David A. McGrew

According to our database1, David A. McGrew authored at least 55 papers between 2000 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2019
Leighton-Micali Hash-Based Signatures.
RFC, April, 2019

Limitless HTTP in an HTTPS World: Inferring the Semantics of the HTTPS Protocol without Decryption.
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019

2018
Deciphering malware's use of TLS (without decryption).
J. Computer Virology and Hacking Techniques, 2018

Limitless HTTP in an HTTPS World: Inferring the Semantics of the HTTPS Protocol without Decryption.
CoRR, 2018

An In-Depth Study of Open-Source Command and Control Frameworks.
Proceedings of the 13th International Conference on Malicious and Unwanted Software, 2018

2017
OS Fingerprinting: New Techniques and a Study of Information Gain and Obfuscation.
CoRR, 2017

Machine Learning for Encrypted Malware Traffic Classification: Accounting for Noisy Labels and Non-Stationarity.
Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Halifax, NS, Canada, August 13, 2017

OS fingerprinting: New techniques and a study of information gain and obfuscation.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

2016
State Management for Hash Based Signatures.
IACR Cryptology ePrint Archive, 2016

Deciphering Malware's use of TLS (without Decryption).
CoRR, 2016

State Management for Hash-Based Signatures.
Proceedings of the Security Standardisation Research - Third International Conference, 2016

Enhanced telemetry for encrypted threat analytics.
Proceedings of the 24th IEEE International Conference on Network Protocols, 2016

Identifying Encrypted Malware Traffic with Contextual Flow Data.
Proceedings of the 2016 ACM Workshop on Artificial Intelligence and Security, 2016

Discovering Human and Machine Readable Descriptions of Malware Families.
Proceedings of the Artificial Intelligence for Cyber Security, 2016

2015
AES-GCM Authenticated Encryption in the Secure Real-time Transport Protocol (SRTP).
RFC, December, 2015

An Actionable Threat Intelligence system using a Publish-Subscribe communications model.
Proceedings of the 2nd ACM Workshop on Information Sharing and Collaborative Security, 2015

2014
Cryptographic Algorithm Implementation Requirements and Usage Guidance for Encapsulating Security Payload (ESP) and Authentication Header (AH).
RFC, August, 2014

AES-CCM Elliptic Curve Cryptography (ECC) Cipher Suites for TLS.
RFC, June, 2014

COFFE: Ciphertext Output Feedback Faithful Encryption.
IACR Cryptology ePrint Archive, 2014

Pipelineable On-Line Encryption.
IACR Cryptology ePrint Archive, 2014

Pipelineable On-line Encryption.
Proceedings of the Fast Software Encryption - 21st International Workshop, 2014

Privacy vs. Efficacy in Cloud-based Threat Detection.
Proceedings of the 6th edition of the ACM Workshop on Cloud Computing Security, 2014

2012
AES-CCM Cipher Suites for Transport Layer Security (TLS).
RFC, July, 2012

Impossible plaintext cryptanalysis and probable-plaintext collision attacks of 64-bit block cipher modes.
IACR Cryptology ePrint Archive, 2012

2011
The Use of AES-192 and AES-256 in Secure RTP.
RFC, March, 2011

Fundamental Elliptic Curve Cryptography Algorithms.
RFC, February, 2011

Galois Counter Mode.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

2010
Using Counter Modes with Encapsulating Security Payload (ESP) and Authentication Header (AH) to Protect Group Traffic.
RFC, November, 2010

Datagram Transport Layer Security (DTLS) Extension to Establish Keys for the Secure Real-time Transport Protocol (SRTP).
RFC, May, 2010

2009
Dynamic Provisioning Using Flexible Authentication via Secure Tunneling Extensible Authentication Protocol (EAP-FAST).
RFC, March, 2009

2008
AES Galois Counter Mode (GCM) Cipher Suites for TLS.
RFC, August, 2008

Using Authenticated Encryption Algorithms with the Encrypted Payload of the Internet Key Exchange version 2 (IKEv2) Protocol.
RFC, August, 2008

An Interface and Algorithms for Authenticated Encryption.
RFC, January, 2008

2007
The Flexible Authentication via Secure Tunneling Extensible Authentication Protocol Method (EAP-FAST).
RFC, May, 2007

The Security of the Extended Codebook (XCB) Mode of Operation.
IACR Cryptology ePrint Archive, 2007

The Security of the Extended Codebook (XCB) Mode of Operation.
Proceedings of the Selected Areas in Cryptography, 14th International Workshop, 2007

2006
The Use of Galois Message Authentication Code (GMAC) in IPsec ESP and AH.
RFC, May, 2006

A High-Speed Hardware Architecture for Universal Message Authentication Code.
IEEE Journal on Selected Areas in Communications, 2006

(R)Evolutionary Bootstrapping of a Global PKI for Securing BGP.
Proceedings of the 5th ACM Workshop on Hot Topics in Networks, 2006

2005
The Use of Galois/Counter Mode (GCM) in IPsec Encapsulating Security Payload (ESP).
RFC, June, 2005

Divide-and-concatenate: an architecture-level optimization technique for universal hash functions.
IEEE Trans. on CAD of Integrated Circuits and Systems, 2005

Minimizing center key storage in hybrid one-way function based group key management with communication constraints.
Inf. Process. Lett., 2005

Multiple forgery attacks against Message Authentication Codes.
IACR Cryptology ePrint Archive, 2005

Efficient Authentication of Large, Dynamic Data Sets Using Galois/Counter Mode (GCM).
Proceedings of the 3rd International IEEE Security in Storage Workshop (SISW 2005), 2005

2004
The Secure Real-time Transport Protocol (SRTP).
RFC, March, 2004

High speed architectures for Leviathan: a binary tree based stream cipher.
Microprocessors and Microsystems, 2004

The Security and Performance of the Galois/Counter Mode of Operation (Full Version).
IACR Cryptology ePrint Archive, 2004

The Extended Codebook (XCB) Mode of Operation.
IACR Cryptology ePrint Archive, 2004

The Security and Performance of the Galois/Counter Mode (GCM) of Operation.
Proceedings of the Progress in Cryptology, 2004

Divide and concatenate: a scalable hardware architecture for universal MAC.
Proceedings of the ACM/SIGDA 12th International Symposium on Field Programmable Gate Arrays, 2004

Divide-and-concatenate: an architecture level optimization technique for universal hash functions.
Proceedings of the 41th Design Automation Conference, 2004

2003
Key Establishment in Large Dynamic Groups Using One-Way Function Trees.
IEEE Trans. Software Eng., 2003

Divide and Concatenate: A Scalable Hardware Architecture for Universal MAC.
IACR Cryptology ePrint Archive, 2003

2000
Attacks on Additive Encryption of Redundant Plaintext and Implications on Internet Security.
Proceedings of the Selected Areas in Cryptography, 7th Annual International Workshop, 2000

Statistical Analysis of the Alleged RC4 Keystream Generator.
Proceedings of the Fast Software Encryption, 7th International Workshop, 2000


  Loading...