Articles with public access mandates - Sam ScottLearn more
Available somewhere: 4
A comprehensive symbolic analysis of TLS 1.3
C Cremers, M Horvat, J Hoyland, S Scott, T van der Merwe
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
Mandates: US Department of Defense, UK Engineering and Physical Sciences Research …
Automated Analysis and Verification of TLS 1.3: 0-RTT, Resumption and Delayed Authentication
C Cremers, M Horvat, S Scott, T van der Merwe
Security and Privacy (SP), 2016 IEEE Symposium on. IEEE, 2016
Mandates: UK Engineering and Physical Sciences Research Council
Key rotation for authenticated encryption
A Everspaugh, K Paterson, T Ristenpart, S Scott
Advances in Cryptology–CRYPTO 2017: 37th Annual International Cryptology …, 2017
Mandates: US National Science Foundation, UK Engineering and Physical Sciences …
The discrete logarithm problem for exponents of bounded height
SR Blackburn, S Scott
LMS Journal of Computation and Mathematics 17 (A), 148-156, 2014
Mandates: UK Engineering and Physical Sciences Research Council
Publication and funding information is determined automatically by a computer program