What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Yevgeniy Dodis
Google Scholar
ORCID:
0000-0003-1013-6318
118
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/eurocrypt
Triple Ratchet: A Bandwidth Efficient Hybrid-Secure Signal Protocol.
Yevgeniy Dodis
Daniel Jost
Shuichi Katsumata
Thomas Prest
Rolfe Schmidt
2025
conf/eurocrypt
Random Oracle Combiners: Merkle-Damgård Style.
Yevgeniy Dodis
Eli Goldin
Peter Hall
2025
conf/crypto
Anamorphic-Resistant Encryption; Or Why the Encryption Debate is Still Alive.
Yevgeniy Dodis
Eli Goldin
2025
conf/crypto
Guarding the Signal: Secure Messaging with Reverse Firewalls.
Yevgeniy Dodis
Bernardo Magri
Noah Stephens-Davidowitz
Yiannis Tselekounis
2025
conf/uss
How to Compare Bandwidth Constrained Two-Party Secure Messaging Protocols: A Quest for A More Efficient and Secure Post-Quantum Protocol.
Benedikt Auerbach
Yevgeniy Dodis
Daniel Jost
Shuichi Katsumata
Rolfe Schmidt
2024
journals/cic
HELP: Everlasting Privacy through Server-Aided Randomness.
Yevgeniy Dodis
Jiaxin Guan
Peter Hall
Alison Lin
2024
conf/crypto
Compact Key Storage - A Modern Approach to Key Backup and Delegation.
Yevgeniy Dodis
Daniel Jost
Antonio Marcedone
2024
conf/asiacrypt
Interval Key-Encapsulation Mechanism.
Alexander Bienstock
Yevgeniy Dodis
Paul Rösler
Daniel Wichs
2024
conf/tcc
Compact Key Storage in the Standard Model.
Yevgeniy Dodis
Daniel Jost
2023
conf/crypto
Random Oracle Combiners: Breaking the Concatenation Barrier for Collision-Resistance.
Yevgeniy Dodis
Niels Ferguson
Eli Goldin
Peter Hall
Krzysztof Pietrzak
2023
conf/eurocrypt
End-to-End Encrypted Zoom Meetings: Proving Security and Strengthening Liveness.
Yevgeniy Dodis
Daniel Jost
Balachandar Kesavan
Antonio Marcedone
2023
conf/eurocrypt
Speak Much, Remember Little: Cryptography in the Bounded Storage Model, Revisited.
Yevgeniy Dodis
Willy Quach
Daniel Wichs
2023
conf/tcc
Security with Functional Re-encryption from CPA.
Yevgeniy Dodis
Shai Halevi
Daniel Wichs
2023
conf/tcc
Immunizing Backdoored PRGs.
Marshall Ball
Yevgeniy Dodis
Eli Goldin
2022
conf/pkc
Encapsulated Search Index: Public-Key, Sub-linear, Distributed, and Delegatable.
Erik Aronesty
David Cash
Yevgeniy Dodis
Daniel H. Gallancy
Christopher Higley
Harish Karthikeyan
Oren Tysor
2022
conf/ctrsa
Multicast Key Agreement, Revisited.
Alexander Bienstock
Yevgeniy Dodis
Yi Tang
2022
conf/eurocrypt
Authentication in the Bounded Storage Model.
Yevgeniy Dodis
Willy Quach
Daniel Wichs
2022
conf/asiacrypt
Rotatable Zero Knowledge Sets - Post Compromise Secure Auditable Dictionaries with Application to Key Transparency.
Brian Chen
Yevgeniy Dodis
Esha Ghosh
Eli Goldin
Balachandar Kesavan
Antonio Marcedone
Merry Ember Mou
2022
conf/tcc
On the Worst-Case Inefficiency of CGKA.
Alexander Bienstock
Yevgeniy Dodis
Sanjam Garg
Garrison Grogan
Mohammad Hajiabadi
Paul Rösler
2022
conf/tcc
Forward-Secure Encryption with Fast Forwarding.
Yevgeniy Dodis
Daniel Jost
Harish Karthikeyan
2021
conf/ccs
Modular Design of Secure Group Messaging Protocols and the Security of MLS.
Joël Alwen
Sandro Coretti
Yevgeniy Dodis
Yiannis Tselekounis
2021
conf/crypto
No Time to Hash: On Super-Efficient Entropy Accumulation.
Yevgeniy Dodis
Siyao Guo
Noah Stephens-Davidowitz
Zhiye Xie
2021
conf/tcc
Forward Secret Encrypted RAM: Lower Bounds and Applications.
Alexander Bienstock
Yevgeniy Dodis
Kevin Yeo
2021
conf/tcc
Updatable Public Key Encryption in the Standard Model.
Yevgeniy Dodis
Harish Karthikeyan
Daniel Wichs
2020
journals/joc
Non-malleable Encryption: Simpler, Shorter, Stronger.
Sandro Coretti
Yevgeniy Dodis
Ueli Maurer
Björn Tackmann
Daniele Venturi
2020
conf/crypto
Security Analysis and Improvements for the IETF MLS Standard for Group Messaging.
Joël Alwen
Sandro Coretti
Yevgeniy Dodis
Yiannis Tselekounis
2020
conf/eurocrypt
Extracting Randomness from Extractor-Dependent Sources.
Yevgeniy Dodis
Vinod Vaikuntanathan
Daniel Wichs
2020
conf/tcc
Towards Defeating Backdoored Random Oracles: Indifferentiability with Bounded Adaptivity.
Yevgeniy Dodis
Pooya Farshim
Sogol Mazaheri
Stefano Tessaro
2020
conf/tcc
On the Price of Concurrency in Group Ratcheting Protocols.
Alexander Bienstock
Yevgeniy Dodis
Paul Rösler
2019
conf/crypto
Reusable Non-Interactive Secure Computation.
Melissa Chase
Yevgeniy Dodis
Yuval Ishai
Daniel Kraschewski
Tianren Liu
Rafail Ostrovsky
Vinod Vaikuntanathan
2019
conf/crypto
Seedless Fruit Is the Sweetest: Random Number Generation, Revisited.
Sandro Coretti
Yevgeniy Dodis
Harish Karthikeyan
Stefano Tessaro
2019
conf/eurocrypt
The Double Ratchet: Security Notions, Proofs, and Modularization for the Signal Protocol.
Joël Alwen
Sandro Coretti
Yevgeniy Dodis
2018
conf/crypto
Non-Uniform Bounds in the Random-Permutation, Ideal-Cipher, and Generic-Group Models.
Sandro Coretti
Yevgeniy Dodis
Siyao Guo
2018
conf/crypto
Provable Security of (Tweakable) Block Ciphers Based on Substitution-Permutation Networks.
Benoît Cogliati
Yevgeniy Dodis
Jonathan Katz
Jooyoung Lee
John P. Steinberger
Aishwarya Thiruvengadam
Zhe Zhang
2018
conf/crypto
Fast Message Franking: From Invisible Salamanders to Encryptment.
Yevgeniy Dodis
Paul Grubbs
Thomas Ristenpart
Joanne Woodage
2018
conf/eurocrypt
Random Oracles and Non-uniformity.
Sandro Coretti
Yevgeniy Dodis
Siyao Guo
John P. Steinberger
2017
conf/crypto
A New Distribution-Sensitive Secure Sketch and Popularity-Proportional Hashing.
Joanne Woodage
Rahul Chatterjee
Yevgeniy Dodis
Ari Juels
Thomas Ristenpart
2017
conf/fc
Unilaterally-Authenticated Key Exchange.
Yevgeniy Dodis
Dario Fiore
2017
conf/eurocrypt
Fixing Cracks in the Concrete: Random Oracles with Auxiliary Input, Revisited.
Yevgeniy Dodis
Siyao Guo
Jonathan Katz
2016
conf/crypto
Message Transmission with Reverse Firewalls - Secure Communication on Corrupted Machines.
Yevgeniy Dodis
Ilya Mironov
Noah Stephens-Davidowitz
2016
conf/crypto
Spooky Encryption and Its Applications.
Yevgeniy Dodis
Shai Halevi
Ron D. Rothblum
Daniel Wichs
2016
conf/eurocrypt
Indifferentiability of Confusion-Diffusion Networks.
Yevgeniy Dodis
Martijn Stam
John P. Steinberger
Tianren Liu
2016
conf/tcc
Interactive Coding for Interactive Proofs.
Allison Bishop
Yevgeniy Dodis
2016
conf/tcc
Non-Malleable Encryption: Simpler, Shorter, Stronger.
Sandro Coretti
Yevgeniy Dodis
Björn Tackmann
Daniele Venturi
2015
conf/crypto
Privacy with Imperfect Randomness.
Yevgeniy Dodis
Yanqing Yao
2015
conf/eurocrypt
A Formal Treatment of Backdoored Pseudorandom Generators.
Yevgeniy Dodis
Chaya Ganesh
Alexander Golovnev
Ari Juels
Thomas Ristenpart
2014
conf/crypto
How to Eat Your Entropy and Have It Too - Optimal Recovery Strategies for Compromised RNGs.
Yevgeniy Dodis
Adi Shamir
Noah Stephens-Davidowitz
Daniel Wichs
2014
conf/crypto
Amplifying Privacy in Privacy Amplification.
Divesh Aggarwal
Yevgeniy Dodis
Zahra Jafargholi
Eric Miles
Leonid Reyzin
2014
conf/eurocrypt
Key Derivation without Entropy Waste.
Yevgeniy Dodis
Krzysztof Pietrzak
Daniel Wichs
2013
conf/ccs
Security analysis of pseudo-random number generators with input: /dev/random is not robust.
Yevgeniy Dodis
David Pointcheval
Sylvain Ruhault
Damien Vergnaud
Daniel Wichs
2013
conf/crypto
On the Indifferentiability of Key-Alternating Ciphers.
Elena Andreeva
Andrey Bogdanov
Yevgeniy Dodis
Bart Mennink
John P. Steinberger
2013
conf/asiacrypt
On Continual Leakage of Discrete Log Representations.
Shweta Agrawal
Yevgeniy Dodis
Vinod Vaikuntanathan
Daniel Wichs
2013
conf/tcc
Overcoming Weak Expectations.
Yevgeniy Dodis
Yu Yu
2012
conf/ccs
Key-insulated symmetric key cryptography and mitigating attacks against cryptographic cloud software.
Yevgeniy Dodis
Weiliang Luo
Shouhuai Xu
Moti Yung
2012
conf/crypto
To Hash or Not to Hash Again? (In)Differentiability Results for H 2 and HMAC.
Yevgeniy Dodis
Thomas Ristenpart
John P. Steinberger
Stefano Tessaro
2012
conf/crypto
Differential Privacy with Imperfect Randomness.
Yevgeniy Dodis
Adriana López-Alt
Ilya Mironov
Salil P. Vadhan
2012
conf/eurocrypt
Message Authentication, Revisited.
Yevgeniy Dodis
Eike Kiltz
Krzysztof Pietrzak
Daniel Wichs
2012
conf/tcc
Counterexamples to Hardness Amplification beyond Negligible.
Yevgeniy Dodis
Abhishek Jain
Tal Moran
Daniel Wichs
2012
conf/tcc
On the Instantiability of Hash-and-Sign RSA Signatures.
Yevgeniy Dodis
Iftach Haitner
Aris Tentes
2012
conf/tcc
Randomness Condensers for Efficiently Samplable, Seed-Dependent Sources.
Yevgeniy Dodis
Thomas Ristenpart
Salil P. Vadhan
2011
conf/crypto
Leftover Hash Lemma, Revisited.
Boaz Barak
Yevgeniy Dodis
Hugo Krawczyk
Olivier Pereira
Krzysztof Pietrzak
François-Xavier Standaert
Yu Yu
2011
conf/eurocrypt
Domain Extension for MACs Beyond the Birthday Barrier.
Yevgeniy Dodis
John P. Steinberger
2010
conf/ccs
Practical leakage-resilient identity-based encryption from simple assumptions.
Sherman S. M. Chow
Yevgeniy Dodis
Yannis Rouselakis
Brent Waters
2010
conf/crypto
Leakage-Resilient Pseudorandom Functions and Side-Channel Attacks on Feistel Networks.
Yevgeniy Dodis
Krzysztof Pietrzak
2010
conf/eurocrypt
Public-Key Encryption in the Bounded-Retrieval Model.
Joël Alwen
Yevgeniy Dodis
Moni Naor
Gil Segev
Shabsi Walfish
Daniel Wichs
2010
conf/asiacrypt
Efficient Public-Key Cryptography in the Presence of Key Leakage.
Yevgeniy Dodis
Kristiyan Haralambiev
Adriana López-Alt
Daniel Wichs
2010
conf/tcc
Public-Key Encryption Schemes with Auxiliary Inputs.
Yevgeniy Dodis
Shafi Goldwasser
Yael Tauman Kalai
Chris Peikert
Vinod Vaikuntanathan
2010
conf/tcc
A Domain Extender for the Ideal Cipher.
Jean-Sébastien Coron
Yevgeniy Dodis
Avradip Mandal
Yannick Seurin
2009
conf/fse
Indifferentiability of Permutation-Based Compression Functions and Tree-Based Modes of Operation, with Applications to MD6.
Yevgeniy Dodis
Leonid Reyzin
Ronald L. Rivest
Emily Shen
2009
conf/crypto
Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model.
Joël Alwen
Yevgeniy Dodis
Daniel Wichs
2009
conf/crypto
Message Authentication Codes from Unpredictable Block Ciphers.
Yevgeniy Dodis
John P. Steinberger
2009
conf/eurocrypt
Salvaging Merkle-Damgård for Practical Applications.
Yevgeniy Dodis
Thomas Ristenpart
Thomas Shrimpton
2009
conf/tcc
Security Amplification for InteractiveCryptographic Primitives.
Yevgeniy Dodis
Russell Impagliazzo
Ragesh Jaiswal
Valentine Kabanets
2009
conf/tcc
Composability and On-Line Deniability of Authentication.
Yevgeniy Dodis
Jonathan Katz
Adam D. Smith
Shabsi Walfish
2009
conf/tcc
Proofs of Retrievability via Hardness Amplification.
Yevgeniy Dodis
Salil P. Vadhan
Daniel Wichs
2008
conf/crypto
Efficient Constructions of Composable Commitments and Zero-Knowledge Proofs.
Yevgeniy Dodis
Victor Shoup
Shabsi Walfish
2008
conf/acns
Getting the Best Out of Existing Hash Functions; or What if We Are Stuck with SHA?.
Yevgeniy Dodis
Prashant Puniya
2008
conf/eurocrypt
Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors.
Ronald Cramer
Yevgeniy Dodis
Serge Fehr
Carles Padró
Daniel Wichs
2008
conf/eurocrypt
A New Mode of Operation for Block Ciphers and Length-Preserving MACs.
Yevgeniy Dodis
Krzysztof Pietrzak
Prashant Puniya
2007
conf/fse
Improving the Security of MACs Via Randomized Message Preprocessing.
Yevgeniy Dodis
Krzysztof Pietrzak
2007
conf/pkc
Optimistic Fair Exchange in a Multi-user Setting.
Yevgeniy Dodis
Pil Joong Lee
Dae Hyun Yum
2007
conf/eurocrypt
Feistel Networks Made Public, and Applications.
Yevgeniy Dodis
Prashant Puniya
2007
conf/tcc
Universally Composable Security with Global Setup.
Ran Canetti
Yevgeniy Dodis
Rafael Pass
Shabsi Walfish
2007
conf/tcc
Does Privacy Require True Randomness?
Carl Bosley
Yevgeniy Dodis
2007
conf/tcc
Intrusion-Resilient Key Exchange in the Bounded Retrieval Model.
David Cash
Yan Zong Ding
Yevgeniy Dodis
Wenke Lee
Richard J. Lipton
Shabsi Walfish
2006
conf/crypto
Robust Fuzzy Extractors and Authenticated Key Agreement from Close Secrets.
Yevgeniy Dodis
Jonathan Katz
Leonid Reyzin
Adam D. Smith
2006
conf/tcc
Mercurial Commitments: Minimal Assumptions and Efficient Constructions.
Dario Catalano
Yevgeniy Dodis
Ivan Visconti
2006
conf/tcc
Separating Sources for Encryption and Secret Sharing.
Yevgeniy Dodis
Krzysztof Pietrzak
Bartosz Przydatek
2006
conf/tcc
On the Relation Between the Ideal Cipher and the Random Oracle Models.
Yevgeniy Dodis
Prashant Puniya
2006
conf/tcc
Threshold and Proactive Pseudo-Random Permutations.
Yevgeniy Dodis
Aleksandr Yampolskiy
Moti Yung
2005
conf/crypto
On the Generic Insecurity of the Full Domain Hash.
Yevgeniy Dodis
Roberto Oliveira
Krzysztof Pietrzak
2005
conf/crypto
Merkle-Damgård Revisited: How to Construct a Hash Function.
Jean-Sébastien Coron
Yevgeniy Dodis
Cécile Malinaud
Prashant Puniya
2005
conf/fc
Time Capsule Signature.
Yevgeniy Dodis
Dae Hyun Yum
2005
conf/pkc
A Verifiable Random Function with Short Proofs and Keys.
Yevgeniy Dodis
Aleksandr Yampolskiy
2005
conf/eurocrypt
Secure Remote Authentication Using Biometric Data.
Xavier Boyen
Yevgeniy Dodis
Jonathan Katz
Rafail Ostrovsky
Adam D. Smith
2005
conf/tcc
Entropic Security and the Encryption of High Entropy Messages.
Yevgeniy Dodis
Adam D. Smith
2005
conf/tcc
Chosen-Ciphertext Security of Multiple Encryption.
Yevgeniy Dodis
Jonathan Katz
2004
conf/ccs
ID-based encryption for complex hierarchies with applications to forward security and broadcast encryption.
Danfeng Yao
Nelly Fazio
Yevgeniy Dodis
Anna Lysyanskaya
2004
conf/ccs
Versatile padding schemes for joint signature and encryption.
Yevgeniy Dodis
Michael J. Freedman
Stanislaw Jarecki
Shabsi Walfish
2004
conf/crypto
Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes.
Yevgeniy Dodis
Rosario Gennaro
Johan Håstad
Hugo Krawczyk
Tal Rabin
2004
conf/ctrsa
A Generic Construction for Intrusion-Resilient Public-Key Encryption.
Yevgeniy Dodis
Matthew K. Franklin
Jonathan Katz
Atsuko Miyaji
Moti Yung
2004
conf/eurocrypt
Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data.
Yevgeniy Dodis
Leonid Reyzin
Adam D. Smith
2004
conf/eurocrypt
Anonymous Identification in Ad Hoc Groups.
Yevgeniy Dodis
Aggelos Kiayias
Antonio Nicolosi
Victor Shoup
2003
conf/ndss
Proactive Two-Party Signatures for User Authentication.
Antonio Nicolosi
Maxwell N. Krohn
Yevgeniy Dodis
David Mazières
2003
conf/ndss
Proxy Cryptography Revisited.
Anca-Andreea Ivan
Yevgeniy Dodis
2003
conf/pkc
Strong Key-Insulated Signature Schemes.
Yevgeniy Dodis
Jonathan Katz
Shouhuai Xu
Moti Yung
2003
conf/pkc
Efficient Construction of (Distributed) Verifiable Random Functions.
Yevgeniy Dodis
2003
conf/pkc
Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack.
Yevgeniy Dodis
Nelly Fazio
2003
conf/ctrsa
Intrusion-Resilient Public-Key Encryption.
Yevgeniy Dodis
Matthew K. Franklin
Jonathan Katz
Atsuko Miyaji
Moti Yung
2003
conf/eurocrypt
Concealment and Its Applications to Authenticated Encryption.
Yevgeniy Dodis
Jee Hea An
2002
conf/ccs
Public Key Broadcast Encryption for Stateless Receivers.
Yevgeniy Dodis
Nelly Fazio
2002
conf/eurocrypt
On the Security of Joint Signature and Encryption.
Jee Hea An
Yevgeniy Dodis
Tal Rabin
2002
conf/eurocrypt
Key-Insulated Public Key Cryptosystems.
Yevgeniy Dodis
Jonathan Katz
Shouhuai Xu
Moti Yung
2001
conf/eurocrypt
On Perfect and Adaptive Security in Exposure-Resilient Cryptography.
Yevgeniy Dodis
Amit Sahai
Adam D. Smith
2000
conf/crypto
Parallel Reducibility for Information-Theoretically Secure Computation.
Yevgeniy Dodis
Silvio Micali
2000
conf/crypto
A Cryptographic Solution to a Game Theoretic Problem.
Yevgeniy Dodis
Shai Halevi
Tal Rabin
2000
conf/eurocrypt
Exposure-Resilient Functions and All-or-Nothing Transforms.
Ran Canetti
Yevgeniy Dodis
Shai Halevi
Eyal Kushilevitz
Amit Sahai
1999
conf/eurocrypt
Lower Bounds for Oblivious Transfer Reductions.
Yevgeniy Dodis
Silvio Micali
Coauthors
Abhishek Jain
(1)
Adam D. Smith
(6)
Adi Shamir
(1)
Adriana López-Alt
(2)
Aggelos Kiayias
(1)
Aishwarya Thiruvengadam
(1)
Aleksandr Yampolskiy
(2)
Alexander Bienstock
(5)
Alexander Golovnev
(1)
Alison Lin
(1)
Allison Bishop
(1)
Amit Sahai
(2)
Anca-Andreea Ivan
(1)
Andrey Bogdanov
(1)
Anna Lysyanskaya
(1)
Antonio Marcedone
(3)
Antonio Nicolosi
(2)
Ari Juels
(2)
Aris Tentes
(1)
Atsuko Miyaji
(2)
Avradip Mandal
(1)
Balachandar Kesavan
(2)
Bart Mennink
(1)
Bartosz Przydatek
(1)
Benedikt Auerbach
(1)
Benoît Cogliati
(1)
Bernardo Magri
(1)
Björn Tackmann
(2)
Boaz Barak
(1)
Brent Waters
(1)
Brian Chen
(1)
Carl Bosley
(1)
Carles Padró
(1)
Cécile Malinaud
(1)
Chaya Ganesh
(1)
Chris Peikert
(1)
Christopher Higley
(1)
Dae Hyun Yum
(2)
Damien Vergnaud
(1)
Danfeng Yao
(1)
Daniel H. Gallancy
(1)
Daniel Jost
(6)
Daniel Kraschewski
(1)
Daniel Wichs
(18)
Daniele Venturi
(2)
Dario Catalano
(1)
Dario Fiore
(1)
David Cash
(2)
David Mazières
(1)
David Pointcheval
(1)
Divesh Aggarwal
(1)
Eike Kiltz
(1)
Elena Andreeva
(1)
Eli Goldin
(5)
Emily Shen
(1)
Eric Miles
(1)
Erik Aronesty
(1)
Esha Ghosh
(1)
Eyal Kushilevitz
(1)
François-Xavier Standaert
(1)
Garrison Grogan
(1)
Gil Segev
(1)
Harish Karthikeyan
(4)
Hugo Krawczyk
(2)
Iftach Haitner
(1)
Ilya Mironov
(2)
Ivan Visconti
(1)
Jean-Sébastien Coron
(2)
Jee Hea An
(2)
Jiaxin Guan
(1)
Joanne Woodage
(2)
Joël Alwen
(5)
Johan Håstad
(1)
John P. Steinberger
(7)
Jonathan Katz
(10)
Jooyoung Lee
(1)
Kevin Yeo
(1)
Kristiyan Haralambiev
(1)
Krzysztof Pietrzak
(9)
Leonid Reyzin
(4)
Marshall Ball
(1)
Martijn Stam
(1)
Matthew K. Franklin
(2)
Maxwell N. Krohn
(1)
Melissa Chase
(1)
Merry Ember Mou
(1)
Michael J. Freedman
(1)
Mohammad Hajiabadi
(1)
Moni Naor
(1)
Moti Yung
(6)
Nelly Fazio
(3)
Niels Ferguson
(1)
Noah Stephens-Davidowitz
(4)
Olivier Pereira
(1)
Oren Tysor
(1)
Paul Grubbs
(1)
Paul Rösler
(3)
Peter Hall
(3)
Pil Joong Lee
(1)
Pooya Farshim
(1)
Prashant Puniya
(5)
Rafael Pass
(1)
Rafail Ostrovsky
(2)
Ragesh Jaiswal
(1)
Rahul Chatterjee
(1)
Ran Canetti
(2)
Richard J. Lipton
(1)
Roberto Oliveira
(1)
Rolfe Schmidt
(2)
Ron D. Rothblum
(1)
Ronald Cramer
(1)
Ronald L. Rivest
(1)
Rosario Gennaro
(1)
Russell Impagliazzo
(1)
Salil P. Vadhan
(3)
Sandro Coretti
(8)
Sanjam Garg
(1)
Serge Fehr
(1)
Shabsi Walfish
(6)
Shafi Goldwasser
(1)
Shai Halevi
(4)
Sherman S. M. Chow
(1)
Shouhuai Xu
(3)
Shuichi Katsumata
(2)
Shweta Agrawal
(1)
Silvio Micali
(2)
Siyao Guo
(4)
Sogol Mazaheri
(1)
Stanislaw Jarecki
(1)
Stefano Tessaro
(3)
Sylvain Ruhault
(1)
Tal Moran
(1)
Tal Rabin
(3)
Thomas Prest
(1)
Thomas Ristenpart
(6)
Thomas Shrimpton
(1)
Tianren Liu
(2)
Ueli Maurer
(1)
Valentine Kabanets
(1)
Victor Shoup
(2)
Vinod Vaikuntanathan
(4)
Weiliang Luo
(1)
Wenke Lee
(1)
Willy Quach
(2)
Xavier Boyen
(1)
Yael Tauman Kalai
(1)
Yan Zong Ding
(1)
Yannick Seurin
(1)
Yannis Rouselakis
(1)
Yanqing Yao
(1)
Yevgeniy Dodis
(118)
Yi Tang
(1)
Yiannis Tselekounis
(3)
Yu Yu
(2)
Yuval Ishai
(1)
Zahra Jafargholi
(1)
Zhe Zhang
(1)
Zhiye Xie
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to