D-Index & Metrics Best Publications

D-Index & Metrics

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 68 Citations 30,307 116 World Ranking 972 National Ranking 18

Overview

What is he best known for?

The fields of study he is best known for:

  • Cryptography
  • Computer network
  • Programming language

His scientific interests lie mostly in Computer security, Theoretical computer science, Cryptography, Key exchange and Authentication. His Computer security research is multidisciplinary, incorporating elements of Verifiable secret sharing and Digital signature. His work carried out in the field of Theoretical computer science brings together such families of science as Cryptographic protocol, Ring signature, Zero-knowledge proof, Hash function and Parallelizable manifold.

Hugo Krawczyk has included themes like Computer network, Encryption and Semantic security in his Cryptography study. His Key exchange research is multidisciplinary, relying on both Mathematical proof, Protocol, Composability and Modular design. His work deals with themes such as Symmetric-key algorithm and Block cipher, which intersect with Authentication.

His most cited work include:

  • HMAC: Keyed-Hashing for Message Authentication (1572 citations)
  • Keying Hash Functions for Message Authentication (1428 citations)
  • Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels (1143 citations)

What are the main themes of his work throughout his whole career to date?

His primary areas of investigation include Computer security, Cryptography, Theoretical computer science, Encryption and Computer network. Key exchange, Authentication, Password, Public-key cryptography and Key are the primary areas of interest in his Computer security study. His Key exchange study also includes

  • Protocol which connect with Distributed computing,
  • Mathematical proof which connect with Composability.

His study explores the link between Cryptography and topics such as Hash function that cross with problems in Hash-based message authentication code. His studies deal with areas such as Cryptographic hash function, Random oracle, Cryptographic primitive, Block cipher and Message authentication code as well as Theoretical computer science. In his work, Internet protocol suite is strongly intertwined with Internet Protocol, which is a subfield of Computer network.

He most often published in these fields:

  • Computer security (44.39%)
  • Cryptography (34.15%)
  • Theoretical computer science (23.90%)

What were the highlights of his more recent work (between 2013-2021)?

  • Computer security (44.39%)
  • Password (9.27%)
  • Computer network (24.39%)

In recent papers he was focusing on the following fields of study:

Computer security, Password, Computer network, Server and Key management are his primary areas of study. His work on Computer security is being expanded to include thematically relevant topics such as Stateless protocol. His Password research includes elements of Authenticated Key Exchange and Cryptography.

His study in Cryptography is interdisciplinary in nature, drawing from both Session, Multimedia and Formal proof. All of his Computer network and Authentication and Public-key cryptography investigations are sub-components of the entire Computer network study. His biological study spans a wide range of topics, including Key exchange and Scheme, Secret sharing.

Between 2013 and 2021, his most popular works were:

  • Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation (397 citations)
  • Rich Queries on Encrypted Data: Beyond Exact Matches (96 citations)
  • Round-Optimal Password-Protected Secret Sharing and T-PAKE in the Password-Only Model (52 citations)

In his most recent research, the most cited papers focused on:

  • Cryptography
  • Computer network
  • Programming language

Hugo Krawczyk spends much of his time researching Computer security, Encryption, Password, Server and Dictionary attack. His Key exchange, Zero-knowledge proof and Confidentiality study in the realm of Computer security interacts with subjects such as Proof of ownership. The study incorporates disciplines such as Public key infrastructure, Mobile device and Protocol in addition to Key exchange.

His Encryption research is multidisciplinary, incorporating elements of Scalability, Database, Theoretical computer science, Set and Computer data storage. The Password study combines topics in areas such as Scheme, Secret sharing and Authentication. His work on Password strength as part of general Authentication study is frequently linked to Possession, therefore connecting diverse disciplines of science.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

HMAC: Keyed-Hashing for Message Authentication

H. Krawczyk;M. Bellare;R. Canetti.
RFC (1997)

3239 Citations

Keying Hash Functions for Message Authentication

Mihir Bellare;Ran Canetti;Hugo Krawczyk.
international cryptology conference (1996)

2182 Citations

Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels

Ran Canetti;Hugo Krawczyk.
theory and application of cryptographic techniques (2001)

1565 Citations

Proactive Secret Sharing Or: How to Cope With Perpetual Leakage

Amir Herzberg;Stanislaw Jarecki;Stanislaw Jarecki;Hugo Krawczyk;Moti Yung.
international cryptology conference (1995)

1007 Citations

HMQV: a high-performance secure diffie-hellman protocol

Hugo Krawczyk.
international cryptology conference (2005)

812 Citations

Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries

David Cash;Stanislaw Jarecki;Charanjit S. Jutla;Hugo Krawczyk.
international cryptology conference (2013)

776 Citations

Robust threshold DSS signatures

Rosario Gennaro;Stanisław Jarecki;Hugo Krawczyk;Tal Rabin.
theory and application of cryptographic techniques (1996)

637 Citations

Secure distributed key generation for discrete-log based cryptosystems

Rosario Gennaro;Stanislaw Jarecki;Hugo Krawczyk;Tal Rabin.
theory and application of cryptographic techniques (1999)

619 Citations

Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation

David Cash;Joseph Jaeger;Stanislaw Jarecki;Charanjit S. Jutla.
network and distributed system security symposium (2014)

610 Citations

LFSR-based Hashing and Authentication

Hugo Krawczyk.
international cryptology conference (1994)

606 Citations

Best Scientists Citing Hugo Krawczyk

Mihir Bellare

Mihir Bellare

University of California, San Diego

Publications: 89

Willy Susilo

Willy Susilo

University of Wollongong

Publications: 68

Colin Boyd

Colin Boyd

Norwegian University of Science and Technology

Publications: 65

Bart Preneel

Bart Preneel

KU Leuven

Publications: 65

Ran Canetti

Ran Canetti

Boston University

Publications: 61

Yi Mu

Yi Mu

Fujian Normal University

Publications: 61

Gene Tsudik

Gene Tsudik

University of California, Irvine

Publications: 60

Moti Yung

Moti Yung

Columbia University

Publications: 52

Phillip Rogaway

Phillip Rogaway

University of California, Davis

Publications: 52

Yevgeniy Dodis

Yevgeniy Dodis

New York University

Publications: 50

Rosario Gennaro

Rosario Gennaro

City College of New York

Publications: 47

Jonathan Katz

Jonathan Katz

University of Maryland, College Park

Publications: 47

David Pointcheval

David Pointcheval

École Normale Supérieure

Publications: 44

Michael K. Reiter

Michael K. Reiter

Duke University

Publications: 44

Dan Boneh

Dan Boneh

Stanford University

Publications: 42

Kenneth G. Paterson

Kenneth G. Paterson

ETH Zurich

Publications: 41

Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking d-index is inferred from publications deemed to belong to the considered discipline.

If you think any of the details on this page are incorrect, let us know.

Contact us
Something went wrong. Please try again later.