2007 |
12 | EE | David A. McGrew,
Scott R. Fluhrer:
The Security of the Extended Codebook (XCB) Mode of Operation.
Selected Areas in Cryptography 2007: 311-327 |
2006 |
11 | EE | Bo Yang,
Ramesh Karri,
David A. McGrew:
A High-Speed Hardware Architecture for Universal Message Authentication Code.
IEEE Journal on Selected Areas in Communications 24(10): 1831-1839 (2006) |
2005 |
10 | EE | David A. McGrew:
Efficient Authentication of Large, Dynamic Data Sets Using Galois/Counter Mode (GCM).
IEEE Security in Storage Workshop 2005: 89-94 |
9 | EE | Bo Yang,
Ramesh Karri,
David A. McGrew:
Divide-and-concatenate: an architecture-level optimization technique for universal hash functions.
IEEE Trans. on CAD of Integrated Circuits and Systems 24(11): 1740-1747 (2005) |
8 | EE | Mingyan Li,
Radha Poovendran,
David A. McGrew:
Minimizing center key storage in hybrid one-way function based group key management with communication constraints.
Inf. Process. Lett. 93(4): 191-198 (2005) |
2004 |
7 | EE | Bo Yang,
Ramesh Karri,
David A. McGrew:
Divide-and-concatenate: an architecture level optimization technique for universal hash functions.
DAC 2004: 614-617 |
6 | EE | Bo Yang,
Ramesh Karri,
David A. McGrew:
Divide and concatenate: a scalable hardware architecture for universal MAC.
FPGA 2004: 258 |
5 | EE | David A. McGrew,
John Viega:
The Security and Performance of the Galois/Counter Mode (GCM) of Operation.
INDOCRYPT 2004: 343-355 |
4 | EE | Darshan Sonecha,
Bo Yang,
Ramesh Karri,
David A. McGrew:
High speed architectures for Leviathan: a binary tree based stream cipher.
Microprocessors and Microsystems 28(10): 573-584 (2004) |
2003 |
3 | EE | Alan T. Sherman,
David A. McGrew:
Key Establishment in Large Dynamic Groups Using One-Way Function Trees.
IEEE Trans. Software Eng. 29(5): 444-458 (2003) |
2000 |
2 | EE | Scott R. Fluhrer,
David A. McGrew:
Statistical Analysis of the Alleged RC4 Keystream Generator.
FSE 2000: 19-30 |
1 | EE | David A. McGrew,
Scott R. Fluhrer:
Attacks on Additive Encryption of Redundant Plaintext and Implications on Internet Security.
Selected Areas in Cryptography 2000: 14-28 |