Search
International Association for Cryptologic Research
What's new
Archive
Best Papers
Videos
Authors
Coauthors
By year
By conference
All Committees
Most Committees
Report errors
Maps
About
Hugo Krawczyk
Search web for home page
Program Committees
1
2012
Crypto
pc
2
2011
TCC
pc
3
2007
PKC
pc
4
2007
Asiacrypt
pc
5
2004
Crypto
pc
6
2001
Eurocrypt
pc
7
1998
Crypto
pc chair
8
1995
Crypto
pc
Publications
year
title
booktitle
pages
1
2012
Computational Extractors and Pseudorandomness
tcc
383-403
2
2011
Leftover Hash Lemma, Revisited
crypto
1
3
2011
One-Pass HMQV and Asymmetric Key-Wrapping
pkc
317
4
2010
Secure Network Coding over the Integers
pkc
142-160
5
2010
Cryptographic Extraction and Key Derivation: The HKDF Scheme
eprint
online
6
2010
Cryptographic Extraction and Key Derivation: The HKDF Scheme
crypto
631-648
7
2010
Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead
eprint
online
8
2008
Threshold RSA for Dynamic and Ad-Hoc Groups
eprint
online
9
2008
Strongly-Resilient and Non-Interactive Hierarchical Key-Agreement in MANETs
eprint
online
10
2008
Threshold RSA for Dynamic and Ad-Hoc Groups
eurocrypt
88-107
11
2007
Security under Key-Dependent Inputs
eprint
online
12
2007
Secure Distributed Key Generation for Discrete-Log Based Cryptosystems
jofc
51-83
13
2007
Robust and Efficient Sharing of RSA Functions
jofc
393
14
2007
RSA-Based Undeniable Signatures
jofc
394
15
2006
Deniable Authentication and Key Exchange
eprint
online
16
2006
Strengthening Digital Signatures Via Randomized Hashing
crypto
online
17
2005
HMQV: A High-Performance Secure Diffie-Hellman Protocol
crypto
online
18
2005
HMQV: A High-Performance Secure Diffie-Hellman Protocol
eprint
online
19
2004
Secure Hashed Diffie-Hellman over Non-DDH Groups
eurocrypt
online
20
2004
Secure Hashed Diffie-Hellman over Non-DDH Groups
eprint
online
21
2004
Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes
crypto
online
22
2003
Relaxing Chosen-Ciphertext Security
crypto
online
23
2003
Relaxing Chosen-Ciphertext Security
eprint
online
24
2003
SIGMA: The 'SIGn-and-MAc' Approach to Authenticated Diffie-Hellman and Its Use in the IKE-Protocols
crypto
online
25
2002
Security Analysis of IKE's Signature-Based Key-Exchange Protocol
crypto
online
26
2002
Universally Composable Notions of Key Exchange and Secure Channels
eprint
online
27
2002
Security Analysis of IKE's Signature-based Key-Exchange Protocol
eprint
online
28
2002
Universally Composable Notions of Key Exchange and Secure Channels
eurocrypt
online
29
2001
Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels
eurocrypt
453-474
30
2001
Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels
eprint
online
31
2001
Simple Forward-Secure Signatures From Any Signature Scheme
eprint
online
32
2001
The order of encryption and authentication for protecting communications (Or: how secure is SSL?)
eprint
online
33
2001
The Order of Encryption and Authentication for Protecting Communications (or: How Secure Is SSL?)
crypto
310-331
34
2000
Robust and Efficient Sharing of RSA Functions
jofc
273-300
35
2000
RSA-Based Undeniable Signatures
jofc
397-416
36
1999
Secure Distributed Key Generation for Discrete-Log Based Cryptosystems
eurocrypt
295-310
37
1999
Adaptive Security for Threshold Cryptosystems
crypto
98-115
38
1999
Public-key cryptography and password protocols
eprint
online
39
1999
UMAC: Fast and Secure Message Authentication
crypto
216-233
40
1999
Stateless Evaluation of Pseudorandom Functions: Security beyond the Birthday Barrier
crypto
270-287
41
1998
A Modular Approach to the Design and Analysis of Authentication and Key Exchange Protocols
eprint
online
42
1998
Chameleon Hashing and Signatures
eprint
online
43
1997
RSA-Based Undeniable Signatures
crypto
132-149
44
1997
MMH: Software Message Authentication in the Gbit/Second Rates
fse
172-189
45
1996
Robust Threshold DSS Signatures
eurocrypt
354-371
46
1996
Robust and Efficient Sharing of RSA Functions
crypto
157-172
47
1996
Keying Hash Functions for Message Authentication
crypto
1-15
48
1995
Proactive Secret Sharing Or: How to Cope With Perpetual Leakage
crypto
339-352
49
1995
New Hash Functions For Message Authentication
eurocrypt
301-310
50
1994
LFSR-based Hashing and Authentication
crypto
129-139
51
1993
The Shrinking Generator: Some Practical Considerations
fse
45-46
52
1993
The Shrinking Generator
crypto
22-39
53
1993
Secret Sharing Made Short
crypto
136-146
54
1989
Sparse Pseudorandom Distributions
crypto
113-127
55
1989
How to Predict Congruential Generators
crypto
138-153
56
1988
On the Existence of Pseudorandom Generators
crypto
146-162
Coauthors of Hugo Krawczyk
Boaz Barak
Mihir Bellare
John Black
Ran Canetti
Don Coppersmith
Dana Dachman-Soled
Yevgeniy Dodis
Rosario Gennaro
Oded Goldreich
Shai Halevi
Johan Håstad
Amir Herzberg
Stanislaw Jarecki
Jonathan Katz
Ted Krovetz
Michael Luby
Tal Malkin
Yishay Mansour
Jesper Buus Nielsen
Olivier Pereira
Krzysztof Pietrzak
Tal Rabin
Mario Di Raimondo
Steffen Reidt
Phillip Rogaway
François-Xavier Standaert
Stephen D. Wolthusen
Yu Yu
Moti Yung