Cryptographers' World
 

Johan HÃ¥stad


Author's Web Page Link

6 papers in database with 333 citations Star

H-number: 4

Journal Papers

[Sort papers chronologically] [Sort papers by citations count]

 
1. Johan HÃ¥stad,  Mats Näslund,  Practical Construction and Analysis of Pseudo-Randomness Primitives, Journal of Cryptology, Volume 21(1), pp. 1 - 26, Springer, 2008.

[Cited 12 times ]

2. Johan HÃ¥stad,  The Security of the IAPM and IACBC Modes, Journal of Cryptology, Volume 20(2), pp. 153 - 163, Springer, 2007.

[Cited 1 times ]

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Yevgeniy Dodis,  Rosario Gennaro,  Johan HÃ¥stad,  Hugo Krawczyk,  Tal Rabin,  Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes, pp. 494 - 510, CRYPTO 2004.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 64 times Red Star]

2. Johan HÃ¥stad,  Mats Näslund,  Practical Construction and Analysis of Pseudo-Randomness Primitives, pp. 442 - 459, ASIACRYPT 2001.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 16 times ]

3. Michael Ben-Or,  Oded Goldreich,  Shafi Goldwasser,  Johan HÃ¥stad,  Joe Kilian,  Silvio Micali,  Phillip Rogaway,  Everything Provable is Provable in Zero-Knowledge, pp. 37 - 56, CRYPTO 1988.

[Electronic Edition][Cited 149 times Red StarRed Star]

4. Johan HÃ¥stad,  On Using RSA with Low Exponent in a Public Key Network, pp. 403 - 408, CRYPTO 1985.

[Electronic Edition][Cited 103 times Red StarRed Star]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...