Hugo Krawczyk

According to our database1, Hugo Krawczyk authored at least 91 papers between 1988 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2020
Can a Blockchain Keep a Secret?
IACR Cryptol. ePrint Arch., 2020

2019
Building and Studying a Password Store that Perfectly Hides Passwords from Itself.
IEEE Trans. Dependable Secur. Comput., 2019

Cryptography for #MeToo.
PoPETs, 2019

Updatable Oblivious Key Management for Storage Systems.
IACR Cryptol. ePrint Arch., 2019

PrivIdEx: Privacy Preserving and Secure Exchange of Digital Identity Assets.
Proceedings of the World Wide Web Conference, 2019

2018
SPHINX: A Password Store that Perfectly Hides Passwords from Itself.
IACR Cryptol. ePrint Arch., 2018

OPAQUE: An Asymmetric PAKE Protocol Secure Against Pre-Computation Attacks.
IACR Cryptol. ePrint Arch., 2018

Two-Factor Authentication with End-to-End Password Security.
IACR Cryptol. ePrint Arch., 2018

Threshold Partially-Oblivious PRFs with Applications to Key Management.
IACR Cryptol. ePrint Arch., 2018

2017
TOPPSS: Cost-minimal Password-Protected Secret Sharing based on Threshold OPRF.
IACR Cryptol. ePrint Arch., 2017

Robust Non-Interactive Multiparty Computation Against Constant-Size Collusion.
IACR Cryptol. ePrint Arch., 2017

2016
A Unilateral-to-Mutual Authentication Compiler for Key Exchange (with Applications to Client Authentication in TLS 1.3).
IACR Cryptol. ePrint Arch., 2016

Attribute-based Key Exchange with General Policies.
IACR Cryptol. ePrint Arch., 2016

Highly-Efficient and Composable Password-Protected Secret Sharing (Or: How to Protect Your Bitcoin Wallet Online).
IACR Cryptol. ePrint Arch., 2016

2015
The OPTLS Protocol and TLS 1.3.
IACR Cryptol. ePrint Arch., 2015

Device-Enhanced Password Protocols with Optimal Online-Offline Protection.
IACR Cryptol. ePrint Arch., 2015

Rich Queries on Encrypted Data: Beyond Exact Matches.
IACR Cryptol. ePrint Arch., 2015

2014
Round-Optimal Password-Protected Secret Sharing and T-PAKE in the Password-Only Model.
IACR Cryptol. ePrint Arch., 2014

Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation.
IACR Cryptol. ePrint Arch., 2014

2013
On the Security of the TLS Protocol: A Systematic Analysis.
IACR Cryptol. ePrint Arch., 2013

Outsourced Symmetric Private Information Retrieval.
IACR Cryptol. ePrint Arch., 2013

Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries.
IACR Cryptol. ePrint Arch., 2013

2012
On Compression of Data Encrypted With Block Ciphers.
IEEE Trans. Inf. Theory, 2012

2011
Perfect Forward Secrecy.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Computational Extractors and Pseudorandomness.
IACR Cryptol. ePrint Arch., 2011

Leftover Hash Lemma, Revisited.
IACR Cryptol. ePrint Arch., 2011

2010
HMAC-based Extract-and-Expand Key Derivation Function (HKDF).
RFC, May, 2010

Cryptographic Extraction and Key Derivation: The HKDF Scheme.
IACR Cryptol. ePrint Arch., 2010

One-Pass HMQV and Asymmetric Key-Wrapping.
IACR Cryptol. ePrint Arch., 2010

Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead.
IACR Cryptol. ePrint Arch., 2010

2009
Secure Network Coding Over the Integers.
IACR Cryptol. ePrint Arch., 2009

2008
Strongly-Resilient and Non-Interactive Hierarchical Key-Agreement in MANETs.
IACR Cryptol. ePrint Arch., 2008

Threshold RSA for Dynamic and Ad-Hoc Groups.
IACR Cryptol. ePrint Arch., 2008

2007
RSA-Based Undeniable Signatures.
J. Cryptology, 2007

Robust and Efficient Sharing of RSA Functions.
J. Cryptology, 2007

Secure Distributed Key Generation for Discrete-Log Based Cryptosystems.
J. Cryptology, 2007

Security under Key-Dependent Inputs.
IACR Cryptol. ePrint Arch., 2007

2006
Deniable Authentication and Key Exchange.
IACR Cryptol. ePrint Arch., 2006

Strengthening Digital Signatures Via Randomized Hashing.
Proceedings of the Advances in Cryptology, 2006

2005
Perfect Forward Secrecy.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

HMQV: A High-Performance Secure Diffie-Hellman Protocol.
IACR Cryptol. ePrint Arch., 2005

Secure off-the-record messaging.
Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, 2005

2004
Secure Hashed Diffie-Hellman over Non-DDH Groups.
IACR Cryptol. ePrint Arch., 2004

Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes.
Proceedings of the Advances in Cryptology, 2004

2003
Relaxing Chosen-Ciphertext Security.
IACR Cryptol. ePrint Arch., 2003

Authenticating Mandatory Access Controls and Preserving Privacy for a High-Assurance Smart Card.
Proceedings of the Computer Security, 2003

Secure Applications of Pedersen's Distributed Key Generation Protocol.
Proceedings of the Topics in Cryptology, 2003

SIGMA: The 'SIGn-and-MAc' Approach to Authenticated Diffie-Hellman and Its Use in the IKE-Protocols.
Proceedings of the Advances in Cryptology, 2003

2002
Security Analysis of IKE's Signature-based Key-Exchange Protocol.
IACR Cryptol. ePrint Arch., 2002

Universally Composable Notions of Key Exchange and Secure Channels.
IACR Cryptol. ePrint Arch., 2002

2001
Robust Threshold DSS Signatures.
Inf. Comput., 2001

The order of encryption and authentication for protecting communications (Or: how secure is SSL?).
IACR Cryptol. ePrint Arch., 2001

Simple Forward-Secure Signatures From Any Signature Scheme.
IACR Cryptol. ePrint Arch., 2001

Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels.
IACR Cryptol. ePrint Arch., 2001

2000
Design, implementation, and deployment of the iKP secure electronic payment system.
IEEE J. Sel. Areas Commun., 2000

Chameleon Signatures.
Proceedings of the Network and Distributed System Security Symposium, 2000

1999
Public-Key Cryptography and Password Protocols.
ACM Trans. Inf. Syst. Secur., 1999

Untraceable mobility or how to travel incognito.
Comput. Networks, 1999

Blinding of Credit Card Numbers in the SET Protocol.
Proceedings of the Financial Cryptography, 1999

Adaptive Security for Threshold Cryptosystems.
Proceedings of the Advances in Cryptology, 1999

UMAC: Fast and Secure Message Authentication.
Proceedings of the Advances in Cryptology, 1999

Stateless Evaluation of Pseudorandom Functions: Security beyond the Birthday Barrier.
Proceedings of the Advances in Cryptology, 1999

1998
A Security Architecture for the Internet Protocol.
IBM Syst. J., 1998

Chameleon Hashing and Signatures.
IACR Cryptol. ePrint Arch., 1998

A Modular Approach to the Design and Analysis of Authentication and Key Exchange Protocols.
IACR Cryptol. ePrint Arch., 1998

A Modular Approach to the Design and Analysis of Authentication and Key Exchange Protocols (Extended Abstract).
Proceedings of the Thirtieth Annual ACM Symposium on the Theory of Computing, 1998

1997
HMAC: Keyed-Hashing for Message Authentication.
RFC, February, 1997

MMH: Software Message Authentication in the Gbit/Second Rates.
Proceedings of the Fast Software Encryption, 4th International Workshop, 1997

Proactive Public Key and Signature Systems.
Proceedings of the CCS '97, 1997

1996
On the Composition of Zero-Knowledge Proof Systems.
SIAM J. Comput., 1996

SKEME: a versatile secure key exchange mechanism for Internet.
Proceedings of the 1996 Symposium on Network and Distributed System Security, 1996

Pseudorandom Functions Revisited: The Cascade Construction and Its Concrete Security.
Proceedings of the 37th Annual Symposium on Foundations of Computer Science, 1996

Keying Hash Functions for Message Authentication.
Proceedings of the Advances in Cryptology, 1996

1995
Security issues in a CDPD wireless network.
IEEE Wirel. Commun., 1995

Design and Implementation of Modular Key Management Protocol and IP Secure Tunnel on AIX.
Proceedings of the 5th USENIX Security Symposium, 1995

Securing the Internet (Abstract).
Proceedings of the Fourteenth Annual ACM Symposium on Principles of Distributed Computing, 1995

New Hash Functions For Message Authentication.
Proceedings of the Advances in Cryptology, 1995

Proactive Secret Sharing Or: How to Cope With Perpetual Leakage.
Proceedings of the Advances in Cryptology, 1995

1994
On Travelling Incognito.
Proceedings of the First Workshop on Mobile Computing Systems and Applications, 1994

LFSR-based Hashing and Authentication.
Proceedings of the Advances in Cryptology, 1994

1993
On the Existence of Pseudorandom Generators.
SIAM J. Comput., 1993

Distributed Fingerprints and Secure Information Dispersal.
Proceedings of the Twelth Annual ACM Symposium on Principles of Distributed Computing, 1993

The Shrinking Generator: Some Practical Considerations.
Proceedings of the Fast Software Encryption, 1993

Secret Sharing Made Short.
Proceedings of the Advances in Cryptology, 1993

The Shrinking Generator.
Proceedings of the Advances in Cryptology, 1993

1992
Sparse Pseudorandom Distributions.
Random Struct. Algorithms, 1992

How to Predict Congruential Generators.
J. Algorithms, 1992

1991
Code Duplication: An Assist for Global Instruction Scheduling.
Proceedings of the 24th Annual IEEE/ACM International Symposium on Microarchitecture, 1991

1989
The diophantine problem of Frobenius: A close bound.
Discret. Appl. Math., 1989

Spill Code Minimization Techniques for Optimizing Compilers.
Proceedings of the ACM SIGPLAN'89 Conference on Programming Language Design and Implementation (PLDI), 1989

1988
On the Existence of Pseudorandom Generators (Extended Abstract)
Proceedings of the 29th Annual Symposium on Foundations of Computer Science, 1988


  Loading...