Cryptographers' World
 

Hugo Krawczyk


Author's Web Page Link

36 papers in database with 5437 citations StarStarStarStar

Editor of 1 conference proceedings book

H-number: 26

Conference Proceedings

 
1. Hugo Krawczyk, editor, Advances in Cryptology - CRYPTO '98, 18th Annual International Cryptology Conference, Santa Barbara, California, USA, August 23-27, 1998, Proceedings. Springer, 1998. ISBN 3-540-64892-5.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

Journal Papers

[Sort papers chronologically] [Sort papers by citations count]

 
1. Rosario Gennaro,  Tal Rabin,  Stanislaw Jarecki,  Hugo Krawczyk,  Robust and Efficient Sharing of RSA Functions, Journal of Cryptology, Volume 20(3), pp. 393 - 0, Springer, 2007.

[Cited 185 times Red StarRed Star]

2. Rosario Gennaro,  Tal Rabin,  Hugo Krawczyk,  RSA-Based Undeniable Signatures, Journal of Cryptology, Volume 20(3), pp. 394 - 0, Springer, 2007.

[Cited 114 times Red StarRed Star]

3. Rosario Gennaro,  Stanislaw Jarecki,  Hugo Krawczyk,  Tal Rabin,  Secure Distributed Key Generation for Discrete-Log Based Cryptosystems, Journal of Cryptology, Volume 20(1), pp. 51 - 83, Springer, 2007.

[Cited 246 times Red StarRed Star]

4. Rosario Gennaro,  Tal Rabin,  Hugo Krawczyk,  RSA-Based Undeniable Signatures, Journal of Cryptology, Volume 13(4), pp. 397 - 416, Springer, 2000.

[Cited 114 times Red StarRed Star]

5. Rosario Gennaro,  Tal Rabin,  Stanislaw Jarecki,  Hugo Krawczyk,  Robust and Efficient Sharing of RSA Functions, Journal of Cryptology, Volume 13(2), pp. 273 - 300, Springer, 2000.

[Cited 185 times Red StarRed Star]

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Rosario Gennaro,  Shai Halevi,  Hugo Krawczyk,  Tal Rabin,  Threshold RSA for Dynamic and Ad-Hoc Groups, pp. 88 - 107, EUROCRYPT 2008.

[Electronic Edition][Cited 13 times ]

2. Shai Halevi,  Hugo Krawczyk,  Strengthening Digital Signatures Via Randomized Hashing, pp. 41 - 59, CRYPTO 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 95 times Red Star]

3. Hugo Krawczyk,  HMQV: A High-Performance Secure Diffie-Hellman Protocol, pp. 546 - 566, CRYPTO 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 177 times Red StarRed Star]

4. Yevgeniy Dodis,  Rosario Gennaro,  Johan HÃ¥stad,  Hugo Krawczyk,  Tal Rabin,  Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes, pp. 494 - 510, CRYPTO 2004.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 64 times Red Star]

5. Rosario Gennaro,  Hugo Krawczyk,  Tal Rabin,  Secure Hashed Diffie-Hellman over Non-DDH Groups, pp. 361 - 381, EUROCRYPT 2004.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 37 times ]

6. Ran Canetti,  Hugo Krawczyk,  Jesper Buus Nielsen,  Relaxing Chosen-Ciphertext Security, pp. 565 - 582, CRYPTO 2003.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 85 times Red Star]

7. Hugo Krawczyk,  SIGMA: The 'SIGn-and-MAc' Approach to Authenticated Diffie-Hellman and Its Use in the IKE-Protocols, pp. 400 - 425, CRYPTO 2003.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 125 times Red StarRed Star]

8. Rosario Gennaro,  Stanislaw Jarecki,  Hugo Krawczyk,  Tal Rabin,  Secure Applications of Pedersen's Distributed Key Generation Protocol, pp. 373 - 390, CT-RSA 2003.

[Electronic Edition][Cited 20 times ]

9. Ran Canetti,  Hugo Krawczyk,  Security Analysis of IKE's Signature-Based Key-Exchange Protocol, pp. 143 - 161, CRYPTO 2002.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 96 times Red Star]

10. Ran Canetti,  Hugo Krawczyk,  Universally Composable Notions of Key Exchange and Secure Channels, pp. 337 - 351, EUROCRYPT 2002.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 218 times Red StarRed Star]

11. Hugo Krawczyk,  The Order of Encryption and Authentication for Protecting Communications (or: How Secure Is SSL?), pp. 310 - 331, CRYPTO 2001.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 195 times Red StarRed Star]

12. Ran Canetti,  Hugo Krawczyk,  Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels, pp. 453 - 474, EUROCRYPT 2001.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 524 times Red StarRed StarRed StarRed Star]

13. John Black,  Shai Halevi,  Hugo Krawczyk,  Ted Krovetz,  Phillip Rogaway,  UMAC: Fast and Secure Message Authentication, pp. 216 - 233, CRYPTO 1999.

[Electronic Edition][Cited 227 times Red StarRed Star]

14. Mihir Bellare,  Oded Goldreich,  Hugo Krawczyk,  Stateless Evaluation of Pseudorandom Functions: Security beyond the Birthday Barrier, pp. 270 - 287, CRYPTO 1999.

[Electronic Edition][Cited 31 times ]

15. Ran Canetti,  Rosario Gennaro,  Stanislaw Jarecki,  Hugo Krawczyk,  Tal Rabin,  Adaptive Security for Threshold Cryptosystems, pp. 98 - 115, CRYPTO 1999.

[Electronic Edition][Cited 106 times Red StarRed Star]

16. Rosario Gennaro,  Stanislaw Jarecki,  Hugo Krawczyk,  Tal Rabin,  Secure Distributed Key Generation for Discrete-Log Based Cryptosystems, pp. 295 - 310, EUROCRYPT 1999.

[Electronic Edition][Cited 312 times Red StarRed StarRed Star]

17. Hugo Krawczyk,  Blinding of Credit Card Numbers in the SET Protocol, pp. 17 - 28, FC 1999.

[Electronic Edition][Cited 11 times ]

18. Rosario Gennaro,  Hugo Krawczyk,  Tal Rabin,  RSA-Based Undeniable Signatures, pp. 132 - 149, CRYPTO 1997.

[Electronic Edition][Cited 144 times Red StarRed Star]

19. Shai Halevi,  Hugo Krawczyk,  MMH: Software Message Authentication in the Gbit/Second Rates, pp. 172 - 189, FSE 1997.

[Electronic Edition][Cited 92 times Red Star]

20. Rosario Gennaro,  Stanislaw Jarecki,  Hugo Krawczyk,  Tal Rabin,  Robust and Efficient Sharing of RSA Functions, pp. 157 - 172, CRYPTO 1996.

[Electronic Edition][Cited 229 times Red StarRed Star]

21. Mihir Bellare,  Ran Canetti,  Hugo Krawczyk,  Keying Hash Functions for Message Authentication, pp. 1 - 15, CRYPTO 1996.

[Electronic Edition][Cited 913 times Red StarRed StarRed StarRed Star]

22. Rosario Gennaro,  Stanislaw Jarecki,  Hugo Krawczyk,  Tal Rabin,  Robust Threshold DSS Signatures, pp. 354 - 371, EUROCRYPT 1996.

[Electronic Edition][Cited 373 times Red StarRed StarRed Star]

23. Amir Herzberg,  Stanislaw Jarecki,  Hugo Krawczyk,  Moti Yung,  Proactive Secret Sharing Or: How to Cope With Perpetual Leakage, pp. 339 - 352, CRYPTO 1995.

[Electronic Edition][Cited 480 times Red StarRed StarRed Star]

24. Hugo Krawczyk,  New Hash Functions For Message Authentication, pp. 301 - 310, EUROCRYPT 1995.

[Electronic Edition][Cited 59 times Red Star]

25. Hugo Krawczyk,  LFSR-based Hashing and Authentication, pp. 129 - 139, CRYPTO 1994.

[Electronic Edition][Cited 221 times Red StarRed Star]

26. Hugo Krawczyk,  The Shrinking Generator: Some Practical Considerations, pp. 45 - 46, FSE 1993.

[Electronic Edition][Cited 15 times ]

27. Don Coppersmith,  Hugo Krawczyk,  Yishay Mansour,  The Shrinking Generator, pp. 22 - 39, CRYPTO 1993.

[Electronic Edition][Cited 245 times Red StarRed Star]

28. Hugo Krawczyk,  Secret Sharing Made Short, pp. 136 - 146, CRYPTO 1993.

[Electronic Edition][Cited 112 times Red StarRed Star]

29. Oded Goldreich,  Hugo Krawczyk,  Sparse Pseudorandom Distributions, pp. 113 - 127, CRYPTO 1989.

[Electronic Edition][Cited 24 times ]

30. Hugo Krawczyk,  How to Predict Congruential Generators, pp. 138 - 153, CRYPTO 1989.

[Electronic Edition][Cited 77 times Red Star]

31. Oded Goldreich,  Hugo Krawczyk,  Michael Luby,  On the Existence of Pseudorandom Generators, pp. 146 - 162, CRYPTO 1988.

[Electronic Edition][Cited 117 times Red StarRed Star]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...