Hugo Krawczyk
Orcid: 0000-0003-3130-1888Affiliations:
- Amazon AWS, New York, USA
- IBM Research, Yorktown Heights, USA (former)
According to our database1,
Hugo Krawczyk
authored at least 109 papers
between 1988 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
On csauthors.net:
Bibliography
2025
RFC, July, 2025
IEEE Trans. Inf. Forensics Secur., 2025
IACR Cryptol. ePrint Arch., 2025
Proceedings of the IEEE Symposium on Security and Privacy, 2025
Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, 2025
2024
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024
Proceedings of the Advances in Cryptology - ASIACRYPT 2024, 2024
2023
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023
2022
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
ACM Trans. Priv. Secur., 2021
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021
On the (In)Security of the Diffie-Hellman Oblivious PRF with Multiplicative Blinding.
Proceedings of the Public-Key Cryptography - PKC 2021, 2021
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021
2020
Proceedings of the Theory of Cryptography - 18th International Conference, 2020
Proceedings of the Applied Cryptography and Network Security, 2020
2019
IEEE Trans. Dependable Secur. Comput., 2019
Proceedings of the World Wide Web Conference, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
IACR Cryptol. ePrint Arch., 2018
Proceedings of the Public-Key Cryptography - PKC 2018, 2018
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018
2017
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017
Proceedings of the Applied Cryptography and Network Security, 2017
2016
Proceedings of the IEEE European Symposium on Security and Privacy, 2016
Highly-Efficient and Composable Password-Protected Secret Sharing (Or: How to Protect Your Bitcoin Wallet Online).
Proceedings of the IEEE European Symposium on Security and Privacy, 2016
A Unilateral-to-Mutual Authentication Compiler for Key Exchange (with Applications to Client Authentication in TLS 1.3).
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
2015
Proceedings of the Computer Security - ESORICS 2015, 2015
2014
Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014
Round-Optimal Password-Protected Secret Sharing and T-PAKE in the Password-Only Model.
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014
2013
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
2012
Proceedings of the Theory of Cryptography - 9th Theory of Cryptography Conference, 2012
2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Public Key Cryptography - PKC 2011, 2011
Proceedings of the Advances in Cryptology - CRYPTO 2011, 2011
2010
Proceedings of the Public Key Cryptography, 2010
Proceedings of the Advances in Cryptology, 2010
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010
2009
Proceedings of the 2009 Data Compression Conference (DCC 2009), 2009
2008
Proceedings of the Advances in Cryptology, 2008
Proceedings of the Computer Security, 2008
2007
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007
2006
Proceedings of the Advances in Cryptology, 2006
Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006
2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, 2005
Proceedings of the Advances in Cryptology, 2005
2004
Proceedings of the Advances in Cryptology, 2004
Proceedings of the Advances in Cryptology, 2004
2003
Authenticating Mandatory Access Controls and Preserving Privacy for a High-Assurance Smart Card.
Proceedings of the Computer Security, 2003
Proceedings of the Topics in Cryptology, 2003
SIGMA: The 'SIGn-and-MAc' Approach to Authenticated Diffie-Hellman and Its Use in the IKE-Protocols.
Proceedings of the Advances in Cryptology, 2003
2002
Proceedings of the Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28, 2002
Proceedings of the Advances in Cryptology, 2002
2001
Proceedings of the Advances in Cryptology, 2001
The Order of Encryption and Authentication for Protecting Communications (or: How Secure Is SSL?).
Proceedings of the Advances in Cryptology, 2001
2000
IEEE J. Sel. Areas Commun., 2000
Proceedings of the Network and Distributed System Security Symposium, 2000
Proceedings of the CCS 2000, 2000
1999
Proceedings of the Financial Cryptography, 1999
Proceedings of the Advances in Cryptology, 1999
Proceedings of the Advances in Cryptology, 1999
Proceedings of the Advances in Cryptology, 1999
Stateless Evaluation of Pseudorandom Functions: Security beyond the Birthday Barrier.
Proceedings of the Advances in Cryptology, 1999
1998
A Modular Approach to the Design and Analysis of Authentication and Key Exchange Protocols.
IACR Cryptol. ePrint Arch., 1998
A Modular Approach to the Design and Analysis of Authentication and Key Exchange Protocols (Extended Abstract).
Proceedings of the Thirtieth Annual ACM Symposium on the Theory of Computing, 1998
1997
Proceedings of the Fast Software Encryption, 4th International Workshop, 1997
1996
Proceedings of the 1996 Symposium on Network and Distributed System Security, 1996
Pseudorandom Functions Revisited: The Cascade Construction and Its Concrete Security.
Proceedings of the 37th Annual Symposium on Foundations of Computer Science, 1996
Proceedings of the Advances in Cryptology, 1996
Proceedings of the Advances in Cryptology, 1996
1995
Design and Implementation of Modular Key Management Protocol and IP Secure Tunnel on AIX.
Proceedings of the 5th USENIX Security Symposium, 1995
Proceedings of the Fourteenth Annual ACM Symposium on Principles of Distributed Computing, 1995
Proceedings of the Advances in Cryptology, 1995
Proceedings of the Advances in Cryptology, 1995
1994
Proceedings of the First Workshop on Mobile Computing Systems and Applications, 1994
Proceedings of the Advances in Cryptology, 1994
1993
Proceedings of the Twelth Annual ACM Symposium on Principles of Distributed Computing, 1993
Proceedings of the Fast Software Encryption, 1993
1991
Proceedings of the 24th Annual IEEE/ACM International Symposium on Microarchitecture, 1991
1990
Proceedings of the Automata, Languages and Programming, 17th International Colloquium, 1990
1989
Proceedings of the ACM SIGPLAN'89 Conference on Programming Language Design and Implementation (PLDI), 1989
Proceedings of the Advances in Cryptology, 1989
1988
Proceedings of the 29th Annual Symposium on Foundations of Computer Science, 1988
Proceedings of the Advances in Cryptology, 1988