Yevgeniy Dodis

Affiliations: 
New York University, New York, NY, United States 
Area:
Computer Science
Google:
"Yevgeniy Dodis"

Children

Sign in to add trainee
Nelly Fazio grad student 2006 NYU
Prashant Puniya grad student 2007 NYU
Shabsi Walfish grad student 2008 NYU
Carl Bosley grad student 2010 NYU
Joel Alwen grad student 2011 NYU
Daniel Wichs grad student 2011 NYU
Adriana Lopez-Alt grad student 2014 NYU
Aristeidis Tentes grad student 2014 NYU
BETA: Related publications

Publications

You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect.

Coretti S, Dodis Y, Tackmann B, et al. (2016) Non-malleable encryption: Simpler, shorter, stronger Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9562: 306-335
Dodis Y, Mironov I, Stephens-Davidowitz N. (2016) Message transmission with reverse firewalls—Secure communication on corrupted machines Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9814: 241-372
Dodis Y, Halevi S, Rothblum RD, et al. (2016) Spooky encryption and its applications Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9816: 93-122
Dodis Y, Ganesh C, Golovnev A, et al. (2015) A formal treatment of backdoored pseudorandom generators Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9056: 101-126
Dodis Y, Shamir A, Stephens-Davidowitz N, et al. (2014) How to eat your entropy and have it too - Optimal recovery strategies for compromised RNGs Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8617: 37-54
Dodis Y, Pietrzak K, Wichs D. (2014) Key derivation without entropy waste Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8441: 93-110
Dodis Y, Fiore D. (2014) Interactive encryption and message authentication Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8642: 494-513
Dodis Y, Pointcheval D, Ruhault S, et al. (2013) Security analysis of pseudo-random number generators with input: /dev/random is not robust Proceedings of the Acm Conference On Computer and Communications Security. 647-658
Agrawal S, Dodis Y, Vaikuntanathan V, et al. (2013) On continual leakage of discrete log representations Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8270: 401-420
Dodis Y, Kanukurthi B, Katz J, et al. (2012) Robust fuzzy extractors and authenticated key agreement from close secrets Ieee Transactions On Information Theory. 58: 6207-6222
See more...