default search action
Hugo Krawczyk
Person information
- affiliation: IBM Research, Yorktown Heights, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c86]Fabrice Benhamouda, Shai Halevi, Hugo Krawczyk, Yiping Ma, Tal Rabin:
SPRINT: High-Throughput Robust Distributed Schnorr Signatures. EUROCRYPT (5) 2024: 62-91 - [i51]Stefan Dziembowski, Stanislaw Jarecki, Pawel Kedzior, Hugo Krawczyk, Chan Nam Ngo, Jiayu Xu:
Password-Protected Threshold Signatures. IACR Cryptol. ePrint Arch. 2024: 1469 (2024) - 2023
- [c85]Julia Hesse, Stanislaw Jarecki, Hugo Krawczyk, Christopher Wood:
Password-Authenticated TLS via OPAQUE and Post-Handshake Authentication. EUROCRYPT (5) 2023: 98-127 - [i50]Julia Hesse, Stanislaw Jarecki, Hugo Krawczyk, Christopher Wood:
Password-Authenticated TLS via OPAQUE and Post-Handshake Authentication. IACR Cryptol. ePrint Arch. 2023: 220 (2023) - [i49]Fabrice Benhamouda, Shai Halevi, Hugo Krawczyk, Tal Rabin, Yiping Ma:
SPRINT: High-Throughput Robust Distributed Schnorr Signatures. IACR Cryptol. ePrint Arch. 2023: 427 (2023) - 2022
- [c84]Fabrice Benhamouda, Shai Halevi, Hugo Krawczyk, Alex Miao, Tal Rabin:
Threshold Cryptography as a Service (in the Multiserver and YOSO Models). CCS 2022: 323-336 - [c83]Bruno Freitas Dos Santos, Yanqi Gu, Stanislaw Jarecki, Hugo Krawczyk:
Asymmetric PAKE with Low Computation and communication. EUROCRYPT (2) 2022: 127-156 - 2021
- [j20]Stanislaw Jarecki, Mohammed Jubur, Hugo Krawczyk, Nitesh Saxena, Maliheh Shirvanian:
Two-factor Password-authenticated Key Exchange with End-to-end Security. ACM Trans. Priv. Secur. 24(3): 17:1-17:37 (2021) - [c82]Craig Gentry, Shai Halevi, Hugo Krawczyk, Bernardo Magri, Jesper Buus Nielsen, Tal Rabin, Sophia Yakoubov:
YOSO: You Only Speak Once - Secure MPC with Stateless Ephemeral Roles. CRYPTO (2) 2021: 64-93 - [c81]Yanqi Gu, Stanislaw Jarecki, Hugo Krawczyk:
KHAPE: Asymmetric PAKE from Key-Hiding Key Exchange. CRYPTO (4) 2021: 701-730 - [c80]Stanislaw Jarecki, Hugo Krawczyk, Jiayu Xu:
On the (In)Security of the Diffie-Hellman Oblivious PRF with Multiplicative Blinding. Public Key Cryptography (2) 2021: 380-409 - [c79]Maliheh Shirvanian, Christopher Robert Price, Mohammed Jubur, Nitesh Saxena, Stanislaw Jarecki, Hugo Krawczyk:
A hidden-password online password manager. SAC 2021: 1683-1686 - [i48]Craig Gentry, Shai Halevi, Hugo Krawczyk, Bernardo Magri, Jesper Buus Nielsen, Tal Rabin, Sophia Yakoubov:
YOSO: You Only Speak Once / Secure MPC with Stateless Ephemeral Roles. IACR Cryptol. ePrint Arch. 2021: 210 (2021) - [i47]Stanislaw Jarecki, Hugo Krawczyk, Jiayu Xu:
On the (In)Security of the Diffie-Hellman Oblivious PRF with Multiplicative Blinding. IACR Cryptol. ePrint Arch. 2021: 273 (2021) - [i46]Nihal Vatandas, Rosario Gennaro, Bertrand Ithurburn, Hugo Krawczyk:
On the Cryptographic Deniability of the Signal Protocol. IACR Cryptol. ePrint Arch. 2021: 642 (2021) - [i45]Yanqi Gu, Stanislaw Jarecki, Hugo Krawczyk:
KHAPE: Asymmetric PAKE from Key-Hiding Key Exchange. IACR Cryptol. ePrint Arch. 2021: 873 (2021) - 2020
- [c78]Nihal Vatandas, Rosario Gennaro, Bertrand Ithurburn, Hugo Krawczyk:
On the Cryptographic Deniability of the Signal Protocol. ACNS (2) 2020: 188-209 - [c77]Fabrice Benhamouda, Craig Gentry, Sergey Gorbunov, Shai Halevi, Hugo Krawczyk, Chengyu Lin, Tal Rabin, Leonid Reyzin:
Can a Public Blockchain Keep a Secret? TCC (1) 2020: 260-290 - [i44]Fabrice Benhamouda, Craig Gentry, Sergey Gorbunov, Shai Halevi, Hugo Krawczyk, Chengyu Lin, Tal Rabin, Leonid Reyzin:
Can a Blockchain Keep a Secret? IACR Cryptol. ePrint Arch. 2020: 464 (2020)
2010 – 2019
- 2019
- [j19]Benjamin Kuykendall, Hugo Krawczyk, Tal Rabin:
Cryptography for #MeToo. Proc. Priv. Enhancing Technol. 2019(3): 409-429 (2019) - [j18]Maliheh Shirvanian, Nitesh Saxena, Stanislaw Jarecki, Hugo Krawczyk:
Building and Studying a Password Store that Perfectly Hides Passwords from Itself. IEEE Trans. Dependable Secur. Comput. 16(5): 770-782 (2019) - [c76]Stanislaw Jarecki, Hugo Krawczyk, Jason K. Resch:
Updatable Oblivious Key Management for Storage Systems. CCS 2019: 379-393 - [c75]Hasini Gunasinghe, Ashish Kundu, Elisa Bertino, Hugo Krawczyk, Suresh Chari, Kapil Singh, Dong Su:
PrivIdEx: Privacy Preserving and Secure Exchange of Digital Identity Assets. WWW 2019: 594-604 - [i43]Stanislaw Jarecki, Hugo Krawczyk, Jason K. Resch:
Updatable Oblivious Key Management for Storage Systems. IACR Cryptol. ePrint Arch. 2019: 1275 (2019) - 2018
- [c74]Stanislaw Jarecki, Hugo Krawczyk, Jiayu Xu:
OPAQUE: An Asymmetric PAKE Protocol Secure Against Pre-computation Attacks. EUROCRYPT (3) 2018: 456-486 - [c73]Stanislaw Jarecki, Hugo Krawczyk, Maliheh Shirvanian, Nitesh Saxena:
Two-Factor Authentication with End-to-End Password Security. Public Key Cryptography (2) 2018: 431-461 - [i42]Stanislaw Jarecki, Hugo Krawczyk, Maliheh Shirvanian, Nitesh Saxena:
Two-Factor Authentication with End-to-End Password Security. IACR Cryptol. ePrint Arch. 2018: 33 (2018) - [i41]Stanislaw Jarecki, Hugo Krawczyk, Jiayu Xu:
OPAQUE: An Asymmetric PAKE Protocol Secure Against Pre-Computation Attacks. IACR Cryptol. ePrint Arch. 2018: 163 (2018) - [i40]Maliheh Shirvanian, Stanislaw Jarecki, Hugo Krawczyk, Nitesh Saxena:
SPHINX: A Password Store that Perfectly Hides Passwords from Itself. IACR Cryptol. ePrint Arch. 2018: 695 (2018) - [i39]Stanislaw Jarecki, Hugo Krawczyk, Jason K. Resch:
Threshold Partially-Oblivious PRFs with Applications to Key Management. IACR Cryptol. ePrint Arch. 2018: 733 (2018) - 2017
- [c72]Stanislaw Jarecki, Aggelos Kiayias, Hugo Krawczyk, Jiayu Xu:
TOPPSS: Cost-Minimal Password-Protected Secret Sharing Based on Threshold OPRF. ACNS 2017: 39-58 - [c71]Fabrice Benhamouda, Hugo Krawczyk, Tal Rabin:
Robust Non-interactive Multiparty Computation Against Constant-Size Collusion. CRYPTO (1) 2017: 391-419 - [c70]Maliheh Shirvanian, Stanislaw Jarecki, Hugo Krawczyk, Nitesh Saxena:
SPHINX: A Password Store that Perfectly Hides Passwords from Itself. ICDCS 2017: 1094-1104 - [i38]Stanislaw Jarecki, Aggelos Kiayias, Hugo Krawczyk, Jiayu Xu:
TOPPSS: Cost-minimal Password-Protected Secret Sharing based on Threshold OPRF. IACR Cryptol. ePrint Arch. 2017: 363 (2017) - [i37]Fabrice Benhamouda, Hugo Krawczyk, Tal Rabin:
Robust Non-Interactive Multiparty Computation Against Constant-Size Collusion. IACR Cryptol. ePrint Arch. 2017: 555 (2017) - 2016
- [c69]Stanislaw Jarecki, Hugo Krawczyk, Maliheh Shirvanian, Nitesh Saxena:
Device-Enhanced Password Protocols with Optimal Online-Offline Protection. AsiaCCS 2016: 177-188 - [c68]Hugo Krawczyk:
A Unilateral-to-Mutual Authentication Compiler for Key Exchange (with Applications to Client Authentication in TLS 1.3). CCS 2016: 1438-1450 - [c67]Vladimir Kolesnikov, Hugo Krawczyk, Yehuda Lindell, Alex J. Malozemoff, Tal Rabin:
Attribute-based Key Exchange with General Policies. CCS 2016: 1451-1463 - [c66]Hugo Krawczyk, Hoeteck Wee:
The OPTLS Protocol and TLS 1.3. EuroS&P 2016: 81-96 - [c65]Stanislaw Jarecki, Aggelos Kiayias, Hugo Krawczyk, Jiayu Xu:
Highly-Efficient and Composable Password-Protected Secret Sharing (Or: How to Protect Your Bitcoin Wallet Online). EuroS&P 2016: 276-291 - [i36]Stanislaw Jarecki, Aggelos Kiayias, Hugo Krawczyk, Jiayu Xu:
Highly-Efficient and Composable Password-Protected Secret Sharing (Or: How to Protect Your Bitcoin Wallet Online). IACR Cryptol. ePrint Arch. 2016: 144 (2016) - [i35]Vladimir Kolesnikov, Hugo Krawczyk, Yehuda Lindell, Alex J. Malozemoff, Tal Rabin:
Attribute-based Key Exchange with General Policies. IACR Cryptol. ePrint Arch. 2016: 518 (2016) - [i34]Hugo Krawczyk:
A Unilateral-to-Mutual Authentication Compiler for Key Exchange (with Applications to Client Authentication in TLS 1.3). IACR Cryptol. ePrint Arch. 2016: 711 (2016) - 2015
- [c64]Sky Faber, Stanislaw Jarecki, Hugo Krawczyk, Quan Nguyen, Marcel-Catalin Rosu, Michael Steiner:
Rich Queries on Encrypted Data: Beyond Exact Matches. ESORICS (2) 2015: 123-145 - [i33]Sky Faber, Stanislaw Jarecki, Hugo Krawczyk, Quan Nguyen, Marcel-Catalin Rosu, Michael Steiner:
Rich Queries on Encrypted Data: Beyond Exact Matches. IACR Cryptol. ePrint Arch. 2015: 927 (2015) - [i32]Hugo Krawczyk, Hoeteck Wee:
The OPTLS Protocol and TLS 1.3. IACR Cryptol. ePrint Arch. 2015: 978 (2015) - [i31]Stanislaw Jarecki, Hugo Krawczyk, Maliheh Shirvanian, Nitesh Saxena:
Device-Enhanced Password Protocols with Optimal Online-Offline Protection. IACR Cryptol. ePrint Arch. 2015: 1099 (2015) - 2014
- [c63]Stanislaw Jarecki, Aggelos Kiayias, Hugo Krawczyk:
Round-Optimal Password-Protected Secret Sharing and T-PAKE in the Password-Only Model. ASIACRYPT (2) 2014: 233-253 - [c62]David Cash, Joseph Jaeger, Stanislaw Jarecki, Charanjit S. Jutla, Hugo Krawczyk, Marcel-Catalin Rosu, Michael Steiner:
Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation. NDSS 2014 - [e2]Hugo Krawczyk:
Public-Key Cryptography - PKC 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings. Lecture Notes in Computer Science 8383, Springer 2014, ISBN 978-3-642-54630-3 [contents] - [i30]Stanislaw Jarecki, Aggelos Kiayias, Hugo Krawczyk:
Round-Optimal Password-Protected Secret Sharing and T-PAKE in the Password-Only Model. IACR Cryptol. ePrint Arch. 2014: 650 (2014) - [i29]David Cash, Joseph Jaeger, Stanislaw Jarecki, Charanjit S. Jutla, Hugo Krawczyk, Marcel-Catalin Rosu, Michael Steiner:
Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation. IACR Cryptol. ePrint Arch. 2014: 853 (2014) - 2013
- [c61]Stanislaw Jarecki, Charanjit S. Jutla, Hugo Krawczyk, Marcel-Catalin Rosu, Michael Steiner:
Outsourced symmetric private information retrieval. CCS 2013: 875-888 - [c60]David Cash, Stanislaw Jarecki, Charanjit S. Jutla, Hugo Krawczyk, Marcel-Catalin Rosu, Michael Steiner:
Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries. CRYPTO (1) 2013: 353-373 - [c59]Hugo Krawczyk, Kenneth G. Paterson, Hoeteck Wee:
On the Security of the TLS Protocol: A Systematic Analysis. CRYPTO (1) 2013: 429-448 - [i28]David Cash, Stanislaw Jarecki, Charanjit S. Jutla, Hugo Krawczyk, Marcel-Catalin Rosu, Michael Steiner:
Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries. IACR Cryptol. ePrint Arch. 2013: 169 (2013) - [i27]Hugo Krawczyk, Kenneth G. Paterson, Hoeteck Wee:
On the Security of the TLS Protocol: A Systematic Analysis. IACR Cryptol. ePrint Arch. 2013: 339 (2013) - [i26]Stanislaw Jarecki, Charanjit S. Jutla, Hugo Krawczyk, Marcel-Catalin Rosu, Michael Steiner:
Outsourced Symmetric Private Information Retrieval. IACR Cryptol. ePrint Arch. 2013: 720 (2013) - 2012
- [j17]Demijan Klinc, Carmit Hazay, Ashish Jagmohan, Hugo Krawczyk, Tal Rabin:
On Compression of Data Encrypted With Block Ciphers. IEEE Trans. Inf. Theory 58(11): 6989-7001 (2012) - [c58]Dana Dachman-Soled, Rosario Gennaro, Hugo Krawczyk, Tal Malkin:
Computational Extractors and Pseudorandomness. TCC 2012: 383-403 - 2011
- [c57]Boaz Barak, Yevgeniy Dodis, Hugo Krawczyk, Olivier Pereira, Krzysztof Pietrzak, François-Xavier Standaert, Yu Yu:
Leftover Hash Lemma, Revisited. CRYPTO 2011: 1-20 - [c56]Shai Halevi, Hugo Krawczyk:
One-Pass HMQV and Asymmetric Key-Wrapping. Public Key Cryptography 2011: 317-334 - [r2]Hugo Krawczyk:
Perfect Forward Secrecy. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 921-922 - [i25]Boaz Barak, Yevgeniy Dodis, Hugo Krawczyk, Olivier Pereira, Krzysztof Pietrzak, François-Xavier Standaert, Yu Yu:
Leftover Hash Lemma, Revisited. IACR Cryptol. ePrint Arch. 2011: 88 (2011) - [i24]Dana Dachman-Soled, Rosario Gennaro, Hugo Krawczyk, Tal Malkin:
Computational Extractors and Pseudorandomness. IACR Cryptol. ePrint Arch. 2011: 708 (2011) - 2010
- [c55]Rosario Gennaro, Hugo Krawczyk, Tal Rabin:
Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead. ACNS 2010: 309-328 - [c54]Hugo Krawczyk:
Cryptographic Extraction and Key Derivation: The HKDF Scheme. CRYPTO 2010: 631-648 - [c53]Rosario Gennaro, Jonathan Katz, Hugo Krawczyk, Tal Rabin:
Secure Network Coding over the Integers. Public Key Cryptography 2010: 142-160 - [i23]Demijan Klinc, Carmit Hazay, Ashish Jagmohan, Hugo Krawczyk, Tal Rabin:
On Compression of Data Encrypted with Block Ciphers. CoRR abs/1009.1759 (2010) - [i22]Rosario Gennaro, Hugo Krawczyk, Tal Rabin:
Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead. IACR Cryptol. ePrint Arch. 2010: 68 (2010) - [i21]Hugo Krawczyk:
Cryptographic Extraction and Key Derivation: The HKDF Scheme. IACR Cryptol. ePrint Arch. 2010: 264 (2010) - [i20]Demijan Klinc, Carmit Hazay, Ashish Jagmohan, Hugo Krawczyk, Tal Rabin:
On Compression of Data Encrypted with Block Ciphers. IACR Cryptol. ePrint Arch. 2010: 477 (2010) - [i19]Shai Halevi, Hugo Krawczyk:
One-Pass HMQV and Asymmetric Key-Wrapping. IACR Cryptol. ePrint Arch. 2010: 638 (2010) - [i18]Hugo Krawczyk, Pasi Eronen:
HMAC-based Extract-and-Expand Key Derivation Function (HKDF). RFC 5869: 1-14 (2010)
2000 – 2009
- 2009
- [c52]Demijan Klinc, Carmit Hazay, Ashish Jagmohan, Hugo Krawczyk, Tal Rabin:
On Compression of Data Encrypted with Block Ciphers. DCC 2009: 213-222 - [i17]Rosario Gennaro, Jonathan Katz, Hugo Krawczyk, Tal Rabin:
Secure Network Coding Over the Integers. IACR Cryptol. ePrint Arch. 2009: 569 (2009) - 2008
- [c51]Rosario Gennaro, Shai Halevi, Hugo Krawczyk, Tal Rabin, Steffen Reidt, Stephen D. Wolthusen:
Strongly-Resilient and Non-interactive Hierarchical Key-Agreement in MANETs. ESORICS 2008: 49-65 - [c50]Rosario Gennaro, Shai Halevi, Hugo Krawczyk, Tal Rabin:
Threshold RSA for Dynamic and Ad-Hoc Groups. EUROCRYPT 2008: 88-107 - [i16]Rosario Gennaro, Shai Halevi, Hugo Krawczyk, Tal Rabin:
Threshold RSA for Dynamic and Ad-Hoc Groups. IACR Cryptol. ePrint Arch. 2008: 45 (2008) - [i15]Rosario Gennaro, Shai Halevi, Hugo Krawczyk, Tal Rabin, Steffen Reidt, Stephen D. Wolthusen:
Strongly-Resilient and Non-Interactive Hierarchical Key-Agreement in MANETs. IACR Cryptol. ePrint Arch. 2008: 308 (2008) - 2007
- [j16]Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin:
Secure Distributed Key Generation for Discrete-Log Based Cryptosystems. J. Cryptol. 20(1): 51-83 (2007) - [j15]Rosario Gennaro, Tal Rabin, Stanislaw Jarecki, Hugo Krawczyk:
Robust and Efficient Sharing of RSA Functions. J. Cryptol. 20(3): 393 (2007) - [j14]Rosario Gennaro, Tal Rabin, Hugo Krawczyk:
RSA-Based Undeniable Signatures. J. Cryptol. 20(3): 394 (2007) - [c49]Shai Halevi, Hugo Krawczyk:
Security under key-dependent inputs. CCS 2007: 466-475 - [i14]Shai Halevi, Hugo Krawczyk:
Security under Key-Dependent Inputs. IACR Cryptol. ePrint Arch. 2007: 315 (2007) - 2006
- [c48]Mario Di Raimondo, Rosario Gennaro, Hugo Krawczyk:
Deniable authentication and key exchange. CCS 2006: 400-409 - [c47]Shai Halevi, Hugo Krawczyk:
Strengthening Digital Signatures Via Randomized Hashing. CRYPTO 2006: 41-59 - [i13]Mario Di Raimondo, Rosario Gennaro, Hugo Krawczyk:
Deniable Authentication and Key Exchange. IACR Cryptol. ePrint Arch. 2006: 280 (2006) - 2005
- [c46]Hugo Krawczyk:
HMQV: A High-Performance Secure Diffie-Hellman Protocol. CRYPTO 2005: 546-566 - [c45]Mario Di Raimondo, Rosario Gennaro, Hugo Krawczyk:
Secure off-the-record messaging. WPES 2005: 81-89 - [r1]Hugo Krawczyk:
Perfect Forward Secrecy. Encyclopedia of Cryptography and Security 2005 - [i12]Hugo Krawczyk:
HMQV: A High-Performance Secure Diffie-Hellman Protocol. IACR Cryptol. ePrint Arch. 2005: 176 (2005) - 2004
- [c44]Yevgeniy Dodis, Rosario Gennaro, Johan Håstad, Hugo Krawczyk, Tal Rabin:
Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes. CRYPTO 2004: 494-510 - [c43]Rosario Gennaro, Hugo Krawczyk, Tal Rabin:
Secure Hashed Diffie-Hellman over Non-DDH Groups. EUROCRYPT 2004: 361-381 - [i11]Rosario Gennaro, Hugo Krawczyk, Tal Rabin:
Secure Hashed Diffie-Hellman over Non-DDH Groups. IACR Cryptol. ePrint Arch. 2004: 99 (2004) - 2003
- [c42]Hugo Krawczyk:
SIGMA: The 'SIGn-and-MAc' Approach to Authenticated Diffie-Hellman and Its Use in the IKE-Protocols. CRYPTO 2003: 400-425 - [c41]Ran Canetti, Hugo Krawczyk, Jesper Buus Nielsen:
Relaxing Chosen-Ciphertext Security. CRYPTO 2003: 565-582 - [c40]Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin:
Secure Applications of Pedersen's Distributed Key Generation Protocol. CT-RSA 2003: 373-390 - [c39]Helmut Scherzer, Ran Canetti, Paul A. Karger, Hugo Krawczyk, Tal Rabin, David C. Toll:
Authenticating Mandatory Access Controls and Preserving Privacy for a High-Assurance Smart Card. ESORICS 2003: 181-200 - [i10]Ran Canetti, Hugo Krawczyk, Jesper Buus Nielsen:
Relaxing Chosen-Ciphertext Security. IACR Cryptol. ePrint Arch. 2003: 174 (2003) - 2002
- [c38]Ran Canetti, Hugo Krawczyk:
Security Analysis of IKE's Signature-Based Key-Exchange Protocol. CRYPTO 2002: 143-161 - [c37]Ran Canetti, Hugo Krawczyk:
Universally Composable Notions of Key Exchange and Secure Channels. EUROCRYPT 2002: 337-351 - [i9]Ran Canetti, Hugo Krawczyk:
Universally Composable Notions of Key Exchange and Secure Channels. IACR Cryptol. ePrint Arch. 2002: 59 (2002) - [i8]Ran Canetti, Hugo Krawczyk:
Security Analysis of IKE's Signature-based Key-Exchange Protocol. IACR Cryptol. ePrint Arch. 2002: 120 (2002) - 2001
- [j13]Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin:
Robust Threshold DSS Signatures. Inf. Comput. 164(1): 54-84 (2001) - [c36]Hugo Krawczyk:
The Order of Encryption and Authentication for Protecting Communications (or: How Secure Is SSL?). CRYPTO 2001: 310-331 - [c35]Ran Canetti, Hugo Krawczyk:
Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels. EUROCRYPT 2001: 453-474 - [i7]Ran Canetti, Hugo Krawczyk:
Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels. IACR Cryptol. ePrint Arch. 2001: 40 (2001) - [i6]Hugo Krawczyk:
Simple Forward-Secure Signatures From Any Signature Scheme. IACR Cryptol. ePrint Arch. 2001: 42 (2001) - [i5]Hugo Krawczyk:
The order of encryption and authentication for protecting communications (Or: how secure is SSL?). IACR Cryptol. ePrint Arch. 2001: 45 (2001) - 2000
- [j12]Rosario Gennaro, Tal Rabin, Stanislaw Jarecki, Hugo Krawczyk:
Robust and Efficient Sharing of RSA Functions. J. Cryptol. 13(2): 273-300 (2000) - [j11]Rosario Gennaro, Tal Rabin, Hugo Krawczyk:
RSA-Based Undeniable Signatures. J. Cryptol. 13(4): 397-416 (2000) - [j10]Mihir Bellare, Juan A. Garay, Ralf C. Hauser, Amir Herzberg, Hugo Krawczyk, Michael Steiner, Gene Tsudik, Els Van Herreweghen, Michael Waidner:
Design, implementation, and deployment of the iKP secure electronic payment system. IEEE J. Sel. Areas Commun. 18(4): 611-627 (2000) - [c34]Hugo Krawczyk:
Simple forward-secure signatures from any signature scheme. CCS 2000: 108-115 - [c33]Hugo Krawczyk, Tal Rabin:
Chameleon Signatures. NDSS 2000
1990 – 1999
- 1999
- [j9]Giuseppe Ateniese, Amir Herzberg, Hugo Krawczyk, Gene Tsudik:
Untraceable mobility or how to travel incognito. Comput. Networks 31(8): 871-884 (1999) - [j8]Shai Halevi, Hugo Krawczyk:
Public-Key Cryptography and Password Protocols. ACM Trans. Inf. Syst. Secur. 2(3): 230-268 (1999) - [c32]Ran Canetti, Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin:
Adaptive Security for Threshold Cryptosystems. CRYPTO 1999: 98-115 - [c31]John Black, Shai Halevi, Hugo Krawczyk, Ted Krovetz, Phillip Rogaway:
UMAC: Fast and Secure Message Authentication. CRYPTO 1999: 216-233 - [c30]Mihir Bellare, Oded Goldreich, Hugo Krawczyk:
Stateless Evaluation of Pseudorandom Functions: Security beyond the Birthday Barrier. CRYPTO 1999: 270-287 - [c29]Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin:
Secure Distributed Key Generation for Discrete-Log Based Cryptosystems. EUROCRYPT 1999: 295-310 - [c28]Hugo Krawczyk:
Blinding of Credit Card Numbers in the SET Protocol. Financial Cryptography 1999: 17-28 - [i4]Shai Halevi, Hugo Krawczyk:
Public-key cryptography and password protocols. IACR Cryptol. ePrint Arch. 1999: 4 (1999) - 1998
- [j7]Pau-Chen Cheng, Juan A. Garay, Amir Herzberg, Hugo Krawczyk:
A Security Architecture for the Internet Protocol. IBM Syst. J. 37(1): 42-60 (1998) - [c27]Shai Halevi, Hugo Krawczyk:
Public-Key Cryptography and Password Protocols. CCS 1998: 122-131 - [c26]Mihir Bellare, Ran Canetti, Hugo Krawczyk:
A Modular Approach to the Design and Analysis of Authentication and Key Exchange Protocols (Extended Abstract). STOC 1998: 419-428 - [e1]Hugo Krawczyk:
Advances in Cryptology - CRYPTO '98, 18th Annual International Cryptology Conference, Santa Barbara, California, USA, August 23-27, 1998, Proceedings. Lecture Notes in Computer Science 1462, Springer 1998, ISBN 3-540-64892-5 [contents] - [i3]Mihir Bellare, Ran Canetti, Hugo Krawczyk:
A Modular Approach to the Design and Analysis of Authentication and Key Exchange Protocols. IACR Cryptol. ePrint Arch. 1998: 9 (1998) - [i2]Hugo Krawczyk, Tal Rabin:
Chameleon Hashing and Signatures. IACR Cryptol. ePrint Arch. 1998: 10 (1998) - 1997
- [c25]Amir Herzberg, Markus Jakobsson, Stanislaw Jarecki, Hugo Krawczyk, Moti Yung:
Proactive Public Key and Signature Systems. CCS 1997: 100-110 - [c24]Rosario Gennaro, Hugo Krawczyk, Tal Rabin:
RSA-Based Undeniable Signatures. CRYPTO 1997: 132-149 - [c23]Shai Halevi, Hugo Krawczyk:
MMH: Software Message Authentication in the Gbit/Second Rates. FSE 1997: 172-189 - [i1]Hugo Krawczyk, Mihir Bellare, Ran Canetti:
HMAC: Keyed-Hashing for Message Authentication. RFC 2104: 1-11 (1997) - 1996
- [j6]Oded Goldreich, Hugo Krawczyk:
On the Composition of Zero-Knowledge Proof Systems. SIAM J. Comput. 25(1): 169-192 (1996) - [c22]Mihir Bellare, Ran Canetti, Hugo Krawczyk:
Keying Hash Functions for Message Authentication. CRYPTO 1996: 1-15 - [c21]Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin:
Robust and Efficient Sharing of RSA Functions. CRYPTO 1996: 157-172 - [c20]Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin:
Robust Threshold DSS Signatures. EUROCRYPT 1996: 354-371 - [c19]Mihir Bellare, Ran Canetti, Hugo Krawczyk:
Pseudorandom Functions Revisited: The Cascade Construction and Its Concrete Security. FOCS 1996: 514-523 - [c18]Hugo Krawczyk:
SKEME: a versatile secure key exchange mechanism for Internet. NDSS 1996: 114-127 - 1995
- [j5]Yair Frankel, Amir Herzberg, Paul A. Karger, Hugo Krawczyk, Charles A. Kunzinger, Mordechai M. Yung:
Security issues in a CDPD wireless network. IEEE Wirel. Commun. 2(4): 16-27 (1995) - [c17]Amir Herzberg, Stanislaw Jarecki, Hugo Krawczyk, Moti Yung:
Proactive Secret Sharing Or: How to Cope With Perpetual Leakage. CRYPTO 1995: 339-352 - [c16]Hugo Krawczyk:
New Hash Functions For Message Authentication. EUROCRYPT 1995: 301-310 - [c15]Pau-Chen Cheng, Juan A. Garay, Amir Herzberg, Hugo Krawczyk:
Securing the Internet (Abstract). PODC 1995: 257 - [c14]Pau-Chen Cheng, Juan A. Garay, Amir Herzberg, Hugo Krawczyk:
Design and Implementation of Modular Key Management Protocol and IP Secure Tunnel on AIX. USENIX Security Symposium 1995 - 1994
- [c13]Hugo Krawczyk:
LFSR-based Hashing and Authentication. CRYPTO 1994: 129-139 - [c12]Amir Herzberg, Hugo Krawczyk, Gene Tsudik:
On Travelling Incognito. WMCSA 1994: 205-211 - 1993
- [j4]Oded Goldreich, Hugo Krawczyk, Michael Luby:
On the Existence of Pseudorandom Generators. SIAM J. Comput. 22(6): 1163-1175 (1993) - [c11]Don Coppersmith, Hugo Krawczyk, Yishay Mansour:
The Shrinking Generator. CRYPTO 1993: 22-39 - [c10]Hugo Krawczyk:
Secret Sharing Made Short. CRYPTO 1993: 136-146 - [c9]Hugo Krawczyk:
The Shrinking Generator: Some Practical Considerations. FSE 1993: 45-46 - [c8]Hugo Krawczyk:
Distributed Fingerprints and Secure Information Dispersal. PODC 1993: 207-218 - 1992
- [j3]Hugo Krawczyk:
How to Predict Congruential Generators. J. Algorithms 13(4): 527-545 (1992) - [j2]Oded Goldreich, Hugo Krawczyk:
Sparse Pseudorandom Distributions. Random Struct. Algorithms 3(2): 163-174 (1992) - 1991
- [c7]David Bernstein, Doron Cohen, Hugo Krawczyk:
Code Duplication: An Assist for Global Instruction Scheduling. MICRO 1991: 103-113 - 1990
- [b1]Hugo Krawczyk:
Pseudorandomness and computational difficulty. Technion - Israel Institute of Technology, Israel, 1990 - [c6]Oded Goldreich, Hugo Krawczyk:
On the Composition of Zero-Knowledge Proof Systems. ICALP 1990: 268-282
1980 – 1989
- 1989
- [j1]Hugo Krawczyk, Azaria Paz:
The diophantine problem of Frobenius: A close bound. Discret. Appl. Math. 23(3): 289-291 (1989) - [c5]Oded Goldreich, Hugo Krawczyk:
Sparse Pseudorandom Distributions. CRYPTO 1989: 113-127 - [c4]Hugo Krawczyk:
How to Predict Congruential Generators. CRYPTO 1989: 138-153 - [c3]David Bernstein, Dina Q. Goldin, Martin Charles Golumbic, Hugo Krawczyk, Yishay Mansour, Itai Nahshon, Ron Y. Pinter:
Spill Code Minimization Techniques for Optimizing Compilers. PLDI 1989: 258-263 - 1988
- [c2]Oded Goldreich, Hugo Krawczyk, Michael Luby:
On the Existence of Pseudorandom Generators. CRYPTO 1988: 146-162 - [c1]Oded Goldreich, Hugo Krawczyk, Michael Luby:
On the Existence of Pseudorandom Generators (Extended Abstract). FOCS 1988: 12-24
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-31 21:08 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint