On the concrete hardness of Learning with Errors MR Albrecht, R Player, S Scott Cryptology ePrint Archive, Report 2015/046, 2015. http://eprint. iacr. org …, 0 | 932* | |
A comprehensive symbolic analysis of TLS 1.3 C Cremers, M Horvat, J Hoyland, S Scott, T van der Merwe Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 279 | 2017 |
Automated Analysis and Verification of TLS 1.3: 0-RTT, Resumption and Delayed Authentication C Cremers, M Horvat, S Scott, T van der Merwe Security and Privacy (SP), 2016 IEEE Symposium on. IEEE, 2016 | 154 | 2016 |
The pythia PRF service A Everspaugh, R Chatterjee, S Scott, A Juels, T Ristenpart, C Tech Proceedings of the 24th USENIX Conference on Security Symposium, 547-562, 2015 | 109 | 2015 |
Key rotation for authenticated encryption A Everspaugh, K Paterson, T Ristenpart, S Scott Advances in Cryptology–CRYPTO 2017: 37th Annual International Cryptology …, 2017 | 91 | 2017 |
Hashing to elliptic curves A Faz-Hernandez, S Scott, N Sullivan, RS Wahby, CA Wood Internet Research Task Force, Informational, 2021 | 68* | 2021 |
The discrete logarithm problem for exponents of bounded height SR Blackburn, S Scott LMS Journal of Computation and Mathematics 17 (A), 148-156, 2014 | 5 | 2014 |
The Design and Analysis of Real-World Cryptographic Protocols S Scott | 1 | 2017 |