HMAC: Keyed-hashing for message authentication H Krawczyk, M Bellare, R Canetti | 3812 | 1997 |
Keying hash functions for message authentication M Bellare, R Canetti, H Krawczyk Advances in Cryptology—CRYPTO’96: 16th Annual International Cryptology …, 1996 | 2520 | 1996 |
Analysis of key-exchange protocols and their use for building secure channels R Canetti, H Krawczyk International conference on the theory and applications of cryptographic …, 2001 | 2069 | 2001 |
Secure distributed key generation for discrete-log based cryptosystems R Gennaro, S Jarecki, H Krawczyk, T Rabin Journal of Cryptology 20, 51-83, 2007 | 1239* | 2007 |
Proactive secret sharing or: How to cope with perpetual leakage A Herzberg, S Jarecki, H Krawczyk, M Yung Advances in Cryptology—CRYPT0’95: 15th Annual International Cryptology …, 1995 | 1163 | 1995 |
Highly-scalable searchable symmetric encryption with support for boolean queries D Cash, S Jarecki, C Jutla, H Krawczyk, MC Roşu, M Steiner Advances in Cryptology–CRYPTO 2013: 33rd Annual Cryptology Conference, Santa …, 2013 | 1056 | 2013 |
HMQV: A high-performance secure Diffie-Hellman protocol H Krawczyk Annual international cryptology conference, 546-566, 2005 | 956 | 2005 |
Chameleon Signatures. H Krawczyk, T Rabin NDSS, 2000 | 915* | 2000 |
Dynamic searchable encryption in very-large databases: Data structures and implementation D Cash, J Jaeger, S Jarecki, C Jutla, H Krawczyk, MC Roşu, M Steiner Cryptology ePrint Archive, 2014 | 861 | 2014 |
Universally composable notions of key exchange and secure channels R Canetti, H Krawczyk Advances in Cryptology—EUROCRYPT 2002: International Conference on the …, 2002 | 806 | 2002 |
A modular approach to the design and analysis of authentication and key exchange protocols M Bellare, R Canetti, H Krawczyk Proceedings of the thirtieth annual ACM symposium on Theory of computing …, 1998 | 751 | 1998 |
Robust threshold DSS signatures R Gennaro, S Jarecki, H Krawczyk, T Rabin Advances in Cryptology—EUROCRYPT’96: International Conference on the Theory …, 1996 | 741 | 1996 |
LFSR-based hashing and authentication H Krawczyk Annual International Cryptology Conference, 129-139, 1994 | 696 | 1994 |
UMAC: Fast and secure message authentication J Black, S Halevi, H Krawczyk, T Krovetz, P Rogaway Advances in Cryptology—CRYPTO’99: 19th Annual International Cryptology …, 1999 | 648 | 1999 |
SIGMA: The ‘SIGn-and-MAc’approach to authenticated Diffie-Hellman and its use in the IKE protocols H Krawczyk Annual international cryptology conference, 400-425, 2003 | 595 | 2003 |
Public-key cryptography and password protocols S Halevi, H Krawczyk ACM Transactions on Information and System Security (TISSEC) 2 (3), 230-268, 1999 | 587 | 1999 |
The order of encryption and authentication for protecting communications (or: How secure is SSL?) H Krawczyk Annual International Cryptology Conference, 310-331, 2001 | 583 | 2001 |
The shrinking generator D Coppersmith, H Krawczyk, Y Mansour Annual International Cryptology Conference, 22-39, 1993 | 570 | 1993 |
Secret sharing made short H Krawczyk Annual international cryptology conference, 136-146, 1993 | 545 | 1993 |
Cryptographic extraction and key derivation: The HKDF scheme H Krawczyk Annual Cryptology Conference, 631-648, 2010 | 500 | 2010 |