Amanote Research
Register
Sign In
Discover open access scientific publications
Search, annotate, share and cite publications
Publications by Yevgeniy Dodis
Amplifying Privacy in Privacy Amplification
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Overcoming Weak Expectations
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Shannon Impossibility, Revisited
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Concealment and Its Applications to Authenticated Encryption
Information Security and Cryptography
Concealment and Its Applications to Authenticated Encryption
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
On the Security of Joint Signature and Encryption
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Anonymous Identification in Ad Hoc Groups
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Security Amplification for Interactive Cryptographic Primitives
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Robust Fuzzy Extractors and Authenticated Key Agreement From Close Secrets
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science