Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Scott R. Fluhrer
@article{DBLP:journals/iacr/FluhrerD24, author = {Scott R. Fluhrer and Quynh Dang}, title = {Smaller Sphincs+}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {18}, year = {2024} }
@article{DBLP:journals/iacr/Fluhrer23, author = {Scott R. Fluhrer}, title = {Oops, {I} did it again revisited: another look at reusing one-time signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1905}, year = {2023} }
@article{DBLP:journals/rfc/rfc9370, author = {Cen Jung Tjhai and Martin Tomlinson and Graham Bartlett and Scott R. Fluhrer and Daniel Van Geest and {\'{O}}scar Garc{\'{\i}}a{-}Morch{\'{o}}n and Valery Smyslov}, title = {Multiple Key Exchanges in the Internet Key Exchange Protocol Version 2 (IKEv2)}, journal = {{RFC}}, volume = {9370}, pages = {1--29}, year = {2023} }
@article{DBLP:journals/rfc/rfc8784, author = {Scott R. Fluhrer and Panos Kampanakis and David A. McGrew and Valery Smyslov}, title = {Mixing Preshared Keys in the Internet Key Exchange Protocol Version 2 (IKEv2) for Post-quantum Security}, journal = {{RFC}}, volume = {8784}, pages = {1--16}, year = {2020} }
@inproceedings{DBLP:conf/pqcrypto/BaanBFGLRSTZ19, author = {Hayo Baan and Sauvik Bhattacharya and Scott R. Fluhrer and {\'{O}}scar Garc{\'{\i}}a{-}Morch{\'{o}}n and Thijs Laarhoven and Ronald Rietman and Markku{-}Juhani O. Saarinen and Ludo Tolhuizen and Zhenfei Zhang}, title = {Round5: Compact and Fast Post-quantum Public-Key Encryption}, booktitle = {PQCrypto}, series = {Lecture Notes in Computer Science}, volume = {11505}, pages = {83--102}, publisher = {Springer}, year = {2019} }
@article{DBLP:journals/iacr/BaanBFGLRSTZ19, author = {Hayo Baan and Sauvik Bhattacharya and Scott R. Fluhrer and {\'{O}}scar Garc{\'{\i}}a{-}Morch{\'{o}}n and Thijs Laarhoven and Ronald Rietman and Markku{-}Juhani O. Saarinen and Ludo Tolhuizen and Zhenfei Zhang}, title = {Round5: Compact and Fast Post-Quantum Public-Key Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {90}, year = {2019} }
@article{DBLP:journals/rfc/rfc8554, author = {David A. McGrew and Michael Curcio and Scott R. Fluhrer}, title = {Leighton-Micali Hash-Based Signatures}, journal = {{RFC}}, volume = {8554}, pages = {1--61}, year = {2019} }
@inproceedings{DBLP:conf/acisp/DingFR18, author = {Jintai Ding and Scott R. Fluhrer and Saraswathy RV}, title = {Complete Attack on {RLWE} Key Exchange with Reused Keys, Without Signal Leakage}, booktitle = {{ACISP}}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {467--486}, publisher = {Springer}, year = {2018} }
@inproceedings{DBLP:conf/icc/DingASFL17, author = {Jintai Ding and Saed Alsayigh and R. V. Saraswathy and Scott R. Fluhrer and Xiaodong Lin}, title = {Leakage of signal function with reused keys in {RLWE} key exchange}, booktitle = {{ICC}}, pages = {1--6}, publisher = {{IEEE}}, year = {2017} }
@article{DBLP:journals/iacr/KampanakisF17, author = {Panos Kampanakis and Scott R. Fluhrer}, title = {{LMS} vs {XMSS:} {A} comparison of the Stateful Hash-Based Signature Proposed Standards}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {349}, year = {2017} }
@article{DBLP:journals/iacr/Fluhrer17, author = {Scott R. Fluhrer}, title = {Further Analysis of a Proposed Hash-Based Signature Standard}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {553}, year = {2017} }
@article{DBLP:journals/iacr/Fluhrer17a, author = {Scott R. Fluhrer}, title = {Reassessing Grover's Algorithm}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {811}, year = {2017} }
@article{DBLP:journals/iacr/DingFR17, author = {Jintai Ding and Scott R. Fluhrer and Saraswathy RV}, title = {Complete Attack on {RLWE} Key Exchange with reused keys, without Signal Leakage}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1185}, year = {2017} }
@inproceedings{DBLP:conf/secsr/McGrewKFGBB16, author = {David A. McGrew and Panos Kampanakis and Scott R. Fluhrer and Stefan{-}Lukas Gazdag and Denis Butin and Johannes Buchmann}, title = {State Management for Hash-Based Signatures}, booktitle = {{SSR}}, series = {Lecture Notes in Computer Science}, volume = {10074}, pages = {244--260}, publisher = {Springer}, year = {2016} }
@article{DBLP:journals/iacr/Fluhrer16, author = {Scott R. Fluhrer}, title = {Cryptanalysis of ring-LWE based key exchange with key share reuse}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {85}, year = {2016} }
@article{DBLP:journals/iacr/McGrewKFGBB16, author = {David A. McGrew and Panos Kampanakis and Scott R. Fluhrer and Stefan{-}Lukas Gazdag and Denis Butin and Johannes Buchmann}, title = {State Management for Hash Based Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {357}, year = {2016} }
@article{DBLP:journals/iacr/DingARF16, author = {Jintai Ding and Saed Alsayigh and Saraswathy RV and Scott R. Fluhrer}, title = {Leakage of Signal function with reused keys in {RLWE} key exchange}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1176}, year = {2016} }
@article{DBLP:journals/iacr/Fluhrer15, author = {Scott R. Fluhrer}, title = {Quantum Cryptanalysis of {NTRU}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {676}, year = {2015} }
@article{DBLP:journals/iacr/Fluhrer15a, author = {Scott R. Fluhrer}, title = {Scalar Blinding on Elliptic Curves based on Primes with Special Structure}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {801}, year = {2015} }
@inproceedings{DBLP:conf/fse/AbedFFLLMW14, author = {Farzaneh Abed and Scott R. Fluhrer and Christian Forler and Eik List and Stefan Lucks and David A. McGrew and Jakob Wenzel}, title = {Pipelineable On-line Encryption}, booktitle = {{FSE}}, series = {Lecture Notes in Computer Science}, volume = {8540}, pages = {205--223}, publisher = {Springer}, year = {2014} }
@inproceedings{DBLP:conf/space/DaraF14, author = {Sashank Dara and Scott R. Fluhrer}, title = {{FNR:} Arbitrary Length Small Domain Block Cipher Proposal}, booktitle = {{SPACE}}, series = {Lecture Notes in Computer Science}, volume = {8804}, pages = {146--154}, publisher = {Springer}, year = {2014} }
@article{DBLP:journals/iacr/AbedFFLLMW14, author = {Farzaneh Abed and Scott R. Fluhrer and Christian Forler and Eik List and Stefan Lucks and David A. McGrew and Jakob Wenzel}, title = {Pipelineable On-Line Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {297}, year = {2014} }
@article{DBLP:journals/iacr/DaraF14, author = {Sashank Dara and Scott R. Fluhrer}, title = {{FNR} : Arbitrary length small domain block cipher proposal}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {421}, year = {2014} }
@article{DBLP:journals/rfc/rfc6989, author = {Yaron Sheffer and Scott R. Fluhrer}, title = {Additional Diffie-Hellman Tests for the Internet Key Exchange Protocol Version 2 (IKEv2)}, journal = {{RFC}}, volume = {6989}, pages = {1--10}, year = {2013} }
@article{DBLP:journals/rfc/rfc6124, author = {Yaron Sheffer and Glen Zorn and Hannes Tschofenig and Scott R. Fluhrer}, title = {An {EAP} Authentication Method Based on the Encrypted Key Exchange {(EKE)} Protocol}, journal = {{RFC}}, volume = {6124}, pages = {1--33}, year = {2011} }
@article{DBLP:journals/iacr/Fluhrer08, author = {Scott R. Fluhrer}, title = {Collision Attack on the Waterfall Hash Function}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {531}, year = {2008} }
@inproceedings{DBLP:conf/sacrypt/McGrewF07, author = {David A. McGrew and Scott R. Fluhrer}, title = {The Security of the Extended Codebook {(XCB)} Mode of Operation}, booktitle = {Selected Areas in Cryptography}, series = {Lecture Notes in Computer Science}, volume = {4876}, pages = {311--327}, publisher = {Springer}, year = {2007} }
@article{DBLP:journals/iacr/McGrewF07, author = {David A. McGrew and Scott R. Fluhrer}, title = {The Security of the Extended Codebook {(XCB)} Mode of Operation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {298}, year = {2007} }
@article{DBLP:journals/iacr/McGrewF05, author = {David A. McGrew and Scott R. Fluhrer}, title = {Multiple forgery attacks against Message Authentication Codes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {161}, year = {2005} }
@article{DBLP:journals/iacr/McGrewF04, author = {David A. McGrew and Scott R. Fluhrer}, title = {The Extended Codebook {(XCB)} Mode of Operation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {278}, year = {2004} }
@article{DBLP:journals/iacr/Fluhrer02, author = {Scott R. Fluhrer}, title = {Improved key recovery of level 1 of the Bluetooth Encryption System}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {68}, year = {2002} }
@inproceedings{DBLP:conf/fse/Fluhrer01, author = {Scott R. Fluhrer}, title = {Cryptanalysis of the Mercy Block Cipher}, booktitle = {{FSE}}, series = {Lecture Notes in Computer Science}, volume = {2355}, pages = {28--36}, publisher = {Springer}, year = {2001} }
@inproceedings{DBLP:conf/fse/Fluhrer01a, author = {Scott R. Fluhrer}, title = {Cryptanalysis of the {SEAL} 3.0 Pseudorandom Function Family}, booktitle = {{FSE}}, series = {Lecture Notes in Computer Science}, volume = {2355}, pages = {135--143}, publisher = {Springer}, year = {2001} }
@inproceedings{DBLP:conf/sacrypt/FluhrerMS01, author = {Scott R. Fluhrer and Itsik Mantin and Adi Shamir}, title = {Weaknesses in the Key Scheduling Algorithm of {RC4}}, booktitle = {Selected Areas in Cryptography}, series = {Lecture Notes in Computer Science}, volume = {2259}, pages = {1--24}, publisher = {Springer}, year = {2001} }
@inproceedings{DBLP:conf/sacrypt/FluhrerL01, author = {Scott R. Fluhrer and Stefan Lucks}, title = {Analysis of the E\({}_{\mbox{0}}\) Encryption System}, booktitle = {Selected Areas in Cryptography}, series = {Lecture Notes in Computer Science}, volume = {2259}, pages = {38--48}, publisher = {Springer}, year = {2001} }
@inproceedings{DBLP:conf/fse/FluhrerM00, author = {Scott R. Fluhrer and David A. McGrew}, title = {Statistical Analysis of the Alleged {RC4} Keystream Generator}, booktitle = {{FSE}}, series = {Lecture Notes in Computer Science}, volume = {1978}, pages = {19--30}, publisher = {Springer}, year = {2000} }
@inproceedings{DBLP:conf/sacrypt/McGrewF00, author = {David A. McGrew and Scott R. Fluhrer}, title = {Attacks on Additive Encryption of Redundant Plaintext and Implications on Internet Security}, booktitle = {Selected Areas in Cryptography}, series = {Lecture Notes in Computer Science}, volume = {2012}, pages = {14--28}, publisher = {Springer}, year = {2000} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.