David A. McGrew

According to our database1, David A. McGrew authored at least 49 papers between 2000 and 2020.

Collaborative distances:



In proceedings 
PhD thesis 



On csauthors.net:


Mixing Preshared Keys in the Internet Key Exchange Protocol Version 2 (IKEv2) for Post-quantum Security.
RFC, June, 2020

Leighton-Micali Hash-Based Signatures.
RFC, April, 2019

TLS Beyond the Browser: Combining End Host and Network Data to Understand Application Behavior.
Proceedings of the Internet Measurement Conference, 2019

Limitless HTTP in an HTTPS World: Inferring the Semantics of the HTTPS Protocol without Decryption.
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019

Deciphering malware's use of TLS (without decryption).
J. Comput. Virol. Hacking Tech., 2018

An In-Depth Study of Open-Source Command and Control Frameworks.
Proceedings of the 13th International Conference on Malicious and Unwanted Software, 2018

Machine Learning for Encrypted Malware Traffic Classification: Accounting for Noisy Labels and Non-Stationarity.
Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Halifax, NS, Canada, August 13, 2017

OS fingerprinting: New techniques and a study of information gain and obfuscation.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

State Management for Hash Based Signatures.
IACR Cryptol. ePrint Arch., 2016

Enhanced telemetry for encrypted threat analytics.
Proceedings of the 24th IEEE International Conference on Network Protocols, 2016

Identifying Encrypted Malware Traffic with Contextual Flow Data.
Proceedings of the 2016 ACM Workshop on Artificial Intelligence and Security, 2016

Discovering Human and Machine Readable Descriptions of Malware Families.
Proceedings of the Artificial Intelligence for Cyber Security, 2016

AES-GCM Authenticated Encryption in the Secure Real-time Transport Protocol (SRTP).
RFC, December, 2015

An Actionable Threat Intelligence system using a Publish-Subscribe communications model.
Proceedings of the 2nd ACM Workshop on Information Sharing and Collaborative Security, 2015

Cryptographic Algorithm Implementation Requirements and Usage Guidance for Encapsulating Security Payload (ESP) and Authentication Header (AH).
RFC, August, 2014

AES-CCM Elliptic Curve Cryptography (ECC) Cipher Suites for TLS.
RFC, June, 2014

COFFE: Ciphertext Output Feedback Faithful Encryption.
IACR Cryptol. ePrint Arch., 2014

Pipelineable On-Line Encryption.
IACR Cryptol. ePrint Arch., 2014

Privacy vs. Efficacy in Cloud-based Threat Detection.
Proceedings of the 6th edition of the ACM Workshop on Cloud Computing Security, 2014

AES-CCM Cipher Suites for Transport Layer Security (TLS).
RFC, July, 2012

Impossible plaintext cryptanalysis and probable-plaintext collision attacks of 64-bit block cipher modes.
IACR Cryptol. ePrint Arch., 2012

The Use of AES-192 and AES-256 in Secure RTP.
RFC, March, 2011

Fundamental Elliptic Curve Cryptography Algorithms.
RFC, February, 2011

Galois Counter Mode.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Using Counter Modes with Encapsulating Security Payload (ESP) and Authentication Header (AH) to Protect Group Traffic.
RFC, November, 2010

Datagram Transport Layer Security (DTLS) Extension to Establish Keys for the Secure Real-time Transport Protocol (SRTP).
RFC, May, 2010

Dynamic Provisioning Using Flexible Authentication via Secure Tunneling Extensible Authentication Protocol (EAP-FAST).
RFC, March, 2009

AES Galois Counter Mode (GCM) Cipher Suites for TLS.
RFC, August, 2008

Using Authenticated Encryption Algorithms with the Encrypted Payload of the Internet Key Exchange version 2 (IKEv2) Protocol.
RFC, August, 2008

An Interface and Algorithms for Authenticated Encryption.
RFC, January, 2008

The Flexible Authentication via Secure Tunneling Extensible Authentication Protocol Method (EAP-FAST).
RFC, May, 2007

The Security of the Extended Codebook (XCB) Mode of Operation.
IACR Cryptol. ePrint Arch., 2007

The Use of Galois Message Authentication Code (GMAC) in IPsec ESP and AH.
RFC, May, 2006

A High-Speed Hardware Architecture for Universal Message Authentication Code.
IEEE J. Sel. Areas Commun., 2006

(R)Evolutionary Bootstrapping of a Global PKI for Securing BGP.
Proceedings of the 5th ACM Workshop on Hot Topics in Networks, 2006

The Use of Galois/Counter Mode (GCM) in IPsec Encapsulating Security Payload (ESP).
RFC, June, 2005

Divide-and-concatenate: an architecture-level optimization technique for universal hash functions.
IEEE Trans. on CAD of Integrated Circuits and Systems, 2005

Minimizing center key storage in hybrid one-way function based group key management with communication constraints.
Inf. Process. Lett., 2005

Multiple forgery attacks against Message Authentication Codes.
IACR Cryptol. ePrint Arch., 2005

Efficient Authentication of Large, Dynamic Data Sets Using Galois/Counter Mode (GCM).
Proceedings of the 3rd International IEEE Security in Storage Workshop (SISW 2005), 2005

The Secure Real-time Transport Protocol (SRTP).
RFC, March, 2004

High speed architectures for Leviathan: a binary tree based stream cipher.
Microprocess. Microsystems, 2004

The Security and Performance of the Galois/Counter Mode of Operation (Full Version).
IACR Cryptol. ePrint Arch., 2004

The Extended Codebook (XCB) Mode of Operation.
IACR Cryptol. ePrint Arch., 2004

The Security and Performance of the Galois/Counter Mode (GCM) of Operation.
Proceedings of the Progress in Cryptology, 2004

Key Establishment in Large Dynamic Groups Using One-Way Function Trees.
IEEE Trans. Software Eng., 2003

Divide and Concatenate: A Scalable Hardware Architecture for Universal MAC.
IACR Cryptol. ePrint Arch., 2003

Attacks on Additive Encryption of Redundant Plaintext and Implications on Internet Security.
Proceedings of the Selected Areas in Cryptography, 7th Annual International Workshop, 2000

Statistical Analysis of the Alleged RC4 Keystream Generator.
Proceedings of the Fast Software Encryption, 7th International Workshop, 2000