Please, send your comments and questions to dodiscs.nyu.edu


Research Papers (in Reverse Chronological Order)

  1. Divesh Aggarwal, Yevgeniy Dodis and Shachar Lovett,
    "Non-malleable Codes from Additive Combinatorics" (.ps),
    Symposium on Theory of Computing (STOC), June 2014.

  2. Yevgeniy Dodis, Krzysztof Pietrzak and Daniel Wichs,
    "Key Derivation Without Entropy Waste" (.ps),
    Advances in Cryptology - EUROCRYPT, May 2014.

  3. Shweta Agrawal, Yevgeniy Dodis, Vinod Vaikuntanathan and Daniel Wichs,
    "On Continual Leakage of Discrete Log Representations" (.ps),
    Advances in Cryptology - ASIACRYPT, December 2013.

  4. Yevgeniy Dodis, David Pointcheval, Sylvain Ruhault, Damien Vergnaud and Daniel Wichs,
    "Security Analysis of Pseudo-Random Number Generators with Input: /dev/random is not Robust" (.ps),
    ACM Conference on Computer and Communication Security (CCS), November 2013.
    See also Slashdot post and Bruce Schneier blog.

  5. Elena Andreeva, Andrey Bogdanov, Yevgeniy Dodis, Bart Mennink and John P. Steinberger,
    "On the Indifferentiability of Key-Alternating Ciphers" (.ps),
    Advances in Cryptology - CRYPTO, August 2013.

  6. Yevgeniy Dodis and Yu Yu,
    "Overcoming Weak Expectations" (.ps),
    Theory of Cryptography Conference (TCC), March 2013.

  7. Yevgeniy Dodis and Yu Yu,
    "Overcoming Weak Expectations" (.ps) (invited paper),
    Information Theory Workshop (ITW), September 2012.

  8. Yevgeniy Dodis, Adriana Lopez-Alt, Ilya Mironov and Salil Vadhan,
    "Differential Privacy with Imperfect Randomness" (.ps),
    Advances in Cryptology - CRYPTO, August 2012.

  9. Yevgeniy Dodis, Tom Ristenpart, John Steinberger and Stefano Tessaro,
    "To Hash or Not to Hash Again? (In)differentiability Results for H^2 and HMAC" (.ps),
    Advances in Cryptology - CRYPTO, August 2012.

  10. Yevgeniy Dodis,
    "Shannon Impossibility, Revisited" (.ps),
    International Conference on Information Theoretic Security (ICITS), August 2012.

  11. Yevgeniy Dodis, Weiliang Luo, Shouhuai Xu and Moti Yung,
    "Key-Insulated Symmetric Key Cryptography and Mitigating Attacks against Cryptographic Cloud Software" (.ps),
    ACM Symposium on Information, Computer and Communications Security (ASIACCS), May 2012.

  12. Yevgeniy Dodis, Eike Kiltz, Krzysztof Pietrzak and Daniel Wichs,
    "Message Authentication, Revisited" (.ps),
    Advances in Cryptology - EUROCRYPT, April 2012.

  13. Yevgeniy Dodis, Thomas Ristenpart and Salil Vadhan,
    "Randomness Condensers for Efficiently Samplable, Seed-Dependent Sources" (.ps),
    Theory of Cryptography Conference (TCC), March 2012.

  14. Yevgeniy Dodis, Abhishek Jain, Tal Moran and Daniel Wichs,
    "Counterexamples to Hardness Amplification Beyond Negligible" (.ps),
    Theory of Cryptography Conference (TCC), March 2012.

  15. Yevgeniy Dodis, Iftach Haitner and Aris Tentes,
    "On the Instantiability of Hash-and-Sign RSA Signatures" (.ps),
    Theory of Cryptography Conference (TCC), March 2012.

  16. Yevgeniy Dodis, Xin Li, Trevor D. Wooley, and David Zuckerman,
    "Privacy Amplification and Non-Malleable Extractors Via Character Sums" (.ps),
    Foundations of Computer Science (FOCS), October 2011.

  17. Yevgeniy Dodis, Allison Lewko, Brent Waters and Daniel Wichs,
    "Storing Secrets on Continually Leaky Devices" (.ps),
    Foundations of Computer Science (FOCS), October 2011.

  18. Boaz Barak, Yevgeniy Dodis, Hugo Krawczyk, Olivier Pereira, Krzysztof Pietrzak, Francois-Xavier Standaert and Yu Yu,
    "Leftover Hash Lemma, Revisited" (.ps),
    Advances in Cryptology - CRYPTO, August 2011.
    Mentioned in the New Yorker magazine (right column, page 4)

  19. Yevgeniy Dodis and John Steinberger,
    "Domain Extension for MACs beyond the Birthday Barrier" (.ps),
    Advances in Cryptology - EUROCRYPT, May 2011.

  20. Yevgeniy Dodis, Kristiyan Haralambiev, Adriana Lopez-Alt and Daniel Wichs,
    "Efficient Public-Key Cryptography in the Presence of Key Leakage" (.ps),
    Advances in Cryptology - ASIACRYPT, December 2010.

  21. Yevgeniy Dodis, Kristiyan Haralambiev, Adriana Lopez-Alt and Daniel Wichs,
    "Cryptography Against Continuous Memory Attacks" (.ps),
    Foundations of Computer Science (FOCS), October 2010.

  22. Sherman Chow, Yevgeniy Dodis, Yannis Rouselakis and BrentWaters,
    "Practical Leakage-Resilient Identity-Based Encryption from Simple Assumptions" (.ps),
    ACM Conference on Computer and Communication Security (CCS), October 2010.

  23. Yevgeniy Dodis and Krzysztof Pietrzak,
    "Leakage-Resilient Pseudorandom Functions and Side-Channel Attacks on Feistel Networks" (.ps),
    Advances in Cryptology - CRYPTO, August 2010.

  24. Yevgeniy Dodis, Mihai Patrascu and Mikkel Thurup,
    "Changing Base Without Losing Space" (.ps),
    Symposium on Theory of Computing (STOC), June 2010.

  25. Joel Alwen, Yevgeniy Dodis, Moni Naor, Gil Segev, Shabsi Walfish and Daniel Wichs,
    "Public-Key Encryption in the Bounded-Retrieval Model" (.ps),
    Advances in Cryptology - EUROCRYPT, May 2010.

  26. Yevgeniy Dodis, Shafi Goldwasser, Yael Kalai, Chris Peikert and Vinod Vaikuntanathan,
    "Public-key Encryption Schemes with Auxiliary Inputs" (.ps),
    Theory of Cryptography Conference (TCC), February 2010.

  27. Jean-Sebastien Coron, Yevgeniy Dodis, Avradip Mandal and Yannick Seurin,
    "A Domain Extender for the Ideal Cipher" (.ps),
    Theory of Cryptography Conference (TCC), February 2010.

  28. Joel Alwen, Yevgeniy Dodis and Danuiel Wichs,
    "Survey: Leakage-Resilience and the Bounded Retrieval Model" (.ps),
    invited paper to International Conference on Information Theoretic Security (ICITS), 2009.

  29. Joel Alwen, Yevgeniy Dodis and Daniel Wichs,
    "Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model" (.ps),
    Advances in Cryptology - CRYPTO, August 2009.

  30. Yevgeniy Dodis and John Steinberger,
    "Message Authentication Codes from Unpredictable Block Ciphers" (.ps),
    Advances in Cryptology - CRYPTO, August 2009.

  31. Yevgeniy Dodis and Daniel Wichs,
    "Non-malleable Extractors and Symmetric Key Cryptography from Weak Secrets" (.ps),
    Symposium on Theory of Computing (STOC), May 2009.

  32. Yevgeniy Dodis, Yael Tauman Kalai and Shachar Lovett,
    "On Cryptography with Auxiliary Input" (.ps),
    Symposium on Theory of Computing (STOC), May 2009.

  33. Yevgeniy Dodis, Thomas Ristenpart and Thomas Shrimpton,
    "Salvaging Merkle-Damgard for Practical Applications" (.ps),
    Advances in Cryptology - EUROCRYPT, April 2009.

  34. Yevgeniy Dodis, Salil Vadhan and Daniel Wichs,
    "Proofs of Retrievability via Hardness Amplification" (.ps),
    Theory of Cryptography Conference (TCC), March 2009.

  35. Yevgeniy Dodis, Russell Impagliazzo, Ragesh Jaiswal and Valentine Kabanets,
    "Security Amplification for Interactive Cryptographic Primitives" (.ps),
    Theory of Cryptography Conference (TCC), March 2009.

  36. Yevgeniy Dodis, Jonathan Katz, Adam Smith and Shabsi Walfish,
    "Composability and On-Line Deniability of Authentication" (.ps),
    Theory of Cryptography Conference (TCC), March 2009.

  37. Yevgeniy Dodis, Leonid Reyzin, Ronald Rivest and Emily Shen,
    "Indifferentiability of Permutation-Based Compression Functions and Tree-Based Modes of Operation, with Applications to MD6" (.ps),
    Workshop on Fast Software Encryption (FSE), February 2009.

  38. Yevgeniy Dodis, Victor Shoup and Shabsi Walfish,
    "Efficient Constructions of Composable Commitments and Zero-Knowledge Proofs" (.ps),
    Advances in Cryptology - CRYPTO, August 2008.

  39. Yevgeniy Dodis and Prashant Puniya,
    "Getting the Best Out of Existing Hash Functions or What if We Are Stuck with SHA?" (.ps),
    Applied Cryptography and Network Security (ACNS) Conference, June 2008.

  40. Yevgeniy Dodis, Krzysztof Pietrzak and Prashant Puniya,
    "A New Mode of Operation for Block Ciphers and Length-Preserving MACs" (.ps),
    Advances in Cryptology - EUROCRYPT, April 2008.

  41. Ronald Cramer, Yevgeniy Dodis, Serge Fehr, Carles Padro and Daniel Wichs,
    "Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors" (.ps),
    Advances in Cryptology - EUROCRYPT, April 2008.

  42. Yevgeniy Dodis and Tal Rabin,
    "Cryptography and Game Theory" (.ps),
    invited book chapter in "Algorithmic Game Theory" (username: agt1user, password: cam2agt), 2007.

  43. Yevgeniy Dodis,
    "Concealment and Its Applications to Authenticated Encryption" (.ps),
    invited book chapter in "Practical Signcryption", 2007.

  44. Yevgeniy Dodis, Leonid Reyzin and Adam Smith,
    "Fuzzy Extractors" (.ps),
    invited book chapter in "Security with Noisy Data", 2007.

  45. Yevgeniy Dodis and Prashant Puniya,
    "Feistel Networks made Public, and Applications" (.ps),
    Advances in Cryptology - EUROCRYPT, May 2007.

  46. Yevgeniy Dodis, Pil Joong Lee and Dae Hyun Yum,
    "Optimistic Fair Exchange in a Multi-User Setting" (.ps),
    Workshop on Public Key Cryptography (PKC), April 2007.

  47. Yevgeniy Dodis and Krzysztof Pietrzak,
    "Improving the Security of MACs via Randomized Message Preprocessing" (.ps),
    Workshop on Fast Software Encryption (FSE), March 2007.

  48. Carl Bosley and Yevgeniy Dodis,
    "Does Privacy Require True Randomness?" (.ps),
    Theory of Cryptography Conference (TCC), February 2007.

  49. Ran Canetti, Yevgeniy Dodis, Rafael Pass and Shabsi Walfish,
    "Universally Composable Security with Global Setup" (.ps),
    Theory of Cryptography Conference (TCC), February 2007.

  50. David Cash, Yan Zong Ding, Yevgeniy Dodis, Wenke Lee, Richard Lipton and Shabsi Walfish,
    "Intrusion-Resilient Key Exchange in the Bounded Retrieval Model" (.ps),
    Theory of Cryptography Conference (TCC), February 2007.

  51. Yevgeniy Dodis, Bhavana Kanukurthi, Jonathan Katz, Leonid Reyzin and Adam Smith,
    "Robust Fuzzy Extractors and Authenticated Key Agreement from Close Secrets" (.ps),
    IEEE Transactions on Information Theory, 2012.
    Preliminary version (.ps; without Bhavana Kanukurthi) appeared in Advances in Cryptology - CRYPTO, August 2006.

  52. Yevgeniy Dodis and Renato Renner,
    "On the Impossibility of Extracting Classical Randomness Using a Quantum Computer" (.ps),
    International Colloquium on Automata, Languages and Programming (ICALP), July 2006.

  53. Dario Catalano, Yevgeniy Dodis and Ivan Visconti,
    "Mercurial Commitments: Minimal Assumptions and Efficient Constructions" (.ps),
    Theory of Cryptography Conference (TCC), March 2006.

    Part of this joint work is the following paper:
    Yevgeniy Dodis,
    "Minimal Assumptions for Efficient Mercurial Commitments",
    Cryptography EPrint Archive, report 2005/438.

  54. Yevgeniy Dodis, Krzysztof Pietrzak and Bartosz Przydatek
    "Separating Sources for Encryption and Secret-Sharing" (.ps),
    Theory of Cryptography Conference (TCC), March 2006.

  55. Yevgeniy Dodis and Prashant Puniya,
    "On the Relation between the Ideal Cipher and the Random Oracle Models" (.ps),
    Theory of Cryptography Conference (TCC), March 2006.

  56. Yevgeniy Dodis, Aleksandr Yampolskiy and Moti Yung,
    "Threshold and Proactive Pseudorandom Permutations" (.ps),
    Theory of Cryptography Conference (TCC), March 2006.

  57. Richard Cole, Yevgeniy Dodis and Tim Roughgarden,
    "Bottleneck Links, Variable Demand, and the Tragedy of the Commons" (.ps),
    ACM/SIAM Symposium on Discrete Algorithms (SODA), January 2006.

  58. Jean-Sebastian Coron, Yevgeniy Dodis, Cecile Malinaud and Prashant Puniya,
    "A New Design Criteria for Hash-Functions" (.ps),
    NIST Cryptographic Hash Workshop, November 2005.

  59. Yevgeniy Dodis,
    "On Extractors, Error-Correction and Hiding All Partial Information" (.ps) (invited paper),
    Information Theory Workshop (ITW), October 2005.

  60. Yevgeniy Dodis,
    "Signcryption (Short Survey)" (.ps),
    Encyclopedia of Cryptography and Security (updated version), 2005.

  61. Yevgeniy Dodis, Roberto Oliveira and Krzystof Pietrzak,
    "On the Generic Insecurity of the Full Domain Hash" (.ps),
    Advances in Cryptology - CRYPTO, August 2005.

  62. Jean-Sebastian Coron, Yevgeniy Dodis, Cecile Malinaud and Prashant Puniya,
    "Merkle-Damgard Revisited : how to Construct a Hash Function" (.ps),
    Advances in Cryptology - CRYPTO, August 2005.

  63. Yevgeniy Dodis and Adam Smith,
    "Correcting Errors Without Leaking Partial Information" (.ps),
    Symposium on Theory of Computing (STOC), May 2005.

  64. Xavier Boyen, Yevgeniy Dodis, Jonathan Katz, Rafail Ostrovsky and Adam Smith,
    "Secure Remote Authentication Using Biometrics" (.ps),
    Advances in Cryptology - EUROCRYPT, May 2005.

  65. Yevgeniy Dodis and Dae Hyun Yum,
    "Time Capsule Signature" (.ps),
    Financial Cryptography and Data Security Conference (FC), March 2005.

  66. Yevgeniy Dodis and Adam Smith,
    "Entropic Security and the Encryption of High-Entropy Messages" (.ps),
    Theory of Cryptography Conference (TCC), February 2005.

  67. Yevgeniy Dodis and Jonathan Katz,
    "Chosen Ciphertext Security For Multiple Encryption" (.ps),
    Theory of Cryptography Conference (TCC), February 2005.

  68. Yevgeniy Dodis and Aleksandr Yampolskiy,
    "A Verifiable Random Function With Short Proofs and Keys" (.ps), (winner of Best Paper Award)
    Workshop on Public Key Cryptography (PKC), January 2005. Winner of Best Paper Award.

  69. Danfeng Yao, Nelly Fazio, Yevgeniy Dodis and Anna Lysyanskaya,
    "ID-Based Encryption for Complex Hierarchies with Applications to Forward Security and Broadcast Encryption" (.ps),
    ACM Conference on Computer and Communication Security (CCS), October 2004.

  70. Yevgeniy Dodis, Michael J. Freedman, Stanislaw Jarecki and Shabsi Walfish,
    "Versatile Padding Schemes for Joint Signature and Encryption" (.ps),
    ACM Conference on Computer and Communication Security (CCS), October 2004.

  71. Yevgeniy Dodis, Shien Jin Ong, Manoj Prabhakaran and Amit Sahai,
    "On the (Im)possibility of Cryptography with Imperfect Randomness" (.ps),
    Foundations of Computer Science (FOCS), October 2004.

  72. Yevgeniy Dodis, Ariel Elbaz, Roberto Oliveira and Ran Raz,
    "Improved Randomness Extraction from Two Independent Sources" (.ps),
    International Workshop on Randomization and Approximation Techniques in Computer Science (RANDOM), August 2004.

  73. Yevgeniy Dodis, Rosario Gennaro, Johan Hastad, Hugo Krawczyk and Tal Rabin,
    "Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes" (.ps),
    Advances in Cryptology - CRYPTO, August 2004.

  74. Andris Ambainis, Harry Buhrman, Yevgeniy Dodis and Hein Röhrig,
    "Multiparty Quantum Coin Flipping" (.ps),
    Conference on Computational Complexity (CCC), June 2004.

  75. Yevgeniy Dodis, Aggelos Kiayias, Antonio Nicolosi and Victor Shoup,
    "Anonymous Identification in Ad-Hoc Groups" (subring.ps),
    Advances in Cryptology - EUROCRYPT, May 2004.

  76. Yevgeniy Dodis, Rafail Ostrovsky, Leonid Reyzin and Adam Smith,
    "Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data" (.ps),
    SIAM Journal of Computing, 38(1):97--139, 2008.
    Preliminary version (without Rafail Ostrovsky) appeared in Advances in Cryptology - EUROCRYPT, May 2004.

  77. Yevgeniy Dodis, Matt Franklin, Jonathan Katz, Atsuko Miyaji and Moti Yung,
    "A Generic Construction for Intrusion-Resilient Public-Key Encryption" (.ps),
    RSA Conference, Cryptography Track (CT-RSA), February 2004.

  78. Yevgeniy Dodis and Leonid Reyzin,
    "Breaking and Repairing Optimistic Fair Exchange from PODC 2003" (.ps),
    ACM Workshop on Digital Rights Management (DRM), October 2003.

  79. Yevgeniy Dodis and Roberto Oliveira,
    "On Extracting Private Randomness over a Public Channel" (.ps),
    International Workshop on Randomization and Approximation Techniques in Computer Science (RANDOM), August 2003.

  80. Yevgeniy Dodis, Nelly Fazio, Aggelos Kiayias and Moti Yung,
    "Scalable Public-Key Tracing and Revoking" (.ps),
    Principles of Distributed Computing (PODC), July 2003.

  81. Richard Cole, Yevgeniy Dodis and Tim Roughgarden,
    "Pricing Networks with Selfish Routing" (.ps) (survey),
    Workshop on Economics of Peer-to-Peer Systems, June 2003.

  82. Richard Cole, Yevgeniy Dodis and Tim Roughgarden,
    "Pricing Network Edges for Heterogeneous Selfish Users" (.ps),
    ACM Symposium on Theory of Computing (STOC), June 2003.

  83. Richard Cole, Yevgeniy Dodis and Tim Roughgarden,
    "How Much Can Taxes Help Selfish Routing?" (.ps),
    ACM Conference on Electronic Commerce (EC), June 2003.

  84. Yevgeniy Dodis and Jee Hea An,
    "Concealment and Its Applications to Authenticated Encryption" (.ps),
    Advances in Cryptology - EUROCRYPT, May 2003.

  85. Yevgeniy Dodis, Matt Franklin, Jonathan Katz, Atsuko Miyaji and Moti Yung,
    "Intrusion-Resilient Public-Key Encryption" (.ps),
    RSA Conference, Cryptography Track (CT-RSA), April 2003.

  86. Yevgeniy Dodis, Max Krohn, David Mazieres and Antonio Nicolosi,
    "Proactive Two-Party Signatures for User Authentication" (.ps),
    Network and Distributed System Security Symposium (NDSS), February 2003.

  87. Yevgeniy Dodis and Anca Ivan,
    "Proxy Cryptography Revisited" (.ps),
    Network and Distributed System Security Symposium (NDSS), February 2003.

  88. Yevgeniy Dodis,
    "Efficient Construction of (Distributed) Verifiable Random Functions" (.ps),
    Workshop on Public Key Cryptography (PKC) , January 2003.

  89. Yevgeniy Dodis, Jonathan Katz, and Moti Yung,
    "Strong Key-Insulated Signature Schemes" (.ps),
    Workshop on Public Key Cryptography (PKC), January 2003.

  90. Yevgeniy Dodis and Nelly Fazio,
    "Public Key Broadcast Encryption Secure Against Adaptive Chosen Ciphertext Attack" (.ps),
    Workshop on Public Key Cryptography (PKC) , January 2003.

  91. Yevgeniy Dodis and Moti Yung,
    "Exposure-Resilience for Free: the Case of Hierarchical ID-based Encryption" (.ps),
    IEEE International Security In Storage Workshop (SISW), December 2002.

  92. Yevgeniy Dodis and Nelly Fazio,
    "Public Key Broadcast Encryption for Stateless Receivers" (.ps),
    ACM Workshop on Digital Rights Management (DRM), November 2002.

  93. Yevgeniy Dodis and Joel Spencer,
    "On the (non)Universality of the One-Time Pad" (.ps),
    Foundations of Computer Science (FOCS), November 2002.

  94. Yevgeniy Dodis and Leonid Reyzin,
    "On the Power of Claw-Free Permutations" (.ps),
    Conference on Security in Communication Networks (SCN), July 2002.

  95. Jee Hea An, Yevgeniy Dodis and Tal Rabin,
    "On the Security of Joint Signature and Encryption" (.ps),
    Advances in Cryptology - EUROCRYPT, May 2002.

  96. Yevgeniy Dodis, Jonathan Katz, Shouhuai Xu, and Moti Yung,
    "Key-Insulated Public Key Cryptosystems" (.ps),
    Advances in Cryptology - EUROCRYPT, May 2002.

  97. Yevgeniy Dodis and Shai Halevi,
    "Incremental Codes" (.ps),
    International Workshop on Approximation Algorithms for Combinatorial Optimization Problems (APPROX), August 2001.

  98. Yevgeniy Dodis,
    "New Imperfect Random Source with Applications to Coin-Flipping" (.ps),
    International Colloquium on Automata, Languages and Programming (ICALP), July 2001.

  99. Yevgeniy Dodis, Amit Sahai and Adam Smith,
    "On Perfect and Adaptive Security in Exposure-Resilient Cryptography" (.ps),
    Advances in Cryptology - EUROCRYPT, May 2001.

  100. Yevgeniy Dodis and Peter Winkler,
    "Universal Configurations for Light-Flipping Games" (.ps),
    (Short Form), ACM/SIAM Symposium on Discrete Algorithms (SODA), January 2001.

  101. Yevgeniy Dodis,
    "Impossibility of Black-Box Reduction from Non-Adaptively to Adaptively Secure Coin-Flipping" (.ps),
    Electronim Colloquium of Computational Complexity (ECCC), report 039, 2000. [Abstract]

  102. Yevgeniy Dodis and Silvio Micali,
    "Parallel Reducibility for Information-Theoretically Secure Computation" (.ps),
    Advances in Cryptology - CRYPTO, August 2000. [Abstract]

  103. Yevgeniy Dodis, Shai Halevi and Tal Rabin,
    "A Cryptographic Solution to a Game Theoretic Problem" (.ps),
    Advances in Cryptology - CRYPTO, August 2000. [Abstract]

  104. Ran Canetti, Yevgeniy Dodis, Shai Halevi, Eyal Kushilevitz and Amit Sahai,
    "Exposure-Resilient Functions and All-Or-Nothing Transforms" (.ps),
    Advances in Cryptology - EUROCRYPT, May 2000. [Abstract]

  105. Yevgeniy Dodis, Oded Goldreich, Eric Lehman, Sofya Raskhodnikova, Dana Ron, and Alex Samorodnitsky,
    "Improved Testing Algorithms for Monotonicity" (.ps),
    International Workshop on Randomization and Approximation Techniques in Computer Science (RANDOM), August 1999.

  106. Yevgeniy Dodis and Sanjeev Khanna,
    "Space-Time Tradeoffs for Graph Properties (extended abstract)" (.ps),
    International Colloquium on Automata, Languages and Programming (ICALP), July 1999.

  107. Yevgeniy Dodis and Silvio Micali,
    "Lower Bounds for Oblivious Transfer Reductions" (.ps),
    Advances in Cryptology - EUROCRYPT, May 1999. [Abstract]

  108. Yevgeniy Dodis and Sanjeev Khanna,
    "Designing Networks with Bounded Pairwise Distance" (.ps),
    ACM Symposium on Theory of Computing (STOC), May 1999.

  109. Yevgeniy Dodis, Venkatesan Guruswami and Sanjeev Khanna,
    "The 2-Catalog Segmentation Problem" (.ps),
    (Short Form), ACM/SIAM Symposium on Discrete Algorithms (SODA), January 1999.

  110. Yevgeniy Dodis, "Geodesics on Orbifolds", undergraduate research project published in the Geometry Center Annual Research Report, summer 1994. Visit Orbifold Pinball for more information.

Back to main page.