Search the dblp DataBase
Bruce Schneier :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Niels Ferguson , Bruce Schneier , David Wagner Security Weaknesses in a Randomized Stream Cipher. [Citation Graph (0, 0)][DBLP ] ACISP, 2000, pp:234-241 [Conf ] Chris Hall , Bruce Schneier Remote Electronic Gambling. [Citation Graph (0, 0)][DBLP ] ACSAC, 1997, pp:232-238 [Conf ] John Kelsey , Bruce Schneier , Chris Hall An Authenticated Camera. [Citation Graph (0, 0)][DBLP ] ACSAC, 1996, pp:24-31 [Conf ] Bruce Schneier , Chris Hall An Improved E-Mail Security Protocol. [Citation Graph (0, 0)][DBLP ] ACSAC, 1997, pp:227-0 [Conf ] Bruce Schneier , James Riordan A Certified E-Mail Protocol. [Citation Graph (0, 0)][DBLP ] ACSAC, 1998, pp:347-352 [Conf ] John Kelsey , Bruce Schneier MARS Attacks! Preliminary Cryptanalysis of Reduced-Round MARS Variants. [Citation Graph (0, 0)][DBLP ] AES Candidate Conference, 2000, pp:169-185 [Conf ] Tadayoshi Kohno , John Kelsey , Bruce Schneier Preliminary Cryptanalysis of Reduced-Round Serpent. [Citation Graph (0, 0)][DBLP ] AES Candidate Conference, 2000, pp:195-211 [Conf ] Bruce Schneier , John Kelsey , Doug Whiting , David Wagner , Niels Ferguson Comments on Twofish as an AES Candidate. [Citation Graph (0, 0)][DBLP ] AES Candidate Conference, 2000, pp:355-356 [Conf ] Bruce Schneier , Doug Whiting A Performance Comparison of the Five AES Finalists. [Citation Graph (0, 0)][DBLP ] AES Candidate Conference, 2000, pp:123-135 [Conf ] John Kelsey , Bruce Schneier Secure Authentication with Multiple Parallel Keys. [Citation Graph (0, 0)][DBLP ] CARDIS, 1998, pp:150-156 [Conf ] Bruce Schneier , John Kelsey Authenticating Outputs of Computer Software Using a Cryptographic Coprocessor. [Citation Graph (0, 0)][DBLP ] CARDIS, 1996, pp:- [Conf ] Bruce Schneier , Doug Whiting Twofish on Smart Cards. [Citation Graph (0, 0)][DBLP ] CARDIS, 1998, pp:265-276 [Conf ] John Kelsey , Bruce Schneier Conditional Purchase Orders. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 1997, pp:117-124 [Conf ] Bruce Schneier , Mudge Cryptanalysis of Microsoft's Point-to-Point Tunneling Protocol (PPTP). [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 1998, pp:132-141 [Conf ] Bruce Schneier , Mudge , David Wagner Cryptanalysis of Microsoft's PPTP Authentication Extensions (MS-CHAPv2). [Citation Graph (0, 0)][DBLP ] CQRE, 1999, pp:192-203 [Conf ] Chris Hall , David Wagner , John Kelsey , Bruce Schneier Building PRFs from PRPs. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1998, pp:370-389 [Conf ] John Kelsey , Bruce Schneier , David Wagner Key-Schedule Cryptoanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1996, pp:237-251 [Conf ] David Wagner , Bruce Schneier , John Kelsey Cryptoanalysis of the Cellular Encryption Algorithm. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1997, pp:526-537 [Conf ] John Kelsey , Bruce Schneier , David Wagner , Chris Hall Side Channel Cryptanalysis of Product Ciphers. [Citation Graph (0, 0)][DBLP ] ESORICS, 1998, pp:97-110 [Conf ] Bruce Schneier , John Kelsey , Jay Walker Distributed Proctoring. [Citation Graph (0, 0)][DBLP ] ESORICS, 1996, pp:172-182 [Conf ] John Kelsey , Bruce Schneier Second Preimages on n-Bit Hash Functions for Much Less than 2n Work. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2005, pp:474-490 [Conf ] Chris Hall , John Kelsey , Bruce Schneier , David Wagner Cryptanalysis of SPEED. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 1998, pp:309-310 [Conf ] Don Coppersmith , David Wagner , Bruce Schneier , John Kelsey Cryptanalysis of TWOPRIME. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1998, pp:32-48 [Conf ] Niels Ferguson , John Kelsey , Stefan Lucks , Bruce Schneier , Michael Stay , David Wagner , Doug Whiting Improved Cryptanalysis of Rijndael. [Citation Graph (0, 0)][DBLP ] FSE, 2000, pp:213-230 [Conf ] Niels Ferguson , Doug Whiting , Bruce Schneier , John Kelsey , Stefan Lucks , Tadayoshi Kohno Helix: Fast Encryption and Authentication in a Single Cryptographic Primitive. [Citation Graph (0, 0)][DBLP ] FSE, 2003, pp:330-346 [Conf ] Matt Blaze , Bruce Schneier The MacGuffin Block Cipher Algorithm. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1994, pp:97-110 [Conf ] John Kelsey , Tadayoshi Kohno , Bruce Schneier Amplified Boomerang Attacks Against Reduced-Round MARS and Serpent. [Citation Graph (0, 0)][DBLP ] FSE, 2000, pp:75-93 [Conf ] John Kelsey , Bruce Schneier , David Wagner Mod n Cryptanalysis, with Applications Against RC5P and M6. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1999, pp:139-155 [Conf ] John Kelsey , Bruce Schneier , David Wagner , Chris Hall Cryptanalytic Attacks on Pseudorandom Number Generators. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1998, pp:168-188 [Conf ] Bruce Schneier Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish). [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1993, pp:191-204 [Conf ] Bruce Schneier , John Kelsey Unbalanced Feistel Networks and Block Cipher Design. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1996, pp:121-144 [Conf ] Bruce Schneier , Doug Whiting Fast Software Encryption: Designing Encryption Algorithms for Optimal Software Speed on the Intel Pentium Processor. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1997, pp:242-259 [Conf ] Chris Hall , Ian Goldberg , Bruce Schneier Reaction Attacks against several Public-Key Cryptosystems. [Citation Graph (0, 0)][DBLP ] ICICS, 1999, pp:2-12 [Conf ] John Kelsey , Bruce Schneier , David Wagner Related-key cryptanalysis of 3-WAY, Biham-DES, CAST, DES-X, NewDES, RC2, and TEA. [Citation Graph (0, 0)][DBLP ] ICICS, 1997, pp:233-246 [Conf ] Kahil Jallad , Jonathan Katz , Bruce Schneier Implementation of Chosen-Ciphertext Attacks against PGP and GnuPG. [Citation Graph (0, 0)][DBLP ] ISC, 2002, pp:90-101 [Conf ] John Kelsey , Bruce Schneier , Chris Hall , David Wagner Secure Applications of Low-Entropy Keys. [Citation Graph (0, 0)][DBLP ] ISW, 1997, pp:121-134 [Conf ] James Riordan , Bruce Schneier Environmental Key Generation Towards Clueless Agents. [Citation Graph (0, 0)][DBLP ] Mobile Agents and Security, 1998, pp:15-24 [Conf ] Chris Slater , O. Sami Saydjari , Bruce Schneier , Jim Wallner Toward a Secure System Engineering Methodolgy. [Citation Graph (0, 0)][DBLP ] Workshop on New Security Paradigms, 1998, pp:2-10 [Conf ] John Kelsey , Bruce Schneier Minimizing Bandwidth for Remote Access to Cryptographically Protected Audit Logs. [Citation Graph (0, 0)][DBLP ] Recent Advances in Intrusion Detection, 1999, pp:- [Conf ] John Kelsey , Bruce Schneier Key-Schedule Cryptanalysis of DEAL. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 1999, pp:118-134 [Conf ] John Kelsey , Bruce Schneier , Niels Ferguson Yarrow-160: Notes on the Design and Analysis of the Yarrow Cryptographic Pseudorandom Number Generator. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 1999, pp:13-33 [Conf ] Chris Hall , John Kelsey , Vincent Rijmen , Bruce Schneier , David Wagner Cryptanalysis of SPEED. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 1998, pp:319-338 [Conf ] Bruce Schneier , John Kelsey , Doug Whiting , David Wagner , Chris Hall On the Twofish Key Schedule. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 1998, pp:27-42 [Conf ] David Wagner , Leone Simpson , Ed Dawson , John Kelsey , William Millan , Bruce Schneier Cryptanalysis of ORYX. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 1998, pp:296-305 [Conf ] John Kelsey , Bruce Schneier , David Wagner Protocol Interactions and the Chosen Protocol Attack. [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 1997, pp:91-104 [Conf ] Bruce Schneier , John Kelsey Automatic Event-Stream Notarization Using Digital Signatures. [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 1996, pp:155-169 [Conf ] David L. Dill , Bruce Schneier , Barbara Simons Voting and technology: who gets to count your vote? [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2003, v:46, n:8, pp:29-31 [Journal ] Carl M. Ellison , Bruce Schneier Risks of PKI: Secure Email. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2000, v:43, n:1, pp:160- [Journal ] Carl M. Ellison , Bruce Schneier Risks of PKI: E-Commerce. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2000, v:43, n:2, pp:152- [Journal ] Paul C. Kocher , Bruce Schneier Insider risks in elections. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2004, v:47, n:7, pp:104- [Journal ] Bruce Schneier Semantic network attacks. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2000, v:43, n:12, pp:168- [Journal ] Bruce Schneier Insurance and the computer industry. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2001, v:44, n:3, pp:114-115 [Journal ] Bruce Schneier Cyber underwriters lab. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2001, v:44, n:4, pp:128- [Journal ] Bruce Schneier The nonsecurity of secrecy. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2004, v:47, n:10, pp:120- [Journal ] Bruce Schneier Two-factor authentication: too little, too late. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2005, v:48, n:4, pp:136- [Journal ] Bruce Schneier Risks of third-party data. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2005, v:48, n:5, pp:136- [Journal ] Bruce Schneier Cryptography, Security, and the Future. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1997, v:40, n:1, pp:138- [Journal ] Bruce Schneier The Uses and Abuses of Biometrics. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1999, v:42, n:8, pp:136- [Journal ] Bruce Schneier The Trojan Horse Race. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1999, v:42, n:9, pp:128- [Journal ] Bruce Schneier Risks of Relying on Cryptography. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1999, v:42, n:10, pp:144- [Journal ] Stephan Somogyi , Bruce Schneier The perils of port 80. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2001, v:44, n:10, pp:168- [Journal ] Bruce Schneier The psychology of security. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2007, v:50, n:5, pp:128- [Journal ] Bruce Schneier Managed Security Monitoring: Network Security for the 21st Centur. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2001, v:20, n:6, pp:491-503 [Journal ] Bruce Schneier Cryptography: The Importance of Not Being Different. [Citation Graph (0, 0)][DBLP ] IEEE Computer, 1999, v:32, n:3, pp:108-109 [Journal ] Bruce Schneier Hacking the Business Climate for Network Security. [Citation Graph (0, 0)][DBLP ] IEEE Computer, 2004, v:37, n:4, pp:87-89 [Journal ] Bruce Schneier Cryptographic Design Vulnerabilities. [Citation Graph (0, 0)][DBLP ] IEEE Computer, 1998, v:31, n:9, pp:29-33 [Journal ] John Kelsey , Bruce Schneier The Street Performer Protocol and Digital Copyrights. [Citation Graph (0, 0)][DBLP ] First Monday, 1999, v:4, n:6, pp:- [Journal ] Ross J. Anderson , Bruce Schneier Guest Editors' Introduction: Economics of Information Security. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2005, v:3, n:1, pp:12-13 [Journal ] Bruce Schneier We Are All Security Consumers. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2003, v:1, n:1, pp:104- [Journal ] Bruce Schneier Locks and Full Disclosure. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2003, v:1, n:2, pp:88- [Journal ] Bruce Schneier Guilty Until Proven Innocent? [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2003, v:1, n:3, pp:88- [Journal ] Bruce Schneier The Speed of Security. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2003, v:1, n:4, pp:96- [Journal ] Bruce Schneier Airplane Hackers. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2003, v:1, n:6, pp:92- [Journal ] Bruce Schneier Voting Security and Technology. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2004, v:2, n:1, pp:84- [Journal ] Bruce Schneier Security and Compliance. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2004, v:2, n:3, pp:96- [Journal ] Bruce Schneier Customers, Passwords, and Web Sites. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2004, v:2, n:4, pp:88- [Journal ] Bruce Schneier SIMS: Solution, or Part of the Problem? [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2004, v:2, n:5, pp:88- [Journal ] Bruce Schneier Authentication and Expiration. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2005, v:3, n:1, pp:88- [Journal ] Bruce Schneier The Zotob Storm. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2005, v:3, n:6, pp:96- [Journal ] Bruce Schneier Security pitfalls in cryptographic design. [Citation Graph (0, 0)][DBLP ] Inf. Manag. Comput. Security, 1998, v:6, n:3, pp:133-137 [Journal ] John Kelsey , Bruce Schneier , David Wagner , Chris Hall Side Channel Cryptanalysis of Product Ciphers. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 2000, v:8, n:2/3, pp:- [Journal ] Bruce Schneier Sensible Authentication. [Citation Graph (0, 0)][DBLP ] ACM Queue, 2004, v:1, n:10, pp:74-78 [Journal ] Bruce Schneier Attack trends: 2004 and 2005. [Citation Graph (0, 0)][DBLP ] ACM Queue, 2005, v:3, n:5, pp:52-53 [Journal ] Bruce Schneier , John Kelsey Secure Audit Logs to Support Computer Forensics. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 1999, v:2, n:2, pp:159-176 [Journal ] Carl M. Ellison , Chris Hall , Randy Milbert , Bruce Schneier Protecting secret keys with personal entropy. [Citation Graph (0, 0)][DBLP ] Future Generation Comp. Syst., 2000, v:16, n:4, pp:311-318 [Journal ] Defeating Encrypted and Deniable File Systems: TrueCrypt v5.1a and the Case of the Tattling OS and Applications. [Citation Graph (, )][DBLP ] The Psychology of Security. [Citation Graph (, )][DBLP ] Search in 0.009secs, Finished in 0.012secs