2008 | ||
---|---|---|
64 | EE | Rosario Gennaro, Shai Halevi, Hugo Krawczyk, Tal Rabin, Steffen Reidt, Stephen D. Wolthusen: Strongly-Resilient and Non-interactive Hierarchical Key-Agreement in MANETs. ESORICS 2008: 49-65 |
63 | EE | Rosario Gennaro, Shai Halevi, Hugo Krawczyk, Tal Rabin: Threshold RSA for Dynamic and Ad-Hoc Groups. EUROCRYPT 2008: 88-107 |
2007 | ||
62 | EE | Shai Halevi, Hugo Krawczyk: Security under key-dependent inputs. ACM Conference on Computer and Communications Security 2007: 466-475 |
61 | EE | Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin: Secure Distributed Key Generation for Discrete-Log Based Cryptosystems. J. Cryptology 20(1): 51-83 (2007) |
60 | EE | Rosario Gennaro, Tal Rabin, Stanislaw Jarecki, Hugo Krawczyk: Robust and Efficient Sharing of RSA Functions. J. Cryptology 20(3): 393 (2007) |
59 | EE | Rosario Gennaro, Tal Rabin, Hugo Krawczyk: RSA-Based Undeniable Signatures. J. Cryptology 20(3): 394 (2007) |
2006 | ||
58 | EE | Mario Di Raimondo, Rosario Gennaro, Hugo Krawczyk: Deniable authentication and key exchange. ACM Conference on Computer and Communications Security 2006: 400-409 |
57 | EE | Shai Halevi, Hugo Krawczyk: Strengthening Digital Signatures Via Randomized Hashing. CRYPTO 2006: 41-59 |
2005 | ||
56 | EE | Hugo Krawczyk: HMQV: A High-Performance Secure Diffie-Hellman Protocol. CRYPTO 2005: 546-566 |
55 | EE | Mario Di Raimondo, Rosario Gennaro, Hugo Krawczyk: Secure off-the-record messaging. WPES 2005: 81-89 |
54 | EE | Hugo Krawczyk: Perfect Forward Secrecy. Encyclopedia of Cryptography and Security 2005 |
2004 | ||
53 | EE | Yevgeniy Dodis, Rosario Gennaro, Johan Håstad, Hugo Krawczyk, Tal Rabin: Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes. CRYPTO 2004: 494-510 |
52 | EE | Rosario Gennaro, Hugo Krawczyk, Tal Rabin: Secure Hashed Diffie-Hellman over Non-DDH Groups. EUROCRYPT 2004: 361-381 |
2003 | ||
51 | EE | Hugo Krawczyk: SIGMA: The 'SIGn-and-MAc' Approach to Authenticated Diffie-Hellman and Its Use in the IKE-Protocols. CRYPTO 2003: 400-425 |
50 | EE | Ran Canetti, Hugo Krawczyk, Jesper Buus Nielsen: Relaxing Chosen-Ciphertext Security. CRYPTO 2003: 565-582 |
49 | EE | Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin: Secure Applications of Pedersen's Distributed Key Generation Protocol. CT-RSA 2003: 373-390 |
48 | EE | Helmut Scherzer, Ran Canetti, Paul A. Karger, Hugo Krawczyk, Tal Rabin, David C. Toll: Authenticating Mandatory Access Controls and Preserving Privacy for a High-Assurance Smart Card. ESORICS 2003: 181-200 |
2002 | ||
47 | EE | Ran Canetti, Hugo Krawczyk: Security Analysis of IKE's Signature-Based Key-Exchange Protocol. CRYPTO 2002: 143-161 |
46 | EE | Ran Canetti, Hugo Krawczyk: Universally Composable Notions of Key Exchange and Secure Channels. EUROCRYPT 2002: 337-351 |
2001 | ||
45 | EE | Hugo Krawczyk: The Order of Encryption and Authentication for Protecting Communications (or: How Secure Is SSL?). CRYPTO 2001: 310-331 |
44 | EE | Ran Canetti, Hugo Krawczyk: Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels. EUROCRYPT 2001: 453-474 |
43 | Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin: Robust Threshold DSS Signatures. Inf. Comput. 164(1): 54-84 (2001) | |
2000 | ||
42 | EE | Hugo Krawczyk: Simple forward-secure signatures from any signature scheme. ACM Conference on Computer and Communications Security 2000: 108-115 |
41 | EE | Hugo Krawczyk, Tal Rabin: Chameleon Signatures. NDSS 2000 |
40 | EE | Rosario Gennaro, Tal Rabin, Stanislaw Jarecki, Hugo Krawczyk: Robust and Efficient Sharing of RSA Functions. J. Cryptology 13(2): 273-300 (2000) |
39 | EE | Rosario Gennaro, Tal Rabin, Hugo Krawczyk: RSA-Based Undeniable Signatures. J. Cryptology 13(4): 397-416 (2000) |
1999 | ||
38 | EE | John Black, Shai Halevi, Hugo Krawczyk, Ted Krovetz, Phillip Rogaway: UMAC: Fast and Secure Message Authentication. CRYPTO 1999: 216-233 |
37 | EE | Mihir Bellare, Oded Goldreich, Hugo Krawczyk: Stateless Evaluation of Pseudorandom Functions: Security beyond the Birthday Barrier. CRYPTO 1999: 270-287 |
36 | EE | Ran Canetti, Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin: Adaptive Security for Threshold Cryptosystems. CRYPTO 1999: 98-115 |
35 | EE | Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin: Secure Distributed Key Generation for Discrete-Log Based Cryptosystems. EUROCRYPT 1999: 295-310 |
34 | EE | Hugo Krawczyk: Blinding of Credit Card Numbers in the SET Protocol. Financial Cryptography 1999: 17-28 |
33 | EE | Shai Halevi, Hugo Krawczyk: Public-Key Cryptography and Password Protocols. ACM Trans. Inf. Syst. Secur. 2(3): 230-268 (1999) |
32 | EE | Giuseppe Ateniese, Amir Herzberg, Hugo Krawczyk, Gene Tsudik: Untraceable mobility or how to travel incognito. Computer Networks 31(8): 871-884 (1999) |
1998 | ||
31 | Hugo Krawczyk: Advances in Cryptology - CRYPTO '98, 18th Annual International Cryptology Conference, Santa Barbara, California, USA, August 23-27, 1998, Proceedings Springer 1998 | |
30 | EE | Shai Halevi, Hugo Krawczyk: Public-Key Cryptography and Password Protocols. ACM Conference on Computer and Communications Security 1998: 122-131 |
29 | EE | Mihir Bellare, Ran Canetti, Hugo Krawczyk: A Modular Approach to the Design and Analysis of Authentication and Key Exchange Protocols (Extended Abstract). STOC 1998: 419-428 |
28 | Pau-Chen Cheng, Juan A. Garay, Amir Herzberg, Hugo Krawczyk: A Security Architecture for the Internet Protocol. IBM Systems Journal 37(1): 42-60 (1998) | |
1997 | ||
27 | EE | Amir Herzberg, Markus Jakobsson, Stanislaw Jarecki, Hugo Krawczyk, Moti Yung: Proactive Public Key and Signature Systems. ACM Conference on Computer and Communications Security 1997: 100-110 |
26 | EE | Rosario Gennaro, Hugo Krawczyk, Tal Rabin: RSA-Based Undeniable Signatures. CRYPTO 1997: 132-149 |
25 | EE | Shai Halevi, Hugo Krawczyk: MMH: Software Message Authentication in the Gbit/Second Rates. FSE 1997: 172-189 |
1996 | ||
24 | EE | Mihir Bellare, Ran Canetti, Hugo Krawczyk: Keying Hash Functions for Message Authentication. CRYPTO 1996: 1-15 |
23 | EE | Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin: Robust and Efficient Sharing of RSA Functions. CRYPTO 1996: 157-172 |
22 | EE | Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin: Robust Threshold DSS Signatures. EUROCRYPT 1996: 354-371 |
21 | Mihir Bellare, Ran Canetti, Hugo Krawczyk: Pseudorandom Functions Revisited: The Cascade Construction and Its Concrete Security. FOCS 1996: 514-523 | |
20 | Oded Goldreich, Hugo Krawczyk: On the Composition of Zero-Knowledge Proof Systems. SIAM J. Comput. 25(1): 169-192 (1996) | |
1995 | ||
19 | EE | Amir Herzberg, Stanislaw Jarecki, Hugo Krawczyk, Moti Yung: Proactive Secret Sharing Or: How to Cope With Perpetual Leakage. CRYPTO 1995: 339-352 |
18 | EE | Hugo Krawczyk: New Hash Functions For Message Authentication. EUROCRYPT 1995: 301-310 |
17 | Pau-Chen Cheng, Juan A. Garay, Amir Herzberg, Hugo Krawczyk: Securing the Internet (Abstract). PODC 1995: 257 | |
1994 | ||
16 | EE | Hugo Krawczyk: LFSR-based Hashing and Authentication. CRYPTO 1994: 129-139 |
1993 | ||
15 | EE | Hugo Krawczyk: Secret Sharing Made Short. CRYPTO 1993: 136-146 |
14 | EE | Don Coppersmith, Hugo Krawczyk, Yishay Mansour: The Shrinking Generator. CRYPTO 1993: 22-39 |
13 | Hugo Krawczyk: The Shrinking Generator: Some Practical Considerations. FSE 1993: 45-46 | |
12 | Hugo Krawczyk: Distributed Fingerprints and Secure Information Dispersal. PODC 1993: 207-218 | |
11 | Oded Goldreich, Hugo Krawczyk, Michael Luby: On the Existence of Pseudorandom Generators. SIAM J. Comput. 22(6): 1163-1175 (1993) | |
1992 | ||
10 | Hugo Krawczyk: How to Predict Congruential Generators. J. Algorithms 13(4): 527-545 (1992) | |
9 | Oded Goldreich, Hugo Krawczyk: Sparse Pseudorandom Distributions. Random Struct. Algorithms 3(2): 163-174 (1992) | |
1991 | ||
8 | EE | David Bernstein, Doron Cohen, Hugo Krawczyk: Code Duplication: An Assist for Global Instruction Scheduling. MICRO 1991: 103-113 |
1990 | ||
7 | Oded Goldreich, Hugo Krawczyk: On the Composition of Zero-Knowledge Proof Systems. ICALP 1990: 268-282 | |
1989 | ||
6 | EE | Oded Goldreich, Hugo Krawczyk: Sparse Pseudorandom Distributions. CRYPTO 1989: 113-127 |
5 | EE | Hugo Krawczyk: How to Predict Congruential Generators. CRYPTO 1989: 138-153 |
4 | David Bernstein, Dina Q. Goldin, Martin Charles Golumbic, Hugo Krawczyk, Yishay Mansour, Itai Nahshon, Ron Y. Pinter: Spill Code Minimization Techniques for Optimizing Compilers. PLDI 1989: 258-263 | |
3 | EE | Hugo Krawczyk, Azaria Paz: The diophantine problem of Frobenius: A close bound. Discrete Applied Mathematics 23(3): 289-291 (1989) |
1988 | ||
2 | EE | Oded Goldreich, Hugo Krawczyk, Michael Luby: On the Existence of Pseudorandom Generators. CRYPTO 1988: 146-162 |
1 | Oded Goldreich, Hugo Krawczyk, Michael Luby: On the Existence of Pseudorandom Generators (Extended Abstract) FOCS 1988: 12-24 |