Search the dblp DataBase
Hugo Krawczyk :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Shai Halevi , Hugo Krawczyk Public-Key Cryptography and Password Protocols. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 1998, pp:122-131 [Conf ] Amir Herzberg , Markus Jakobsson , Stanislaw Jarecki , Hugo Krawczyk , Moti Yung Proactive Public Key and Signature Systems. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 1997, pp:100-110 [Conf ] Hugo Krawczyk Simple forward-secure signatures from any signature scheme. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2000, pp:108-115 [Conf ] Mario Di Raimondo , Rosario Gennaro , Hugo Krawczyk Deniable authentication and key exchange. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2006, pp:400-409 [Conf ] John Black , Shai Halevi , Hugo Krawczyk , Ted Krovetz , Phillip Rogaway UMAC: Fast and Secure Message Authentication. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1999, pp:216-233 [Conf ] Mihir Bellare , Ran Canetti , Hugo Krawczyk Keying Hash Functions for Message Authentication. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1996, pp:1-15 [Conf ] Mihir Bellare , Oded Goldreich , Hugo Krawczyk Stateless Evaluation of Pseudorandom Functions: Security beyond the Birthday Barrier. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1999, pp:270-287 [Conf ] Ran Canetti , Rosario Gennaro , Stanislaw Jarecki , Hugo Krawczyk , Tal Rabin Adaptive Security for Threshold Cryptosystems. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1999, pp:98-115 [Conf ] Ran Canetti , Hugo Krawczyk Security Analysis of IKE's Signature-Based Key-Exchange Protocol. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2002, pp:143-161 [Conf ] Ran Canetti , Hugo Krawczyk , Jesper Buus Nielsen Relaxing Chosen-Ciphertext Security. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2003, pp:565-582 [Conf ] Don Coppersmith , Hugo Krawczyk , Yishay Mansour The Shrinking Generator. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1993, pp:22-39 [Conf ] Yevgeniy Dodis , Rosario Gennaro , Johan Håstad , Hugo Krawczyk , Tal Rabin Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2004, pp:494-510 [Conf ] Rosario Gennaro , Stanislaw Jarecki , Hugo Krawczyk , Tal Rabin Robust and Efficient Sharing of RSA Functions. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1996, pp:157-172 [Conf ] Rosario Gennaro , Hugo Krawczyk , Tal Rabin RSA-Based Undeniable Signatures. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1997, pp:132-149 [Conf ] Oded Goldreich , Hugo Krawczyk Sparse Pseudorandom Distributions. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1989, pp:113-127 [Conf ] Oded Goldreich , Hugo Krawczyk , Michael Luby On the Existence of Pseudorandom Generators. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1988, pp:146-162 [Conf ] Amir Herzberg , Stanislaw Jarecki , Hugo Krawczyk , Moti Yung Proactive Secret Sharing Or: How to Cope With Perpetual Leakage. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1995, pp:339-352 [Conf ] Hugo Krawczyk The Order of Encryption and Authentication for Protecting Communications (or: How Secure Is SSL?). [Citation Graph (0, 0)][DBLP ] CRYPTO, 2001, pp:310-331 [Conf ] Hugo Krawczyk SIGMA: The 'SIGn-and-MAc' Approach to Authenticated Diffie-Hellman and Its Use in the IKE-Protocols. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2003, pp:400-425 [Conf ] Hugo Krawczyk HMQV: A High-Performance Secure Diffie-Hellman Protocol. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2005, pp:546-566 [Conf ] Hugo Krawczyk How to Predict Congruential Generators. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1989, pp:138-153 [Conf ] Hugo Krawczyk Secret Sharing Made Short. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1993, pp:136-146 [Conf ] Hugo Krawczyk LFSR-based Hashing and Authentication. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1994, pp:129-139 [Conf ] Shai Halevi , Hugo Krawczyk Strengthening Digital Signatures Via Randomized Hashing. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2006, pp:41-59 [Conf ] Rosario Gennaro , Stanislaw Jarecki , Hugo Krawczyk , Tal Rabin Secure Applications of Pedersen's Distributed Key Generation Protocol. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2003, pp:373-390 [Conf ] Helmut Scherzer , Ran Canetti , Paul A. Karger , Hugo Krawczyk , Tal Rabin , David C. Toll Authenticating Mandatory Access Controls and Preserving Privacy for a High-Assurance Smart Card. [Citation Graph (0, 0)][DBLP ] ESORICS, 2003, pp:181-200 [Conf ] Ran Canetti , Hugo Krawczyk Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2001, pp:453-474 [Conf ] Ran Canetti , Hugo Krawczyk Universally Composable Notions of Key Exchange and Secure Channels. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2002, pp:337-351 [Conf ] Rosario Gennaro , Stanislaw Jarecki , Hugo Krawczyk , Tal Rabin Robust Threshold DSS Signatures. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1996, pp:354-371 [Conf ] Rosario Gennaro , Stanislaw Jarecki , Hugo Krawczyk , Tal Rabin Secure Distributed Key Generation for Discrete-Log Based Cryptosystems. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1999, pp:295-310 [Conf ] Rosario Gennaro , Hugo Krawczyk , Tal Rabin Secure Hashed Diffie-Hellman over Non-DDH Groups. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2004, pp:361-381 [Conf ] Hugo Krawczyk New Hash Functions For Message Authentication. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1995, pp:301-310 [Conf ] Hugo Krawczyk Blinding of Credit Card Numbers in the SET Protocol. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 1999, pp:17-28 [Conf ] Mihir Bellare , Ran Canetti , Hugo Krawczyk Pseudorandom Functions Revisited: The Cascade Construction and Its Concrete Security. [Citation Graph (0, 0)][DBLP ] FOCS, 1996, pp:514-523 [Conf ] Oded Goldreich , Hugo Krawczyk , Michael Luby On the Existence of Pseudorandom Generators (Extended Abstract) [Citation Graph (0, 0)][DBLP ] FOCS, 1988, pp:12-24 [Conf ] Shai Halevi , Hugo Krawczyk MMH: Software Message Authentication in the Gbit/Second Rates. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1997, pp:172-189 [Conf ] Hugo Krawczyk The Shrinking Generator: Some Practical Considerations. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1993, pp:45-46 [Conf ] Oded Goldreich , Hugo Krawczyk On the Composition of Zero-Knowledge Proof Systems. [Citation Graph (0, 0)][DBLP ] ICALP, 1990, pp:268-282 [Conf ] David Bernstein , Doron Cohen , Hugo Krawczyk Code Duplication: An Assist for Global Instruction Scheduling. [Citation Graph (0, 0)][DBLP ] MICRO, 1991, pp:103-113 [Conf ] Hugo Krawczyk , Tal Rabin Chameleon Signatures. [Citation Graph (0, 0)][DBLP ] NDSS, 2000, pp:- [Conf ] David Bernstein , Dina Q. Goldin , Martin Charles Golumbic , Hugo Krawczyk , Yishay Mansour , Itai Nahshon , Ron Y. Pinter Spill Code Minimization Techniques for Optimizing Compilers. [Citation Graph (0, 0)][DBLP ] PLDI, 1989, pp:258-263 [Conf ] Pau-Chen Cheng , Juan A. Garay , Amir Herzberg , Hugo Krawczyk Securing the Internet (Abstract). [Citation Graph (0, 0)][DBLP ] PODC, 1995, pp:257- [Conf ] Hugo Krawczyk Distributed Fingerprints and Secure Information Dispersal. [Citation Graph (0, 0)][DBLP ] PODC, 1993, pp:207-218 [Conf ] Mihir Bellare , Ran Canetti , Hugo Krawczyk A Modular Approach to the Design and Analysis of Authentication and Key Exchange Protocols (Extended Abstract). [Citation Graph (0, 0)][DBLP ] STOC, 1998, pp:419-428 [Conf ] Mario Di Raimondo , Rosario Gennaro , Hugo Krawczyk Secure off-the-record messaging. [Citation Graph (0, 0)][DBLP ] WPES, 2005, pp:81-89 [Conf ] Giuseppe Ateniese , Amir Herzberg , Hugo Krawczyk , Gene Tsudik Untraceable mobility or how to travel incognito. [Citation Graph (0, 0)][DBLP ] Computer Networks, 1999, v:31, n:8, pp:871-884 [Journal ] Rosario Gennaro , Stanislaw Jarecki , Hugo Krawczyk , Tal Rabin Robust Threshold DSS Signatures. [Citation Graph (0, 0)][DBLP ] Inf. Comput., 2001, v:164, n:1, pp:54-84 [Journal ] Pau-Chen Cheng , Juan A. Garay , Amir Herzberg , Hugo Krawczyk A Security Architecture for the Internet Protocol. [Citation Graph (0, 0)][DBLP ] IBM Systems Journal, 1998, v:37, n:1, pp:42-60 [Journal ] Hugo Krawczyk How to Predict Congruential Generators. [Citation Graph (0, 0)][DBLP ] J. Algorithms, 1992, v:13, n:4, pp:527-545 [Journal ] Rosario Gennaro , Tal Rabin , Stanislaw Jarecki , Hugo Krawczyk Robust and Efficient Sharing of RSA Functions. [Citation Graph (0, 0)][DBLP ] J. Cryptology, 2000, v:13, n:2, pp:273-300 [Journal ] Rosario Gennaro , Tal Rabin , Hugo Krawczyk RSA-Based Undeniable Signatures. [Citation Graph (0, 0)][DBLP ] J. Cryptology, 2000, v:13, n:4, pp:397-416 [Journal ] Oded Goldreich , Hugo Krawczyk Sparse Pseudorandom Distributions. [Citation Graph (0, 0)][DBLP ] Random Struct. Algorithms, 1992, v:3, n:2, pp:163-174 [Journal ] Oded Goldreich , Hugo Krawczyk On the Composition of Zero-Knowledge Proof Systems. [Citation Graph (0, 0)][DBLP ] SIAM J. Comput., 1996, v:25, n:1, pp:169-192 [Journal ] Oded Goldreich , Hugo Krawczyk , Michael Luby On the Existence of Pseudorandom Generators. [Citation Graph (0, 0)][DBLP ] SIAM J. Comput., 1993, v:22, n:6, pp:1163-1175 [Journal ] Shai Halevi , Hugo Krawczyk Public-Key Cryptography and Password Protocols. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 1999, v:2, n:3, pp:230-268 [Journal ] Rosario Gennaro , Stanislaw Jarecki , Hugo Krawczyk , Tal Rabin Secure Distributed Key Generation for Discrete-Log Based Cryptosystems. [Citation Graph (0, 0)][DBLP ] J. Cryptology, 2007, v:20, n:1, pp:51-83 [Journal ] Rosario Gennaro , Tal Rabin , Stanislaw Jarecki , Hugo Krawczyk Robust and Efficient Sharing of RSA Functions. [Citation Graph (0, 0)][DBLP ] J. Cryptology, 2007, v:20, n:3, pp:393- [Journal ] Rosario Gennaro , Tal Rabin , Hugo Krawczyk RSA-Based Undeniable Signatures. [Citation Graph (0, 0)][DBLP ] J. Cryptology, 2007, v:20, n:3, pp:394- [Journal ] Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead. [Citation Graph (, )][DBLP ] Security under key-dependent inputs. [Citation Graph (, )][DBLP ] Cryptographic Extraction and Key Derivation: The HKDF Scheme. [Citation Graph (, )][DBLP ] On Compression of Data Encrypted with Block Ciphers. [Citation Graph (, )][DBLP ] Strongly-Resilient and Non-interactive Hierarchical Key-Agreement in MANETs. [Citation Graph (, )][DBLP ] Threshold RSA for Dynamic and Ad-Hoc Groups. [Citation Graph (, )][DBLP ] Secure Network Coding over the Integers. [Citation Graph (, )][DBLP ] The diophantine problem of Frobenius: A close bound. [Citation Graph (, )][DBLP ] Search in 0.024secs, Finished in 0.026secs