default search action
Hugo Krawczyk
Person information
- affiliation: IBM Research, Yorktown Heights, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [c86]Fabrice Benhamouda, Shai Halevi, Hugo Krawczyk, Yiping Ma, Tal Rabin:
SPRINT: High-Throughput Robust Distributed Schnorr Signatures. EUROCRYPT (5) 2024: 62-91 - [i51]Stefan Dziembowski, Stanislaw Jarecki, Pawel Kedzior, Hugo Krawczyk, Chan Nam Ngo, Jiayu Xu:
Password-Protected Threshold Signatures. IACR Cryptol. ePrint Arch. 2024: 1469 (2024) - 2023
- [c85]Julia Hesse, Stanislaw Jarecki, Hugo Krawczyk, Christopher Wood:
Password-Authenticated TLS via OPAQUE and Post-Handshake Authentication. EUROCRYPT (5) 2023: 98-127 - [i50]Julia Hesse, Stanislaw Jarecki, Hugo Krawczyk, Christopher Wood:
Password-Authenticated TLS via OPAQUE and Post-Handshake Authentication. IACR Cryptol. ePrint Arch. 2023: 220 (2023) - [i49]Fabrice Benhamouda, Shai Halevi, Hugo Krawczyk, Tal Rabin, Yiping Ma:
SPRINT: High-Throughput Robust Distributed Schnorr Signatures. IACR Cryptol. ePrint Arch. 2023: 427 (2023) - 2022
- [c84]Fabrice Benhamouda, Shai Halevi, Hugo Krawczyk, Alex Miao, Tal Rabin:
Threshold Cryptography as a Service (in the Multiserver and YOSO Models). CCS 2022: 323-336 - [c83]Bruno Freitas Dos Santos, Yanqi Gu, Stanislaw Jarecki, Hugo Krawczyk:
Asymmetric PAKE with Low Computation and communication. EUROCRYPT (2) 2022: 127-156 - 2021
- [j20]Stanislaw Jarecki, Mohammed Jubur, Hugo Krawczyk, Nitesh Saxena, Maliheh Shirvanian:
Two-factor Password-authenticated Key Exchange with End-to-end Security. ACM Trans. Priv. Secur. 24(3): 17:1-17:37 (2021) - [c82]Craig Gentry, Shai Halevi, Hugo Krawczyk, Bernardo Magri, Jesper Buus Nielsen, Tal Rabin, Sophia Yakoubov:
YOSO: You Only Speak Once - Secure MPC with Stateless Ephemeral Roles. CRYPTO (2) 2021: 64-93 - [c81]Yanqi Gu, Stanislaw Jarecki, Hugo Krawczyk:
KHAPE: Asymmetric PAKE from Key-Hiding Key Exchange. CRYPTO (4) 2021: 701-730 - [c80]Stanislaw Jarecki, Hugo Krawczyk, Jiayu Xu:
On the (In)Security of the Diffie-Hellman Oblivious PRF with Multiplicative Blinding. Public Key Cryptography (2) 2021: 380-409 - [c79]Maliheh Shirvanian, Christopher Robert Price, Mohammed Jubur, Nitesh Saxena, Stanislaw Jarecki, Hugo Krawczyk:
A hidden-password online password manager. SAC 2021: 1683-1686 - [i48]Craig Gentry, Shai Halevi, Hugo Krawczyk, Bernardo Magri, Jesper Buus Nielsen, Tal Rabin, Sophia Yakoubov:
YOSO: You Only Speak Once / Secure MPC with Stateless Ephemeral Roles. IACR Cryptol. ePrint Arch. 2021: 210 (2021) - [i47]Stanislaw Jarecki, Hugo Krawczyk, Jiayu Xu:
On the (In)Security of the Diffie-Hellman Oblivious PRF with Multiplicative Blinding. IACR Cryptol. ePrint Arch. 2021: 273 (2021) - [i46]Nihal Vatandas, Rosario Gennaro, Bertrand Ithurburn, Hugo Krawczyk:
On the Cryptographic Deniability of the Signal Protocol. IACR Cryptol. ePrint Arch. 2021: 642 (2021) - [i45]Yanqi Gu, Stanislaw Jarecki, Hugo Krawczyk:
KHAPE: Asymmetric PAKE from Key-Hiding Key Exchange. IACR Cryptol. ePrint Arch. 2021: 873 (2021) - 2020
- [c78]Nihal Vatandas, Rosario Gennaro, Bertrand Ithurburn, Hugo Krawczyk:
On the Cryptographic Deniability of the Signal Protocol. ACNS (2) 2020: 188-209 - [c77]Fabrice Benhamouda, Craig Gentry, Sergey Gorbunov, Shai Halevi, Hugo Krawczyk, Chengyu Lin, Tal Rabin, Leonid Reyzin:
Can a Public Blockchain Keep a Secret? TCC (1) 2020: 260-290 - [i44]Fabrice Benhamouda, Craig Gentry, Sergey Gorbunov, Shai Halevi, Hugo Krawczyk, Chengyu Lin, Tal Rabin, Leonid Reyzin:
Can a Blockchain Keep a Secret? IACR Cryptol. ePrint Arch. 2020: 464 (2020)
2010 – 2019
- 2019
- [j19]Benjamin Kuykendall, Hugo Krawczyk, Tal Rabin:
Cryptography for #MeToo. Proc. Priv. Enhancing Technol. 2019(3): 409-429 (2019) - [j18]Maliheh Shirvanian, Nitesh Saxena, Stanislaw Jarecki, Hugo Krawczyk:
Building and Studying a Password Store that Perfectly Hides Passwords from Itself. IEEE Trans. Dependable Secur. Comput. 16(5): 770-782 (2019) - [c76]Stanislaw Jarecki, Hugo Krawczyk, Jason K. Resch:
Updatable Oblivious Key Management for Storage Systems. CCS 2019: 379-393 - [c75]Hasini Gunasinghe, Ashish Kundu, Elisa Bertino, Hugo Krawczyk, Suresh Chari, Kapil Singh, Dong Su:
PrivIdEx: Privacy Preserving and Secure Exchange of Digital Identity Assets. WWW 2019: 594-604 - [i43]Stanislaw Jarecki, Hugo Krawczyk, Jason K. Resch:
Updatable Oblivious Key Management for Storage Systems. IACR Cryptol. ePrint Arch. 2019: 1275 (2019) - 2018
- [c74]Stanislaw Jarecki, Hugo Krawczyk, Jiayu Xu:
OPAQUE: An Asymmetric PAKE Protocol Secure Against Pre-computation Attacks. EUROCRYPT (3) 2018: 456-486 - [c73]Stanislaw Jarecki, Hugo Krawczyk, Maliheh Shirvanian, Nitesh Saxena:
Two-Factor Authentication with End-to-End Password Security. Public Key Cryptography (2) 2018: 431-461 - [i42]Stanislaw Jarecki, Hugo Krawczyk, Maliheh Shirvanian, Nitesh Saxena:
Two-Factor Authentication with End-to-End Password Security. IACR Cryptol. ePrint Arch. 2018: 33 (2018) - [i41]Stanislaw Jarecki, Hugo Krawczyk, Jiayu Xu:
OPAQUE: An Asymmetric PAKE Protocol Secure Against Pre-Computation Attacks. IACR Cryptol. ePrint Arch. 2018: 163 (2018) - [i40]Maliheh Shirvanian, Stanislaw Jarecki, Hugo Krawczyk, Nitesh Saxena:
SPHINX: A Password Store that Perfectly Hides Passwords from Itself. IACR Cryptol. ePrint Arch. 2018: 695 (2018) - [i39]Stanislaw Jarecki, Hugo Krawczyk, Jason K. Resch:
Threshold Partially-Oblivious PRFs with Applications to Key Management. IACR Cryptol. ePrint Arch. 2018: 733 (2018) - 2017
- [c72]Stanislaw Jarecki, Aggelos Kiayias, Hugo Krawczyk, Jiayu Xu:
TOPPSS: Cost-Minimal Password-Protected Secret Sharing Based on Threshold OPRF. ACNS 2017: 39-58 - [c71]Fabrice Benhamouda, Hugo Krawczyk, Tal Rabin:
Robust Non-interactive Multiparty Computation Against Constant-Size Collusion. CRYPTO (1) 2017: 391-419 - [c70]Maliheh Shirvanian, Stanislaw Jarecki, Hugo Krawczyk, Nitesh Saxena:
SPHINX: A Password Store that Perfectly Hides Passwords from Itself. ICDCS 2017: 1094-1104 - [i38]Stanislaw Jarecki, Aggelos Kiayias, Hugo Krawczyk, Jiayu Xu:
TOPPSS: Cost-minimal Password-Protected Secret Sharing based on Threshold OPRF. IACR Cryptol. ePrint Arch. 2017: 363 (2017) - [i37]Fabrice Benhamouda, Hugo Krawczyk, Tal Rabin:
Robust Non-Interactive Multiparty Computation Against Constant-Size Collusion. IACR Cryptol. ePrint Arch. 2017: 555 (2017) - 2016
- [c69]Stanislaw Jarecki, Hugo Krawczyk, Maliheh Shirvanian, Nitesh Saxena:
Device-Enhanced Password Protocols with Optimal Online-Offline Protection. AsiaCCS 2016: 177-188 - [c68]Hugo Krawczyk:
A Unilateral-to-Mutual Authentication Compiler for Key Exchange (with Applications to Client Authentication in TLS 1.3). CCS 2016: 1438-1450 - [c67]Vladimir Kolesnikov, Hugo Krawczyk, Yehuda Lindell, Alex J. Malozemoff, Tal Rabin:
Attribute-based Key Exchange with General Policies. CCS 2016: 1451-1463 - [c66]Hugo Krawczyk, Hoeteck Wee:
The OPTLS Protocol and TLS 1.3. EuroS&P 2016: 81-96 - [c65]Stanislaw Jarecki, Aggelos Kiayias, Hugo Krawczyk, Jiayu Xu:
Highly-Efficient and Composable Password-Protected Secret Sharing (Or: How to Protect Your Bitcoin Wallet Online). EuroS&P 2016: 276-291 - [i36]Stanislaw Jarecki, Aggelos Kiayias, Hugo Krawczyk, Jiayu Xu:
Highly-Efficient and Composable Password-Protected Secret Sharing (Or: How to Protect Your Bitcoin Wallet Online). IACR Cryptol. ePrint Arch. 2016: 144 (2016) - [i35]Vladimir Kolesnikov, Hugo Krawczyk, Yehuda Lindell, Alex J. Malozemoff, Tal Rabin:
Attribute-based Key Exchange with General Policies. IACR Cryptol. ePrint Arch. 2016: 518 (2016) - [i34]Hugo Krawczyk:
A Unilateral-to-Mutual Authentication Compiler for Key Exchange (with Applications to Client Authentication in TLS 1.3). IACR Cryptol. ePrint Arch. 2016: 711 (2016) - 2015
- [c64]Sky Faber, Stanislaw Jarecki, Hugo Krawczyk, Quan Nguyen, Marcel-Catalin Rosu, Michael Steiner:
Rich Queries on Encrypted Data: Beyond Exact Matches. ESORICS (2) 2015: 123-145 - [i33]Sky Faber, Stanislaw Jarecki, Hugo Krawczyk, Quan Nguyen, Marcel-Catalin Rosu, Michael Steiner:
Rich Queries on Encrypted Data: Beyond Exact Matches. IACR Cryptol. ePrint Arch. 2015: 927 (2015) - [i32]Hugo Krawczyk, Hoeteck Wee:
The OPTLS Protocol and TLS 1.3. IACR Cryptol. ePrint Arch. 2015: 978 (2015) - [i31]Stanislaw Jarecki, Hugo Krawczyk, Maliheh Shirvanian, Nitesh Saxena:
Device-Enhanced Password Protocols with Optimal Online-Offline Protection. IACR Cryptol. ePrint Arch. 2015: 1099 (2015) - 2014
- [c63]Stanislaw Jarecki, Aggelos Kiayias, Hugo Krawczyk:
Round-Optimal Password-Protected Secret Sharing and T-PAKE in the Password-Only Model. ASIACRYPT (2) 2014: 233-253 - [c62]David Cash, Joseph Jaeger, Stanislaw Jarecki, Charanjit S. Jutla, Hugo Krawczyk, Marcel-Catalin Rosu, Michael Steiner:
Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation. NDSS 2014 - [e2]Hugo Krawczyk:
Public-Key Cryptography - PKC 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings. Lecture Notes in Computer Science 8383, Springer 2014, ISBN 978-3-642-54630-3 [contents] - [i30]Stanislaw Jarecki, Aggelos Kiayias, Hugo Krawczyk:
Round-Optimal Password-Protected Secret Sharing and T-PAKE in the Password-Only Model. IACR Cryptol. ePrint Arch. 2014: 650 (2014) - [i29]David Cash, Joseph Jaeger, Stanislaw Jarecki, Charanjit S. Jutla, Hugo Krawczyk, Marcel-Catalin Rosu, Michael Steiner:
Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation. IACR Cryptol. ePrint Arch. 2014: 853 (2014) - 2013
- [c61]Stanislaw Jarecki, Charanjit S. Jutla, Hugo Krawczyk, Marcel-Catalin Rosu, Michael Steiner:
Outsourced symmetric private information retrieval. CCS 2013: 875-888 - [c60]David Cash, Stanislaw Jarecki, Charanjit S. Jutla, Hugo Krawczyk, Marcel-Catalin Rosu, Michael Steiner:
Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries. CRYPTO (1) 2013: 353-373 - [c59]Hugo Krawczyk, Kenneth G. Paterson, Hoeteck Wee:
On the Security of the TLS Protocol: A Systematic Analysis. CRYPTO (1) 2013: 429-448 - [i28]David Cash, Stanislaw Jarecki, Charanjit S. Jutla, Hugo Krawczyk, Marcel-Catalin Rosu, Michael Steiner:
Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries. IACR Cryptol. ePrint Arch. 2013: 169 (2013) - [i27]Hugo Krawczyk, Kenneth G. Paterson, Hoeteck Wee:
On the Security of the TLS Protocol: A Systematic Analysis. IACR Cryptol. ePrint Arch. 2013: 339 (2013) - [i26]Stanislaw Jarecki, Charanjit S. Jutla, Hugo Krawczyk, Marcel-Catalin Rosu, Michael Steiner:
Outsourced Symmetric Private Information Retrieval. IACR Cryptol. ePrint Arch. 2013: 720 (2013) - 2012
- [j17]Demijan Klinc, Carmit Hazay, Ashish Jagmohan, Hugo Krawczyk, Tal Rabin:
On Compression of Data Encrypted With Block Ciphers. IEEE Trans. Inf. Theory 58(11): 6989-7001 (2012) - [c58]Dana Dachman-Soled, Rosario Gennaro, Hugo Krawczyk, Tal Malkin:
Computational Extractors and Pseudorandomness. TCC 2012: 383-403 - 2011
- [c57]Boaz Barak, Yevgeniy Dodis, Hugo Krawczyk, Olivier Pereira, Krzysztof Pietrzak, François-Xavier Standaert, Yu Yu:
Leftover Hash Lemma, Revisited. CRYPTO 2011: 1-20 - [c56]Shai Halevi, Hugo Krawczyk:
One-Pass HMQV and Asymmetric Key-Wrapping. Public Key Cryptography 2011: 317-334 - [r2]Hugo Krawczyk:
Perfect Forward Secrecy. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 921-922 - [i25]Boaz Barak, Yevgeniy Dodis, Hugo Krawczyk, Olivier Pereira, Krzysztof Pietrzak, François-Xavier Standaert, Yu Yu:
Leftover Hash Lemma, Revisited. IACR Cryptol. ePrint Arch. 2011: 88 (2011) - [i24]Dana Dachman-Soled, Rosario Gennaro, Hugo Krawczyk, Tal Malkin:
Computational Extractors and Pseudorandomness. IACR Cryptol. ePrint Arch. 2011: 708 (2011) - 2010
- [c55]Rosario Gennaro, Hugo Krawczyk, Tal Rabin:
Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead. ACNS 2010: 309-328 - [c54]Hugo Krawczyk:
Cryptographic Extraction and Key Derivation: The HKDF Scheme. CRYPTO 2010: 631-648 - [c53]Rosario Gennaro, Jonathan Katz, Hugo Krawczyk, Tal Rabin:
Secure Network Coding over the Integers. Public Key Cryptography 2010: 142-160 - [i23]Demijan Klinc, Carmit Hazay, Ashish Jagmohan, Hugo Krawczyk, Tal Rabin:
On Compression of Data Encrypted with Block Ciphers. CoRR abs/1009.1759 (2010) - [i22]Rosario Gennaro, Hugo Krawczyk, Tal Rabin:
Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead. IACR Cryptol. ePrint Arch. 2010: 68 (2010) - [i21]Hugo Krawczyk:
Cryptographic Extraction and Key Derivation: The HKDF Scheme. IACR Cryptol. ePrint Arch. 2010: 264 (2010) - [i20]Demijan Klinc, Carmit Hazay, Ashish Jagmohan, Hugo Krawczyk, Tal Rabin:
On Compression of Data Encrypted with Block Ciphers. IACR Cryptol. ePrint Arch. 2010: 477 (2010) - [i19]Shai Halevi, Hugo Krawczyk:
One-Pass HMQV and Asymmetric Key-Wrapping. IACR Cryptol. ePrint Arch. 2010: 638 (2010) - [i18]Hugo Krawczyk, Pasi Eronen:
HMAC-based Extract-and-Expand Key Derivation Function (HKDF). RFC 5869: 1-14 (2010)
2000 – 2009
- 2009
- [c52]Demijan Klinc, Carmit Hazay, Ashish Jagmohan, Hugo Krawczyk, Tal Rabin:
On Compression of Data Encrypted with Block Ciphers. DCC 2009: 213-222 - [i17]Rosario Gennaro, Jonathan Katz, Hugo Krawczyk, Tal Rabin:
Secure Network Coding Over the Integers. IACR Cryptol. ePrint Arch. 2009: 569 (2009) - 2008
- [c51]Rosario Gennaro, Shai Halevi, Hugo Krawczyk, Tal Rabin, Steffen Reidt, Stephen D. Wolthusen:
Strongly-Resilient and Non-interactive Hierarchical Key-Agreement in MANETs. ESORICS 2008: 49-65 - [c50]Rosario Gennaro, Shai Halevi, Hugo Krawczyk, Tal Rabin:
Threshold RSA for Dynamic and Ad-Hoc Groups. EUROCRYPT 2008: 88-107 - [i16]Rosario Gennaro, Shai Halevi, Hugo Krawczyk, Tal Rabin:
Threshold RSA for Dynamic and Ad-Hoc Groups. IACR Cryptol. ePrint Arch. 2008: 45 (2008) - [i15]Rosario Gennaro, Shai Halevi, Hugo Krawczyk, Tal Rabin, Steffen Reidt, Stephen D. Wolthusen:
Strongly-Resilient and Non-Interactive Hierarchical Key-Agreement in MANETs. IACR Cryptol. ePrint Arch. 2008: 308 (2008) - 2007
- [j16]Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin:
Secure Distributed Key Generation for Discrete-Log Based Cryptosystems. J. Cryptol. 20(1): 51-83 (2007) - [j15]Rosario Gennaro, Tal Rabin, Stanislaw Jarecki, Hugo Krawczyk:
Robust and Efficient Sharing of RSA Functions. J. Cryptol. 20(3): 393 (2007) - [j14]Rosario Gennaro, Tal Rabin, Hugo Krawczyk:
RSA-Based Undeniable Signatures. J. Cryptol. 20(3): 394 (2007) - [c49]Shai Halevi, Hugo Krawczyk:
Security under key-dependent inputs. CCS 2007: 466-475 - [i14]Shai Halevi, Hugo Krawczyk:
Security under Key-Dependent Inputs. IACR Cryptol. ePrint Arch. 2007: 315 (2007) - 2006
- [c48]Mario Di Raimondo, Rosario Gennaro, Hugo Krawczyk:
Deniable authentication and key exchange. CCS 2006: 400-409 - [c47]Shai Halevi, Hugo Krawczyk:
Strengthening Digital Signatures Via Randomized Hashing. CRYPTO 2006: 41-59 - [i13]Mario Di Raimondo, Rosario Gennaro, Hugo Krawczyk:
Deniable Authentication and Key Exchange. IACR Cryptol. ePrint Arch. 2006: 280 (2006) - 2005
- [c46]Hugo Krawczyk:
HMQV: A High-Performance Secure Diffie-Hellman Protocol. CRYPTO 2005: 546-566 - [c45]Mario Di Raimondo, Rosario Gennaro, Hugo Krawczyk:
Secure off-the-record messaging. WPES 2005: 81-89 - [r1]Hugo Krawczyk:
Perfect Forward Secrecy. Encyclopedia of Cryptography and Security 2005 - [i12]Hugo Krawczyk:
HMQV: A High-Performance Secure Diffie-Hellman Protocol. IACR Cryptol. ePrint Arch. 2005: 176 (2005) - 2004
- [c44]Yevgeniy Dodis, Rosario Gennaro, Johan Håstad, Hugo Krawczyk, Tal Rabin:
Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes. CRYPTO 2004: 494-510 - [c43]Rosario Gennaro, Hugo Krawczyk, Tal Rabin:
Secure Hashed Diffie-Hellman over Non-DDH Groups. EUROCRYPT 2004: 361-381 - [i11]Rosario Gennaro, Hugo Krawczyk, Tal Rabin:
Secure Hashed Diffie-Hellman over Non-DDH Groups. IACR Cryptol. ePrint Arch. 2004: 99 (2004) - 2003
- [c42]Hugo Krawczyk:
SIGMA: The 'SIGn-and-MAc' Approach to Authenticated Diffie-Hellman and Its Use in the IKE-Protocols. CRYPTO 2003: 400-425 - [c41]Ran Canetti, Hugo Krawczyk, Jesper Buus Nielsen:
Relaxing Chosen-Ciphertext Security. CRYPTO 2003: 565-582 - [c40]Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin:
Secure Applications of Pedersen's Distributed Key Generation Protocol. CT-RSA 2003: 373-390 - [c39]Helmut Scherzer, Ran Canetti, Paul A. Karger, Hugo Krawczyk, Tal Rabin, David C. Toll:
Authenticating Mandatory Access Controls and Preserving Privacy for a High-Assurance Smart Card. ESORICS 2003: 181-200 - [i10]Ran Canetti, Hugo Krawczyk, Jesper Buus Nielsen:
Relaxing Chosen-Ciphertext Security. IACR Cryptol. ePrint Arch. 2003: 174 (2003) - 2002
- [c38]Ran Canetti, Hugo Krawczyk:
Security Analysis of IKE's Signature-Based Key-Exchange Protocol. CRYPTO 2002: 143-161 - [c37]Ran Canetti, Hugo Krawczyk:
Universally Composable Notions of Key Exchange and Secure Channels. EUROCRYPT 2002: 337-351 - [i9]Ran Canetti, Hugo Krawczyk:
Universally Composable Notions of Key Exchange and Secure Channels. IACR Cryptol. ePrint Arch. 2002: 59 (2002) - [i8]Ran Canetti, Hugo Krawczyk:
Security Analysis of IKE's Signature-based Key-Exchange Protocol. IACR Cryptol. ePrint Arch. 2002: 120 (2002) - 2001
- [j13]Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin:
Robust Threshold DSS Signatures. Inf. Comput. 164(1): 54-84 (2001) - [c36]Hugo Krawczyk:
The Order of Encryption and Authentication for Protecting Communications (or: How Secure Is SSL?). CRYPTO 2001: 310-331 - [c35]Ran Canetti, Hugo Krawczyk:
Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels. EUROCRYPT 2001: 453-474 - [i7]Ran Canetti, Hugo Krawczyk:
Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels. IACR Cryptol. ePrint Arch. 2001: 40 (2001) - [i6]Hugo Krawczyk:
Simple Forward-Secure Signatures From Any Signature Scheme. IACR Cryptol. ePrint Arch. 2001: 42 (2001) - [i5]Hugo Krawczyk:
The order of encryption and authentication for protecting communications (Or: how secure is SSL?). IACR Cryptol. ePrint Arch. 2001: 45 (2001) - 2000
- [j12]Rosario Gennaro, Tal Rabin, Stanislaw Jarecki, Hugo Krawczyk:
Robust and Efficient Sharing of RSA Functions. J. Cryptol. 13(2): 273-300 (2000) - [j11]Rosario Gennaro, Tal Rabin, Hugo Krawczyk:
RSA-Based Undeniable Signatures. J. Cryptol. 13(4): 397-416 (2000) - [j10]Mihir Bellare, Juan A. Garay, Ralf C. Hauser, Amir Herzberg, Hugo Krawczyk, Michael Steiner, Gene Tsudik, Els Van Herreweghen, Michael Waidner:
Design, implementation, and deployment of the iKP secure electronic payment system. IEEE J. Sel. Areas Commun. 18(4): 611-627 (2000) - [c34]Hugo Krawczyk:
Simple forward-secure signatures from any signature scheme. CCS 2000: 108-115 - [c33]Hugo Krawczyk, Tal Rabin:
Chameleon Signatures. NDSS 2000
1990 – 1999
- 1999
- [j9]Giuseppe Ateniese, Amir Herzberg, Hugo Krawczyk, Gene Tsudik:
Untraceable mobility or how to travel incognito. Comput. Networks 31(8): 871-884 (1999) - [j8]Shai Halevi, Hugo Krawczyk:
Public-Key Cryptography and Password Protocols. ACM Trans. Inf. Syst. Secur. 2(3): 230-268 (1999) - [c32]Ran Canetti, Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin:
Adaptive Security for Threshold Cryptosystems. CRYPTO 1999: 98-115 - [c31]John Black, Shai Halevi, Hugo Krawczyk, Ted Krovetz, Phillip Rogaway:
UMAC: Fast and Secure Message Authentication. CRYPTO 1999: 216-233 - [c30]Mihir Bellare, Oded Goldreich, Hugo Krawczyk:
Stateless Evaluation of Pseudorandom Functions: Security beyond the Birthday Barrier. CRYPTO 1999: 270-287 - [c29]Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin:
Secure Distributed Key Generation for Discrete-Log Based Cryptosystems. EUROCRYPT 1999: 295-310 - [c28]Hugo Krawczyk:
Blinding of Credit Card Numbers in the SET Protocol. Financial Cryptography 1999: 17-28 - [i4]Shai Halevi, Hugo Krawczyk:
Public-key cryptography and password protocols. IACR Cryptol. ePrint Arch. 1999: 4 (1999) - 1998
- [j7]Pau-Chen Cheng, Juan A. Garay, Amir Herzberg, Hugo Krawczyk:
A Security Architecture for the Internet Protocol. IBM Syst. J. 37(1): 42-60 (1998) - [c27]Shai Halevi, Hugo Krawczyk:
Public-Key Cryptography and Password Protocols. CCS 1998: 122-131 - [c26]