Yevgeniy Dodis
Affiliations: | New York University, New York, NY, United States |
Area:
Computer ScienceGoogle:
"Yevgeniy Dodis"Children
Sign in to add traineeNelly Fazio | grad student | 2006 | NYU |
Prashant Puniya | grad student | 2007 | NYU |
Shabsi Walfish | grad student | 2008 | NYU |
Carl Bosley | grad student | 2010 | NYU |
Joel Alwen | grad student | 2011 | NYU |
Daniel Wichs | grad student | 2011 | NYU |
Adriana Lopez-Alt | grad student | 2014 | NYU |
Aristeidis Tentes | grad student | 2014 | NYU |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Coretti S, Dodis Y, Tackmann B, et al. (2016) Non-malleable encryption: Simpler, shorter, stronger Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9562: 306-335 |
Dodis Y, Mironov I, Stephens-Davidowitz N. (2016) Message transmission with reverse firewalls—Secure communication on corrupted machines Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9814: 241-372 |
Dodis Y, Halevi S, Rothblum RD, et al. (2016) Spooky encryption and its applications Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9816: 93-122 |
Dodis Y, Ganesh C, Golovnev A, et al. (2015) A formal treatment of backdoored pseudorandom generators Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9056: 101-126 |
Dodis Y, Shamir A, Stephens-Davidowitz N, et al. (2014) How to eat your entropy and have it too - Optimal recovery strategies for compromised RNGs Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8617: 37-54 |
Dodis Y, Pietrzak K, Wichs D. (2014) Key derivation without entropy waste Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8441: 93-110 |
Dodis Y, Fiore D. (2014) Interactive encryption and message authentication Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8642: 494-513 |
Dodis Y, Pointcheval D, Ruhault S, et al. (2013) Security analysis of pseudo-random number generators with input: /dev/random is not robust Proceedings of the Acm Conference On Computer and Communications Security. 647-658 |
Agrawal S, Dodis Y, Vaikuntanathan V, et al. (2013) On continual leakage of discrete log representations Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8270: 401-420 |
Dodis Y, Kanukurthi B, Katz J, et al. (2012) Robust fuzzy extractors and authenticated key agreement from close secrets Ieee Transactions On Information Theory. 58: 6207-6222 |