Sam Scott

Mr

Filter
Conference contribution

Search results

  • 2017

    A Comprehensive Symbolic Analysis of TLS 1.3

    Cremers, C., Horvat, M., Hoyland, J., Scott, S. & van der Merwe, T., 30 Oct 2017, ACM SIGSAC Conference on Computer and Commuincations Security. ACM, p. 1773-1788 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Key Rotation for Authenticated Encryption

    Everspaugh, A., Paterson, K., Ristenpart, T. & Scott, S., 2 Aug 2017, (E-pub ahead of print) Advances in Cryptology – CRYPTO 2017 : 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20–24, 2017, Proceedings, Part III. Springer, p. 98-129 32 p. (Lecture Notes in Computer Science ; vol. 10403 ).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    301 Downloads (Pure)
  • 2016

    Automated Analysis and Verification of TLS 1.3: 0-RTT, Resumption and Delayed Authentication

    Cremers, C., Horvat, M., Scott, S. & Van Der Merwe, T., 18 Aug 2016, IEEE Symposium on Security and Privacy 2016. p. 470-485 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2015

    The Pythia PRF Service

    Everspaugh, A., Chatterjee, R., Juels, A., Scott, S. & Ristenpart, T., Aug 2015, Proceedings of the 24th USENIX Conference on Security Symposium. USENIX Association, p. 547 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access