Hugo Krawczyk

Orcid: 0000-0003-3130-1888

Affiliations:
  • Amazon AWS, New York, USA
  • IBM Research, Yorktown Heights, USA (former)


According to our database1, Hugo Krawczyk authored at least 109 papers between 1988 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
The OPAQUE Augmented Password-Authenticated Key Exchange (aPAKE) Protocol.
RFC, July, 2025

Building and Testing a Hidden-Password Online Password Manager.
IEEE Trans. Inf. Forensics Secur., 2025

Blockcipher-Based Key Derivation without PRP/PRF Switching.
IACR Cryptol. ePrint Arch., 2025

Gold OPRF: Post-Quantum Oblivious Power-Residue PRF.
Proceedings of the IEEE Symposium on Security and Privacy, 2025

Encrypted Matrix-Vector Products from Secret Dual Codes.
Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, 2025

2024
SPRINT: High-Throughput Robust Distributed Schnorr Signatures.
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024

Password-Protected Threshold Signatures.
Proceedings of the Advances in Cryptology - ASIACRYPT 2024, 2024

2023
Password-Authenticated TLS via OPAQUE and Post-Handshake Authentication.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023

2022
Asymmetric PAKE with Low Computation and communication.
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022

Threshold Cryptography as a Service (in the Multiserver and YOSO Models).
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Two-factor Password-authenticated Key Exchange with End-to-end Security.
ACM Trans. Priv. Secur., 2021

A hidden-password online password manager.
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021

On the (In)Security of the Diffie-Hellman Oblivious PRF with Multiplicative Blinding.
Proceedings of the Public-Key Cryptography - PKC 2021, 2021

KHAPE: Asymmetric PAKE from Key-Hiding Key Exchange.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

YOSO: You Only Speak Once - Secure MPC with Stateless Ephemeral Roles.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

2020
Can a Blockchain Keep a Secret?
IACR Cryptol. ePrint Arch., 2020

Can a Public Blockchain Keep a Secret?
Proceedings of the Theory of Cryptography - 18th International Conference, 2020

On the Cryptographic Deniability of the Signal Protocol.
Proceedings of the Applied Cryptography and Network Security, 2020

2019
Building and Studying a Password Store that Perfectly Hides Passwords from Itself.
IEEE Trans. Dependable Secur. Comput., 2019

Cryptography for #MeToo.
Proc. Priv. Enhancing Technol., 2019

PrivIdEx: Privacy Preserving and Secure Exchange of Digital Identity Assets.
Proceedings of the World Wide Web Conference, 2019

Updatable Oblivious Key Management for Storage Systems.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Threshold Partially-Oblivious PRFs with Applications to Key Management.
IACR Cryptol. ePrint Arch., 2018

Two-Factor Authentication with End-to-End Password Security.
Proceedings of the Public-Key Cryptography - PKC 2018, 2018

OPAQUE: An Asymmetric PAKE Protocol Secure Against Pre-computation Attacks.
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018

2017
SPHINX: A Password Store that Perfectly Hides Passwords from Itself.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Robust Non-interactive Multiparty Computation Against Constant-Size Collusion.
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017

TOPPSS: Cost-Minimal Password-Protected Secret Sharing Based on Threshold OPRF.
Proceedings of the Applied Cryptography and Network Security, 2017

2016
The OPTLS Protocol and TLS 1.3.
Proceedings of the IEEE European Symposium on Security and Privacy, 2016

Highly-Efficient and Composable Password-Protected Secret Sharing (Or: How to Protect Your Bitcoin Wallet Online).
Proceedings of the IEEE European Symposium on Security and Privacy, 2016

A Unilateral-to-Mutual Authentication Compiler for Key Exchange (with Applications to Client Authentication in TLS 1.3).
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Attribute-based Key Exchange with General Policies.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Device-Enhanced Password Protocols with Optimal Online-Offline Protection.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
Rich Queries on Encrypted Data: Beyond Exact Matches.
Proceedings of the Computer Security - ESORICS 2015, 2015

2014
Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

Round-Optimal Password-Protected Secret Sharing and T-PAKE in the Password-Only Model.
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014

2013
On the Security of the TLS Protocol: A Systematic Analysis.
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013

Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries.
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013

Outsourced symmetric private information retrieval.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Computational Extractors and Pseudorandomness.
Proceedings of the Theory of Cryptography - 9th Theory of Cryptography Conference, 2012

2011
Perfect Forward Secrecy.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

One-Pass HMQV and Asymmetric Key-Wrapping.
Proceedings of the Public Key Cryptography - PKC 2011, 2011

Leftover Hash Lemma, Revisited.
Proceedings of the Advances in Cryptology - CRYPTO 2011, 2011

2010
HMAC-based Extract-and-Expand Key Derivation Function (HKDF).
RFC, May, 2010

Secure Network Coding over the Integers.
Proceedings of the Public Key Cryptography, 2010

Cryptographic Extraction and Key Derivation: The HKDF Scheme.
Proceedings of the Advances in Cryptology, 2010

Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead.
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010

2009
On Compression of Data Encrypted with Block Ciphers.
Proceedings of the 2009 Data Compression Conference (DCC 2009), 2009

2008
Threshold RSA for Dynamic and Ad-Hoc Groups.
Proceedings of the Advances in Cryptology, 2008

Strongly-Resilient and Non-interactive Hierarchical Key-Agreement in MANETs.
Proceedings of the Computer Security, 2008

2007
Security under key-dependent inputs.
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007

2006
Strengthening Digital Signatures Via Randomized Hashing.
Proceedings of the Advances in Cryptology, 2006

Deniable authentication and key exchange.
Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006

2005
Perfect Forward Secrecy.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Secure off-the-record messaging.
Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, 2005

HMQV: A High-Performance Secure Diffie-Hellman Protocol.
Proceedings of the Advances in Cryptology, 2005

2004
Secure Hashed Diffie-Hellman over Non-DDH Groups.
Proceedings of the Advances in Cryptology, 2004

Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes.
Proceedings of the Advances in Cryptology, 2004

2003
Authenticating Mandatory Access Controls and Preserving Privacy for a High-Assurance Smart Card.
Proceedings of the Computer Security, 2003

Secure Applications of Pedersen's Distributed Key Generation Protocol.
Proceedings of the Topics in Cryptology, 2003

SIGMA: The 'SIGn-and-MAc' Approach to Authenticated Diffie-Hellman and Its Use in the IKE-Protocols.
Proceedings of the Advances in Cryptology, 2003

Relaxing Chosen-Ciphertext Security.
Proceedings of the Advances in Cryptology, 2003

2002
Universally Composable Notions of Key Exchange and Secure Channels.
Proceedings of the Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28, 2002

Security Analysis of IKE's Signature-Based Key-Exchange Protocol.
Proceedings of the Advances in Cryptology, 2002

2001
Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels.
Proceedings of the Advances in Cryptology, 2001

The Order of Encryption and Authentication for Protecting Communications (or: How Secure Is SSL?).
Proceedings of the Advances in Cryptology, 2001

2000
Design, implementation, and deployment of the iKP secure electronic payment system.
IEEE J. Sel. Areas Commun., 2000

Chameleon Signatures.
Proceedings of the Network and Distributed System Security Symposium, 2000

Simple forward-secure signatures from any signature scheme.
Proceedings of the CCS 2000, 2000

1999
Untraceable mobility or how to travel incognito.
Comput. Networks, 1999

Blinding of Credit Card Numbers in the SET Protocol.
Proceedings of the Financial Cryptography, 1999

Secure Distributed Key Generation for Discrete-Log Based Cryptosystems.
Proceedings of the Advances in Cryptology, 1999

Adaptive Security for Threshold Cryptosystems.
Proceedings of the Advances in Cryptology, 1999

UMAC: Fast and Secure Message Authentication.
Proceedings of the Advances in Cryptology, 1999

Stateless Evaluation of Pseudorandom Functions: Security beyond the Birthday Barrier.
Proceedings of the Advances in Cryptology, 1999

1998
A Security Architecture for the Internet Protocol.
IBM Syst. J., 1998

Chameleon Hashing and Signatures.
IACR Cryptol. ePrint Arch., 1998

A Modular Approach to the Design and Analysis of Authentication and Key Exchange Protocols.
IACR Cryptol. ePrint Arch., 1998

A Modular Approach to the Design and Analysis of Authentication and Key Exchange Protocols (Extended Abstract).
Proceedings of the Thirtieth Annual ACM Symposium on the Theory of Computing, 1998

Public-Key Cryptography and Password Protocols.
Proceedings of the CCS '98, 1998

1997
HMAC: Keyed-Hashing for Message Authentication.
RFC, February, 1997

MMH: Software Message Authentication in the Gbit/Second Rates.
Proceedings of the Fast Software Encryption, 4th International Workshop, 1997

RSA-Based Undeniable Signatures.
Proceedings of the Advances in Cryptology, 1997

Proactive Public Key and Signature Systems.
Proceedings of the CCS '97, 1997

1996
SKEME: a versatile secure key exchange mechanism for Internet.
Proceedings of the 1996 Symposium on Network and Distributed System Security, 1996

Pseudorandom Functions Revisited: The Cascade Construction and Its Concrete Security.
Proceedings of the 37th Annual Symposium on Foundations of Computer Science, 1996

Robust Threshold DSS Signatures.
Proceedings of the Advances in Cryptology, 1996

Robust and Efficient Sharing of RSA Functions.
Proceedings of the Advances in Cryptology, 1996

Keying Hash Functions for Message Authentication.
Proceedings of the Advances in Cryptology, 1996

1995
Security issues in a CDPD wireless network.
IEEE Wirel. Commun., 1995

Design and Implementation of Modular Key Management Protocol and IP Secure Tunnel on AIX.
Proceedings of the 5th USENIX Security Symposium, 1995

Securing the Internet (Abstract).
Proceedings of the Fourteenth Annual ACM Symposium on Principles of Distributed Computing, 1995

New Hash Functions For Message Authentication.
Proceedings of the Advances in Cryptology, 1995

Proactive Secret Sharing Or: How to Cope With Perpetual Leakage.
Proceedings of the Advances in Cryptology, 1995

1994
On Travelling Incognito.
Proceedings of the First Workshop on Mobile Computing Systems and Applications, 1994

LFSR-based Hashing and Authentication.
Proceedings of the Advances in Cryptology, 1994

1993
Distributed Fingerprints and Secure Information Dispersal.
Proceedings of the Twelth Annual ACM Symposium on Principles of Distributed Computing, 1993

The Shrinking Generator: Some Practical Considerations.
Proceedings of the Fast Software Encryption, 1993

Secret Sharing Made Short.
Proceedings of the Advances in Cryptology, 1993

The Shrinking Generator.
Proceedings of the Advances in Cryptology, 1993

1991
Code Duplication: An Assist for Global Instruction Scheduling.
Proceedings of the 24th Annual IEEE/ACM International Symposium on Microarchitecture, 1991

1990
Pseudorandomness and computational difficulty.
PhD thesis, 1990

On the Composition of Zero-Knowledge Proof Systems.
Proceedings of the Automata, Languages and Programming, 17th International Colloquium, 1990

1989
The diophantine problem of Frobenius: A close bound.
Discret. Appl. Math., 1989

Spill Code Minimization Techniques for Optimizing Compilers.
Proceedings of the ACM SIGPLAN'89 Conference on Programming Language Design and Implementation (PLDI), 1989

How to Predict Congruential Generators.
Proceedings of the Advances in Cryptology, 1989

Sparse Pseudorandom Distributions.
Proceedings of the Advances in Cryptology, 1989

1988
On the Existence of Pseudorandom Generators (Extended Abstract)
Proceedings of the 29th Annual Symposium on Foundations of Computer Science, 1988

On the Existence of Pseudorandom Generators.
Proceedings of the Advances in Cryptology, 1988


  Loading...