What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Hugo Krawczyk
Google Scholar
ORCID:
0000-0003-3130-1888
81
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tifs
Building and Testing a Hidden-Password Online Password Manager.
Mohammed Jubur
Christopher Robert Price
Maliheh Shirvanian
Nitesh Saxena
Stanislaw Jarecki
Hugo Krawczyk
2025
conf/sp
Gold OPRF: Post-Quantum Oblivious Power-Residue PRF.
Yibin Yang
Fabrice Benhamouda
Shai Halevi
Hugo Krawczyk
Tal Rabin
2024
conf/eurocrypt
SPRINT: High-Throughput Robust Distributed Schnorr Signatures.
Fabrice Benhamouda
Shai Halevi
Hugo Krawczyk
Yiping Ma
Tal Rabin
2024
conf/asiacrypt
Password-Protected Threshold Signatures.
Stefan Dziembowski
Stanislaw Jarecki
Pawel Kedzior
Hugo Krawczyk
Chan Nam Ngo
Jiayu Xu
2023
conf/eurocrypt
Password-Authenticated TLS via OPAQUE and Post-Handshake Authentication.
Julia Hesse
Stanislaw Jarecki
Hugo Krawczyk
Christopher Wood
2022
conf/ccs
Threshold Cryptography as a Service (in the Multiserver and YOSO Models).
Fabrice Benhamouda
Shai Halevi
Hugo Krawczyk
Alex Miao
Tal Rabin
2022
conf/eurocrypt
Asymmetric PAKE with Low Computation and communication.
Bruno Freitas Dos Santos
Yanqi Gu
Stanislaw Jarecki
Hugo Krawczyk
2021
conf/crypto
YOSO: You Only Speak Once - Secure MPC with Stateless Ephemeral Roles.
Craig Gentry
Shai Halevi
Hugo Krawczyk
Bernardo Magri
Jesper Buus Nielsen
Tal Rabin
Sophia Yakoubov
2021
conf/crypto
KHAPE: Asymmetric PAKE from Key-Hiding Key Exchange.
Yanqi Gu
Stanislaw Jarecki
Hugo Krawczyk
2021
conf/pkc
On the (In)Security of the Diffie-Hellman Oblivious PRF with Multiplicative Blinding.
Stanislaw Jarecki
Hugo Krawczyk
Jiayu Xu
2020
conf/acns
On the Cryptographic Deniability of the Signal Protocol.
Nihal Vatandas
Rosario Gennaro
Bertrand Ithurburn
Hugo Krawczyk
2020
conf/tcc
Can a Public Blockchain Keep a Secret?
Fabrice Benhamouda
Craig Gentry
Sergey Gorbunov
Shai Halevi
Hugo Krawczyk
Chengyu Lin
Tal Rabin
Leonid Reyzin
2019
journals/popets
Cryptography for #MeToo.
Benjamin Kuykendall
Hugo Krawczyk
Tal Rabin
2019
conf/ccs
Updatable Oblivious Key Management for Storage Systems.
Stanislaw Jarecki
Hugo Krawczyk
Jason K. Resch
2018
conf/pkc
Two-Factor Authentication with End-to-End Password Security.
Stanislaw Jarecki
Hugo Krawczyk
Maliheh Shirvanian
Nitesh Saxena
2018
conf/eurocrypt
OPAQUE: An Asymmetric PAKE Protocol Secure Against Pre-computation Attacks.
Stanislaw Jarecki
Hugo Krawczyk
Jiayu Xu
2017
conf/crypto
Robust Non-interactive Multiparty Computation Against Constant-Size Collusion.
Fabrice Benhamouda
Hugo Krawczyk
Tal Rabin
2017
conf/acns
TOPPSS: Cost-Minimal Password-Protected Secret Sharing Based on Threshold OPRF.
Stanislaw Jarecki
Aggelos Kiayias
Hugo Krawczyk
Jiayu Xu
2016
conf/ccs
Attribute-based Key Exchange with General Policies.
Vladimir Kolesnikov
Hugo Krawczyk
Yehuda Lindell
Alex J. Malozemoff
Tal Rabin
2016
conf/ccs
Device-Enhanced Password Protocols with Optimal Online-Offline Protection.
Stanislaw Jarecki
Hugo Krawczyk
Maliheh Shirvanian
Nitesh Saxena
2016
conf/ccs
A Unilateral-to-Mutual Authentication Compiler for Key Exchange (with Applications to Client Authentication in TLS 1.3).
Hugo Krawczyk
2016
conf/eurosp
Highly-Efficient and Composable Password-Protected Secret Sharing (Or: How to Protect Your Bitcoin Wallet Online).
Stanislaw Jarecki
Aggelos Kiayias
Hugo Krawczyk
Jiayu Xu
2016
conf/eurosp
The OPTLS Protocol and TLS 1.3.
Hugo Krawczyk
Hoeteck Wee
2015
conf/esorics
Rich Queries on Encrypted Data: Beyond Exact Matches.
Sky Faber
Stanislaw Jarecki
Hugo Krawczyk
Quan Nguyen
Marcel-Catalin Rosu
Michael Steiner
2014
conf/ndss
Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation.
David Cash
Joseph Jaeger
Stanislaw Jarecki
Charanjit S. Jutla
Hugo Krawczyk
Marcel-Catalin Rosu
Michael Steiner
2014
conf/asiacrypt
Round-Optimal Password-Protected Secret Sharing and T-PAKE in the Password-Only Model.
Stanislaw Jarecki
Aggelos Kiayias
Hugo Krawczyk
2013
conf/ccs
Outsourced symmetric private information retrieval.
Stanislaw Jarecki
Charanjit S. Jutla
Hugo Krawczyk
Marcel-Catalin Rosu
Michael Steiner
2013
conf/crypto
On the Security of the TLS Protocol: A Systematic Analysis.
Hugo Krawczyk
Kenneth G. Paterson
Hoeteck Wee
2013
conf/crypto
Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries.
David Cash
Stanislaw Jarecki
Charanjit S. Jutla
Hugo Krawczyk
Marcel-Catalin Rosu
Michael Steiner
2012
conf/tcc
Computational Extractors and Pseudorandomness.
Dana Dachman-Soled
Rosario Gennaro
Hugo Krawczyk
Tal Malkin
2011
conf/crypto
Leftover Hash Lemma, Revisited.
Boaz Barak
Yevgeniy Dodis
Hugo Krawczyk
Olivier Pereira
Krzysztof Pietrzak
François-Xavier Standaert
Yu Yu
2011
conf/pkc
One-Pass HMQV and Asymmetric Key-Wrapping.
Shai Halevi
Hugo Krawczyk
2010
conf/crypto
Cryptographic Extraction and Key Derivation: The HKDF Scheme.
Hugo Krawczyk
2010
conf/acns
Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead.
Rosario Gennaro
Hugo Krawczyk
Tal Rabin
2010
conf/pkc
Secure Network Coding over the Integers.
Rosario Gennaro
Jonathan Katz
Hugo Krawczyk
Tal Rabin
2008
conf/esorics
Strongly-Resilient and Non-interactive Hierarchical Key-Agreement in MANETs.
Rosario Gennaro
Shai Halevi
Hugo Krawczyk
Tal Rabin
Steffen Reidt
Stephen D. Wolthusen
2008
conf/eurocrypt
Threshold RSA for Dynamic and Ad-Hoc Groups.
Rosario Gennaro
Shai Halevi
Hugo Krawczyk
Tal Rabin
2007
journals/joc
Robust and Efficient Sharing of RSA Functions.
Rosario Gennaro
Tal Rabin
Stanislaw Jarecki
Hugo Krawczyk
2007
journals/joc
RSA-Based Undeniable Signatures.
Rosario Gennaro
Tal Rabin
Hugo Krawczyk
2007
journals/joc
Secure Distributed Key Generation for Discrete-Log Based Cryptosystems.
Rosario Gennaro
Stanislaw Jarecki
Hugo Krawczyk
Tal Rabin
2007
conf/ccs
Security under key-dependent inputs.
Shai Halevi
Hugo Krawczyk
2006
conf/ccs
Deniable authentication and key exchange.
Mario Di Raimondo
Rosario Gennaro
Hugo Krawczyk
2006
conf/crypto
Strengthening Digital Signatures Via Randomized Hashing.
Shai Halevi
Hugo Krawczyk
2005
conf/crypto
HMQV: A High-Performance Secure Diffie-Hellman Protocol.
Hugo Krawczyk
2004
conf/crypto
Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes.
Yevgeniy Dodis
Rosario Gennaro
Johan Håstad
Hugo Krawczyk
Tal Rabin
2004
conf/eurocrypt
Secure Hashed Diffie-Hellman over Non-DDH Groups.
Rosario Gennaro
Hugo Krawczyk
Tal Rabin
2003
conf/crypto
SIGMA: The 'SIGn-and-MAc' Approach to Authenticated Diffie-Hellman and Its Use in the IKE-Protocols.
Hugo Krawczyk
2003
conf/crypto
Relaxing Chosen-Ciphertext Security.
Ran Canetti
Hugo Krawczyk
Jesper Buus Nielsen
2003
conf/esorics
Authenticating Mandatory Access Controls and Preserving Privacy for a High-Assurance Smart Card.
Helmut Scherzer
Ran Canetti
Paul A. Karger
Hugo Krawczyk
Tal Rabin
David C. Toll
2003
conf/ctrsa
Secure Applications of Pedersen's Distributed Key Generation Protocol.
Rosario Gennaro
Stanislaw Jarecki
Hugo Krawczyk
Tal Rabin
2002
conf/crypto
Security Analysis of IKE's Signature-Based Key-Exchange Protocol.
Ran Canetti
Hugo Krawczyk
2002
conf/eurocrypt
Universally Composable Notions of Key Exchange and Secure Channels.
Ran Canetti
Hugo Krawczyk
2001
conf/crypto
The Order of Encryption and Authentication for Protecting Communications (or: How Secure Is SSL?).
Hugo Krawczyk
2001
conf/eurocrypt
Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels.
Ran Canetti
Hugo Krawczyk
2000
journals/joc
RSA-Based Undeniable Signatures.
Rosario Gennaro
Tal Rabin
Hugo Krawczyk
2000
journals/joc
Robust and Efficient Sharing of RSA Functions.
Rosario Gennaro
Tal Rabin
Stanislaw Jarecki
Hugo Krawczyk
2000
conf/ccs
Simple forward-secure signatures from any signature scheme.
Hugo Krawczyk
2000
conf/ndss
Chameleon Signatures.
Hugo Krawczyk
Tal Rabin
1999
conf/crypto
UMAC: Fast and Secure Message Authentication.
John Black
Shai Halevi
Hugo Krawczyk
Ted Krovetz
Phillip Rogaway
1999
conf/crypto
Stateless Evaluation of Pseudorandom Functions: Security beyond the Birthday Barrier.
Mihir Bellare
Oded Goldreich
Hugo Krawczyk
1999
conf/crypto
Adaptive Security for Threshold Cryptosystems.
Ran Canetti
Rosario Gennaro
Stanislaw Jarecki
Hugo Krawczyk
Tal Rabin
1999
conf/fc
Blinding of Credit Card Numbers in the SET Protocol.
Hugo Krawczyk
1999
conf/eurocrypt
Secure Distributed Key Generation for Discrete-Log Based Cryptosystems.
Rosario Gennaro
Stanislaw Jarecki
Hugo Krawczyk
Tal Rabin
1998
conf/ccs
Public-Key Cryptography and Password Protocols.
Shai Halevi
Hugo Krawczyk
1997
conf/fse
MMH: Software Message Authentication in the Gbit/Second Rates.
Shai Halevi
Hugo Krawczyk
1997
conf/ccs
Proactive Public Key and Signature Systems.
Amir Herzberg
Markus Jakobsson
Stanislaw Jarecki
Hugo Krawczyk
Moti Yung
1997
conf/crypto
RSA-Based Undeniable Signatures.
Rosario Gennaro
Hugo Krawczyk
Tal Rabin
1996
conf/crypto
Keying Hash Functions for Message Authentication.
Mihir Bellare
Ran Canetti
Hugo Krawczyk
1996
conf/crypto
Robust and Efficient Sharing of RSA Functions.
Rosario Gennaro
Stanislaw Jarecki
Hugo Krawczyk
Tal Rabin
1996
conf/ndss
SKEME: a versatile secure key exchange mechanism for Internet.
Hugo Krawczyk
1996
conf/eurocrypt
Robust Threshold DSS Signatures.
Rosario Gennaro
Stanislaw Jarecki
Hugo Krawczyk
Tal Rabin
1995
conf/uss
Design and Implementation of Modular Key Management Protocol and IP Secure Tunnel on AIX.
Pau-Chen Cheng
Juan A. Garay
Amir Herzberg
Hugo Krawczyk
1995
conf/crypto
Proactive Secret Sharing Or: How to Cope With Perpetual Leakage.
Amir Herzberg
Stanislaw Jarecki
Hugo Krawczyk
Moti Yung
1995
conf/eurocrypt
New Hash Functions For Message Authentication.
Hugo Krawczyk
1994
conf/crypto
LFSR-based Hashing and Authentication.
Hugo Krawczyk
1993
conf/fse
The Shrinking Generator: Some Practical Considerations.
Hugo Krawczyk
1993
conf/crypto
Secret Sharing Made Short.
Hugo Krawczyk
1993
conf/crypto
The Shrinking Generator.
Don Coppersmith
Hugo Krawczyk
Yishay Mansour
1989
conf/crypto
How to Predict Congruential Generators.
Hugo Krawczyk
1989
conf/crypto
Sparse Pseudorandom Distributions.
Oded Goldreich
Hugo Krawczyk
1988
conf/crypto
On the Existence of Pseudorandom Generators.
Oded Goldreich
Hugo Krawczyk
Michael Luby
Coauthors
Aggelos Kiayias
(3)
Alex J. Malozemoff
(1)
Alex Miao
(1)
Amir Herzberg
(3)
Benjamin Kuykendall
(1)
Bernardo Magri
(1)
Bertrand Ithurburn
(1)
Boaz Barak
(1)
Bruno Freitas Dos Santos
(1)
Chan Nam Ngo
(1)
Charanjit S. Jutla
(3)
Chengyu Lin
(1)
Christopher Robert Price
(1)
Christopher Wood
(1)
Craig Gentry
(2)
Dana Dachman-Soled
(1)
David C. Toll
(1)
David Cash
(2)
Don Coppersmith
(1)
Fabrice Benhamouda
(5)
François-Xavier Standaert
(1)
Helmut Scherzer
(1)
Hoeteck Wee
(2)
Hugo Krawczyk
(81)
Jason K. Resch
(1)
Jesper Buus Nielsen
(2)
Jiayu Xu
(5)
Johan Håstad
(1)
John Black
(1)
Jonathan Katz
(1)
Joseph Jaeger
(1)
Juan A. Garay
(1)
Julia Hesse
(1)
Kenneth G. Paterson
(1)
Krzysztof Pietrzak
(1)
Leonid Reyzin
(1)
Maliheh Shirvanian
(3)
Marcel-Catalin Rosu
(4)
Mario Di Raimondo
(1)
Markus Jakobsson
(1)
Michael Luby
(1)
Michael Steiner
(4)
Mihir Bellare
(2)
Mohammed Jubur
(1)
Moti Yung
(2)
Nihal Vatandas
(1)
Nitesh Saxena
(3)
Oded Goldreich
(3)
Olivier Pereira
(1)
Pau-Chen Cheng
(1)
Paul A. Karger
(1)
Pawel Kedzior
(1)
Phillip Rogaway
(1)
Quan Nguyen
(1)
Ran Canetti
(7)
Rosario Gennaro
(20)
Sergey Gorbunov
(1)
Shai Halevi
(13)
Sky Faber
(1)
Sophia Yakoubov
(1)
Stanislaw Jarecki
(27)
Stefan Dziembowski
(1)
Steffen Reidt
(1)
Stephen D. Wolthusen
(1)
Tal Malkin
(1)
Tal Rabin
(27)
Ted Krovetz
(1)
Vladimir Kolesnikov
(1)
Yanqi Gu
(2)
Yehuda Lindell
(1)
Yevgeniy Dodis
(2)
Yibin Yang
(1)
Yiping Ma
(1)
Yishay Mansour
(1)
Yu Yu
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to