Hugo Krawczyk
Hugo Krawczyk
IBM Research
Bestätigte E-Mail-Adresse bei us.ibm.com
Titel
Zitiert von
Zitiert von
Jahr
HMAC: Keyed-hashing for message authentication
H Krawczyk, M Bellare, R Canetti
RFc 2104, February 2 (5.3), 1997
31951997
Keying hash functions for message authentication
M Bellare, R Canetti, H Krawczyk
Annual international cryptology conference, 1-15, 1996
21521996
Analysis of key-exchange protocols and their use for building secure channels
R Canetti, H Krawczyk
International Conference on the Theory and Applications of Cryptographic …, 2001
14662001
Proactive secret sharing or: How to cope with perpetual leakage
A Herzberg, S Jarecki, H Krawczyk, M Yung
Annual International Cryptology Conference, 339-352, 1995
9611995
Secure distributed key generation for discrete-log based cryptosystems
R Gennaro, S Jarecki, H Krawczyk, T Rabin
Journal of Cryptology 20 (1), 51-83, 2007
850*2007
HMQV: A high-performance secure Diffie-Hellman protocol
H Krawczyk
Annual International Cryptology Conference, 546-566, 2005
7622005
A modular approach to the design and analysis of authentication and key exchange protocols
M Bellare, R Canetti, H Krawczyk
Proceedings of the thirtieth annual ACM symposium on Theory of computing …, 1998
6861998
Highly-scalable searchable symmetric encryption with support for boolean queries
D Cash, S Jarecki, C Jutla, H Krawczyk, MC Roşu, M Steiner
Annual cryptology conference, 353-373, 2013
6732013
Chameleon Signatures.
H Krawczyk, T Rabin
NDSS, 2000
618*2000
Robust threshold DSS signatures
R Gennaro, S Jarecki, H Krawczyk, T Rabin
International Conference on the Theory and Applications of Cryptographic …, 1996
6071996
LFSR-based hashing and authentication
H Krawczyk
Annual International Cryptology Conference, 129-139, 1994
5691994
UMAC: Fast and secure message authentication
J Black, S Halevi, H Krawczyk, T Krovetz, P Rogaway
Annual International Cryptology Conference, 216-233, 1999
5601999
Public-key cryptography and password protocols
S Halevi, H Krawczyk
ACM Transactions on Information and System Security (TISSEC) 2 (3), 230-268, 1999
5381999
Dynamic searchable encryption in very-large databases: data structures and implementation.
D Cash, J Jaeger, S Jarecki, CS Jutla, H Krawczyk, MC Rosu, M Steiner
NDSS 14, 23-26, 2014
5302014
The order of encryption and authentication for protecting communications (or: How secure is SSL?)
H Krawczyk
Annual International Cryptology Conference, 310-331, 2001
4882001
The shrinking generator
D Coppersmith, H Krawczyk, Y Mansour
Annual International Cryptology Conference, 22-39, 1993
4881993
Universally composable notions of key exchange and secure channels
R Canetti, H Krawczyk
International Conference on the Theory and Applications of Cryptographic …, 2002
4552002
Secret sharing made short
H Krawczyk
Annual international cryptology conference, 136-146, 1993
4331993
SIGMA: The ‘SIGn-and-MAc’approach to authenticated Diffie-Hellman and its use in the IKE protocols
H Krawczyk
Annual International Cryptology Conference, 400-425, 2003
4242003
On the composition of zero-knowledge proof systems
O Goldreich, H Krawczyk
SIAM Journal on Computing 25 (1), 169-192, 1996
4091996
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20