Fuzzy extractors: How to generate strong keys from biometrics and other noisy data Y Dodis, R Ostrovsky, L Reyzin, A Smith SIAM journal on computing 38 (1), 97-139, 2008 | 4272* | 2008 |
On the security of joint signature and encryption JH An, Y Dodis, T Rabin Advances in Cryptology—EUROCRYPT 2002: International Conference on the …, 2002 | 792 | 2002 |
Merkle-Damgård revisited: How to construct a hash function JS Coron, Y Dodis, C Malinaud, P Puniya Advances in Cryptology–CRYPTO 2005: 25th Annual International Cryptology …, 2005 | 721 | 2005 |
A verifiable random function with short proofs and keys Y Dodis, A Yampolskiy International Workshop on Public Key Cryptography, 416-431, 2005 | 565 | 2005 |
Key-insulated public key cryptosystems Y Dodis, J Katz, S Xu, M Yung Advances in Cryptology—EUROCRYPT 2002: International Conference on the …, 2002 | 559 | 2002 |
Proofs of retrievability via hardness amplification Y Dodis, S Vadhan, D Wichs Theory of Cryptography: 6th Theory of Cryptography Conference, TCC 2009, San …, 2009 | 550 | 2009 |
Universally composable security with global setup R Canetti, Y Dodis, R Pass, S Walfish Theory of Cryptography: 4th Theory of Cryptography Conference, TCC 2007 …, 2007 | 478 | 2007 |
Proxy cryptography revisited Y Dodis NDSS'03, 2003 | 460* | 2003 |
Public key broadcast encryption for stateless receivers Y Dodis, N Fazio Digital Rights Management: ACM CCS-9 Workshop, DRM 2002, Washington, DC, USA …, 2003 | 416 | 2003 |
Leakage-resilient public-key cryptography in the bounded-retrieval model J Alwen, Y Dodis, D Wichs Advances in Cryptology-CRYPTO 2009: 29th Annual International Cryptology …, 2009 | 374 | 2009 |
Anonymous Identification in Ad Hoc Groups Y Dodis, A Kiayias, A Nicolosi, V Shoup Advances in Cryptology-EUROCRYPT 2004: International Conference on the …, 2004 | 360 | 2004 |
Detection of algebraic manipulation with applications to robust secret sharing and fuzzy extractors R Cramer, Y Dodis, S Fehr, C Padró, D Wichs Annual International Conference on the Theory and Applications of …, 2008 | 346 | 2008 |
Secure remote authentication using biometric data X Boyen, Y Dodis, J Katz, R Ostrovsky, A Smith Advances in Cryptology–EUROCRYPT 2005: 24th Annual International Conference …, 2005 | 344 | 2005 |
Strong key-insulated signature schemes Y Dodis, J Katz, S Xu, M Yung Public Key Cryptography—PKC 2003: 6th International Workshop on Practice …, 2002 | 339 | 2002 |
Robust fuzzy extractors and authenticated key agreement from close secrets Y Dodis, B Kanukurthi, J Katz, L Reyzin, A Smith IEEE Transactions on Information Theory 58 (9), 6207-6222, 2012 | 329* | 2012 |
Pricing network edges for heterogeneous selfish users R Cole, Y Dodis, T Roughgarden Proceedings of the thirty-fifth annual ACM symposium on Theory of computing …, 2003 | 329 | 2003 |
Cryptography against continuous memory attacks Y Dodis, K Haralambiev, A López-Alt, D Wichs 2010 IEEE 51st Annual Symposium on Foundations of Computer Science, 511-520, 2010 | 293 | 2010 |
Public-key encryption schemes with auxiliary inputs Y Dodis, S Goldwasser, Y Tauman Kalai, C Peikert, V Vaikuntanathan Theory of Cryptography: 7th Theory of Cryptography Conference, TCC 2010 …, 2010 | 272 | 2010 |
On cryptography with auxiliary input Y Dodis, YT Kalai, S Lovett Proceedings of the forty-first annual ACM symposium on Theory of computing …, 2009 | 268 | 2009 |
How much can taxes help selfish routing? R Cole, Y Dodis, T Roughgarden Proceedings of the 4th ACM Conference on Electronic Commerce, 98-107, 2003 | 261 | 2003 |