Hugo Krawczyk
Orcid: 0000-0003-3130-1888Affiliations:
- IBM Research, Yorktown Heights, USA
According to our database1,
Hugo Krawczyk
authored at least 104 papers
between 1988 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
On csauthors.net:
Bibliography
2024
2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
2022
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
ACM Trans. Priv. Secur., 2021
IACR Cryptol. ePrint Arch., 2021
On the (In)Security of the Diffie-Hellman Oblivious PRF with Multiplicative Blinding.
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021
2020
Proceedings of the Theory of Cryptography - 18th International Conference, 2020
2019
IEEE Trans. Dependable Secur. Comput., 2019
IACR Cryptol. ePrint Arch., 2019
Proceedings of the World Wide Web Conference, 2019
2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
2016
A Unilateral-to-Mutual Authentication Compiler for Key Exchange (with Applications to Client Authentication in TLS 1.3).
IACR Cryptol. ePrint Arch., 2016
Highly-Efficient and Composable Password-Protected Secret Sharing (Or: How to Protect Your Bitcoin Wallet Online).
IACR Cryptol. ePrint Arch., 2016
2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
2014
Round-Optimal Password-Protected Secret Sharing and T-PAKE in the Password-Only Model.
IACR Cryptol. ePrint Arch., 2014
Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation.
IACR Cryptol. ePrint Arch., 2014
2013
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
2012
2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
2010
IACR Cryptol. ePrint Arch., 2010
IACR Cryptol. ePrint Arch., 2010
2009
2008
IACR Cryptol. ePrint Arch., 2008
2007
J. Cryptol., 2007
2006
Proceedings of the Advances in Cryptology, 2006
2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
IACR Cryptol. ePrint Arch., 2005
Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, 2005
2004
Proceedings of the Advances in Cryptology, 2004
2003
Authenticating Mandatory Access Controls and Preserving Privacy for a High-Assurance Smart Card.
Proceedings of the Computer Security, 2003
Proceedings of the Topics in Cryptology, 2003
SIGMA: The 'SIGn-and-MAc' Approach to Authenticated Diffie-Hellman and Its Use in the IKE-Protocols.
Proceedings of the Advances in Cryptology, 2003
2002
IACR Cryptol. ePrint Arch., 2002
IACR Cryptol. ePrint Arch., 2002
2001
The order of encryption and authentication for protecting communications (Or: how secure is SSL?).
IACR Cryptol. ePrint Arch., 2001
IACR Cryptol. ePrint Arch., 2001
IACR Cryptol. ePrint Arch., 2001
2000
IEEE J. Sel. Areas Commun., 2000
Proceedings of the Network and Distributed System Security Symposium, 2000
1999
Proceedings of the Financial Cryptography, 1999
Proceedings of the Advances in Cryptology, 1999
Proceedings of the Advances in Cryptology, 1999
Stateless Evaluation of Pseudorandom Functions: Security beyond the Birthday Barrier.
Proceedings of the Advances in Cryptology, 1999
1998
A Modular Approach to the Design and Analysis of Authentication and Key Exchange Protocols.
IACR Cryptol. ePrint Arch., 1998
A Modular Approach to the Design and Analysis of Authentication and Key Exchange Protocols (Extended Abstract).
Proceedings of the Thirtieth Annual ACM Symposium on the Theory of Computing, 1998
1997
Proceedings of the Fast Software Encryption, 4th International Workshop, 1997
1996
Proceedings of the 1996 Symposium on Network and Distributed System Security, 1996
Pseudorandom Functions Revisited: The Cascade Construction and Its Concrete Security.
Proceedings of the 37th Annual Symposium on Foundations of Computer Science, 1996
Proceedings of the Advances in Cryptology, 1996
1995
Design and Implementation of Modular Key Management Protocol and IP Secure Tunnel on AIX.
Proceedings of the 5th USENIX Security Symposium, 1995
Proceedings of the Fourteenth Annual ACM Symposium on Principles of Distributed Computing, 1995
Proceedings of the Advances in Cryptology, 1995
Proceedings of the Advances in Cryptology, 1995
1994
Proceedings of the First Workshop on Mobile Computing Systems and Applications, 1994
Proceedings of the Advances in Cryptology, 1994
1993
Proceedings of the Twelth Annual ACM Symposium on Principles of Distributed Computing, 1993
Proceedings of the Fast Software Encryption, 1993
1992
1991
Proceedings of the 24th Annual IEEE/ACM International Symposium on Microarchitecture, 1991
1990
1989
Proceedings of the ACM SIGPLAN'89 Conference on Programming Language Design and Implementation (PLDI), 1989
1988
Proceedings of the 29th Annual Symposium on Foundations of Computer Science, 1988