Yevgeniy Dodis
Yevgeniy Dodis
Verified email at - Homepage
Cited by
Cited by
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
Y Dodis, R Ostrovsky, L Reyzin, A Smith
SIAM journal on computing 38 (1), 97-139, 2008
On the security of joint signature and encryption
JH An, Y Dodis, T Rabin
Advances in Cryptology—EUROCRYPT 2002: International Conference on the …, 2002
Merkle-Damgård revisited: How to construct a hash function
JS Coron, Y Dodis, C Malinaud, P Puniya
Advances in Cryptology–CRYPTO 2005: 25th Annual International Cryptology …, 2005
A verifiable random function with short proofs and keys
Y Dodis, A Yampolskiy
International Workshop on Public Key Cryptography, 416-431, 2005
Key-insulated public key cryptosystems
Y Dodis, J Katz, S Xu, M Yung
Advances in Cryptology—EUROCRYPT 2002: International Conference on the …, 2002
Proofs of retrievability via hardness amplification
Y Dodis, S Vadhan, D Wichs
Theory of Cryptography: 6th Theory of Cryptography Conference, TCC 2009, San …, 2009
Universally composable security with global setup
R Canetti, Y Dodis, R Pass, S Walfish
Theory of Cryptography: 4th Theory of Cryptography Conference, TCC 2007 …, 2007
Proxy cryptography revisited
Y Dodis
NDSS'03, 2003
Public key broadcast encryption for stateless receivers
Y Dodis, N Fazio
Digital Rights Management: ACM CCS-9 Workshop, DRM 2002, Washington, DC, USA …, 2003
Leakage-resilient public-key cryptography in the bounded-retrieval model
J Alwen, Y Dodis, D Wichs
Advances in Cryptology-CRYPTO 2009: 29th Annual International Cryptology …, 2009
Anonymous Identification in Ad Hoc Groups
Y Dodis, A Kiayias, A Nicolosi, V Shoup
Advances in Cryptology-EUROCRYPT 2004: International Conference on the …, 2004
Detection of algebraic manipulation with applications to robust secret sharing and fuzzy extractors
R Cramer, Y Dodis, S Fehr, C Padró, D Wichs
Annual International Conference on the Theory and Applications of …, 2008
Secure remote authentication using biometric data
X Boyen, Y Dodis, J Katz, R Ostrovsky, A Smith
Advances in Cryptology–EUROCRYPT 2005: 24th Annual International Conference …, 2005
Strong key-insulated signature schemes
Y Dodis, J Katz, S Xu, M Yung
Public Key Cryptography—PKC 2003: 6th International Workshop on Practice …, 2002
Robust fuzzy extractors and authenticated key agreement from close secrets
Y Dodis, B Kanukurthi, J Katz, L Reyzin, A Smith
IEEE Transactions on Information Theory 58 (9), 6207-6222, 2012
Pricing network edges for heterogeneous selfish users
R Cole, Y Dodis, T Roughgarden
Proceedings of the thirty-fifth annual ACM symposium on Theory of computing …, 2003
Cryptography against continuous memory attacks
Y Dodis, K Haralambiev, A López-Alt, D Wichs
2010 IEEE 51st Annual Symposium on Foundations of Computer Science, 511-520, 2010
Public-key encryption schemes with auxiliary inputs
Y Dodis, S Goldwasser, Y Tauman Kalai, C Peikert, V Vaikuntanathan
Theory of Cryptography: 7th Theory of Cryptography Conference, TCC 2010 …, 2010
On cryptography with auxiliary input
Y Dodis, YT Kalai, S Lovett
Proceedings of the forty-first annual ACM symposium on Theory of computing …, 2009
How much can taxes help selfish routing?
R Cole, Y Dodis, T Roughgarden
Proceedings of the 4th ACM Conference on Electronic Commerce, 98-107, 2003
The system can't perform the operation now. Try again later.
Articles 1–20