Yevgeniy Dodis mainly focuses on Computer security, Theoretical computer science, Public-key cryptography, Encryption and Cryptography. His research in Computer security intersects with topics in Scheme and Digital signature. His Theoretical computer science research incorporates elements of Random oracle, Multiple encryption, Key and Algorithm.
The Public-key cryptography study combines topics in areas such as Adversary, Ciphertext and Bounded function. His Encryption research is included under the broader classification of Computer network. He has researched Cryptography in several fields, including Hamming distance and Biometrics.
Yevgeniy Dodis mainly investigates Theoretical computer science, Encryption, Cryptography, Discrete mathematics and Computer security. His Theoretical computer science research includes elements of Random oracle, Pseudorandom number generator, Hash function, Authentication and Key. His Encryption research incorporates themes from Scheme and Cryptographic primitive.
His work in Cryptography addresses subjects such as Biometrics, which are connected to disciplines such as Hamming distance. His Discrete mathematics study combines topics in areas such as Entropy, Simple, Block cipher and Combinatorics. Many of his studies involve connections with topics such as Computer network and Computer security.
His primary scientific interests are in Theoretical computer science, Encryption, Cryptography, Computer security and Discrete mathematics. His Theoretical computer science study incorporates themes from Sketch, Random oracle, Construct, Hash function and Distribution. The Random oracle study combines topics in areas such as Cryptographic protocol, Cryptographic primitive and Pseudorandom number generator.
Yevgeniy Dodis combines subjects such as Algorithm and Bounded function with his study of Hash function. The study incorporates disciplines such as Mathematical proof and Secret sharing in addition to Encryption. His study in Cryptography is interdisciplinary in nature, drawing from both Differential privacy, Random number generation and Coding theory.
His main research concerns Encryption, Theoretical computer science, Discrete mathematics, Cryptography and Computer security. In Encryption, he works on issues like Mathematical proof, which are connected to SIGNAL, Secure messaging, Forward secrecy, Protocol and Symmetric-key algorithm. His Theoretical computer science research incorporates elements of Pseudorandom generator, Random oracle, Cryptographic primitive, Construct and Hash function.
His Permutation study in the realm of Discrete mathematics connects with subjects such as Generic algorithms. His work in the fields of Cryptography, such as Hybrid cryptosystem, intersects with other areas such as Impossibility. His Computer security research is multidisciplinary, relying on both Verifiable secret sharing, Modular programming and Encoding.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
Yevgeniy Dodis;Leonid Reyzin;Adam D. Smith.
theory and application of cryptographic techniques (2004)
Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
Yevgeniy Dodis;Rafail Ostrovsky;Leonid Reyzin;Adam Smith.
SIAM Journal on Computing (2008)
On the Security of Joint Signature and Encryption
Jee Hea An;Yevgeniy Dodis;Tal Rabin.
international cryptology conference (2002)
Merkle-Damgård revisited: how to construct a hash function
Jean-Sébastien Coron;Yevgeniy Dodis;Cécile Malinaud;Prashant Puniya.
international cryptology conference (2005)
Key-Insulated Public Key Cryptosystems
Yevgeniy Dodis;Jonathan Katz;Shouhuai Xu;Moti Yung.
international cryptology conference (2002)
Proofs of Retrievability via Hardness Amplification
Yevgeniy Dodis;Salil Vadhan;Daniel Wichs.
theory of cryptography conference (2009)
A verifiable random function with short proofs and keys
Yevgeniy Dodis;Aleksandr Yampolskiy.
public key cryptography (2005)
Public Key Cryptography - Pkc 2006
Moti Yung;Moti Yung;Yevgeniy Dodis;Yevgeniy Dodis;Aggelos Kiayias;Tal Malkin.
Proxy cryptography revisted
Anca-Andreea Ivan;Yevgeniy Dodis.
network and distributed system security symposium (2003)
Public key broadcast encryption for stateless receivers
Yevgeniy Dodis;Nelly Fazio.
digital rights management (2002)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below: