Scott R. Fluhrer

Affiliations:
  • Cisco Systems


According to our database1, Scott R. Fluhrer authored at least 32 papers between 2000 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Smaller Sphincs+.
IACR Cryptol. ePrint Arch., 2024

Side Channel Resistant Sphincs+.
IACR Cryptol. ePrint Arch., 2024

2023
Multiple Key Exchanges in the Internet Key Exchange Protocol Version 2 (IKEv2).
RFC, May, 2023

Oops, I did it again revisited: another look at reusing one-time signatures.
IACR Cryptol. ePrint Arch., 2023

2020
Mixing Preshared Keys in the Internet Key Exchange Protocol Version 2 (IKEv2) for Post-quantum Security.
RFC, June, 2020

2019
Leighton-Micali Hash-Based Signatures.
RFC, April, 2019

Round5: Compact and Fast Post-Quantum Public-Key Encryption.
IACR Cryptol. ePrint Arch., 2019

2017
LMS vs XMSS: A comparison of the Stateful Hash-Based Signature Proposed Standards.
IACR Cryptol. ePrint Arch., 2017

Reassessing Grover's Algorithm.
IACR Cryptol. ePrint Arch., 2017

Further Analysis of a Proposed Hash-Based Signature Standard.
IACR Cryptol. ePrint Arch., 2017

Complete Attack on RLWE Key Exchange with reused keys, without Signal Leakage.
IACR Cryptol. ePrint Arch., 2017

Leakage of signal function with reused keys in RLWE key exchange.
Proceedings of the IEEE International Conference on Communications, 2017

2016
State Management for Hash Based Signatures.
IACR Cryptol. ePrint Arch., 2016

Cryptanalysis of ring-LWE based key exchange with key share reuse.
IACR Cryptol. ePrint Arch., 2016

Leakage of Signal function with reused keys in RLWE key exchange.
IACR Cryptol. ePrint Arch., 2016

2015
Scalar Blinding on Elliptic Curves based on Primes with Special Structure.
IACR Cryptol. ePrint Arch., 2015

Quantum Cryptanalysis of NTRU.
IACR Cryptol. ePrint Arch., 2015

2014
FNR : Arbitrary length small domain block cipher proposal.
IACR Cryptol. ePrint Arch., 2014

Pipelineable On-Line Encryption.
IACR Cryptol. ePrint Arch., 2014

2013
Additional Diffie-Hellman Tests for the Internet Key Exchange Protocol Version 2 (IKEv2).
RFC, July, 2013

2011
An EAP Authentication Method Based on the Encrypted Key Exchange (EKE) Protocol.
RFC, February, 2011

2008
Collision Attack on the Waterfall Hash Function.
IACR Cryptol. ePrint Arch., 2008

2007
The Security of the Extended Codebook (XCB) Mode of Operation.
IACR Cryptol. ePrint Arch., 2007

2005
Multiple forgery attacks against Message Authentication Codes.
IACR Cryptol. ePrint Arch., 2005

2004
The Extended Codebook (XCB) Mode of Operation.
IACR Cryptol. ePrint Arch., 2004

2002
Improved key recovery of level 1 of the Bluetooth Encryption System.
IACR Cryptol. ePrint Arch., 2002

2001
Weaknesses in the Key Scheduling Algorithm of RC4.
Proceedings of the Selected Areas in Cryptography, 8th Annual International Workshop, 2001

Analysis of the E<sub>0</sub> Encryption System.
Proceedings of the Selected Areas in Cryptography, 8th Annual International Workshop, 2001

Cryptanalysis of the SEAL 3.0 Pseudorandom Function Family.
Proceedings of the Fast Software Encryption, 8th International Workshop, 2001

Cryptanalysis of the Mercy Block Cipher.
Proceedings of the Fast Software Encryption, 8th International Workshop, 2001

2000
Attacks on Additive Encryption of Redundant Plaintext and Implications on Internet Security.
Proceedings of the Selected Areas in Cryptography, 7th Annual International Workshop, 2000

Statistical Analysis of the Alleged RC4 Keystream Generator.
Proceedings of the Fast Software Encryption, 7th International Workshop, 2000


  Loading...