The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Bruce Schneier: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Niels Ferguson, Bruce Schneier, David Wagner
    Security Weaknesses in a Randomized Stream Cipher. [Citation Graph (0, 0)][DBLP]
    ACISP, 2000, pp:234-241 [Conf]
  2. Chris Hall, Bruce Schneier
    Remote Electronic Gambling. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1997, pp:232-238 [Conf]
  3. John Kelsey, Bruce Schneier, Chris Hall
    An Authenticated Camera. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1996, pp:24-31 [Conf]
  4. Bruce Schneier, Chris Hall
    An Improved E-Mail Security Protocol. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1997, pp:227-0 [Conf]
  5. Bruce Schneier, James Riordan
    A Certified E-Mail Protocol. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1998, pp:347-352 [Conf]
  6. John Kelsey, Bruce Schneier
    MARS Attacks! Preliminary Cryptanalysis of Reduced-Round MARS Variants. [Citation Graph (0, 0)][DBLP]
    AES Candidate Conference, 2000, pp:169-185 [Conf]
  7. Tadayoshi Kohno, John Kelsey, Bruce Schneier
    Preliminary Cryptanalysis of Reduced-Round Serpent. [Citation Graph (0, 0)][DBLP]
    AES Candidate Conference, 2000, pp:195-211 [Conf]
  8. Bruce Schneier, John Kelsey, Doug Whiting, David Wagner, Niels Ferguson
    Comments on Twofish as an AES Candidate. [Citation Graph (0, 0)][DBLP]
    AES Candidate Conference, 2000, pp:355-356 [Conf]
  9. Bruce Schneier, Doug Whiting
    A Performance Comparison of the Five AES Finalists. [Citation Graph (0, 0)][DBLP]
    AES Candidate Conference, 2000, pp:123-135 [Conf]
  10. John Kelsey, Bruce Schneier
    Secure Authentication with Multiple Parallel Keys. [Citation Graph (0, 0)][DBLP]
    CARDIS, 1998, pp:150-156 [Conf]
  11. Bruce Schneier, John Kelsey
    Authenticating Outputs of Computer Software Using a Cryptographic Coprocessor. [Citation Graph (0, 0)][DBLP]
    CARDIS, 1996, pp:- [Conf]
  12. Bruce Schneier, Doug Whiting
    Twofish on Smart Cards. [Citation Graph (0, 0)][DBLP]
    CARDIS, 1998, pp:265-276 [Conf]
  13. John Kelsey, Bruce Schneier
    Conditional Purchase Orders. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1997, pp:117-124 [Conf]
  14. Bruce Schneier, Mudge
    Cryptanalysis of Microsoft's Point-to-Point Tunneling Protocol (PPTP). [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1998, pp:132-141 [Conf]
  15. Bruce Schneier, Mudge, David Wagner
    Cryptanalysis of Microsoft's PPTP Authentication Extensions (MS-CHAPv2). [Citation Graph (0, 0)][DBLP]
    CQRE, 1999, pp:192-203 [Conf]
  16. Chris Hall, David Wagner, John Kelsey, Bruce Schneier
    Building PRFs from PRPs. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1998, pp:370-389 [Conf]
  17. John Kelsey, Bruce Schneier, David Wagner
    Key-Schedule Cryptoanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1996, pp:237-251 [Conf]
  18. David Wagner, Bruce Schneier, John Kelsey
    Cryptoanalysis of the Cellular Encryption Algorithm. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1997, pp:526-537 [Conf]
  19. John Kelsey, Bruce Schneier, David Wagner, Chris Hall
    Side Channel Cryptanalysis of Product Ciphers. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1998, pp:97-110 [Conf]
  20. Bruce Schneier, John Kelsey, Jay Walker
    Distributed Proctoring. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1996, pp:172-182 [Conf]
  21. John Kelsey, Bruce Schneier
    Second Preimages on n-Bit Hash Functions for Much Less than 2n Work. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2005, pp:474-490 [Conf]
  22. Chris Hall, John Kelsey, Bruce Schneier, David Wagner
    Cryptanalysis of SPEED. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 1998, pp:309-310 [Conf]
  23. Don Coppersmith, David Wagner, Bruce Schneier, John Kelsey
    Cryptanalysis of TWOPRIME. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1998, pp:32-48 [Conf]
  24. Niels Ferguson, John Kelsey, Stefan Lucks, Bruce Schneier, Michael Stay, David Wagner, Doug Whiting
    Improved Cryptanalysis of Rijndael. [Citation Graph (0, 0)][DBLP]
    FSE, 2000, pp:213-230 [Conf]
  25. Niels Ferguson, Doug Whiting, Bruce Schneier, John Kelsey, Stefan Lucks, Tadayoshi Kohno
    Helix: Fast Encryption and Authentication in a Single Cryptographic Primitive. [Citation Graph (0, 0)][DBLP]
    FSE, 2003, pp:330-346 [Conf]
  26. Matt Blaze, Bruce Schneier
    The MacGuffin Block Cipher Algorithm. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1994, pp:97-110 [Conf]
  27. John Kelsey, Tadayoshi Kohno, Bruce Schneier
    Amplified Boomerang Attacks Against Reduced-Round MARS and Serpent. [Citation Graph (0, 0)][DBLP]
    FSE, 2000, pp:75-93 [Conf]
  28. John Kelsey, Bruce Schneier, David Wagner
    Mod n Cryptanalysis, with Applications Against RC5P and M6. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1999, pp:139-155 [Conf]
  29. John Kelsey, Bruce Schneier, David Wagner, Chris Hall
    Cryptanalytic Attacks on Pseudorandom Number Generators. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1998, pp:168-188 [Conf]
  30. Bruce Schneier
    Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish). [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1993, pp:191-204 [Conf]
  31. Bruce Schneier, John Kelsey
    Unbalanced Feistel Networks and Block Cipher Design. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1996, pp:121-144 [Conf]
  32. Bruce Schneier, Doug Whiting
    Fast Software Encryption: Designing Encryption Algorithms for Optimal Software Speed on the Intel Pentium Processor. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1997, pp:242-259 [Conf]
  33. Chris Hall, Ian Goldberg, Bruce Schneier
    Reaction Attacks against several Public-Key Cryptosystems. [Citation Graph (0, 0)][DBLP]
    ICICS, 1999, pp:2-12 [Conf]
  34. John Kelsey, Bruce Schneier, David Wagner
    Related-key cryptanalysis of 3-WAY, Biham-DES, CAST, DES-X, NewDES, RC2, and TEA. [Citation Graph (0, 0)][DBLP]
    ICICS, 1997, pp:233-246 [Conf]
  35. Kahil Jallad, Jonathan Katz, Bruce Schneier
    Implementation of Chosen-Ciphertext Attacks against PGP and GnuPG. [Citation Graph (0, 0)][DBLP]
    ISC, 2002, pp:90-101 [Conf]
  36. John Kelsey, Bruce Schneier, Chris Hall, David Wagner
    Secure Applications of Low-Entropy Keys. [Citation Graph (0, 0)][DBLP]
    ISW, 1997, pp:121-134 [Conf]
  37. James Riordan, Bruce Schneier
    Environmental Key Generation Towards Clueless Agents. [Citation Graph (0, 0)][DBLP]
    Mobile Agents and Security, 1998, pp:15-24 [Conf]
  38. Chris Slater, O. Sami Saydjari, Bruce Schneier, Jim Wallner
    Toward a Secure System Engineering Methodolgy. [Citation Graph (0, 0)][DBLP]
    Workshop on New Security Paradigms, 1998, pp:2-10 [Conf]
  39. John Kelsey, Bruce Schneier
    Minimizing Bandwidth for Remote Access to Cryptographically Protected Audit Logs. [Citation Graph (0, 0)][DBLP]
    Recent Advances in Intrusion Detection, 1999, pp:- [Conf]
  40. John Kelsey, Bruce Schneier
    Key-Schedule Cryptanalysis of DEAL. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 1999, pp:118-134 [Conf]
  41. John Kelsey, Bruce Schneier, Niels Ferguson
    Yarrow-160: Notes on the Design and Analysis of the Yarrow Cryptographic Pseudorandom Number Generator. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 1999, pp:13-33 [Conf]
  42. Chris Hall, John Kelsey, Vincent Rijmen, Bruce Schneier, David Wagner
    Cryptanalysis of SPEED. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 1998, pp:319-338 [Conf]
  43. Bruce Schneier, John Kelsey, Doug Whiting, David Wagner, Chris Hall
    On the Twofish Key Schedule. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 1998, pp:27-42 [Conf]
  44. David Wagner, Leone Simpson, Ed Dawson, John Kelsey, William Millan, Bruce Schneier
    Cryptanalysis of ORYX. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 1998, pp:296-305 [Conf]
  45. John Kelsey, Bruce Schneier, David Wagner
    Protocol Interactions and the Chosen Protocol Attack. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1997, pp:91-104 [Conf]
  46. Bruce Schneier, John Kelsey
    Automatic Event-Stream Notarization Using Digital Signatures. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1996, pp:155-169 [Conf]
  47. David L. Dill, Bruce Schneier, Barbara Simons
    Voting and technology: who gets to count your vote? [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2003, v:46, n:8, pp:29-31 [Journal]
  48. Carl M. Ellison, Bruce Schneier
    Risks of PKI: Secure Email. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2000, v:43, n:1, pp:160- [Journal]
  49. Carl M. Ellison, Bruce Schneier
    Risks of PKI: E-Commerce. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2000, v:43, n:2, pp:152- [Journal]
  50. Paul C. Kocher, Bruce Schneier
    Insider risks in elections. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2004, v:47, n:7, pp:104- [Journal]
  51. Bruce Schneier
    Semantic network attacks. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2000, v:43, n:12, pp:168- [Journal]
  52. Bruce Schneier
    Insurance and the computer industry. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2001, v:44, n:3, pp:114-115 [Journal]
  53. Bruce Schneier
    Cyber underwriters lab. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2001, v:44, n:4, pp:128- [Journal]
  54. Bruce Schneier
    The nonsecurity of secrecy. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2004, v:47, n:10, pp:120- [Journal]
  55. Bruce Schneier
    Two-factor authentication: too little, too late. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2005, v:48, n:4, pp:136- [Journal]
  56. Bruce Schneier
    Risks of third-party data. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2005, v:48, n:5, pp:136- [Journal]
  57. Bruce Schneier
    Cryptography, Security, and the Future. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1997, v:40, n:1, pp:138- [Journal]
  58. Bruce Schneier
    The Uses and Abuses of Biometrics. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1999, v:42, n:8, pp:136- [Journal]
  59. Bruce Schneier
    The Trojan Horse Race. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1999, v:42, n:9, pp:128- [Journal]
  60. Bruce Schneier
    Risks of Relying on Cryptography. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1999, v:42, n:10, pp:144- [Journal]
  61. Stephan Somogyi, Bruce Schneier
    The perils of port 80. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2001, v:44, n:10, pp:168- [Journal]
  62. Bruce Schneier
    The psychology of security. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2007, v:50, n:5, pp:128- [Journal]
  63. Bruce Schneier
    Managed Security Monitoring: Network Security for the 21st Centur. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2001, v:20, n:6, pp:491-503 [Journal]
  64. Bruce Schneier
    Cryptography: The Importance of Not Being Different. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 1999, v:32, n:3, pp:108-109 [Journal]
  65. Bruce Schneier
    Hacking the Business Climate for Network Security. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2004, v:37, n:4, pp:87-89 [Journal]
  66. Bruce Schneier
    Cryptographic Design Vulnerabilities. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 1998, v:31, n:9, pp:29-33 [Journal]
  67. John Kelsey, Bruce Schneier
    The Street Performer Protocol and Digital Copyrights. [Citation Graph (0, 0)][DBLP]
    First Monday, 1999, v:4, n:6, pp:- [Journal]
  68. Ross J. Anderson, Bruce Schneier
    Guest Editors' Introduction: Economics of Information Security. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:1, pp:12-13 [Journal]
  69. Bruce Schneier
    We Are All Security Consumers. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:1, pp:104- [Journal]
  70. Bruce Schneier
    Locks and Full Disclosure. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:2, pp:88- [Journal]
  71. Bruce Schneier
    Guilty Until Proven Innocent? [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:3, pp:88- [Journal]
  72. Bruce Schneier
    The Speed of Security. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:4, pp:96- [Journal]
  73. Bruce Schneier
    Airplane Hackers. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:6, pp:92- [Journal]
  74. Bruce Schneier
    Voting Security and Technology. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:1, pp:84- [Journal]
  75. Bruce Schneier
    Security and Compliance. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:3, pp:96- [Journal]
  76. Bruce Schneier
    Customers, Passwords, and Web Sites. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:4, pp:88- [Journal]
  77. Bruce Schneier
    SIMS: Solution, or Part of the Problem? [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:5, pp:88- [Journal]
  78. Bruce Schneier
    Authentication and Expiration. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:1, pp:88- [Journal]
  79. Bruce Schneier
    The Zotob Storm. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:6, pp:96- [Journal]
  80. Bruce Schneier
    Security pitfalls in cryptographic design. [Citation Graph (0, 0)][DBLP]
    Inf. Manag. Comput. Security, 1998, v:6, n:3, pp:133-137 [Journal]
  81. John Kelsey, Bruce Schneier, David Wagner, Chris Hall
    Side Channel Cryptanalysis of Product Ciphers. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2000, v:8, n:2/3, pp:- [Journal]
  82. Bruce Schneier
    Sensible Authentication. [Citation Graph (0, 0)][DBLP]
    ACM Queue, 2004, v:1, n:10, pp:74-78 [Journal]
  83. Bruce Schneier
    Attack trends: 2004 and 2005. [Citation Graph (0, 0)][DBLP]
    ACM Queue, 2005, v:3, n:5, pp:52-53 [Journal]
  84. Bruce Schneier, John Kelsey
    Secure Audit Logs to Support Computer Forensics. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 1999, v:2, n:2, pp:159-176 [Journal]
  85. Carl M. Ellison, Chris Hall, Randy Milbert, Bruce Schneier
    Protecting secret keys with personal entropy. [Citation Graph (0, 0)][DBLP]
    Future Generation Comp. Syst., 2000, v:16, n:4, pp:311-318 [Journal]

  86. Defeating Encrypted and Deniable File Systems: TrueCrypt v5.1a and the Case of the Tattling OS and Applications. [Citation Graph (, )][DBLP]


  87. The Psychology of Security. [Citation Graph (, )][DBLP]


Search in 0.008secs, Finished in 0.010secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002