dblp.uni-trier.dewww.uni-trier.de

Hugo Krawczyk

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
64EERosario Gennaro, Shai Halevi, Hugo Krawczyk, Tal Rabin, Steffen Reidt, Stephen D. Wolthusen: Strongly-Resilient and Non-interactive Hierarchical Key-Agreement in MANETs. ESORICS 2008: 49-65
63EERosario Gennaro, Shai Halevi, Hugo Krawczyk, Tal Rabin: Threshold RSA for Dynamic and Ad-Hoc Groups. EUROCRYPT 2008: 88-107
2007
62EEShai Halevi, Hugo Krawczyk: Security under key-dependent inputs. ACM Conference on Computer and Communications Security 2007: 466-475
61EERosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin: Secure Distributed Key Generation for Discrete-Log Based Cryptosystems. J. Cryptology 20(1): 51-83 (2007)
60EERosario Gennaro, Tal Rabin, Stanislaw Jarecki, Hugo Krawczyk: Robust and Efficient Sharing of RSA Functions. J. Cryptology 20(3): 393 (2007)
59EERosario Gennaro, Tal Rabin, Hugo Krawczyk: RSA-Based Undeniable Signatures. J. Cryptology 20(3): 394 (2007)
2006
58EEMario Di Raimondo, Rosario Gennaro, Hugo Krawczyk: Deniable authentication and key exchange. ACM Conference on Computer and Communications Security 2006: 400-409
57EEShai Halevi, Hugo Krawczyk: Strengthening Digital Signatures Via Randomized Hashing. CRYPTO 2006: 41-59
2005
56EEHugo Krawczyk: HMQV: A High-Performance Secure Diffie-Hellman Protocol. CRYPTO 2005: 546-566
55EEMario Di Raimondo, Rosario Gennaro, Hugo Krawczyk: Secure off-the-record messaging. WPES 2005: 81-89
54EEHugo Krawczyk: Perfect Forward Secrecy. Encyclopedia of Cryptography and Security 2005
2004
53EEYevgeniy Dodis, Rosario Gennaro, Johan Håstad, Hugo Krawczyk, Tal Rabin: Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes. CRYPTO 2004: 494-510
52EERosario Gennaro, Hugo Krawczyk, Tal Rabin: Secure Hashed Diffie-Hellman over Non-DDH Groups. EUROCRYPT 2004: 361-381
2003
51EEHugo Krawczyk: SIGMA: The 'SIGn-and-MAc' Approach to Authenticated Diffie-Hellman and Its Use in the IKE-Protocols. CRYPTO 2003: 400-425
50EERan Canetti, Hugo Krawczyk, Jesper Buus Nielsen: Relaxing Chosen-Ciphertext Security. CRYPTO 2003: 565-582
49EERosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin: Secure Applications of Pedersen's Distributed Key Generation Protocol. CT-RSA 2003: 373-390
48EEHelmut Scherzer, Ran Canetti, Paul A. Karger, Hugo Krawczyk, Tal Rabin, David C. Toll: Authenticating Mandatory Access Controls and Preserving Privacy for a High-Assurance Smart Card. ESORICS 2003: 181-200
2002
47EERan Canetti, Hugo Krawczyk: Security Analysis of IKE's Signature-Based Key-Exchange Protocol. CRYPTO 2002: 143-161
46EERan Canetti, Hugo Krawczyk: Universally Composable Notions of Key Exchange and Secure Channels. EUROCRYPT 2002: 337-351
2001
45EEHugo Krawczyk: The Order of Encryption and Authentication for Protecting Communications (or: How Secure Is SSL?). CRYPTO 2001: 310-331
44EERan Canetti, Hugo Krawczyk: Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels. EUROCRYPT 2001: 453-474
43 Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin: Robust Threshold DSS Signatures. Inf. Comput. 164(1): 54-84 (2001)
2000
42EEHugo Krawczyk: Simple forward-secure signatures from any signature scheme. ACM Conference on Computer and Communications Security 2000: 108-115
41EEHugo Krawczyk, Tal Rabin: Chameleon Signatures. NDSS 2000
40EERosario Gennaro, Tal Rabin, Stanislaw Jarecki, Hugo Krawczyk: Robust and Efficient Sharing of RSA Functions. J. Cryptology 13(2): 273-300 (2000)
39EERosario Gennaro, Tal Rabin, Hugo Krawczyk: RSA-Based Undeniable Signatures. J. Cryptology 13(4): 397-416 (2000)
1999
38EEJohn Black, Shai Halevi, Hugo Krawczyk, Ted Krovetz, Phillip Rogaway: UMAC: Fast and Secure Message Authentication. CRYPTO 1999: 216-233
37EEMihir Bellare, Oded Goldreich, Hugo Krawczyk: Stateless Evaluation of Pseudorandom Functions: Security beyond the Birthday Barrier. CRYPTO 1999: 270-287
36EERan Canetti, Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin: Adaptive Security for Threshold Cryptosystems. CRYPTO 1999: 98-115
35EERosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin: Secure Distributed Key Generation for Discrete-Log Based Cryptosystems. EUROCRYPT 1999: 295-310
34EEHugo Krawczyk: Blinding of Credit Card Numbers in the SET Protocol. Financial Cryptography 1999: 17-28
33EEShai Halevi, Hugo Krawczyk: Public-Key Cryptography and Password Protocols. ACM Trans. Inf. Syst. Secur. 2(3): 230-268 (1999)
32EEGiuseppe Ateniese, Amir Herzberg, Hugo Krawczyk, Gene Tsudik: Untraceable mobility or how to travel incognito. Computer Networks 31(8): 871-884 (1999)
1998
31 Hugo Krawczyk: Advances in Cryptology - CRYPTO '98, 18th Annual International Cryptology Conference, Santa Barbara, California, USA, August 23-27, 1998, Proceedings Springer 1998
30EEShai Halevi, Hugo Krawczyk: Public-Key Cryptography and Password Protocols. ACM Conference on Computer and Communications Security 1998: 122-131
29EEMihir Bellare, Ran Canetti, Hugo Krawczyk: A Modular Approach to the Design and Analysis of Authentication and Key Exchange Protocols (Extended Abstract). STOC 1998: 419-428
28 Pau-Chen Cheng, Juan A. Garay, Amir Herzberg, Hugo Krawczyk: A Security Architecture for the Internet Protocol. IBM Systems Journal 37(1): 42-60 (1998)
1997
27EEAmir Herzberg, Markus Jakobsson, Stanislaw Jarecki, Hugo Krawczyk, Moti Yung: Proactive Public Key and Signature Systems. ACM Conference on Computer and Communications Security 1997: 100-110
26EERosario Gennaro, Hugo Krawczyk, Tal Rabin: RSA-Based Undeniable Signatures. CRYPTO 1997: 132-149
25EEShai Halevi, Hugo Krawczyk: MMH: Software Message Authentication in the Gbit/Second Rates. FSE 1997: 172-189
1996
24EEMihir Bellare, Ran Canetti, Hugo Krawczyk: Keying Hash Functions for Message Authentication. CRYPTO 1996: 1-15
23EERosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin: Robust and Efficient Sharing of RSA Functions. CRYPTO 1996: 157-172
22EERosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin: Robust Threshold DSS Signatures. EUROCRYPT 1996: 354-371
21 Mihir Bellare, Ran Canetti, Hugo Krawczyk: Pseudorandom Functions Revisited: The Cascade Construction and Its Concrete Security. FOCS 1996: 514-523
20 Oded Goldreich, Hugo Krawczyk: On the Composition of Zero-Knowledge Proof Systems. SIAM J. Comput. 25(1): 169-192 (1996)
1995
19EEAmir Herzberg, Stanislaw Jarecki, Hugo Krawczyk, Moti Yung: Proactive Secret Sharing Or: How to Cope With Perpetual Leakage. CRYPTO 1995: 339-352
18EEHugo Krawczyk: New Hash Functions For Message Authentication. EUROCRYPT 1995: 301-310
17 Pau-Chen Cheng, Juan A. Garay, Amir Herzberg, Hugo Krawczyk: Securing the Internet (Abstract). PODC 1995: 257
1994
16EEHugo Krawczyk: LFSR-based Hashing and Authentication. CRYPTO 1994: 129-139
1993
15EEHugo Krawczyk: Secret Sharing Made Short. CRYPTO 1993: 136-146
14EEDon Coppersmith, Hugo Krawczyk, Yishay Mansour: The Shrinking Generator. CRYPTO 1993: 22-39
13 Hugo Krawczyk: The Shrinking Generator: Some Practical Considerations. FSE 1993: 45-46
12 Hugo Krawczyk: Distributed Fingerprints and Secure Information Dispersal. PODC 1993: 207-218
11 Oded Goldreich, Hugo Krawczyk, Michael Luby: On the Existence of Pseudorandom Generators. SIAM J. Comput. 22(6): 1163-1175 (1993)
1992
10 Hugo Krawczyk: How to Predict Congruential Generators. J. Algorithms 13(4): 527-545 (1992)
9 Oded Goldreich, Hugo Krawczyk: Sparse Pseudorandom Distributions. Random Struct. Algorithms 3(2): 163-174 (1992)
1991
8EEDavid Bernstein, Doron Cohen, Hugo Krawczyk: Code Duplication: An Assist for Global Instruction Scheduling. MICRO 1991: 103-113
1990
7 Oded Goldreich, Hugo Krawczyk: On the Composition of Zero-Knowledge Proof Systems. ICALP 1990: 268-282
1989
6EEOded Goldreich, Hugo Krawczyk: Sparse Pseudorandom Distributions. CRYPTO 1989: 113-127
5EEHugo Krawczyk: How to Predict Congruential Generators. CRYPTO 1989: 138-153
4 David Bernstein, Dina Q. Goldin, Martin Charles Golumbic, Hugo Krawczyk, Yishay Mansour, Itai Nahshon, Ron Y. Pinter: Spill Code Minimization Techniques for Optimizing Compilers. PLDI 1989: 258-263
3EEHugo Krawczyk, Azaria Paz: The diophantine problem of Frobenius: A close bound. Discrete Applied Mathematics 23(3): 289-291 (1989)
1988
2EEOded Goldreich, Hugo Krawczyk, Michael Luby: On the Existence of Pseudorandom Generators. CRYPTO 1988: 146-162
1 Oded Goldreich, Hugo Krawczyk, Michael Luby: On the Existence of Pseudorandom Generators (Extended Abstract) FOCS 1988: 12-24

Coauthor Index

1Giuseppe Ateniese [32]
2Mihir Bellare [21] [24] [29] [37]
3David Bernstein [4] [8]
4John Black [38]
5Ran Canetti [21] [24] [29] [36] [44] [46] [47] [48] [50]
6Pau-Chen Cheng [17] [28]
7Doron Cohen [8]
8Don Coppersmith [14]
9Yevgeniy Dodis [53]
10Juan A. Garay [17] [28]
11Rosario Gennaro [22] [23] [26] [35] [36] [39] [40] [43] [49] [52] [53] [55] [58] [59] [60] [61] [63] [64]
12Dina Q. Goldin [4]
13Oded Goldreich [1] [2] [6] [7] [9] [11] [20] [37]
14Martin Charles Golumbic [4]
15Shai Halevi [25] [30] [33] [38] [57] [62] [63] [64]
16Johan Håstad [53]
17Amir Herzberg [17] [19] [27] [28] [32]
18Markus Jakobsson [27]
19Stanislaw Jarecki [19] [22] [23] [27] [35] [36] [40] [43] [49] [60] [61]
20Paul A. Karger [48]
21Ted Krovetz [38]
22Michael Luby [1] [2] [11]
23Yishay Mansour [4] [14]
24Itai Nahshon [4]
25Jesper Buus Nielsen [50]
26Azaria Paz [3]
27Ron Y. Pinter [4]
28Tal Rabin [22] [23] [26] [35] [36] [39] [40] [41] [43] [48] [49] [52] [53] [59] [60] [61] [63] [64]
29Mario Di Raimondo [55] [58]
30Steffen Reidt [64]
31Phillip Rogaway [38]
32Helmut Scherzer [48]
33David C. Toll [48]
34Gene Tsudik [32]
35Stephen D. Wolthusen [64]
36Moti Yung (Mordechai M. Yung) [19] [27]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)