Suivre
Yevgeniy Dodis
Yevgeniy Dodis
Adresse e-mail validée de cs.nyu.edu - Page d'accueil
Titre
Citée par
Citée par
Année
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
Y Dodis, R Ostrovsky, L Reyzin, A Smith
SIAM journal on computing 38 (1), 97-139, 2008
4090*2008
On the security of joint signature and encryption
JH An, Y Dodis, T Rabin
Advances in Cryptology—EUROCRYPT 2002: International Conference on the …, 2002
7802002
Merkle-Damgård revisited: How to construct a hash function
JS Coron, Y Dodis, C Malinaud, P Puniya
Advances in Cryptology–CRYPTO 2005: 25th Annual International Cryptology …, 2005
6942005
Key-insulated public key cryptosystems
Y Dodis, J Katz, S Xu, M Yung
Advances in Cryptology—EUROCRYPT 2002: International Conference on the …, 2002
5572002
Proofs of retrievability via hardness amplification
Y Dodis, S Vadhan, D Wichs
Theory of Cryptography: 6th Theory of Cryptography Conference, TCC 2009, San …, 2009
5512009
A verifiable random function with short proofs and keys
Y Dodis, A Yampolskiy
International Workshop on Public Key Cryptography, 416-431, 2005
5292005
Universally composable security with global setup
R Canetti, Y Dodis, R Pass, S Walfish
Theory of Cryptography: 4th Theory of Cryptography Conference, TCC 2007 …, 2007
4522007
Proxy cryptography revisited
Y Dodis
NDSS'03, 2003
446*2003
Public key broadcast encryption for stateless receivers
Y Dodis, N Fazio
Digital Rights Management: ACM CCS-9 Workshop, DRM 2002, Washington, DC, USA …, 2003
4162003
Leakage-resilient public-key cryptography in the bounded-retrieval model
J Alwen, Y Dodis, D Wichs
Advances in Cryptology-CRYPTO 2009: 29th Annual International Cryptology …, 2009
3712009
Anonymous Identification in Ad Hoc Groups
Y Dodis, A Kiayias, A Nicolosi, V Shoup
Advances in Cryptology-EUROCRYPT 2004: International Conference on the …, 2004
3522004
Strong key-insulated signature schemes
Y Dodis, J Katz, S Xu, M Yung
Public Key Cryptography—PKC 2003: 6th International Workshop on Practice …, 2002
3362002
Secure remote authentication using biometric data
X Boyen, Y Dodis, J Katz, R Ostrovsky, A Smith
Advances in Cryptology–EUROCRYPT 2005: 24th Annual International Conference …, 2005
3352005
Detection of algebraic manipulation with applications to robust secret sharing and fuzzy extractors
R Cramer, Y Dodis, S Fehr, C Padró, D Wichs
Annual International Conference on the Theory and Applications of …, 2008
3342008
Pricing network edges for heterogeneous selfish users
R Cole, Y Dodis, T Roughgarden
Proceedings of the thirty-fifth annual ACM symposium on Theory of computing …, 2003
3222003
Robust fuzzy extractors and authenticated key agreement from close secrets
Y Dodis, B Kanukurthi, J Katz, L Reyzin, A Smith
IEEE Transactions on Information Theory 58 (9), 6207-6222, 2012
319*2012
Cryptography against continuous memory attacks
Y Dodis, K Haralambiev, A López-Alt, D Wichs
2010 IEEE 51st Annual Symposium on Foundations of Computer Science, 511-520, 2010
2912010
Public-key encryption schemes with auxiliary inputs
Y Dodis, S Goldwasser, Y Tauman Kalai, C Peikert, V Vaikuntanathan
Theory of Cryptography: 7th Theory of Cryptography Conference, TCC 2010 …, 2010
2682010
On cryptography with auxiliary input
Y Dodis, YT Kalai, S Lovett
Proceedings of the forty-first annual ACM symposium on Theory of computing …, 2009
2562009
Public-key encryption in the bounded-retrieval model
J Alwen, Y Dodis, M Naor, G Segev, S Walfish, D Wichs
Advances in Cryptology–EUROCRYPT 2010: 29th Annual International Conference …, 2010
2542010
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20