Folgen
Sam Scott
Sam Scott
Bestätigte E-Mail-Adresse bei cornell.edu
Titel
Zitiert von
Zitiert von
Jahr
On the concrete hardness of Learning with Errors
MR Albrecht, R Player, S Scott
Cryptology ePrint Archive, Report 2015/046, 2015. http://eprint. iacr. org …, 0
1019*
A comprehensive symbolic analysis of TLS 1.3
C Cremers, M Horvat, J Hoyland, S Scott, T van der Merwe
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
3062017
Automated Analysis and Verification of TLS 1.3: 0-RTT, Resumption and Delayed Authentication
C Cremers, M Horvat, S Scott, T van der Merwe
Security and Privacy (SP), 2016 IEEE Symposium on. IEEE, 2016
1642016
The pythia PRF service
A Everspaugh, R Chatterjee, S Scott, A Juels, T Ristenpart, C Tech
Proceedings of the 24th USENIX Conference on Security Symposium, 547-562, 2015
1192015
Key rotation for authenticated encryption
A Everspaugh, K Paterson, T Ristenpart, S Scott
Advances in Cryptology–CRYPTO 2017: 37th Annual International Cryptology …, 2017
972017
Hashing to elliptic curves
A Faz-Hernandez, S Scott, N Sullivan, RS Wahby, CA Wood
Internet Research Task Force, Informational, 2021
74*2021
The discrete logarithm problem for exponents of bounded height
SR Blackburn, S Scott
LMS Journal of Computation and Mathematics 17 (A), 148-156, 2014
52014
The Design and Analysis of Real-World Cryptographic Protocols
S Scott
12017
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–8