Suivre
Hugo Krawczyk
Hugo Krawczyk
Algorand Foundation
Adresse e-mail validée de algorand.foundation
Titre
Citée par
Citée par
Année
HMAC: Keyed-hashing for message authentication
H Krawczyk, M Bellare, R Canetti
37511997
Keying hash functions for message authentication
M Bellare, R Canetti, H Krawczyk
Advances in Cryptology—CRYPTO’96: 16th Annual International Cryptology …, 1996
24211996
Analysis of key-exchange protocols and their use for building secure channels
R Canetti, H Krawczyk
Advances in Cryptology—EUROCRYPT 2001: International Conference on the …, 2001
19002001
Proactive secret sharing or: How to cope with perpetual leakage
A Herzberg, S Jarecki, H Krawczyk, M Yung
Advances in Cryptology—CRYPT0’95: 15th Annual International Cryptology …, 1995
11051995
Secure distributed key generation for discrete-log based cryptosystems
R Gennaro, S Jarecki, H Krawczyk, T Rabin
Journal of Cryptology 20, 51-83, 2007
1082*2007
Highly-scalable searchable symmetric encryption with support for boolean queries
D Cash, S Jarecki, C Jutla, H Krawczyk, MC Roşu, M Steiner
Advances in Cryptology–CRYPTO 2013: 33rd Annual Cryptology Conference, Santa …, 2013
9462013
HMQV: A high-performance secure Diffie-Hellman protocol
H Krawczyk
Crypto 3621, 546-566, 2005
9072005
Chameleon Signatures.
H Krawczyk, T Rabin
NDSS, 2000
801*2000
Dynamic searchable encryption in very-large databases: Data structures and implementation
D Cash, J Jaeger, S Jarecki, C Jutla, H Krawczyk, MC Roşu, M Steiner
Cryptology ePrint Archive, 2014
7662014
A modular approach to the design and analysis of authentication and key exchange protocols
M Bellare, R Canetti, H Krawczyk
Proceedings of the thirtieth annual ACM symposium on Theory of computing …, 1998
7441998
Robust threshold DSS signatures
R Gennaro, S Jarecki, H Krawczyk, T Rabin
Advances in Cryptology—EUROCRYPT’96: International Conference on the Theory …, 1996
6991996
Universally composable notions of key exchange and secure channels
R Canetti, H Krawczyk
Advances in Cryptology—EUROCRYPT 2002: International Conference on the …, 2002
6782002
LFSR-based hashing and authentication
H Krawczyk
Advances in Cryptology—CRYPTO’94: 14th Annual International Cryptology …, 2001
6652001
UMAC: Fast and secure message authentication
J Black, S Halevi, H Krawczyk, T Krovetz, P Rogaway
Advances in Cryptology—CRYPTO’99: 19th Annual International Cryptology …, 1999
6201999
Public-key cryptography and password protocols
S Halevi, H Krawczyk
ACM Transactions on Information and System Security (TISSEC) 2 (3), 230-268, 1999
5841999
The order of encryption and authentication for protecting communications (or: How secure is SSL?)
H Krawczyk
Advances in Cryptology—CRYPTO 2001: 21st Annual International Cryptology …, 2001
5542001
SIGMA: The'SIGn-and-MAc'Approach to Authenticated Diffie-Hellman and Its Use in the IKE-Protocols.
H Krawczyk
Crypto 2729, 400-425, 2003
5522003
The shrinking generator
D Coppersmith, H Krawczyk, Y Mansour
Advances in Cryptology—CRYPTO’93: 13th Annual International Cryptology …, 1994
5511994
Secret sharing made short
H Krawczyk
Advances in Cryptology—CRYPTO’93: 13th Annual International Cryptology …, 1994
5161994
On the composition of zero-knowledge proof systems
O Goldreich, H Krawczyk
SIAM Journal on Computing 25 (1), 169-192, 1996
4741996
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20