Yevgeniy Dodis
Yevgeniy Dodis
Verified email at cs.nyu.edu - Homepage
Title
Cited by
Cited by
Year
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
Y Dodis, R Ostrovsky, L Reyzin, A Smith
SIAM journal on computing 38 (1), 97-139, 2008
3199*2008
On the security of joint signature and encryption
JH An, Y Dodis, T Rabin
International Conference on the Theory and Applications of Cryptographic …, 2002
6942002
Merkle-Damgård revisited: How to construct a hash function
JS Coron, Y Dodis, C Malinaud, P Puniya
Annual International Cryptology Conference, 430-448, 2005
5792005
Key-insulated public key cryptosystems
Y Dodis, J Katz, S Xu, M Yung
International Conference on the Theory and Applications of Cryptographic …, 2002
4952002
Proofs of retrievability via hardness amplification
Y Dodis, S Vadhan, D Wichs
Theory of Cryptography Conference, 109-127, 2009
4752009
A verifiable random function with short proofs and keys
Y Dodis, A Yampolskiy
International Workshop on Public Key Cryptography, 416-431, 2005
3972005
Proxy cryptography revisited
Y Dodis
Proc. 10th Annual Network and Distributed System Security Symposium-NDSS'03, 2003
372*2003
Public key broadcast encryption for stateless receivers
Y Dodis, N Fazio
ACM Workshop on Digital Rights Management, 61-80, 2002
3692002
Leakage-resilient public-key cryptography in the bounded-retrieval model
J Alwen, Y Dodis, D Wichs
Annual International Cryptology Conference, 36-54, 2009
3162009
Strong key-insulated signature schemes
Y Dodis, J Katz, S Xu, M Yung
International Workshop on Public Key Cryptography, 130-144, 2003
3002003
Universally composable security with global setup
R Canetti, Y Dodis, R Pass, S Walfish
Theory of Cryptography Conference, 61-85, 2007
2982007
Secure remote authentication using biometric data
X Boyen, Y Dodis, J Katz, R Ostrovsky, A Smith
annual international conference on the theory and applications of …, 2005
2862005
Detection of algebraic manipulation with applications to robust secret sharing and fuzzy extractors
R Cramer, Y Dodis, S Fehr, C Padró, D Wichs
Annual International Conference on the Theory and Applications of …, 2008
2782008
Pricing network edges for heterogeneous selfish users
R Cole, Y Dodis, T Roughgarden
Proceedings of the thirty-fifth annual ACM symposium on Theory of computing …, 2003
2772003
Anonymous Identification in Ad Hoc Groups
Y Dodis, A Kiayias, A Nicolosi, V Shoup
International Conference on the Theory and Applications of Cryptographic …, 2004
2762004
Robust fuzzy extractors and authenticated key agreement from close secrets
Y Dodis, B Kanukurthi, J Katz, L Reyzin, A Smith
IEEE Transactions on Information Theory 58 (9), 6207-6222, 2012
260*2012
Cryptography against continuous memory attacks
Y Dodis, K Haralambiev, A López-Alt, D Wichs
2010 IEEE 51st Annual Symposium on Foundations of Computer Science, 511-520, 2010
2422010
On cryptography with auxiliary input
Y Dodis, YT Kalai, S Lovett
Proceedings of the forty-first annual ACM symposium on Theory of computing …, 2009
2292009
How much can taxes help selfish routing?
R Cole, Y Dodis, T Roughgarden
Journal of Computer and System Sciences 72 (3), 444-467, 2006
2262006
Public-key encryption schemes with auxiliary inputs
Y Dodis, S Goldwasser, YT Kalai, C Peikert, V Vaikuntanathan
Theory of Cryptography Conference, 361-381, 2010
2232010
The system can't perform the operation now. Try again later.
Articles 1–20