Hugo Krawczyk

According to our database1, Hugo Krawczyk authored at least 135 papers between 1988 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
Building and Studying a Password Store that Perfectly Hides Passwords from Itself.
IEEE Trans. Dependable Sec. Comput., 2019

Cryptography for #MeToo.
PoPETs, 2019

PrivIdEx: Privacy Preserving and Secure Exchange of Digital Identity Assets.
Proceedings of the World Wide Web Conference, 2019

2018
SPHINX: A Password Store that Perfectly Hides Passwords from Itself.
IACR Cryptology ePrint Archive, 2018

OPAQUE: An Asymmetric PAKE Protocol Secure Against Pre-Computation Attacks.
IACR Cryptology ePrint Archive, 2018

Two-Factor Authentication with End-to-End Password Security.
IACR Cryptology ePrint Archive, 2018

Threshold Partially-Oblivious PRFs with Applications to Key Management.
IACR Cryptology ePrint Archive, 2018

Two-Factor Authentication with End-to-End Password Security.
Proceedings of the Public-Key Cryptography - PKC 2018, 2018

OPAQUE: An Asymmetric PAKE Protocol Secure Against Pre-computation Attacks.
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018

2017
TOPPSS: Cost-minimal Password-Protected Secret Sharing based on Threshold OPRF.
IACR Cryptology ePrint Archive, 2017

Robust Non-Interactive Multiparty Computation Against Constant-Size Collusion.
IACR Cryptology ePrint Archive, 2017

SPHINX: A Password Store that Perfectly Hides Passwords from Itself.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Robust Non-interactive Multiparty Computation Against Constant-Size Collusion.
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017

TOPPSS: Cost-Minimal Password-Protected Secret Sharing Based on Threshold OPRF.
Proceedings of the Applied Cryptography and Network Security, 2017

2016
A Unilateral-to-Mutual Authentication Compiler for Key Exchange (with Applications to Client Authentication in TLS 1.3).
IACR Cryptology ePrint Archive, 2016

Attribute-based Key Exchange with General Policies.
IACR Cryptology ePrint Archive, 2016

Highly-Efficient and Composable Password-Protected Secret Sharing (Or: How to Protect Your Bitcoin Wallet Online).
IACR Cryptology ePrint Archive, 2016

The OPTLS Protocol and TLS 1.3.
Proceedings of the IEEE European Symposium on Security and Privacy, 2016

Highly-Efficient and Composable Password-Protected Secret Sharing (Or: How to Protect Your Bitcoin Wallet Online).
Proceedings of the IEEE European Symposium on Security and Privacy, 2016

A Unilateral-to-Mutual Authentication Compiler for Key Exchange (with Applications to Client Authentication in TLS 1.3).
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Attribute-based Key Exchange with General Policies.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Device-Enhanced Password Protocols with Optimal Online-Offline Protection.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
The OPTLS Protocol and TLS 1.3.
IACR Cryptology ePrint Archive, 2015

Device-Enhanced Password Protocols with Optimal Online-Offline Protection.
IACR Cryptology ePrint Archive, 2015

Rich Queries on Encrypted Data: Beyond Exact Matches.
IACR Cryptology ePrint Archive, 2015

Rich Queries on Encrypted Data: Beyond Exact Matches.
Proceedings of the Computer Security - ESORICS 2015, 2015

2014
Round-Optimal Password-Protected Secret Sharing and T-PAKE in the Password-Only Model.
IACR Cryptology ePrint Archive, 2014

Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation.
IACR Cryptology ePrint Archive, 2014

Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

Round-Optimal Password-Protected Secret Sharing and T-PAKE in the Password-Only Model.
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014

2013
On the Security of the TLS Protocol: A Systematic Analysis.
IACR Cryptology ePrint Archive, 2013

Outsourced Symmetric Private Information Retrieval.
IACR Cryptology ePrint Archive, 2013

Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries.
IACR Cryptology ePrint Archive, 2013

On the Security of the TLS Protocol: A Systematic Analysis.
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013

Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries.
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013

Outsourced symmetric private information retrieval.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
On Compression of Data Encrypted With Block Ciphers.
IEEE Trans. Information Theory, 2012

Computational Extractors and Pseudorandomness.
Proceedings of the Theory of Cryptography - 9th Theory of Cryptography Conference, 2012

2011
Perfect Forward Secrecy.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Computational Extractors and Pseudorandomness.
IACR Cryptology ePrint Archive, 2011

Leftover Hash Lemma, Revisited.
IACR Cryptology ePrint Archive, 2011

One-Pass HMQV and Asymmetric Key-Wrapping.
Proceedings of the Public Key Cryptography - PKC 2011, 2011

Leftover Hash Lemma, Revisited.
Proceedings of the Advances in Cryptology - CRYPTO 2011, 2011

2010
HMAC-based Extract-and-Expand Key Derivation Function (HKDF).
RFC, May, 2010

Cryptographic Extraction and Key Derivation: The HKDF Scheme.
IACR Cryptology ePrint Archive, 2010

On Compression of Data Encrypted with Block Ciphers.
IACR Cryptology ePrint Archive, 2010

One-Pass HMQV and Asymmetric Key-Wrapping.
IACR Cryptology ePrint Archive, 2010

Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead.
IACR Cryptology ePrint Archive, 2010

On Compression of Data Encrypted with Block Ciphers
CoRR, 2010

Secure Network Coding over the Integers.
Proceedings of the Public Key Cryptography, 2010

Cryptographic Extraction and Key Derivation: The HKDF Scheme.
Proceedings of the Advances in Cryptology, 2010

Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead.
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010

2009
Secure Network Coding Over the Integers.
IACR Cryptology ePrint Archive, 2009

On Compression of Data Encrypted with Block Ciphers.
Proceedings of the 2009 Data Compression Conference (DCC 2009), 2009

2008
Strongly-Resilient and Non-Interactive Hierarchical Key-Agreement in MANETs.
IACR Cryptology ePrint Archive, 2008

Threshold RSA for Dynamic and Ad-Hoc Groups.
IACR Cryptology ePrint Archive, 2008

Threshold RSA for Dynamic and Ad-Hoc Groups.
Proceedings of the Advances in Cryptology, 2008

Strongly-Resilient and Non-interactive Hierarchical Key-Agreement in MANETs.
Proceedings of the Computer Security, 2008

2007
Secure Distributed Key Generation for Discrete-Log Based Cryptosystems.
J. Cryptology, 2007

Security under Key-Dependent Inputs.
IACR Cryptology ePrint Archive, 2007

Security under key-dependent inputs.
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007

2006
Deniable Authentication and Key Exchange.
IACR Cryptology ePrint Archive, 2006

Strengthening Digital Signatures Via Randomized Hashing.
Proceedings of the Advances in Cryptology, 2006

Deniable authentication and key exchange.
Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, Alexandria, VA, USA, Ioctober 30, 2006

2005
HMQV: A High-Performance Secure Diffie-Hellman Protocol.
IACR Cryptology ePrint Archive, 2005

Secure off-the-record messaging.
Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, 2005

HMQV: A High-Performance Secure Diffie-Hellman Protocol.
Proceedings of the Advances in Cryptology, 2005

2004
Secure Hashed Diffie-Hellman over Non-DDH Groups.
IACR Cryptology ePrint Archive, 2004

Secure Hashed Diffie-Hellman over Non-DDH Groups.
Proceedings of the Advances in Cryptology, 2004

Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes.
Proceedings of the Advances in Cryptology, 2004

2003
Relaxing Chosen-Ciphertext Security.
IACR Cryptology ePrint Archive, 2003

Authenticating Mandatory Access Controls and Preserving Privacy for a High-Assurance Smart Card.
Proceedings of the Computer Security, 2003

Secure Applications of Pedersen's Distributed Key Generation Protocol.
Proceedings of the Topics in Cryptology, 2003

SIGMA: The 'SIGn-and-MAc' Approach to Authenticated Diffie-Hellman and Its Use in the IKE-Protocols.
Proceedings of the Advances in Cryptology, 2003

Relaxing Chosen-Ciphertext Security.
Proceedings of the Advances in Cryptology, 2003

2002
Security Analysis of IKE's Signature-based Key-Exchange Protocol.
IACR Cryptology ePrint Archive, 2002

Universally Composable Notions of Key Exchange and Secure Channels.
IACR Cryptology ePrint Archive, 2002

Universally Composable Notions of Key Exchange and Secure Channels.
Proceedings of the Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28, 2002

Security Analysis of IKE's Signature-Based Key-Exchange Protocol.
Proceedings of the Advances in Cryptology, 2002

2001
Robust Threshold DSS Signatures.
Inf. Comput., 2001

The order of encryption and authentication for protecting communications (Or: how secure is SSL?).
IACR Cryptology ePrint Archive, 2001

Simple Forward-Secure Signatures From Any Signature Scheme.
IACR Cryptology ePrint Archive, 2001

Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels.
IACR Cryptology ePrint Archive, 2001

Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels.
Proceedings of the Advances in Cryptology, 2001

The Order of Encryption and Authentication for Protecting Communications (or: How Secure Is SSL?).
Proceedings of the Advances in Cryptology, 2001

2000
Design, implementation, and deployment of the iKP secure electronic payment system.
IEEE Journal on Selected Areas in Communications, 2000

RSA-Based Undeniable Signatures.
J. Cryptology, 2000

Robust and Efficient Sharing of RSA Functions.
J. Cryptology, 2000

Chameleon Signatures.
Proceedings of the Network and Distributed System Security Symposium, 2000

Simple forward-secure signatures from any signature scheme.
Proceedings of the CCS 2000, 2000

1999
Public-Key Cryptography and Password Protocols.
ACM Trans. Inf. Syst. Secur., 1999

Public-key cryptography and password protocols.
IACR Cryptology ePrint Archive, 1999

Untraceable mobility or how to travel incognito.
Computer Networks, 1999

Blinding of Credit Card Numbers in the SET Protocol.
Proceedings of the Financial Cryptography, 1999

Secure Distributed Key Generation for Discrete-Log Based Cryptosystems.
Proceedings of the Advances in Cryptology, 1999

Adaptive Security for Threshold Cryptosystems.
Proceedings of the Advances in Cryptology, 1999

UMAC: Fast and Secure Message Authentication.
Proceedings of the Advances in Cryptology, 1999

Stateless Evaluation of Pseudorandom Functions: Security beyond the Birthday Barrier.
Proceedings of the Advances in Cryptology, 1999

1998
A Security Architecture for the Internet Protocol.
IBM Systems Journal, 1998

Chameleon Hashing and Signatures.
IACR Cryptology ePrint Archive, 1998

A Modular Approach to the Design and Analysis of Authentication and Key Exchange Protocols.
IACR Cryptology ePrint Archive, 1998

A Modular Approach to the Design and Analysis of Authentication and Key Exchange Protocols (Extended Abstract).
Proceedings of the Thirtieth Annual ACM Symposium on the Theory of Computing, 1998

Public-Key Cryptography and Password Protocols.
Proceedings of the CCS '98, 1998

1997
HMAC: Keyed-Hashing for Message Authentication.
RFC, February, 1997

MMH: Software Message Authentication in the Gbit/Second Rates.
Proceedings of the Fast Software Encryption, 4th International Workshop, 1997

RSA-Based Undeniable Signatures.
Proceedings of the Advances in Cryptology, 1997

Proactive Public Key and Signature Systems.
Proceedings of the CCS '97, 1997

1996
On the Composition of Zero-Knowledge Proof Systems.
SIAM J. Comput., 1996

SKEME: a versatile secure key exchange mechanism for Internet.
Proceedings of the 1996 Symposium on Network and Distributed System Security, 1996

Pseudorandom Functions Revisited: The Cascade Construction and Its Concrete Security.
Proceedings of the 37th Annual Symposium on Foundations of Computer Science, 1996

Robust Threshold DSS Signatures.
Proceedings of the Advances in Cryptology, 1996

Robust and Efficient Sharing of RSA Functions.
Proceedings of the Advances in Cryptology, 1996

Keying Hash Functions for Message Authentication.
Proceedings of the Advances in Cryptology, 1996

1995
Security issues in a CDPD wireless network.
IEEE Personal Commun., 1995

Design and Implementation of Modular Key Management Protocol and IP Secure Tunnel on AIX.
Proceedings of the 5th USENIX Security Symposium, 1995

Securing the Internet (Abstract).
Proceedings of the Fourteenth Annual ACM Symposium on Principles of Distributed Computing, 1995

New Hash Functions For Message Authentication.
Proceedings of the Advances in Cryptology, 1995

Proactive Secret Sharing Or: How to Cope With Perpetual Leakage.
Proceedings of the Advances in Cryptology, 1995

1994
On Travelling Incognito.
Proceedings of the First Workshop on Mobile Computing Systems and Applications, 1994

LFSR-based Hashing and Authentication.
Proceedings of the Advances in Cryptology, 1994

1993
On the Existence of Pseudorandom Generators.
SIAM J. Comput., 1993

Distributed Fingerprints and Secure Information Dispersal.
Proceedings of the Twelth Annual ACM Symposium on Principles of Distributed Computing, 1993

The Shrinking Generator: Some Practical Considerations.
Proceedings of the Fast Software Encryption, 1993

Secret Sharing Made Short.
Proceedings of the Advances in Cryptology, 1993

The Shrinking Generator.
Proceedings of the Advances in Cryptology, 1993

1992
Sparse Pseudorandom Distributions.
Random Struct. Algorithms, 1992

How to Predict Congruential Generators.
J. Algorithms, 1992

1991
Code Duplication: An Assist for Global Instruction Scheduling.
Proceedings of the 24th Annual IEEE/ACM International Symposium on Microarchitecture, 1991

1990
On the Composition of Zero-Knowledge Proof Systems.
Proceedings of the Automata, Languages and Programming, 17th International Colloquium, 1990

1989
The diophantine problem of Frobenius: A close bound.
Discrete Applied Mathematics, 1989

Spill Code Minimization Techniques for Optimizing Compilers.
Proceedings of the ACM SIGPLAN'89 Conference on Programming Language Design and Implementation (PLDI), 1989

How to Predict Congruential Generators.
Proceedings of the Advances in Cryptology, 1989

Sparse Pseudorandom Distributions.
Proceedings of the Advances in Cryptology, 1989

1988
On the Existence of Pseudorandom Generators (Extended Abstract)
Proceedings of the 29th Annual Symposium on Foundations of Computer Science, 1988

On the Existence of Pseudorandom Generators.
Proceedings of the Advances in Cryptology, 1988


  Loading...