default search action
Scott R. Fluhrer
Person information
- affiliation: Cisco Systems
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i25]Scott R. Fluhrer, Quynh Dang:
Smaller Sphincs+. IACR Cryptol. ePrint Arch. 2024: 18 (2024) - [i24]Scott R. Fluhrer:
Side Channel Resistant Sphincs+. IACR Cryptol. ePrint Arch. 2024: 500 (2024) - 2023
- [i23]Scott R. Fluhrer:
Oops, I did it again revisited: another look at reusing one-time signatures. IACR Cryptol. ePrint Arch. 2023: 1905 (2023) - [i22]Cen Jung Tjhai, Martin Tomlinson, Graham Bartlett, Scott R. Fluhrer, Daniel Van Geest, Óscar García-Morchón, Valery Smyslov:
Multiple Key Exchanges in the Internet Key Exchange Protocol Version 2 (IKEv2). RFC 9370: 1-29 (2023) - 2020
- [i21]Scott R. Fluhrer, Panos Kampanakis, David A. McGrew, Valery Smyslov:
Mixing Preshared Keys in the Internet Key Exchange Protocol Version 2 (IKEv2) for Post-quantum Security. RFC 8784: 1-16 (2020)
2010 – 2019
- 2019
- [c13]Hayo Baan, Sauvik Bhattacharya, Scott R. Fluhrer, Óscar García-Morchón, Thijs Laarhoven, Ronald Rietman, Markku-Juhani O. Saarinen, Ludo Tolhuizen, Zhenfei Zhang:
Round5: Compact and Fast Post-quantum Public-Key Encryption. PQCrypto 2019: 83-102 - [i20]Hayo Baan, Sauvik Bhattacharya, Scott R. Fluhrer, Óscar García-Morchón, Thijs Laarhoven, Ronald Rietman, Markku-Juhani O. Saarinen, Ludo Tolhuizen, Zhenfei Zhang:
Round5: Compact and Fast Post-Quantum Public-Key Encryption. IACR Cryptol. ePrint Arch. 2019: 90 (2019) - [i19]David A. McGrew, Michael Curcio, Scott R. Fluhrer:
Leighton-Micali Hash-Based Signatures. RFC 8554: 1-61 (2019) - 2018
- [c12]Jintai Ding, Scott R. Fluhrer, Saraswathy RV:
Complete Attack on RLWE Key Exchange with Reused Keys, Without Signal Leakage. ACISP 2018: 467-486 - 2017
- [c11]Jintai Ding, Saed Alsayigh, R. V. Saraswathy, Scott R. Fluhrer, Xiaodong Lin:
Leakage of signal function with reused keys in RLWE key exchange. ICC 2017: 1-6 - [i18]Panos Kampanakis, Scott R. Fluhrer:
LMS vs XMSS: A comparison of the Stateful Hash-Based Signature Proposed Standards. IACR Cryptol. ePrint Arch. 2017: 349 (2017) - [i17]Scott R. Fluhrer:
Further Analysis of a Proposed Hash-Based Signature Standard. IACR Cryptol. ePrint Arch. 2017: 553 (2017) - [i16]Scott R. Fluhrer:
Reassessing Grover's Algorithm. IACR Cryptol. ePrint Arch. 2017: 811 (2017) - [i15]Jintai Ding, Scott R. Fluhrer, Saraswathy RV:
Complete Attack on RLWE Key Exchange with reused keys, without Signal Leakage. IACR Cryptol. ePrint Arch. 2017: 1185 (2017) - 2016
- [c10]David A. McGrew, Panos Kampanakis, Scott R. Fluhrer, Stefan-Lukas Gazdag, Denis Butin, Johannes Buchmann:
State Management for Hash-Based Signatures. SSR 2016: 244-260 - [i14]Scott R. Fluhrer:
Cryptanalysis of ring-LWE based key exchange with key share reuse. IACR Cryptol. ePrint Arch. 2016: 85 (2016) - [i13]David A. McGrew, Panos Kampanakis, Scott R. Fluhrer, Stefan-Lukas Gazdag, Denis Butin, Johannes Buchmann:
State Management for Hash Based Signatures. IACR Cryptol. ePrint Arch. 2016: 357 (2016) - [i12]Jintai Ding, Saed Alsayigh, Saraswathy RV, Scott R. Fluhrer:
Leakage of Signal function with reused keys in RLWE key exchange. IACR Cryptol. ePrint Arch. 2016: 1176 (2016) - 2015
- [i11]Scott R. Fluhrer:
Quantum Cryptanalysis of NTRU. IACR Cryptol. ePrint Arch. 2015: 676 (2015) - [i10]Scott R. Fluhrer:
Scalar Blinding on Elliptic Curves based on Primes with Special Structure. IACR Cryptol. ePrint Arch. 2015: 801 (2015) - 2014
- [c9]Farzaneh Abed, Scott R. Fluhrer, Christian Forler, Eik List, Stefan Lucks, David A. McGrew, Jakob Wenzel:
Pipelineable On-line Encryption. FSE 2014: 205-223 - [c8]Sashank Dara, Scott R. Fluhrer:
FNR: Arbitrary Length Small Domain Block Cipher Proposal. SPACE 2014: 146-154 - [i9]Farzaneh Abed, Scott R. Fluhrer, Christian Forler, Eik List, Stefan Lucks, David A. McGrew, Jakob Wenzel:
Pipelineable On-Line Encryption. IACR Cryptol. ePrint Arch. 2014: 297 (2014) - [i8]Sashank Dara, Scott R. Fluhrer:
FNR : Arbitrary length small domain block cipher proposal. IACR Cryptol. ePrint Arch. 2014: 421 (2014) - 2013
- [i7]Yaron Sheffer, Scott R. Fluhrer:
Additional Diffie-Hellman Tests for the Internet Key Exchange Protocol Version 2 (IKEv2). RFC 6989: 1-10 (2013) - 2011
- [i6]Yaron Sheffer, Glen Zorn, Hannes Tschofenig, Scott R. Fluhrer:
An EAP Authentication Method Based on the Encrypted Key Exchange (EKE) Protocol. RFC 6124: 1-33 (2011)
2000 – 2009
- 2008
- [i5]Scott R. Fluhrer:
Collision Attack on the Waterfall Hash Function. IACR Cryptol. ePrint Arch. 2008: 531 (2008) - 2007
- [c7]David A. McGrew, Scott R. Fluhrer:
The Security of the Extended Codebook (XCB) Mode of Operation. Selected Areas in Cryptography 2007: 311-327 - [i4]David A. McGrew, Scott R. Fluhrer:
The Security of the Extended Codebook (XCB) Mode of Operation. IACR Cryptol. ePrint Arch. 2007: 298 (2007) - 2005
- [i3]David A. McGrew, Scott R. Fluhrer:
Multiple forgery attacks against Message Authentication Codes. IACR Cryptol. ePrint Arch. 2005: 161 (2005) - 2004
- [i2]David A. McGrew, Scott R. Fluhrer:
The Extended Codebook (XCB) Mode of Operation. IACR Cryptol. ePrint Arch. 2004: 278 (2004) - 2002
- [i1]Scott R. Fluhrer:
Improved key recovery of level 1 of the Bluetooth Encryption System. IACR Cryptol. ePrint Arch. 2002: 68 (2002) - 2001
- [c6]Scott R. Fluhrer:
Cryptanalysis of the Mercy Block Cipher. FSE 2001: 28-36 - [c5]Scott R. Fluhrer:
Cryptanalysis of the SEAL 3.0 Pseudorandom Function Family. FSE 2001: 135-143 - [c4]Scott R. Fluhrer, Itsik Mantin, Adi Shamir:
Weaknesses in the Key Scheduling Algorithm of RC4. Selected Areas in Cryptography 2001: 1-24 - [c3]Scott R. Fluhrer, Stefan Lucks:
Analysis of the E0 Encryption System. Selected Areas in Cryptography 2001: 38-48 - 2000
- [c2]Scott R. Fluhrer, David A. McGrew:
Statistical Analysis of the Alleged RC4 Keystream Generator. FSE 2000: 19-30 - [c1]David A. McGrew, Scott R. Fluhrer:
Attacks on Additive Encryption of Redundant Plaintext and Implications on Internet Security. Selected Areas in Cryptography 2000: 14-28
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint