D-Index & Metrics Best Publications

D-Index & Metrics D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines.

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 70 Citations 30,132 174 World Ranking 1134 National Ranking 21

Overview

What is he best known for?

The fields of study he is best known for:

  • Cryptography
  • Computer network
  • Programming language

His scientific interests lie mostly in Computer security, Theoretical computer science, Cryptography, Key exchange and Authentication. His Computer security research is multidisciplinary, incorporating elements of Verifiable secret sharing and Digital signature. His work carried out in the field of Theoretical computer science brings together such families of science as Cryptographic protocol, Ring signature, Zero-knowledge proof, Hash function and Parallelizable manifold.

Hugo Krawczyk has included themes like Computer network, Encryption and Semantic security in his Cryptography study. His Key exchange research is multidisciplinary, relying on both Mathematical proof, Protocol, Composability and Modular design. His work deals with themes such as Symmetric-key algorithm and Block cipher, which intersect with Authentication.

His most cited work include:

  • HMAC: Keyed-Hashing for Message Authentication (1572 citations)
  • Keying Hash Functions for Message Authentication (1428 citations)
  • Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels (1143 citations)

What are the main themes of his work throughout his whole career to date?

His primary areas of investigation include Computer security, Cryptography, Theoretical computer science, Encryption and Computer network. Key exchange, Authentication, Password, Public-key cryptography and Key are the primary areas of interest in his Computer security study. His Key exchange study also includes

  • Protocol which connect with Distributed computing,
  • Mathematical proof which connect with Composability.

His study explores the link between Cryptography and topics such as Hash function that cross with problems in Hash-based message authentication code. His studies deal with areas such as Cryptographic hash function, Random oracle, Cryptographic primitive, Block cipher and Message authentication code as well as Theoretical computer science. In his work, Internet protocol suite is strongly intertwined with Internet Protocol, which is a subfield of Computer network.

He most often published in these fields:

  • Computer security (44.39%)
  • Cryptography (34.15%)
  • Theoretical computer science (23.90%)

What were the highlights of his more recent work (between 2013-2021)?

  • Computer security (44.39%)
  • Password (9.27%)
  • Computer network (24.39%)

In recent papers he was focusing on the following fields of study:

Computer security, Password, Computer network, Server and Key management are his primary areas of study. His work on Computer security is being expanded to include thematically relevant topics such as Stateless protocol. His Password research includes elements of Authenticated Key Exchange and Cryptography.

His study in Cryptography is interdisciplinary in nature, drawing from both Session, Multimedia and Formal proof. All of his Computer network and Authentication and Public-key cryptography investigations are sub-components of the entire Computer network study. His biological study spans a wide range of topics, including Key exchange and Scheme, Secret sharing.

Between 2013 and 2021, his most popular works were:

  • Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation (397 citations)
  • Rich Queries on Encrypted Data: Beyond Exact Matches (96 citations)
  • Round-Optimal Password-Protected Secret Sharing and T-PAKE in the Password-Only Model (52 citations)

In his most recent research, the most cited papers focused on:

  • Cryptography
  • Computer network
  • Programming language

Hugo Krawczyk spends much of his time researching Computer security, Encryption, Password, Server and Dictionary attack. His Key exchange, Zero-knowledge proof and Confidentiality study in the realm of Computer security interacts with subjects such as Proof of ownership. The study incorporates disciplines such as Public key infrastructure, Mobile device and Protocol in addition to Key exchange.

His Encryption research is multidisciplinary, incorporating elements of Scalability, Database, Theoretical computer science, Set and Computer data storage. The Password study combines topics in areas such as Scheme, Secret sharing and Authentication. His work on Password strength as part of general Authentication study is frequently linked to Possession, therefore connecting diverse disciplines of science.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

HMAC: Keyed-Hashing for Message Authentication

H. Krawczyk;M. Bellare;R. Canetti.
RFC (1997)

3722 Citations

Keying Hash Functions for Message Authentication

Mihir Bellare;Ran Canetti;Hugo Krawczyk.
international cryptology conference (1996)

2335 Citations

Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels.

Ran Canetti;Hugo Krawczyk.
IACR Cryptology ePrint Archive (2001)

1717 Citations

Universally composable notions of key exchange and secure channels

Ran Canetti;Hugo Krawczyk.
Lecture Notes in Computer Science (2002)

1177 Citations

Proactive Secret Sharing Or: How to Cope With Perpetual Leakage

Amir Herzberg;Stanislaw Jarecki;Stanislaw Jarecki;Hugo Krawczyk;Moti Yung.
international cryptology conference (1995)

1047 Citations

Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries

David Cash;Stanislaw Jarecki;Charanjit S. Jutla;Hugo Krawczyk.
international cryptology conference (2013)

865 Citations

HMQV: a high-performance secure diffie-hellman protocol

Hugo Krawczyk.
international cryptology conference (2005)

863 Citations

Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation.

David Cash;Joseph Jaeger;Stanislaw Jarecki;Charanjit S. Jutla.
IACR Cryptology ePrint Archive (2014)

699 Citations

Robust threshold DSS signatures

Rosario Gennaro;Stanisław Jarecki;Hugo Krawczyk;Tal Rabin.
theory and application of cryptographic techniques (1996)

671 Citations

Secure distributed key generation for discrete-log based cryptosystems

Rosario Gennaro;Stanisław Jarecki;Hugo Krawczyk;Tal Rabin.
theory and application of cryptographic techniques (1999)

657 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Hugo Krawczyk

Mihir Bellare

Mihir Bellare

University of California, San Diego

Publications: 89

Willy Susilo

Willy Susilo

University of Wollongong

Publications: 68

Bart Preneel

Bart Preneel

KU Leuven

Publications: 65

Colin Boyd

Colin Boyd

Norwegian University of Science and Technology

Publications: 65

Yi Mu

Yi Mu

Fujian Normal University

Publications: 61

Ran Canetti

Ran Canetti

Boston University

Publications: 61

Gene Tsudik

Gene Tsudik

University of California, Irvine

Publications: 60

Phillip Rogaway

Phillip Rogaway

University of California, Davis

Publications: 52

Moti Yung

Moti Yung

Columbia University

Publications: 52

Yevgeniy Dodis

Yevgeniy Dodis

New York University

Publications: 50

Rosario Gennaro

Rosario Gennaro

City College of New York

Publications: 47

Jonathan Katz

Jonathan Katz

University of Maryland, College Park

Publications: 47

Michael K. Reiter

Michael K. Reiter

Duke University

Publications: 44

David Pointcheval

David Pointcheval

École Normale Supérieure

Publications: 44

Dan Boneh

Dan Boneh

Stanford University

Publications: 42

Kenneth G. Paterson

Kenneth G. Paterson

ETH Zurich

Publications: 41

Trending Scientists

Aria Nosratinia

Aria Nosratinia

The University of Texas at Dallas

Xinchao Wang

Xinchao Wang

National University of Singapore

Abbas Khosravi

Abbas Khosravi

Deakin University

Gary S. Settles

Gary S. Settles

Pennsylvania State University

Mamoru Sugita

Mamoru Sugita

Nagoya University

Björn Sundberg

Björn Sundberg

Swedish University of Agricultural Sciences

Ernesto S. Nakayasu

Ernesto S. Nakayasu

Pacific Northwest National Laboratory

Ralf Herwig

Ralf Herwig

Max Planck Society

Nigel J. Waterhouse

Nigel J. Waterhouse

QIMR Berghofer Medical Research Institute

Andrew Lenton

Andrew Lenton

Commonwealth Scientific and Industrial Research Organisation

Jean-Éric Tremblay

Jean-Éric Tremblay

Université Laval

Kelsey C. Martin

Kelsey C. Martin

University of California, Los Angeles

Katherine L. Rosenblum

Katherine L. Rosenblum

University of Michigan–Ann Arbor

John M. Bennett

John M. Bennett

University of Rochester Medical Center

Jos W. R. Twisk

Jos W. R. Twisk

Vrije Universiteit Amsterdam

Something went wrong. Please try again later.