D. P. Rolim and Alistair Sinclair}, title = {Improved Testing Algorithms for Monotonicity}, booktitle = {Randomization, Approximation, and Combinatorial Algorithms and Techniques, Third International Workshop on Randomization and Approximation Techniques in Computer Science, and Second International Workshop on Approximation Algorithms for Combinatorial Optimization Problems RANDOM-APPROX'99, Berkeley, CA, USA, August 8-11, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1671}, pages = {97--108}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/978-3-540-48413-4\_10}, doi = {10.1007/978-3-540-48413-4\_10}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/random/DodisGLRRS99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soda/DodisGK99, author = {Yevgeniy Dodis and Venkatesan Guruswami and Sanjeev Khanna}, editor = {Robert Endre Tarjan and Tandy J. Warnow}, title = {The 2-Catalog Segmentation Problem}, booktitle = {Proceedings of the Tenth Annual {ACM-SIAM} Symposium on Discrete Algorithms, 17-19 January 1999, Baltimore, Maryland, {USA}}, pages = {897--898}, publisher = {{ACM/SIAM}}, year = {1999}, url = {http://dl.acm.org/citation.cfm?id=314500.315075}, timestamp = {Thu, 05 Jul 2018 07:29:57 +0200}, biburl = {https://dblp.org/rec/conf/soda/DodisGK99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/DodisK99, author = {Yevgeniy Dodis and Sanjeev Khanna}, editor = {Jeffrey Scott Vitter and Lawrence L. Larmore and Frank Thomson Leighton}, title = {Design Networks with Bounded Pairwise Distance}, booktitle = {Proceedings of the Thirty-First Annual {ACM} Symposium on Theory of Computing, May 1-4, 1999, Atlanta, Georgia, {USA}}, pages = {750--759}, publisher = {{ACM}}, year = {1999}, url = {https://doi.org/10.1145/301250.301447}, doi = {10.1145/301250.301447}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/DodisK99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/ECCC-TR99-017, author = {Yevgeniy Dodis and Oded Goldreich and Eric Lehman and Sofya Raskhodnikova and Dana Ron and Alex Samorodnitsky}, title = {Improved Testing Algorithms for Monotonicity}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR99-017}}, year = {1999}, url = {https://eccc.weizmann.ac.il/eccc-reports/1999/TR99-017/index.html}, eprinttype = {ECCC}, eprint = {TR99-017}, timestamp = {Wed, 28 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/ECCC-TR99-017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.