Hugo Krawczyk  Hugo  Krawczyk photo       

contact information

IBM Fellow, Distinguished Research Staff Member
Thomas J. Watson Research Center, Yorktown Heights, NY USA
  +1dash914dash945dash1771

links

Professional Associations

Professional Associations:  IBM Academy of Technology  |  International Association for Cryptologic Research (IACR)


2017

SPHINX: A password store that perfectly hides passwords from itself
Shirvanian, Maliheh and Jareckiy, Stanislaw and Krawczyk, Hugo and Saxena, Nitesh
37th IEEE International Conference on Distributed Computing Systems (ICDCS 2017), pp. 1094--1104
Abstract

Robust Non-Interactive Multiparty Computation Against Constant-Size Collusion
Benhamouda, Fabrice and Krawczyk, Hugo and Rabin, Tal
Advances in Cryptology - CRYPTO 2017, pp. 391--419
Abstract

TOPPSS: Cost-minimal Password-Protected Secret Sharing based on Threshold OPRF
Jarecki, Stanislaw and Kiayias, Aggelos and Krawczyk, Hugo and Xu, Jiayu
15th International Conference on Applied Cryptography and Network Security (ACNS2017)
Abstract


2016

A Unilateral-to-Mutual Authentication Compiler for Key Exchange (with Applications to Client Authentication in TLS 1.3)
Krawczyk, Hugo
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 1438--1450
Abstract

Attribute-based key exchange with general policies
Kolesnikov, Vladimir and Krawczyk, Hugo and Lindell, Yehuda and Malozemoff, Alex and Rabin, Tal
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 1451--1463
Abstract

Device-enhanced password protocols with optimal online-offline protection
Jarecki, Stanislaw and Krawczyk, Hugo and Shirvanian, Maliheh and Saxena, Nitesh
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, pp. 177--188, 2016
Abstract

Highly-efficient and composable password-protected secret sharing (or: how to protect your bitcoin wallet online)
Jarecki, Stanislaw and Kiayias, Aggelos and Krawczyk, Hugo and Xu, Jiayu
Security and Privacy (EuroS&P), 2016 IEEE European Symposium on, pp. 276--291
Abstract

The OPTLS protocol and TLS 1.3
Krawczyk, Hugo and Wee, Hoeteck
Security and Privacy (EuroS&P), 2016 IEEE European Symposium on, pp. 81--96
Abstract


2015

Rich queries on encrypted data: Beyond exact matches
Faber, Sky and Jarecki, Stanislaw and Krawczyk, Hugo and Nguyen, Quan and Rosu, Marcel and Steiner, Michael
European Symposium on Research in Computer Security, pp. 123--145, 2015
Abstract


2014

Round-optimal password-protected secret sharing and T-PAKE in the password-only model
Jarecki, Stanislaw and Kiayias, Aggelos and Krawczyk, Hugo
International Conference on the Theory and Application of Cryptology and Information Security, pp. 233--253, 2014
Abstract

Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation.
Cash, David and Jaeger, Joseph and Jarecki, Stanislaw and Jutla, Charanjit S and Krawczyk, Hugo and Rosu, Marcel-Catalin and Steiner, Michael
NDSS, pp. 23--26, 2014
Abstract


2013

Outsourced symmetric private information retrieval
Jarecki, Stanislaw and Jutla, Charanjit and Krawczyk, Hugo and Rosu, Marcel and Steiner, Michael
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, pp. 875--888
Abstract

On the security of the TLS protocol: A systematic analysis
Krawczyk, Hugo and Paterson, Kenneth G and Wee, Hoeteck
Advances in Cryptology--CRYPTO 2013, pp. 429--448, Springer
Abstract

Highly-scalable searchable symmetric encryption with support for boolean queries
Cash, David and Jarecki, Stanislaw and Jutla, Charanjit and Krawczyk, Hugo and Ro{\c{s}}u, Marcel-C{\u{a}}t{\u{a}}lin and Steiner, Michael
Advances in Cryptology--CRYPTO 2013, pp. 353--373, Springer
Abstract


2012

On compression of data encrypted with block ciphers
Klinc, Demijan and Hazay, Carmit and Jagmohan, Ashish and Krawczyk, Hugo and Rabin, Tal
IEEE transactions on information theory 58(11), 6989--7001, IEEE, 2012
Abstract


2011

Quantitative evaluation of secure network coding using homomorphic signature/hashing
Lee, Seung-Hoon and Gerla, Mario and Krawczyk, Hugo and Lee, Kang-Won and Quaglia, Elizabeth A
IEEE International Symposium on Network Coding, 2011
Abstract

Performance evaluation of secure network coding using homomorphic signature
Lee, Seung-Hoon and Gerla, Mario and Krawczyk, Hugo and Lee, Kang-Won and Quaglia, Elizabeth A
Network Coding (NetCod), 2011 International Symposium on, pp. 1--6
Abstract

One-pass HMQV and asymmetric key-wrapping
Halevi, Shai and Krawczyk, Hugo
International Workshop on Public Key Cryptography, pp. 317--334, 2011
Abstract

Leftover hash lemma, revisited
Barak, Boaz and Dodis, Yevgeniy and Krawczyk, Hugo and Pereira, Olivier and Pietrzak, Krzysztof and Standaert, Fran{\c{c}}ois-Xavier and Yu, Yu
Annual Cryptology Conference, pp. 1--20, 2011
Abstract


2010

Okamoto-Tanaka revisited: Fully authenticated Diffie-Hellman with minimal overhead
Gennaro, Rosario and Krawczyk, Hugo and Rabin, Tal
International Conference on Applied Cryptography and Network Security, pp. 309--328, 2010
Abstract

Hmac-based extract-and-expand key derivation function (hkdf)
Krawczyk, Hugo and Eronen, Pasi
2010 - tools.ietf.org
Abstract

Cryptographic extraction and key derivation: The HKDF scheme
Krawczyk, Hugo
Annual Cryptology Conference, pp. 631--648, 2010
Abstract

Secure network coding over the integers
Gennaro, Rosario and Katz, Jonathan and Krawczyk, Hugo and Rabin, Tal
International Workshop on Public Key Cryptography, pp. 142--160, 2010
Abstract


2008

Threshold RSA for dynamic and ad-hoc groups
Gennaro, Rosario and Halevi, Shai and Krawczyk, Hugo and Rabin, Tal
Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 88--107, 2008
Abstract

Strongly-resilient and non-interactive hierarchical key-agreement in MANETs
Gennaro, Rosario and Halevi, Shai and Krawczyk, Hugo and Rabin, Tal and Reidt, Steffen and Wolthusen, Stephen D
European Symposium on Research in Computer Security, pp. 49--65, 2008
Abstract


2007

Security under key-dependent inputs
Halevi, Shai and Krawczyk, Hugo
Proceedings of the 14th ACM conference on Computer and communications security, pp. 466--475, 2007
Abstract


2006

Deniable authentication and key exchange
Di Raimondo, Mario and Gennaro, Rosario and Krawczyk, Hugo
Proceedings of the 13th ACM conference on Computer and communications security, pp. 400--409, 2006
Abstract

Strengthening digital signatures via randomized hashing
Halevi, Shai and Krawczyk, Hugo
Annual International Cryptology Conference, pp. 41--59, 2006
Abstract


2005

Secure off-the-record messaging
Di Raimondo, Mario and Gennaro, Rosario and Krawczyk, Hugo
Proceedings of the 2005 ACM workshop on Privacy in the electronic society, pp. 81--89
Abstract

HMQV: A high-performance secure Diffie-Hellman protocol
Krawczyk, Hugo
Annual International Cryptology Conference, pp. 546--566, 2005
Abstract


2004

Secure hashed Diffie-Hellman over non-DDH groups
Gennaro, Rosario and Krawczyk, Hugo and Rabin, Tal
International Conference on the Theory and Applications of Cryptographic Techniques, pp. 361--381, 2004
Abstract

Randomness extraction and key derivation using the CBC, cascade and HMAC modes
Dodis, Yevgeniy and Gennaro, Rosario and H{\aa}stad, Johan and Krawczyk, Hugo and Rabin, Tal
Annual International Cryptology Conference, pp. 494--510, 2004
Abstract


2003

Revisiting the distributed key generation for discrete-log based cryptosystems
Gennaro, Rosario and Jarecki, Stanislaw and Krawczyk, Hugo and Rabin, Tal
RSA Security’03, 89--104, 2003
Abstract

Authenticating mandatory access controls and preserving privacy for a high-assurance smart card
Scherzer, Helmut and Canetti, Ran and Karger, Paul A and Krawczyk, Hugo and Rabin, Tal and Toll, David C
European Symposium on Research in Computer Security, pp. 181--200, 2003
Abstract

Secure applications of Pedersen’s distributed key generation protocol
Gennaro, Rosario and Jarecki, Stanislaw and Krawczyk, Hugo and Rabin, Tal
Cryptographers’ Track at the RSA Conference, pp. 373--390, 2003
Abstract

SIGMA: The ‘SIGn-and-MAc’approach to authenticated Diffie-Hellman and its use in the IKE protocols
Krawczyk, Hugo
Annual International Cryptology Conference, pp. 400--425, 2003
Abstract

SIGMA: The ‘SIGn-and-MAc’approach to authenticated Diffie-Hellman and its use in the IKE protocols
Krawczyk, Hugo
Annual International Cryptology Conference, pp. 400--425, 2003
Abstract

SIGMA: The ‘SIGn-and-MAc’approach to authenticated Diffie-Hellman and its use in the IKE protocols
Krawczyk, Hugo
Annual International Cryptology Conference, pp. 400--425, 2003
Abstract

Relaxing chosen-ciphertext security
Canetti, Ran and Krawczyk, Hugo and Nielsen, Jesper B
Annual International Cryptology Conference, pp. 565--582, 2003
Abstract


2002

Universally composable notions of key exchange and secure channels
Canetti, Ran and Krawczyk, Hugo
International Conference on the Theory and Applications of Cryptographic Techniques, pp. 337--351, 2002
Abstract

Security analysis of IKE’s signature-based key-exchange protocol
Canetti, Ran and Krawczyk, Hugo
Annual International Cryptology Conference, pp. 143--161, 2002
Abstract


2001

Analysis of key-exchange protocols and their use for building secure channels
Canetti, Ran and Krawczyk, Hugo
International Conference on the Theory and Applications of Cryptographic Techniques, pp. 453--474, 2001
Abstract

The order of encryption and authentication for protecting communications (or: How secure is SSL?)
Krawczyk, Hugo
Annual International Cryptology Conference, pp. 310--331, 2001
Abstract


2000

RSA-based undeniable signatures
Gennaro, Rosario and Rabin, Tal and Krawczyk, Hugo
Journal of cryptology 13(4), 397--416, Springer, 2000
Abstract

Simple forward-secure signatures from any signature scheme
Krawczyk, Hugo
Proceedings of the 7th ACM conference on Computer and communications security, pp. 108--115, 2000
Abstract

Design, implementation, and deployment of the iKP secure electronic payment system
Bellare, Mihir and Garay, Juan A and Hauser, Ralf and Herzberg, Amir and Krawczyk, Hugo and Steiner, Michael and Tsudik, Gene and Van Herreweghen, Els and Waidner, Michael
IEEE Journal on selected areas in communications 18(4), 611--627, IEEE, 2000
Abstract


1999

Design, implementation and deployment of a secure account-based electronic payment system
Bellare, Mihir and Garay, Juan and Hauser, Ralf and Herzberg, Amir and Krawczyk, Hugo and Steiner, Michael and Tsudik, Gene and Van Herreweghen, Els and Waidner, Michael
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1999
Abstract

Blinding of credit card numbers in the SET protocol
Krawczyk, Hugo
International Conference on Financial Cryptography, pp. 17--28, 1999
Abstract

Stateless evaluation of pseudorandom functions: Security beyond the birthday barrier
Bellare, Mihir and Goldreich, Oded and Krawczyk, Hugo
Annual International Cryptology Conference, pp. 270--287, 1999
Abstract

Untraceable mobility or how to travel incognito
Ateniese, Giuseppe and Herzberg, Amir and Krawczyk, Hugo and Tsudik, Gene
Computer Networks 31(8), 871--884, Elsevier, 1999
Abstract

Public-key cryptography and password protocols
Halevi, Shai and Krawczyk, Hugo
ACM Transactions on Information and System Security (TISSEC) 2(3), 230--268, ACM, 1999
Abstract

Secure distributed key generation for discrete-log based cryptosystems
Gennaro, Rosario and Jarecki, Stanis{\l}aw and Krawczyk, Hugo and Rabin, Tal
International Conference on the Theory and Applications of Cryptographic Techniques, pp. 295--310, 1999
Abstract

Adaptive security for threshold cryptosystems
Canetti, Ran and Gennaro, Rosario and Jarecki, Stanis{\l}aw and Krawczyk, Hugo and Rabin, Tal
Annual International Cryptology Conference, pp. 98--116, 1999
Abstract

UMAC: Fast and secure message authentication
Black, John and Halevi, Shai and Krawczyk, Hugo and Krovetz, Ted and Rogaway, Phillip
Annual International Cryptology Conference, pp. 216--233, 1999
Abstract


1998

A security architecture for the internet protocol
Cheng, P-C and Garay, Juan A. and Herzberg, Amir and Krawczyk, Hugo
IBM Systems Journal 37(1), 42--60, IBM, 1998
Abstract

Chameleon Hashing and Signatures.
Krawczyk, Hugo and Rabin, Tal
IACR Cryptology ePrint Archive1998, 10
Abstract

A modular approach to the design and analysis of authentication and key exchange protocols
Bellare, Mihir and Canetti, Ran and Krawczyk, Hugo
Proceedings of the thirtieth annual ACM symposium on Theory of computing, pp. 419--428, 1998
Abstract


1997

HMAC: Keyed-hashing for message authentication
Krawczyk, Hugo and Canetti, Ran and Bellare, Mihir
1997 - tools.ietf.org
Abstract

MMH: Software message authentication in the Gbit/second rates
Halevi, Shai and Krawczyk, Hugo
International Workshop on Fast Software Encryption, pp. 172--189, 1997
Abstract

Proactive public key and signature systems
Herzberg, Amir and Jakobsson, Markus and Jarecki, Stanisl{\l}aw and Krawczyk, Hugo and Yung, Moti
Proceedings of the 4th ACM conference on Computer and communications security, pp. 100--110, 1997
Abstract


1996

Keying hash functions for message authentication
Bellare, Mihir and Canetti, Ran and Krawczyk, Hugo
Annual International Cryptology Conference, pp. 1--15, 1996
Abstract

Pseudorandom functions revisited: The cascade construction and its concrete security
Bellare, Mihir and Canetti, Ran and Krawczyk, Hugo
Foundations of Computer Science, 1996. Proceedings., 37th Annual Symposium on, pp. 514--523
Abstract

On the composition of zero-knowledge proof systems
Goldreich, Oded and Krawczyk, Hugo
SIAM Journal on Computing 25(1), 169--192, SIAM, 1996
Abstract

Robust threshold DSS signatures
Gennaro, Rosario and Jarecki, Stanis{\l}aw and Krawczyk, Hugo and Rabin, Tal
International Conference on the Theory and Applications of Cryptographic Techniques, pp. 354--371, 1996
Abstract

Robust and efficient sharing of RSA functions
Gennaro, Rosario and Jarecki, Stanis{\l}aw and Krawczyk, Hugo and Rabin, Tal
Advances in Cryptology—CRYPTO’96, pp. 157--172, 1996
Abstract

SKEME: A versatile secure key exchange mechanism for internet
Krawczyk, Hugo
Network and Distributed System Security, 1996., Proceedings of the Symposium on, pp. 114--127
Abstract

Message authentication using hash functions: The HMAC construction
Bellare, Mihir and Canetti, Ran and Krawczyk, Hugo
RSA Laboratories’ CryptoBytes 2(1), 12--15, 1996
Abstract


1995

Securing the internet protocol
Cheng, Pau-Chen and Garay, Juan A and Herzberg, Amir and Krawczyk, Hugo
Proceedings of the fourteenth annual ACM symposium on Principles of distributed computing, pp. 257, 1995
Abstract

Design and Implementation of Modular Key Management Protocol and IP Secure Tunnel on AIX.
Cheng, Pau-Chen and Garay, Juan A and Herzberg, Amir and Krawczyk, Hugo
USENIX Security, 1995
Abstract

New hash functions for message authentication
Krawczyk, Hugo
International Conference on the Theory and Applications of Cryptographic Techniques, pp. 301--310, 1995
Abstract

Proactive secret sharing or: How to cope with perpetual leakage
Herzberg, Amir and Jarecki, Stanis{\l}aw and Krawczyk, Hugo and Yung, Moti
Annual International Cryptology Conference, pp. 339--352, 1995
Abstract


1994

The shrinking generator: Some practical considerations
Krawczyk, Hugo
Fast Software Encryption, pp. 45--46, 1994
Abstract

On travelling incognito
Herzberg, Amir and Krawczyk, Hugo and Tsudik, Gene
Mobile Computing Systems and Applications, 1994. WMCSA 1994. First Workshop on, pp. 205--211
Abstract

LFSR-based hashing and authentication
Krawczyk, Hugo
Annual International Cryptology Conference, pp. 129--139, 1994
Abstract


1993

Secret sharing made short
Krawczyk, Hugo
Annual International Cryptology Conference, pp. 136--146, 1993
Abstract

Distributed fingerprints and secure information dispersal
Krawczyk, Hugo
Proceedings of the twelfth annual ACM symposium on Principles of distributed computing, pp. 207--218, 1993
Abstract

On the existence of pseudorandom generators
Goldreich, Oded and Krawczyk, Hugo and Luby, Michael
SIAM Journal on Computing 22(6), 1163--1175, SIAM, 1993
Abstract

The shrinking generator
Coppersmith, Don and Krawczyk, Hugo and Mansour, Yishay
Annual International Cryptology Conference, pp. 22--39, 1993
Abstract


1992

Sparse pseudorandom distributions
Goldreich, Oded and Krawczyk, Hugo
Random Structures and Algorithms 3(2), 163--174, Wiley Subscription Services, Inc., A Wiley Company, 1992
Abstract

How to predict congruential generators
Krawczyk, Hugo
Journal of Algorithms 13(4), 527--545, Elsevier, 1992
Abstract


1991

Code duplication: An assist for global instruction scheduling
Bernstein, David and Cohen, Doron and Krawczyk, Hugo
Proceedings of the 24th annual international symposium on Microarchitecture, pp. 103--113, 1991
Abstract


1989

The diophantine problem of Frobenius: a close bound
Krawczyk, Hugo and Paz, Azaria
Discrete Applied Mathematics 23(3), 289--291, Elsevier, 1989
Abstract




Technical Areas