2008 |
64 | EE | Rosario Gennaro,
Shai Halevi,
Hugo Krawczyk,
Tal Rabin,
Steffen Reidt,
Stephen D. Wolthusen:
Strongly-Resilient and Non-interactive Hierarchical Key-Agreement in MANETs.
ESORICS 2008: 49-65 |
63 | EE | Rosario Gennaro,
Shai Halevi,
Hugo Krawczyk,
Tal Rabin:
Threshold RSA for Dynamic and Ad-Hoc Groups.
EUROCRYPT 2008: 88-107 |
2007 |
62 | EE | Shai Halevi,
Hugo Krawczyk:
Security under key-dependent inputs.
ACM Conference on Computer and Communications Security 2007: 466-475 |
61 | EE | Rosario Gennaro,
Stanislaw Jarecki,
Hugo Krawczyk,
Tal Rabin:
Secure Distributed Key Generation for Discrete-Log Based Cryptosystems.
J. Cryptology 20(1): 51-83 (2007) |
60 | EE | Rosario Gennaro,
Tal Rabin,
Stanislaw Jarecki,
Hugo Krawczyk:
Robust and Efficient Sharing of RSA Functions.
J. Cryptology 20(3): 393 (2007) |
59 | EE | Rosario Gennaro,
Tal Rabin,
Hugo Krawczyk:
RSA-Based Undeniable Signatures.
J. Cryptology 20(3): 394 (2007) |
2006 |
58 | EE | Mario Di Raimondo,
Rosario Gennaro,
Hugo Krawczyk:
Deniable authentication and key exchange.
ACM Conference on Computer and Communications Security 2006: 400-409 |
57 | EE | Shai Halevi,
Hugo Krawczyk:
Strengthening Digital Signatures Via Randomized Hashing.
CRYPTO 2006: 41-59 |
2005 |
56 | EE | Hugo Krawczyk:
HMQV: A High-Performance Secure Diffie-Hellman Protocol.
CRYPTO 2005: 546-566 |
55 | EE | Mario Di Raimondo,
Rosario Gennaro,
Hugo Krawczyk:
Secure off-the-record messaging.
WPES 2005: 81-89 |
54 | EE | Hugo Krawczyk:
Perfect Forward Secrecy.
Encyclopedia of Cryptography and Security 2005 |
2004 |
53 | EE | Yevgeniy Dodis,
Rosario Gennaro,
Johan Håstad,
Hugo Krawczyk,
Tal Rabin:
Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes.
CRYPTO 2004: 494-510 |
52 | EE | Rosario Gennaro,
Hugo Krawczyk,
Tal Rabin:
Secure Hashed Diffie-Hellman over Non-DDH Groups.
EUROCRYPT 2004: 361-381 |
2003 |
51 | EE | Hugo Krawczyk:
SIGMA: The 'SIGn-and-MAc' Approach to Authenticated Diffie-Hellman and Its Use in the IKE-Protocols.
CRYPTO 2003: 400-425 |
50 | EE | Ran Canetti,
Hugo Krawczyk,
Jesper Buus Nielsen:
Relaxing Chosen-Ciphertext Security.
CRYPTO 2003: 565-582 |
49 | EE | Rosario Gennaro,
Stanislaw Jarecki,
Hugo Krawczyk,
Tal Rabin:
Secure Applications of Pedersen's Distributed Key Generation Protocol.
CT-RSA 2003: 373-390 |
48 | EE | Helmut Scherzer,
Ran Canetti,
Paul A. Karger,
Hugo Krawczyk,
Tal Rabin,
David C. Toll:
Authenticating Mandatory Access Controls and Preserving Privacy for a High-Assurance Smart Card.
ESORICS 2003: 181-200 |
2002 |
47 | EE | Ran Canetti,
Hugo Krawczyk:
Security Analysis of IKE's Signature-Based Key-Exchange Protocol.
CRYPTO 2002: 143-161 |
46 | EE | Ran Canetti,
Hugo Krawczyk:
Universally Composable Notions of Key Exchange and Secure Channels.
EUROCRYPT 2002: 337-351 |
2001 |
45 | EE | Hugo Krawczyk:
The Order of Encryption and Authentication for Protecting Communications (or: How Secure Is SSL?).
CRYPTO 2001: 310-331 |
44 | EE | Ran Canetti,
Hugo Krawczyk:
Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels.
EUROCRYPT 2001: 453-474 |
43 | | Rosario Gennaro,
Stanislaw Jarecki,
Hugo Krawczyk,
Tal Rabin:
Robust Threshold DSS Signatures.
Inf. Comput. 164(1): 54-84 (2001) |
2000 |
42 | EE | Hugo Krawczyk:
Simple forward-secure signatures from any signature scheme.
ACM Conference on Computer and Communications Security 2000: 108-115 |
41 | EE | Hugo Krawczyk,
Tal Rabin:
Chameleon Signatures.
NDSS 2000 |
40 | EE | Rosario Gennaro,
Tal Rabin,
Stanislaw Jarecki,
Hugo Krawczyk:
Robust and Efficient Sharing of RSA Functions.
J. Cryptology 13(2): 273-300 (2000) |
39 | EE | Rosario Gennaro,
Tal Rabin,
Hugo Krawczyk:
RSA-Based Undeniable Signatures.
J. Cryptology 13(4): 397-416 (2000) |
1999 |
38 | EE | John Black,
Shai Halevi,
Hugo Krawczyk,
Ted Krovetz,
Phillip Rogaway:
UMAC: Fast and Secure Message Authentication.
CRYPTO 1999: 216-233 |
37 | EE | Mihir Bellare,
Oded Goldreich,
Hugo Krawczyk:
Stateless Evaluation of Pseudorandom Functions: Security beyond the Birthday Barrier.
CRYPTO 1999: 270-287 |
36 | EE | Ran Canetti,
Rosario Gennaro,
Stanislaw Jarecki,
Hugo Krawczyk,
Tal Rabin:
Adaptive Security for Threshold Cryptosystems.
CRYPTO 1999: 98-115 |
35 | EE | Rosario Gennaro,
Stanislaw Jarecki,
Hugo Krawczyk,
Tal Rabin:
Secure Distributed Key Generation for Discrete-Log Based Cryptosystems.
EUROCRYPT 1999: 295-310 |
34 | EE | Hugo Krawczyk:
Blinding of Credit Card Numbers in the SET Protocol.
Financial Cryptography 1999: 17-28 |
33 | EE | Shai Halevi,
Hugo Krawczyk:
Public-Key Cryptography and Password Protocols.
ACM Trans. Inf. Syst. Secur. 2(3): 230-268 (1999) |
32 | EE | Giuseppe Ateniese,
Amir Herzberg,
Hugo Krawczyk,
Gene Tsudik:
Untraceable mobility or how to travel incognito.
Computer Networks 31(8): 871-884 (1999) |
1998 |
31 | | Hugo Krawczyk:
Advances in Cryptology - CRYPTO '98, 18th Annual International Cryptology Conference, Santa Barbara, California, USA, August 23-27, 1998, Proceedings
Springer 1998 |
30 | EE | Shai Halevi,
Hugo Krawczyk:
Public-Key Cryptography and Password Protocols.
ACM Conference on Computer and Communications Security 1998: 122-131 |
29 | EE | Mihir Bellare,
Ran Canetti,
Hugo Krawczyk:
A Modular Approach to the Design and Analysis of Authentication and Key Exchange Protocols (Extended Abstract).
STOC 1998: 419-428 |
28 | | Pau-Chen Cheng,
Juan A. Garay,
Amir Herzberg,
Hugo Krawczyk:
A Security Architecture for the Internet Protocol.
IBM Systems Journal 37(1): 42-60 (1998) |
1997 |
27 | EE | Amir Herzberg,
Markus Jakobsson,
Stanislaw Jarecki,
Hugo Krawczyk,
Moti Yung:
Proactive Public Key and Signature Systems.
ACM Conference on Computer and Communications Security 1997: 100-110 |
26 | EE | Rosario Gennaro,
Hugo Krawczyk,
Tal Rabin:
RSA-Based Undeniable Signatures.
CRYPTO 1997: 132-149 |
25 | EE | Shai Halevi,
Hugo Krawczyk:
MMH: Software Message Authentication in the Gbit/Second Rates.
FSE 1997: 172-189 |
1996 |
24 | EE | Mihir Bellare,
Ran Canetti,
Hugo Krawczyk:
Keying Hash Functions for Message Authentication.
CRYPTO 1996: 1-15 |
23 | EE | Rosario Gennaro,
Stanislaw Jarecki,
Hugo Krawczyk,
Tal Rabin:
Robust and Efficient Sharing of RSA Functions.
CRYPTO 1996: 157-172 |
22 | EE | Rosario Gennaro,
Stanislaw Jarecki,
Hugo Krawczyk,
Tal Rabin:
Robust Threshold DSS Signatures.
EUROCRYPT 1996: 354-371 |
21 | | Mihir Bellare,
Ran Canetti,
Hugo Krawczyk:
Pseudorandom Functions Revisited: The Cascade Construction and Its Concrete Security.
FOCS 1996: 514-523 |
20 | | Oded Goldreich,
Hugo Krawczyk:
On the Composition of Zero-Knowledge Proof Systems.
SIAM J. Comput. 25(1): 169-192 (1996) |
1995 |
19 | EE | Amir Herzberg,
Stanislaw Jarecki,
Hugo Krawczyk,
Moti Yung:
Proactive Secret Sharing Or: How to Cope With Perpetual Leakage.
CRYPTO 1995: 339-352 |
18 | EE | Hugo Krawczyk:
New Hash Functions For Message Authentication.
EUROCRYPT 1995: 301-310 |
17 | | Pau-Chen Cheng,
Juan A. Garay,
Amir Herzberg,
Hugo Krawczyk:
Securing the Internet (Abstract).
PODC 1995: 257 |
1994 |
16 | EE | Hugo Krawczyk:
LFSR-based Hashing and Authentication.
CRYPTO 1994: 129-139 |
1993 |
15 | EE | Hugo Krawczyk:
Secret Sharing Made Short.
CRYPTO 1993: 136-146 |
14 | EE | Don Coppersmith,
Hugo Krawczyk,
Yishay Mansour:
The Shrinking Generator.
CRYPTO 1993: 22-39 |
13 | | Hugo Krawczyk:
The Shrinking Generator: Some Practical Considerations.
FSE 1993: 45-46 |
12 | | Hugo Krawczyk:
Distributed Fingerprints and Secure Information Dispersal.
PODC 1993: 207-218 |
11 | | Oded Goldreich,
Hugo Krawczyk,
Michael Luby:
On the Existence of Pseudorandom Generators.
SIAM J. Comput. 22(6): 1163-1175 (1993) |
1992 |
10 | | Hugo Krawczyk:
How to Predict Congruential Generators.
J. Algorithms 13(4): 527-545 (1992) |
9 | | Oded Goldreich,
Hugo Krawczyk:
Sparse Pseudorandom Distributions.
Random Struct. Algorithms 3(2): 163-174 (1992) |
1991 |
8 | EE | David Bernstein,
Doron Cohen,
Hugo Krawczyk:
Code Duplication: An Assist for Global Instruction Scheduling.
MICRO 1991: 103-113 |
1990 |
7 | | Oded Goldreich,
Hugo Krawczyk:
On the Composition of Zero-Knowledge Proof Systems.
ICALP 1990: 268-282 |
1989 |
6 | EE | Oded Goldreich,
Hugo Krawczyk:
Sparse Pseudorandom Distributions.
CRYPTO 1989: 113-127 |
5 | EE | Hugo Krawczyk:
How to Predict Congruential Generators.
CRYPTO 1989: 138-153 |
4 | | David Bernstein,
Dina Q. Goldin,
Martin Charles Golumbic,
Hugo Krawczyk,
Yishay Mansour,
Itai Nahshon,
Ron Y. Pinter:
Spill Code Minimization Techniques for Optimizing Compilers.
PLDI 1989: 258-263 |
3 | EE | Hugo Krawczyk,
Azaria Paz:
The diophantine problem of Frobenius: A close bound.
Discrete Applied Mathematics 23(3): 289-291 (1989) |
1988 |
2 | EE | Oded Goldreich,
Hugo Krawczyk,
Michael Luby:
On the Existence of Pseudorandom Generators.
CRYPTO 1988: 146-162 |
1 | | Oded Goldreich,
Hugo Krawczyk,
Michael Luby:
On the Existence of Pseudorandom Generators (Extended Abstract)
FOCS 1988: 12-24 |