default search action
Yevgeniy Dodis
Person information
- affiliation: New York University, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [c150]Yevgeniy Dodis, Daniel Jost, Antonio Marcedone:
Compact Key Storage - A Modern Approach to Key Backup and Delegation. CRYPTO (2) 2024: 75-109 - [i95]Yevgeniy Dodis, Daniel Jost, Antonio Marcedone:
Compact Key Storage: A Modern Approach to Key Backup and Delegation. IACR Cryptol. ePrint Arch. 2024: 914 (2024) - [i94]Alexander Bienstock, Yevgeniy Dodis, Paul Rösler, Daniel Wichs:
Interval Key-Encapsulation Mechanism. IACR Cryptol. ePrint Arch. 2024: 1454 (2024) - 2023
- [c149]Yevgeniy Dodis, Niels Ferguson, Eli Goldin, Peter Hall, Krzysztof Pietrzak:
Random Oracle Combiners: Breaking the Concatenation Barrier for Collision-Resistance. CRYPTO (2) 2023: 514-546 - [c148]Yevgeniy Dodis, Willy Quach, Daniel Wichs:
Speak Much, Remember Little: Cryptography in the Bounded Storage Model, Revisited. EUROCRYPT (1) 2023: 86-116 - [c147]Yevgeniy Dodis, Daniel Jost, Balachandar Kesavan, Antonio Marcedone:
End-to-End Encrypted Zoom Meetings: Proving Security and Strengthening Liveness. EUROCRYPT (5) 2023: 157-189 - [c146]Marshall Ball, Yevgeniy Dodis, Eli Goldin:
Immunizing Backdoored PRGs. TCC (3) 2023: 153-182 - [c145]Yevgeniy Dodis, Shai Halevi, Daniel Wichs:
Security with Functional Re-encryption from CPA. TCC (2) 2023: 279-305 - [i93]Yevgeniy Dodis, Niels Ferguson, Eli Goldin, Peter Hall, Krzysztof Pietrzak:
Random Oracle Combiners: Breaking the Concatenation Barrier for Collision-Resistance. IACR Cryptol. ePrint Arch. 2023: 1041 (2023) - [i92]Yevgeniy Dodis, Shai Halevi, Daniel Wichs:
Security with Functional Re-Encryption from CPA. IACR Cryptol. ePrint Arch. 2023: 1443 (2023) - [i91]Marshall Ball, Yevgeniy Dodis, Eli Goldin:
Immunizing Backdoored PRGs. IACR Cryptol. ePrint Arch. 2023: 1778 (2023) - [i90]Yevgeniy Dodis, Daniel Jost, Balachandar Kesavan, Antonio Marcedone:
End-to-End Encrypted Zoom Meetings: Proving Security and Strengthening Liveness. IACR Cryptol. ePrint Arch. 2023: 1829 (2023) - 2022
- [c144]Brian Chen, Yevgeniy Dodis, Esha Ghosh, Eli Goldin, Balachandar Kesavan, Antonio Marcedone, Merry Ember Mou:
Rotatable Zero Knowledge Sets - Post Compromise Secure Auditable Dictionaries with Application to Key Transparency. ASIACRYPT (3) 2022: 547-580 - [c143]Sandro Coretti, Yevgeniy Dodis, Harish Karthikeyan, Noah Stephens-Davidowitz, Stefano Tessaro:
On Seedless PRNGs and Premature Next. ITC 2022: 9:1-9:20 - [c142]Chandranan Dhar, Yevgeniy Dodis, Mridul Nandi:
Revisiting Collision and Local Opening Analysis of ABR Hash. ITC 2022: 11:1-11:22 - [c141]Alexander Bienstock, Yevgeniy Dodis, Yi Tang:
Multicast Key Agreement, Revisited. CT-RSA 2022: 1-25 - [c140]Yevgeniy Dodis, Willy Quach, Daniel Wichs:
Authentication in the Bounded Storage Model. EUROCRYPT (3) 2022: 737-766 - [c139]Yevgeniy Dodis, Harish Karthikeyan, Daniel Wichs:
Small-Box Cryptography. ITCS 2022: 56:1-56:25 - [c138]Erik Aronesty, David Cash, Yevgeniy Dodis, Daniel H. Gallancy, Christopher Higley, Harish Karthikeyan, Oren Tysor:
Encapsulated Search Index: Public-Key, Sub-linear, Distributed, and Delegatable. Public Key Cryptography (2) 2022: 256-285 - [c137]Yevgeniy Dodis, Daniel Jost, Harish Karthikeyan:
Forward-Secure Encryption with Fast Forwarding. TCC (2) 2022: 3-32 - [c136]Alexander Bienstock, Yevgeniy Dodis, Sanjam Garg, Garrison Grogan, Mohammad Hajiabadi, Paul Rösler:
On the Worst-Case Inefficiency of CGKA. TCC (2) 2022: 213-243 - [e7]Yevgeniy Dodis, Thomas Shrimpton:
Advances in Cryptology - CRYPTO 2022 - 42nd Annual International Cryptology Conference, CRYPTO 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part I. Lecture Notes in Computer Science 13507, Springer 2022, ISBN 978-3-031-15801-8 [contents] - [e6]Yevgeniy Dodis, Thomas Shrimpton:
Advances in Cryptology - CRYPTO 2022 - 42nd Annual International Cryptology Conference, CRYPTO 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part II. Lecture Notes in Computer Science 13508, Springer 2022, ISBN 978-3-031-15978-7 [contents] - [e5]Yevgeniy Dodis, Thomas Shrimpton:
Advances in Cryptology - CRYPTO 2022 - 42nd Annual International Cryptology Conference, CRYPTO 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part III. Lecture Notes in Computer Science 13509, Springer 2022, ISBN 978-3-031-15981-7 [contents] - [e4]Yevgeniy Dodis, Thomas Shrimpton:
Advances in Cryptology - CRYPTO 2022 - 42nd Annual International Cryptology Conference, CRYPTO 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part IV. Lecture Notes in Computer Science 13510, Springer 2022, ISBN 978-3-031-15984-8 [contents] - [i89]Yevgeniy Dodis, Harish Karthikeyan, Daniel Wichs:
Updatable Public Key Encryption in the Standard Model. IACR Cryptol. ePrint Arch. 2022: 68 (2022) - [i88]Yevgeniy Dodis, Harish Karthikeyan, Daniel Wichs:
Small-Box Cryptography. IACR Cryptol. ePrint Arch. 2022: 69 (2022) - [i87]Erik Aronesty, David Cash, Yevgeniy Dodis, Daniel H. Gallancy, Christopher Higley, Harish Karthikeyan, Oren Tysor:
Encapsulated Search Index: Public-Key, Sub-linear, Distributed, and Delegatable. IACR Cryptol. ePrint Arch. 2022: 71 (2022) - [i86]Sandro Coretti, Yevgeniy Dodis, Harish Karthikeyan, Noah Stephens-Davidowitz, Stefano Tessaro:
On Seedless PRNGs and Premature Next. IACR Cryptol. ePrint Arch. 2022: 558 (2022) - [i85]Yevgeniy Dodis, Willy Quach, Daniel Wichs:
Authentication in the Bounded Storage Model. IACR Cryptol. ePrint Arch. 2022: 690 (2022) - [i84]Yevgeniy Dodis, Daniel Jost, Harish Karthikeyan:
Forward-Secure Encryption with Fast Forwarding. IACR Cryptol. ePrint Arch. 2022: 1233 (2022) - [i83]Alexander Bienstock, Yevgeniy Dodis, Sanjam Garg, Garrison Grogan, Mohammad Hajiabadi, Paul Rösler:
On the Worst-Case Inefficiency of CGKA. IACR Cryptol. ePrint Arch. 2022: 1237 (2022) - [i82]Brian Chen, Yevgeniy Dodis, Esha Ghosh, Eli Goldin, Balachandar Kesavan, Antonio Marcedone, Merry Ember Mou:
Rotatable Zero Knowledge Sets: Post Compromise Secure Auditable Dictionaries with application to Key Transparency. IACR Cryptol. ePrint Arch. 2022: 1264 (2022) - 2021
- [c135]Joël Alwen, Sandro Coretti, Yevgeniy Dodis, Yiannis Tselekounis:
Modular Design of Secure Group Messaging Protocols and the Security of MLS. CCS 2021: 1463-1483 - [c134]Yevgeniy Dodis, Kevin Yeo:
Doubly-Affine Extractors, and Their Applications. ITC 2021: 13:1-13:23 - [c133]Yevgeniy Dodis, Siyao Guo, Noah Stephens-Davidowitz, Zhiye Xie:
Online Linear Extractors for Independent Sources. ITC 2021: 14:1-14:14 - [c132]Yevgeniy Dodis, Dmitry Khovratovich, Nicky Mouha, Mridul Nandi:
T₅: Hashing Five Inputs with Three Compression Calls. ITC 2021: 24:1-24:23 - [c131]Yevgeniy Dodis, Siyao Guo, Noah Stephens-Davidowitz, Zhiye Xie:
No Time to Hash: On Super-Efficient Entropy Accumulation. CRYPTO (4) 2021: 548-576 - [c130]Alexander Bienstock, Yevgeniy Dodis, Kevin Yeo:
Forward Secret Encrypted RAM: Lower Bounds and Applications. TCC (3) 2021: 62-93 - [c129]Yevgeniy Dodis, Harish Karthikeyan, Daniel Wichs:
Updatable Public Key Encryption in the Standard Model. TCC (3) 2021: 254-285 - [i81]Alexander Bienstock, Yevgeniy Dodis, Kevin Yeo:
Forward Secret Encrypted RAM: Lower Bounds and Applications. IACR Cryptol. ePrint Arch. 2021: 244 (2021) - [i80]Yevgeniy Dodis, Dmitry Khovratovich, Nicky Mouha, Mridul Nandi:
T5: Hashing Five Inputs with Three Compression Calls. IACR Cryptol. ePrint Arch. 2021: 373 (2021) - [i79]Yevgeniy Dodis, Siyao Guo, Noah Stephens-Davidowitz, Zhiye Xie:
No Time to Hash: On Superefficient Entropy Accumulation. IACR Cryptol. ePrint Arch. 2021: 523 (2021) - [i78]Yevgeniy Dodis, Kevin Yeo:
Doubly-Affine Extractors, and their Applications. IACR Cryptol. ePrint Arch. 2021: 637 (2021) - [i77]Yevgeniy Dodis, Siyao Guo, Noah Stephens-Davidowitz, Zhiye Xie:
Online Linear Extractors for Independent Sources. IACR Cryptol. ePrint Arch. 2021: 1002 (2021) - [i76]Joël Alwen, Sandro Coretti, Yevgeniy Dodis, Yiannis Tselekounis:
Modular Design of Secure Group Messaging Protocols and the Security of MLS. IACR Cryptol. ePrint Arch. 2021: 1083 (2021) - [i75]Yevgeniy Dodis, Willy Quach, Daniel Wichs:
Speak Much, Remember Little: Cryptography in the Bounded Storage Model, Revisited. IACR Cryptol. ePrint Arch. 2021: 1270 (2021) - [i74]Alexander Bienstock, Yevgeniy Dodis, Yi Tang:
Multicast Key Agreement, Revisited. IACR Cryptol. ePrint Arch. 2021: 1570 (2021) - 2020
- [j10]Sandro Coretti, Yevgeniy Dodis, Ueli Maurer, Björn Tackmann, Daniele Venturi:
Non-malleable Encryption: Simpler, Shorter, Stronger. J. Cryptol. 33(4): 1984-2033 (2020) - [c128]Joël Alwen, Sandro Coretti, Yevgeniy Dodis, Yiannis Tselekounis:
Security Analysis and Improvements for the IETF MLS Standard for Group Messaging. CRYPTO (1) 2020: 248-277 - [c127]Yevgeniy Dodis, Vinod Vaikuntanathan, Daniel Wichs:
Extracting Randomness from Extractor-Dependent Sources. EUROCRYPT (1) 2020: 313-342 - [c126]Alexander Bienstock, Yevgeniy Dodis, Paul Rösler:
On the Price of Concurrency in Group Ratcheting Protocols. TCC (2) 2020: 198-228 - [c125]Yevgeniy Dodis, Pooya Farshim, Sogol Mazaheri, Stefano Tessaro:
Towards Defeating Backdoored Random Oracles: Indifferentiability with Bounded Adaptivity. TCC (3) 2020: 241-273 - [i73]Alexander Bienstock, Yevgeniy Dodis, Paul Rösler:
On the Price of Concurrency in Group Ratcheting Protocols. IACR Cryptol. ePrint Arch. 2020: 1171 (2020) - [i72]Yevgeniy Dodis, Pooya Farshim, Sogol Mazaheri, Stefano Tessaro:
Towards Defeating Backdoored Random Oracles: Indifferentiability with Bounded Adaptivity. IACR Cryptol. ePrint Arch. 2020: 1199 (2020)
2010 – 2019
- 2019
- [c124]Sandro Coretti, Yevgeniy Dodis, Harish Karthikeyan, Stefano Tessaro:
Seedless Fruit Is the Sweetest: Random Number Generation, Revisited. CRYPTO (1) 2019: 205-234 - [c123]Melissa Chase, Yevgeniy Dodis, Yuval Ishai, Daniel Kraschewski, Tianren Liu, Rafail Ostrovsky, Vinod Vaikuntanathan:
Reusable Non-Interactive Secure Computation. CRYPTO (3) 2019: 462-488 - [c122]Joël Alwen, Sandro Coretti, Yevgeniy Dodis:
The Double Ratchet: Security Notions, Proofs, and Modularization for the Signal Protocol. EUROCRYPT (1) 2019: 129-158 - [i71]Yevgeniy Dodis, Paul Grubbs, Thomas Ristenpart, Joanne Woodage:
Fast Message Franking: From Invisible Salamanders to Encryptment. IACR Cryptol. ePrint Arch. 2019: 16 (2019) - [i70]Sandro Coretti, Yevgeniy Dodis, Harish Karthikeyan, Stefano Tessaro:
Seedless Fruit is the Sweetest: Random Number Generation, Revisited. IACR Cryptol. ePrint Arch. 2019: 198 (2019) - [i69]Joël Alwen, Sandro Coretti, Yevgeniy Dodis, Yiannis Tselekounis:
Security Analysis and Improvements for the IETF MLS Standard for Group Messaging. IACR Cryptol. ePrint Arch. 2019: 1189 (2019) - [i68]Yevgeniy Dodis, Vinod Vaikuntanathan, Daniel Wichs:
Extracting Randomness from Extractor-Dependent Sources. IACR Cryptol. ePrint Arch. 2019: 1339 (2019) - 2018
- [j9]Divesh Aggarwal, Yevgeniy Dodis, Shachar Lovett:
Non-Malleable Codes from Additive Combinatorics. SIAM J. Comput. 47(2): 524-546 (2018) - [c121]Yevgeniy Dodis, Paul Grubbs, Thomas Ristenpart, Joanne Woodage:
Fast Message Franking: From Invisible Salamanders to Encryptment. CRYPTO (1) 2018: 155-186 - [c120]Sandro Coretti, Yevgeniy Dodis, Siyao Guo:
Non-Uniform Bounds in the Random-Permutation, Ideal-Cipher, and Generic-Group Models. CRYPTO (1) 2018: 693-721 - [c119]Benoît Cogliati, Yevgeniy Dodis, Jonathan Katz, Jooyoung Lee, John P. Steinberger, Aishwarya Thiruvengadam, Zhe Zhang:
Provable Security of (Tweakable) Block Ciphers Based on Substitution-Permutation Networks. CRYPTO (1) 2018: 722-753 - [c118]Sandro Coretti, Yevgeniy Dodis, Siyao Guo, John P. Steinberger:
Random Oracles and Non-uniformity. EUROCRYPT (1) 2018: 227-258 - [i67]Sandro Coretti, Yevgeniy Dodis, Siyao Guo:
Non-Uniform Bounds in the Random-Permutation, Ideal-Cipher, and Generic-Group Models. IACR Cryptol. ePrint Arch. 2018: 226 (2018) - [i66]Melissa Chase, Yevgeniy Dodis, Yuval Ishai, Daniel Kraschewski, Tianren Liu, Rafail Ostrovsky, Vinod Vaikuntanathan:
Reusable Non-Interactive Secure Computation. IACR Cryptol. ePrint Arch. 2018: 940 (2018) - [i65]Joël Alwen, Sandro Coretti, Yevgeniy Dodis:
The Double Ratchet: Security Notions, Proofs, and Modularization for the Signal Protocol. IACR Cryptol. ePrint Arch. 2018: 1037 (2018) - 2017
- [j8]Yevgeniy Dodis, Adi Shamir, Noah Stephens-Davidowitz, Daniel Wichs:
How to Eat Your Entropy and Have it Too: Optimal Recovery Strategies for Compromised RNGs. Algorithmica 79(4): 1196-1232 (2017) - [c117]Yevgeniy Dodis:
Basing cryptography on biometrics and other noisy data. CISS 2017: 1 - [c116]Joanne Woodage, Rahul Chatterjee, Yevgeniy Dodis, Ari Juels, Thomas Ristenpart:
A New Distribution-Sensitive Secure Sketch and Popularity-Proportional Hashing. CRYPTO (3) 2017: 682-710 - [c115]Yevgeniy Dodis, Siyao Guo, Jonathan Katz:
Fixing Cracks in the Concrete: Random Oracles with Auxiliary Input, Revisited. EUROCRYPT (2) 2017: 473-495 - [c114]Yevgeniy Dodis, Dario Fiore:
Unilaterally-Authenticated Key Exchange. Financial Cryptography 2017: 542-560 - [i64]Yevgeniy Dodis, Jonathan Katz, John P. Steinberger, Aishwarya Thiruvengadam, Zhe Zhang:
Provable Security of Substitution-Permutation Networks. IACR Cryptol. ePrint Arch. 2017: 16 (2017) - [i63]Yevgeniy Dodis, Dario Fiore:
Unilaterally-Authenticated Key Exchange. IACR Cryptol. ePrint Arch. 2017: 109 (2017) - [i62]Joanne Woodage, Rahul Chatterjee, Yevgeniy Dodis, Ari Juels, Thomas Ristenpart:
A New Distribution Sensitive Secure Sketch and a Comparison Between Approaches to Typo-Tolerant Authentication. IACR Cryptol. ePrint Arch. 2017: 542 (2017) - [i61]Sandro Coretti, Yevgeniy Dodis, Siyao Guo, John P. Steinberger:
Random Oracles and Non-Uniformity. IACR Cryptol. ePrint Arch. 2017: 937 (2017) - 2016
- [c113]Yevgeniy Dodis, Shai Halevi, Ron D. Rothblum, Daniel Wichs:
Spooky Encryption and Its Applications. CRYPTO (3) 2016: 93-122 - [c112]Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz:
Message Transmission with Reverse Firewalls - Secure Communication on Corrupted Machines. CRYPTO (1) 2016: 341-372 - [c111]Yevgeniy Dodis, Martijn Stam, John P. Steinberger, Tianren Liu:
Indifferentiability of Confusion-Diffusion Networks. EUROCRYPT (2) 2016: 679-704 - [c110]Sandro Coretti, Yevgeniy Dodis, Björn Tackmann, Daniele Venturi:
Non-Malleable Encryption: Simpler, Shorter, Stronger. TCC (A1) 2016: 306-335 - [c109]Allison Bishop, Yevgeniy Dodis:
Interactive Coding for Interactive Proofs. TCC (A2) 2016: 352-366 - [i60]Yevgeniy Dodis, Shai Halevi, Ron D. Rothblum, Daniel Wichs:
Spooky Encryption and its Applications. IACR Cryptol. ePrint Arch. 2016: 272 (2016) - [i59]Yevgeniy Dodis, Chaya Ganesh, Alexander Golovnev, Ari Juels, Thomas Ristenpart:
A Formal Treatment of Backdoored Pseudorandom Generators. IACR Cryptol. ePrint Arch. 2016: 306 (2016) - 2015
- [c108]Yevgeniy Dodis, Yanqing Yao:
Privacy with Imperfect Randomness. CRYPTO (2) 2015: 463-482 - [c107]Yevgeniy Dodis, Chaya Ganesh, Alexander Golovnev, Ari Juels, Thomas Ristenpart:
A Formal Treatment of Backdoored Pseudorandom Generators. EUROCRYPT (1) 2015: 101-126 - [c106]Divesh Aggarwal, Yevgeniy Dodis, Tomasz Kazana, Maciej Obremski:
Non-malleable Reductions and Applications. STOC 2015: 459-468 - [e3]Yevgeniy Dodis, Jesper Buus Nielsen:
Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I. Lecture Notes in Computer Science 9014, Springer 2015, ISBN 978-3-662-46493-9 [contents] - [e2]Yevgeniy Dodis, Jesper Buus Nielsen:
Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part II. Lecture Notes in Computer Science 9015, Springer 2015, ISBN 978-3-662-46496-0 [contents] - [i58]Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz:
Message Transmission with Reverse Firewalls - Secure Communication on Corrupted Machines. IACR Cryptol. ePrint Arch. 2015: 548 (2015) - [i57]Yevgeniy Dodis, Tianren Liu, Martijn Stam, John P. Steinberger:
Indifferentiability of Confusion-Diffusion Networks. IACR Cryptol. ePrint Arch. 2015: 680 (2015) - [i56]Sandro Coretti, Yevgeniy Dodis, Björn Tackmann, Daniele Venturi:
Non-Malleable Encryption: Simpler, Shorter, Stronger. IACR Cryptol. ePrint Arch. 2015: 772 (2015) - 2014
- [j7]Yevgeniy Dodis, Xin Li, Trevor D. Wooley, David Zuckerman:
Privacy Amplification and Nonmalleable Extractors Via Character Sums. SIAM J. Comput. 43(2): 800-830 (2014) - [c105]Yevgeniy Dodis, Adi Shamir, Noah Stephens-Davidowitz, Daniel Wichs:
How to Eat Your Entropy and Have It Too - Optimal Recovery Strategies for Compromised RNGs. CRYPTO (2) 2014: 37-54 - [c104]Divesh Aggarwal, Yevgeniy Dodis, Zahra Jafargholi, Eric Miles, Leonid Reyzin:
Amplifying Privacy in Privacy Amplification. CRYPTO (2) 2014: 183-198 - [c103]Yevgeniy Dodis, Krzysztof Pietrzak, Daniel Wichs:
Key Derivation without Entropy Waste. EUROCRYPT 2014: 93-110 - [c102]Yevgeniy Dodis, Dario Fiore:
Interactive Encryption and Message Authentication. SCN 2014: 494-513 - [c101]Divesh Aggarwal, Yevgeniy Dodis, Shachar Lovett:
Non-malleable codes from additive combinatorics. STOC 2014: 774-783 - [i55]Divesh Aggarwal, Yevgeniy Dodis, Tomasz Kazana, Maciej Obremski:
Non-malleable Reductions and Applications. Electron. Colloquium Comput. Complex. TR14 (2014) - [i54]Yevgeniy Dodis, Adi Shamir, Noah Stephens-Davidowitz, Daniel Wichs:
How to Eat Your Entropy and Have it Too - Optimal Recovery Strategies for Compromised RNGs. IACR Cryptol. ePrint Arch. 2014: 167 (2014) - [i53]Yevgeniy Dodis, Yanqing Yao:
Privacy and Imperfect Randomness. IACR Cryptol. ePrint Arch. 2014: 623 (2014) - [i52]Divesh Aggarwal, Yevgeniy Dodis, Tomasz Kazana, Maciej Obremski:
Non-malleable Reductions and Applications. IACR Cryptol. ePrint Arch. 2014: 821 (2014) - [i51]Yevgeniy Dodis, Allison Bishop Lewko:
Interactive Coding for Interactive Proofs. IACR Cryptol. ePrint Arch. 2014: 827 (2014) - 2013
- [c100]Shweta Agrawal, Yevgeniy Dodis, Vinod Vaikuntanathan, Daniel Wichs:
On Continual Leakage of Discrete Log Representations. ASIACRYPT (2) 2013: 401-420 - [c99]Yevgeniy Dodis, David Pointcheval, Sylvain Ruhault, Damien Vergnaud, Daniel Wichs:
Security analysis of pseudo-random number generators with input: /dev/random is not robust. CCS 2013: 647-658 - [c98]Elena Andreeva, Andrey Bogdanov, Yevgeniy Dodis, Bart Mennink, John P. Steinberger:
On the Indifferentiability of Key-Alternating Ciphers. CRYPTO (1) 2013: 531-550 - [c97]Yevgeniy Dodis, Yu Yu:
Overcoming Weak Expectations. TCC 2013: 1-22 - [i50]Divesh Aggarwal, Yevgeniy Dodis, Shachar Lovett:
Non-malleable Codes from Additive Combinatorics. Electron. Colloquium Comput. Complex. TR13 (2013) - [i49]Elena Andreeva, Andrey Bogdanov, Yevgeniy Dodis, Bart Mennink, John P. Steinberger:
On the Indifferentiability of Key-Alternating Ciphers. IACR Cryptol. ePrint Arch. 2013: 61 (2013) - [i48]Divesh Aggarwal, Yevgeniy Dodis, Shachar Lovett:
Non-malleable Codes from Additive Combinatorics. IACR Cryptol. ePrint Arch. 2013: 201 (2013) - [i47]Yevgeniy Dodis, David Pointcheval, Sylvain Ruhault, Damien Vergnaud, Daniel Wichs:
Security Analysis of Pseudo-Random Number Generators with Input: /dev/random is not Robust. IACR Cryptol. ePrint Arch. 2013: 338 (2013) - [i46]Yevgeniy Dodis, Thomas Ristenpart, John P. Steinberger, Stefano Tessaro:
To Hash or Not to Hash Again? (In)differentiability Results for H2 and HMAC. IACR Cryptol. ePrint Arch. 2013: 382 (2013) - [i45]Yevgeniy Dodis, Krzysztof Pietrzak, Daniel Wichs:
Key Derivation Without Entropy Waste. IACR Cryptol. ePrint Arch. 2013: 708 (2013) - [i44]Divesh Aggarwal, Yevgeniy Dodis, Zahra Jafargholi, Eric Miles, Leonid Reyzin:
Amplifying Privacy in Privacy Amplification. IACR Cryptol. ePrint Arch. 2013: 723 (2013) - [i43]Yevgeniy Dodis, Dario Fiore:
Interactive Encryption, Message Authentication, and Anonymous Key Exchange. IACR Cryptol. ePrint Arch. 2013: 817 (2013) - 2012
- [j6]Richard Cole, Yevgeniy Dodis, Tim Roughgarden:
Bottleneck links, variable demand, and the tragedy of the commons. Networks 60(3): 194-203 (2012) - [j5]Yevgeniy Dodis, Bhavana Kanukurthi, Jonathan Katz, Leonid Reyzin, Adam D. Smith:
Robust Fuzzy Extractors and Authenticated Key Agreement From Close Secrets. IEEE Trans. Inf. Theory 58(9): 6207-6222 (2012) - [c96]Yevgeniy Dodis, Weiliang Luo, Shouhuai Xu, Moti Yung:
Key-insulated symmetric key cryptography and mitigating attacks against cryptographic cloud software. AsiaCCS 2012: 57-58 - [c95]