NEWS
Find a Professional: Explore Experts Across 197 Disciplines in 220 Countries!
Find a Professional
Print Your Certificate
New! Young University / Institution Rankings 2025
New! Art & Humanities Rankings 2025
New! Social Sciences and Humanities Rankings 2025
Highly Cited Researchers 2025
AD
Scientific Index 2025
Scientist Rankings
University Rankings
Subject Rankings
Country Rankings
login
Login
person_add
Register
insights
H-Index Rankings
insights
i10 Productivity Rankings
format_list_numbered
Citation Rankings
subject
University Subject Rankings
school
Young Universities
format_list_numbered
Top 100 Scientists
format_quote
Top 100 Institutions
format_quote
Compare & Choose
local_fire_department
Country Reports
person
Find a Professional
Sam Scott
Cornell University - Ithaca / United States
Engineering & Technology / Computer Science
AD Scientific Index ID: 1293387
Registration, Add Profile,
Premium Membership
Print Your Certificate
Ranking &
Analysis
Job
Experiences (0)
Education
Information (0)
Published Books (0)
Book Chapters (0)
Articles (0)
Presentations (0)
Lessons (0)
Projects (0)
Congresses (0)
Editorship, Referee &
Scientific Board (0 )
Patents /
Designs (0)
Academic Grants
& Awards (0)
Artistic
Activities (0)
Certificate / Course
/ Trainings (0)
Association &
Society Memberships (0)
Contact, Office
& Social Media
person_outline
Sam Scott's MOST POPULAR ARTICLES
1-)
On the concrete hardness of Learning with ErrorsMR Albrecht, R Player, S ScottCryptology ePrint Archive, Report 2015/046, 2015. http://eprint. iacr. org …, 0888*
2-)
A comprehensive symbolic analysis of TLS 1.3C Cremers, M Horvat, J Hoyland, S Scott, T van der MerweProceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 20172742017
3-)
Automated Analysis and Verification of TLS 1.3: 0-RTT, Resumption and Delayed AuthenticationC Cremers, M Horvat, S Scott, T van der MerweSecurity and Privacy (SP), 2016 IEEE Symposium on. IEEE, 20161522016
4-)
The pythia PRF serviceA Everspaugh, R Chatterjee, S Scott, A Juels, T Ristenpart, C TechProceedings of the 24th USENIX Conference on Security Symposium, 547-562, 20151162015
5-)
Key rotation for authenticated encryptionA Everspaugh, K Paterson, T Ristenpart, S ScottAdvances in Cryptology–CRYPTO 2017: 37th Annual International Cryptology …, 2017972017
ARTICLES
Add your articles
We use cookies to personalize our website and offer you a better experience. If you accept cookies, we can offer you special services.
Cookie Policy
Accept