Yevgeniy Dodis
According to our database^{1},
Yevgeniy Dodis
authored at least 151 papers
between 1999 and 2021.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis OtherLinks
Online presence:

on cs.nyu.edu
On csauthors.net:
Bibliography
2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
2020
J. Cryptol., 2020
Towards Defeating Backdoored Random Oracles: Indifferentiability with Bounded Adaptivity.
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
2018
NonUniform Bounds in the RandomPermutation, IdealCipher, and GenericGroup Models.
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
The Double Ratchet: Security Notions, Proofs, and Modularization for the Signal Protocol.
IACR Cryptol. ePrint Arch., 2018
Provable Security of (Tweakable) Block Ciphers Based on SubstitutionPermutation Networks.
Proceedings of the Advances in Cryptology  CRYPTO 2018, 2018
2017
A New Distribution Sensitive Secure Sketch and a Comparison Between Approaches to TypoTolerant Authentication.
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
How to Eat Your Entropy and Have it Too: Optimal Recovery Strategies for Compromised RNGs.
Algorithmica, 2017
Proceedings of the Advances in Cryptology  EUROCRYPT 2017  36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017
Proceedings of the Advances in Cryptology  CRYPTO 2017, 2017
Proceedings of the 51st Annual Conference on Information Sciences and Systems, 2017
2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
2015
Message Transmission with Reverse Firewalls  Secure Communication on Corrupted Machines.
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Proceedings of the Advances in Cryptology  CRYPTO 2015, 2015
2014
SIAM J. Comput., 2014
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
Electron. Colloquium Comput. Complex., 2014
Proceedings of the Security and Cryptography for Networks  9th International Conference, 2014
2013
To Hash or Not to Hash Again? (In)differentiability Results for H<sup>2</sup> and HMAC.
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
Security Analysis of PseudoRandom Number Generators with Input: /dev/random is not Robust.
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
Electron. Colloquium Comput. Complex., 2013
Proceedings of the Theory of Cryptography  10th Theory of Cryptography Conference, 2013
2012
IEEE Trans. Inf. Theory, 2012
Networks, 2012
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the Theory of Cryptography  9th Theory of Cryptography Conference, 2012
Proceedings of the Theory of Cryptography  9th Theory of Cryptography Conference, 2012
Proceedings of the Information Theoretic Security  6th International Conference, 2012
Proceedings of the Advances in Cryptology  CRYPTO 2012, 2012
Keyinsulated symmetric key cryptography and mitigating attacks against cryptographic cloud software.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012
2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
IACR Cryptol. ePrint Arch., 2011
IACR Cryptol. ePrint Arch., 2011
IACR Cryptol. ePrint Arch., 2011
Proceedings of the IEEE 52nd Annual Symposium on Foundations of Computer Science, 2011
Proceedings of the Advances in Cryptology  EUROCRYPT 2011, 2011
2010
Proceedings of the Practical Signcryption, 2010
IACR Cryptol. ePrint Arch., 2010
IACR Cryptol. ePrint Arch., 2010
Proceedings of the Theory of Cryptography, 7th Theory of Cryptography Conference, 2010
Proceedings of the 42nd ACM Symposium on Theory of Computing, 2010
LeakageResilient Pseudorandom Functions and SideChannel Attacks on Feistel Networks.
Proceedings of the Advances in Cryptology, 2010
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
2009
Proceedings of the IdentityBased Cryptography, 2009
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
Proceedings of the Theory of Cryptography, 6th Theory of Cryptography Conference, 2009
Proceedings of the Theory of Cryptography, 6th Theory of Cryptography Conference, 2009
Proceedings of the 41st Annual ACM Symposium on Theory of Computing, 2009
Proceedings of the Information Theoretic Security, 4th International Conference, 2009
Indifferentiability of PermutationBased Compression Functions and TreeBased Modes of Operation, with Applications to MD6.
Proceedings of the Fast Software Encryption, 16th International Workshop, 2009
Proceedings of the Advances in Cryptology, 2009
2008
J. Univers. Comput. Sci., 2008
IACR Cryptol. ePrint Arch., 2008
Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors.
IACR Cryptol. ePrint Arch., 2008
Proceedings of the Advances in Cryptology, 2008
Proceedings of the Advances in Cryptology, 2008
Getting the Best Out of Existing Hash Functions; or What if We Are Stuck with SHA?.
Proceedings of the Applied Cryptography and Network Security, 6th International Conference, 2008
2007
Proceedings of the Theory of Cryptography, 4th Theory of Cryptography Conference, 2007
Proceedings of the Fast Software Encryption, 14th International Workshop, 2007
Proceedings of the Advances in Cryptology, 2007
2006
J. Comput. Syst. Sci., 2006
IACR Cryptol. ePrint Arch., 2006
IACR Cryptol. ePrint Arch., 2006
IACR Cryptol. ePrint Arch., 2006
Electron. Colloquium Comput. Complex., 2006
Proceedings of the Theory of Cryptography, Third Theory of Cryptography Conference, 2006
Proceedings of the Theory of Cryptography, Third Theory of Cryptography Conference, 2006
Proceedings of the Theory of Cryptography, Third Theory of Cryptography Conference, 2006
Proceedings of the Automata, Languages and Programming, 33rd International Colloquium, 2006
Proceedings of the Advances in Cryptology, 2006
2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
IACR Cryptol. ePrint Arch., 2005
Distributed Comput., 2005
Proceedings of the Theory of Cryptography, Second Theory of Cryptography Conference, 2005
Proceedings of the 37th Annual ACM Symposium on Theory of Computing, 2005
Proceedings of the IEEE Information Theory Workshop on Theory and Practice in InformationTheoretic Security, 2005
Proceedings of the Financial Cryptography and Data Security, 2005
Proceedings of the Advances in Cryptology, 2005
Proceedings of the Advances in Cryptology, 2005
Proceedings of the Advances in Cryptology, 2005
2004
IDBased Encryption for Complex Hierarchies with Applications to Forward Security and Broadcast Encryption.
IACR Cryptol. ePrint Arch., 2004
IACR Cryptol. ePrint Arch., 2004
IACR Cryptol. ePrint Arch., 2004
IACR Cryptol. ePrint Arch., 2004
Proceedings of the 45th Symposium on Foundations of Computer Science (FOCS 2004), 2004
Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data.
Proceedings of the Advances in Cryptology, 2004
Proceedings of the Advances in Cryptology, 2004
Proceedings of the Topics in Cryptology, 2004
Proceedings of the Advances in Cryptology, 2004
Proceedings of the 19th Annual IEEE Conference on Computational Complexity (CCC 2004), 2004
Proceedings of the 11th ACM Conference on Computer and Communications Security, 2004
Proceedings of the Approximation, 2004
2003
IACR Cryptol. ePrint Arch., 2003
Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data.
IACR Cryptol. ePrint Arch., 2003
Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack.
IACR Cryptol. ePrint Arch., 2003
IACR Cryptol. ePrint Arch., 2003
Proceedings of the 35th Annual ACM Symposium on Theory of Computing, 2003
Proceedings of the Approximation, 2003
Proceedings of the Public Key Cryptography, 2003
Proceedings of the Network and Distributed System Security Symposium, 2003
Proceedings of the Network and Distributed System Security Symposium, 2003
Proceedings of the Topics in Cryptology, 2003
2002
IACR Cryptol. ePrint Arch., 2002
IACR Cryptol. ePrint Arch., 2002
IACR Cryptol. ePrint Arch., 2002
IACR Cryptol. ePrint Arch., 2002
Proceedings of the First International IEEE Security in Storage Workshop, 2002
Proceedings of the 43rd Symposium on Foundations of Computer Science (FOCS 2002), 2002
Proceedings of the Security and Privacy in Digital Rights Management, 2002
2001
Proceedings of the Twelfth Annual Symposium on Discrete Algorithms, 2001
Proceedings of the Approximation, 2001
Proceedings of the Automata, Languages and Programming, 28th International Colloquium, 2001
Proceedings of the Advances in Cryptology, 2001
2000
PhD thesis, 2000
Impossibility of BlackBox Reduction from NonAdaptively to Adaptively Secure CoinFlipping
Electron. Colloquium Comput. Complex., 2000
Proceedings of the Advances in Cryptology, 2000
Proceedings of the Advances in Cryptology, 2000
Proceedings of the Advances in Cryptology, 2000
1999
Electron. Colloquium Comput. Complex., 1999
Proceedings of the ThirtyFirst Annual ACM Symposium on Theory of Computing, 1999
Proceedings of the Tenth Annual ACMSIAM Symposium on Discrete Algorithms, 1999
Proceedings of the Automata, 1999
Proceedings of the Advances in Cryptology, 1999