His scientific interests lie mostly in Computer security, Theoretical computer science, Cryptography, Key exchange and Authentication. His Computer security research is multidisciplinary, incorporating elements of Verifiable secret sharing and Digital signature. His work carried out in the field of Theoretical computer science brings together such families of science as Cryptographic protocol, Ring signature, Zero-knowledge proof, Hash function and Parallelizable manifold.
Hugo Krawczyk has included themes like Computer network, Encryption and Semantic security in his Cryptography study. His Key exchange research is multidisciplinary, relying on both Mathematical proof, Protocol, Composability and Modular design. His work deals with themes such as Symmetric-key algorithm and Block cipher, which intersect with Authentication.
His primary areas of investigation include Computer security, Cryptography, Theoretical computer science, Encryption and Computer network. Key exchange, Authentication, Password, Public-key cryptography and Key are the primary areas of interest in his Computer security study. His Key exchange study also includes
His study explores the link between Cryptography and topics such as Hash function that cross with problems in Hash-based message authentication code. His studies deal with areas such as Cryptographic hash function, Random oracle, Cryptographic primitive, Block cipher and Message authentication code as well as Theoretical computer science. In his work, Internet protocol suite is strongly intertwined with Internet Protocol, which is a subfield of Computer network.
Computer security, Password, Computer network, Server and Key management are his primary areas of study. His work on Computer security is being expanded to include thematically relevant topics such as Stateless protocol. His Password research includes elements of Authenticated Key Exchange and Cryptography.
His study in Cryptography is interdisciplinary in nature, drawing from both Session, Multimedia and Formal proof. All of his Computer network and Authentication and Public-key cryptography investigations are sub-components of the entire Computer network study. His biological study spans a wide range of topics, including Key exchange and Scheme, Secret sharing.
Hugo Krawczyk spends much of his time researching Computer security, Encryption, Password, Server and Dictionary attack. His Key exchange, Zero-knowledge proof and Confidentiality study in the realm of Computer security interacts with subjects such as Proof of ownership. The study incorporates disciplines such as Public key infrastructure, Mobile device and Protocol in addition to Key exchange.
His Encryption research is multidisciplinary, incorporating elements of Scalability, Database, Theoretical computer science, Set and Computer data storage. The Password study combines topics in areas such as Scheme, Secret sharing and Authentication. His work on Password strength as part of general Authentication study is frequently linked to Possession, therefore connecting diverse disciplines of science.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
HMAC: Keyed-Hashing for Message Authentication
H. Krawczyk;M. Bellare;R. Canetti.
RFC (1997)
Keying Hash Functions for Message Authentication
Mihir Bellare;Ran Canetti;Hugo Krawczyk.
international cryptology conference (1996)
Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels.
Ran Canetti;Hugo Krawczyk.
IACR Cryptology ePrint Archive (2001)
Universally composable notions of key exchange and secure channels
Ran Canetti;Hugo Krawczyk.
Lecture Notes in Computer Science (2002)
Proactive Secret Sharing Or: How to Cope With Perpetual Leakage
Amir Herzberg;Stanislaw Jarecki;Stanislaw Jarecki;Hugo Krawczyk;Moti Yung.
international cryptology conference (1995)
Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries
David Cash;Stanislaw Jarecki;Charanjit S. Jutla;Hugo Krawczyk.
international cryptology conference (2013)
HMQV: a high-performance secure diffie-hellman protocol
Hugo Krawczyk.
international cryptology conference (2005)
Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation.
David Cash;Joseph Jaeger;Stanislaw Jarecki;Charanjit S. Jutla.
IACR Cryptology ePrint Archive (2014)
Robust threshold DSS signatures
Rosario Gennaro;Stanisław Jarecki;Hugo Krawczyk;Tal Rabin.
theory and application of cryptographic techniques (1996)
Secure distributed key generation for discrete-log based cryptosystems
Rosario Gennaro;Stanisław Jarecki;Hugo Krawczyk;Tal Rabin.
theory and application of cryptographic techniques (1999)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below:
IBM (United States)
University of California, Irvine
City College of New York
University of Connecticut
Boston University
Algorand Foundation
Intel (United States)
Technion – Israel Institute of Technology
University of California, San Diego
Weizmann Institute of Science
The University of Texas at Dallas
National University of Singapore
Deakin University
Pennsylvania State University
Nagoya University
Swedish University of Agricultural Sciences
Pacific Northwest National Laboratory
Max Planck Society
QIMR Berghofer Medical Research Institute
Commonwealth Scientific and Industrial Research Organisation
MIT
Université Laval
University of California, Los Angeles
University of Michigan–Ann Arbor
University of Rochester Medical Center
Vrije Universiteit Amsterdam