BibTeX records: Scott R. Fluhrer

download as .bib file

@article{DBLP:journals/iacr/FluhrerD24,
  author       = {Scott R. Fluhrer and
                  Quynh Dang},
  title        = {Smaller Sphincs+},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {18},
  year         = {2024}
}
@article{DBLP:journals/iacr/Fluhrer23,
  author       = {Scott R. Fluhrer},
  title        = {Oops, {I} did it again revisited: another look at reusing one-time
                  signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1905},
  year         = {2023}
}
@article{DBLP:journals/rfc/rfc9370,
  author       = {Cen Jung Tjhai and
                  Martin Tomlinson and
                  Graham Bartlett and
                  Scott R. Fluhrer and
                  Daniel Van Geest and
                  {\'{O}}scar Garc{\'{\i}}a{-}Morch{\'{o}}n and
                  Valery Smyslov},
  title        = {Multiple Key Exchanges in the Internet Key Exchange Protocol Version
                  2 (IKEv2)},
  journal      = {{RFC}},
  volume       = {9370},
  pages        = {1--29},
  year         = {2023}
}
@article{DBLP:journals/rfc/rfc8784,
  author       = {Scott R. Fluhrer and
                  Panos Kampanakis and
                  David A. McGrew and
                  Valery Smyslov},
  title        = {Mixing Preshared Keys in the Internet Key Exchange Protocol Version
                  2 (IKEv2) for Post-quantum Security},
  journal      = {{RFC}},
  volume       = {8784},
  pages        = {1--16},
  year         = {2020}
}
@inproceedings{DBLP:conf/pqcrypto/BaanBFGLRSTZ19,
  author       = {Hayo Baan and
                  Sauvik Bhattacharya and
                  Scott R. Fluhrer and
                  {\'{O}}scar Garc{\'{\i}}a{-}Morch{\'{o}}n and
                  Thijs Laarhoven and
                  Ronald Rietman and
                  Markku{-}Juhani O. Saarinen and
                  Ludo Tolhuizen and
                  Zhenfei Zhang},
  title        = {Round5: Compact and Fast Post-quantum Public-Key Encryption},
  booktitle    = {PQCrypto},
  series       = {Lecture Notes in Computer Science},
  volume       = {11505},
  pages        = {83--102},
  publisher    = {Springer},
  year         = {2019}
}
@article{DBLP:journals/iacr/BaanBFGLRSTZ19,
  author       = {Hayo Baan and
                  Sauvik Bhattacharya and
                  Scott R. Fluhrer and
                  {\'{O}}scar Garc{\'{\i}}a{-}Morch{\'{o}}n and
                  Thijs Laarhoven and
                  Ronald Rietman and
                  Markku{-}Juhani O. Saarinen and
                  Ludo Tolhuizen and
                  Zhenfei Zhang},
  title        = {Round5: Compact and Fast Post-Quantum Public-Key Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {90},
  year         = {2019}
}
@article{DBLP:journals/rfc/rfc8554,
  author       = {David A. McGrew and
                  Michael Curcio and
                  Scott R. Fluhrer},
  title        = {Leighton-Micali Hash-Based Signatures},
  journal      = {{RFC}},
  volume       = {8554},
  pages        = {1--61},
  year         = {2019}
}
@inproceedings{DBLP:conf/acisp/DingFR18,
  author       = {Jintai Ding and
                  Scott R. Fluhrer and
                  Saraswathy RV},
  title        = {Complete Attack on {RLWE} Key Exchange with Reused Keys, Without Signal
                  Leakage},
  booktitle    = {{ACISP}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {467--486},
  publisher    = {Springer},
  year         = {2018}
}
@inproceedings{DBLP:conf/icc/DingASFL17,
  author       = {Jintai Ding and
                  Saed Alsayigh and
                  R. V. Saraswathy and
                  Scott R. Fluhrer and
                  Xiaodong Lin},
  title        = {Leakage of signal function with reused keys in {RLWE} key exchange},
  booktitle    = {{ICC}},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2017}
}
@article{DBLP:journals/iacr/KampanakisF17,
  author       = {Panos Kampanakis and
                  Scott R. Fluhrer},
  title        = {{LMS} vs {XMSS:} {A} comparison of the Stateful Hash-Based Signature
                  Proposed Standards},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {349},
  year         = {2017}
}
@article{DBLP:journals/iacr/Fluhrer17,
  author       = {Scott R. Fluhrer},
  title        = {Further Analysis of a Proposed Hash-Based Signature Standard},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {553},
  year         = {2017}
}
@article{DBLP:journals/iacr/Fluhrer17a,
  author       = {Scott R. Fluhrer},
  title        = {Reassessing Grover's Algorithm},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {811},
  year         = {2017}
}
@article{DBLP:journals/iacr/DingFR17,
  author       = {Jintai Ding and
                  Scott R. Fluhrer and
                  Saraswathy RV},
  title        = {Complete Attack on {RLWE} Key Exchange with reused keys, without Signal
                  Leakage},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1185},
  year         = {2017}
}
@inproceedings{DBLP:conf/secsr/McGrewKFGBB16,
  author       = {David A. McGrew and
                  Panos Kampanakis and
                  Scott R. Fluhrer and
                  Stefan{-}Lukas Gazdag and
                  Denis Butin and
                  Johannes Buchmann},
  title        = {State Management for Hash-Based Signatures},
  booktitle    = {{SSR}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10074},
  pages        = {244--260},
  publisher    = {Springer},
  year         = {2016}
}
@article{DBLP:journals/iacr/Fluhrer16,
  author       = {Scott R. Fluhrer},
  title        = {Cryptanalysis of ring-LWE based key exchange with key share reuse},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {85},
  year         = {2016}
}
@article{DBLP:journals/iacr/McGrewKFGBB16,
  author       = {David A. McGrew and
                  Panos Kampanakis and
                  Scott R. Fluhrer and
                  Stefan{-}Lukas Gazdag and
                  Denis Butin and
                  Johannes Buchmann},
  title        = {State Management for Hash Based Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {357},
  year         = {2016}
}
@article{DBLP:journals/iacr/DingARF16,
  author       = {Jintai Ding and
                  Saed Alsayigh and
                  Saraswathy RV and
                  Scott R. Fluhrer},
  title        = {Leakage of Signal function with reused keys in {RLWE} key exchange},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1176},
  year         = {2016}
}
@article{DBLP:journals/iacr/Fluhrer15,
  author       = {Scott R. Fluhrer},
  title        = {Quantum Cryptanalysis of {NTRU}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {676},
  year         = {2015}
}
@article{DBLP:journals/iacr/Fluhrer15a,
  author       = {Scott R. Fluhrer},
  title        = {Scalar Blinding on Elliptic Curves based on Primes with Special Structure},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {801},
  year         = {2015}
}
@inproceedings{DBLP:conf/fse/AbedFFLLMW14,
  author       = {Farzaneh Abed and
                  Scott R. Fluhrer and
                  Christian Forler and
                  Eik List and
                  Stefan Lucks and
                  David A. McGrew and
                  Jakob Wenzel},
  title        = {Pipelineable On-line Encryption},
  booktitle    = {{FSE}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8540},
  pages        = {205--223},
  publisher    = {Springer},
  year         = {2014}
}
@inproceedings{DBLP:conf/space/DaraF14,
  author       = {Sashank Dara and
                  Scott R. Fluhrer},
  title        = {{FNR:} Arbitrary Length Small Domain Block Cipher Proposal},
  booktitle    = {{SPACE}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8804},
  pages        = {146--154},
  publisher    = {Springer},
  year         = {2014}
}
@article{DBLP:journals/iacr/AbedFFLLMW14,
  author       = {Farzaneh Abed and
                  Scott R. Fluhrer and
                  Christian Forler and
                  Eik List and
                  Stefan Lucks and
                  David A. McGrew and
                  Jakob Wenzel},
  title        = {Pipelineable On-Line Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {297},
  year         = {2014}
}
@article{DBLP:journals/iacr/DaraF14,
  author       = {Sashank Dara and
                  Scott R. Fluhrer},
  title        = {{FNR} : Arbitrary length small domain block cipher proposal},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {421},
  year         = {2014}
}
@article{DBLP:journals/rfc/rfc6989,
  author       = {Yaron Sheffer and
                  Scott R. Fluhrer},
  title        = {Additional Diffie-Hellman Tests for the Internet Key Exchange Protocol
                  Version 2 (IKEv2)},
  journal      = {{RFC}},
  volume       = {6989},
  pages        = {1--10},
  year         = {2013}
}
@article{DBLP:journals/rfc/rfc6124,
  author       = {Yaron Sheffer and
                  Glen Zorn and
                  Hannes Tschofenig and
                  Scott R. Fluhrer},
  title        = {An {EAP} Authentication Method Based on the Encrypted Key Exchange
                  {(EKE)} Protocol},
  journal      = {{RFC}},
  volume       = {6124},
  pages        = {1--33},
  year         = {2011}
}
@article{DBLP:journals/iacr/Fluhrer08,
  author       = {Scott R. Fluhrer},
  title        = {Collision Attack on the Waterfall Hash Function},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {531},
  year         = {2008}
}
@inproceedings{DBLP:conf/sacrypt/McGrewF07,
  author       = {David A. McGrew and
                  Scott R. Fluhrer},
  title        = {The Security of the Extended Codebook {(XCB)} Mode of Operation},
  booktitle    = {Selected Areas in Cryptography},
  series       = {Lecture Notes in Computer Science},
  volume       = {4876},
  pages        = {311--327},
  publisher    = {Springer},
  year         = {2007}
}
@article{DBLP:journals/iacr/McGrewF07,
  author       = {David A. McGrew and
                  Scott R. Fluhrer},
  title        = {The Security of the Extended Codebook {(XCB)} Mode of Operation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {298},
  year         = {2007}
}
@article{DBLP:journals/iacr/McGrewF05,
  author       = {David A. McGrew and
                  Scott R. Fluhrer},
  title        = {Multiple forgery attacks against Message Authentication Codes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {161},
  year         = {2005}
}
@article{DBLP:journals/iacr/McGrewF04,
  author       = {David A. McGrew and
                  Scott R. Fluhrer},
  title        = {The Extended Codebook {(XCB)} Mode of Operation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {278},
  year         = {2004}
}
@article{DBLP:journals/iacr/Fluhrer02,
  author       = {Scott R. Fluhrer},
  title        = {Improved key recovery of level 1 of the Bluetooth Encryption System},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {68},
  year         = {2002}
}
@inproceedings{DBLP:conf/fse/Fluhrer01,
  author       = {Scott R. Fluhrer},
  title        = {Cryptanalysis of the Mercy Block Cipher},
  booktitle    = {{FSE}},
  series       = {Lecture Notes in Computer Science},
  volume       = {2355},
  pages        = {28--36},
  publisher    = {Springer},
  year         = {2001}
}
@inproceedings{DBLP:conf/fse/Fluhrer01a,
  author       = {Scott R. Fluhrer},
  title        = {Cryptanalysis of the {SEAL} 3.0 Pseudorandom Function Family},
  booktitle    = {{FSE}},
  series       = {Lecture Notes in Computer Science},
  volume       = {2355},
  pages        = {135--143},
  publisher    = {Springer},
  year         = {2001}
}
@inproceedings{DBLP:conf/sacrypt/FluhrerMS01,
  author       = {Scott R. Fluhrer and
                  Itsik Mantin and
                  Adi Shamir},
  title        = {Weaknesses in the Key Scheduling Algorithm of {RC4}},
  booktitle    = {Selected Areas in Cryptography},
  series       = {Lecture Notes in Computer Science},
  volume       = {2259},
  pages        = {1--24},
  publisher    = {Springer},
  year         = {2001}
}
@inproceedings{DBLP:conf/sacrypt/FluhrerL01,
  author       = {Scott R. Fluhrer and
                  Stefan Lucks},
  title        = {Analysis of the E\({}_{\mbox{0}}\) Encryption System},
  booktitle    = {Selected Areas in Cryptography},
  series       = {Lecture Notes in Computer Science},
  volume       = {2259},
  pages        = {38--48},
  publisher    = {Springer},
  year         = {2001}
}
@inproceedings{DBLP:conf/fse/FluhrerM00,
  author       = {Scott R. Fluhrer and
                  David A. McGrew},
  title        = {Statistical Analysis of the Alleged {RC4} Keystream Generator},
  booktitle    = {{FSE}},
  series       = {Lecture Notes in Computer Science},
  volume       = {1978},
  pages        = {19--30},
  publisher    = {Springer},
  year         = {2000}
}
@inproceedings{DBLP:conf/sacrypt/McGrewF00,
  author       = {David A. McGrew and
                  Scott R. Fluhrer},
  title        = {Attacks on Additive Encryption of Redundant Plaintext and Implications
                  on Internet Security},
  booktitle    = {Selected Areas in Cryptography},
  series       = {Lecture Notes in Computer Science},
  volume       = {2012},
  pages        = {14--28},
  publisher    = {Springer},
  year         = {2000}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics