The following pages link to Hugo Krawczyk (Q882773):
Displaying 50 items.
- Secure distributed key generation for discrete-log based cryptosystems (Q882774) (← links)
- The diophantine problem of Frobenius: A close bound (Q1119676) (← links)
- RSA-based undeniable signatures (Q1590358) (← links)
- OPAQUE: an asymmetric PAKE protocol secure against pre-computation attacks (Q1653103) (← links)
- Robust non-interactive multiparty computation against constant-size collusion (Q1675732) (← links)
- Two-factor authentication with end-to-end password security (Q1753861) (← links)
- Robust threshold DSS signatures (Q1854399) (← links)
- Robust and efficient sharing of RSA functions. (Q1976268) (← links)
- Can a public blockchain keep a secret? (Q2055723) (← links)
- On the (in)security of the Diffie-Hellman oblivious PRF with multiplicative blinding (Q2061963) (← links)
- YOSO: You only speak once. Secure MPC with stateless ephemeral roles (Q2128556) (← links)
- KHAPE: Asymmetric PAKE from key-hiding key exchange (Q2139655) (← links)
- Asymmetric PAKE with low computation \textit{and} communication (Q2170042) (← links)
- On the cryptographic deniability of the Signal protocol (Q2229399) (← links)
- (Q2757253) (← links)
- (Q2778861) (← links)
- Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries (Q2845683) (← links)
- On the Security of the TLS Protocol: A Systematic Analysis (Q2845687) (← links)
- Robust Threshold DSS Signatures (Q2876915) (← links)
- Computational Extractors and Pseudorandomness (Q2891496) (← links)
- Round-Optimal Password-Protected Secret Sharing and T-PAKE in the Password-Only Model (Q2936611) (← links)
- On Compression of Data Encrypted With Block Ciphers (Q2989724) (← links)
- One-Pass HMQV and Asymmetric Key-Wrapping (Q3084356) (← links)
- Keying Hash Functions for Message Authentication (Q3452335) (← links)
- Robust and Efficient Sharing of RSA Functions (Q3452349) (← links)
- Secure Network Coding over the Integers (Q3562893) (← links)
- Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead (Q3575055) (← links)
- Cryptographic Extraction and Key Derivation: The HKDF Scheme (Q3582781) (← links)
- Sparse pseudorandom distributions (Q3990219) (← links)
- How to predict congruential generators (Q4015278) (← links)
- (Q4038698) (← links)
- (Q4250769) (← links)
- On the Existence of Pseudorandom Generators (Q4277535) (← links)
- (Q4341730) (← links)
- (Q4341739) (← links)
- (Q4343446) (← links)
- (Q4364547) (← links)
- (Q4409115) (← links)
- (Q4418550) (← links)
- The Shrinking Generator: some practical considerations (Q4499392) (← links)
- (Q4542560) (← links)
- MMH: Software message authentication in the Gbit/second rates (Q4639339) (← links)
- (Q4737255) (← links)
- (Q4783733) (← links)
- (Q4817502) (← links)
- On the Composition of Zero-Knowledge Proof Systems (Q4875450) (← links)
- (Q4940691) (← links)
- (Q4941185) (← links)
- (Q4941850) (← links)
- (Q4941857) (← links)