Cryptographers' World
 

Yevgeniy Dodis


Author's Web Page Link

47 papers in database with 2749 citations StarStarStar

Editor of 1 conference proceedings book

H-number: 26

Conference Proceedings

 
1. Moti YungYevgeniy DodisAggelos KiayiasTal Malkin, editors, Public Key Cryptography - PKC 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings. Springer, 2006. ISBN 3-540-33851-9.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Yevgeniy Dodis,  John P. Steinberger,  Message Authentication Codes from Unpredictable Block Ciphers, pp. 267 - 285, CRYPTO 2009.

[Electronic Edition][Cited 5 times ]

2. Jo√ęl Alwen,  Yevgeniy Dodis,  Daniel Wichs,  Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model, pp. 36 - 54, CRYPTO 2009.

[Electronic Edition][Cited 47 times ]

3. Yevgeniy Dodis,  Thomas Ristenpart,  Thomas Shrimpton,  Salvaging Merkle-Damg√•rd for Practical Applications, pp. 371 - 388, EUROCRYPT 2009.

[Electronic Edition][Cited 17 times ]

4. Yevgeniy Dodis,  Jonathan Katz,  Adam Smith,  Shabsi Walfish,  Composability and On-Line Deniability of Authentication, pp. 146 - 162, TCC 2009.

[Electronic Edition][Cited 1 times ]

5. Yevgeniy Dodis,  Russell Impagliazzo,  Ragesh Jaiswal,  Valentine Kabanets,  Security Amplification for Interactive Cryptographic Primitives, pp. 128 - 145, TCC 2009.

[Electronic Edition][Cited 10 times ]

6. Yevgeniy Dodis,  Salil P. Vadhan,  Daniel Wichs,  Proofs of Retrievability via Hardness Amplification, pp. 109 - 127, TCC 2009.

[Electronic Edition][Cited 18 times ]

7. Yevgeniy Dodis,  Leonid Reyzin,  Ronald L. Rivest,  Emily Shen,  Indifferentiability of Permutation-Based Compression Functions and Tree-Based Modes of Operation, with Applications to MD6, pp. 104 - 121, FSE 2009.

[Electronic Edition][Cited 6 times ]

8. Yevgeniy Dodis,  Victor Shoup,  Shabsi Walfish,  Efficient Constructions of Composable Commitments and Zero-Knowledge Proofs, pp. 515 - 535, CRYPTO 2008.

[Electronic Edition][Cited 4 times ]

9. Yevgeniy Dodis,  Prashant Puniya,  Getting the Best Out of Existing Hash Functions; or What if We Are Stuck with SHA?, pp. 156 - 173, ACNS 2008.

[Electronic Edition][Cited 7 times ]

10. Ronald Cramer,  Yevgeniy Dodis,  Serge Fehr,  Carles Padr√≥,  Daniel Wichs,  Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors, pp. 471 - 488, EUROCRYPT 2008.

[Electronic Edition][Cited 27 times ]

11. Yevgeniy Dodis,  Krzysztof Pietrzak,  Prashant Puniya,  A New Mode of Operation for Block Ciphers and Length-Preserving MACs, pp. 198 - 219, EUROCRYPT 2008.

[Electronic Edition][Cited 21 times ]

12. Yevgeniy Dodis,  Krzysztof Pietrzak,  Improving the Security of MACs Via Randomized Message Preprocessing, pp. 414 - 433, FSE 2007.

[Electronic Edition][Cited 3 times ]

13. Carl Bosley,  Yevgeniy Dodis,  Does Privacy Require True Randomness?, pp. 1 - 20, TCC 2007.

[Electronic Edition][Cited 7 times ]

14. David Cash,  Yan Zong Ding,  Yevgeniy Dodis,  Wenke Lee,  Richard J. Lipton,  Shabsi Walfish,  Intrusion-Resilient Key Exchange in the Bounded Retrieval Model, pp. 479 - 498, TCC 2007.

[Electronic Edition][Cited 21 times ]

15. Ran Canetti,  Yevgeniy Dodis,  Rafael Pass,  Shabsi Walfish,  Universally Composable Security with Global Setup, pp. 61 - 85, TCC 2007.

[Electronic Edition][Cited 40 times ]

16. Yevgeniy Dodis,  Pil Joong Lee,  Dae Hyun Yum,  Optimistic Fair Exchange in a Multi-user Setting, pp. 118 - 133, PKC 2007.

[Electronic Edition][Cited 17 times ]

17. Yevgeniy Dodis,  Prashant Puniya,  Feistel Networks Made Public, and Applications, pp. 534 - 554, EUROCRYPT 2007.

[Electronic Edition][Cited 14 times ]

18. Yevgeniy Dodis,  Aleksandr Yampolskiy,  Moti Yung,  Threshold and Proactive Pseudo-Random Permutations, pp. 542 - 560, TCC 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 4 times ]

19. Dario Catalano,  Yevgeniy Dodis,  Ivan Visconti,  Mercurial Commitments: Minimal Assumptions and Efficient Constructions, pp. 120 - 144, TCC 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 24 times ]

20. Yevgeniy Dodis,  Krzysztof Pietrzak,  Bartosz Przydatek,  Separating Sources for Encryption and Secret Sharing, pp. 601 - 616, TCC 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 1 times ]

21. Yevgeniy Dodis,  Prashant Puniya,  On the Relation Between the Ideal Cipher and the Random Oracle Models, pp. 184 - 206, TCC 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 8 times ]

22. Yevgeniy Dodis,  Jonathan Katz,  Leonid Reyzin,  Adam Smith,  Robust Fuzzy Extractors and Authenticated Key Agreement from Close Secrets, pp. 232 - 250, CRYPTO 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 48 times ]

23. Jean-S√©bastien Coron,  Yevgeniy Dodis,  C√©cile Malinaud,  Prashant Puniya,  Merkle-Damg√•rd Revisited: How to Construct a Hash Function, pp. 430 - 448, CRYPTO 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 180 times Red StarRed Star]

24. Yevgeniy Dodis,  Roberto Oliveira,  Krzysztof Pietrzak,  On the Generic Insecurity of the Full Domain Hash, pp. 449 - 466, CRYPTO 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 30 times ]

25. Xavier Boyen,  Yevgeniy Dodis,  Jonathan Katz,  Rafail Ostrovsky,  Adam Smith,  Secure Remote Authentication Using Biometric Data, pp. 147 - 163, EUROCRYPT 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 100 times Red StarRed Star]

26. Yevgeniy Dodis,  Dae Hyun Yum,  Time Capsule Signature, pp. 57 - 71, FC 2005.

[Electronic Edition][Cited 11 times ]

27. Yevgeniy Dodis,  Jonathan Katz,  Chosen-Ciphertext Security of Multiple Encryption, pp. 188 - 209, TCC 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 75 times Red Star]

28. Yevgeniy Dodis,  Adam Smith,  Entropic Security and the Encryption of High Entropy Messages, pp. 556 - 577, TCC 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 27 times ]

29. Yevgeniy Dodis,  Aleksandr Yampolskiy,  A Verifiable Random Function with Short Proofs and Keys, pp. 416 - 431, PKC 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 91 times Red Star]

30. Yevgeniy Dodis,  Shien Jin Ong,  Manoj Prabhakaran,  Amit Sahai,  On the (Im)possibility of Cryptography with Imperfect Randomness, pp. 196 - 205, FOCS 2004.

[Electronic Edition][Cited 25 times ]

31. Yevgeniy Dodis,  Rosario Gennaro,  Johan H√•stad,  Hugo Krawczyk,  Tal Rabin,  Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes, pp. 494 - 510, CRYPTO 2004.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 64 times Red Star]

32. Yevgeniy Dodis,  Aggelos Kiayias,  Antonio Nicolosi,  Victor Shoup,  Anonymous Identification in Ad Hoc Groups, pp. 609 - 626, EUROCRYPT 2004.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 126 times Red StarRed Star]

33. Yevgeniy Dodis,  Leonid Reyzin,  Adam Smith,  Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data, pp. 523 - 540, EUROCRYPT 2004.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 405 times Red StarRed StarRed Star]

34. Yevgeniy Dodis,  Matthew K. Franklin,  Jonathan Katz,  Atsuko Miyaji,  Moti Yung,  A Generic Construction for Intrusion-Resilient Public-Key Encryption, pp. 81 - 98, CT-RSA 2004.

[Electronic Edition][Cited 34 times ]

35. Yevgeniy Dodis,  Jee Hea An,  Concealment and Its Applications to Authenticated Encryption, pp. 312 - 329, EUROCRYPT 2003.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 25 times ]

36. Yevgeniy Dodis,  Matthew K. Franklin,  Jonathan Katz,  Atsuko Miyaji,  Moti Yung,  Intrusion-Resilient Public-Key Encryption, pp. 19 - 32, CT-RSA 2003.

[Electronic Edition][Cited 66 times Red Star]

37. Yevgeniy Dodis,  Jonathan Katz,  Shouhuai Xu,  Moti Yung,  Strong Key-Insulated Signature Schemes, pp. 130 - 144, PKC 2003.

[Electronic Edition][Cited 151 times Red StarRed Star]

38. Yevgeniy Dodis,  Efficient Construction of (Distributed) Verifiable Random Functions, pp. 1 - 17, PKC 2003.

[Electronic Edition][Cited 41 times ]

39. Yevgeniy Dodis,  Nelly Fazio,  Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack, pp. 100 - 115, PKC 2003.

[Electronic Edition][Cited 85 times Red Star]

40. Jee Hea An,  Yevgeniy Dodis,  Tal Rabin,  On the Security of Joint Signature and Encryption, pp. 83 - 107, EUROCRYPT 2002.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 305 times Red StarRed StarRed Star]

41. Yevgeniy Dodis,  Jonathan Katz,  Shouhuai Xu,  Moti Yung,  Key-Insulated Public Key Cryptosystems, pp. 65 - 82, EUROCRYPT 2002.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 214 times Red StarRed Star]

42. Yevgeniy Dodis,  Joel Spencer,  On the (non)Universality of the One-Time Pad, pp. 376 - 376, FOCS 2002.

[Electronic Edition][Cited 33 times ]

43. Yevgeniy Dodis,  Amit Sahai,  Adam Smith,  On Perfect and Adaptive Security in Exposure-Resilient Cryptography, pp. 301 - 324, EUROCRYPT 2001.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 50 times Red Star]

44. Yevgeniy Dodis,  Shai Halevi,  Tal Rabin,  A Cryptographic Solution to a Game Theoretic Problem, pp. 112 - 130, CRYPTO 2000.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 66 times Red Star]

45. Yevgeniy Dodis,  Silvio Micali,  Parallel Reducibility for Information-Theoretically Secure Computation, pp. 74 - 92, CRYPTO 2000.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 46 times ]

46. Ran Canetti,  Yevgeniy Dodis,  Shai Halevi,  Eyal Kushilevitz,  Amit Sahai,  Exposure-Resilient Functions and All-or-Nothing Transforms, pp. 453 - 469, EUROCRYPT 2000.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 115 times Red StarRed Star]

47. Yevgeniy Dodis,  Silvio Micali,  Lower Bounds for Oblivious Transfer Reductions, pp. 42 - 55, EUROCRYPT 1999.

[Electronic Edition][Cited 34 times ]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...