The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Hugo Krawczyk: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Shai Halevi, Hugo Krawczyk
    Public-Key Cryptography and Password Protocols. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1998, pp:122-131 [Conf]
  2. Amir Herzberg, Markus Jakobsson, Stanislaw Jarecki, Hugo Krawczyk, Moti Yung
    Proactive Public Key and Signature Systems. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1997, pp:100-110 [Conf]
  3. Hugo Krawczyk
    Simple forward-secure signatures from any signature scheme. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2000, pp:108-115 [Conf]
  4. Mario Di Raimondo, Rosario Gennaro, Hugo Krawczyk
    Deniable authentication and key exchange. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2006, pp:400-409 [Conf]
  5. John Black, Shai Halevi, Hugo Krawczyk, Ted Krovetz, Phillip Rogaway
    UMAC: Fast and Secure Message Authentication. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1999, pp:216-233 [Conf]
  6. Mihir Bellare, Ran Canetti, Hugo Krawczyk
    Keying Hash Functions for Message Authentication. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1996, pp:1-15 [Conf]
  7. Mihir Bellare, Oded Goldreich, Hugo Krawczyk
    Stateless Evaluation of Pseudorandom Functions: Security beyond the Birthday Barrier. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1999, pp:270-287 [Conf]
  8. Ran Canetti, Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin
    Adaptive Security for Threshold Cryptosystems. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1999, pp:98-115 [Conf]
  9. Ran Canetti, Hugo Krawczyk
    Security Analysis of IKE's Signature-Based Key-Exchange Protocol. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2002, pp:143-161 [Conf]
  10. Ran Canetti, Hugo Krawczyk, Jesper Buus Nielsen
    Relaxing Chosen-Ciphertext Security. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2003, pp:565-582 [Conf]
  11. Don Coppersmith, Hugo Krawczyk, Yishay Mansour
    The Shrinking Generator. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1993, pp:22-39 [Conf]
  12. Yevgeniy Dodis, Rosario Gennaro, Johan Håstad, Hugo Krawczyk, Tal Rabin
    Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2004, pp:494-510 [Conf]
  13. Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin
    Robust and Efficient Sharing of RSA Functions. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1996, pp:157-172 [Conf]
  14. Rosario Gennaro, Hugo Krawczyk, Tal Rabin
    RSA-Based Undeniable Signatures. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1997, pp:132-149 [Conf]
  15. Oded Goldreich, Hugo Krawczyk
    Sparse Pseudorandom Distributions. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1989, pp:113-127 [Conf]
  16. Oded Goldreich, Hugo Krawczyk, Michael Luby
    On the Existence of Pseudorandom Generators. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1988, pp:146-162 [Conf]
  17. Amir Herzberg, Stanislaw Jarecki, Hugo Krawczyk, Moti Yung
    Proactive Secret Sharing Or: How to Cope With Perpetual Leakage. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1995, pp:339-352 [Conf]
  18. Hugo Krawczyk
    The Order of Encryption and Authentication for Protecting Communications (or: How Secure Is SSL?). [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2001, pp:310-331 [Conf]
  19. Hugo Krawczyk
    SIGMA: The 'SIGn-and-MAc' Approach to Authenticated Diffie-Hellman and Its Use in the IKE-Protocols. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2003, pp:400-425 [Conf]
  20. Hugo Krawczyk
    HMQV: A High-Performance Secure Diffie-Hellman Protocol. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2005, pp:546-566 [Conf]
  21. Hugo Krawczyk
    How to Predict Congruential Generators. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1989, pp:138-153 [Conf]
  22. Hugo Krawczyk
    Secret Sharing Made Short. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1993, pp:136-146 [Conf]
  23. Hugo Krawczyk
    LFSR-based Hashing and Authentication. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1994, pp:129-139 [Conf]
  24. Shai Halevi, Hugo Krawczyk
    Strengthening Digital Signatures Via Randomized Hashing. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2006, pp:41-59 [Conf]
  25. Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin
    Secure Applications of Pedersen's Distributed Key Generation Protocol. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2003, pp:373-390 [Conf]
  26. Helmut Scherzer, Ran Canetti, Paul A. Karger, Hugo Krawczyk, Tal Rabin, David C. Toll
    Authenticating Mandatory Access Controls and Preserving Privacy for a High-Assurance Smart Card. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2003, pp:181-200 [Conf]
  27. Ran Canetti, Hugo Krawczyk
    Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2001, pp:453-474 [Conf]
  28. Ran Canetti, Hugo Krawczyk
    Universally Composable Notions of Key Exchange and Secure Channels. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2002, pp:337-351 [Conf]
  29. Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin
    Robust Threshold DSS Signatures. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1996, pp:354-371 [Conf]
  30. Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin
    Secure Distributed Key Generation for Discrete-Log Based Cryptosystems. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1999, pp:295-310 [Conf]
  31. Rosario Gennaro, Hugo Krawczyk, Tal Rabin
    Secure Hashed Diffie-Hellman over Non-DDH Groups. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2004, pp:361-381 [Conf]
  32. Hugo Krawczyk
    New Hash Functions For Message Authentication. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1995, pp:301-310 [Conf]
  33. Hugo Krawczyk
    Blinding of Credit Card Numbers in the SET Protocol. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 1999, pp:17-28 [Conf]
  34. Mihir Bellare, Ran Canetti, Hugo Krawczyk
    Pseudorandom Functions Revisited: The Cascade Construction and Its Concrete Security. [Citation Graph (0, 0)][DBLP]
    FOCS, 1996, pp:514-523 [Conf]
  35. Oded Goldreich, Hugo Krawczyk, Michael Luby
    On the Existence of Pseudorandom Generators (Extended Abstract) [Citation Graph (0, 0)][DBLP]
    FOCS, 1988, pp:12-24 [Conf]
  36. Shai Halevi, Hugo Krawczyk
    MMH: Software Message Authentication in the Gbit/Second Rates. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1997, pp:172-189 [Conf]
  37. Hugo Krawczyk
    The Shrinking Generator: Some Practical Considerations. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1993, pp:45-46 [Conf]
  38. Oded Goldreich, Hugo Krawczyk
    On the Composition of Zero-Knowledge Proof Systems. [Citation Graph (0, 0)][DBLP]
    ICALP, 1990, pp:268-282 [Conf]
  39. David Bernstein, Doron Cohen, Hugo Krawczyk
    Code Duplication: An Assist for Global Instruction Scheduling. [Citation Graph (0, 0)][DBLP]
    MICRO, 1991, pp:103-113 [Conf]
  40. Hugo Krawczyk, Tal Rabin
    Chameleon Signatures. [Citation Graph (0, 0)][DBLP]
    NDSS, 2000, pp:- [Conf]
  41. David Bernstein, Dina Q. Goldin, Martin Charles Golumbic, Hugo Krawczyk, Yishay Mansour, Itai Nahshon, Ron Y. Pinter
    Spill Code Minimization Techniques for Optimizing Compilers. [Citation Graph (0, 0)][DBLP]
    PLDI, 1989, pp:258-263 [Conf]
  42. Pau-Chen Cheng, Juan A. Garay, Amir Herzberg, Hugo Krawczyk
    Securing the Internet (Abstract). [Citation Graph (0, 0)][DBLP]
    PODC, 1995, pp:257- [Conf]
  43. Hugo Krawczyk
    Distributed Fingerprints and Secure Information Dispersal. [Citation Graph (0, 0)][DBLP]
    PODC, 1993, pp:207-218 [Conf]
  44. Mihir Bellare, Ran Canetti, Hugo Krawczyk
    A Modular Approach to the Design and Analysis of Authentication and Key Exchange Protocols (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    STOC, 1998, pp:419-428 [Conf]
  45. Mario Di Raimondo, Rosario Gennaro, Hugo Krawczyk
    Secure off-the-record messaging. [Citation Graph (0, 0)][DBLP]
    WPES, 2005, pp:81-89 [Conf]
  46. Giuseppe Ateniese, Amir Herzberg, Hugo Krawczyk, Gene Tsudik
    Untraceable mobility or how to travel incognito. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 1999, v:31, n:8, pp:871-884 [Journal]
  47. Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin
    Robust Threshold DSS Signatures. [Citation Graph (0, 0)][DBLP]
    Inf. Comput., 2001, v:164, n:1, pp:54-84 [Journal]
  48. Pau-Chen Cheng, Juan A. Garay, Amir Herzberg, Hugo Krawczyk
    A Security Architecture for the Internet Protocol. [Citation Graph (0, 0)][DBLP]
    IBM Systems Journal, 1998, v:37, n:1, pp:42-60 [Journal]
  49. Hugo Krawczyk
    How to Predict Congruential Generators. [Citation Graph (0, 0)][DBLP]
    J. Algorithms, 1992, v:13, n:4, pp:527-545 [Journal]
  50. Rosario Gennaro, Tal Rabin, Stanislaw Jarecki, Hugo Krawczyk
    Robust and Efficient Sharing of RSA Functions. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 2000, v:13, n:2, pp:273-300 [Journal]
  51. Rosario Gennaro, Tal Rabin, Hugo Krawczyk
    RSA-Based Undeniable Signatures. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 2000, v:13, n:4, pp:397-416 [Journal]
  52. Oded Goldreich, Hugo Krawczyk
    Sparse Pseudorandom Distributions. [Citation Graph (0, 0)][DBLP]
    Random Struct. Algorithms, 1992, v:3, n:2, pp:163-174 [Journal]
  53. Oded Goldreich, Hugo Krawczyk
    On the Composition of Zero-Knowledge Proof Systems. [Citation Graph (0, 0)][DBLP]
    SIAM J. Comput., 1996, v:25, n:1, pp:169-192 [Journal]
  54. Oded Goldreich, Hugo Krawczyk, Michael Luby
    On the Existence of Pseudorandom Generators. [Citation Graph (0, 0)][DBLP]
    SIAM J. Comput., 1993, v:22, n:6, pp:1163-1175 [Journal]
  55. Shai Halevi, Hugo Krawczyk
    Public-Key Cryptography and Password Protocols. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 1999, v:2, n:3, pp:230-268 [Journal]
  56. Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin
    Secure Distributed Key Generation for Discrete-Log Based Cryptosystems. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 2007, v:20, n:1, pp:51-83 [Journal]
  57. Rosario Gennaro, Tal Rabin, Stanislaw Jarecki, Hugo Krawczyk
    Robust and Efficient Sharing of RSA Functions. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 2007, v:20, n:3, pp:393- [Journal]
  58. Rosario Gennaro, Tal Rabin, Hugo Krawczyk
    RSA-Based Undeniable Signatures. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 2007, v:20, n:3, pp:394- [Journal]

  59. Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead. [Citation Graph (, )][DBLP]


  60. Security under key-dependent inputs. [Citation Graph (, )][DBLP]


  61. Cryptographic Extraction and Key Derivation: The HKDF Scheme. [Citation Graph (, )][DBLP]


  62. On Compression of Data Encrypted with Block Ciphers. [Citation Graph (, )][DBLP]


  63. Strongly-Resilient and Non-interactive Hierarchical Key-Agreement in MANETs. [Citation Graph (, )][DBLP]


  64. Threshold RSA for Dynamic and Ad-Hoc Groups. [Citation Graph (, )][DBLP]


  65. Secure Network Coding over the Integers. [Citation Graph (, )][DBLP]


  66. The diophantine problem of Frobenius: A close bound. [Citation Graph (, )][DBLP]


Search in 0.024secs, Finished in 0.026secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002