Hugo Krawczyk
Person information
- affiliation: IBM Research, Yorktown Heights, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2010 – today
- 2018
- [c74]Stanislaw Jarecki, Hugo Krawczyk, Jiayu Xu:
OPAQUE: An Asymmetric PAKE Protocol Secure Against Pre-computation Attacks. EUROCRYPT (3) 2018: 456-486 - [c73]Stanislaw Jarecki, Hugo Krawczyk, Maliheh Shirvanian, Nitesh Saxena:
Two-Factor Authentication with End-to-End Password Security. Public Key Cryptography (2) 2018: 431-461 - [i42]Stanislaw Jarecki, Hugo Krawczyk, Maliheh Shirvanian, Nitesh Saxena:
Two-Factor Authentication with End-to-End Password Security. IACR Cryptology ePrint Archive 2018: 33 (2018) - [i41]Stanislaw Jarecki, Hugo Krawczyk, Jiayu Xu:
OPAQUE: An Asymmetric PAKE Protocol Secure Against Pre-Computation Attacks. IACR Cryptology ePrint Archive 2018: 163 (2018) - [i40]Maliheh Shirvanian, Stanislaw Jarecki, Hugo Krawczyk, Nitesh Saxena:
SPHINX: A Password Store that Perfectly Hides Passwords from Itself. IACR Cryptology ePrint Archive 2018: 695 (2018) - [i39]Stanislaw Jarecki, Hugo Krawczyk, Jason K. Resch:
Threshold Partially-Oblivious PRFs with Applications to Key Management. IACR Cryptology ePrint Archive 2018: 733 (2018) - 2017
- [c72]Stanislaw Jarecki, Aggelos Kiayias, Hugo Krawczyk, Jiayu Xu:
TOPPSS: Cost-Minimal Password-Protected Secret Sharing Based on Threshold OPRF. ACNS 2017: 39-58 - [c71]Fabrice Benhamouda, Hugo Krawczyk, Tal Rabin:
Robust Non-interactive Multiparty Computation Against Constant-Size Collusion. CRYPTO (1) 2017: 391-419 - [c70]Maliheh Shirvanian, Stanislaw Jarecki, Hugo Krawczyk, Nitesh Saxena:
SPHINX: A Password Store that Perfectly Hides Passwords from Itself. ICDCS 2017: 1094-1104 - [i38]Stanislaw Jarecki, Aggelos Kiayias, Hugo Krawczyk, Jiayu Xu:
TOPPSS: Cost-minimal Password-Protected Secret Sharing based on Threshold OPRF. IACR Cryptology ePrint Archive 2017: 363 (2017) - [i37]Fabrice Benhamouda, Hugo Krawczyk, Tal Rabin:
Robust Non-Interactive Multiparty Computation Against Constant-Size Collusion. IACR Cryptology ePrint Archive 2017: 555 (2017) - 2016
- [c69]Stanislaw Jarecki, Hugo Krawczyk, Maliheh Shirvanian, Nitesh Saxena:
Device-Enhanced Password Protocols with Optimal Online-Offline Protection. AsiaCCS 2016: 177-188 - [c68]Hugo Krawczyk:
A Unilateral-to-Mutual Authentication Compiler for Key Exchange (with Applications to Client Authentication in TLS 1.3). ACM Conference on Computer and Communications Security 2016: 1438-1450 - [c67]Vladimir Kolesnikov, Hugo Krawczyk, Yehuda Lindell, Alex J. Malozemoff, Tal Rabin:
Attribute-based Key Exchange with General Policies. ACM Conference on Computer and Communications Security 2016: 1451-1463 - [c66]
- [c65]Stanislaw Jarecki, Aggelos Kiayias, Hugo Krawczyk, Jiayu Xu:
Highly-Efficient and Composable Password-Protected Secret Sharing (Or: How to Protect Your Bitcoin Wallet Online). EuroS&P 2016: 276-291 - [i36]Stanislaw Jarecki, Aggelos Kiayias, Hugo Krawczyk, Jiayu Xu:
Highly-Efficient and Composable Password-Protected Secret Sharing (Or: How to Protect Your Bitcoin Wallet Online). IACR Cryptology ePrint Archive 2016: 144 (2016) - [i35]Vladimir Kolesnikov, Hugo Krawczyk, Yehuda Lindell, Alex J. Malozemoff, Tal Rabin:
Attribute-based Key Exchange with General Policies. IACR Cryptology ePrint Archive 2016: 518 (2016) - [i34]Hugo Krawczyk:
A Unilateral-to-Mutual Authentication Compiler for Key Exchange (with Applications to Client Authentication in TLS 1.3). IACR Cryptology ePrint Archive 2016: 711 (2016) - 2015
- [c64]Sky Faber, Stanislaw Jarecki, Hugo Krawczyk, Quan Nguyen, Marcel-Catalin Rosu, Michael Steiner:
Rich Queries on Encrypted Data: Beyond Exact Matches. ESORICS (2) 2015: 123-145 - [i33]Sky Faber, Stanislaw Jarecki, Hugo Krawczyk, Quan Nguyen, Marcel-Catalin Rosu, Michael Steiner:
Rich Queries on Encrypted Data: Beyond Exact Matches. IACR Cryptology ePrint Archive 2015: 927 (2015) - [i32]Hugo Krawczyk, Hoeteck Wee:
The OPTLS Protocol and TLS 1.3. IACR Cryptology ePrint Archive 2015: 978 (2015) - [i31]Stanislaw Jarecki, Hugo Krawczyk, Maliheh Shirvanian, Nitesh Saxena:
Device-Enhanced Password Protocols with Optimal Online-Offline Protection. IACR Cryptology ePrint Archive 2015: 1099 (2015) - 2014
- [c63]Stanislaw Jarecki, Aggelos Kiayias, Hugo Krawczyk:
Round-Optimal Password-Protected Secret Sharing and T-PAKE in the Password-Only Model. ASIACRYPT (2) 2014: 233-253 - [c62]David Cash, Joseph Jaeger, Stanislaw Jarecki, Charanjit S. Jutla, Hugo Krawczyk, Marcel-Catalin Rosu, Michael Steiner:
Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation. NDSS 2014 - [e2]Hugo Krawczyk:
Public-Key Cryptography - PKC 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings. Lecture Notes in Computer Science 8383, Springer 2014, ISBN 978-3-642-54630-3 [contents] - [i30]Stanislaw Jarecki, Aggelos Kiayias, Hugo Krawczyk:
Round-Optimal Password-Protected Secret Sharing and T-PAKE in the Password-Only Model. IACR Cryptology ePrint Archive 2014: 650 (2014) - [i29]David Cash, Joseph Jaeger, Stanislaw Jarecki, Charanjit S. Jutla, Hugo Krawczyk, Marcel-Catalin Rosu, Michael Steiner:
Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation. IACR Cryptology ePrint Archive 2014: 853 (2014) - 2013
- [c61]Stanislaw Jarecki, Charanjit S. Jutla, Hugo Krawczyk, Marcel-Catalin Rosu, Michael Steiner:
Outsourced symmetric private information retrieval. ACM Conference on Computer and Communications Security 2013: 875-888 - [c60]David Cash, Stanislaw Jarecki, Charanjit S. Jutla, Hugo Krawczyk, Marcel-Catalin Rosu, Michael Steiner:
Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries. CRYPTO (1) 2013: 353-373 - [c59]Hugo Krawczyk, Kenneth G. Paterson, Hoeteck Wee:
On the Security of the TLS Protocol: A Systematic Analysis. CRYPTO (1) 2013: 429-448 - [i28]David Cash, Stanislaw Jarecki, Charanjit S. Jutla, Hugo Krawczyk, Marcel-Catalin Rosu, Michael Steiner:
Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries. IACR Cryptology ePrint Archive 2013: 169 (2013) - [i27]Hugo Krawczyk, Kenneth G. Paterson, Hoeteck Wee:
On the Security of the TLS Protocol: A Systematic Analysis. IACR Cryptology ePrint Archive 2013: 339 (2013) - [i26]Stanislaw Jarecki, Charanjit S. Jutla, Hugo Krawczyk, Marcel-Catalin Rosu, Michael Steiner:
Outsourced Symmetric Private Information Retrieval. IACR Cryptology ePrint Archive 2013: 720 (2013) - 2012
- [j17]Demijan Klinc, Carmit Hazay, Ashish Jagmohan, Hugo Krawczyk, Tal Rabin:
On Compression of Data Encrypted With Block Ciphers. IEEE Trans. Information Theory 58(11): 6989-7001 (2012) - [c58]Dana Dachman-Soled, Rosario Gennaro, Hugo Krawczyk, Tal Malkin:
Computational Extractors and Pseudorandomness. TCC 2012: 383-403 - 2011
- [c57]Boaz Barak, Yevgeniy Dodis, Hugo Krawczyk, Olivier Pereira, Krzysztof Pietrzak, François-Xavier Standaert, Yu Yu:
Leftover Hash Lemma, Revisited. CRYPTO 2011: 1-20 - [c56]Shai Halevi, Hugo Krawczyk:
One-Pass HMQV and Asymmetric Key-Wrapping. Public Key Cryptography 2011: 317-334 - [r2]Hugo Krawczyk:
Perfect Forward Secrecy. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 921-922 - [i25]Boaz Barak, Yevgeniy Dodis, Hugo Krawczyk, Olivier Pereira, Krzysztof Pietrzak, François-Xavier Standaert, Yu Yu:
Leftover Hash Lemma, Revisited. IACR Cryptology ePrint Archive 2011: 88 (2011) - [i24]Dana Dachman-Soled, Rosario Gennaro, Hugo Krawczyk, Tal Malkin:
Computational Extractors and Pseudorandomness. IACR Cryptology ePrint Archive 2011: 708 (2011) - 2010
- [c55]Rosario Gennaro, Hugo Krawczyk, Tal Rabin:
Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead. ACNS 2010: 309-328 - [c54]
- [c53]Rosario Gennaro, Jonathan Katz, Hugo Krawczyk, Tal Rabin:
Secure Network Coding over the Integers. Public Key Cryptography 2010: 142-160 - [i23]Demijan Klinc, Carmit Hazay, Ashish Jagmohan, Hugo Krawczyk, Tal Rabin:
On Compression of Data Encrypted with Block Ciphers. CoRR abs/1009.1759 (2010) - [i22]Rosario Gennaro, Hugo Krawczyk, Tal Rabin:
Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead. IACR Cryptology ePrint Archive 2010: 68 (2010) - [i21]Hugo Krawczyk:
Cryptographic Extraction and Key Derivation: The HKDF Scheme. IACR Cryptology ePrint Archive 2010: 264 (2010) - [i20]Demijan Klinc, Carmit Hazay, Ashish Jagmohan, Hugo Krawczyk, Tal Rabin:
On Compression of Data Encrypted with Block Ciphers. IACR Cryptology ePrint Archive 2010: 477 (2010) - [i19]Shai Halevi, Hugo Krawczyk:
One-Pass HMQV and Asymmetric Key-Wrapping. IACR Cryptology ePrint Archive 2010: 638 (2010) - [i18]Hugo Krawczyk, Pasi Eronen:
HMAC-based Extract-and-Expand Key Derivation Function (HKDF). RFC 5869: 1-14 (2010)
2000 – 2009
- 2009
- [c52]Demijan Klinc, Carmit Hazay, Ashish Jagmohan, Hugo Krawczyk, Tal Rabin:
On Compression of Data Encrypted with Block Ciphers. DCC 2009: 213-222 - [i17]Rosario Gennaro, Jonathan Katz, Hugo Krawczyk, Tal Rabin:
Secure Network Coding Over the Integers. IACR Cryptology ePrint Archive 2009: 569 (2009) - 2008
- [c51]Rosario Gennaro, Shai Halevi, Hugo Krawczyk, Tal Rabin, Steffen Reidt, Stephen D. Wolthusen:
Strongly-Resilient and Non-interactive Hierarchical Key-Agreement in MANETs. ESORICS 2008: 49-65 - [c50]Rosario Gennaro, Shai Halevi, Hugo Krawczyk, Tal Rabin:
Threshold RSA for Dynamic and Ad-Hoc Groups. EUROCRYPT 2008: 88-107 - [i16]Rosario Gennaro, Shai Halevi, Hugo Krawczyk, Tal Rabin:
Threshold RSA for Dynamic and Ad-Hoc Groups. IACR Cryptology ePrint Archive 2008: 45 (2008) - [i15]Rosario Gennaro, Shai Halevi, Hugo Krawczyk, Tal Rabin, Steffen Reidt, Stephen D. Wolthusen:
Strongly-Resilient and Non-Interactive Hierarchical Key-Agreement in MANETs. IACR Cryptology ePrint Archive 2008: 308 (2008) - 2007
- [j16]Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin:
Secure Distributed Key Generation for Discrete-Log Based Cryptosystems. J. Cryptology 20(1): 51-83 (2007) - [j15]Rosario Gennaro, Tal Rabin, Stanislaw Jarecki, Hugo Krawczyk:
Robust and Efficient Sharing of RSA Functions. J. Cryptology 20(3): 393 (2007) - [j14]Rosario Gennaro, Tal Rabin, Hugo Krawczyk:
RSA-Based Undeniable Signatures. J. Cryptology 20(3): 394 (2007) - [c49]Shai Halevi, Hugo Krawczyk:
Security under key-dependent inputs. ACM Conference on Computer and Communications Security 2007: 466-475 - [i14]Shai Halevi, Hugo Krawczyk:
Security under Key-Dependent Inputs. IACR Cryptology ePrint Archive 2007: 315 (2007) - 2006
- [c48]Mario Di Raimondo, Rosario Gennaro, Hugo Krawczyk:
Deniable authentication and key exchange. ACM Conference on Computer and Communications Security 2006: 400-409 - [c47]Shai Halevi, Hugo Krawczyk:
Strengthening Digital Signatures Via Randomized Hashing. CRYPTO 2006: 41-59 - [i13]Mario Di Raimondo, Rosario Gennaro, Hugo Krawczyk:
Deniable Authentication and Key Exchange. IACR Cryptology ePrint Archive 2006: 280 (2006) - 2005
- [c46]
- [c45]Mario Di Raimondo, Rosario Gennaro, Hugo Krawczyk:
Secure off-the-record messaging. WPES 2005: 81-89 - [r1]
- [i12]Hugo Krawczyk:
HMQV: A High-Performance Secure Diffie-Hellman Protocol. IACR Cryptology ePrint Archive 2005: 176 (2005) - 2004
- [c44]Yevgeniy Dodis, Rosario Gennaro, Johan Håstad, Hugo Krawczyk, Tal Rabin:
Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes. CRYPTO 2004: 494-510 - [c43]Rosario Gennaro, Hugo Krawczyk, Tal Rabin:
Secure Hashed Diffie-Hellman over Non-DDH Groups. EUROCRYPT 2004: 361-381 - [i11]Rosario Gennaro, Hugo Krawczyk, Tal Rabin:
Secure Hashed Diffie-Hellman over Non-DDH Groups. IACR Cryptology ePrint Archive 2004: 99 (2004) - 2003
- [c42]Hugo Krawczyk:
SIGMA: The 'SIGn-and-MAc' Approach to Authenticated Diffie-Hellman and Its Use in the IKE-Protocols. CRYPTO 2003: 400-425 - [c41]Ran Canetti, Hugo Krawczyk, Jesper Buus Nielsen:
Relaxing Chosen-Ciphertext Security. CRYPTO 2003: 565-582 - [c40]Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin:
Secure Applications of Pedersen's Distributed Key Generation Protocol. CT-RSA 2003: 373-390 - [c39]Helmut Scherzer, Ran Canetti, Paul A. Karger, Hugo Krawczyk, Tal Rabin, David C. Toll:
Authenticating Mandatory Access Controls and Preserving Privacy for a High-Assurance Smart Card. ESORICS 2003: 181-200 - [i10]Ran Canetti, Hugo Krawczyk, Jesper Buus Nielsen:
Relaxing Chosen-Ciphertext Security. IACR Cryptology ePrint Archive 2003: 174 (2003) - 2002
- [c38]Ran Canetti, Hugo Krawczyk:
Security Analysis of IKE's Signature-Based Key-Exchange Protocol. CRYPTO 2002: 143-161 - [c37]Ran Canetti, Hugo Krawczyk:
Universally Composable Notions of Key Exchange and Secure Channels. EUROCRYPT 2002: 337-351 - [i9]Ran Canetti, Hugo Krawczyk:
Universally Composable Notions of Key Exchange and Secure Channels. IACR Cryptology ePrint Archive 2002: 59 (2002) - [i8]Ran Canetti, Hugo Krawczyk:
Security Analysis of IKE's Signature-based Key-Exchange Protocol. IACR Cryptology ePrint Archive 2002: 120 (2002) - 2001
- [j13]Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin:
Robust Threshold DSS Signatures. Inf. Comput. 164(1): 54-84 (2001) - [c36]Hugo Krawczyk:
The Order of Encryption and Authentication for Protecting Communications (or: How Secure Is SSL?). CRYPTO 2001: 310-331 - [c35]Ran Canetti, Hugo Krawczyk:
Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels. EUROCRYPT 2001: 453-474 - [i7]Ran Canetti, Hugo Krawczyk:
Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels. IACR Cryptology ePrint Archive 2001: 40 (2001) - [i6]Hugo Krawczyk:
Simple Forward-Secure Signatures From Any Signature Scheme. IACR Cryptology ePrint Archive 2001: 42 (2001) - [i5]Hugo Krawczyk:
The order of encryption and authentication for protecting communications (Or: how secure is SSL?). IACR Cryptology ePrint Archive 2001: 45 (2001) - 2000
- [j12]Rosario Gennaro, Tal Rabin, Stanislaw Jarecki, Hugo Krawczyk:
Robust and Efficient Sharing of RSA Functions. J. Cryptology 13(2): 273-300 (2000) - [j11]Rosario Gennaro, Tal Rabin, Hugo Krawczyk:
RSA-Based Undeniable Signatures. J. Cryptology 13(4): 397-416 (2000) - [j10]Mihir Bellare, Juan A. Garay, Ralf C. Hauser, Amir Herzberg, Hugo Krawczyk, Michael Steiner, Gene Tsudik, Els Van Herreweghen, Michael Waidner:
Design, implementation, and deployment of the iKP secure electronic payment system. IEEE Journal on Selected Areas in Communications 18(4): 611-627 (2000) - [c34]Hugo Krawczyk:
Simple forward-secure signatures from any signature scheme. ACM Conference on Computer and Communications Security 2000: 108-115 - [c33]
1990 – 1999
- 1999
- [j9]Giuseppe Ateniese, Amir Herzberg, Hugo Krawczyk, Gene Tsudik:
Untraceable mobility or how to travel incognito. Computer Networks 31(8): 871-884 (1999) - [j8]Shai Halevi, Hugo Krawczyk:
Public-Key Cryptography and Password Protocols. ACM Trans. Inf. Syst. Secur. 2(3): 230-268 (1999) - [c32]Ran Canetti, Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin:
Adaptive Security for Threshold Cryptosystems. CRYPTO 1999: 98-115 - [c31]John Black, Shai Halevi, Hugo Krawczyk, Ted Krovetz, Phillip Rogaway:
UMAC: Fast and Secure Message Authentication. CRYPTO 1999: 216-233 - [c30]Mihir Bellare, Oded Goldreich, Hugo Krawczyk:
Stateless Evaluation of Pseudorandom Functions: Security beyond the Birthday Barrier. CRYPTO 1999: 270-287 - [c29]Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin:
Secure Distributed Key Generation for Discrete-Log Based Cryptosystems. EUROCRYPT 1999: 295-310 - [c28]Hugo Krawczyk:
Blinding of Credit Card Numbers in the SET Protocol. Financial Cryptography 1999: 17-28 - [i4]Shai Halevi, Hugo Krawczyk:
Public-key cryptography and password protocols. IACR Cryptology ePrint Archive 1999: 4 (1999) - 1998
- [j7]Pau-Chen Cheng, Juan A. Garay, Amir Herzberg, Hugo Krawczyk:
A Security Architecture for the Internet Protocol. IBM Systems Journal 37(1): 42-60 (1998) - [c27]Shai Halevi, Hugo Krawczyk:
Public-Key Cryptography and Password Protocols. ACM Conference on Computer and Communications Security 1998: 122-131 - [c26]Mihir Bellare, Ran Canetti, Hugo Krawczyk:
A Modular Approach to the Design and Analysis of Authentication and Key Exchange Protocols (Extended Abstract). STOC 1998: 419-428 - [e1]Hugo Krawczyk:
Advances in Cryptology - CRYPTO '98, 18th Annual International Cryptology Conference, Santa Barbara, California, USA, August 23-27, 1998, Proceedings. Lecture Notes in Computer Science 1462, Springer 1998, ISBN 3-540-64892-5 [contents] - [i3]Mihir Bellare, Ran Canetti, Hugo Krawczyk:
A Modular Approach to the Design and Analysis of Authentication and Key Exchange Protocols. IACR Cryptology ePrint Archive 1998: 9 (1998) - [i2]Hugo Krawczyk, Tal Rabin:
Chameleon Hashing and Signatures. IACR Cryptology ePrint Archive 1998: 10 (1998) - 1997
- [c25]Amir Herzberg, Markus Jakobsson, Stanislaw Jarecki, Hugo Krawczyk, Moti Yung:
Proactive Public Key and Signature Systems. ACM Conference on Computer and Communications Security 1997: 100-110 - [c24]
- [c23]Shai Halevi, Hugo Krawczyk:
MMH: Software Message Authentication in the Gbit/Second Rates. FSE 1997: 172-189 - [i1]Hugo Krawczyk, Mihir Bellare, Ran Canetti:
HMAC: Keyed-Hashing for Message Authentication. RFC 2104: 1-11 (1997) - 1996
- [j6]Oded Goldreich, Hugo Krawczyk:
On the Composition of Zero-Knowledge Proof Systems. SIAM J. Comput. 25(1): 169-192 (1996) - [c22]Mihir Bellare, Ran Canetti, Hugo Krawczyk:
Keying Hash Functions for Message Authentication. CRYPTO 1996: 1-15 - [c21]Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin:
Robust and Efficient Sharing of RSA Functions. CRYPTO 1996: 157-172 - [c20]Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin:
Robust Threshold DSS Signatures. EUROCRYPT 1996: 354-371 - [c19]Mihir Bellare, Ran Canetti, Hugo Krawczyk:
Pseudorandom Functions Revisited: The Cascade Construction and Its Concrete Security. FOCS 1996: 514-523 - [c18]
- 1995
- [j5]Yair Frankel, Amir Herzberg, Paul A. Karger, Hugo Krawczyk, Charles A. Kunzinger, Mordechai M. Yung:
Security issues in a CDPD wireless network. IEEE Personal Commun. 2(4): 16-27 (1995) - [c17]Amir Herzberg, Stanislaw Jarecki, Hugo Krawczyk, Moti Yung:
Proactive Secret Sharing Or: How to Cope With Perpetual Leakage. CRYPTO 1995: 339-352 - [c16]
- [c15]Pau-Chen Cheng, Juan A. Garay, Amir Herzberg, Hugo Krawczyk:
Securing the Internet (Abstract). PODC 1995: 257 - [c14]Pau-Chen Cheng, Juan A. Garay, Amir Herzberg, Hugo Krawczyk:
Design and Implementation of Modular Key Management Protocol and IP Secure Tunnel on AIX. USENIX Security Symposium 1995 - 1994
- [c13]
- [c12]
- 1993
- [j4]Oded Goldreich, Hugo Krawczyk, Michael Luby:
On the Existence of Pseudorandom Generators. SIAM J. Comput. 22(6): 1163-1175 (1993) - [c11]
- [c10]
- [c9]
- [c8]
- 1992
- [j3]
- [j2]Oded Goldreich, Hugo Krawczyk:
Sparse Pseudorandom Distributions. Random Struct. Algorithms 3(2): 163-174 (1992) - 1991
- [c7]